2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference最新文献

筛选
英文 中文
3D Touchless Fingerprints: Compatibility with Legacy Rolled Images 3D非触摸指纹:与传统滚动图像的兼容性
Yi Chen, Geppy Parziale, Eva Diaz-Santana, Anil K. Jain
{"title":"3D Touchless Fingerprints: Compatibility with Legacy Rolled Images","authors":"Yi Chen, Geppy Parziale, Eva Diaz-Santana, Anil K. Jain","doi":"10.1109/BCC.2006.4341621","DOIUrl":"https://doi.org/10.1109/BCC.2006.4341621","url":null,"abstract":"Fingerprints are traditionally captured based on contact of the finger on paper or a platen surface. This often results in partial or degraded images due to improper finger placement, skin deformation, slippage and smearing, or sensor noise from wear and tear of surface coatings. A new generation of touchless live scan devices that generate 3D representation of fingerprints is appearing in the market. This new sensing technology addresses many of the problems stated above. However, 3D touchless fingerprint images need to be compatible with the legacy rolled images used in automated fingerprint identification systems (AFIS). In order to solve this interoperability issue, we propose an unwrapping algorithm that unfolds the 3D fingerprint in such a way that it resembles the effect of virtually rolling the 3D finger on a 2D plane. Our preliminary experiments show promising results in obtaining touchless fingerprint images that are of high quality and at the same time compatible with legacy rolled fingerprint images.","PeriodicalId":226152,"journal":{"name":"2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116022390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
Measuring Biometric Sample Quality in Terms of Biometric Information 基于生物特征信息的生物特征样品质量测量
R. Youmaran, Andy Adler
{"title":"Measuring Biometric Sample Quality in Terms of Biometric Information","authors":"R. Youmaran, Andy Adler","doi":"10.1109/BCC.2006.4341618","DOIUrl":"https://doi.org/10.1109/BCC.2006.4341618","url":null,"abstract":"This paper develops a new approach to understand and measure variations in biometric sample quality. We begin with the intuition that degradations to a biometric sample will reduce the amount of identifiable information available. In order to measure the amount of identifiable information, we define biometric information as the decrease in uncertainty about the identity of a person due to a set of biometric measurements. We then show that the biometric information for a person may be calculated by the relative entropy D(p||q) between the population feature distribution q and the person's feature distribution p. The biometric information for a system is the mean D(p||q) for all persons in the population. In order to practically measure D(p||q) with limited data samples, we introduce an algorithm which regularizes a Gaussian model of the feature covariances. An example of this method is shown for PCA, Fisher linear discriminant (FLD) and ICA based face recognition, with biometric information calculated to be 45.0 bits (PCA), 37.0 bits (FLD), 39.0 bits (ICA) and 55.6 bits (fusion of PCA and FLD features). Based on this definition of biometric information, we simulate degradations of biometric images and calculate the resulting decrease in biometric information. Results show a quasi-linear decrease for small levels of blur with an asymptotic behavior at larger blur.","PeriodicalId":226152,"journal":{"name":"2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129789977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Protection Scheme for MOC-Enabled Smart Cards 支持moc的智能卡的保护方案
C. Barral, S. Vaudenay
{"title":"A Protection Scheme for MOC-Enabled Smart Cards","authors":"C. Barral, S. Vaudenay","doi":"10.1109/BCC.2006.4341632","DOIUrl":"https://doi.org/10.1109/BCC.2006.4341632","url":null,"abstract":"The concept of match-on-card (MoC) consists of a smart card which receives an applicant's candidate template T to be compared with the stored reference template Tref by processing the complete matching algorithm during a biometric authentication request. The smart card will then output whether this comparison is positive or not. The main argument against MoC-enabled smart cards is that it opens the way for YesCard (i.e. an attack path previously seen in banking, a card always returning \"yes\"). The threat regarding biometrics is not only YesCard, but also NoCard as we will see in this paper. We will propose a protocol to easily thwart these attacks by using simple cryptographic primitives such as symmetric encryption. This protocol will however only protect the system from malicious smart cards, but will not protect the smart card against malicious systems. Finally we will enhance this pro tocol to protect the smart card against its use as a so-called oracle to guess the stored reference biometric template.","PeriodicalId":226152,"journal":{"name":"2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121536062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Identification Model for Classifier Combinations 分类器组合的识别模型
