{"title":"基于gan的手指静脉图像隐私意识数据增强","authors":"Yusuke Matsuda, Tomo Miyazaki, S. Omachi","doi":"10.1109/IICAIET55139.2022.9936860","DOIUrl":null,"url":null,"abstract":"The lack of sufficient data for evaluation and development is a major problem in biometrics. A novel GAN-based data-augmentation method for finger-vein authentication is proposed and evaluated in this study. Based on the GAN model structure, a subnetwork is added that lowers the similarity between the real data used for training and the fake data from the generator; the fake data looks remarkably similar to the real data, and the correlation between the real and fake data is lowered. Because the real data and fake data are different individuals, the privacy of a particular person is not considered when examining authentication technologies using only generated fake data. Moreover, the possibility of improving the authentication accuracy is confirmed by using both real data and generated fake data for training. The effectiveness of the proposed method is proved experimentally.","PeriodicalId":142482,"journal":{"name":"2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"GAN-based Privacy-Conscious Data Augmentation with Finger-Vein Images\",\"authors\":\"Yusuke Matsuda, Tomo Miyazaki, S. Omachi\",\"doi\":\"10.1109/IICAIET55139.2022.9936860\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The lack of sufficient data for evaluation and development is a major problem in biometrics. A novel GAN-based data-augmentation method for finger-vein authentication is proposed and evaluated in this study. Based on the GAN model structure, a subnetwork is added that lowers the similarity between the real data used for training and the fake data from the generator; the fake data looks remarkably similar to the real data, and the correlation between the real and fake data is lowered. Because the real data and fake data are different individuals, the privacy of a particular person is not considered when examining authentication technologies using only generated fake data. Moreover, the possibility of improving the authentication accuracy is confirmed by using both real data and generated fake data for training. The effectiveness of the proposed method is proved experimentally.\",\"PeriodicalId\":142482,\"journal\":{\"name\":\"2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IICAIET55139.2022.9936860\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IICAIET55139.2022.9936860","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
GAN-based Privacy-Conscious Data Augmentation with Finger-Vein Images
The lack of sufficient data for evaluation and development is a major problem in biometrics. A novel GAN-based data-augmentation method for finger-vein authentication is proposed and evaluated in this study. Based on the GAN model structure, a subnetwork is added that lowers the similarity between the real data used for training and the fake data from the generator; the fake data looks remarkably similar to the real data, and the correlation between the real and fake data is lowered. Because the real data and fake data are different individuals, the privacy of a particular person is not considered when examining authentication technologies using only generated fake data. Moreover, the possibility of improving the authentication accuracy is confirmed by using both real data and generated fake data for training. The effectiveness of the proposed method is proved experimentally.