BIOSIG 2021高效、可靠、隐私友好型生物识别技术特刊

IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
IET Biometrics Pub Date : 2022-10-14 DOI:10.1049/bme2.12101
Ana F. Sequeira, Marta Gomez-Barrero, Naser Damer, Paulo Lobato Correia
{"title":"BIOSIG 2021高效、可靠、隐私友好型生物识别技术特刊","authors":"Ana F. Sequeira,&nbsp;Marta Gomez-Barrero,&nbsp;Naser Damer,&nbsp;Paulo Lobato Correia","doi":"10.1049/bme2.12101","DOIUrl":null,"url":null,"abstract":"<p>This special issue of IET Biometrics, “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics”, has as starting point the 2021 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the efficiency, reliability and privacy of biometrics systems and methods.</p><p>The “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics” issue contains 12 papers, several of them being extended versions of papers presented at the BIOSIG 2021 conference, dealing with concrete research areas within biometrics such as <b>Presentation Attack Detection for Face and Iris</b>, <b>Biometric Template Protection Schemes</b> and <b>Deep Learning techniques for Biometrics</b>.</p><p>Paper “Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Attack Detectability by Quality” was authored by Biying Fu and Naser Damer. This paper addresses the effect of morphing processes both on the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. This work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures, analysing six different morphing techniques and five different data sources using 10 different quality measures. The consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures sustains the proposal of performing unsupervised morphing attack detection (MAD) based on quality scores. The study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The results obtained point out that a set of quality measures, such as MagFace and CNNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.</p><p>Paper “Pixel-Wise Supervision for Presentation Attack Detection on ID Cards” was authored by Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, and Naser Damer. This paper addresses the problem of detection of fake ID cards that are printed and then digitally presented for biometric authentication purposes in unsupervised settings. The authors propose a method based on pixel-wise supervision, using DenseNet, to leverage minute cues on various artefacts such as moiré patterns and artefacts left by the printers. To test the proposed system, a new database was obtained from an operational system, consisting of 886 users with 433 bona fide, 67 print and 366 display attacks (not publicly available due to GPDR regulations). The proposed approach achieves better performance compared to handcrafted features and deep learning models, with an Equal Error Rate (EER) of 2.22% and Bona fide Presentation Classification Error Rate (BPCER) of 1.83% and 1.67% @ Attack Presentation Classification Error Rate (APCER) of 5% and 10%, respectively.</p><p>Paper “Deep Patch-Wise Supervision for Presentation Attack Detection” was authored by Alperen Kantarcı, Hasan Dertli, and Hazım Ekenel. This paper addresses the generalisation problem in face presentation attack detection (PAD). Specifically, convolutional neural networks (CNN)-based systems have gained significant popularity recently due to their high performance on intra-dataset experiments. However, these systems often fail to generalise to the datasets that they have not been trained on. This indicates that they tend to memorise dataset-specific spoof traces. To mitigate this problem, the authors propose a new presentation attack detection (PAD) approach that combines pixel-wise binary supervision with patch-based CNN. The presented experiments show that the proposed patch-based method forces the model not to memorise the background information or dataset-specific traces. The proposed method was tested on widely used PAD datasets—Replay-Mobile, OULU-NPU— and on a real-world dataset that has been collected for real-world PAD use cases. The results presented show that the proposed approach is found to be superior on challenging experimental setups. Namely, it achieves higher performance on OULU-NPU protocol 3, 4 and on inter-dataset real-world experiments.