S. Tulyakov, V. Govindaraju
{"title":"Identification Model for Classifier Combinations","authors":"S. Tulyakov, V. Govindaraju","doi":"10.1109/BCC.2006.4341634","DOIUrl":"https://doi.org/10.1109/BCC.2006.4341634","url":null,"abstract":"This paper considers combinations of biometric matchers in identification system. We assume that the test template is matched not only against the enrolled template of claimed person identity, but also against few enrolled templates of other persons, and all matching scores are available to the combination algorithm. We present a combination method utilizing the dependencies between these scores and showing better performance than comparable traditional combination method using only matching scores related to the claimed identity.","PeriodicalId":226152,"journal":{"name":"2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130565217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Attestation-Based Remote Biometric Authentication 基于认证的远程生物识别认证
T. Polon, S. Sander
{"title":"Attestation-Based Remote Biometric Authentication","authors":"T. Polon, S. Sander","doi":"10.1109/BCC.2006.4341619","DOIUrl":"https://doi.org/10.1109/BCC.2006.4341619","url":null,"abstract":"Migration from password and token-based authentication in distributed systems requires fundamental changes to the authentication process. A person's biometric data is not a secret, which presents a fundamental difference with other authentication methods. Matching a sample with a database template is secondary to establishing trust in the integrity of the sample. The process is similar to establishing a chain of custody for judicial evidence. In computer systems this is accomplished using attestation architectures. In this paper, a design for a secure remote biometric login system based on an attestation architecture is analyzed. The system uses a commercially available Trusted Platform Module (TPM) to authenticate the platform during the boot process and perform trusted private-key functions to participate in a challenge/response between the client and a remote biometric matcher. The result is a system that can provide higher assurance than current systems in an economically and administratively feasible system.","PeriodicalId":226152,"journal":{"name":"2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120948663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Quality Assessment of Facial Images 面部图像的质量评估
R. Hsu, J. Shah, B. Martin
{"title":"Quality Assessment of Facial Images","authors":"R. Hsu, J. Shah, B. Martin","doi":"10.1109/BCC.2006.4341617","DOIUrl":"https://doi.org/10.1109/BCC.2006.4341617","url":null,"abstract":"Quality assessment of facial images differs from the traditional quality assessment of image and video signals with regards to its multiple goals such as to ensure its fidelity to the human visual system (HVS) model, to predict matching performance, to generate feedback on image acquisition, to guard the enrollment process, and to provide a weight for merging multimodal biometrics. In this paper, we present a quality assessment framework that complies with the requirements of ISO/IEC 19794-5 for facial biometrics and additionally ensures optimal recognition performance. This framework employs a novel classification-based score normalization process for various quality metrics and includes techniques to fuse those individual quality scores into an overall quality score which is shown to be correlated to the genuine match scores of the Facelt face recognition engine. We confirm the effectiveness of this overall quality score at satisfying multiple goals by first parameterizing ROC curves with average database quality to show the predictive nature of the metric and secondly by showing the consistency between this overall quality score and human perception of image quality.","PeriodicalId":226152,"journal":{"name":"2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134410560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Using Biometric Verification to Estimate Identification Performance 利用生物特征验证估计识别性能
J. Hube
