2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)最新文献

筛选
英文 中文
ISBA 2019 Sponsors Page ISBA 2019赞助商页面
{"title":"ISBA 2019 Sponsors Page","authors":"","doi":"10.1109/isba.2019.8778478","DOIUrl":"https://doi.org/10.1109/isba.2019.8778478","url":null,"abstract":"","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127641726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Online Signature Verification Based on Feature Fusion and Interval Valued Representation of Writer Specific Features
C. Vorugunti, D. S. Guru, Viswanath Pulabaigari
{"title":"An Efficient Online Signature Verification Based on Feature Fusion and Interval Valued Representation of Writer Specific Features","authors":"C. Vorugunti, D. S. Guru, Viswanath Pulabaigari","doi":"10.1109/ISBA.2019.8778566","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778566","url":null,"abstract":"Online Signature Verification (OSV) is a pattern recognition problem, which involves analysis of discrete-time signals of signature samples to classify them as genuine or forgery. One of the core difficulties in designing online signature verification (OSV) system is the inherent intra-writer variability in genuine handwritten signatures, combined with the likelihood of close resemblances and dissimilarities of skilled forgeries with the genuine signatures. To address this issue, in this manuscript, we emphasize the concept of writer dependent parameter fixation (i.e. features, decision threshold and feature dimension) using interval valued representation grounded on feature fusion. For an individual writer, a subset of discriminative features is selected from the original set of features using feature clustering techniques. This is at variance with the writer independent models in which common features are used for all the writers. To practically exhibit the efficiency of the proposed model, thorough experiments are carried out on benchmarking online signature datasets MCYT-100 (DB1), MCYT-330 (DB2) consist of signatures of 100, 330 individuals respectively. Experimental result confirms the efficiency of writer specific parameters for online signature verification. The EER value, the model computes, is lower compared to various latest signature verification models.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125928020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
User Behavior Profiling using Ensemble Approach for Insider Threat Detection 基于集成方法的内部威胁检测用户行为分析
Malvika Singh, B. Mehtre, S. Sangeetha
{"title":"User Behavior Profiling using Ensemble Approach for Insider Threat Detection","authors":"Malvika Singh, B. Mehtre, S. Sangeetha","doi":"10.1109/ISBA.2019.8778466","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778466","url":null,"abstract":"The greatest threat towards securing the organization and its assets are no longer the attackers attacking beyond the network walls of the organization but the insiders present within the organization with malicious intent. Existing approaches helps to monitor, detect and prevent any malicious activities within an organization’s network while ignoring the human behavior impact on security. In this paper we have focused on user behavior profiling approach to monitor and analyze user behavior action sequence to detect insider threats. We present an ensemble hybrid machine learning approach using Multi State Long Short Term Memory (MSLSTM) and Convolution Neural Networks (CNN) based time series anomaly detection to detect the additive outliers in the behavior patterns based on their spatial-temporal behavior features. We find that using Multistate LSTM is better than basic single state LSTM. The proposed method with Multistate LSTM can successfully detect the insider threats providing the AUC of 0.9042 on train data and AUC of 0.9047 on test data when trained with publically available dataset for insider threats.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Utilization of HOG-SVD based Features with Connected Component Labeling for Multiple Copy-move Image Forgery Detection 基于HOG-SVD特征的连通分量标记在多重复制-移动图像伪造检测中的应用
Anuja Dixit, Soumen Bag
{"title":"Utilization of HOG-SVD based Features with Connected Component Labeling for Multiple Copy-move Image Forgery Detection","authors":"Anuja Dixit, Soumen Bag","doi":"10.1109/ISBA.2019.8778494","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778494","url":null,"abstract":"Copy-move forgery is one of the most regarded image forgery technique to tamper information conveyed by the image. In this technique, segment of original image is replicated and pasted across the same image to produce forged image. This technique is capable to hide selective information or to add fictitious details in image. Detection of this form of forgery is one of the significant area of information security. In this paper, we propose block-based approach for copy-move image forgery detection to secure information conveyed through the image by identifying the forged images and to prevent spreading of tampered subject matter. Proposed model divides suspicious image in overlapping blocks. We extracted block features using Histogram of Oriented Gradients (HOG) and Singular Value Decomposition (SVD). Lexicographical sorting is performed over feature matrix followed by Euclidean distance computation to recognize similar feature vectors. To remove false match detection, Connected component labeling is utilized. Our scheme achieves highest F-measure than former techniques, when forged image sustain plain multiple copy-move, multiple copy-move with contrast adjustment, color reduction, and image blurring attacks.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Biometric based User Authentication Protocol for Mobile Cloud Environment 移动云环境下基于生物特征的用户认证协议
