客座编辑:BIOSIG 2020个人认证可信度特刊

IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
IET Biometrics Pub Date : 2021-09-02 DOI:10.1049/bme2.12055
Ana F. Sequeira, Marta Gomez-Barrero, Paulo Lobato Correia
{"title":"客座编辑:BIOSIG 2020个人认证可信度特刊","authors":"Ana F. Sequeira,&nbsp;Marta Gomez-Barrero,&nbsp;Paulo Lobato Correia","doi":"10.1049/bme2.12055","DOIUrl":null,"url":null,"abstract":"<p>Recent guidelines for ‘Trustworthy AI’ state that it not only relates the trustworthiness of the AI system itself but also comprises the trustworthiness of all processes and actors that are part of the system's life cycle. Person authentication is a particular application of AI in which (i) the compliance to laws and regulations; (ii) the respect for ethical principal and values; (iii) and the robustness, both from a technical and social perspective, are of crucial importance.</p><p>This is the first IET Biometrics ‘Trustworthiness of Person Authentication’ special issue, having as starting point the 2020 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the trustworthiness of the involved processes.</p><p>The ‘BIOSIG 2020 special issue on Trustworthiness of Person’ issue contains seven papers, most of them being extended versions of papers presented at the BIOSIG 2020 conference, dealing with concrete research areas within biometrics such as presentation attack detection (PAD), traditional and emergent biometric characteristics, and biometric recognition and soft biometrics in the presence of facial masks.</p><p>The paper ‘Unknown Presentation Attack Detection against Rational Attackers’, by Ali Khodabakhsh and Zahid Akhtar, investigates the vulnerability of PAD systems to attacks in real-life settings, addressing the detection of unknown attacks, the performance in adversarial settings, few-shot learning, and explainability. In this study, these limitations are addressed through an approach that relies on a game theoretic view for modelling the interactions between the attacker and the detector. These challenges are successfully addressed, and the methodology proposed provides a more balanced performance across known and unknown attacks, achieving at the same time state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach is studied as well as its ability to provide pixel-level explainability.</p><p>The paper ‘On the Generalisation Capabilities of Fisher Vector based Face Presentation Attack Detection’ by Lazaro Gonzalez-Soler, Marta Gomez-Barrero and Christoph Busch, focusses on face PAD in more challenging scenarios, where unknown attacks are included in the test set. Considering those more realistic scenarios, in which the existing algorithms face difficulties in detecting unknown presentation attack instruments (PAI), the authors propose a new feature space based on Fisher vectors, computed from compact binarised statistical image features' (BSIF) histograms, which allow discovering semantic feature subsets from known samples in order to enhance the detection of unknown attacks. This new representation, evaluated for challenging unknown attacks taken from freely available facial databases, shows promising results in the presence of unknown attacks. Furthermore, the proposed methodology achieves state-of-the-art performance in cross-dataset scenarios.</p><p>The paper ‘Failure of Affine-based Reconstruction Attack in Regenerating Vascular Feature Points’ by Mahshid Sadeghpour, Arathi Arakala, Stephen Davis and Kathy Horadam, focusses on the vulnerabilities of biometric systems based on retina and hand vascular data to inverse biometrics attacks. In particular, affine-based reconstruction attack methods, modelling the biometric recognition algorithm by an affine approximation, are considered. This type of attack reconstructs targetted biometric references using the modelled biometric recognition algorithm and the comparison scores issued by the system. Even though this reconstruction method has only been successfully applied