International Conference on Biometrics Engineering and Application最新文献

筛选
英文 中文
Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods 基于纹理的打印和隐形眼镜虹膜呈现攻击检测方法的经验评价
International Conference on Biometrics Engineering and Application Pub Date : 2019-05-29 DOI: 10.1145/3345336.3345341
Hareesh Mandalapu, Raghavendra Ramachandra, C. Busch
{"title":"Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods","authors":"Hareesh Mandalapu, Raghavendra Ramachandra, C. Busch","doi":"10.1145/3345336.3345341","DOIUrl":"https://doi.org/10.1145/3345336.3345341","url":null,"abstract":"Iris-based identification methods have been popularly used in real-world applications due to the unique characteristics of iris when compared to other biometric characteristics like face and fingerprint. As technological advances and low-cost artefacts are becoming more available, vulnerabilities to iris biometrics due to presentation attacks (PAs) are becoming a challenging problem. Presentation attack detection (PAD) algorithms have been employed in biometric capture devices and it has been an active research topic in the past years. In this study, a detailed survey and evaluation of state-of-the-art texture-based iris PAD methods are performed. Five different PAD methods are tested on four different datasets consisting of print and contact lens presentation attacks. Extensive experiments are performed on four different scenarios of presentation attack and results are presented. The properties of PAD algorithms like the quality of the database, the generalization abilities are mainly discussed in this work. It has been observed that fusion-based PAD methods perform better than other methods.","PeriodicalId":262849,"journal":{"name":"International Conference on Biometrics Engineering and Application","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116198911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning 使用击键动力学和机器学习进行身份验证的用户行为生物识别
International Conference on Biometrics Engineering and Application Pub Date : 2018-05-16 DOI: 10.1145/3230820.3230829
Sowndarya Krishnamoorthy, L. Rueda, Sherif Saad, H. Elmiligi
{"title":"Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning","authors":"Sowndarya Krishnamoorthy, L. Rueda, Sherif Saad, H. Elmiligi","doi":"10.1145/3230820.3230829","DOIUrl":"https://doi.org/10.1145/3230820.3230829","url":null,"abstract":"This paper focuses on the effective classification of the behavior of users accessing computing devices to authenticate them. The authentication is based on keystroke dynamics which captures the user's behavioral biometric and applies machine learning concepts to classify them. The users type a strong passcode \".tie5Roanl\" to record their typing pattern. In order to confirm identity anonymous data from 94 users were collected to carry out the research. Given the raw data, features were extracted from the attributes based on the button pressed and action timestamp events. The Support Vector Machine (SVM) classifier uses multi-class classification with one vs. one decision shape function to classify different users. To reduce the classification error, it is essential to identify the important features from the raw data. In an effort to confront the generation of features from attributes an efficient feature extraction algorithm has been developed, obtaining high classification performance are now being sought.\u0000 In this paper, we have applied minimum redundancy maximum relevance mRMR feature selection to increase the classification performance metrics and to confirm the identity of the users based on the way they access computing devices. From the results, we conclude that touch pressure, touch size and coordinates effectively contribute to identifying each user. The research will contribute significantly to the field of cyber-security by forming a robust au thentication system using machine learning algorithms.","PeriodicalId":262849,"journal":{"name":"International Conference on Biometrics Engineering and Application","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116585224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Learning LogDet Divergence for Ear Recognition 学习LogDet散度用于耳朵识别
International Conference on Biometrics Engineering and Application Pub Date : 2018-05-16 DOI: 10.1145/3230820.3230832
Ibrahim Omara, Ahmed M. Hagag, W. Zuo
{"title":"Learning LogDet Divergence for Ear Recognition","authors":"Ibrahim Omara, Ahmed M. Hagag, W. Zuo","doi":"10.1145/3230820.3230832","DOIUrl":"https://doi.org/10.1145/3230820.3230832","url":null,"abstract":"Ear-print has become one of the most important types of vital biometric in recent years; ear-print is using in different applications; especially in forensic science. In this paper, we present a novel approach for ear recognition based on fusion local descriptors for feature extraction, and LogDot divergence for classification. In details, binarized statistical image feature (BSIF) and patterns of oriented edge magnitude (POEM) are used to represent ear image. Then, discriminative correlation analysis (DCA) algorithm is exploited for fusion those features and reduction dimension. Finally, LogDot divergence based metric learning is adopted to recognize the ear images by learning a Mahalanobis matrix for approximate nearest neighbor (ANN) approach. The experimental results ar performed on four available datasets; IIT Delhi I, II and USTB I, II datasets. The proposed approach superior performance over the state-of-the-art approaches and can achieve promising recognition rates around 98.4%, 98.7%, 100% and 97.4% for IIT Delhi I, II, and USTB I, II, respectively.","PeriodicalId":262849,"journal":{"name":"International Conference on Biometrics Engineering and Application","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123331990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Effects of JPEG2000 on Ear Recognition System JPEG2000对人耳识别系统的影响
International Conference on Biometrics Engineering and Application Pub Date : 2018-05-16 DOI: 10.1145/3230820.3230831
