2017 5th International Workshop on Biometrics and Forensics (IWBF)最新文献

筛选
英文 中文
An automatic visible watermark detection method using total variation 一种基于总变分的自动可见水印检测方法
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-04 DOI: 10.1109/IWBF.2017.7935109
Héctor Santoyo-García, Eduardo Fragoso-Navarro, R. Reyes-Reyes, G. Sánchez-Pérez, M. Nakano-Miyatake, H. Meana
{"title":"An automatic visible watermark detection method using total variation","authors":"Héctor Santoyo-García, Eduardo Fragoso-Navarro, R. Reyes-Reyes, G. Sánchez-Pérez, M. Nakano-Miyatake, H. Meana","doi":"10.1109/IWBF.2017.7935109","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935109","url":null,"abstract":"Visible watermarking has been an important research area, widely studied and used for copyright protection over the years. However, new visible watermark removal-oriented attacks and techniques have emerged. Although these methods provide high quality resultant images, the main part of the attack consists of manual detection of the watermark pattern. Considering that visible watermark pattern can be different in each watermarked image, time-consuming human intervention is required, making these attacks inefficient in practice. In this paper, we propose an automatic detection method of visible watermark pattern, which can combine with conventional watermark removal attacks to make them more efficient. To accomplish it, the visible watermarked image is decomposed into structure image and texture image using Total Variation L1 (TV-L1) method. In the structure image, the watermark edge is discriminated from the edges present in the host image to automatically detect the visible watermark pattern.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114922627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Face recognition system for smartphone based on LBP 基于LBP的智能手机人脸识别系统
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-01 DOI: 10.1109/IWBF.2017.7935111
J. Olivares-Mercado, K. Toscano-Medina, G. Sánchez-Pérez, H. Meana, M. Nakano-Miyatake
{"title":"Face recognition system for smartphone based on LBP","authors":"J. Olivares-Mercado, K. Toscano-Medina, G. Sánchez-Pérez, H. Meana, M. Nakano-Miyatake","doi":"10.1109/IWBF.2017.7935111","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935111","url":null,"abstract":"This paper presents a face recognition algorithm based on Local Binary Pattern (LBP) to be implemented in a Smartphone with Android operating system where the input image is obtained using the camera of such Smartphone. The LBP algorithm is used for Face characterization, due to its low complexity and its robustness light of this method is chosen to be applied in a Smartphone, this is because the light sensor of smartphone could darken or lighten the captured image and affect a efficient recognition. To perform system testing on a Smartphone was used a standard database (AR Face database) to simulate the capture of images, the average of images was used for obtaining a template by person and using Euclidean distance for classification, showing that the LBP obtains good results using a simple classification algorithm with a Smartphone with limited processing power like a smartphone, further tests were performed with 1 to 9 training images, obtaining up to 90% of recognition.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Full-fingerprint volumetric subsurface imaging using Fourier-domain Optical Coherence Tomography 基于傅里叶域光学相干层析成像的全指纹体积地下成像
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-01 DOI: 10.1109/IWBF.2017.7935082
Ctirad Sousedik, R. Breithaupt
{"title":"Full-fingerprint volumetric subsurface imaging using Fourier-domain Optical Coherence Tomography","authors":"Ctirad Sousedik, R. Breithaupt","doi":"10.1109/IWBF.2017.7935082","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935082","url":null,"abstract":"Despite the long history of automated fingerprint recognition, the state-of-the-art 2D sensors still struggle with abraded, dry, wet or greasy fingers, as well as extra-soft skin of the infant fingerprints. But above all, the current sensors suffer from vulnerabilities to presentation attacks, which greatly limits their applicability in unsupervised scenarios such as border control. Optical Coherence Tomography (OCT) represents an alternative approach with a high potential to address the existing challenges. In this paper, we present a novel fingerprint sensor based on Fourier Domain Optical Coherence Tomography (FD-OCT), capable of capturing a 3D volumetric full fingerprint scan from a 2×2cm area, along with subsurface details such as sweat glands and the internal fingerprint. The novelty of our setup lies in the ability of FD-OCT-scanning a full 3D volumetric fingerprint at high-resolution at speeds that demonstrate the usability of 3D OCT in real-world applications.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115352387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the vulnerability of face recognition systems towards morphed face attacks 人脸识别系统面对变形人脸攻击的脆弱性研究
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-01 DOI: 10.1109/IWBF.2017.7935088
U. Scherhag, Ramachandra Raghavendra, K. Raja, M. Gomez-Barrero, C. Rathgeb, C. Busch
