A. Lagorio, Marinella Cadoni, E. Grosso, M. Tistarelli
{"title":"A 3D algorithm for unsupervised face identification","authors":"A. Lagorio, Marinella Cadoni, E. Grosso, M. Tistarelli","doi":"10.1109/IWBF.2015.7110239","DOIUrl":"https://doi.org/10.1109/IWBF.2015.7110239","url":null,"abstract":"With the increasing availability of low-cost 3D data acquisition devices, the use of 3D face data for the recognition of individuals is becoming more appealing and computationally feasible. This paper proposes a completely automatic algorithm for face registration and matching. The algorithm is based on the extraction of stable 3D facial features characterizing the face and the subsequent construction of a signature manifold. The facial features are extracted by performing a continuous-to-discrete scale-space analysis. Registration is driven from the matching of triplets of feature points and the registration error is computed as shape matching score. Conversely to most techniques in the literature, a major advantage of the proposed method is that no data pre-processing is required. Therefore all presented results have been obtained exclusively from the raw data available from the 3D acquisition device. The method has been tested on the Bosphorus 3D face database and the performances compared to the ICP baseline algorithm. Even in presence of noise in the data, the algorithm proved to be very robust and reported identification performances which are aligned to the current state of the art, but without requiring any pre-processing of the raw data.","PeriodicalId":416816,"journal":{"name":"3rd International Workshop on Biometrics and Forensics (IWBF 2015)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116908417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards generating protected fingerprint templates based on bloom filters","authors":"Guoqiang Li, Bian Yang, C. Rathgeb, C. Busch","doi":"10.1109/IWBF.2015.7110224","DOIUrl":"https://doi.org/10.1109/IWBF.2015.7110224","url":null,"abstract":"In order to satisfy the requirements for security and privacy of biometric enrolment data records, it is essential to protect this reference data by applying appropriate template protection schemes. Bloom filters have been applied successfully on iris biometrics and face biometrics and achieved good result in terms of irreversibility and biometric performance. In this paper we study, whether it is feasible to employ Bloom filters on fingerprint templates. In order to be resilient with fingerprint sample variations, a pre-alignment process is applied prior to binary template generation. After generating the binary template matrix, we propose to subdivide the matrix and achieve a variable size of the binary template. Experiments were conducted on public databases to confirm the proposed ideas. According to experimental results, applying Bloom filters on fingerprint template doesn't degrade the accuracy of the fingerprint recognition system. Therefore, we can conclude that it is feasible to apply Bloom filters on fingerprint biometrics.","PeriodicalId":416816,"journal":{"name":"3rd International Workshop on Biometrics and Forensics (IWBF 2015)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126653888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Vera-Rodríguez, Rubén Tolosana, J. Ortega-Garcia, Julian Fierrez
{"title":"E-biosign: stylus- and finger-input multi-device database for dynamic signature recognition","authors":"R. Vera-Rodríguez, Rubén Tolosana, J. Ortega-Garcia, Julian Fierrez","doi":"10.1109/IWBF.2015.7110242","DOIUrl":"https://doi.org/10.1109/IWBF.2015.7110242","url":null,"abstract":"This paper describes the design, acquisition process and a baseline evaluation of e-BioSign, a new database of dynamic signature and handwriting. e-BioSign is comprised of 5 devices in total, three Wacom devices (DTU-500, DTU-530 and STU 1031) specifically designed to capture dynamic signatures and handwriting, and two Samsung general purpose tablets (Samsung Galaxy Note 10.1 and Samsung ATIV). For these two Samsung tablets data is collected using a pen stylus but also the finger to study the performance of signature verification in a mobile scenario. Data was collected in two sessions for 70 subjects, and includes dynamic information of the signature, the full name and number sequences. For signature and the full name skilled forgeries were also performed. A signature baseline evaluation is carried out for a predefined recognition system based on DTW, achieving a benchmark performance for each of the devices. The use of finger for signing achieves good results for the case of random forgeries (less than 1% EER), but the performance is degraded significantly for the case of skilled forgeries compared to the case using the pen stylus.","PeriodicalId":416816,"journal":{"name":"3rd International Workshop on Biometrics and Forensics (IWBF 2015)","volume":"401 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic analysis: on the capability of optical sensors to visualize latent fingerprints on rubber gloves","authors":"A. Makrushin, Kun Qian, C. Vielhauer, T. Scheidat","doi":"10.1109/IWBF.2015.7110229","DOIUrl":"https://doi.org/10.1109/IWBF.2015.7110229","url":null,"abstract":"Thin rubber gloves are worn by criminals to prevent depositing fingerprints at crime scenes and are favored because of their tight fit, allowing hands to remain dexterous. However, fingerprints may be recovered from the inside of the gloves. The high variety of glove materials does not allow for a unified forensic approach for gloves investigation. All approaches proposed so far imply intrusive destructive treatment of the evidence. In contrast, we investigate the applicability of two contactless non-destructive sensors, a chromatic white-light sensor (CWL) and a UV-VIS spectroscope (UVVS), for digitalizing latent fingerprints left on three rubber materials: vinyl, nitrile and latex. The sensors are used to explore the visibility of sebaceous fingerprints over time, with the focus on qualitative assessment of data acquisition scenarios. Experiments show that fingerprints on porous vinyl gloves become invisible to the naked eye within 15 minutes after deposition, making the substrate very challenging. Here, fresh fingerprints can be acquired only with CWL. Fingerprints on nitrile remain preserved between 2 hours and 2.5 days and can be better captured using UVVS due to the possibility of integrating images over a certain range of wavelengths. Fingerprints on non-porous latex remain almost unchanged for at least one month and can be successfully captured using either CWL or UVVS.","PeriodicalId":416816,"journal":{"name":"3rd International Workshop on Biometrics and Forensics (IWBF 2015)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124705611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Iorliam, A. Ho, N. Poh, Santosh Tirunagari, Patrick A. H. Bours