Doaa Khalaf, Ibrahim Omara, Ahmed M. Hagag, Shaohui Liu
{"title":"The Effects of JPEG2000 on Ear Recognition System","authors":"Doaa Khalaf, Ibrahim Omara, Ahmed M. Hagag, Shaohui Liu","doi":"10.1145/3230820.3230831","DOIUrl":"https://doi.org/10.1145/3230820.3230831","url":null,"abstract":"Recently, JPEG2000 standard has played a vital role on biometric applications such as face and finger-print biometrics. Ear biometric system is observed as one of the efficient biometric trait. The ear is large and passive trait, making ear image acquisition more easily from a distance and can use in surveillance applications. Therefore, we study the impact of JPEG2000 on ear recognition performance which the ear image may transfer over low quality wireless channels. Local descriptors like POEM, LPQ, LBP, and BSIF are used to represent and extract ear image features. Then, JPEG2000 is exploited to compress the image of ear. Finally, support vector machine is adopted for ear recognition at various compression rates. To evaluate our study, the experimental results are conducted on two public ear databases; USTB and IIT Delhi databases. The results show the superior of LPQ descriptors till compression rate 0.4 bpp.","PeriodicalId":262849,"journal":{"name":"International Conference on Biometrics Engineering and Application","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115827427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iris Recognition Using Visible Images Based on the Fusion of Daugman's Approach and Hough Transform 基于Daugman方法和Hough变换的虹膜识别
International Conference on Biometrics Engineering and Application Pub Date : 2018-05-16 DOI: 10.1145/3230820.3230825
R Gnana Praveen, Viswanath M. Ravi, Kumaar M. Sriraam
{"title":"Iris Recognition Using Visible Images Based on the Fusion of Daugman's Approach and Hough Transform","authors":"R Gnana Praveen, Viswanath M. Ravi, Kumaar M. Sriraam","doi":"10.1145/3230820.3230825","DOIUrl":"https://doi.org/10.1145/3230820.3230825","url":null,"abstract":"In the paper, we proposed a novel architecture for Iris Recognition. Contrary to the conventional approaches, where iris is obtained using NIR images, iris recognition is performed using visible images. In the proposed methodology, iris localization is achieved using a mask generated using Hue and saturation channels. Then the localized iris region is converted to binary mask using a threshold. After the binary mask is generated, the inner circle of the iris is obtained using the fusion of a contour-based approach and Hough transform. Once the inner circle of the iris is computed, the outer circle of the iris is estimated using Daugman's approach. After the inner and outer circles of the iris are segmented normalization is achieved by converting the polar coordinates to Cartesian coordinates and features are extracted. In the proposed architecture, we have done a comparative analysis using LBPH features and Zernike features and two classifiers, random forest and Support Vector Machines. During the recognition module, the feature is extracted from the test image and compared against the existing database.","PeriodicalId":262849,"journal":{"name":"International Conference on Biometrics Engineering and Application","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116916871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Score Fusion Strategies in Single-Iris Dual-Probe Recognition Systems 单虹膜双探针识别系统中的分数融合策略
International Conference on Biometrics Engineering and Application Pub Date : 2018-05-16 DOI: 10.1145/3230820.3230823
P. Drozdowski, N. Wiegand, C. Rathgeb, C. Busch
{"title":"Score Fusion Strategies in Single-Iris Dual-Probe Recognition Systems","authors":"P. Drozdowski, N. Wiegand, C. Rathgeb, C. Busch","doi":"10.1145/3230820.3230823","DOIUrl":"https://doi.org/10.1145/3230820.3230823","url":null,"abstract":"Multiple samples can be utilised at the comparison stage of a biometric system in order to increase its biometric performance via information fusion or decision heuristics. It has been shown, that in a single-instance dual-probe setup, fusing the probe scores yields significant biometric performance increase over the single-probe baseline. Additionally, using the probe-probe comparison score was demonstrated to further improve the biometric performance of a fingerprint recognition system in a study by Cheng et al. In this paper, through a benchmark on the CASIA-IrisV4-Interval dataset and on the iris corpus of the BioSecure dataset, the aforementioned method is shown to be viable for an iris recognition system. However, since it requires an additional parameter, which must be estimated empirically, we propose a simpler method which exhibits similar biometric performance, while requiring no additional parametrisation.","PeriodicalId":262849,"journal":{"name":"International Conference on Biometrics Engineering and Application","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123701662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Morph Deterction from Single Face Image: a Multi-Algorithm Fusion Approach 单幅人脸图像的形态检测:一种多算法融合方法
International Conference on Biometrics Engineering and Application Pub Date : 2018-05-16 DOI: 10.1145/3230820.3230822
U. Scherhag, C. Rathgeb, C. Busch
