2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications最新文献

筛选
英文 中文
Using artificial neural networks and feature saliency to identify iris measurements that contain the most discriminatory information for iris segmentation 利用人工神经网络和特征显著性来识别包含最具歧视性信息的虹膜测量值,用于虹膜分割
R. Broussard, R. Ives
{"title":"Using artificial neural networks and feature saliency to identify iris measurements that contain the most discriminatory information for iris segmentation","authors":"R. Broussard, R. Ives","doi":"10.1109/CIB.2009.4925685","DOIUrl":"https://doi.org/10.1109/CIB.2009.4925685","url":null,"abstract":"One of the basic challenges to robust iris recognition is iris segmentation. To represent the iris, some researchers fit circles, ellipses or active contours to the boundary pixels of the segmented iris. In order to get an accurate fit, the iris boundary must first be accurately identified. Some segmentation methods operate on a pre-processed gray-scaled image, while others use a thresholded binary edge image. The Hough transform is a popular method used to search for circular or elliptical patterns within the image. Many irises are slightly elliptical, and suffer from eyelid/eyelash occlusion, specular reflections and often the pupil and iris centers are not co-located. Each of these issues can cause a segmentation error. This research uses of a feature saliency algorithm to identify which measurements, used in common iris segmentation methods, jointly contain the most discriminatory information for identify the iris boundary. Once this feature set is identified, an artificial neural network is used to near-optimally combine the segmentation measurements to better localize and identify boundary pixels of the iris. In this approach, no assumption of circularity is assumed when identifying the iris boundary. 322 measurements were tested and eight were found to contain discriminatory information that can assist in identifying the iris boundary. For occluded images, the iris masks created by the neural network were consistently more accurate than the truth mask created using the circular iris boundary assumption.","PeriodicalId":395538,"journal":{"name":"2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129052347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Multi-level iris video image thresholding 多级虹膜视频图像阈值分割
Yingzi Du, Senior Member, N. L. Thomas, Emrah Arslanturk
{"title":"Multi-level iris video image thresholding","authors":"Yingzi Du, Senior Member, N. L. Thomas, Emrah Arslanturk","doi":"10.1109/CIB.2009.4925684","DOIUrl":"https://doi.org/10.1109/CIB.2009.4925684","url":null,"abstract":"Iris recognition has been shown to be one of the most accurate biometrics. However, under non-ideal situations, its recognition accuracy can be reduced dramatically. Under such situations, video images can be used to improve the accuracy. The traditional single image based segmentation method could be inefficient. Video image based thresholding method can help improve the segmentation efficiency. However, traditional thresholding methods are not designed for iris images. In this paper, the multi-level iris video image thresholding method is proposed. It takes advantage of the correlations between consecutive images for video based thresholding. It is an orientation invariant thresholding scheme. K-mean clustering is used to find the clusters and PCA is used to quickly project the image to the clusters. The experimental results show the proposed method is effective. The thresholded images show clear pupil and iris areas, which can help further iris segmentation and processing. In addition, the proposed method can be applied to non-video images if they are obtained from the same sensor with similar illumination conditions.","PeriodicalId":395538,"journal":{"name":"2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications","volume":"461 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122804467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Artificial neural network based automatic face parts prediction system from only fingerprints 基于人工神经网络的人脸指纹自动预测系统
Ş. Sağiroğlu, Necla Özkaya
{"title":"Artificial neural network based automatic face parts prediction system from only fingerprints","authors":"Ş. Sağiroğlu, Necla Özkaya","doi":"10.1109/CIB.2009.4925690","DOIUrl":"https://doi.org/10.1109/CIB.2009.4925690","url":null,"abstract":"Biometrics is a deeply studied and highly developed technology. While biometric systems have been used primarily in limited applications requiring high security tasks like criminal identification and police work, more recently they have been receiving increasing demand for person recognition applications. In spite of all developments in biometrics, there is no study investigating relationships between biometric features in the literature. This study presents a novel intelligent approach analysing the existence of any relationship among fingerprints and face parts. Proposed approach is based on artificial neural networks. Developed system generates the stationary face parts of a person including eyebrows, eyes and nose from only one fingerprint image of the same person without knowing any information about his or her face with the errors among 1.4 % and 4.8 %. The satisfactory results have indicated that there are close realitionships among fingerprints and faces. Improving of the proposed system is still sustained for the purpose of analysing and modelling of this relationship for the future developments in biometrics and security applications.","PeriodicalId":395538,"journal":{"name":"2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126094268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Minimizing the number of bits needed for iris recognition via Bit Inconsistency and GRIT 通过位不一致性和GRIT最小化虹膜识别所需的位数