{"title":"On the vulnerability of face recognition systems towards morphed face attacks","authors":"U. Scherhag, Ramachandra Raghavendra, K. Raja, M. Gomez-Barrero, C. Rathgeb, C. Busch","doi":"10.1109/IWBF.2017.7935088","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935088","url":null,"abstract":"Morphed face images are artificially generated images, which blend the facial images of two or more different data subjects into one. The resulting morphed image resembles the constituent faces, both in visual and feature representation. If a morphed image is enroled as a probe in a biometric system, the data subjects contributing to the morphed image will be verified against the enroled probe. As a result of this infiltration, which is referred to as morphed face attack, the unambiguous assignment of data subjects is not warranted, i.e. the unique link between subject and probe is annulled. In this work, we investigate the vulnerability of biometric systems to such morphed face attacks by evaluating the techniques proposed to detect morphed face images. We create two new databases by printing and scanning digitally morphed images using two different types of scanners, a flatbed scanner and a line scanner. Further, the newly created databases are employed to study the vulnerability of state-of-the-art face recognition systems with a comprehensive evaluation.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
An offline user-verifiable electronic traveler's check system 用户可验证的离线电子旅行支票系统
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-01 DOI: 10.1109/IWBF.2017.7935099
Chinchen Chang, Jen-Ho Yang, Yu-Wei Lai, Yanjun Liu
{"title":"An offline user-verifiable electronic traveler's check system","authors":"Chinchen Chang, Jen-Ho Yang, Yu-Wei Lai, Yanjun Liu","doi":"10.1109/IWBF.2017.7935099","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935099","url":null,"abstract":"In recent years, the electronic commerce becomes a popular research issue such that many electronic payment schemes have been proposed to make the electronic commerce more efficient and convenient. However, most of these schemes require high computation cost because the public-key cryptosystem is used. To decrease the computation cost, Liaw et al. proposed an electronic traveler's check scheme based on one-way hash function. Unfortunately, their scheme cannot verify the ownership of the check such that their scheme has a security weakness when the check is lost. Thus, we propose an offline user-verifiable electronic traveler's check system to overcome this security weakness. The proposed system can prevent an invalid user from paying the merchant by the check even if the check has been lost or stolen. In addition, the proposed system provides the security requirements of non-forgery, non-double-spending, user-verifying and anonymity. Compared with the related works, the proposed system is more efficient, reliable and practical for electronic transactions.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127035179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient finger segmentation robust to hand alignment in imaging with application to human verification 有效的手指分割鲁棒手对准成像与应用于人体验证
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-01 DOI: 10.1109/IWBF.2017.7935097
R. Al-Nima, S. Dlay, W. L. Woo, J. Chambers
{"title":"Efficient finger segmentation robust to hand alignment in imaging with application to human verification","authors":"R. Al-Nima, S. Dlay, W. L. Woo, J. Chambers","doi":"10.1109/IWBF.2017.7935097","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935097","url":null,"abstract":"Finger segmentation is the first challenging step in a Finger Texture (FT) recognition system. We propose an efficient finger segmentation method to address the problem of variation in the alignment of the hand. A scanning line is suggested to detect the hand position and determine the main characteristics of the fingers. Furthermore, an adaptive threshold and adaptive rotation step are exploited. The proposed segmentation scheme is then integrated into a powerful human verification scheme based on a finger Feature Level Fusion (FLF) method with the Probabilistic Neural Network (PNN). Three databases are employed for evaluation: IIT Delhi, PolyU3D2D and spectral 460 from the CASIA Multi-Spectral Palmprint database. The proposed method has efficiently isolated the fingers and resulted in best Equal Error Rate (EER) values for the three databases of 2.03%, 0.68% and 5%, respectively. Moreover, comparisons with related work are provided in this study.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115336039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Speaker identification evaluation based on the speech biometric and i-vector model using the TIMIT and NTIMIT databases 基于语音生物特征和i-向量模型的说话人识别评估,使用TIMIT和NTIMIT数据库
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-01 DOI: 10.1109/IWBF.2017.7935102
Musab T. S. Al-Kaltakchi, W. L. Woo, S. Dlay, J. Chambers
