IET Biometrics最新文献

筛选
英文 中文
Proposing a Fuzzy Soft-max-based classifier in a hybrid deep learning architecture for human activity recognition 在混合深度学习架构中提出一种基于模糊soft -max的分类器,用于人类活动识别
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-02-06 DOI: 10.1049/bme2.12066
Reza Shakerian, Meisam Yadollahzadeh-Tabari, Seyed Yaser Bozorgi Rad
{"title":"Proposing a Fuzzy Soft-max-based classifier in a hybrid deep learning architecture for human activity recognition","authors":"Reza Shakerian,&nbsp;Meisam Yadollahzadeh-Tabari,&nbsp;Seyed Yaser Bozorgi Rad","doi":"10.1049/bme2.12066","DOIUrl":"10.1049/bme2.12066","url":null,"abstract":"<p>Human Activity Recognition (HAR) is the process of identifying and analysing activities performed by a person (or persons). This paper proposes an efficient HAR system based on wearable sensors that uses deep learning techniques. The proposed HAR takes the advantage of staking Convolutional Neural Network and Long Short-Term (LSTM), for extracting the high-level features of the sensors data and for learning the time-series behaviour of the abstracted data, respectively. This paper proposed a Fuzzy Soft-max classifier for the dense layer which classifies the output of LSTM Blocks to the associated activity classes. The authors’ decision for proposing this classifier was because sensor data related to the resembling human activities, such as walking and running or opening door and closing door, are often very similar to each other. For this reason, the authors expect that adding fuzzy inference power to the standard Soft-max classifier will increase its accuracy for distinguishing between similar activities. The authors were also interested in considering a post-processing module that considers activity classification over a longer period. Using the proposed Fuzzy Soft-max classifier and by the post-processing technique, the authors were able to reach the 97.03 and 85.1 rates of accuracy for the PAMAP2 and Opportunity dataset, respectively.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"171-186"},"PeriodicalIF":2.0,"publicationDate":"2022-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12066","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84241402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reliable Detection of Doppelgängers based on Deep Face Representations 基于深度人脸表征的Doppelgängers可靠检测
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-01-21 DOI: 10.1049/bme2.12072
C. Rathgeb, Daniel Fischer, P. Drozdowski, C. Busch
{"title":"Reliable Detection of Doppelgängers based on Deep Face Representations","authors":"C. Rathgeb, Daniel Fischer, P. Drozdowski, C. Busch","doi":"10.1049/bme2.12072","DOIUrl":"https://doi.org/10.1049/bme2.12072","url":null,"abstract":"—Doppelg¨angers (or lookalikes) usually yield an in- creased probability of false matches in a facial recognition system, as opposed to random face image pairs selected for non- mated comparison trials. In this work, we assess the impact of doppelg¨angers on the HDA Doppelg¨anger and Disguised Faces in The Wild databases using a state-of-the-art face recognition system. It is found that doppelg¨anger image pairs yield very high similarity scores resulting in a significant increase of false match rates. Further, we propose a doppelg ¨ anger detection method which distinguishes doppelg¨angers from mated comparison trials by analysing differences in deep representations obtained from face image pairs. The proposed detection system employs a machine learning-based classifier, which is trained with generated doppelg¨anger image pairs utilising face morphing techniques. Experimental evaluations conducted on the HDA Doppelg¨anger and Look-Alike Face databases reveal a detection equal error rate of approximately 2.7% for the task of separating mated authentication attempts from doppelg¨angers.","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"73 1","pages":"215-224"},"PeriodicalIF":2.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81434886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep learning model based on cascaded autoencoders and one-class learning for detection and localization of anomalies from surveillance videos 基于级联自编码器和单类学习的深度学习模型用于监控视频异常的检测和定位
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-01-18 DOI: 10.1049/bme2.12064
Karishma Pawar, Vahida Attar