to reconstruct face images, the common consensus is that any biometric system that issues comparison scores could be vulnerable to such an attack, since the method is sufficiently general to be applied to other biometric templates. In this work, the authors show that the attack fails to regenerate sparse vascular feature point templates in experiments that test the reconstruction attack on feature point patterns extracted from retina and hand vascular images. The experimental results show that the reconstruction attack is not as threatening as it is widely accepted to be and that vascular biometric template protection schemes that store sparse templates as references and reveal comparison scores are not susceptible to affine-based reconstruction attacks.</p><p>The paper ‘CNN based Off-angle Iris Segmentation and Recognition’, by Ehsaneddin Jalilian, Mahmut Karakaya and Andreas Uhl, examines thoroughly the general effect of different gaze angles on ocular biometrics and then relates the findings to the CNN-based off-angle iris segmentation results and the subsequent recognition performance. While deep learning techniques (i.e., segmentation-based CNNs) are increasingly used to address this problem, a significant lack of information about the mechanism affecting the related distortions on the performance of these networks remains. Specifically, there is a need for a comprehensive recognition framework dedicated to specific off-angle iris recognition using such modules. The authors introduce an improvement scheme to compensate for some segmentation degradations caused by the off-angle distortions and further propose a new gaze-angle estimation and parameterisation module to estimate and rectify the off-angle iris images back to frontal view. Taking benefit of these, the authors formulate several approaches to configure an end-to-end framework for the CNN-based off-angle iris segmentation and recognition.</p><p>The paper ‘Subject Independent Evaluation of Eyebrows as a Stand-alone Biometric’, by Hoang Nguyen, Ajita Rattani and Reza Derakhshani, explores emergent ocular modalities to address challenges such as occlusions due to face coverings. The authors present ocular biometrics that use features extracted from the eye region and around it, such as the eyebrow region, as a potential remedy for these challenges. This work evaluates five deep learning models (lightCNN, ResNet, DenseNet, MobileNetV2, and SqueezeNet) for eyebrow-based user authentication in a subject-independent environment across different datasets, lighting conditions, resolutions, and facial expressions. The authors also present a challenging simulated identical twins scenario in the training and testing datasets as well as results obtained using two well-known databases (FACES and VISOB).</p><p>The papers ‘An Extended Evaluation of the Effect of Real and Simulated Masks on Face Recognition Performance’, by Naser Damer, Fadi Boutros, Marius Süßmilch, Florian Kirchbuchner and Arjan Kuijper and ‘Facial Masks and Soft-Biometrics: Leveraging Face Recognition CNNs for Age and Gender Prediction on Mobile Ocular Images’, by Fernando Alonso-Fernandez, Kevin Hernandez-Diaz, Silvia Ramis, Francisco J. Perales and Josef Bigun, both address challenges posed by COVID-19 face masks on biometric recognition.</p><p>In the first paper, the authors present a specifically collected database containing three sessions under different capture conditions to simulate realistic use cases and additionally perform data augmentation to include synthetic mask occlusions. The paper studies the effect of masked face probes on the behaviour of four face recognition systems (academic and commercial) and performs an evaluation including masked to non-masked and masked to masked face comparisons. Furthermore, the work presents a comparison of the effect of real masks versus the simulated masks on face recognition performance.