M. Vivekanandan, V. N. Sastry, U. S. Reddy
{"title":"Biometric based User Authentication Protocol for Mobile Cloud Environment","authors":"M. Vivekanandan, V. N. Sastry, U. S. Reddy","doi":"10.1109/ISBA.2019.8778529","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778529","url":null,"abstract":"Mobile user authentication is a challenging task in the mobile cloud computing (MCC). In 2015, Tsai and Lo’s developed authentication protocol in distributed MCC. Which is vulnerable to the biometric misuse, incorrect login credentials (password and fingerprint) and attacks for service provider impersonation. It has no provision for smart-card revocation and lacks mutual authentication. To address this-mentioned issues, we propose a novel Biometric based User Authentication Protocol for MCC. The proposed protocol supports session key agreement of participants and flawless mutual authentication. Our protocol is verified using Burrows-Abadi-Needham (BAN) logic. It further withstands all known attacks and performs well with respect to computational cost.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130544260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Super-Resolution and Image Re-projection for Iris Recognition 虹膜识别的超分辨率和图像重投影
E. Ribeiro, A. Uhl, F. Alonso-Fernandez
{"title":"Super-Resolution and Image Re-projection for Iris Recognition","authors":"E. Ribeiro, A. Uhl, F. Alonso-Fernandez","doi":"10.1109/ISBA.2019.8778581","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778581","url":null,"abstract":"Several recent works have addressed the ability of deep learning to disclose rich, hierarchical and discriminative models for the most diverse purposes. Specifically in the super-resolution field, Convolutional Neural Networks (CNNs) using different deep learning approaches attempt to recover realistic texture and fine grained details from low resolution images. In this work we explore the viability of these approaches for iris Super-Resolution (SR) in an iris recognition environment. For this, we test different architectures with and without a so called image re-projection to reduce artifacts applying it to different iris databases to verify the viability of the different CNNs for iris super-resolution. Results show that CNNs and image re-projection can improve the results specially for the accuracy of recognition systems using a complete different training database performing the transfer learning successfully.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114614472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Forensic Performance on Handwriting to Identify Forgery Owing to Word Alteration 文字篡改笔迹鉴定的法医学性能研究
Priyanka Roy, Soumen Bag
{"title":"Forensic Performance on Handwriting to Identify Forgery Owing to Word Alteration","authors":"Priyanka Roy, Soumen Bag","doi":"10.1109/ISBA.2019.8778490","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778490","url":null,"abstract":"Forgery activity in legal handwritten documents is an identifiable problem. Falsification of document due to minute alteration of existings not only causes immense financial loss to a person or to any organization but also lessens the economic growth of a country. Here, we introduce and present a solution to detect forgery in handwritten documents by analyzing perceptually similar ink of different pens. The research is all about forensic investigation of handwritten word alteration which is performed by adding extra letter in a way such that the whole meaning of the word changes. The problem is formulated as binary classification problem. If words of the corresponding document are written by same pen, these are classified as positive class and words of a document accompanied with little inclusion of letters as a forgery attack, are classified as negative class. The article proposes Multilayer Perceptron classifier which has been adopted to classify data instances that have been computed by extracting Y CbCr color-based statistical features. This proposal has been tested on data set which has been generated by 10 blue and 10 black ball point pens. The respective obtained average accuracy is 83.71% and 78. 18% for blue pen data and black pen data.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116036581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards Reducing the Error Rates in Template Protection for Iris Recognition Using Custom Cuckoo Filters 利用自定义杜鹃滤波器降低虹膜识别模板保护的错误率
K. Raja, Ramachandra Raghavendra, C. Busch