{"title":"Deep learning model based on cascaded autoencoders and one-class learning for detection and localization of anomalies from surveillance videos","authors":"Karishma Pawar,&nbsp;Vahida Attar","doi":"10.1049/bme2.12064","DOIUrl":"10.1049/bme2.12064","url":null,"abstract":"<p>Due to the need for increased security measures for monitoring and safeguarding the activities, video anomaly detection is considered as one of the significant research aspects in the domain of computer vision. Assigning human personnel to continuously check the surveillance videos for finding suspicious activities such as violence, robbery, wrong U-turns, to mention a few, is a laborious and error-prone task. It gives rise to the need for devising automated video surveillance systems ensuring security. Motivated by the same, this paper addresses the problem of detection and localization of anomalies from surveillance videos using pipelined deep autoencoders and one-class learning. Specifically, we used a convolutional autoencoder and a sequence-to-sequence long short-term memory autoencoder in a pipelined fashion for spatial and temporal learning of the videos, respectively. The authors followed the principle of one-class classification for training the model on normal data and testing it on anomalous testing data. The authors achieved a reasonably significant performance in terms of an equal error rate and the time required for anomaly detection and localization comparable to standard benchmarked approaches, thus, qualifies to work in a near-real-time manner for anomaly detection and localization.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 4","pages":"289-303"},"PeriodicalIF":2.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12064","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73763275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Signal-level fusion for indexing and retrieval of facial biometric data 基于信号级融合的面部生物特征数据索引与检索
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-01-13 DOI: 10.1049/bme2.12063
Pawel Drozdowski, Fabian Stockhardt, Christian Rathgeb, Christoph Busch
{"title":"Signal-level fusion for indexing and retrieval of facial biometric data","authors":"Pawel Drozdowski,&nbsp;Fabian Stockhardt,&nbsp;Christian Rathgeb,&nbsp;Christoph Busch","doi":"10.1049/bme2.12063","DOIUrl":"10.1049/bme2.12063","url":null,"abstract":"<p>The growing scope, scale, and number of biometric deployments around the world emphasise the need for research into technologies facilitating efficient and reliable biometric identification queries. This work presents a method of indexing biometric databases, which relies on signal-level fusion of facial images (morphing) to create a multi-stage data structure and retrieval protocol. By successively pre-filtering the list of potential candidate identities, the proposed method makes it possible to reduce the necessary number of biometric template comparisons to complete a biometric identification transaction. The proposed method is extensively evaluated on publicly available databases using open-source and commercial off-the-shelf recognition systems. The results show that using the proposed method, the computational workload can be reduced down to around 30% while the biometric performance of a baseline exhaustive search-based retrieval is fully maintained, both in closed-set and open-set identification scenarios.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"141-156"},"PeriodicalIF":2.0,"publicationDate":"2022-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12063","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83820934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform 在移动平台上使用具有击键轨迹特征和递归神经网络的多模态方案的用户行为生物识别框架
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2022-01-11 DOI: 10.1049/bme2.12065
Ka-Wing Tse, Kevin Hung
{"title":"Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform","authors":"Ka-Wing Tse,&nbsp;Kevin Hung","doi":"10.1049/bme2.12065","DOIUrl":"10.1049/bme2.12065","url":null,"abstract":"<p>Diverse applications are used on mobile devices. Because of the increasing dependence on information systems, immense amounts of personal and sensitive data are stored on mobile devices. Thus, security or privacy breaches are a major challenge. To protect mobile systems and the private information on these systems from being accessed by adversaries, a framework for mobile user identification through the use of a multimodal behavioural biometrics scheme with a keystroke trajectory feature is presented herein. Conventionally, mobile devices have been protected by mechanisms such as PINs or passwords. However, these approaches have numerous disadvantages. Therefore, approaches that employ keystroke biometrics for secure and reliable mobile device identification have been proposed. Because unimodal behavioural biometrics identification mechanisms have limited accuracy and effectiveness, a multimodal scheme that includes different behavioural biometric traits, such as keystroke and swipe biometric traits, is examined. However, the information