{"title":"Periocular biometrics in mobile environment","authors":"Tiago de Freitas Pereira, S. Marcel","doi":"10.1109/BTAS.2015.7358785","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358785","url":null,"abstract":"In this work we study periocular biometrics in a challenging scenario: a mobile environment, where person recognition can take place on a mobile device. The proposed technique, that models session variability, is evaluated for the authentication task on the MOBIO database, previously used in face recognition, and on a novel mobile biometric database named the CPqD Biometric Database, as well as compared to prior work. We show that in this particular mobile environment the periocular region is complementary to face recognition, but not superior, unlike shown in a previous study on a more controlled environment. We show also that a combination with face recognition brings a relative improvement of 7.93% in terms of HTER. Finally, the results of this paper are reproducible using an open software and a novel Web platform.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"26 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132869783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Regularizing deep learning architecture for face recognition with weight variations","authors":"Shruti Nagpal, Maneet Singh, Mayank Vatsa, Richa Singh","doi":"10.1109/BTAS.2015.7358791","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358791","url":null,"abstract":"Several mathematical models have been proposed for recognizing face images with age variations. However, effect of change in body-weight is also an interesting covariate that has not been much explored. This paper presents a novel approach to incorporate the weight variations during feature learning process. In a deep learning architecture, we propose incorporating the body-weight in terms of a regularization function which helps in learning the latent variables representative of different weight categories. The formulation has been proposed for both Autoencoder and Deep Boltzmann Machine. On extended WIT database of 200 subjects, the comparison with a commercial system and an existing algorithm show that the proposed algorithm outperforms them by more than 9% at rank-10 identification accuracy.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131391605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining 3D and 2D for less constrained periocular recognition","authors":"Lulu Chen, J. Ferryman","doi":"10.1109/BTAS.2015.7358753","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358753","url":null,"abstract":"Periocular recognition has recently become an active topic in biometrics. Typically it uses 2D image data of the periocular region. This paper is the first description of combining 3D shape structure with 2D texture. A simple and effective technique using iterative closest point (ICP) was applied for 3D periocular region matching. It proved its strength for relatively unconstrained eye region capture, and does not require any training. Local binary patterns (LBP) were applied for 2D image based periocular matching. The two modalities were combined at the score-level. This approach was evaluated using the Bosphorus 3D face database, which contains large variations in facial expressions, head poses and occlusions. The rank-1 accuracy achieved from the 3D data (80%) was better than that for 2D (58%), and the best accuracy (83%) was achieved by fusing the two types of data. This suggests that significant improvements to periocular recognition systems could be achieved using the 3D structure information that is now available from small and inexpensive sensors.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114208314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature and keypoint selection for visible to near-infrared face matching","authors":"Soumyadeep Ghosh, Tejas I. Dhamecha, Rohit Keshari, Richa Singh, Mayank Vatsa","doi":"10.1109/BTAS.2015.7358760","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358760","url":null,"abstract":"Matching near-infrared to visible images is one of the heterogeneous face recognition challenges in which spectral variations cause changes in the appearance of face images. In this paper, we propose to utilize a keypoint selection approach in the recognition pipeline. The proposed keypoint selection approach is a fast approximation of feature selection approach, yielding two orders of magnitude improvement in computational time while maintaining the recognition performance with respect to feature selection. The keypoint selection approach also enables to visualize the keypoints that are important for recognition. The proposed matching framework yields state-of-the-art approaches results on CASIA NIR-VIS-2.0 dataset.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129561864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature detection and tracking on geometric mesh data using a combined global and local shape model for face analysis","authors":"Shaun J. Canavan, L. Yin","doi":"10.1109/BTAS.2015.7358761","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358761","url":null,"abstract":"Automatic geometric feature localization is the first step towards the 3D based face analysis. In this paper we propose a shape model with a local and global constraint for feature detection. Such a so-called shape-index based statistical shape model (SI-SSM) makes use of the global shape of the facial data as well as local patches, consisting of shape index values, around landmark features. The fitting process and the performance of our proposed method are evaluated in terms of various imaging conditions and data qualities. The efficacy of the detected landmarks is validated through applications for geometric based face identification.