{"title":"Calculating a boundary for the significance from the equal-error rate","authors":"H. Hofbauer, A. Uhl","doi":"10.1109/ICB.2016.7550053","DOIUrl":"https://doi.org/10.1109/ICB.2016.7550053","url":null,"abstract":"Given a common dataset, two methods operating on that dataset and reported equal-error rate (EER) for each method, then we can estimate whether the two methods differ significantly at the threshold leading to the EER. This enables the calculation of a boundary on the significance for methods where the significance was not reported in the original paper or to compare new methods to older ones by evaluating them on the same dataset.","PeriodicalId":308715,"journal":{"name":"2016 International Conference on Biometrics (ICB)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127090363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Meandering energy potential to locate singular point of fingerprint","authors":"Kamlesh Tiwari, Phalguni Gupta","doi":"10.1109/ICB.2016.7550086","DOIUrl":"https://doi.org/10.1109/ICB.2016.7550086","url":null,"abstract":"Singular point is the location of high curvature area of a fingerprint. It represents the global characteristic and is quite useful for fingerprint classification and matching. Despite being a very important feature, the localization of the singular point is still not perfect. This paper proposes a novel algorithm to locate prominent singular points from a fingerprint image by devising the concept of meandering energy potential (MEP). One of the advantages of the proposed algorithm is that it does not require any prior knowledge on the fingerprint structure. Experimental results have been obtained on a widely used publicly available fingerprint database FVC2002. The proposed algorithm has significantly high accuracy as compared to any other state-of-the-art methods in the literature.","PeriodicalId":308715,"journal":{"name":"2016 International Conference on Biometrics (ICB)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129959856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kuikui Wang, Lu Yang, Kun Su, Gongping Yang, Yilong Yin
{"title":"Binary search path of vocabulary tree based finger vein image retrieval","authors":"Kuikui Wang, Lu Yang, Kun Su, Gongping Yang, Yilong Yin","doi":"10.1109/ICB.2016.7550056","DOIUrl":"https://doi.org/10.1109/ICB.2016.7550056","url":null,"abstract":"Many related studies have reported promising results in finger vein recognition, but it is still challenging to perform robust image retrieval, especially in the application scenarios with large scale populations. With the purpose in consideration, this paper presents a binary search path of hierarchical vocabulary tree based finger vein image retrieval method. In detail, a vocabulary tree is built based on the local finger vein textons by the hierarchical k-means method. Each image patch is represented by the binary path in the search of its most similar leaf node, and the value of each bit in the path is labeled as 1 or 0 according to whether the corresponding node is passed or skipped in search. The similarity of two images is defined as the number of overlapped bits in all involved path pairs. And, the enrolled images with top t scores in the sorted score vector will be selected as candidates to narrow the search space. Experimental results on five finger vein databases confirm that the proposed method can improve the retrieval performance on both accuracy and efficiency.","PeriodicalId":308715,"journal":{"name":"2016 International Conference on Biometrics (ICB)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129521288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fine-grained LFW database","authors":"Nanhai Zhang, Weihong Deng","doi":"10.1109/ICB.2016.7550057","DOIUrl":"https://doi.org/10.1109/ICB.2016.7550057","url":null,"abstract":"Current deep learning methods have achieved human-level performance on Labeled Faces in the Wild (LFW) database, but we think it is because that the limited number of pairs on LFW do not capture the real difficulty of large-scale unconstrained face verification problem. Besides the intra-class variations like pose, illumination, occlusion and expression, highly visually similarity of different persons' faces is an another challenge. It is unavoidable in large dataset and many researchers ignore it. Therefore, in this paper, we firstly select some visually similar pairs in LFW database by combining the deep learning method and human annotation results. Preserving the matched pairs and replacing the mismatched pairs of LFW with the selected similar pairs, we obtain the Fine-grained LFW (FGLFW) database which can better reflect the real difficulty of face verification. Experimental results show that methods achieving not bad performance on LFW drops more than 11% even 25% on FGLFW. It reflects that visually similar pairs are difficult to current methods and our FGLFW database is a quite challenging database. Researchers still have a long way to go for solving face verification problem on such a database.","PeriodicalId":308715,"journal":{"name":"2016 International Conference on Biometrics (ICB)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124335958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qingyong Xu, Soham Ghosh, Xingpeng Xu, Yi Huang, A. Kong
