2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)最新文献

筛选
英文 中文
Touch gesture-based authentication: A security analysis of Pattern Unlock 基于触摸手势的身份验证:模式解锁的安全性分析
Nasiru Ibrahim, H. Sellahewa
{"title":"Touch gesture-based authentication: A security analysis of Pattern Unlock","authors":"Nasiru Ibrahim, H. Sellahewa","doi":"10.1109/ISBA.2017.7947711","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947711","url":null,"abstract":"Pattern Unlock is one in a family of graphical passwords used on smart mobile devices. They were proposed as an alternative to PIN and Password, as a result of a study [2] that showed better human memorability of visuals words than textual. Researchers have made several attempts to analyse and quantify the security of Pattern Unlock. However, only a few studies have been done on human characteristics and the correlation to choice of patterns.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122002508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Millimetre wave person recognition: Hand-crafted vs learned features 毫米波人物识别:手工制作与学习特征
E. González-Sosa, R. Vera-Rodríguez, Julian Fierrez, Vishal M. Patel
{"title":"Millimetre wave person recognition: Hand-crafted vs learned features","authors":"E. González-Sosa, R. Vera-Rodríguez, Julian Fierrez, Vishal M. Patel","doi":"10.1109/ISBA.2017.7947692","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947692","url":null,"abstract":"Imaging using millimeter waves (mmWs) has many advantages including ability to penetrate obscurants such as clothes and polymers. Although conceal weapon detection has been the predominant mmW imaging application, in this paper, we aim to gain some insight about the potential of using mmW images for person recognition. We report experimental results using the mmW TNO database consisting of 50 individuals based on both hand-crafted and learned features from Alexnet and VGG-face pretrained CNN models. Results suggest that: i) mmW torso region is more discriminative than mmW face and the entire body, ii) CNN features produce better results compared to hand-crafted features on mmW faces and the entire body, and iii) hand-crafted features slightly outperform CNN features on mmW torso.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129033786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Parameter adjustment of finger vein recognition algorithms 手指静脉识别算法参数调整
He Zheng, Yapeng Ye, Shilei Liu, Liao Ni, Yi Zhang, Houjun Huang, Wenxin Li
{"title":"Parameter adjustment of finger vein recognition algorithms","authors":"He Zheng, Yapeng Ye, Shilei Liu, Liao Ni, Yi Zhang, Houjun Huang, Wenxin Li","doi":"10.1109/ISBA.2017.7947697","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947697","url":null,"abstract":"Finger vein recognition is a biometric method utilizing the vein patterns inside one's fingers for personal identification. Recognition algorithm is the key part of a finger vein recognition system, dominating the system performance. There are usually a lot of parameters in algorithms, and different values of the parameters could lead to different system performance so that it is essential to set a proper value for each parameter in practice. In this paper, we conduct a set of experiments to study how the parameters influence the performance measured by equal error rate. We have made two observations from the results: 1.When an algorithm is applied on a dataset, the performance differs a lot as the parameter value changes even in a small range; 2.When an algorithm is applied on different datasets, the performance differs a lot, in other words, the optimized parameter value combination that maximizes the system performance differs significantly. These two observations reveal the importance of parameter adjustment in finger vein recognition. So this paper proposes two solutions: search algorithm and estimation by subset, which are fast, accurate and scalable methods to find the best parameters. The experiment results prove the effectiveness of our methods.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"28 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121003458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Finger knuckle image based personal authentication using DeepMatching 基于手指关节图像的深度匹配个人认证
Gaurav Jaswal, A. Nigam, R. Nath
{"title":"Finger knuckle image based personal authentication using DeepMatching","authors":"Gaurav Jaswal, A. Nigam, R. Nath","doi":"10.1109/ISBA.2017.7947706","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947706","url":null,"abstract":"Recently under the lights of mega Indian Aadhaar [2] project, Indian government has been trying to initiate a robust linkage between several financial inclusion schemes (such as NREGA and MNREGA) and biometric based personal authentication mechanism. This will ensure a corruption free realization and management of such policies. Among commonly used biometric traits, fingerprint is the most accepted mode of identification. However, fingerprints are found monotonous in case of laborers and workers due to rough usages of hand in variety of day-to-day works. This will seriously affect any such initiation adversely, especially in India, which is primarily a rural country. On the contrary, quality of finger dorsal patterns remain better under such situations. In this work, we are proposing a novel finger-knuckle based biometric system to check the escapes that are present in transfer of payments through the various levels of bureaucracy financial inclusion projects. The method is based on finger knuckle local features that has been preprocessed by using ROI extraction, enhancement and proposed feature transformation schemes. In the classification process, a novel Deep-matching technique has been used to match the non-rigid regions between finger knuckle images. The experimental evaluation of proposed system has been carried out using publicly available PolyU finger-knuckle-print database of 8000 images collected from 165 subjects. Our results demonstrate the discriminative ability of transformed knuckle features (CRR-99.10%, and EER-0.98%) in improving the performance of traditional FKI biometric system.