provided by the spatial and temporal features of keystroke biometrics is not comprehensive. Therefore, a trajectory model is derived to describe the behavioural biometric uniqueness of a user. In the user identification phase, a multistream recurrent neural network (RNN) is adopted. The results reveal that the proposed trajectory model performs well, and the multimodal scheme using an RNN with a late fusion method provides accurate identification results. The proposed system achieved an accuracy of 95.29%, F1 score of 94.64%, and equal error rate of 1.78%. Thus, the proposed mobile identification system is capable of resisting attacks that standard mechanisms may be vulnerable to and represents a valuable contribution to cyber security.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"157-170"},"PeriodicalIF":2.0,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12065","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84484031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Spoofing detection on adaptive authentication System-A survey 自适应认证系统a调查中的欺骗检测
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-12-30 DOI: 10.1049/bme2.12060
Hind Baaqeel, S. O. Olatunji
{"title":"Spoofing detection on adaptive authentication System-A survey","authors":"Hind Baaqeel, S. O. Olatunji","doi":"10.1049/bme2.12060","DOIUrl":"https://doi.org/10.1049/bme2.12060","url":null,"abstract":"","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"1 1","pages":"87-96"},"PeriodicalIF":2.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76257411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spoofing detection on adaptive authentication System-A survey 自适应认证系统a调查中的欺骗检测
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-12-30 DOI: 10.1049/bme2.12060
Hind Baaqeel, Sunday Olusanya Olatunji
{"title":"Spoofing detection on adaptive authentication System-A survey","authors":"Hind Baaqeel,&nbsp;Sunday Olusanya Olatunji","doi":"10.1049/bme2.12060","DOIUrl":"10.1049/bme2.12060","url":null,"abstract":"<p>With the widespread of computing and mobile devices, authentication using biometrics has received greater attention. Although biometric systems usually provide efficient solutions, the recognition performance tends to be affected over time due to changing conditions and the ageing of biometric data, which results in intra-class variability. This issue is one of the leading causes of the high false rejection rate in biometric authentication systems. Fortunately, this issue has been addressed by using adaptive biometric solutions in which the system gradually adapts to new changes in user biometrics. However, their adaptability to changes may be exploited by an attacker to compromise the stored templates, either to impersonate a specific client or to deny access to him/her. In this work, the authors will carry out a systematic literature review by conducting a comparative study on state-of-the-art solutions for spoofing detection on adaptive authentication systems. This paper will identify the main issues that need to be addressed in adaptive authentication systems. Thus, the authors aim to encourage researchers to develop more robust adaptive solutions to overcome the identified gaps in this research.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"87-96"},"PeriodicalIF":2.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118570025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Biometrics and the metaphysics of personal identity 生物计量学与个人身份的形而上学
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-12-07 DOI: 10.1049/bme2.12062
Amy Kind
{"title":"Biometrics and the metaphysics of personal identity","authors":"Amy Kind","doi":"10.1049/bme2.12062","DOIUrl":"https://doi.org/10.1049/bme2.12062","url":null,"abstract":"<p>The vast advances in biometrics over the past several decades have brought with them a host of pressing concerns. Philosophical scrutiny has already been devoted to many of the relevant ethical and political issues, especially ones arising from matters of privacy, bias, and security in data collection. But philosophers have devoted surprisingly little attention to the relevant metaphysical issues, in particular, ones concerning matters of personal identity. This paper aims to take some initial steps to correct this oversight. After discussing the philosophical problem of personal identity, the ways in which the notion of biometric identity connects with, or fails to connect with, the philosophical notion of personal identity is explored. Though there may be some good reasons to use biometric identity to track personal identity, it is contended that biometric identity is not the same thing as personal identity and thus that biometrics researchers should stop talking as if it were.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"12 3","pages":"176-182"},"PeriodicalIF":2.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12062","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50123578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gradient boosting regression for faster Partitioned Iterated Function Systems-based head pose estimation 基于分段迭代函数系统的快速头部姿态估计的梯度增强回归