</p><p>The second paper, address the use of selfie ocular images captured with smartphones to estimate age and gender in the scenario of partial face occlusions due to the mandatory use of face masks. This work explores the challenges posed by the explosion of the use of mobile devices and increased migration to digital services caused by the pandemic. In particular, due to mobile devices' hardware limitations and size restrictions of downloadable applications, it is infeasible to employ large CNNs in tasks such as identity or expression recognition. Thus, the authors adapt two existing lightweight CNNs proposed in the context of the ImageNet Challenge and two additional architectures proposed for mobile face recognition. The overfitting problem is addressed by using networks pre-trained on ImageNet and some networks that are further fine-tuned for face recognition, for which very large training databases are available. Since both tasks employ similar input data, the authors hypothesise that the proposed strategy can be beneficial for soft-biometrics estimation. A comprehensive study of the effects of different pre-training over the employed architectures is carried out, showing that, in most cases, a better accuracy is obtained after the networks have been fine-tuned for face recognition.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":"10 5","pages":"457-459"},"PeriodicalIF":1.8000,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12055","citationCount":"0","resultStr":"{\"title\":\"Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication\",\"authors\":\"Ana F. Sequeira,&nbsp;Marta Gomez-Barrero,&nbsp;Paulo Lobato Correia\",\"doi\":\"10.1049/bme2.12055\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Recent guidelines for ‘Trustworthy AI’ state that it not only relates the trustworthiness of the AI system itself but also comprises the trustworthiness of all processes and actors that are part of the system's life cycle. Person authentication is a particular application of AI in which (i) the compliance to laws and regulations; (ii) the respect for ethical principal and values; (iii) and the robustness, both from a technical and social perspective, are of crucial importance.</p><p>This is the first IET Biometrics ‘Trustworthiness of Person Authentication’ special issue, having as starting point the 2020 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the trustworthiness of the involved processes.</p><p>The ‘BIOSIG 2020 special issue on Trustworthiness of Person’ issue contains seven papers, most of them being extended versions of papers presented at the BIOSIG 2020 conference, dealing with concrete research areas within biometrics such as presentation attack detection (PAD), traditional and emergent biometric characteristics, and biometric recognition and soft biometrics in the presence of facial masks.</p><p>The paper ‘Unknown Presentation Attack Detection against Rational Attackers’, by Ali Khodabakhsh and Zahid Akhtar, investigates the vulnerability of PAD systems to attacks in real-life settings, addressing the detection of unknown attacks, the performance in adversarial settings, few-shot learning, and explainability. In this study, these limitations are addressed through an approach that relies on a game theoretic view for modelling the interactions between the attacker and the detector. These challenges are successfully addressed, and the methodology proposed provides a more balanced performance across known and unknown attacks, achieving at the same time state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach is studied as well as its ability to provide pixel-level explainability.