</p><p>Paper “Transferability Analysis of Adversarial Attacks on Gender Classification to Face Recognition: Fixed and Variable Attack Perturbation” was authored by Zohra Rezgui, Amina Bassit, and Raymond Veldhuis. This paper focusses on the challenge of transferability of adversarial attacks. This work is motivated by the fact that it was proved in the literature that these attacks, targeting a specific model, are transferable among models performing the same task, however, the transferability scenarios are not considered in the literature for models performing different tasks but sharing the same input space and model architecture. In this paper, the authors study the above mentioned challenge regarding VGG16-based and ResNet50-based biometric classifiers. The impact of two white-box attacks on a gender classifier is investigated and then their robustness to defence methods is assessed by applying a feature-guided denoising method. Once the effectiveness of these attacks was established in fooling the gender classifier, we tested their transferability from the gender classification task to the facial recognition task with similar architectures in a black-box manner. Two verification comparison settings are employed, in which the authors compare images perturbed with the same and different magnitude of the perturbation. The presented results indicate transferability in the fixed perturbation setting for a Fast Gradient Sign Method (FGSM) attack and non-transferability in a Projected Gradient Descent (PGD) attack setting. The interpretation of this non-transferability can support the use of fast and train-free adversarial attacks targeting soft biometric classifiers as means to achieve soft biometric privacy protection while maintaining facial identity as utility.</p><p>Paper “Combining 2D Texture and 3D Geometry Features for Reliable Iris Presentation Attack Detection using Light Field Focal Stack” was authored by Zhengquan Luo, Yunlong Wang, Nianfeng Liu, and Zilei Wang. In this paper, the authors leverage the merits of both light field (LF) imaging and deep learning (DL) to combine 2D texture and 3D geometry features for iris presentation attack detection (PAD). The proposed study explores off-the-shelf deep features of planar-oriented and sequence-oriented deep neural networks (DNNs) on the rendered focal stack. The proposed framework excavates the differences in 3D geometric structure and 2D spatial texture between bona fide and spoofing irises captured by LF cameras. A group of pre-trained DL models are adopted as feature extractor and the parameters of SVM classifiers are optimised on a limited number of samples. Moreover, two branch feature fusion further strengthens the framework's robustness and reliability against severe motion blur, noise, and other degradation factors. The results indicate that variants of the proposed framework significantly surpass the PAD methods that take 2D planar images or LF focal stack as input, even recent state-of-the-art methods fined-tuned on the adopted database. The results of multi-class attack detection experiments also verify the good generalisation ability of the proposed framework on unseen presentation attacks.</p><p>Paper “Hybrid Biometric Template Protection: Resolving the Agony of Choice between Bloom Filters and Homomorphic Encryption” was authored by Amina Bassit, Florian Hahn, Chris Zeinstra, Raymond Veldhuis and Andreas Peter. This paper addresses the development of biometric template protection (BTP) schemes investigating the strengths and weaknesses of Bloom filters (BFs) and homomorphic encryption (HE). The paper notes that the pros and cons of BF-based and HE-based BTPs are not well studied in the literature and these two approaches both seem promising from a theoretical viewpoint. Thus, this work presents a comparative study of the existing BF-based BTPs and HE-based BTPs by examining their advantages and disadvantages from a theoretical standpoint. This comparison was applied to iris recognition as a study case, where the biometric and runtime performances of the BTP approaches were tested on the same setting, dataset, and implementation language. As a synthesis of this study, the authors propose a hybrid BTP scheme that combines the good properties of BFs and HE, ensuring unlinkability and high recognition accuracy, while being about 7 times faster than the traditional HE-based approach. The evaluation of the proposed scheme confirmed its biometric accuracy (an EER of 0:17% over the IITD iris database) and runtime efficiency (104:35 ms, 155:15 ms and 171:70 ms for 128,192, and 256 bits security level, respectively).</p><p>Paper “Locality Preserving Binary Face Representations Using Auto-encoders” was authored by Mohamed Amine HMANI, Dijana Petrovska-Delacrétaz and Bernadette Dorizzi. This paper focusses on template protection schemes for face biometrics and introduces a novel approach to binarising biometric data using Deep Neural Networks (DNN) applied to facial data. The authors propose the use of DNN to extract binary embeddings from face images directly. The proposed binary embeddings give a state-of-the-art performance on two well-known databases (MOBIO and the Labelled Faces in the Wild (LFW)) with almost negligible degradation compared to the baseline. Further, as an application, the paper proposes a cancellable system based on the binary embeddings using a shuffling transformation with a randomisation key as a second factor. The cancellable system is analysed according to the ISO/IEC 24745:2011 standardised metrics. The templates generated by the cancellable system are unlinkable without the disclosure of the second factor.