G. Dozier, Kurt Frederiksen, Robert Meeks, M. Savvides, Kelvin S. Bryant, Darlene Hopes, T. Munemoto
{"title":"Minimizing the number of bits needed for iris recognition via Bit Inconsistency and GRIT","authors":"G. Dozier, Kurt Frederiksen, Robert Meeks, M. Savvides, Kelvin S. Bryant, Darlene Hopes, T. Munemoto","doi":"10.1109/CIB.2009.4925683","DOIUrl":"https://doi.org/10.1109/CIB.2009.4925683","url":null,"abstract":"In this paper, we demonstrate how the concepts of Bit Inconsistency and Genetic Search can be used to minimize the number of iris code bits needed for iris recognition. In addition, we compare two systems: GRIT-I (Genetically Refined Iris Templates I) and GRIT-II. Our results show that GRIT-I (by evolving the bit mask of iris templates) was able to reduce the number of iris code bits needed by approximately 30% on average. GRIT-II by contrast optimizes the bit mask as well as the iris code bits that have 100% consistency and 100% coverage with respect to the training set. GRIT-II was able to reduce the number of iris code bits needed by approximately 89%.","PeriodicalId":395538,"journal":{"name":"2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114819757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Automatic iris mask refinement for high performance iris recognition 自动虹膜掩膜细化高性能虹膜识别
Yung-Hui Li, M. Savvides
{"title":"Automatic iris mask refinement for high performance iris recognition","authors":"Yung-Hui Li, M. Savvides","doi":"10.1109/CIB.2009.4925686","DOIUrl":"https://doi.org/10.1109/CIB.2009.4925686","url":null,"abstract":"How to estimate artifacts on an iris image in polar domain is an important question for any iris recognition system which pursues high recognition rate as its goal. In literature, there are many different existing algorithm that estimate iris occlusion in either Cartesian or polar coordinate. In this paper, our goal is not to propose another new method to compete with existing method. Rather, our goal is to propose a new algorithm which can take any iris mask estimated by existing algorithm, and refine it into a much more accurate mask. In this way, our proposed method could co-work with any other existing algorithm and improve iris recognition performance. Experimental results show our proposed method can improve iris recognition rate by a great lead compared to the performance of the system using the unrefined iris masks.","PeriodicalId":395538,"journal":{"name":"2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114535102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effects of image compression on iris recognition performance and image quality 图像压缩对虹膜识别性能和图像质量的影响
R. Ives, Daniel A. Bishop, Yingzi Du, C. Belcher
{"title":"Effects of image compression on iris recognition performance and image quality","authors":"R. Ives, Daniel A. Bishop, Yingzi Du, C. Belcher","doi":"10.1109/CIB.2009.4925681","DOIUrl":"https://doi.org/10.1109/CIB.2009.4925681","url":null,"abstract":"With iris recognition gaining support as one of the most accurate means of human identification, its use is expanding globally. The number of researchers developing algorithms for iris recognition is increasing, and more iris image databases are available for their research. Developing algorithms that work effectively over a wide range of conditions requires a large assortment of iris images captured under varying and extreme conditions. This means that the size of the databases from which to conduct research is increasing. This paper investigates the effects of image compression on recognition system performance using a commercial iris recognition algorithm along with JPEG-2000 compression, and links these to an image quality metric. We use the ICE iris database in this research.","PeriodicalId":395538,"journal":{"name":"2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114607946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A facial presence monitoring system for information security 一种用于信息安全的面部存在监测系统
Q. Xiao, Xue-Dong Yang
{"title":"A facial presence monitoring system for information security","authors":"Q. Xiao, Xue-Dong Yang","doi":"10.1109/CIB.2009.4925689","DOIUrl":"https://doi.org/10.1109/CIB.2009.4925689","url":null,"abstract":"Information security requires a method to establish digital credentials that can reliably identify individual users. Since biometrics is concerned with the measurements of unique human physiological or behavioural characteristics, the technology has been used to verify the identity of computer or network users. Given today's heightened security requirements of military as well as other applications such as banking, health care, etc., it is becoming critical to be able to monitor the presence of the authenticated user throughout a session. This paper presents a prototype system that uses facial recognition technology to monitor the authenticated user. The objective is to ensure that the user who is using the computer is the same person that logged onto the system. A neural network-based algorithm is implemented to carry out face detection, and an eigenface method is employed to perform facial recognition. A graphical user interface (GUI) has been developed which allows the performance of face detection and facial recognition to be monitored at run time. The experimental results demonstrate the feasibility of near-real-time continuous user verification for high-level security information systems.","PeriodicalId":395538,"journal":{"name":"2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129142368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An efficient dual stage approach for iris feature extraction using interest point pairing 基于兴趣点配对的虹膜特征提取方法