</p><p>The paper ‘On the Generalisation Capabilities of Fisher Vector based Face Presentation Attack Detection’ by Lazaro Gonzalez-Soler, Marta Gomez-Barrero and Christoph Busch, focusses on face PAD in more challenging scenarios, where unknown attacks are included in the test set. Considering those more realistic scenarios, in which the existing algorithms face difficulties in detecting unknown presentation attack instruments (PAI), the authors propose a new feature space based on Fisher vectors, computed from compact binarised statistical image features' (BSIF) histograms, which allow discovering semantic feature subsets from known samples in order to enhance the detection of unknown attacks. This new representation, evaluated for challenging unknown attacks taken from freely available facial databases, shows promising results in the presence of unknown attacks. Furthermore, the proposed methodology achieves state-of-the-art performance in cross-dataset scenarios.</p><p>The paper ‘Failure of Affine-based Reconstruction Attack in Regenerating Vascular Feature Points’ by Mahshid Sadeghpour, Arathi Arakala, Stephen Davis and Kathy Horadam, focusses on the vulnerabilities of biometric systems based on retina and hand vascular data to inverse biometrics attacks. In particular, affine-based reconstruction attack methods, modelling the biometric recognition algorithm by an affine approximation, are considered. This type of attack reconstructs targetted biometric references using the modelled biometric recognition algorithm and the comparison scores issued by the system. Even though this reconstruction method has only been successfully applied to reconstruct face images, the common consensus is that any biometric system that issues comparison scores could be vulnerable to such an attack, since the method is sufficiently general to be applied to other biometric templates. In this work, the authors show that the attack fails to regenerate sparse vascular feature point templates in experiments that test the reconstruction attack on feature point patterns extracted from retina and hand vascular images. The experimental results show that the reconstruction attack is not as threatening as it is widely accepted to be and that vascular biometric template protection schemes that store sparse templates as references and reveal comparison scores are not susceptible to affine-based reconstruction attacks.</p><p>The paper ‘CNN based Off-angle Iris Segmentation and Recognition’, by Ehsaneddin Jalilian, Mahmut Karakaya and Andreas Uhl, examines thoroughly the general effect of different gaze angles on ocular biometrics and then relates the findings to the CNN-based off-angle iris segmentation results and the subsequent recognition performance. While deep learning techniques (i.e., segmentation-based CNNs) are increasingly used to address this problem, a significant lack of information about the mechanism affecting the related distortions on the performance of these networks remains. Specifically, there is a need for a comprehensive recognition framework dedicated to specific off-angle iris recognition using such modules. The authors introduce an improvement scheme to compensate for some segmentation degradations caused by the off-angle distortions and further propose a new gaze-angle estimation and parameterisation module to estimate and rectify the off-angle iris images back to frontal view. Taking benefit of these, the authors formulate several approaches to configure an end-to-end framework for the CNN-based off-angle iris segmentation and recognition.</p><p>The paper ‘Subject Independent Evaluation of Eyebrows as a Stand-alone Biometric’, by Hoang Nguyen, Ajita Rattani and Reza Derakhshani, explores emergent ocular modalities to address challenges such as occlusions due to face coverings. The authors present ocular biometrics that use features extracted from the eye region and around it, such as the eyebrow region, as a potential remedy for these challenges. This work evaluates five deep learning models (lightCNN, ResNet, DenseNet, MobileNetV2, and SqueezeNet) for eyebrow-based user authentication in a subject-independent environment across different datasets, lighting conditions, resolutions, and facial expressions. The authors also present a challenging simulated identical twins scenario in the training and testing datasets as well as results obtained using two well-known databases (FACES and VISOB).