</p><p>Paper “Reliable Detection of Doppelgängers based on Deep Face Representations” was submitted by Christian Rathgeb, Daniel Fischer, Pawel Drozdowski and Christoph Busch. This paper assesses the impact of doppelgängers (people that look alike) on the <i>HDA Doppelgänger</i> and <i>Disguised Faces in The Wild</i> databases using a state-of-the-art face recognition system, confirming that the existence of doppelgängers significantly increases false match rates. The paper then presents a method able to distinguish doppelgängers from mated comparison trials, by analysing differences in deep representations obtained from face image pairs. The proposed detection system achieves a state-of-the-art detection equal error rate of approximately 2.7% for the task of separating mated authentication attempts from doppelgängers in the mentioned databases.</p><p>Paper “Benchmarking Human Face Similarity Using Identical Twins” was authored by Shoaib Meraj Sami, John McCauley, Sobhan Soleymani, Nasser Nasrabadi, and Jeremy Dawson. This paper addresses the problem of distinguishing identical twins and non-twin look-alikes in automated facial recognition (FR) applications. This work makes use of one of the largest twin datasets compiled to date to address two FR challenges: 1) determining a baseline measure of facial similarity between identical twins and 2) applying this similarity measure to determine the impact of doppelgangers, or look-alikes, on FR performance for large face datasets. The methodology proposed for facial similarity measure is based on a deep convolutional neural network trained on a tailored verification task designed to encourage the network to group together highly similar face pairs in the embedding space and achieves a test AUC of 0.9799. The proposed network provides a quantitative similarity score for any two given faces and has been applied to large-scale face datasets to identify similar face pairs. An additional analysis which correlates the comparison score returned by a facial recognition tool and the similarity score returned by the proposed network has also been performed.</p><p>Paper “Discriminative Training of Spiking Neural Networks Organised in Columns for Stream-based Biometric Authentication” was authored by Enrique Argones Rúa, Tim Van hamme, Davy Preuveneers, and Wouter Joosen. In this paper, the authors address stream-based biometric authentication using a novel approach based on spiking neural networks (SNNs). SNNs have proven advantages regarding energy consumption and they are a perfect match with some proposed neuromorphic hardware chips, which can lead to a broader adoption of user device applications of artificial intelligence technologies. One of the challenges when using SNNs is the discriminative training of the network, since it is not straightforward to apply the well-known error backpropagation (EBP), massively used in traditional artificial neural networks (ANNs). Thus, the authors propose to use a network structure based on neuron columns, resembling cortical columns in the human cortex, and a new derivation of error backpropagation for the spiking neural networks that integrates the lateral inhibition in these structures. In the experiments presented, the potential of the proposed approach is tested in the task of inertial gait authentication, where gait is quantified as signals from Inertial Measurement Units (IMU). The proposed approach is compared to state-of-the-art ANNs being shown that SNNs provide competitive results, obtaining a difference of around 1% in Half Total Error Rate when compared to state-of-the-art ANNs in the context of IMU-based gait authentication.</p><p>Paper “Towards Understanding the Character of Quality Sampling in Deep Learning Face Recognition” was authored by Iurii Medvedev, João Tremoço, Luís Espírito Santo, Beatriz Mano, and Nuno Gonçalves. This paper addresses the problem of the inconsistency between the training data and the deployment scenario in face-based biometric systems, which are developed specifically for dealing with ID document compliant images. This inconsistency is often caused by the choice of unconstrained face images of celebrities for training, motivated by its public availability opposed to the fact that existing document compliant face image collections are hardly accessible due to security and privacy issues. To mitigate the addressed problem, the authors propose to regularise the training of the deep face recognition network with a specific sample mining strategy, which penalises the samples by their estimated quality. This deep learning strategy is expanded to seek for the penalty (sampling character) that better satisfies the purpose of adapting deep learning face recognition for images of ID and travel documents. The presented experiments demonstrate the efficiency of the approach for ID document compliant face images.