Héctor Santoyo-García, Eduardo Fragoso-Navarro, R. Reyes-Reyes, G. Sánchez-Pérez, M. Nakano-Miyatake, H. Meana
{"title":"An automatic visible watermark detection method using total variation","authors":"Héctor Santoyo-García, Eduardo Fragoso-Navarro, R. Reyes-Reyes, G. Sánchez-Pérez, M. Nakano-Miyatake, H. Meana","doi":"10.1109/IWBF.2017.7935109","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935109","url":null,"abstract":"Visible watermarking has been an important research area, widely studied and used for copyright protection over the years. However, new visible watermark removal-oriented attacks and techniques have emerged. Although these methods provide high quality resultant images, the main part of the attack consists of manual detection of the watermark pattern. Considering that visible watermark pattern can be different in each watermarked image, time-consuming human intervention is required, making these attacks inefficient in practice. In this paper, we propose an automatic detection method of visible watermark pattern, which can combine with conventional watermark removal attacks to make them more efficient. To accomplish it, the visible watermarked image is decomposed into structure image and texture image using Total Variation L1 (TV-L1) method. In the structure image, the watermark edge is discriminated from the edges present in the host image to automatically detect the visible watermark pattern.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114922627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Olivares-Mercado, K. Toscano-Medina, G. Sánchez-Pérez, H. Meana, M. Nakano-Miyatake
{"title":"Face recognition system for smartphone based on LBP","authors":"J. Olivares-Mercado, K. Toscano-Medina, G. Sánchez-Pérez, H. Meana, M. Nakano-Miyatake","doi":"10.1109/IWBF.2017.7935111","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935111","url":null,"abstract":"This paper presents a face recognition algorithm based on Local Binary Pattern (LBP) to be implemented in a Smartphone with Android operating system where the input image is obtained using the camera of such Smartphone. The LBP algorithm is used for Face characterization, due to its low complexity and its robustness light of this method is chosen to be applied in a Smartphone, this is because the light sensor of smartphone could darken or lighten the captured image and affect a efficient recognition. To perform system testing on a Smartphone was used a standard database (AR Face database) to simulate the capture of images, the average of images was used for obtaining a template by person and using Euclidean distance for classification, showing that the LBP obtains good results using a simple classification algorithm with a Smartphone with limited processing power like a smartphone, further tests were performed with 1 to 9 training images, obtaining up to 90% of recognition.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Full-fingerprint volumetric subsurface imaging using Fourier-domain Optical Coherence Tomography","authors":"Ctirad Sousedik, R. Breithaupt","doi":"10.1109/IWBF.2017.7935082","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935082","url":null,"abstract":"Despite the long history of automated fingerprint recognition, the state-of-the-art 2D sensors still struggle with abraded, dry, wet or greasy fingers, as well as extra-soft skin of the infant fingerprints. But above all, the current sensors suffer from vulnerabilities to presentation attacks, which greatly limits their applicability in unsupervised scenarios such as border control. Optical Coherence Tomography (OCT) represents an alternative approach with a high potential to address the existing challenges. In this paper, we present a novel fingerprint sensor based on Fourier Domain Optical Coherence Tomography (FD-OCT), capable of capturing a 3D volumetric full fingerprint scan from a 2×2cm area, along with subsurface details such as sweat glands and the internal fingerprint. The novelty of our setup lies in the ability of FD-OCT-scanning a full 3D volumetric fingerprint at high-resolution at speeds that demonstrate the usability of 3D OCT in real-world applications.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115352387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Scherhag, Ramachandra Raghavendra, K. Raja, M. Gomez-Barrero, C. Rathgeb, C. Busch
{"title":"On the vulnerability of face recognition systems towards morphed face attacks","authors":"U. Scherhag, Ramachandra Raghavendra, K. Raja, M. Gomez-Barrero, C. Rathgeb, C. Busch","doi":"10.1109/IWBF.2017.7935088","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935088","url":null,"abstract":"Morphed face images are artificially generated images, which blend the facial images of two or more different data subjects into one. The resulting morphed image resembles the constituent faces, both in visual and feature representation. If a morphed image is enroled as a probe in a biometric system, the data subjects contributing to the morphed image will be verified against the enroled probe. As a result of this infiltration, which is referred to as morphed face attack, the unambiguous assignment of data subjects is not warranted, i.e. the unique link between subject and probe is annulled. In this work, we investigate the vulnerability of biometric systems to such morphed face attacks by evaluating the techniques proposed to detect morphed face images. We create two new databases by printing and scanning digitally morphed images using two different types of scanners, a flatbed scanner and a line scanner. Further, the newly created databases are employed to study the vulnerability of state-of-the-art face recognition systems with a comprehensive evaluation.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chinchen Chang, Jen-Ho Yang, Yu-Wei Lai, Yanjun Liu
{"title":"An offline user-verifiable electronic traveler's check system","authors":"Chinchen Chang, Jen-Ho Yang, Yu-Wei Lai, Yanjun Liu","doi":"10.1109/IWBF.2017.7935099","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935099","url":null,"abstract":"In recent years, the electronic commerce becomes a popular research issue such that many electronic payment schemes have been proposed to make the electronic commerce more efficient and convenient. However, most of these schemes require high computation cost because the public-key cryptosystem is used. To decrease the computation cost, Liaw et al. proposed an electronic traveler's check scheme based on one-way hash function. Unfortunately, their scheme cannot verify the ownership of the check such that their scheme has a security weakness when the check is lost. Thus, we propose an offline user-verifiable electronic traveler's check system to overcome this security weakness. The proposed system can prevent an invalid user from paying the merchant by the check even if the check has been lost or stolen. In addition, the proposed system provides the security requirements of non-forgery, non-double-spending, user-verifying and anonymity. Compared with the related works, the proposed system is more efficient, reliable and practical for electronic transactions.