2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems最新文献

筛选
英文 中文
Automatic landmark location with a Combined Active Shape Model 结合活动形状模型的自动地标定位
D. Zhou, D. Petrovska-Delacrétaz, B. Dorizzi
{"title":"Automatic landmark location with a Combined Active Shape Model","authors":"D. Zhou, D. Petrovska-Delacrétaz, B. Dorizzi","doi":"10.1109/BTAS.2009.5339037","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339037","url":null,"abstract":"Automatic facial landmark location is a difficult challenge for realistic face recognition applications, where the face is recorded under variable illumination conditions including indoor and outdoor recordings and also with some pose and scale variability. Moreover, the image distortion and complex background also bring some difficulty both for landmark location and face recognition. The proposed landmark detection method, called combined active shape models, is robust to illumination, translation, and rotation. It exploits the scale invariant feature transform (SIFT) [1] and the active shape model (ASM). In order to have a better representation of face images, the landmarks on the face region and the face contour are modeled and processed separately. The performance of the proposed combined-ASM algorithm is tested on the BioID and FRGCv2.0 face image databases.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130097916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Statistical analysis of fingerprint sensor interoperability performance 指纹传感器互操作性能统计分析
S. Modi, S. Elliott, Hale Kim
{"title":"Statistical analysis of fingerprint sensor interoperability performance","authors":"S. Modi, S. Elliott, Hale Kim","doi":"10.1109/BTAS.2009.5339063","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339063","url":null,"abstract":"The proliferation of networked authentication systems has put focus on the issue of interoperability. Fingerprint sensors are based on a variety of different technologies that introduce inconsistent distortions and variations in the feature set of the captured image, which makes the goal of interoperability challenging. The motivation of this research was to examine the effect of fingerprint sensor interoperability on the performance of a minutiae based matcher. A statistical analysis framework for testing interoperability was formulated to test similarity of minutiae count, image quality and similarity of performance between native and interoperable datasets. False non-match rate (FNMR) was used as the performance metric in this research. Interoperability performance analysis was conducted on each sensor dataset and also by grouping datasets based on the acquisition technology and interaction type of the acquisition sensor. The lowest interoperable FNMR observed was 0.12%.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130714450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Contact lenses: Handle with care for iris recognition 隐形眼镜:轻拿轻放,可识别虹膜
S. E. Baker, A. Hentz, K. W. Bowyer, P. Flynn
{"title":"Contact lenses: Handle with care for iris recognition","authors":"S. E. Baker, A. Hentz, K. W. Bowyer, P. Flynn","doi":"10.1109/BTAS.2009.5339050","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339050","url":null,"abstract":"Many iris recognition systems operate under the assumption that non-cosmetic contact lenses will not affect match quality and the convenience using iris biometrics. We show results opposing this belief with a study of 51 contact lens wearing subjects and 64 non contact lens wearing subjects. Our experimental results show that contacts lens wearers are 14 times more likely to be falsely rejected by the IrisBEE iris recognition system at a Hamming distance threshold of 0.32 than non contact lens wearers. We further classify contact lens wearers into four categories according to the type of lens and its visibility in the iris image. The false reject rate varies with different types of contacts and the artifacts they produce on iris images. This is the first work that we are aware of to look at the effects of prescription contact lenses on iris biometrics.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116961207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Radar micro-doppler for long range front-view gait recognition 用于远距离前视步态识别的雷达微多普勒
D. Tahmoush, J. Silvious
{"title":"Radar micro-doppler for long range front-view gait recognition","authors":"D. Tahmoush, J. Silvious","doi":"10.1109/BTAS.2009.5339049","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339049","url":null,"abstract":"We seek to understand the extraction of radar micro-Doppler signals generated by human motions at long range and with a front-view to use them as a biometric. We describe micro-Doppler algorithms used for the detection and tracking, and detail the gait features that can be extracted. We have measurements of multiple human subjects in outdoor but low-clutter backgrounds for identification and find that at long range and front-view, the probability of correct classification can be over 80%. However, the micro-Doppler signals are dependent on the direction of motion, and we discuss methods to reduce the effect of the direction of motion. These radar biometric features can serve as identifying features in a scene with multiple subjects. Ground truth using video and GPS is used to validate the radar data.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128061631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
Satellite communications as a viable method for biometric record transfer in field biometric devices 卫星通信作为现场生物识别设备中生物识别记录传输的可行方法
T.L. Haberman, C. Miles, M. A. Cardoza
{"title":"Satellite communications as a viable method for biometric record transfer in field biometric devices","authors":"T.L. Haberman, C. Miles, M. A. Cardoza","doi":"10.1109/BTAS.2009.5339065","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339065","url":null,"abstract":"The use of biometrics, and their associated handheld field devices, as an identification and verification technique is growing at a considerable rate. Governments and private organizations are making significant investments to identify and research new types of biometrics while pushing the industry to provide scanners capable of weathering field missions. In parallel, similar levels of investment are being made to build centralized databases that have the capability to query millions of records in a matter of seconds. While these investments push the biometric industry forward, lesser time has been invested into linking biometric scanners with a remote database. Commercially available scanners rely heavily on the evolution of the cellular industry or a satellite connected portable laptop to provide the necessary bandwidths required to transmit biometric records from the scanner to the remote database. This paper explores the use of satellite communications in handheld field sensors as a global communications link between biometric scanners and a remote database. The present work discusses and evaluates biometric type, file size, and satellite bandwidth for satellite communications on handheld field biometric devices. The paper concludes by identifying an emerging product, not yet commercially available, that integrates satellite technology into a product already capable of linking legacy wireless capable scanners with a remote database.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128099344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keystroke dynamics with low constraints SVM based passphrase enrollment 基于低约束支持向量机的密码注册击键动力学