{"title":"Tattoo detection based on CNN and remarks on the NIST database","authors":"Qingyong Xu, Soham Ghosh, Xingpeng Xu, Yi Huang, A. Kong","doi":"10.1109/ICB.2016.7550050","DOIUrl":"https://doi.org/10.1109/ICB.2016.7550050","url":null,"abstract":"Detecting tattoo images stored in information technology (IT) devices of suspects is an important but challenging task for law enforcement agencies. Recently, the U.S. National Institute of Standards and Technology (NIST) held a challenge and released a tattoo database for the commercial and academic community in advancing research and development into automated image-based tattoo recognition technology. The best tattoo detection result in the NIST challenge was achieved by MorphoTrak with accuracy of 96.3%. This paper aims to answer three questions. 1) Is the NIST database suitable for training algorithms to detect tattoo images stored in IT devices of suspects? 2) Can convolutional neural networks (CNNs) outperform the MorphoTrak's algorithm? 3) How do training databases impact on tattoo detection performance? The NIST tattoo detection database containing 2,349 images and a database containing 10,000 collected from Flickr are utilized to answer these questions. The Flickr images taken in diverse environments and poses are used to simulate images stored in the IT devices. A CNN is trained on the NIST and Flickr images for this study. The experimental results demonstrate that the CNN outperforms the MorphoTrak's algorithm by 2.5%, achieving accuracy of 98.8% on the NIST database. When the CNN is trained on the NIST database to detect Flickr images, the accuracy drops to 65.8%. It implies that the NIST database is not an ideal database for training algorithms to detect tattoo images in IT devices of suspects. However, when the training database size increases, the detection performance improves.","PeriodicalId":308715,"journal":{"name":"2016 International Conference on Biometrics (ICB)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115564667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kohei Shiraga, Yasushi Makihara, D. Muramatsu, T. Echigo, Y. Yagi
{"title":"GEINet: View-invariant gait recognition using a convolutional neural network","authors":"Kohei Shiraga, Yasushi Makihara, D. Muramatsu, T. Echigo, Y. Yagi","doi":"10.1109/ICB.2016.7550060","DOIUrl":"https://doi.org/10.1109/ICB.2016.7550060","url":null,"abstract":"This paper proposes a method of gait recognition using a convolutional neural network (CNN). Inspired by the great successes of CNNs in image recognition tasks, we feed in the most prevalent image-based gait representation, that is, the gait energy image (GEI), as an input to a CNN designed for gait recognition called GEINet. More specifically, GEINet is composed of two sequential triplets of convolution, pooling, and normalization layers, and two subsequent fully connected layers, which output a set of similarities to individual training subjects. We conducted experiments to demonstrate the effectiveness of the proposed method in terms of cross-view gait recognition in both cooperative and uncooperative settings using the OU-ISIR large population dataset. As a result, we confirmed that the proposed method significantly outperformed state-of-the-art approaches, in particular in verification scenarios.","PeriodicalId":308715,"journal":{"name":"2016 International Conference on Biometrics (ICB)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126827544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable face anti-spoofing using multispectral SWIR imaging","authors":"Holger Steiner, A. Kolb, Norbert Jung","doi":"10.1109/ICB.2016.7550052","DOIUrl":"https://doi.org/10.1109/ICB.2016.7550052","url":null,"abstract":"Recent studies point out that spoofing attacks using facial masks still are a severe problem for current biometric face recognition (FR) systems. As such systems are becoming more frequently used, for example, for automated border crossing or access control to critical infrastructure, advanced anti-spoofing techniques are necessary to counter these attacks. This work presents a novel, cross-modal approach that enhances existing solutions for face verification and uses multispectral short wave infrared (SWIR) imaging to ensure the authenticity of a face even in the presence of partial disguises and masks. It is evaluated on a dataset containing 137 subjects and a variety of spoofing attacks. Using a commercial FR system, it successfully rejects all attempts to counterfeit a foreign face with a false acceptance rate FARcf = 0% and most attempts to disguise the own identity with FARdg = 1% at a false rejection rate of FRR <; 5% using SWIR images for verification.","PeriodicalId":308715,"journal":{"name":"2016 International Conference on Biometrics (ICB)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114601399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mathur, Ankit Vjay, Jidnya Shah, Shreyasi Das, Adil Malla
