IET Biometrics最新文献

筛选
英文 中文
Activity-based electrocardiogram biometric verification using wearable devices 使用可穿戴设备进行基于活动的心电图生物特征验证
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-12-16 DOI: 10.1049/bme2.12105
Hazal Su Bıçakcı, Marco Santopietro, Richard Guest
{"title":"Activity-based electrocardiogram biometric verification using wearable devices","authors":"Hazal Su Bıçakcı,&nbsp;Marco Santopietro,&nbsp;Richard Guest","doi":"10.1049/bme2.12105","DOIUrl":"https://doi.org/10.1049/bme2.12105","url":null,"abstract":"<p>Activity classification and biometric authentication have become synonymous with wearable technologies such as smartwatches and trackers. Although great efforts have been made to develop electrocardiogram (ECG)-based biometric verification and identification modalities using data from these devices, in this paper, we explore the use of adaptive techniques based on prior activity classification in an attempt to enhance biometric performance. In doing so, we also compare two waveform similarity distances to provide features for classification. Two public datasets which were collected from medical and wearable devices provide a cross-device comparison. Our results show that our method is able to be used for both wearable and medical devices in activity classification and biometric verification cases. This study is the first study which uses only ECG signals for both activity classification and biometric verification purposes.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 1","pages":"38-51"},"PeriodicalIF":2.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12105","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50143033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Guest editorial: Recent advances in representation learning for robust biometric recognition systems 鲁棒生物识别系统的表示学习研究进展
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-10-31 DOI: 10.1049/bme2.12104
Imad Rida, Gian Luca Marcialis, Lunke Fei, Dan Istrate, Julian Fierrez
{"title":"Guest editorial: Recent advances in representation learning for robust biometric recognition systems","authors":"Imad Rida,&nbsp;Gian Luca Marcialis,&nbsp;Lunke Fei,&nbsp;Dan Istrate,&nbsp;Julian Fierrez","doi":"10.1049/bme2.12104","DOIUrl":"10.1049/bme2.12104","url":null,"abstract":"&lt;p&gt;Over the past few decades, biometric security is increasingly becoming an important tool to enhance security and brings greater convenience. Nowadays, biometric systems are widely used by government agencies and private industries. Though a growing effort has been devoted in order to develop robust biometric recognition systems that can operate in various conditions, many problems still remain to be solved, including the design of techniques to handle varying illumination sources, occlusions and low quality images resulting from uncontrolled acquisition conditions.&lt;/p&gt;&lt;p&gt;The performance of any biometric recognition system heavily depends on finding a good and suitable feature representation space satisfying, smoothness, cluster, manifold, sparsity and temporal/spatial coherence, where observations from different classes are well separated. Unfortunately, finding this proper representation is a challenging problem which has taken a huge interest in machine learning and computer vision communities.&lt;/p&gt;&lt;p&gt;Representation learning methods can be organised in two main groups: ‘intra-class’ and ‘inter-class’. In the first group, the techniques seek to extract useful information from the raw data itself. They broadly range from conventional hand-crafted feature design based on the human knowledge about the target application (SIFT, Local Binary Patterns, HoG, etc.), to dimensionality reduction techniques (PCA, linear discriminant analysis, Factor Analysis, isometric mapping, Locally Linear Embedding, etc.) and feature selection (wrapper, filter, embedded), until the recent deep representations which achieved state-of-the-art performances in many applications.&lt;/p&gt;&lt;p&gt;The ‘inter-class’ techniques seek to find a structure and relationship between the different data observations. In this group, we can find metric/kernel learning, investigating the spatial or temporal relationship among different examples, while subspace/manifold learning techniques seek to discover the underlying inherent structural property.&lt;/p&gt;&lt;p&gt;The objective of this special issue is to provide a stage for worldwide researchers to publish their recent and original results on representation learning for robust biometric systems. There are in total eight articles accepted for publication in this Special Issue through careful peer reviews and revisions.&lt;/p&gt;&lt;p&gt;Li et al. introduced a watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) to address the poor robustness of the image watermarking algorithms to geometric attacks. Firstly, the extracted features using AKAZE-DCT are combined with the perceptual hashing, then, the watermarking image is encrypted with logistic chaos dislocation, finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results showed that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility.&lt;/p&gt;&lt;p&gt;","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"531-533"},"PeriodicalIF":2.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12104","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48958342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust covariate-invariant gait recognition based on pose features 基于姿态特征的鲁棒协变量不变步态识别