H. Mehrotra, G. Badrinath, B. Majhi, Phalguni Gupta
{"title":"An efficient dual stage approach for iris feature extraction using interest point pairing","authors":"H. Mehrotra, G. Badrinath, B. Majhi, Phalguni Gupta","doi":"10.1109/CIB.2009.4925687","DOIUrl":"https://doi.org/10.1109/CIB.2009.4925687","url":null,"abstract":"This paper proposes a novel feature extraction and matching technique for iris recognition using interest points. The feature set comprises of spatial location of corner points and entropy information of the window around the corner. Corner matching is an elementary problem that is resolved using dual stage approach. At first stage the potential corners are obtained by finding Euclidean distance between spatial coordinates. These potential corners are used to find actual corners based on their affinity around a window, which is measured using Mutual Information (MI). For the purpose of evaluating experimental results three different datasets i.e., BATH, CASIA and IITK are used. The proposed dual stage approach has accuracy more than 98% with FRR of 0.0% and FAR of 2.61%.","PeriodicalId":395538,"journal":{"name":"2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131994836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Inverse operation and preimage attack on BioHashing 生物哈希的逆操作和预像攻击
Yongjin Lee, Yun-Su Chung, Kiyoung Moon
{"title":"Inverse operation and preimage attack on BioHashing","authors":"Yongjin Lee, Yun-Su Chung, Kiyoung Moon","doi":"10.1109/CIB.2009.4925692","DOIUrl":"https://doi.org/10.1109/CIB.2009.4925692","url":null,"abstract":"BioHashing generates a BioCode from a user's biometric features by projecting them onto user-specific random vectors and then discritizes the projection coefficients into zero or one. Since biometric features are distorted by the non-invertible transforms and template matching is performed in a transformed state, it has been claimed that BioHashing is oneway and a BioCode is as secure as a hashed password. However, we disprove it by showing that even without a genuine's private random vectors, a preimage of a BioCode is easily calculated from a lost BioCode and an attacker can gain an illegal access to a system.","PeriodicalId":395538,"journal":{"name":"2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129690107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Transforming traditional iris recognition systems to work on non-ideal situations 改造传统的虹膜识别系统,使其在非理想情况下工作
Zhi Zhou, Yingzi Du, C. Belcher
{"title":"Transforming traditional iris recognition systems to work on non-ideal situations","authors":"Zhi Zhou, Yingzi Du, C. Belcher","doi":"10.1109/CIB.2009.4925679","DOIUrl":"https://doi.org/10.1109/CIB.2009.4925679","url":null,"abstract":"Non-ideal iris images can significantly affect the accuracy of iris recognition systems for two reasons: 1) they cannot be properly preprocessed by the system; and/or 2) they have poor image quality. However, many traditional iris recognition systems have been deployed in law enforcement, military, or many other important locations. It will be expensive to replace all these systems. It will be desirable if the traditional systems can be transformed to perform in non-ideal situations without an expensive update. In this paper, we propose a method that can help traditional iris recognition systems to work on the non-ideal situation using a video image approach. The proposed method will quickly identify and eliminate the bad quality images from iris videos for further processing. The segmentation accuracy is critical in recognition and would be challenging for traditional systems. The segmentation evaluation is designed to evaluate if the segmentation is valid. The information distance based quality measure is used to evaluate if the image has enough quality for recognition. The segmentation evaluation score and quality score are combined to predict the recognition performance. The research results show that the proposed methods can work effectively and objectively. The combination of segmentation and quality scores is highly correlated with the recognition accuracy and can be used to improve the performance of iris recognition systems in a non-ideal situation. The deployment of such a system would not cost much since the core parts of the traditional systems are not changed and we only need to add software modules. It will be very practical to transform the traditional system using the proposed method.","PeriodicalId":395538,"journal":{"name":"2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114382865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信