{"title":"Analysing a Vein Liveness Detection Scheme","authors":"Thomas Herzog, A. Uhl","doi":"10.1109/IWBF49977.2020.9107960","DOIUrl":"https://doi.org/10.1109/IWBF49977.2020.9107960","url":null,"abstract":"We examine a previously published liveness detection method for guarding against presentation attacks on vein recognition systems which employs motion magnification on video frames, and develop three new attacks that circumvent the proposed protective scheme. The first pair of attacks are direct attacks or presentation attacks, and involve presenting a fake sample with rhythmic motions to the biometric system. The third attack is an indirect attack that feeds the biometric system a synthetic video signal designed to circumvent the liveness detection scheme. Results show that the analysed liveness detection system must not be used as a standalone technique. We conclude by recommending improvements to the analysed scheme to harden against attacks of the kind we presented and to avoid having to combine it with other presentation attack detection techniques.","PeriodicalId":174654,"journal":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117096260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensemble Method for Sexual Predators Identification in Online Chats","authors":"M. Fauzi, Patrick A. H. Bours","doi":"10.1109/IWBF49977.2020.9107945","DOIUrl":"https://doi.org/10.1109/IWBF49977.2020.9107945","url":null,"abstract":"Cyber grooming is a compelling problem worldwide nowadays and many reports strongly suggested that it becomes very urgent to tackle this problem to protect the children from sexual exploitation. In this study, we propose an effective method for sexual predator identification in online chats based on two-stage classification. The purpose of the first stage is to distinguish predatory conversations from the normal ones while the second stage aims to tell apart between the predator user and the victim within a single predatory conversation. Finally, some unique predators are derived from the second stage result. We investigate several machine learning classifiers including Naive Bayes, Support Vector Machine, Neural Network, Logistic Regression, Random Forest, K-Nearest Neighbors, and Decision Tree with Bag of Words features using several different term weighting methods for this task. We also proposed two ensemble techniques to improve the classification task. The experiment results on PAN12 dataset show that our best method using soft voting based ensemble for first stage and Naive Bayes based method for the second stage obtained an F0.5-score of 0.9348, which would place as number one in the PAN12 competition ranking.","PeriodicalId":174654,"journal":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115138952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contactless Finger Knuckle Authentication under Severe Pose Deformations","authors":"Ajay Kumar","doi":"10.1109/IWBF49977.2020.9107951","DOIUrl":"https://doi.org/10.1109/IWBF49977.2020.9107951","url":null,"abstract":"Contactless biometrics identification using finger knuckle images has shown significant potential for the e-business and forensic applications. One of the key challenges in accurately matching the real-world contactless finger knuckle images is related to the knuckle pattern deformations that are involuntarily generated due to finger pose changes. Earlier work in this area therefore acquired fixed pose finger images for the authentication and therefore the performance achieved from such images cannot reflect the expected performance under the deployment scenarios. This paper adopts a new approach to accurately match such finger knuckle images and presents first attempt to authenticate finger-knuckle patterns under severe pose changes. This approach attempts to correct pose related deformations by identifying the correspondence between a fixed number of chosen points between two matched images. The match score is computed using local feature descriptors, at each of these correspondence points, and consolidated to generate average match score. The experimental results are presented in this paper, both using two-session and single-session index finger knuckle images from 221 different subjects, using publicly available database. These results are outperforming and indicate the merit of spatial-domain approach to match deformed finger knuckle images using a fixed number of correspondence points.","PeriodicalId":174654,"journal":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132752768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust video source recognition in presence of motion stabilization","authors":"P. Ferrara, Laurent Beslay","doi":"10.1109/IWBF49977.2020.9107957","DOIUrl":"https://doi.org/10.1109/IWBF49977.2020.9107957","url":null,"abstract":"Video source attribution is getting a growing interest from researchers, law enforcement officers and forensic analysts. The capability of linking a video recording with its source device enables to search out who has generated a video recording. Such a feature finds immediate application in fighting against technology enabled crimes such as digital piracy and child abuse online. Currently, the most powerful techniques rely on the unique noise traces left by each camera sensor within any visual content, widely known as Photo Response NonUniformity. However, in the case of videos, the increasing adoption of digital motion stabilization interferes with the extraction of reliable noise patterns. In such a context, this paper describes a novel methodology for creating a robust reference video PRNU from still images for source camera recognition. Moreover, we provide a novel optimized strategy to compare two different PRNUs extracted from videos in presence of motion stabilization. The conducted experimental evaluation highlights the strength of the proposed methods.","PeriodicalId":174654,"journal":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130223691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Assessment of Partially Encrypted Visual Data: Using Iris Recognition as Generic Measure","authors":"Martin Rieger, Jutta Hämmerle-Uhl, A. Uhl","doi":"10.1109/IWBF49977.2020.9107967","DOIUrl":"https://doi.org/10.1109/IWBF49977.2020.9107967","url":null,"abstract":"Security assessment of partially encrypted visual data is known to be difficult. We show that a set of known image quality measures turn out not to be good predictors for encryption strength, especially if a different extent of recognisability is present in the data. Iris recognition applied to encrypted sample data is proposed to assess the protection strength of the employed encryption scheme. When choosing the settings as identified in this work, iris recognition performance turns out