2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)最新文献

筛选
英文 中文
Automatic child-face age-progression based on heritability factors of familial faces 基于家族面孔遗传因子的儿童面孔年龄自动进展
A. submission
{"title":"Automatic child-face age-progression based on heritability factors of familial faces","authors":"A. submission","doi":"10.1109/BIDS.2009.5507532","DOIUrl":"https://doi.org/10.1109/BIDS.2009.5507532","url":null,"abstract":"This paper presents a novel age progression method specifically developed for children that incorporates genetic facial features of siblings and parents to synthetically predict the child's facial appearance up to adult years. The proposed approach is the first age-progression technique that directly incorporates familial data with Active Appearance Models (AAM). This work introduces a novel data set that contains longitudinal face images of children and siblings.","PeriodicalId":409188,"journal":{"name":"2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132292769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hill-climbing attack to an Eigenface-based face verification system 基于特征脸的人脸验证系统的爬坡攻击
Javier Galbally, Julian Fierrez, J. Ortega-Garcia, C. McCool, S. Marcel
{"title":"Hill-climbing attack to an Eigenface-based face verification system","authors":"Javier Galbally, Julian Fierrez, J. Ortega-Garcia, C. McCool, S. Marcel","doi":"10.1109/BIDS.2009.5507530","DOIUrl":"https://doi.org/10.1109/BIDS.2009.5507530","url":null,"abstract":"We use a general hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of an Eigenface-based approach for face recognition against indirect attacks. The attacking technique uses the scores provided by the matcher to adapt a global distribution, computed from a development set of users, to the local specificities of the client being attacked. The proposed attack is evaluated on an Eigenface-based verification system using the XM2VTS database. The results show a very high efficiency of the hill-climbing algorithm, which successfully bypassed the system for over 85% of the attacked accounts.","PeriodicalId":409188,"journal":{"name":"2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121952450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Fingerprint liveness detection based on quality measures 基于质量测度的指纹活动性检测
Javier Galbally, F. Alonso-Fernandez, Julian Fierrez, J. Ortega-Garcia
{"title":"Fingerprint liveness detection based on quality measures","authors":"Javier Galbally, F. Alonso-Fernandez, Julian Fierrez, J. Ortega-Garcia","doi":"10.1109/BIDS.2009.5507534","DOIUrl":"https://doi.org/10.1109/BIDS.2009.5507534","url":null,"abstract":"A new fingerprint parameterization for liveness detection based on quality measures is presented. The novel feature set is used in a complete liveness detection system and tested on the development set of the LivDET competition, comprising over 4,500 real and fake images acquired with three different optical sensors. The proposed solution proves to be robust to the multi-sensor scenario, and presents an overall rate of 93% of correctly classified samples. Furthermore, the liveness detection method presented has the added advantage over previously studied techniques of needing just one image from a finger to decide whether it is real or fake.","PeriodicalId":409188,"journal":{"name":"2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)","volume":"11 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113980012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Dynamic biometrics: The case for a real-time solution to the problem of access control, privacy and security 动态生物识别:为访问控制、隐私和安全问题提供实时解决方案的案例
S. Simske
{"title":"Dynamic biometrics: The case for a real-time solution to the problem of access control, privacy and security","authors":"S. Simske","doi":"10.1109/BIDS.2009.5507535","DOIUrl":"https://doi.org/10.1109/BIDS.2009.5507535","url":null,"abstract":"From a certain perspective, security is broken. The security authorization triangle (possession, knowledge, identity) has in some cases been reduced to a single point (knowledge) because of the limitations to possession attributable to virtualization, and because of the limitations to identity attributable to the use of static biometrics. This paper makes the case for a stronger security rights triangle—privacy, security and access control—underpinned by the resurrection of possession and identity through the use of dynamic biometrics. New technologies in mobile and cloud computing, pattern recognition and user interaction provide a potential path forward for an identity-matching ecosystem in which both privacy and security needs can be accommodated.","PeriodicalId":409188,"journal":{"name":"2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128803784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Multi-matcher dynamic signature recognition with protected and renewable templates 具有受保护和可更新模板的多匹配器动态签名识别