</p><p>The papers ‘An Extended Evaluation of the Effect of Real and Simulated Masks on Face Recognition Performance’, by Naser Damer, Fadi Boutros, Marius Süßmilch, Florian Kirchbuchner and Arjan Kuijper and ‘Facial Masks and Soft-Biometrics: Leveraging Face Recognition CNNs for Age and Gender Prediction on Mobile Ocular Images’, by Fernando Alonso-Fernandez, Kevin Hernandez-Diaz, Silvia Ramis, Francisco J. Perales and Josef Bigun, both address challenges posed by COVID-19 face masks on biometric recognition.</p><p>In the first paper, the authors present a specifically collected database containing three sessions under different capture conditions to simulate realistic use cases and additionally perform data augmentation to include synthetic mask occlusions. The paper studies the effect of masked face probes on the behaviour of four face recognition systems (academic and commercial) and performs an evaluation including masked to non-masked and masked to masked face comparisons. Furthermore, the work presents a comparison of the effect of real masks versus the simulated masks on face recognition performance.</p><p>The second paper, address the use of selfie ocular images captured with smartphones to estimate age and gender in the scenario of partial face occlusions due to the mandatory use of face masks. This work explores the challenges posed by the explosion of the use of mobile devices and increased migration to digital services caused by the pandemic. In particular, due to mobile devices' hardware limitations and size restrictions of downloadable applications, it is infeasible to employ large CNNs in tasks such as identity or expression recognition. Thus, the authors adapt two existing lightweight CNNs proposed in the context of the ImageNet Challenge and two additional architectures proposed for mobile face recognition. The overfitting problem is addressed by using networks pre-trained on ImageNet and some networks that are further fine-tuned for face recognition, for which very large training databases are available. Since both tasks employ similar input data, the authors hypothesise that the proposed strategy can be beneficial for soft-biometrics estimation. A comprehensive study of the effects of different pre-training over the employed architectures is carried out, showing that, in most cases, a better accuracy is obtained after the networks have been fine-tuned for face recognition.</p>\",\"PeriodicalId\":48821,\"journal\":{\"name\":\"IET Biometrics\",\"volume\":\"10 5\",\"pages\":\"457-459\"},\"PeriodicalIF\":1.8000,\"publicationDate\":\"2021-09-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12055\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Biometrics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1049/bme2.12055\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Biometrics","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/bme2.12055","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

摘要

最近的“值得信赖的人工智能”指南指出,它不仅与人工智能系统本身的可信度有关,还包括系统生命周期中所有过程和参与者的可信度。个人认证是人工智能的一种特殊应用,其中(i)遵守法律法规;(ii)尊重伦理原则和价值观;(iii)以及从技术和社会角度来看的稳健性至关重要。这是IET生物识别技术的第一期“个人认证的可信度”特刊,以2020年版生物识别特别利益小组(BIOSIG)会议为起点。本期特刊汇集了关注生物识别主题的作品,这些作品被置于培养相关过程可信度的新视角下。“BIOSIG 2020关于人的可信度的特刊”包含七篇论文,其中大多数是在2020年BIOSIG会议上发表的论文的扩展版本,涉及生物特征学的具体研究领域,如呈现攻击检测(PAD)、传统和新兴生物特征,以及在有口罩的情况下进行生物识别和软生物识别。Ali Khodabakhsh和Zahid Akhtar的论文《针对理性攻击者的未知呈现攻击检测》调查了PAD系统在现实环境中对攻击的脆弱性,解决了未知攻击的检测、对抗性环境中的性能、少量射击学习和可解释性。在这项研究中,这些限制是通过一种依赖于博弈论观点来建模攻击者和检测器之间的交互的方法来解决的。这些挑战得到了成功解决,所提出的方法在已知和未知攻击中提供了更平衡的性能,同时在针对理性攻击者的已知和未知袭击检测情况下实现了最先进的性能。最后,研究了该方法的少镜头学习潜力及其提供像素级可解释性的能力。Lazaro Gonzalez Soler、Marta Gomez-Barrero和Christoph Busch的论文《论基于Fisher矢量的人脸呈现攻击检测的泛化能力》重点研究了更具挑战性的场景中的人脸PAD,其中未知攻击包含在测试集中。考虑到现有算法在检测未知呈现攻击工具(PAI)方面面临困难的更现实的场景,作者提出了一种基于Fisher向量的新特征空间,该特征空间由紧凑的二进制统计图像特征(BSIF)直方图计算,其允许从已知样本中发现语义特征子集,以便增强对未知攻击的检测。