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132972482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On the vulnerability of extended Multispectral face recognition systems towards presentation attacks 扩展多光谱人脸识别系统对表示攻击的脆弱性研究
Ramachandra Raghavendra, K. Raja, S. Venkatesh, F. A. Cheikh, C. Busch
{"title":"On the vulnerability of extended Multispectral face recognition systems towards presentation attacks","authors":"Ramachandra Raghavendra, K. Raja, S. Venkatesh, F. A. Cheikh, C. Busch","doi":"10.1109/ISBA.2017.7947698","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947698","url":null,"abstract":"Presentation attacks (a.k.a, direct attacks or spoofing attacks) against face recognition systems have emerged as a serious security threat. To mitigate these attacks on conventional face recognition systems, several Presentation Attack Detection (PAD) algorithms have been developed, which address various Presentation Attack Instruments (PAI) including 3D face masks, 2D photo, wrap photo and electronic display, that can be used for the attack. In this paper, we demonstrate and evaluate the vulnerability of an extended Multispectral face recognition system. The extended Multispectral system captures the face image across various spectral bands, thus, we propose to study each of these spectral bands for the vulnerability towards presentation attacks. We have employed a commercial Multispectral camera - SpectraCam™ that can capture seven different spectral bands to collect both bona-fide (a.k.a, live or normal or real) samples as well as artefact (or spoof) face samples. Extensive experiments are carried out on the newly compiled database to provide insights on the vulnerability of the extended Multispectral face system towards PAI generated using a printer. We have created the face artefacts using two different printers, which include laser and inkjet printers. Further, we have also evaluated the state-of-the-art PAD algorithms that are widely employed in conventional face PAD systems. Our study reveals the vulnerability of extended Multispectral face recognition system with respect to the print attack. The results obtained using state-of-the-art PAD algorithms further indicate the challenge to detect the presentation attacks in extended Multispectral face recognition systems.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129393313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Template ageing and quality analysis in time-span separated fingerprint data 时间跨度分离指纹数据的模板老化与质量分析
Simon Kirchgasser, A. Uhl
{"title":"Template ageing and quality analysis in time-span separated fingerprint data","authors":"Simon Kirchgasser, A. Uhl","doi":"10.1109/ISBA.2017.7947680","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947680","url":null,"abstract":"We confirm earlier findings on the existence of significant fingerprint template ageing on a dataset acquired with commercial off-the-shelf optical fingerprint sensors exhibiting a time-span of 4 years using two different minutiae-based recognition schemes. A subsequent analysis of the quality of imprints involved in false matches (type 1 and type 2 errors, respectively) does not give clear evidence that reduced quality of time-separated data can be made responsible for the observed template ageing effects. Thus, the cause for the observed template ageing remains unclear and is subject to further investigation.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131301676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An enhanced statistical approach for median filtering detection using difference image 差分图像中值滤波检测的改进统计方法
Hardik Jain, Joydeep Das, H. Verma, N. Khanna
{"title":"An enhanced statistical approach for median filtering detection using difference image","authors":"Hardik Jain, Joydeep Das, H. Verma, N. Khanna","doi":"10.1109/ISBA.2017.7947704","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947704","url":null,"abstract":"In image forensics, detection of image forgeries involving non-linear manipulations have received a great deal of interest in recent past. Median filtering (MF) is one such non-linear manipulation technique which is quite often used in number of applications such as to hide impulse noises. Unlike other linear filtering operations, non-linear characteristics of median filtering makes it harder to detect using traditional forensics methods designed for detecting linear operations. This work utilizes adjacent pixels of difference image corresponding to input as well as MF version of input image for extracting proposed Local Expectation Features (LEF). These features when combined with an existing feature set Global-Local feature show significant improvement in MF detection. Evaluation of the proposed method under various forensic scenarios demonstrate consistent improvement in classification accuracy for a wide range of image sizes and compression ratios as compared to the existing methods for MF detection.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115298107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic speech emotion detection system using multi-domain acoustic feature selection and classification models 基于多域声学特征选择和分类模型的语音情感自动检测系统
