{"title":"Pre-trained classifiers with One Shot Similarity for context aware face verification and identification","authors":"Monika Sharma, R. Hebbalaguppe, L. Vig","doi":"10.1109/ISBA.2017.7947687","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947687","url":null,"abstract":"Most affect based systems analyse facial expressions for emotion detection, and utilize face detection and recognition methods in order to do effective affect analysis. Recent work has demonstrated the efficacy of deep architectures for face recognition by training as classifiers on voluminous datasets. Some architectures are trained as classifiers, and some directly learn an embedding via a triplet loss function. In this paper, we consider the case of one shot prediction from the feature space learnt initially via classification, i.e. we consider the situation where we have a pre-trained model, but do not have access to the training data and are required to make predictions on novel faces with just one training image per identity. We utilize the one shot similarity metric in order to compute similarity scores and compare it with the state-of-the-art results on the Youtube videos face dataset (YTF). We demonstrate the effect of temporal context on frame wise face recognition, and use a probabilistic majority voting scheme over past frames to determine current frame identity. Additionally, we found a number of labelling errors in the Youtube face dataset that were not published in the errata, and have published the same online for the benefit of the community.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121493751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anatomy of secondary features in keystroke dynamics - achieving more with less","authors":"Yan Lindsay Sun, Hayreddin Çeker, S. Upadhyaya","doi":"10.1109/ISBA.2017.7947691","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947691","url":null,"abstract":"Keystroke dynamics is an effective behavioral biometric for user authentication at a computer terminal. While many distinctive features have been used for the analysis of acquired user patterns and verification of users transparently, a group of features such as Shift and Comma has always been overlooked and treated as noise. In this paper, we define these normally ignored features as secondary features and investigate their effectiveness in user verification/authentication. By evaluating all the available secondary features, we have found that they contain valuable information that is characteristic of individuals. With a limited number of secondary features, we achieved a promising Equal Error Rate (EER) of 2.94% and Area Under the ROC Curve (AUC) of 0.9940 for classification on a publicly available data set. Surprisingly, this result compares well with the results obtained from primary features by other researchers and we are able to achieve quality results with fewer data records, indicating a reduced training time in comparison.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132813701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BioSoft - a multimodal biometric database incorporating soft traits","authors":"Debanjan Sadhya, Parth Pahariya, Rishi Yadav, Apoorv Rastogi, Ayush Kumar, Lakshya Sharma, S. Singh","doi":"10.1109/ISBA.2017.7947693","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947693","url":null,"abstract":"Biometrics is an automated authentication mechanism that allows the identification or verification of individuals based on unique physiological and behavioral characteristics. In addition to novel biometric recognition frameworks and protocols, standard databases containing sample biometric traits are essential for validating the obtained results. In this paper, we introduce a new multimodal database named BioSoft which consists of biometric data collected from 75 individuals. In comparison to the already existing databases, BioSoft contains a set of 23 soft biometric traits corresponding to each enrolled individual. This property makes our database very useful due to the unavailability of any other manually extracted multimodal database incorporating soft biometric characteristics. Additionally, the primary biometric modalities of face, ear, iris, voice, handwriting and fingerprints (obtained from two different sensors) are present in this database. Thus our database contains both physiological and behavioral characteristics of individuals, thus making it applicable for validating a wide variety of approaches.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133688571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-object trajectory coupling using online target specific decision making","authors":"Tapas Badal, N. Nain, Mushtaq Ahmed","doi":"10.1109/ISBA.2017.7947702","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947702","url":null,"abstract":"The color and gradient based sequential state estimation method has proved its applicability in many video based tracking applications. This paper proposes a multi-modal approach applicable to trajectory formation of multiple moving objects with complex random motion structure. The Bayesian framework for tracking is formulated in this paper that incorporate spatio temporal information in selecting significant particles and establishing statistical correlation between prior model of target and its recent observation. It is especially applicable to real time trajectory analysis of situations with miss detection and formation of segmented tracks belonging to same object. The quantitative as well as qualitative performance of the proposed approach is evaluated on various real-world video sequences with challenging environment like random movement between objects and partial occlusion. The proposed approach performs better than other state-of-art method used for multiple moving objects tracking in videos.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134099442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling interactive sensor-behavior with smartphones for implicit and active user authentication","authors":"Yufei Chen, Chao Shen, Zhao Wang, Tianwen Yu","doi":"10.1109/ISBA.2017.7947694","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947694","url":null,"abstract":"While the public enjoy the convenience aroused by the proliferation of the smartphones, they also face the risk of exposing their sensitive and secure information to attackers. Extant smartphone authentication methods (e.g., PIN and fingerprint) typically provide one-time identity verification, but the verified user is still subject to session hijacking or masquerading attacks. In this paper, we propose a framework and performance analysis of using onboard-sensor behavior for continuous user authentication on smartphones, which can implicitly and continuously verifies the presence of a smartphone user. When a user carries the smartphone to do daily activities, time-, frequency- and wavelet-domain features are extracted from smartphone sensor data for accurately depicting users' motion patterns. A decision procedure based on one-class learning algorithms is developed and employed in the feature space to perform the continuous authentication task. Analyses are conducted based on sensor-interaction data on five typical daily activities with 27,681 samples across five phonecarrying positions. Extensive experiments in two specific scenarios are included to examine the efficacy of the proposed approach, which achieves a relatively high accuracy with the equal-error rate achieves 2.40% and 5.50% respectively. Our authentication system can be seamlessly integrated with extant smartphone authentication mechanisms, and is nonintrusive to users and does not need extra hardware.