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123780061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Treadmill attack on gait-based authentication systems","authors":"R. Kumar, V. Phoha, A. Jain","doi":"10.1109/BTAS.2015.7358801","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358801","url":null,"abstract":"In this paper, we demonstrate that gait patterns of an individual captured through a smartphone accelerometer can be imitated with the support of a digital treadmill. Furthermore, we design an attack for a baseline gait based authentication system (GBAS) and rigorously test its performance over an eighteen user data-set. By employing only two imitators and using a simple digital treadmill with speed control functionality, the attack increases the average false acceptance rate (FAR) from 5.8% to 43.66% for random forest, the best performing classifier in our experiments. More specifically, the FAR of eleven out of eighteen users increased to 70% or more. Our results call for a revisit of the design of the GBAS to make them resilient to such attacks.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117083071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits","authors":"T. Neal, D. Woodard, A. Striegel","doi":"10.1109/BTAS.2015.7358777","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358777","url":null,"abstract":"Patterns in the use of mobile devices have the potential to be used as a behavioral biometric for identification of the device user. We explore the distinctiveness and permanence of application, Bluetooth, and Wi-Fi mobile device usage data. Our database consists of data from two hundred mobile phone users collected over a 19-month span. To our knowledge, this is one of the largest databases of its kind. Results of over 500 experiments indicate that user identification rates averaging 80%, 77%, 93%, and 85% are achievable when using application, Bluetooth, Wi-Fi, and the combination of these three types of behavioral features, respectively.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115558127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Zhu, Zhenzhu Zheng, Yan Li, Guowang Mu, S. Shan, G. Guo
{"title":"Still to video face recognition using a heterogeneous matching approach","authors":"Y. Zhu, Zhenzhu Zheng, Yan Li, Guowang Mu, S. Shan, G. Guo","doi":"10.1109/BTAS.2015.7358798","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358798","url":null,"abstract":"In this paper, we address the problem of still-to-video (S2V) face recognition. Still images usually have high qualities, captured from cooperative users under controlled environment, such as the mugshot photos. On the contrary, video clips may be acquired with low resolutions and low qualities, from non-cooperative users under uncontrolled environment. Because of these significant differences, we consider the S2V as a heterogeneous matching problem, and propose to develop a method to bridge the gap between the two heterogeneous modalities. A Grassmann manifold learning method is developed to construct subspaces for the purpose of bridging the gap between the two face modalities smoothly. We conduct extensive experiments on two large scale benchmark databases, COX-S2V and PaSC, with different recognition tasks: face identification and verification. The experimental results show that the proposed approach outperforms the state-of-the-art methods under the same experimental settings.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128134365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Irreversible fingerprint template using Minutiae Relation Code with Bloom Filter","authors":"N. Abe, Shigefumi Yamada, Takashi Shinzaki","doi":"10.1109/BTAS.2015.7358770","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358770","url":null,"abstract":"Template protected fingerprint authentication techniques have been proposed, which enables to create an irreversible fingerprint template. In this paper, we propose a new irreversible template creation technique using Minutiae Relation Code(MRC) which can describe the minutiae information efficiently, and Bloom Filter which can realize the irreversibility feature. We evaluate the authentication accuracy and security factors such as Shannon Entropy and the number of attack possibilities using FVC2002 and FVC2004 DBs. As a result, our proposed method can achieve 1.8% EER in FVC2002 DB2 with 249 attack possibilities.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124472170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Mura, Luca Ghiani, G. Marcialis, F. Roli, David Yambay, S. Schuckers
{"title":"LivDet 2015 fingerprint liveness detection competition 2015","authors":"V. Mura, Luca Ghiani, G. Marcialis, F. Roli, David Yambay, S. Schuckers","doi":"10.1109/BTAS.2015.7358776","DOIUrl":"https://doi.org/10.1109/BTAS.2015.7358776","url":null,"abstract":"A spoof or fake is a counterfeit biometric that is used in an attempt to circumvent a biometric sensor. Liveness detection distinguishes between live and fake biometric traits. Liveness detection is based on the principle that additional information can be garnered above and beyond the data procured by a standard authentication system, and this additional data can be used to determine if a biometric measure is authentic. The Fingerprint Liveness Detection Competition (LivDet) goal is to compare both software-based and hardware-based fingerprint liveness detection methodologies. The competition is open to all academic and industrial institutions. The number of competitors grows at every LivDet edition demonstrating a growing interest in the area. In this edition eleven institutions have registered with twelve submissions for the software-based part and one for the hardware-based part.","PeriodicalId":404972,"journal":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123350752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}