{"title":"Data forensic techniques using Benford's law and Zipf's law for keystroke dynamics","authors":"A. Iorliam, A. Ho, N. Poh, Santosh Tirunagari, Patrick A. H. Bours","doi":"10.1109/IWBF.2015.7110238","DOIUrl":"https://doi.org/10.1109/IWBF.2015.7110238","url":null,"abstract":"The selection and application of biometrics traits for authentication and identification have recently attracted a significant amount of research interest. In this paper we investigate the use of keystroke data to distinguish between humans using keystroke biometric systems and non-humans for auditing application. Recently, Benford's Law and Zipf's Law, which are both discrete Power law probability distributions, have been effectively used to detect fraud and discriminate between genuine data and fake/tampered data. As such, our motivation is to apply the Benford's Law and Zipf's Law on keystroke data and to determine whether they follow these laws and discriminate between humans using keystroke biometric systems from non-humans. From the results, we observe that, the latency values of the keystroke data from humans actually follow the Benford's law and Zipf's law, but not the duration values. This implies that, latency values from humans would follow the two laws, whereas the latency values from non-humans would deviate from the Benford's law and Zipf's law. Even though, the duration values from humans deviates from the Benford's law, they do follow a pattern that we can develop an accurate model for the duration values. We perform experiments using the benchmark data set developed by Killourhy and Maxion, CMU [1] and obtain divergences of 0.0008, 0.029 and 0.05 for the keyup-keydown (latency), keydown-keydown, and duration of the keystroke data, respectively. Moreover, P-value's of 0.7770, 0.6230 and 0.0160 are obtained for the keyup-keydown (latency), keydown-keydown, and duration of the keystroke data, respectively. We observe that the latency (which is the time elapsed between release of the first key and pressing down of the next key) is one of the most important features used by administrators for auditing purposes to detect anomalies during their employees logging into their company system.","PeriodicalId":416816,"journal":{"name":"3rd International Workshop on Biometrics and Forensics (IWBF 2015)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125161872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Full fingerprint scanner using optical coherence tomography","authors":"R. Breithaupt, Ctirad Sousedik, S. Meissner","doi":"10.1109/IWBF.2015.7110228","DOIUrl":"https://doi.org/10.1109/IWBF.2015.7110228","url":null,"abstract":"In recent years, several advances in fingerprint scanning technology regarding cost efficiency, quality&performance and presentation attack detection (PAD) helped to establish fingerprint biometry in more and more areas of application for mainstream as well as high security/governmental purposes. However, there are still cases where the current state of the art is struggling with the technological limitations. Worn out fingers, and even more fingers of infants, are very problematic to scan in sufficient quality. But even more important, in the field of unsupervised high security applications, is the fact that even those devices with the best available PAD protection can still be fooled with cheap artefacts - despite their current high complexity and increasing difficulty of improvements. On the lookout for technological alternatives, the optical coherence tomography (OCT) came into our focus. The OCT is able to look underneath the skin and acquire high resolution 3D images up to a depth of 2mm. First feasibility studies have shown a very high potential for solving the mentioned issues (and more) but have been conducted with existing medical OCT devices, which were, in many aspects, not suitable for for the time- cost- and mobility requirements of real world applications. For this reason, the goal for our current project ”OCT-II” is to develop state-of-the-art OCT prototypes solely dedicated for high quality fingerprint acquisition and reliable PAD, with the focus on real world constrains regarding scanning area size, high speed data acquisition & data processing, cost and mobility. This paper will present and discuss the challenges and concepts of this project.","PeriodicalId":416816,"journal":{"name":"3rd International Workshop on Biometrics and Forensics (IWBF 2015)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124499091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Rowshan, Carla Guerra, P. Correia, Luís Ducla Soares