这种新的表示方式,针对从免费提供的面部数据库中获取的具有挑战性的未知攻击进行了评估,在存在未知攻击的情况下显示出了有希望的结果。此外,所提出的方法在跨数据集场景中实现了最先进的性能。Mahshid Sadeghpour、Arathi Arakala、Stephen Davis和Kathy Horadam的论文《基于仿射的重建攻击在再生血管特征点中的失败》重点研究了基于视网膜和手部血管数据的生物识别系统对反向生物识别攻击的脆弱性。特别地,考虑了基于仿射的重建攻击方法,通过仿射近似对生物特征识别算法进行建模。这种类型的攻击使用建模的生物特征识别算法和系统发布的比较分数来重建目标生物特征参考。尽管这种重建方法只成功地应用于重建人脸图像,但普遍的共识是,任何发布比较分数的生物特征系统都可能容易受到这种攻击,因为该方法足够通用,可以应用于其他生物特征模板。在这项工作中,作者表明,在测试从视网膜和手部血管图像中提取的特征点模式的重建攻击的实验中,该攻击无法再生稀疏血管特征点模板。实验结果表明,重建攻击不像人们普遍认为的那样具有威胁性,并且将稀疏模板存储为参考并显示比较分数的血管生物特征模板保护方案不易受到基于仿射的重建攻击。Ehsaneddin Jalilian、Mahmut Karakaya和Andreas Uhl的论文“基于CNN的斜角虹膜分割和识别”深入研究了不同凝视角度对眼睛生物特征的一般影响,然后将研究结果与基于CNN的斜角虹膜分割结果和随后的识别性能相关联。而深度学习技术(即。 ,基于分割的CNNs)越来越多地用于解决这个问题,但仍然缺乏关于影响这些网络性能的相关失真的机制的信息。具体而言,需要一个全面的识别框架,专门用于使用此类模块的特定斜角虹膜识别。作者介绍了一种改进方案来补偿由偏离角度失真引起的一些分割退化,并进一步提出了一种新的凝视角度估计和参数化模块来估计和校正偏离角度的虹膜图像回到正视图。利用这些优势,作者制定了几种方法来配置基于CNN的离角虹膜分割和识别的端到端框架。Hoang Nguyen、Ajita Rattani和Reza Derakhshani的论文《眉毛作为一种独立的生物识别技术的受试者独立评估》探讨了新兴的眼部模式,以应对因面部覆盖物引起的闭塞等挑战。作者提出了使用从眼睛区域及其周围提取的特征(如眉毛区域)的眼部生物识别技术,作为应对这些挑战的潜在方法。这项工作评估了五个深度学习模型(lightCNN、ResNet、DenseNet、MobileNetV2和SqueezeNet),用于在不同数据集、光照条件、分辨率和面部表情的独立于主体的环境中进行基于眉毛的用户身份验证。作者还在训练和测试数据集中展示了一个具有挑战性的模拟同卵双胞胎场景,以及使用两个著名数据库(FACES和VISOB)获得的结果。Naser Damer、Fadi Boutros、Marius Süßmilch,Florian Kirchbuchner和Arjan Kuijper以及Fernando Alonso-Fernandez、Kevin Hernandez-Diaz、Silvia Ramis、Francisco J.Perales和Josef Bigun的《口罩和软生物测量:利用人脸识别CNNs对移动眼睛图像的年龄和性别预测》都解决了新冠肺炎口罩在生物识别方面带来的挑战。在第一篇论文中,作者提出了一个专门收集的数据库,其中包含在不同捕获条件下的三个会话,以模拟真实的用例,并额外执行数据扩充,以包括合成掩模遮挡。本文研究了蒙面探针对四种人脸识别系统(学术和商业)行为的影响,并进行了评估,包括蒙面与非蒙面以及蒙面与蒙面的比较。此外,该工作还比较了真实口罩和模拟口罩对人脸识别性能的影响。第二篇论文讨论了在强制使用口罩导致面部部分闭塞的情况下,使用智能手机拍摄的自拍眼部图像来估计年龄和性别。这项工作探讨了疫情导致移动设备使用激增和向数字服务迁移增加所带来的挑战。特别是,由于移动设备的硬件限制和可下载应用程序的大小限制,在身份或表情识别等任务中使用大型细胞神经网络是不可行的。因此,作者改编了在ImageNet挑战的背景下提出的两个现有的轻量级CNNs和为移动人脸识别提出的两种附加架构。通过使用在ImageNet上预先训练的网络和一些针对人脸识别进行进一步微调的网络来解决过拟合问题,这些网络可以使用非常大的训练数据库。由于两项任务都使用了相似的输入数据,作者假设所提出的策略有利于软生物特征估计。对不同预训练对所用架构的影响进行了全面研究,表明在大多数情况下,对网络进行人脸识别微调后,可以获得更好的精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication

Recent guidelines for ‘Trustworthy AI’ state that it not only relates the trustworthiness of the AI system itself but also comprises the trustworthiness of all processes and actors that are part of the system's life cycle. Person authentication is a particular application of AI in which (i) the compliance to laws and regulations; (ii) the respect for ethical principal and values; (iii) and the robustness, both from a technical and social perspective, are of crucial importance.

This is the first IET Biometrics ‘Trustworthiness of Person Authentication’ special issue, having as starting point the 2020 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the trustworthiness of the involved processes.

The ‘BIOSIG 2020 special issue on Trustworthiness of Person’ issue contains seven papers, most of them being extended versions of papers presented at the BIOSIG 2020 conference, dealing with concrete research areas within biometrics such as presentation attack detection (PAD), traditional and emergent biometric characteristics, and biometric recognition and soft biometrics in the presence of facial masks.

The paper ‘Unknown Presentation Attack Detection against Rational Attackers’, by Ali Khodabakhsh and Zahid Akhtar, investigates the vulnerability of PAD systems to attacks in real-life settings, addressing the detection of unknown attacks, the performance in adversarial settings, few-shot learning, and explainability. In this study, these limitations are addressed through an approach that relies on a game theoretic view for modelling the interactions between the attacker and the detector. These challenges are successfully addressed, and the methodology proposed provides a more balanced performance across known and unknown attacks, achieving at the same time state-of-the-art performance in known and unknown attack detection cases against rational attackers. Lastly, the few-shot learning potential of the proposed approach is studied as well as its ability to provide pixel-level explainability.