</p><p>Paper “Masked Face Recognition: Human versus Machine” was authored by Naser Damer, Fadi Boutros, Marius Süßmilch, Meiling Fang, Florian Kirchbuchner and Arjan Kuijper. This paper focusses on the assessment of the effect of wearing a mask on face recognition (FR) in a collaborative environment. This work provides a joint evaluation and in-depth analyses of the face verification performance of human experts in comparison to state-of-the-art automatic FR solutions. In this paper, an extensive evaluation by human experts is presented along with four automatic recognition solutions. An analysis was made of the correlations between the verification behaviours of human experts and automatic FR solutions under different settings, such as involved unmasked pairs, masked probes and unmasked references, and masked pairs, with real and synthetic masks. The study concludes with a set of take-home messages on different aspects of the correlation between the verification behaviour of humans and machines.</p>","PeriodicalId":48821,"journal":{"name":"IET Biometrics","volume":null,"pages":null},"PeriodicalIF":1.8000,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12101","citationCount":"0","resultStr":"{\"title\":\"BIOSIG 2021 Special issue on efficient, reliable, and privacy-friendly biometrics\",\"authors\":\"Ana F. Sequeira,&nbsp;Marta Gomez-Barrero,&nbsp;Naser Damer,&nbsp;Paulo Lobato Correia\",\"doi\":\"10.1049/bme2.12101\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>This special issue of IET Biometrics, “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics”, has as starting point the 2021 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the efficiency, reliability and privacy of biometrics systems and methods.</p><p>The “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics” issue contains 12 papers, several of them being extended versions of papers presented at the BIOSIG 2021 conference, dealing with concrete research areas within biometrics such as <b>Presentation Attack Detection for Face and Iris</b>, <b>Biometric Template Protection Schemes</b> and <b>Deep Learning techniques for Biometrics</b>.</p><p>Paper “Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Attack Detectability by Quality” was authored by Biying Fu and Naser Damer. This paper addresses the effect of morphing processes both on the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. This work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures, analysing six different morphing techniques and five different data sources using 10 different quality measures. The consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures sustains the proposal of performing unsupervised morphing attack detection (MAD) based on quality scores. The study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The results obtained point out that a set of quality measures, such as MagFace and CNNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.</p><p>Paper “Pixel-Wise Supervision for Presentation Attack Detection on ID Cards” was authored by Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, and Naser Damer. This paper addresses the problem of detection of fake ID cards that are printed and then digitally presented for biometric authentication purposes in unsupervised settings. The authors propose a method based on pixel-wise supervision, using DenseNet, to leverage minute cues on various artefacts such as moiré patterns and artefacts left by the printers. To test the proposed system, a new database was obtained from an operational system, consisting of 886 users with 433 bona fide, 67 print and 366 display attacks (not publicly available due to GPDR regulations). The proposed approach achieves better performance compared to handcrafted features and deep learning models, with an Equal Error Rate (EER) of 2.22% and Bona fide Presentation Classification Error Rate (BPCER) of 1.83% and 1.67% @ Attack Presentation Classification Error Rate (APCER) of 5% and 10%, respectively.</p><p>Paper “Deep Patch-Wise Supervision for Presentation Attack Detection” was authored by Alperen Kantarcı, Hasan Dertli, and Hazım Ekenel. This paper addresses the generalisation problem in face presentation attack detection (PAD). Specifically, convolutional neural networks (CNN)-based systems have gained significant popularity recently due to their high performance on intra-dataset experiments. However, these systems often fail to generalise to the datasets that they have not been trained on. This indicates that they tend to memorise dataset-specific spoof traces. To mitigate this problem, the authors propose a new presentation attack detection (PAD) approach that combines pixel-wise binary supervision with patch-based CNN. The presented experiments show that the proposed patch-based method forces the model not to memorise the background information or dataset-specific traces. The proposed method was tested on widely used PAD datasets—Replay-Mobile, OULU-NPU— and on a real-world dataset that has been collected for real-world PAD use cases. The results presented show that the proposed approach is found to be superior on challenging experimental setups. Namely, it achieves higher performance on OULU-NPU protocol 3, 4 and on inter-dataset real-world experiments.