R. Giot, Mohamad El-Abed, C. Rosenberger
{"title":"Keystroke dynamics with low constraints SVM based passphrase enrollment","authors":"R. Giot, Mohamad El-Abed, C. Rosenberger","doi":"10.1109/BTAS.2009.5339028","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339028","url":null,"abstract":"Keystroke dynamics biometric systems have been studied for more than twenty years. They are very well perceived by users, they may be one of the cheapest biometric system (as no specific material is required) even if they are not commonly spread and used [1]. We propose in this paper a new method based on SVM learning satisfying operational conditions (no more than 5 captures for the enrollment step). In the proposed method, users are authenticated thanks to keystroke dynamics of a passphrase (that can be chosen by the system administrator). We use the GREYC keystroke benchmark that is composed of a large number of users (100) for validation purposes. We tested the proposed method face to four other methods from the state of the art. Experimental results show that the proposed method outperforms them in an operational context.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116805179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
Fusion of IR and visible light modalities for face recognition 融合红外和可见光模式的人脸识别
P. Buyssens, M. Revenu, O. Lepetit
{"title":"Fusion of IR and visible light modalities for face recognition","authors":"P. Buyssens, M. Revenu, O. Lepetit","doi":"10.1109/BTAS.2009.5339031","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339031","url":null,"abstract":"We present a low resolution face recognition technique based on a special type of convolutional neural network which is trained to extract facial features from face images and project them onto a low-dimensional space. The network is trained to reconstruct a reference image chosen beforehand, and it has been applied in visible and infrared light. Since the learning phase is achieved separately for the two modalities, the projections, and then the new spaces, are uncorrelated for the two networks. However, by normalizing the results of these two non-linear approaches, we can merge them according to a measure of saliency computed dynamically. We experimentally show that our approach obtain good results in terms of precision and robustness, especially on new and unseen subjects.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117183443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Multi-biometrics based cryptographic key regeneration scheme 基于多重生物特征的密码密钥再生方案
S. Kanade, D. Petrovska-Delacrétaz, B. Dorizzi
{"title":"Multi-biometrics based cryptographic key regeneration scheme","authors":"S. Kanade, D. Petrovska-Delacrétaz, B. Dorizzi","doi":"10.1109/BTAS.2009.5339034","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339034","url":null,"abstract":"Biometrics lack revocability and privacy while cryptography cannot detect the user's identity. By obtaining cryptographic keys using biometrics, one can achieve the properties such as revocability, assurance about user's identity, and privacy. In this paper, we propose a multi-biometric based cryptographic key regeneration scheme. Since left and right irises of a person are uncorrelated, we treat them as two independent biometrics and combine in our system. We propose a novel idea for feature level fusion through weighted error correction to obtain a multi-biometric feature vector which is used to get a secure template. A shuffling key which is protected by a password is used to shuffle the error correcting codes data. The password helps improve revocability, privacy, and security of the system. We succeed to generate 147-bit long keys with as much entropy at 0% FAR and 0.18% FRR on the NIST-ICE database.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115225624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
A 3-D assisted generative model for facial texture super-resolution 一种面部纹理超分辨率三维辅助生成模型
Pouria Mortazavian, J. Kittler, W. Christmas
{"title":"A 3-D assisted generative model for facial texture super-resolution","authors":"Pouria Mortazavian, J. Kittler, W. Christmas","doi":"10.1109/BTAS.2009.5339066","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339066","url":null,"abstract":"This paper describes an example-based Bayesian method for 3D-assisted pose-independent facial texture super-resolution. The method utilizes a 3D morphable model to map facial texture from a 2D face image to a pose- and shape-normalized texture map and vice versa. The center piece of this method is a generative model to describe the process of forming an image from a pose- and shape-normalized texture map. The goal is to reconstruct a high-resolution texture map given an low-resolution face image. The prior knowledge about the sought high-resolution texture is incorporated into the Bayesian framework by using a recognition-based prior that encourages the gradient values of the texture map to be close to some predicted values. We develop the generative model and formulate the problem as MAP estimation. The results show that this framework is capable of performing pose-independent face recognition even when the sample set only contains exemplar face images with frontal pose. We present results in frontal and non-frontal poses. We also demonstrate that the technique can be utilized to improve face recognition results when the probe images have a lower resolution compared to the gallery images.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126369144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Local Feature Hashing for face recognition 人脸识别的局部特征哈希
Zhihong Zeng, Tianhong Fang, Shishir K. Shah, I. Kakadiaris
{"title":"Local Feature Hashing for face recognition","authors":"Zhihong Zeng, Tianhong Fang, Shishir K. Shah, I. Kakadiaris","doi":"10.1109/BTAS.2009.5339013","DOIUrl":"https://doi.org/10.1109/BTAS.2009.5339013","url":null,"abstract":"In this paper, we present Local Feature Hashing (LFH), a novel approach for face recognition. Focusing on the scalability of face recognition systems, we build our LFH algorithm on the p-stable distribution Locality-Sensitive Hashing (pLSH) scheme that projects a set of local features representing a query image to an ID histogram where the maximum bin is regarded as the recognized ID. Our extensive experiments on two publicly available databases demonstrate the advantages of our LFH method, including: i) significant computational improvement over naive search; ii) hashing in high-dimensional Euclidean space without embedding; and iii) robustness to pose, facial expression, illumination and partial occlusion.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123041196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信