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-10-20 DOI: 10.1049/bme2.12103
Anubha Parashar, Apoorva Parashar, Rajveer Singh Shekhawat
{"title":"A robust covariate-invariant gait recognition based on pose features","authors":"Anubha Parashar,&nbsp;Apoorva Parashar,&nbsp;Rajveer Singh Shekhawat","doi":"10.1049/bme2.12103","DOIUrl":"10.1049/bme2.12103","url":null,"abstract":"<p>Gait recognition uses video of human gait processed by computer vision methods to identify people based on walking style. The complexity introduced by covariates makes the previous methods less efficient and inaccurate. This study proposes an approach based on pose features to attempt gait recognition of people with an overcoat, carrying objects, or other covariates. It aims to estimate human locomotion using Convolutional Neural Networks. Gathering video data, extracting video frames in a particular order, posture estimation for each frame, using multilayer RNN for gait recognition from the pose, and obtaining one-dimensional object vectors, are all critical steps. Furthermore, these one-dimensional identification vectors are stored in a data set along with the name of the person walking in the video. The proposed data set is used to train a classification model to predict the person in a new video by first processing it to get its identification vector and then to use it as a test case in the classification model. A graphical user interface was also developed so that anyone with no programming or technical experience can easily use the tool. The developed application does everything for gait detection from mp4 videos by obtaining the identification vectors and saving them into the data set. Using this application, one can quickly identify the person walking in a video. The results obtained offered an accuracy from 60.88% to 95.23%.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"601-613"},"PeriodicalIF":2.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77215002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BIOSIG 2021 Special issue on efficient, reliable, and privacy-friendly biometrics BIOSIG 2021高效、可靠、隐私友好型生物识别技术特刊
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-10-14 DOI: 10.1049/bme2.12101
Ana F. Sequeira, Marta Gomez-Barrero, Naser Damer, Paulo Lobato Correia
{"title":"BIOSIG 2021 Special issue on efficient, reliable, and privacy-friendly biometrics","authors":"Ana F. Sequeira,&nbsp;Marta Gomez-Barrero,&nbsp;Naser Damer,&nbsp;Paulo Lobato Correia","doi":"10.1049/bme2.12101","DOIUrl":"10.1049/bme2.12101","url":null,"abstract":"&lt;p&gt;This special issue of IET Biometrics, “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics”, has as starting point the 2021 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the efficiency, reliability and privacy of biometrics systems and methods.&lt;/p&gt;&lt;p&gt;The “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics” issue contains 12 papers, several of them being extended versions of papers presented at the BIOSIG 2021 conference, dealing with concrete research areas within biometrics such as &lt;b&gt;Presentation Attack Detection for Face and Iris&lt;/b&gt;, &lt;b&gt;Biometric Template Protection Schemes&lt;/b&gt; and &lt;b&gt;Deep Learning techniques for Biometrics&lt;/b&gt;.&lt;/p&gt;&lt;p&gt;Paper “Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Attack Detectability by Quality” was authored by Biying Fu and Naser Damer. This paper addresses the effect of morphing processes both on the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. This work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures, analysing six different morphing techniques and five different data sources using 10 different quality measures. The consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures sustains the proposal of performing unsupervised morphing attack detection (MAD) based on quality scores. The study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The results obtained point out that a set of quality measures, such as MagFace and CNNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.&lt;/p&gt;&lt;p&gt;Paper “Pixel-Wise Supervision for Presentation Attack Detection on ID Cards” was authored by Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, and Naser Damer. This paper addresses the problem of detection of fake ID cards that are printed and then digitally presented for biometric authentication purposes in unsupervised settings. The authors propose a method based on pixel-wise supervision, using DenseNet, to leverage minute cues on various artefacts such as moiré patterns and artefacts left by the printers. To test the proposed system, a new database was obtained from an operational system, consisting of 886 users with 433 bona fide, 67 print and 366 display attacks (not publicly available due to GPDR regulations). The proposed approach achieves better performance compared to handcrafted features and deep learning models, with an Equal Error Rate (EER) of 2.22% and Bo","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"355-358"},"PeriodicalIF":2.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87752844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform 基于加速kaze离散余弦变换的医学图像鲁棒水印算法