E. Maiorana, P. Campisi, A. Neri
{"title":"Multi-matcher dynamic signature recognition with protected and renewable templates","authors":"E. Maiorana, P. Campisi, A. Neri","doi":"10.1109/BIDS.2009.5507531","DOIUrl":"https://doi.org/10.1109/BIDS.2009.5507531","url":null,"abstract":"In this paper we present a protected multi-matcher dynamic signature verification system which exploits score-level fusion techniques to combine Hidden Markov Model (HMM) and Dynamic Time Warping (DTW) classifiers. The considered on-line signature templates are treated with repeatable and non-invertible transformations, able to generate secure and renewable templates which can be fed to function-based matchers such as HMM and DTW. An extensive set of experiments shows that the combined use of HMM and DTW based classifiers guarantees remarkable performances in terms of both recognition rates and template renewability, while providing proper security to the employed biometrics.","PeriodicalId":409188,"journal":{"name":"2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121496803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data acquisition and quality analysis of 3-dimensional fingerprints 三维指纹的数据采集与质量分析
Yongchang Wang, Q. Hao, Abhishika Fatehpuria, L. Hassebrook, D. Lau
{"title":"Data acquisition and quality analysis of 3-dimensional fingerprints","authors":"Yongchang Wang, Q. Hao, Abhishika Fatehpuria, L. Hassebrook, D. Lau","doi":"10.1109/BIDS.2009.5507527","DOIUrl":"https://doi.org/10.1109/BIDS.2009.5507527","url":null,"abstract":"This paper introduces a new technology of non-contact 3D fingerprint capture and processing for higher quality fingerprint data acquisition. The system relies on a real-time 3D sensor using structured light illumination (SLI), which generates both texture and detailed ridge depth information. The high resolution 3D scans are then converted into flat equivalent images. As a result, many limitations imposed upon conventional fingerprint capture and processing can be reduced by the unobtrusiveness of this approach and the extra depth information acquired. The image quality is evaluated and analyzed using NIST fingerprint image software. A comparison is performed between the unraveled 3D fingerprints and their 2D plain counterparts in terms of fingerprint quality.","PeriodicalId":409188,"journal":{"name":"2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130846393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Biometrics with physical exercise using Laser Doppler Vibrometry measurements of the carotid pulse 利用激光多普勒振动仪测量颈动脉脉搏与体育锻炼的生物特征
Mei Chen, J. O’Sullivan, A. D. Kaplan, Po-Hsiang Lai, E. Sirevaag, J. Rohrbaugh
{"title":"Biometrics with physical exercise using Laser Doppler Vibrometry measurements of the carotid pulse","authors":"Mei Chen, J. O’Sullivan, A. D. Kaplan, Po-Hsiang Lai, E. Sirevaag, J. Rohrbaugh","doi":"10.1109/BIDS.2009.5507536","DOIUrl":"https://doi.org/10.1109/BIDS.2009.5507536","url":null,"abstract":"Understanding the variability of the cardiacrelated signals caused by physical exercise is an interesting and important problem. To our knowledge, there is no paper evaluating the biometric consistency of the cardiovascular based signals during the physical exercise, or the extent to which the signals can recover after that. A novel method of remotely sensing mechanical activity related to the carotid pulse with Laser Doppler Vibrometry (LDV) has been developed. Encouraging results are obtained on the evaluation of the LDV cardiovascular signal as a biometric marker. A new protocol is set up to produce changes in heart rate by physical exercise. Spectral based approaches are applied following the success in general biometric authentication. An equal error rate of 2.8% for inter-state tests indicates that the LDV pulse signal is quite stable even after moderate physical exercise. The performance degrades during exercise, especially when the heart rate reaches 55% of the age-adjusted theoretical maximum heart rate. When the test individuals start resting, the performance improves as the heart rate recovered within seconds. We can say that the short-term variability caused by heart rate fluctuations and respiration changes recover with enough stability in a short time for biometric consistency.","PeriodicalId":409188,"journal":{"name":"2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132447802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Multiple Fingers Synchronization used for device mutual authentication 多指同步用于设备相互认证
Gregory G. Rose, Qing Li, Lu Xiao