The paper ‘On the Generalisation Capabilities of Fisher Vector based Face Presentation Attack Detection’ by Lazaro Gonzalez-Soler, Marta Gomez-Barrero and Christoph Busch, focusses on face PAD in more challenging scenarios, where unknown attacks are included in the test set. Considering those more realistic scenarios, in which the existing algorithms face difficulties in detecting unknown presentation attack instruments (PAI), the authors propose a new feature space based on Fisher vectors, computed from compact binarised statistical image features' (BSIF) histograms, which allow discovering semantic feature subsets from known samples in order to enhance the detection of unknown attacks. This new representation, evaluated for challenging unknown attacks taken from freely available facial databases, shows promising results in the presence of unknown attacks. Furthermore, the proposed methodology achieves state-of-the-art performance in cross-dataset scenarios.

The paper ‘Failure of Affine-based Reconstruction Attack in Regenerating Vascular Feature Points’ by Mahshid Sadeghpour, Arathi Arakala, Stephen Davis and Kathy Horadam, focusses on the vulnerabilities of biometric systems based on retina and hand vascular data to inverse biometrics attacks. In particular, affine-based reconstruction attack methods, modelling the biometric recognition algorithm by an affine approximation, are considered. This type of attack reconstructs targetted biometric references using the modelled biometric recognition algorithm and the comparison scores issued by the system. Even though this reconstruction method has only been successfully applied to reconstruct face images, the common consensus is that any biometric system that issues comparison scores could be vulnerable to such an attack, since the method is sufficiently general to be applied to other biometric templates. In this work, the authors show that the attack fails to regenerate sparse vascular feature point templates in experiments that test the reconstruction attack on feature point patterns extracted from retina and hand vascular images. The experimental results show that the reconstruction attack is not as threatening as it is widely accepted to be and that vascular biometric template protection schemes that store sparse templates as references and reveal comparison scores are not susceptible to affine-based reconstruction attacks.

The paper ‘CNN based Off-angle Iris Segmentation and Recognition’, by Ehsaneddin Jalilian, Mahmut Karakaya and Andreas Uhl, examines thoroughly the general effect of different gaze angles on ocular biometrics and then relates the findings to the CNN-based off-angle iris segmentation results and the subsequent recognition performance. While deep learning techniques (i.e., segmentation-based CNNs) are increasingly used to address this problem, a significant lack of information about the mechanism affecting the related distortions on the performance of these networks remains. Specifically, there is a need for a comprehensive recognition framework dedicated to specific off-angle iris recognition using such modules. The authors introduce an improvement scheme to compensate for some segmentation degradations caused by the off-angle distortions and further propose a new gaze-angle estimation and parameterisation module to estimate and rectify the off-angle iris images back to frontal view. Taking benefit of these, the authors formulate several approaches to configure an end-to-end framework for the CNN-based off-angle iris segmentation and recognition.

The paper ‘Subject Independent Evaluation of Eyebrows as a Stand-alone Biometric’, by Hoang Nguyen, Ajita Rattani and Reza Derakhshani, explores emergent ocular modalities to address challenges such as occlusions due to face coverings. The authors present ocular biometrics that use features extracted from the eye region and around it, such as the eyebrow region, as a potential remedy for these challenges. This work evaluates five deep learning models (lightCNN, ResNet, DenseNet, MobileNetV2, and SqueezeNet) for eyebrow-based user authentication in a subject-independent environment across different datasets, lighting conditions, resolutions, and facial expressions. The authors also present a challenging simulated identical twins scenario in the training and testing datasets as well as results obtained using two well-known databases (FACES and VISOB).

The papers ‘An Extended Evaluation of the Effect of Real and Simulated Masks on Face Recognition Performance’, by Naser Damer, Fadi Boutros, Marius Süßmilch, Florian Kirchbuchner and Arjan Kuijper and ‘Facial Masks and Soft-Biometrics: Leveraging Face Recognition CNNs for Age and Gender Prediction on Mobile Ocular Images’, by Fernando Alonso-Fernandez, Kevin Hernandez-Diaz, Silvia Ramis, Francisco J. Perales and Josef Bigun, both address challenges posed by COVID-19 face masks on biometric recognition.

