{"title":"Probabilistic orientation field estimation for fingerprint enhancement and verification","authors":"Kuang-chih Lee, S. Prabhakar","doi":"10.1109/BSYM.2008.4655521","DOIUrl":"https://doi.org/10.1109/BSYM.2008.4655521","url":null,"abstract":"We present a novel probabilistic method to estimate the orientation field in fingerprint images. Traditional approach based on the smoothing of local image gradients usually generates unsatisfactory results in poor quality regions of fingerprint images. We show how to improve the orientation field estimation by first constructing a Markov random field (MRF) and then inferring the orientation field from the MRF model. The MRF is made up of two components. The first component incorporates a global mixture model of orientation fields learned from training fingerprint examples. The second component enforces a smoothness constraint over the orientation field in the neighboring regions. The improved fingerprint orientation field is useful in fingerprint enhancement and minutiae extraction processes. We show remarkable improvement of fingerprint verification accuracy on a relatively large fingerprint dataset based on the proposed approach.","PeriodicalId":389538,"journal":{"name":"2008 Biometrics Symposium","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115356124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical considerations for secure minutiae based templates","authors":"A. Arakala, K. Horadam, S. Boztaş","doi":"10.1109/BSYM.2008.4655528","DOIUrl":"https://doi.org/10.1109/BSYM.2008.4655528","url":null,"abstract":"We illustrate the steps in building a secure authentication system using a construct called PinSketch where the identifier is a set of points derived from the minutiae extracted from a fingerprint. We define a relative set difference based threshold for matching templates, that takes the sizes of the sets being compared into account and show that it performs better than a fixed threshold for all fingerprints in a database. We describe the process of selecting the quantisation parameters and the design of the authentication system based on the PinSketch construct. The main question asked, and answered, is: At the operating parameters chosen, is the authentication system secure? We determine an empirical measure of the entropy of the quantised minutiae-based template and demonstrate how an attacker can exploit a non uniform distribution of the template elements to masquerade as a genuine user. We finally list desirable requirements for a template if it has to be protected using a set difference based construct like PinSketch.","PeriodicalId":389538,"journal":{"name":"2008 Biometrics Symposium","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127295428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A methodology for separating sheep from goats for controlled enrollment and multimodal fusion","authors":"N. Poh, J. Kittler","doi":"10.1109/BSYM.2008.4655517","DOIUrl":"https://doi.org/10.1109/BSYM.2008.4655517","url":null,"abstract":"Biometric performance assessment is made difficult by virtue of the fact that each user in the database introduces variability that cannot be controlled even with a well designed acquisition procedure and experimental protocol. As a result, the system performance is inevitably user-dependent. We propose explicitly to rank the users according to their performance using criteria such as the F-ratio, the Fisher ratio and the d-prime metric. These criteria are demonstrated to be able to partition the users in such a way that the performance of each partition differs by as much as a factor of 2. Thanks to these criteria, it is possible to assess the performance of the best case or, more importantly, the worst case scenario. While the experiments have been conducted only on face, fingerprint and iris biometrics, we conjecture that such performance discrepancy among the population of users in the same database is exhibited by all biometrics. We also explore various research avenues in this direction, including group-specific score normalization, model adequacy at enrollment and multimodal fusion controlled by a user-ranking criterion.","PeriodicalId":389538,"journal":{"name":"2008 Biometrics Symposium","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117014996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multiband approach to human identity verification based on PhonoCardioGram signal analysis","authors":"F. Beritelli","doi":"10.1109/BSYM.2008.4655525","DOIUrl":"https://doi.org/10.1109/BSYM.2008.4655525","url":null,"abstract":"New physiological or behavioural characteristics have to be considered in order to improve the performance of automatic mono/multi-biometric recognition systems. It has recently been shown in, by means of a preliminary study, that PhonoCardioGram (PCG) signals have specific individual characteristics that can be taken into consideration as a physiological sign used in a biometric system. This paper presents new results in biometric identification/verification via frequency analysis of cardiac sounds. More specifically, the paper proposes a multiband approach to PCG signals that has made it possible to enhance the linear separability and obtain an Equal Error Rate (EER) of 9%.","PeriodicalId":389538,"journal":{"name":"2008 Biometrics Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131133650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accurate segmentation of digitized dental X-ray records","authors":"E. Said, A. Abaza, H. Ammar, G. Fahmy","doi":"10.1109/BSYM.2008.4655526","DOIUrl":"https://doi.org/10.1109/BSYM.2008.4655526","url":null,"abstract":"Recent disasters have emphasized the significance of automated dental identification systems. Statistics show that 20% of the 9/11 victims, identified in the first year, were manually identified using dental records. Moreover, 75% of Tsunami victims in Thailand were similarly identified using dental records, compared to 0.5% identified using DNA. This paper addresses the first important problem of an Automated Dental Identification System (ADIS). This system matches image features extracted from multiple dental radiographic records. Dental radiograph record of an individual usually consists of radiographic films. It is an essential step to accurately segment these films from their constituent dental records in order to extract the dental features and achieve high level of automated postmortem identification. In this paper, we propose an automated approach to the problem of segmenting films from their dental records. Challenges include the variability in the background of the dental records including its gray intensity and texture, and variation in the number of films and their dimensions. Our three-stage approach is based on concepts of thresholding, connectivity, and mathematical morphology. We show by experimental evidence that our approach achieves 92% accuracy compared to 74% using previous work suggested in the literature.","PeriodicalId":389538,"journal":{"name":"2008 