{"title":"Towards Reducing the Error Rates in Template Protection for Iris Recognition Using Custom Cuckoo Filters","authors":"K. Raja, Ramachandra Raghavendra, C. Busch","doi":"10.1109/ISBA.2019.8778470","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778470","url":null,"abstract":"The need to protect biometric data within iris systems has resulted in a number of template protection schemes. A primary issue with current template protection schemes for iris recognition is the unavoidable biometric error rates, i.e., for any given False Non-Match Rate (FNMR) there is a high False Match Rate (FMR), especially at lower values of FNMR. In this work, we primarily focus on addressing this problem using a new approach with Cuckoo Filtering simultaneously using both stable bits and discriminative bits to derive a stronger template protection scheme. The proposed template protection scheme performs in a robust manner for various configurations as compared to earlier template protection schemes that need empirical fine-tuning. With the set of experiments on a publicly available iris dataset, we benchmark our results against the state-of-art template protection scheme based on Bloom-Filters. Specifically, we demonstrate the gain in performance and robustness of proposed approach at lower FNMR and invariance of performance to configurations of template protection scheme. With a specific configuration of proposed approach, we achieve Genuine Match Rate (GMR) = 100% at FMR = 0:01% and EER = 0% in the best case and GMR = 98:44% at FMR = 0:01% and EER = 0:33% in the worst case on IITD Iris database.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128728016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
FDSNet: Finger dorsal image spoof detection network using light field camera FDSNet:使用光场相机的手指背图像欺骗检测网络
Avantika Singh, Gaurav Jaswal, A. Nigam
{"title":"FDSNet: Finger dorsal image spoof detection network using light field camera","authors":"Avantika Singh, Gaurav Jaswal, A. Nigam","doi":"10.1109/ISBA.2019.8778453","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778453","url":null,"abstract":"At present spoofing attacks via which biometric system is potentially vulnerable against a fake biometric characteristic, introduces a great challenge to recognition performance. Despite the availability of a broad range of presentation attack detection (PAD) or liveness detection algorithms, fingerprint sensors are vulnerable to spoofing via fake fingers. In such situations, finger dorsal images can be thought of as an alternative which can be captured without much user cooperation and are more appropriate for outdoor security applications. In this paper, we present a first feasibility study of spoofing attack scenarios on finger dorsal authentication system, which include four types of presentation attacks such as printed paper, wrapped printed paper, scan and mobile. This study also presents a CNN based spoofing attack detection method which employ state-of-the-art deep learning techniques along with transfer learning mechanism. We have collected 196 finger dorsal real images from 33 subjects, captured with a Lytro camera and also created a set of 784 finger dorsal spoofing images. Extensive experimental results have been performed that demonstrates the superiority of the proposed approach for various spoofing attacks.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124086575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PVSNet: Palm Vein Authentication Siamese Network Trained using Triplet Loss and Adaptive Hard Mining by Learning Enforced Domain Specific Features PVSNet:通过学习强制领域特定特征,使用三重损失和自适应硬挖掘训练的手掌静脉认证连体网络
Daksh Thapar, Gaurav Jaswal, A. Nigam, Vivek Kanhangad
{"title":"PVSNet: Palm Vein Authentication Siamese Network Trained using Triplet Loss and Adaptive Hard Mining by Learning Enforced Domain Specific Features","authors":"Daksh Thapar, Gaurav Jaswal, A. Nigam, Vivek Kanhangad","doi":"10.1109/ISBA.2019.8778623","DOIUrl":"https://doi.org/10.1109/ISBA.2019.8778623","url":null,"abstract":"Designing an end-to-end deep learning network to match the biometric features with limited training samples is an extremely challenging task. To address this problem, we propose a new way to design an end-to-end deep CNN framework i.e., PVSNet that works in two major steps: first, an encoder-decoder network is used to learn generative domain-specific features followed by a Siamese network in which convolutional layers are pre-trained in an unsupervised fashion as an autoencoder. The proposed model is trained via triplet loss function that is adjusted for learning feature embeddings in a way that minimizes the distance between embedding-pairs from the same subject and maximizes the distance with those from different subjects, with a margin. In particular, a triplet Siamese matching network using an adaptive margin based hard negative mining has been suggested. The hyper-parameters associated with the training strategy, like the adaptive margin, have been tuned to make the learning more effective on biometric datasets. In extensive experimentation, the proposed network outperforms most of the existing deep learning solutions on three type of typical vein datasets which clearly demonstrates the effectiveness of our proposed method.","PeriodicalId":270033,"journal":{"name":"2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114748164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信