2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)最新文献

筛选
英文 中文
Periocular biometrics in mobile environment 移动环境下的眼周生物识别
Tiago de Freitas Pereira, S. Marcel
{"title":"Periocular biometrics in mobile environment","authors":"Tiago de Freitas Pereira, S. Marcel","doi":"10.1109/BTAS.2015.7358785","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358785","url":null,"abstract":"In this work we study periocular biometrics in a challenging scenario: a mobile environment, where person recognition can take place on a mobile device. The proposed technique, that models session variability, is evaluated for the authentication task on the MOBIO database, previously used in face recognition, and on a novel mobile biometric database named the CPqD Biometric Database, as well as compared to prior work. We show that in this particular mobile environment the periocular region is complementary to face recognition, but not superior, unlike shown in a previous study on a more controlled environment. We show also that a combination with face recognition brings a relative improvement of 7.93% in terms of HTER. Finally, the results of this paper are reproducible using an open software and a novel Web platform.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"26 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132869783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Regularizing deep learning architecture for face recognition with weight variations 基于权值变化的人脸识别深度学习体系结构正则化
Shruti Nagpal, Maneet Singh, Mayank Vatsa, Richa Singh
{"title":"Regularizing deep learning architecture for face recognition with weight variations","authors":"Shruti Nagpal, Maneet Singh, Mayank Vatsa, Richa Singh","doi":"10.1109/BTAS.2015.7358791","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358791","url":null,"abstract":"Several mathematical models have been proposed for recognizing face images with age variations. However, effect of change in body-weight is also an interesting covariate that has not been much explored. This paper presents a novel approach to incorporate the weight variations during feature learning process. In a deep learning architecture, we propose incorporating the body-weight in terms of a regularization function which helps in learning the latent variables representative of different weight categories. The formulation has been proposed for both Autoencoder and Deep Boltzmann Machine. On extended WIT database of 200 subjects, the comparison with a commercial system and an existing algorithm show that the proposed algorithm outperforms them by more than 9% at rank-10 identification accuracy.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131391605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Combining 3D and 2D for less constrained periocular recognition 结合3D和2D进行较少约束的眼周识别
Lulu Chen, J. Ferryman
{"title":"Combining 3D and 2D for less constrained periocular recognition","authors":"Lulu Chen, J. Ferryman","doi":"10.1109/BTAS.2015.7358753","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358753","url":null,"abstract":"Periocular recognition has recently become an active topic in biometrics. Typically it uses 2D image data of the periocular region. This paper is the first description of combining 3D shape structure with 2D texture. A simple and effective technique using iterative closest point (ICP) was applied for 3D periocular region matching. It proved its strength for relatively unconstrained eye region capture, and does not require any training. Local binary patterns (LBP) were applied for 2D image based periocular matching. The two modalities were combined at the score-level. This approach was evaluated using the Bosphorus 3D face database, which contains large variations in facial expressions, head poses and occlusions. The rank-1 accuracy achieved from the 3D data (80%) was better than that for 2D (58%), and the best accuracy (83%) was achieved by fusing the two types of data. This suggests that significant improvements to periocular recognition systems could be achieved using the 3D structure information that is now available from small and inexpensive sensors.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114208314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Feature and keypoint selection for visible to near-infrared face matching 可见光到近红外人脸匹配的特征和关键点选择
Soumyadeep Ghosh, Tejas I. Dhamecha, Rohit Keshari, Richa Singh, Mayank Vatsa
{"title":"Feature and keypoint selection for visible to near-infrared face matching","authors":"Soumyadeep Ghosh, Tejas I. Dhamecha, Rohit Keshari, Richa Singh, Mayank Vatsa","doi":"10.1109/BTAS.2015.7358760","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358760","url":null,"abstract":"Matching near-infrared to visible images is one of the heterogeneous face recognition challenges in which spectral variations cause changes in the appearance of face images. In this paper, we propose to utilize a keypoint selection approach in the recognition pipeline. The proposed keypoint selection approach is a fast approximation of feature selection approach, yielding two orders of magnitude improvement in computational time while maintaining the recognition performance with respect to feature selection. The keypoint selection approach also enables to visualize the keypoints that are important for recognition. The proposed matching framework yields state-of-the-art approaches results on CASIA NIR-VIS-2.0 dataset.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129561864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Feature detection and tracking on geometric mesh data using a combined global and local shape model for face analysis 基于全局与局部相结合的几何网格数据特征检测与跟踪
Shaun J. Canavan, L. Yin
{"title":"Feature detection and tracking on geometric mesh data using a combined global and local shape model for face analysis","authors":"Shaun J. Canavan, L. Yin","doi":"10.1109/BTAS.2015.7358761","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358761","url":null,"abstract":"Automatic geometric feature localization is the first step towards the 3D based face analysis. In this paper we propose a shape model with a local and global constraint for feature detection. Such a so-called shape-index based statistical shape model (SI-SSM) makes use of the global shape of the facial data as well as local patches, consisting of shape index values, around landmark features. The fitting process and the performance of our proposed method are evaluated in terms of various imaging conditions and data qualities. The efficacy of the detected landmarks is validated through applications for geometric based face identification.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123780061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Treadmill attack on gait-based authentication systems 跑步机攻击基于步态的认证系统