In the first paper, the authors present a specifically collected database containing three sessions under different capture conditions to simulate realistic use cases and additionally perform data augmentation to include synthetic mask occlusions. The paper studies the effect of masked face probes on the behaviour of four face recognition systems (academic and commercial) and performs an evaluation including masked to non-masked and masked to masked face comparisons. Furthermore, the work presents a comparison of the effect of real masks versus the simulated masks on face recognition performance.

The second paper, address the use of selfie ocular images captured with smartphones to estimate age and gender in the scenario of partial face occlusions due to the mandatory use of face masks. This work explores the challenges posed by the explosion of the use of mobile devices and increased migration to digital services caused by the pandemic. In particular, due to mobile devices' hardware limitations and size restrictions of downloadable applications, it is infeasible to employ large CNNs in tasks such as identity or expression recognition. Thus, the authors adapt two existing lightweight CNNs proposed in the context of the ImageNet Challenge and two additional architectures proposed for mobile face recognition. The overfitting problem is addressed by using networks pre-trained on ImageNet and some networks that are further fine-tuned for face recognition, for which very large training databases are available. Since both tasks employ similar input data, the authors hypothesise that the proposed strategy can be beneficial for soft-biometrics estimation. A comprehensive study of the effects of different pre-training over the employed architectures is carried out, showing that, in most cases, a better accuracy is obtained after the networks have been fine-tuned for face recognition.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IET Biometrics
IET Biometrics COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-
CiteScore
5.90
自引率
0.00%
发文量
46
审稿时长
33 weeks
期刊介绍: The field of biometric recognition - automated recognition of individuals based on their behavioural and biological characteristics - has now reached a level of maturity where viable practical applications are both possible and increasingly available. The biometrics field is characterised especially by its interdisciplinarity since, while focused primarily around a strong technological base, effective system design and implementation often requires a broad range of skills encompassing, for example, human factors, data security and database technologies, psychological and physiological awareness, and so on. Also, the technology focus itself embraces diversity, since the engineering of effective biometric systems requires integration of image analysis, pattern recognition, sensor technology, database engineering, security design and many other strands of understanding. The scope of the journal is intentionally relatively wide. While focusing on core technological issues, it is recognised that these may be inherently diverse and in many cases may cross traditional disciplinary boundaries. The scope of the journal will therefore include any topics where it can be shown that a paper can increase our understanding of biometric systems, signal future developments and applications for biometrics, or promote greater practical uptake for relevant technologies: Development and enhancement of individual biometric modalities including the established and traditional modalities (e.g. face, fingerprint, iris, signature and handwriting recognition) and also newer or emerging modalities (gait, ear-shape, neurological patterns, etc.) Multibiometrics, theoretical and practical issues, implementation of practical systems, multiclassifier and multimodal approaches Soft biometrics and information fusion for identification, verification and trait prediction Human factors and the human-computer interface issues for biometric systems, exception handling strategies Template construction and template management, ageing factors and their impact on biometric systems Usability and user-oriented design, psychological and physiological principles and system integration Sensors and sensor technologies for biometric processing Database technologies to support biometric systems Implementation of biometric systems, security engineering implications, smartcard and associated technologies in implementation, implementation platforms, system design and performance evaluation Trust and privacy issues, security of biometric systems and supporting technological solutions, biometric template protection Biometric cryptosystems, security and biometrics-linked encryption Links with forensic processing and cross-disciplinary commonalities Core underpinning technologies (e.g. image analysis, pattern recognition, computer vision, signal processing, etc.), where the specific relevance to biometric processing can be demonstrated Applications and application-led considerations Position papers on technology or on the industrial context of biometric system development Adoption and promotion of standards in biometrics, improving technology acceptance, deployment and interoperability, avoiding cross-cultural and cross-sector restrictions Relevant ethical and social issues
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信