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-10-12 DOI: 10.1049/bme2.12102
Dekai Li, Yen-Wei Chen, Jingbing Li, Lei Cao, U. Bhatti, Pengju Zhang
{"title":"Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform","authors":"Dekai Li, Yen-Wei Chen, Jingbing Li, Lei Cao, U. Bhatti, Pengju Zhang","doi":"10.1049/bme2.12102","DOIUrl":"https://doi.org/10.1049/bme2.12102","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"31 1","pages":"534-546"},"PeriodicalIF":2.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86037260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform 基于加速kaze离散余弦变换的医学图像鲁棒水印算法
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-10-12 DOI: 10.1049/bme2.12102
Dekai Li, Yen-wei Chen, Jingbing Li, Lei Cao, Uzair Aslam Bhatti, Pengju Zhang
{"title":"Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform","authors":"Dekai Li,&nbsp;Yen-wei Chen,&nbsp;Jingbing Li,&nbsp;Lei Cao,&nbsp;Uzair Aslam Bhatti,&nbsp;Pengju Zhang","doi":"10.1049/bme2.12102","DOIUrl":"10.1049/bme2.12102","url":null,"abstract":"<p>With the continuous progress and development in the field of Internet technology, the area of medical image processing has also developed along with it. Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermarking algorithm based on an accelerated-KAZE discrete cosine transform (AKAZE-DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. First, the AKAZE-DCT algorithm is used to extract the feature vector of the medical image and then combined with the perceptual hashing technique to obtain the feature sequence of the medical image; then, the watermarking image is encrypted with logistic chaos dislocation to get the encrypted watermarking image, which ensures the security of the watermarking information; finally, the watermarking is embedded and extracted with the zero-watermarking technique. The experimental results show that the algorithm can effectively extract the watermark under conventional and geometric attacks, reflecting better robustness and invisibility, and has certain practicality in the medical field compared with other algorithms.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"534-546"},"PeriodicalIF":2.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118745131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Locality preserving binary face representations using auto-encoders 使用自编码器保持局部性的二进制面表示
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-10-10 DOI: 10.1049/bme2.12096
Mohamed Amine Hmani, Dijana Petrovska-Delacrétaz, Bernadette Dorizzi
{"title":"Locality preserving binary face representations using auto-encoders","authors":"Mohamed Amine Hmani,&nbsp;Dijana Petrovska-Delacrétaz,&nbsp;Bernadette Dorizzi","doi":"10.1049/bme2.12096","DOIUrl":"10.1049/bme2.12096","url":null,"abstract":"<p>Crypto-biometric schemes, such as fuzzy commitment, require binary sources. A novel approach to binarising biometric data using Deep Neural Networks applied to facial biometric data is introduced. The binary representations are evaluated on the MOBIO and the Labelled Faces in the Wild databases, where their biometric recognition performance and entropy are measured. The proposed binary embeddings give a state-of-the-art performance on both databases with almost negligible degradation compared to the baseline. The representations' length can be controlled. Using a pretrained convolutional neural network and training the model on a cleaned version of the MS-celeb-1M database, binary representations of length 4096 bits and 3300 bits of entropy are obtained. The extracted representations have high entropy and are long enough to be used in crypto-biometric systems, such as fuzzy commitment. Furthermore, the proposed approach is data-driven and constitutes a locality preserving hashing that can be leveraged for data clustering and similarity searches. As a use case of the binary representations, a cancellable system is created based on the binary embeddings using a shuffling transformation with a randomisation key as a second factor.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"445-458"},"PeriodicalIF":2.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76420898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication 用于基于流的生物识别认证的柱状脉冲神经网络的判别训练
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-10-03 DOI: 10.1049/bme2.12099
Enrique Argones Rúa, Tim Van hamme, Davy Preuveneers, Wouter Joosen