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-12-02 DOI: 10.1049/bme2.12061
Paola Barra, Riccardo Distasi, Chiara Pero, Stefano Ricciardi, Maurizio Tucci
{"title":"Gradient boosting regression for faster Partitioned Iterated Function Systems-based head pose estimation","authors":"Paola Barra,&nbsp;Riccardo Distasi,&nbsp;Chiara Pero,&nbsp;Stefano Ricciardi,&nbsp;Maurizio Tucci","doi":"10.1049/bme2.12061","DOIUrl":"10.1049/bme2.12061","url":null,"abstract":"<p>Head pose estimation (HPE) notoriously represents a crucial task for many computer vision applications in robotics, biometry and video surveillance. While, in general, HPE can be performed on both still images and frames extracted from live video or captured footage, its functional approach and the related processing pipeline may have a significant impact on suitability to different application contexts. This implies that, for any real-time application in which HPE is required, this information, namely the angular value of yaw, pitch and roll axes, should be provided in real-time as well. Since, so far, the primary aim in HPE research has been on improving estimation accuracy, there are only a few works reporting the computing time of the proposed HPE method and even less explicitly addressing it. The present work stems from a previous Partitioned Iterated Function Systems-based approach providing state-of-the-art accuracy with high computing cost, and improve it by means of two regression models, namely Gradient Boosting Regressor and Extreme Gradient Boosting Regressor, achieving much faster response and an even lower mean absolute error on the yaw and roll axis, as shown by experiments conducted on the BIWI and AFLW2000 datasets.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 4","pages":"279-288"},"PeriodicalIF":2.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12061","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81149191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HandSegNet: Hand segmentation using convolutional neural network for contactless palmprint recognition HandSegNet:使用卷积神经网络进行非接触式掌纹识别的手部分割
IF 2 4区 计算机科学
IET Biometrics Pub Date : 2021-11-20 DOI: 10.1049/bme2.12058
Koichi Ito, Yusei Suzuki, Hiroya Kawai, Takafumi Aoki, Masakazu Fujio, Yosuke Kaga, Kenta Takahashi
{"title":"HandSegNet: Hand segmentation using convolutional neural network for contactless palmprint recognition","authors":"Koichi Ito,&nbsp;Yusei Suzuki,&nbsp;Hiroya Kawai,&nbsp;Takafumi Aoki,&nbsp;Masakazu Fujio,&nbsp;Yosuke Kaga,&nbsp;Kenta Takahashi","doi":"10.1049/bme2.12058","DOIUrl":"10.1049/bme2.12058","url":null,"abstract":"<p>Extracting a palm region with fixed location from an input hand image is a crucial task for palmprint recognition to realise reliable person authentication under contactless and unconstrained conditions. A palm region can be extracted from the fixed location using the gaps between fingers. An accurate and robust hand segmentation method is indispensable to extract a palm region from an image with complex background taken under various environments. In this study, HandSegNet, which is a hand segmentation method using Convolutional Neural Network (CNN) for contactless palmprint recognition, is proposed. HandSegNet employs a new CNN architecture consisting of an encoder–decoder model with a pyramid pooling module. Through performance evaluation using a set of synthesised hand images, HandSegNet exhibited the best segmentation results of 98.90% and 93.20% for accuracy and intersection over union, respectively. The effectiveness of HandSegNet in contactless palmprint recognition through experiments using a set of synthesised images of hand images is also demonstrated. Comparing the performance of palmprint recognition using three conventional methods and HandSegNet for palm region extraction, the proposed method has the lowest equal error rate of 4.995%, demonstrating its effectiveness in palm region extraction for contactless palmprint recognition.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"11 2","pages":"109-123"},"PeriodicalIF":2.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12058","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91114489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信