{"title":"Using Biometric Verification to Estimate Identification Performance","authors":"J. Hube","doi":"10.1109/BCC.2006.4341620","DOIUrl":"https://doi.org/10.1109/BCC.2006.4341620","url":null,"abstract":"We show how to estimate identification performance for arbitrary gallery size from an ROC curve. The method presented can: (1) estimate an alarm curve; (2) give rank 1 dependence on gallery size; and (3) estimate a CMC curve. We show that the method assumes consistently normalized scores, with normalization the degree of freedom defining the connection between identification and verification. A measure to quantify normalization consistency is defined. Examples are given using both fingerprint and face databases. Further examples are based on the results given in the FRVT 2002 evaluation report.","PeriodicalId":226152,"journal":{"name":"2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Gait Recognition Through MPCA Plus LDA 基于MPCA和LDA的步态识别
Haiping Lu, K. Plataniotis, A. Venetsanopoulos
{"title":"Gait Recognition Through MPCA Plus LDA","authors":"Haiping Lu, K. Plataniotis, A. Venetsanopoulos","doi":"10.1109/BCC.2006.4341613","DOIUrl":"https://doi.org/10.1109/BCC.2006.4341613","url":null,"abstract":"This paper solves the gait recognition problem in a multilinear principal component analysis (MPCA) framework. Gait sequences are naturally described as tensor objects and feature extraction for tensor objects is important in computer vision and pattern recognition applications. Classical principal component analysis (PCA) operates on vectors and it is not directly applicable to gait sequences. This work introduces an MPCA framework for feature extraction from gait sequences by seeking a multilinear projection onto a tensor subspace of lower dimensionality which captures most of the variance of the original gait samples. A subset of the extracted eigen-tensors are selected and the classical LDA is then applied. In experiments, gait recognition results are reported on the Gait Challenge data sets using the proposed solution. The results indicate that with a simple design, the proposed algorithm outperforms the state-of-the-art algorithms.","PeriodicalId":226152,"journal":{"name":"2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114706218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
ECG Biometric Recognition Without Fiducial Detection 无基准检测的心电生物特征识别
D. Hatzinakos
{"title":"ECG Biometric Recognition Without Fiducial Detection","authors":"D. Hatzinakos","doi":"10.1109/BCC.2006.4341628","DOIUrl":"https://doi.org/10.1109/BCC.2006.4341628","url":null,"abstract":"Security concerns increase as the technology for falsification advances. There are strong evidences that a difficult to falsify biometric, the human heartbeat, can be used for identity recognition. Existing approaches address the problem by using electrocardiogram (ECG) data and the fiducials of the different parts of the heartrate. However, the current fiducial detection tools are inadequate for this application since the boundaries of waveforms are difficult to detect, locate and define. In this paper, an ECG biometric recognition method that does not require any waveform detections is introduced based on classification of coefficients from the discrete cosine transform (DCT) of the Autocorrelation (AC) sequence of ECG data segments. Low false negative rates, low false positive rates and a 100% subject recognition rate for healthy subjects can be achieved for parameters that are suitable for the database.","PeriodicalId":226152,"journal":{"name":"2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126315345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 279
Automatic Tooth Segmentation Using Active Contour Without Edges 无边缘活动轮廓的自动牙齿分割
S. Shah, A. Abaza, A. Ross, H. Ammar
{"title":"Automatic Tooth Segmentation Using Active Contour Without Edges","authors":"S. Shah, A. Abaza, A. Ross, H. Ammar","doi":"10.1109/BCC.2006.4341636","DOIUrl":"https://doi.org/10.1109/BCC.2006.4341636","url":null,"abstract":"Automating the postmortem identification of deceased individuals based on dental characteristics is receiving increased attention especially with the large number of victims encountered in mass disasters. An automated dental identification system compares the teeth present in multiple digitized dental records in order to access their similarity. The primary step in such a system is the estimation of the contour of each tooth in order to permit efficient feature extraction. Extracting the contour of the teeth is a very challenging task and has received inadequate attention in the literature. In this paper, the task of teeth contour extraction is accomplished using active contour without edges. This technique is based on the intensity of the overall region of the tooth image and, therefore, does not necessitate the presence of a sharp boundary between teeth. Further, this technique can extract the region contour in the presence of additive noise and in the absence of well-defined image gradients. Experimental results indicate the benefits of the proposed approach.","PeriodicalId":226152,"journal":{"name":"2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129792531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信