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127035179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient finger segmentation robust to hand alignment in imaging with application to human verification","authors":"R. Al-Nima, S. Dlay, W. L. Woo, J. Chambers","doi":"10.1109/IWBF.2017.7935097","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935097","url":null,"abstract":"Finger segmentation is the first challenging step in a Finger Texture (FT) recognition system. We propose an efficient finger segmentation method to address the problem of variation in the alignment of the hand. A scanning line is suggested to detect the hand position and determine the main characteristics of the fingers. Furthermore, an adaptive threshold and adaptive rotation step are exploited. The proposed segmentation scheme is then integrated into a powerful human verification scheme based on a finger Feature Level Fusion (FLF) method with the Probabilistic Neural Network (PNN). Three databases are employed for evaluation: IIT Delhi, PolyU3D2D and spectral 460 from the CASIA Multi-Spectral Palmprint database. The proposed method has efficiently isolated the fingers and resulted in best Equal Error Rate (EER) values for the three databases of 2.03%, 0.68% and 5%, respectively. Moreover, comparisons with related work are provided in this study.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115336039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Musab T. S. Al-Kaltakchi, W. L. Woo, S. Dlay, J. Chambers
{"title":"Speaker identification evaluation based on the speech biometric and i-vector model using the TIMIT and NTIMIT databases","authors":"Musab T. S. Al-Kaltakchi, W. L. Woo, S. Dlay, J. Chambers","doi":"10.1109/IWBF.2017.7935102","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935102","url":null,"abstract":"Physiological and behavioural human characteristics are exploited in biometrics and performance metrics are used to measure some characteristic of an individual. The measure might lead to a one-to-one match, which is called authentication or one-from-N, and a match represents identification. In this paper, we exploit a speech biometric I-vector with low and fixed dimension of 100 to identify speakers. The main structure of the system consists of an I-vector with three fusion methods. It has low complexity and is efficient due to using an Extreme Learning Machine (ELM) classifier. The system is evaluated with 120 speakers from dialect regions one and four from both the TIMIT and NTIMIT databases in order to provide a fair comparison with our previous study based on the traditional Gaussian Mixture Model-Universal Background Model (GMM-UBM) with a Maximum Likelihood (ML) classifier system. The system shows identification rate improvement compared with the classical GMM-UBM.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121742779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensor dependency in efficient fingerprint image protection using selective JPEG2000 encryption","authors":"Martin Draschl, Jutta Hämmerle-Uhl, A. Uhl","doi":"10.1109/IWBF.2017.7935094","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935094","url":null,"abstract":"Biometric system security requires cryptographic protection of sample data under certain circumstances. We assess low complexity selective encryption schemes applied to JPEG2000 compressed fingerprint data by conducting fingerprint recognition on the selectively encrypted data. This paper specifically investigates the effect of considering different sensors for data acquisition and finds significant dependency of optimal encryption settings on the sensor employed.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122346417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sparse error gait image: A new representation for gait recognition","authors":"T. Verlekar, P. Correia, Luís Ducla Soares","doi":"10.1109/IWBF.2017.7935107","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935107","url":null,"abstract":"The performance of a gait recognition system is very much related to the usage of efficient feature representation and recognition modules. The first extracts features from an input image sequence to represent a user's distinctive gait pattern. The recognition module then compares the features of a probe user with those registered in the gallery database. This paper presents a novel gait feature representation, called Sparse Error Gait Image (SEGI), derived from the application of Robust Principal Component Analysis (RPCA) to Gait Energy Images (GEI). GEIs obtained from the same user at different instants always present some differences. Applying RPCA results in low-rank and sparse error components, the former capturing the commonalities and encompassing the small differences between input GEIs, while the larger differences are captured by the sparse error component. The proposed SEGI representation exploits the latter for recognition purposes. This paper also proposes two simple approaches for the recognition module, to exploit the SEGI, based on the computation of a Euclidean norm or the Euclidean distance. Using these simple recognition methods and the proposed SEGI representation gait recognition, results equivalent to the state-of-the-art are obtained.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121975110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Martin Stokkenes, Ramachandra Raghavendra, K. Raja, Morten K. Sigaard, C. Busch
{"title":"Feature level fused templates for multi-biometric system on smartphones","authors":"Martin Stokkenes, Ramachandra Raghavendra, K. Raja, Morten K. Sigaard, C. Busch","doi":"10.1109/IWBF.2017.7935110","DOIUrl":"https://doi.org/10.1109/IWBF.2017.7935110","url":null,"abstract":"This work examines feature level fusion for protected biometric templates in a multi-biometric authentication system for smartphones. The modalities incorporated by the system are face and the left-right periocular region. The fusion methods considered are concatenation of the templates obtained from the three modalities, and combining the three templates using a simple XOR operation by varying the amount of overlap between them up to 100%. The impact on performance from applying the feature level fusion methods are evaluated on a moderate sized dataset consisting of images from 73 subjects, captured using a Samsung Galaxy S5. We show that the biometric performance can be improved in most of the cases by employing the fusion methods when compared to the performance of each individual modality while not compromising the security level provided by template protection schemes.","PeriodicalId":111316,"journal":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126500909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}