{"title":"Morph Deterction from Single Face Image: a Multi-Algorithm Fusion Approach","authors":"U. Scherhag, C. Rathgeb, C. Busch","doi":"10.1145/3230820.3230822","DOIUrl":"https://doi.org/10.1145/3230820.3230822","url":null,"abstract":"The vulnerability of face, fingerprint and iris recognition systems to attacks based on morphed biometric samples has been established in the recent past. However, so far a reliable detection of morphed biometric samples has remained an unsolved research challenge. In this work, we propose the first multi-algorithm fusion approach to detect morphed facial images. The FRGCv2 face database is used to create a set of 4,808 morphed and 2,210 bona fide face images which are divided into a training and test set. From a single cropped facial image features are extracted using four types of complementary feature extraction algorithms, including texture descriptors, keypoint extractors, gradient estimators and a deep learning-based method. By performing a score-level fusion of comparison scores obtained by four different types of feature extractors, a detection equal error rate (D-EER) of 2.8% is achieved. Compared to the best single algorithm approach achieving a D-EER of 5.5%, the D-EER of the proposed multi-algorithm fusion system is al- most twice as low, confirming the soundness of the presented approach.","PeriodicalId":262849,"journal":{"name":"International Conference on Biometrics Engineering and Application","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127083995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Iris Template Protection using Discrete Logarithm 使用离散对数的虹膜模板保护
International Conference on Biometrics Engineering and Application Pub Date : 2018-05-16 DOI: 10.1145/3230820.3230828
Mahesh Kumar Morampudi, M. Prasad, U. S. N. Raju
{"title":"Iris Template Protection using Discrete Logarithm","authors":"Mahesh Kumar Morampudi, M. Prasad, U. S. N. Raju","doi":"10.1145/3230820.3230828","DOIUrl":"https://doi.org/10.1145/3230820.3230828","url":null,"abstract":"Biometric authentication systems gained a huge public attention when compared to password authentication systems due to its direct connection with user identity. As Biometrics cannot be revoked or cancelled, several security and privacy issues will come if biometric templates are directly store into the database. To overcome this, there is a need to protect the biometric templates by applying transformations and at the same time accuracy won't be compromised. The transformed template is called cancellable template and it must satisfies all the requirements of Biometric Template Protection Schemes (BTPS) i.e., Diversity, unlinkability, accuracy, noninvertibility. The proposed method focused on generating cancellable iris templates by using discrete logarithm. By applying 1-D log Gabor filter on the iris images, iris codes were generated. Later a row vector is formed by appending next row to the previous one. Then the row vector is partitioned and converted into decimal vector. To achieve security or noninvertibility decimal vector is subjected to discrete logarithm over a prime field. To confirm the accuracy of the proposed approach, experiments are performed on CASIA-V 1.0 & CASIA-V3-Interval and achieved EER as 0.57% & 0.79%. Although the EER seems somewhat high, proposed approach is efficient in terms of security and noninvertible perspectives.","PeriodicalId":262849,"journal":{"name":"International Conference on Biometrics Engineering and Application","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117098546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fingerprint Authentication Using LT Codes 使用LT码进行指纹认证
International Conference on Biometrics Engineering and Application Pub Date : 2018-05-16 DOI: 10.1145/3230820.3230827
Parth Pahariya, S. Singh
{"title":"Fingerprint Authentication Using LT Codes","authors":"Parth Pahariya, S. Singh","doi":"10.1145/3230820.3230827","DOIUrl":"https://doi.org/10.1145/3230820.3230827","url":null,"abstract":"Biometric is used for identifying the person based on their traits. Fingerprint is one of the most important and most used biometric trait for person authentication. Fingerprint database must be stored in efficient way and in most secure way so that it is unable to hack by the hacker and it will be able to recognize the person fast in large database. In this paper, we proposed an efficient way of storing the fingerprint data for fast recognition. We are using LT codes for storing the x coordinates of minutiae points and fingerprint images is stored in encrypted form with the coordinates. We are using on-the-y gaussian algorithm for decoding the x coordinates and calculate the value for finding similarity in between two fingerprints.","PeriodicalId":262849,"journal":{"name":"International Conference on Biometrics Engineering and Application","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131715858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Studying WiFi and Accelerometer Data Based Authentication Method on Mobile Phones 基于WiFi和加速度计数据的手机认证方法研究
International Conference on Biometrics Engineering and Application Pub Date : 2018-05-16 DOI: 10.1145/3230820.3230824
Guoqiang Li, Patrick A. H. Bours
{"title":"Studying WiFi and Accelerometer Data Based Authentication Method on Mobile Phones","authors":"Guoqiang Li, Patrick A. H. Bours","doi":"10.1145/3230820.3230824","DOIUrl":"https://doi.org/10.1145/3230820.3230824","url":null,"abstract":"Accessing applications on mobile phones has become a habit of our daily activities. These applications either require a PIN (Personal Identification Number) / password for authentication or donot have any authentication measurement at all because of the priority from user friendliness. In order to enhance the security of these mobile applications while not much compromising the user friendliness, we develop an approach to authenticate the user by using WiFi and accelerometer data collected within 3 seconds when the user opens a mobile application. The proposed approach has been evaluated on a dataset collected from a real-life scenario in which the data was collected from the participants' own mobile phones, and the participants have the full right to decide where/when to open the application. According to the experimental results, the proposed score-level fusion approach achieved EER (Equal Error Rate) at 9.19%, which indicates the feasibility of deploying such authentication mechanism on the mobile application.","PeriodicalId":262849,"journal":{"name":"International Conference on Biometrics Engineering and Application","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123258040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信