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127626966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid model for CFA interpolation detection","authors":"H. Verma, Arunav Saikia, N. Khanna","doi":"10.1109/ISBA.2017.7947705","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947705","url":null,"abstract":"With the dawn of the digital era and online availability of multimedia, cases like copyright infringement, violation of intellectual property rights and breach of privacy are not so rare. Consequently one has to find out the culprit responsible for such illegal actions. This work presents a passive approach based on intrinsic signature of in-camera color filter array (CFA) interpolation to classify imaging devices. Cameras available in consumer electronics market have two major types of sensor arrays (viz. single sensor and multi-sensor). Depending on the type of sensor array, different processing steps may be employed in these cameras. One such processing step is CFA interpolation which is employed in single sensor camera but not in multi-sensor camera. This work presents a hybrid model for detection of presence or absence of CFA interpolation in camera captured images, which leads to the classification of source camera into two classes. The performance of proposed approach is evaluated by testing on images captured with both types of cameras.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115946788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Passive fingerprinting for wireless devices: A multi-level decision approach","authors":"Chao Shen, Ruiyuan Lu, Saeid Samizade, Liang He","doi":"10.1109/ISBA.2017.7947689","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947689","url":null,"abstract":"Passive wireless-device fingerprinting - the act of passively and automatically identifying specific types of wireless devices through sequential analysis of wireless traffic - is useful for network monitoring and management. This study presents a novel passive fingerprinting approach for wireless devices, by modeling network traffic with carefully chosen wireless parameters from 802.11 frames, and developing multi-level classification algorithm to perform task of device fingerprinting. Specifically, we systematically evaluate a set of traffic parameters with respect to their stability and discriminability of identifying wireless devices. We employ a distribution-based measurement to obtain signature for each wireless device. We then develop a decision-tree-based multi-level classifier for device fingerprinting. Experimental results show that the parameters of transmission time and inter-arrival time are much more stable for device fingerprinting, and the approach achieves a practically useful level of performance.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132321718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pore based indexing for High-Resolution Fingerprints","authors":"V. Anand, Vivek Kanhangad","doi":"10.1109/ISBA.2017.7947685","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947685","url":null,"abstract":"Most of the existing fingerprint indexing algorithms are based on either macro-level (level-1) details such as singularities or level-2 details such as minutiae in the fingerprint image. Level-3 features such as pores have not been explored much for fingerprint indexing as it requires fingerprint scanners with resolution greater than 1000 dpi. However, pores in fingerprint images are known to contain a significant amount of discriminatory information. Therefore, there is a need to investigate the effectiveness of pore features for fingerprint indexing. This paper presents a fingerprint indexing algorithm based on pore features which are extracted by applying Delaunay triangulation on the detected pores. Experiments are performed on the publicly available High Resolution Fingerprint (HRF) database (DBII). Performance measures from our experiments show the effectiveness of the proposed indexing algorithm and indicate that pore features alone are viable for fingerprint indexing.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123822730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Yambay, Brian Walczak, S. Schuckers, A. Czajka
{"title":"LivDet-Iris 2015 - Iris Liveness Detection Competition 2015","authors":"David Yambay, Brian Walczak, S. Schuckers, A. Czajka","doi":"10.1109/ISBA.2017.7947701","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947701","url":null,"abstract":"Presentation attacks such as printed iris images or patterned contact lenses can be used to circumvent an iris recognition system. Different solutions have been proposed to counteract this vulnerability with Presentation Attack Detection (commonly called liveness detection) being used to detect the presence of an attack, yet independent evaluations and comparisons are rare. To fill this gap we have launched the first international iris liveness competition in 2013. This paper presents detailed results of its second edition, organized in 2015 (LivDet-Iris 2015). Four software-based approaches to Presentation Attack Detection were submitted. Results were tallied across three different iris datasets using a standardized testing protocol and large quantities of live and spoof iris images. The Federico Algorithm received the best results with a rate of rejected live samples of 1.68% and rate of accepted spoof samples of 5.48%. This shows that simple static attacks based on paper printouts and printed contact lenses are still challenging to be recognized purely by software-based approaches. Similar to the 2013 edition, printed iris images were easier to be differentiated from live images in comparison to patterned contact lenses.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116583855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quasi-straightness based features for off-line verification of signatures","authors":"Md. Ajij, Sanjoy Pratihar","doi":"10.1109/ISBA.2017.7947708","DOIUrl":"https://doi.org/10.1109/ISBA.2017.7947708","url":null,"abstract":"Person identification from their signatures or verifying the genuineness of official documents like bank cheques, certificates, contract forms, bonds etc. still remains a challenging task when accuracy and computation time are concerned. In this paper, a novel set of features based on the distribution of the quasi-straight line segments has been presented for off-line signature verification. For the detection of the set of quasi-straight line segments, defining the signature boundary, 8-N chain codes are used. Twelve different classes of quasi-straight line segments are obtained depending upon the orientations of the line segments. Subsequently, the feature set is obtained from those twelve classes. Support Vector Machine (SVM) classifier has been used by us for verification. Results on standard signature databases like CEDAR (Center of Excellence for Document Analysis and Recognition) database and GPDS-100 (Grupo de Procesado Digital de la Senal) are shown to adjudge the fitness of the proposed method.","PeriodicalId":436086,"journal":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128648488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}