Nancy Semwal, Abhijeet Kumar, Sakthivel Narayanan
{"title":"Automatic speech emotion detection system using multi-domain acoustic feature selection and classification models","authors":"Nancy Semwal, Abhijeet Kumar, Sakthivel Narayanan","doi":"10.1109/ISBA.2017.7947681","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947681","url":null,"abstract":"Emotions exhibited by a speaker can be detected by analyzing his/her speech, facial expressions and gestures or by combining these properties. This paper concentrates on determining the emotional state from speech signals. Various acoustic features such as energy, zero crossing rate(ZCR), fundamental frequency, Mel Frequency Cepstral Coefficients (MFCCs), etc are extracted for short term, overlapping frames derived from the speech signal. A feature vector for every utterance is then constructed by analyzing the global statistics (mean, median, etc) of the extracted features over all frames. To select a subset of useful features from the full candidate feature vector, sequential backward selection (SBS) method is used with k-fold cross validation. Detection of emotion in the samples is done by classifying their respective feature vectors into classes, using either a pre-trained Support Vector Machine (SVM) model or Linear Discriminant Analysis (LDA) classifier. This approach is tested with two acted emotional databases - Berlin Database of Emotional Speech (EmoDB), and BML Emotion Database (RED). For multi class classification, accuracy of 80% for EmoDB and 73% for RED is achieved which are higher than or comparable to previous works on both the databases.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128000318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Constraint patch matching for faster person re-identification 约束贴片匹配,加快人员再识别
Aske R. Lejbølle, Kamal Nasrollahi, T. Moeslund
{"title":"Constraint patch matching for faster person re-identification","authors":"Aske R. Lejbølle, Kamal Nasrollahi, T. Moeslund","doi":"10.1109/ISBA.2017.7947703","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947703","url":null,"abstract":"In person re-identification, it is of great importance to extract very discriminative features in order to distinguish between images of different persons captured in different camera views. Features can be extracted globally from the entire or parts of the image, or locally from patches. As a result, matching can either be done using global feature descriptors or local patch features with the latter being more computationally heavy due to the number of patch pairs to match. Horizontal constraints are therefore usually added to only match patches at same horizontal location. As an extension, we propose an algorithm which adds vertical constraints to different body parts, to increase accuracy and decrease processing time. The constraints are applied to the CVPDL system by Li et al. [13] in order to compare accuracy with the use of a foreground mask and processing time when only adding horizontal constraints. We refer to our constrained CVPDL as C-CVPDL. Experiments conducted on two datasets, VIPeR and CUHK01, show C-CVPDL to achieve similar rank-1 accuracy on VIPeR while improving rank-1 accuracy by 3.83% for CUHK01 compared to CVPDL. Furthermore, experimental results on CUHK03 show a rank-1 accuracy 52.05%, being comparable to state-of-the-art CNN's and beating other patch matching systems. Finally, timings for VIPeR and CUHK01 show our constraints to decrease time by 32.77% and 37%, respectively, while only taking up to 36ms to compute per person.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133503671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel palmprint recognition system using patch based filter response 基于贴片滤波响应的掌纹识别系统
Saiyed Umer, B. Dhara, B. Chanda
{"title":"A novel palmprint recognition system using patch based filter response","authors":"Saiyed Umer, B. Dhara, B. Chanda","doi":"10.1109/ISBA.2017.7947688","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947688","url":null,"abstract":"A novel palmprint recognition system is proposed in this paper. The proposed system consists of pre-processing, feature extraction and classification components. During preprocessing a region-of-interest for palm texture is extracted from a given hand image and for this thresholding and mathematical morphological based operators are employed. The features extracted from the detected palmprint texture is based on a method of ordering the codebook patterns obtained from patch based filter responses with a new way of feature representation scheme. Finally a multi-class linear SVM classifier is employed to do the classification job. The performance of the proposed palmprint recognition system is tested on four benchmark hand image databases, namely IITD, POLYU, CASIA and BOSPHORUS and this shows the efficacy of the proposed method.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122479445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信