R. Kumar, V. Phoha, A. Jain
{"title":"Treadmill attack on gait-based authentication systems","authors":"R. Kumar, V. Phoha, A. Jain","doi":"10.1109/BTAS.2015.7358801","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358801","url":null,"abstract":"In this paper, we demonstrate that gait patterns of an individual captured through a smartphone accelerometer can be imitated with the support of a digital treadmill. Furthermore, we design an attack for a baseline gait based authentication system (GBAS) and rigorously test its performance over an eighteen user data-set. By employing only two imitators and using a simple digital treadmill with speed control functionality, the attack increases the average false acceptance rate (FAR) from 5.8% to 43.66% for random forest, the best performing classifier in our experiments. More specifically, the FAR of eleven out of eighteen users increased to 70% or more. Our results call for a revisit of the design of the GBAS to make them resilient to such attacks.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117083071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits 移动设备应用程序、蓝牙和Wi-Fi使用数据作为行为生物特征
T. Neal, D. Woodard, A. Striegel
{"title":"Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits","authors":"T. Neal, D. Woodard, A. Striegel","doi":"10.1109/BTAS.2015.7358777","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358777","url":null,"abstract":"Patterns in the use of mobile devices have the potential to be used as a behavioral biometric for identification of the device user. We explore the distinctiveness and permanence of application, Bluetooth, and Wi-Fi mobile device usage data. Our database consists of data from two hundred mobile phone users collected over a 19-month span. To our knowledge, this is one of the largest databases of its kind. Results of over 500 experiments indicate that user identification rates averaging 80%, 77%, 93%, and 85% are achievable when using application, Bluetooth, Wi-Fi, and the combination of these three types of behavioral features, respectively.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115558127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Still to video face recognition using a heterogeneous matching approach 仍然对视频人脸识别采用异构匹配的方法
Y. Zhu, Zhenzhu Zheng, Yan Li, Guowang Mu, S. Shan, G. Guo
{"title":"Still to video face recognition using a heterogeneous matching approach","authors":"Y. Zhu, Zhenzhu Zheng, Yan Li, Guowang Mu, S. Shan, G. Guo","doi":"10.1109/BTAS.2015.7358798","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358798","url":null,"abstract":"In this paper, we address the problem of still-to-video (S2V) face recognition. Still images usually have high qualities, captured from cooperative users under controlled environment, such as the mugshot photos. On the contrary, video clips may be acquired with low resolutions and low qualities, from non-cooperative users under uncontrolled environment. Because of these significant differences, we consider the S2V as a heterogeneous matching problem, and propose to develop a method to bridge the gap between the two heterogeneous modalities. A Grassmann manifold learning method is developed to construct subspaces for the purpose of bridging the gap between the two face modalities smoothly. We conduct extensive experiments on two large scale benchmark databases, COX-S2V and PaSC, with different recognition tasks: face identification and verification. The experimental results show that the proposed approach outperforms the state-of-the-art methods under the same experimental settings.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128134365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Irreversible fingerprint template using Minutiae Relation Code with Bloom Filter 不可逆指纹模板的细节关系代码与布隆滤波器
N. Abe, Shigefumi Yamada, Takashi Shinzaki
{"title":"Irreversible fingerprint template using Minutiae Relation Code with Bloom Filter","authors":"N. Abe, Shigefumi Yamada, Takashi Shinzaki","doi":"10.1109/BTAS.2015.7358770","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358770","url":null,"abstract":"Template protected fingerprint authentication techniques have been proposed, which enables to create an irreversible fingerprint template. In this paper, we propose a new irreversible template creation technique using Minutiae Relation Code(MRC) which can describe the minutiae information efficiently, and Bloom Filter which can realize the irreversibility feature. We evaluate the authentication accuracy and security factors such as Shannon Entropy and the number of attack possibilities using FVC2002 and FVC2004 DBs. As a result, our proposed method can achieve 1.8% EER in FVC2002 DB2 with 249 attack possibilities.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124472170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
LivDet 2015 fingerprint liveness detection competition 2015 2015年LivDet指纹活体检测大赛
V. Mura, Luca Ghiani, G. Marcialis, F. Roli, David Yambay, S. Schuckers
{"title":"LivDet 2015 fingerprint liveness detection competition 2015","authors":"V. Mura, Luca Ghiani, G. Marcialis, F. Roli, David Yambay, S. Schuckers","doi":"10.1109/BTAS.2015.7358776","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358776","url":null,"abstract":"A spoof or fake is a counterfeit biometric that is used in an attempt to circumvent a biometric sensor. Liveness detection distinguishes between live and fake biometric traits. Liveness detection is based on the principle that additional information can be garnered above and beyond the data procured by a standard authentication system, and this additional data can be used to determine if a biometric measure is authentic. The Fingerprint Liveness Detection Competition (LivDet) goal is to compare both software-based and hardware-based fingerprint liveness detection methodologies. The competition is open to all academic and industrial institutions. The number of competitors grows at every LivDet edition demonstrating a growing interest in the area. In this edition eleven institutions have registered with twelve submissions for the software-based part and one for the hardware-based part.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123350752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 126
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信