{"title":"Robust frontal gait recognition – merging viewpoints and depth ranges","authors":"B. Rowshan, Carla Guerra, P. Correia, Luís Ducla Soares","doi":"10.1109/IWBF.2015.7110230","DOIUrl":"https://doi.org/10.1109/IWBF.2015.7110230","url":null,"abstract":"This paper proposes a frontal gait recognition system using a single camera, which is robust to changes in clothing and carrying condition. User silhouettes are derived from 2D plus depth (2.5D) sequences, using background subtraction. Silhouettes are integrated into a 3D point cloud, corresponding to a marching in place (MIP) representation of the sequence of observed silhouettes. Features are then extracted from frontal, top and side viewpoints of the MIP. Additionally, this paper proposes the novel usage of multiple depth range segments of the frontal silhouette view, to better exploit some of the user distinctive motion information. The Histogram of Oriented Gradient (HOG) descriptor is applied to each of the considered views and to three depth range segments. Fusion of the resulting descriptors is tested at feature, score and decision levels. The proposed method is evaluated on the IST 2.5D frontal gait dataset, composed of 30 test subjects, walking under different clothing and carrying conditions, acquired on different days. Experimental results show that combining the proposed descriptors outperforms state of the art methods, achieving a recognition rate of 100% for the considered database.","PeriodicalId":416816,"journal":{"name":"3rd International Workshop on Biometrics and Forensics (IWBF 2015)","volume":"151 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120877580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Kotzerke, Stephen A. Davis, Robert Hayes, L. Spreeuwers, R. Veldhuis, K. Horadam
{"title":"Discriminating fingermarks with evidential value for forensic comparison","authors":"J. Kotzerke, Stephen A. Davis, Robert Hayes, L. Spreeuwers, R. Veldhuis, K. Horadam","doi":"10.1109/IWBF.2015.7110220","DOIUrl":"https://doi.org/10.1109/IWBF.2015.7110220","url":null,"abstract":"Law enforcement agencies all around the world are using biometrics and especially fingerprints to solve and fight crime. Often forensic experts are needed to record fingermarks at crime scenes and to ensure that those captured are of forensic value. In times of increased demand for forensic services, this process needs to be automated and streamlined as much as possible to improve efficiency and reduce workload. Hence, we investigate if the forensic evidential value (suitability for forensic analysis and/or examination) of fingermark images can be determined at an early stage automatically without any expert involvement, especially when using a mobile phone camera. We explore different factors such as the capture device and the constraints inferred, image feature sets and classifiers used, and their interplay. A database of 1;428 pseudo fingermarks has been collected and its ground truth, whether a mark is of forensic value or not, has been determined by 3 experts. The lowest equal error rate achieved, when using a mobile phone to capture the marks, is 13:62%. These promising results suggest that it might be possible to streamline forensic procedures by the application of an independent automated tool to assist with certain tasks.","PeriodicalId":416816,"journal":{"name":"3rd International Workshop on Biometrics and Forensics (IWBF 2015)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Techniques for a forensic analysis of the CASIA-IRIS V4 database","authors":"L. Debiasi, A. Uhl","doi":"10.1109/IWBF.2015.7110236","DOIUrl":"https://doi.org/10.1109/IWBF.2015.7110236","url":null,"abstract":"The photo response non-uniformity (PRNU) of a sensor can be useful to enhance a biometric systems security by ensuring the authenticity and integrity of images acquired with a biometric sensor, e.g. by performing a source device identification. Previous studies regarding the feasibility of this application have been conducted on the CASIA-Iris V4 database by studying the differentiability of the sensors PRNU fingerprints. The results showed a high variation among the different subsets of the database. It was assumed that this high variation could either be caused by correlated data or that different sensors may have been used for the acquisition of the subsets. To investigate the latter case we perform a forensic investigation on the CASIA-Iris V4 database, since there is no specific documentation on the number of sensors used for the acquisition. We apply an existing forensic technique and we propose several novel forensic techniques to establish a ground truth of how many sensors have been used to a acquire a digital image data set in a blind manner and without any a priori knowledge.","PeriodicalId":416816,"journal":{"name":"3rd International Workshop on Biometrics and Forensics (IWBF 2015)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127886676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How synthetic fingerprints can improve pre-selection of mcc pairs using local quality measures","authors":"M. H. Izadi, A. Drygajlo","doi":"10.1109/IWBF.2015.7110232","DOIUrl":"https://doi.org/10.1109/IWBF.2015.7110232","url":null,"abstract":"A major source of errors in fingerprint recognition systems is poor quality of fingerprints. Local quality of fingerprints plays an important role in these systems to ensure high recognition performance. Recently an improved fingerprint matching method is proposed to use minutiae information encoded by Minutia Cylinder-Code (MCC) together with cylinder quality measures as local quality measures associated to each MCC descriptor. In this paper, we present our work where we have taken the advantage of a varying quality data set of synthetic fingerprint images in order to improve the pre-selection of MCC pairs using local quality measures. Since ground truth minutiae information is available for the synthetic fingerprints, we could create a large set of genuine/impostor minutiae as well as genuine/impostor MCC pairs. Subsequently a 2-class (genuine vs. impostor) classification model is proposed to modify the local similarity scores using two quality related local features, namely the cylinder quality measures and the number of extracted minutiae in the cylinders. Our experiments on synthetic and real data show that the local similarity scores modified through the proposed approach improve the pre-selection as well as global matching performance.","PeriodicalId":416816,"journal":{"name":"3rd International Workshop on Biometrics and Forensics (IWBF 2015)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124939825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}