to be a viable predictor for security of encrypted data, in more consistent manner compared to image quality measures.","PeriodicalId":174654,"journal":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131774383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced Multi-Perspective Enrolment in Finger Vein Recognition","authors":"B. Prommegger, A. Uhl","doi":"10.1109/IWBF49977.2020.9107968","DOIUrl":"https://doi.org/10.1109/IWBF49977.2020.9107968","url":null,"abstract":"Finger vein recognition deals with the recognition of subjects based on their venous pattern within the fingers. It has been shown that its recognition accuracy heavily depends on a good alignment of the acquired samples. There are several approaches that try to reduce the impact of finger misplacement. However, none of these approaches is able to prevent all possible types of finger misplacements. As finger vein scanners are evolving towards contact-less acquisition, alignment problems, especially due to longitudinal finger rotation, are becoming even more important. Along with rotation detection and correction, capturing the vein pattern from multiple perspectives, as e.g. in multiple-perspective enrolment (MPE, [1]), is a way to tackle the problem of longitudinal finger rotation. Involving multiple cameras increases cost and complexity of the capturing devices, and therefore their number should be kept to a minimum. Perspective multiplication for MPE (PM-MPE, [2]) successfully reduces the number of cameras needed during enrolment while keeping the recognition rates at a high level. So far, (PM-)MPE has only been applied using Maximum curvature features (MC, [3]). This work analyses further approaches to improve the their recognition rates and investigates the applicability of (PM-)MPE to recognition schemes using features other than MC.","PeriodicalId":174654,"journal":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124932730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Emotion Distribution Learning from Face Images using CNN and LBC Features","authors":"Abeer Almowallad, Victor Sanchez","doi":"10.1109/IWBF49977.2020.9107940","DOIUrl":"https://doi.org/10.1109/IWBF49977.2020.9107940","url":null,"abstract":"Human emotion recognition from facial expressions depicted in images is an active area of research particularly for medical, security and human-computer interaction applications. Since there is no pure emotion, measuring the intensity of several possible emotions depicted in a facial expression image is a challenging task. Previous studies have dealt with this challenge by using label-distribution learning (LDL) and focusing on optimizing a conditional probability function that attempts to reduce the relative entropy of the predicted distribution with respect to the target distribution, which leads to a lack of generality of the model. In this work, we propose a deep learning framework for LDL that uses convolutional neural network (CNN) features to increase the generalization of the trained model. Our framework, which we call EDL-LBCNN, enhances the features extracted by CNNs by incorporating a local binary convolutional (LBC) layer to acquire texture information from the face images. We evaluate our EDL-LBCNN framework on the s-JAFFE dataset. Our experimental results show that the EDL-LBCNN framework can effectively deal with LDL for human emotion recognition and attain a stronger performance than that of state-of-the-art methods.","PeriodicalId":174654,"journal":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117240555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ana F. Sequeira, W. Silva, João Ribeiro Pinto, Tiago Gonçalves, J. Cardoso
{"title":"Interpretable Biometrics: Should We Rethink How Presentation Attack Detection is Evaluated?","authors":"Ana F. Sequeira, W. Silva, João Ribeiro Pinto, Tiago Gonçalves, J. Cardoso","doi":"10.1109/IWBF49977.2020.9107949","DOIUrl":"https://doi.org/10.1109/IWBF49977.2020.9107949","url":null,"abstract":"Presentation attack detection (PAD) methods are commonly evaluated using metrics based on the predicted labels. This is a limitation, especially for more elusive methods based on deep learning which can freely learn the most suitable features. Though often being more accurate, these models operate as complex black boxes which makes the inner processes that sustain their predictions still baffling. Interpretability tools are now being used to delve deeper into the operation of machine learning methods, especially artificial networks, to better understand how they reach their decisions. In this paper, we make a case for the integration of interpretability tools in the evaluation of PAD. A simple model for face PAD, based on convolutional neural networks, was implemented and evaluated using both traditional metrics (APCER, BPCER and EER) and interpretability tools (Grad-CAM), using data from the ROSE Youtu video collection. The results show that interpretability tools can capture more completely the intricate behavior of the implemented model, and enable the identification of certain properties that should be verified by a PAD method that is robust, coherent, meaningful, and can adequately generalize to unseen data and attacks. One can conclude that, with further efforts devoted towards higher objectivity in interpretability, this can be the key to obtain deeper and more thorough PAD performance evaluation setups.","PeriodicalId":174654,"journal":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132470742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IWBF 2020 Author Index","authors":"","doi":"10.1109/iwbf49977.2020.9107947","DOIUrl":"https://doi.org/10.1109/iwbf49977.2020.9107947","url":null,"abstract":"","PeriodicalId":174654,"journal":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","volume":"90 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126110982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sanjay Shekhawat, H. Hofbauer, B. Prommegger, A. Uhl
{"title":"Efficient Fingervein Sample Image Encryption","authors":"Sanjay Shekhawat, H. Hofbauer, B. Prommegger, A. Uhl","doi":"10.1109/IWBF49977.2020.9107943","DOIUrl":"https://doi.org/10.1109/IWBF49977.2020.9107943","url":null,"abstract":"Efficient sample encryption techniques are investigated for fingervein data. We propose an approach where it suffices to encrypt 0.5% of the sample JPEG2000 bitstream and thereby completely disable biometric recognition. Evaluations with 5 different recognition schemes on two different datasets reveal that results are stable accross all techniques considered as long as the start of the bitstream is encrypted.","PeriodicalId":174654,"journal":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114615361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}