{"title":"Speaker identification evaluation based on the speech biometric and i-vector model using the TIMIT and NTIMIT databases","authors":"Musab T. S. Al-Kaltakchi, W. L. Woo, S. Dlay, J. Chambers","doi":"10.1109/IWBF.2017.7935102","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935102","url":null,"abstract":"Physiological and behavioural human characteristics are exploited in biometrics and performance metrics are used to measure some characteristic of an individual. The measure might lead to a one-to-one match, which is called authentication or one-from-N, and a match represents identification. In this paper, we exploit a speech biometric I-vector with low and fixed dimension of 100 to identify speakers. The main structure of the system consists of an I-vector with three fusion methods. It has low complexity and is efficient due to using an Extreme Learning Machine (ELM) classifier. The system is evaluated with 120 speakers from dialect regions one and four from both the TIMIT and NTIMIT databases in order to provide a fair comparison with our previous study based on the traditional Gaussian Mixture Model-Universal Background Model (GMM-UBM) with a Maximum Likelihood (ML) classifier system. The system shows identification rate improvement compared with the classical GMM-UBM.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121742779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Sensor dependency in efficient fingerprint image protection using selective JPEG2000 encryption 采用选择性JPEG2000加密的高效指纹图像保护中的传感器依赖性
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-01 DOI: 10.1109/IWBF.2017.7935094
Martin Draschl, Jutta Hämmerle-Uhl, A. Uhl
{"title":"Sensor dependency in efficient fingerprint image protection using selective JPEG2000 encryption","authors":"Martin Draschl, Jutta Hämmerle-Uhl, A. Uhl","doi":"10.1109/IWBF.2017.7935094","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935094","url":null,"abstract":"Biometric system security requires cryptographic protection of sample data under certain circumstances. We assess low complexity selective encryption schemes applied to JPEG2000 compressed fingerprint data by conducting fingerprint recognition on the selectively encrypted data. This paper specifically investigates the effect of considering different sensors for data acquisition and finds significant dependency of optimal encryption settings on the sensor employed.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122346417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Sparse error gait image: A new representation for gait recognition 稀疏误差步态图像:一种新的步态识别方法
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-01 DOI: 10.1109/IWBF.2017.7935107
T. Verlekar, P. Correia, Luís Ducla Soares
{"title":"Sparse error gait image: A new representation for gait recognition","authors":"T. Verlekar, P. Correia, Luís Ducla Soares","doi":"10.1109/IWBF.2017.7935107","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935107","url":null,"abstract":"The performance of a gait recognition system is very much related to the usage of efficient feature representation and recognition modules. The first extracts features from an input image sequence to represent a user's distinctive gait pattern. The recognition module then compares the features of a probe user with those registered in the gallery database. This paper presents a novel gait feature representation, called Sparse Error Gait Image (SEGI), derived from the application of Robust Principal Component Analysis (RPCA) to Gait Energy Images (GEI). GEIs obtained from the same user at different instants always present some differences. Applying RPCA results in low-rank and sparse error components, the former capturing the commonalities and encompassing the small differences between input GEIs, while the larger differences are captured by the sparse error component. The proposed SEGI representation exploits the latter for recognition purposes. This paper also proposes two simple approaches for the recognition module, to exploit the SEGI, based on the computation of a Euclidean norm or the Euclidean distance. Using these simple recognition methods and the proposed SEGI representation gait recognition, results equivalent to the state-of-the-art are obtained.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121975110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Feature level fused templates for multi-biometric system on smartphones 智能手机多生物识别系统的特征级融合模板
2017 5th International Workshop on Biometrics and Forensics (IWBF) Pub Date : 2017-04-01 DOI: 10.1109/IWBF.2017.7935110
Martin Stokkenes, Ramachandra Raghavendra, K. Raja, Morten K. Sigaard, C. Busch
{"title":"Feature level fused templates for multi-biometric system on smartphones","authors":"Martin Stokkenes, Ramachandra Raghavendra, K. Raja, Morten K. Sigaard, C. Busch","doi":"10.1109/IWBF.2017.7935110","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935110","url":null,"abstract":"This work examines feature level fusion for protected biometric templates in a multi-biometric authentication system for smartphones. The modalities incorporated by the system are face and the left-right periocular region. The fusion methods considered are concatenation of the templates obtained from the three modalities, and combining the three templates using a simple XOR operation by varying the amount of overlap between them up to 100%. The impact on performance from applying the feature level fusion methods are evaluated on a moderate sized dataset consisting of images from 73 subjects, captured using a Samsung Galaxy S5. We show that the biometric performance can be improved in most of the cases by employing the fusion methods when compared to the performance of each individual modality while not compromising the security level provided by template protection schemes.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126500909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信