Biometrics Symposium","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125763616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bio-cryptographic protocols with bipartite biotokens","authors":"W. Scheirer, T. Boult","doi":"10.1109/BSYM.2008.4655516","DOIUrl":"https://doi.org/10.1109/BSYM.2008.4655516","url":null,"abstract":"Cryptographic protocols are the foundation of secure network infrastructure, facilitating authentication, transactions, and data integrity. In traditional cryptographic protocols, generated keys (and, in most cases, passwords) are used. The utility of biometrics as a convenient and reliable method for authentication has emerged in recent years, but little work has been performed on a serious integration of biometrics with cryptographic protocols. In this paper, we review the notion of revocable biotokens, explain their nesting properties, and extend them to bipartite bitokens and use these to develop protocols for transactions, digital signatures, and a biometric version of Kerberos. We show bipartite biotokens offer a convenient enhancement to keys and passwords, allowing for tighter auditing and non-repudiation, as well as protection from phishing and man-in-the-middle attacks.","PeriodicalId":389538,"journal":{"name":"2008 Biometrics Symposium","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134297285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric template update using the graph mincut algorithm : A case study in face verification","authors":"A. Rattani, G. Marcialis, F. Roli","doi":"10.1109/BSYM.2008.4655518","DOIUrl":"https://doi.org/10.1109/BSYM.2008.4655518","url":null,"abstract":"A biometric system provides poor performances when the input data exhibit intra-class variations which are not well represented by the enrolled template set. This problem has been recently faced by template update techniques. The majority of the proposed techniques can be regarded as ldquoself-updaterdquo methods, as the system updates its own templates using the recognition results provided by the same templates. However, this approach can only exploit the input data ldquonearrdquo to the current templates resulting in ldquolocalrdquo template optimization, namely, only input samples very similar to the current templates are exploited for update. To address this issue, this paper proposes a ldquoglobalrdquo optimization of templates based on the graph mincut algorithm. The proposed approach can update templates by analysing the underlying structure of input data collected during the systempsilas operation. This is achieved by a graph drawn using a pair-wise similarity measure between enrolled and input data. Investigation of this novel template update technique has been done by its application to face verification, as a case study. The reported results show the effectiveness of the proposed technique in comparison to state of art self-update techniques.","PeriodicalId":389538,"journal":{"name":"2008 Biometrics Symposium","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114313724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ear segmentation in color facial images using mathematical morphology","authors":"E. Said, A. Abaza, H. Ammar","doi":"10.1109/BSYM.2008.4655519","DOIUrl":"https://doi.org/10.1109/BSYM.2008.4655519","url":null,"abstract":"Fully automated image segmentation is an essential step for designing automated identification systems. In this paper, we address the problem of fully automated image segmentation in the context of ear biometrics. Our segmentation approach achieves more than 90% accuracy based on three different sets of 3750 facial images for 376 persons. We also present an approach for the automated evaluation of the quality of segmented images. Our approach is based on low computational-cost appearance-based features and learning based Bayesian classifier in order to determine whether the segmentation outcome is proper or improper segment. Experimental results for evaluating the segmentation outcomes of ear images indicate the benefits of the proposed scheme.","PeriodicalId":389538,"journal":{"name":"2008 Biometrics Symposium","volume":"609 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116075136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lip contours detection and tracking with multi features","authors":"Q. D. Nguyen, M. Milgram","doi":"10.1109/BSYM.2008.4655520","DOIUrl":"https://doi.org/10.1109/BSYM.2008.4655520","url":null,"abstract":"Lip contours detection and tracking has been studied extensively because it can significantly improve the performance of the automatic speech recognition and face recognition systems. A major challenge is to find a robust and accurate method for detecting and tracking lip contours. In this paper, we propose and evaluate novel method for lip detection and tracking, which is based on the concept of statistic shape models (e.g. ASM, AAM, etc) and optimization of multi features. Since, a single feature-based alignment method (e.g. normal profile ASM, Gabor ASM, snakes, etc) presents good performance only in particular conditions but gets stuck in local minima for noisy conditions. To enhance the convergence, we propose to use three features: normal profile, grey level patches and Gabor wavelets in alignment method and combine them by using a voting approach. The ASM is not able to take into account temporal information from previous frames therefore the lip contours are tracked by replacing the standard ASM with a hybrid active shape model (MF-HASM) which is capable to take advantage of the temporal information.","PeriodicalId":389538,"journal":{"name":"2008 Biometrics Symposium","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128585799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Lai, J. O’Sullivan, M. Chen, E. Sirevaag, A. D. Kaplan, J. Rohrbaugh
{"title":"A robust feature selection method for noncontact biometrics based on Laser Doppler Vibrometry","authors":"P. Lai, J. O’Sullivan, M. Chen, E. Sirevaag, A. D. Kaplan, J. Rohrbaugh","doi":"10.1109/BSYM.2008.4655524","DOIUrl":"https://doi.org/10.1109/BSYM.2008.4655524","url":null,"abstract":"We propose a new biometric approach based on cardiovascular signals recorded using laser Doppler vibrometry (LDV) with a robust feature selection method. A novel feature selection method provides robustness against physiological variability of a given individual. LDV signals were collected from 191 individuals under controlled conditions during three sessions, each at intervals of one week to six months. The methods described here are based on a time-frequency decomposition of the LDV signal in which the log-power of the decomposition values are used as features. In identity verification tasks, equal error rates in the single digits can be achieved with testing periods as short as 4 s.","PeriodicalId":389538,"journal":{"name":"2008 Biometrics Symposium","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131215852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}