{"title":"Multiple Fingers Synchronization used for device mutual authentication","authors":"Gregory G. Rose, Qing Li, Lu Xiao","doi":"10.1109/BIDS.2009.5507533","DOIUrl":"https://doi.org/10.1109/BIDS.2009.5507533","url":null,"abstract":"Performing mutual device authentication before providing services is a critical step for ensuring that the services are only accessible to legitimate users. This paper proposed a new form of biometric authentication, the Multiple Fingers Synchronization (MuFS) mutual authentication scheme which can be used for device mutual authentication. MuFS achieves comparable performance as traditional biometric authentication schemes such as fingerprint or face recognition in terms of False Rejection Rate (FRR), False Acceptance Rate (FAR) and Equal Error Rate (EER) under convenient user experience configurations. Additionally, the performance of MuFS is easily tuned by configuring the operation parameters. Unlike classic biometric authentication schemes, no user sensitive information such as fingerprint templates is disclosed to the verifier. The proposed scheme can be integrated with existing key agreement protocols to frustrate man-in-the-middle attacks.","PeriodicalId":409188,"journal":{"name":"2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114868762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iris recognition based on SIFT features 基于SIFT特征的虹膜识别
F. Alonso-Fernandez, Pedro Tome, Virginia Ruiz-Albacete, J. Ortega-Garcia
{"title":"Iris recognition based on SIFT features","authors":"F. Alonso-Fernandez, Pedro Tome, Virginia Ruiz-Albacete, J. Ortega-Garcia","doi":"10.1109/BIDS.2009.5507529","DOIUrl":"https://doi.org/10.1109/BIDS.2009.5507529","url":null,"abstract":"Biometric methods based on iris images are believed to allow very high accuracy, and there has been an explosion of interest in iris biometrics in recent years. In this paper, we use the Scale Invariant Feature Transformation (SIFT) for recognition using iris images. Contrarily to traditional iris recognition systems, the SIFT approach does not rely on the transformation of the iris pattern to polar coordinates or on highly accurate segmentation, allowing less constrained image acquisition conditions. We extract characteristic SIFT feature points in scale space and perform matching based on the texture information around the feature points using the SIFT operator. Experiments are done using the BioSec multimodal database, which includes 3,200 iris images from 200 individuals acquired in two different sessions. We contribute with the analysis of the influence of different SIFT parameters on the recognition performance. We also show the complementarity between the SIFT approach and a popular matching approach based on transformation to polar coordinates and Log-Gabor wavelets. The combination of the two approaches achieves significantly better performance than either of the individual schemes, with a performance improvement of 24% in the Equal Error Rate.","PeriodicalId":409188,"journal":{"name":"2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127870734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
On matching digital face images against scanned passport photos 关于将数字人脸图像与扫描护照照片进行匹配
T. Bourlai, A. Ross, Anil K. Jain
{"title":"On matching digital face images against scanned passport photos","authors":"T. Bourlai, A. Ross, Anil K. Jain","doi":"10.1109/bids.2009.5507528","DOIUrl":"https://doi.org/10.1109/bids.2009.5507528","url":null,"abstract":"In this paper the problem of matching high-resolution digital face images against low-resolution passport photos scanned from the original document is studied. The challenges involved in such a problem are quite different from those encountered by classical facial matching systems described in the literature. These challenges can be person-related, document-related or scanning device-related. Thus, the matching performance of face recognition algorithms can be significantly impacted when tested on passport photos scanned by an external device. The purpose of this paper is to illustrate the complexity of the passport facial matching problem and to provide a preliminary solution to it. The contributions of this work are two-fold. Firstly, a database of 25 subjects is assembled and used to illustrate the challenges associated with passport facial matching. Secondly, a pre-processing scheme is proposed in order to denoise and eliminate watermark traces that may be present in scanned passport photos. The application of such a pre-processing scheme is observed to improve the performance of classical face matching systems. To the best of our knowledge, this is the first time that this problem is being investigated in the open literature in the context of international passports exhibiting a variety of facial image qualities and security marks.","PeriodicalId":409188,"journal":{"name":"2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115588215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信