{"title":"Methodology for partial fingerprint enrollment and authentication on mobile devices","authors":"S. Mathur, Ankit Vjay, Jidnya Shah, Shreyasi Das, Adil Malla","doi":"10.1109/ICB.2016.7550093","DOIUrl":"https://doi.org/10.1109/ICB.2016.7550093","url":null,"abstract":"The reduced platen area of fingerprint sensors in mobile devices results in acquisition of partial fingerprints. Existing fingerprint enrollment schemes for small area sensors are tedious and have an uncertainty of complete finger coverage during scanning. We propose a novel enrollment protocol for small area rectangular sensors that maximizes finger coverage within few scans. Also, due to presence of insufficient minutiae, accuracy of minutiae-based fingerprint matching algorithms degrades significantly when applied for partial-to-partial fingerprint matching. Instead, we propose a matching algorithm that utilizes multi-scale texture descriptors, namely, Accelerated KAZE (A-KAZE). Experiments on FVC 2000, 2002 and in-house databases indicate that A-KAZE gives promising accuracy. On a Samsung Galaxy Note II N7100 (Quad-core 1.6 GHz, 2GB RAM), average time taken for template generation and 1×1 matching of fingerprint of size 237×117 pixels is 86 ms and 19 ms respectively.","PeriodicalId":308715,"journal":{"name":"2016 International Conference on Biometrics (ICB)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115922530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abhijit Das, U. Pal, M. A. Ferrer-Ballester, M. Blumenstein
{"title":"SSRBC 2016: Sclera Segmentation and Recognition Benchmarking Competition","authors":"Abhijit Das, U. Pal, M. A. Ferrer-Ballester, M. Blumenstein","doi":"10.1109/ICB.2016.7550069","DOIUrl":"https://doi.org/10.1109/ICB.2016.7550069","url":null,"abstract":"This article reports and summarizes the results of a competition on sclera segmentation and recognition benchmarking, called Sclera Segmentation and Recognition Benchmarking Competition 2016 (SSRBC 2016). It was organized in the context of the 9th IAPR International Conference on Biometrics (ICB 2016). The goal of this competition was to record the recent developments in sclera segmentation and recognition, and also to gain the attention of researchers on this subject of biometrics. In this regard, we have used a multi-angle sclera dataset (MASD version 1). It is comprised of 2624 images taken from both the eyes of 82 identities. Therefore, it consists of images of 164 (82*2) different eyes. We have prepared a manual segmentation mask of these images to create the baseline for both tasks. We have, furthermore, adopted precision and recall based statistical measures to evaluate the effectiveness of the segmentation and the ranks of the competing algorithms. The recognition accuracy measure has been employed to measure the recognition task. To summarize, twelve participants registered for the competition, and among them, three participants submitted their algorithms/ systems for the segmentation task and two their recognition algorithm. The results produced by these algorithms reflect developments in the literature of sclera segmentation and recognition, employing cutting edge segmentation techniques. Along with the algorithms of three competing teams and their results, the MASD version 1 dataset will also be freely available for research purposes from the organizer's website. The competition also demonstrates the recent interests of researchers from academia as well as industry on this subject of biometrics.","PeriodicalId":308715,"journal":{"name":"2016 International Conference on Biometrics (ICB)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116974374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yapeng Ye, Liao Ni, He Zheng, Shilei Liu, Yi Zhu, Deng Zhang, Weilai Xiang, Wenxin Li
{"title":"FVRC2016: The 2nd Finger Vein Recognition Competition","authors":"Yapeng Ye, Liao Ni, He Zheng, Shilei Liu, Yi Zhu, Deng Zhang, Weilai Xiang, Wenxin Li","doi":"10.1109/ICB.2016.7550051","DOIUrl":"https://doi.org/10.1109/ICB.2016.7550051","url":null,"abstract":"Finger vein recognition is a newly developed and promising biometrics technology. In current researches, finger vein recognition algorithms are mostly evaluated on data collected in laboratory environment. Along with its development, this technology gradually transforms from laboratory to actual use. Finger vein images captured in operational systems are different from those obtained in the lab, due to its uncontrollable acquisition condition and users' behavior. The 2nd Finger Vein Recognition Competition (FVRC2016) was organized for the purpose of assessing and comparing finger vein recognition algorithms on such data. 3 new data sets collected in real application were prepared for evaluating and improving algorithms. 6 submitted algorithms were extensively tested on the data sets. Testing protocols and detailed analysis of the results are also presented in this paper.","PeriodicalId":308715,"journal":{"name":"2016 International Conference on Biometrics (ICB)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126482024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}