{"title":"Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication","authors":"Enrique Argones Rúa,&nbsp;Tim Van hamme,&nbsp;Davy Preuveneers,&nbsp;Wouter Joosen","doi":"10.1049/bme2.12099","DOIUrl":"10.1049/bme2.12099","url":null,"abstract":"<p>Stream-based biometric authentication using a novel approach based on spiking neural networks (SNNs) is addressed. SNNs have proven advantages regarding energy consumption and they are a perfect match with some proposed neuromorphic hardware chips, which can lead to a broader adoption of user device applications of artificial intelligence technologies. One of the challenges when using SNNs is the discriminative training of the network since it is not straightforward to apply the well-known error backpropagation (EBP), massively used in traditional artificial neural networks (ANNs). A network structure based on neuron columns is proposed, resembling cortical columns in the human cortex, and a new derivation of error backpropagation for the spiking neural networks that integrate the lateral inhibition in these structures. The potential of the proposed approach is tested in the task of inertial gait authentication, where gait is quantified as signals from Inertial Measurement Units (IMU), and the authors' approach to state-of-the-art ANNs is compared. In the experiments, SNNs provide competitive results, obtaining a difference of around 1% in half total error rate when compared to state-of-the-art ANNs in the context of IMU-based gait authentication.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"485-497"},"PeriodicalIF":2.0,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12099","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75585054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust medical zero-watermarking algorithm based on Residual-DenseNet 基于残差密度网的鲁棒医学零水印算法
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-09-21 DOI: 10.1049/bme2.12100
Cheng Gong, Jing Liu, Ming Gong, Jingbing Li, Uzair Aslam Bhatti, Jixin Ma
{"title":"Robust medical zero-watermarking algorithm based on Residual-DenseNet","authors":"Cheng Gong,&nbsp;Jing Liu,&nbsp;Ming Gong,&nbsp;Jingbing Li,&nbsp;Uzair Aslam Bhatti,&nbsp;Jixin Ma","doi":"10.1049/bme2.12100","DOIUrl":"10.1049/bme2.12100","url":null,"abstract":"<p>To solve the problem of poor robustness of existing traditional DCT-based medical image watermarking algorithms under geometric attacks, a novel deep learning-based robust zero-watermarking algorithm for medical images is proposed. A Residual-DenseNet is designed, which took low-frequency features after discrete cosine transformation of medical images as labels and applied skip connections and a new objective function to strengthen and extract high-level semantic features that can effectively distinguish different medical images and binarise them to get robust hash vectors. Then, these hash vectors are bound with the chaotically encrypted watermark to generate the corresponding keys to complete the generation of watermark. The proposed algorithm neither modified the original medical image in the watermark generation stage nor required the original medical image in the watermark extraction stage. Moreover, the proposed algorithm is also suitable for multiple watermarks. Experimental results show that the proposed algorithm has good robust performance under both conventional and geometric attacks.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 6","pages":"547-556"},"PeriodicalIF":2.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74311418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards understanding the character of quality sampling in deep learning face recognition 探讨深度学习人脸识别中质量采样的特点
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-09-14 DOI: 10.1049/bme2.12095
Iurii Medvedev, João Tremoço, Beatriz Mano, Luís Espírito Santo, Nuno Gonçalves
{"title":"Towards understanding the character of quality sampling in deep learning face recognition","authors":"Iurii Medvedev,&nbsp;João Tremoço,&nbsp;Beatriz Mano,&nbsp;Luís Espírito Santo,&nbsp;Nuno Gonçalves","doi":"10.1049/bme2.12095","DOIUrl":"10.1049/bme2.12095","url":null,"abstract":"<p>Face recognition has become one of the most important modalities of biometrics in recent years. It widely utilises deep learning computer vision tools and adopts large collections of unconstrained face images of celebrities for training. Such choice of the data is related to its public availability when existing document compliant face image collections are hardly accessible due to security and privacy issues. Such inconsistency between the training data and deploy scenario may lead to a leak in performance in biometric systems, which are developed specifically for dealing with ID document compliant images. To mitigate this problem, we propose to regularise the training of the deep face recognition network with a specific sample mining strategy, which penalises the samples by their estimated quality. In addition to several considered quality metrics in recent work, we also expand our deep learning strategy to other sophisticated quality estimation methods and perform experiments to better understand the nature of quality sampling. Namely, we seek for the penalising manner (sampling character) that better satisfies the purpose of adapting deep learning face recognition for images of ID and travel documents. Extensive experiments demonstrate the efficiency of the approach for ID document compliant face images.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 5","pages":"498-511"},"PeriodicalIF":2.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83032888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信