</p><p>Paper “Transferability Analysis of Adversarial Attacks on Gender Classification to Face Recognition: Fixed and Variable Attack Perturbation” was authored by Zohra Rezgui, Amina Bassit, and Raymond Veldhuis. This paper focusses on the challenge of transferability of adversarial attacks. This work is motivated by the fact that it was proved in the literature that these attacks, targeting a specific model, are transferable among models performing the same task, however, the transferability scenarios are not considered in the literature for models performing different tasks but sharing the same input space and model architecture. In this paper, the authors study the above mentioned challenge regarding VGG16-based and ResNet50-based biometric classifiers. The impact of two white-box attacks on a gender classifier is investigated and then their robustness to defence methods is assessed by applying a feature-guided denoising method. Once the effectiveness of these attacks was established in fooling the gender classifier, we tested their transferability from the gender classification task to the facial recognition task with similar architectures in a black-box manner. Two verification comparison settings are employed, in which the authors compare images perturbed with the same and different magnitude of the perturbation. The presented results indicate transferability in the fixed perturbation setting for a Fast Gradient Sign Method (FGSM) attack and non-transferability in a Projected Gradient Descent (PGD) attack setting. The interpretation of this non-transferability can support the use of fast and train-free adversarial attacks targeting soft biometric classifiers as means to achieve soft biometric privacy protection while maintaining facial identity as utility.</p><p>Paper “Combining 2D Texture and 3D Geometry Features for Reliable Iris Presentation Attack Detection using Light Field Focal Stack” was authored by Zhengquan Luo, Yunlong Wang, Nianfeng Liu, and Zilei Wang. In this paper, the authors leverage the merits of both light field (LF) imaging and deep learning (DL) to combine 2D texture and 3D geometry features for iris presentation attack detection (PAD). The proposed study explores off-the-shelf deep features of planar-oriented and sequence-oriented deep neural networks (DNNs) on the rendered focal stack. The proposed framework excavates the differences in 3D geometric structure and 2D spatial texture between bona fide and spoofing irises captured by LF cameras. A group of pre-trained DL models are adopted as feature extractor and the parameters of SVM classifiers are optimised on a limited number of samples. Moreover, two branch feature fusion further strengthens the framework's robustness and reliability against severe motion blur, noise, and other degradation factors. The results indicate that variants of the proposed framework significantly surpass the PAD methods that take 2D planar images or LF focal stack as input, even recent state-of-the-art methods fined-tuned on the adopted database. The results of multi-class attack detection experiments also verify the good generalisation ability of the proposed framework on unseen presentation attacks.</p><p>Paper “Hybrid Biometric Template Protection: Resolving the Agony of Choice between Bloom Filters and Homomorphic Encryption” was authored by Amina Bassit, Florian Hahn, Chris Zeinstra, Raymond Veldhuis and Andreas Peter. This paper addresses the development of biometric template protection (BTP) schemes investigating the strengths and weaknesses of Bloom filters (BFs) and homomorphic encryption (HE). The paper notes that the pros and cons of BF-based and HE-based BTPs are not well studied in the literature and these two approaches both seem promising from a theoretical viewpoint. Thus, this work presents a comparative study of the existing BF-based BTPs and HE-based BTPs by examining their advantages and disadvantages from a theoretical standpoint. This comparison was applied to iris recognition as a study case, where the biometric and runtime performances of the BTP approaches were tested on the same setting, dataset, and implementation language. As a synthesis of this study, the authors propose a hybrid BTP scheme that combines the good properties of BFs and HE, ensuring unlinkability and high recognition accuracy, while being about 7 times faster than the traditional HE-based approach. The evaluation of the proposed scheme confirmed its biometric accuracy (an EER of 0:17% over the IITD iris database) and runtime efficiency (104:35 ms, 155:15 ms and 171:70 ms for 128,192, and 256 bits security level, respectively).</p><p>Paper “Locality Preserving Binary Face Representations Using Auto-encoders” was authored by Mohamed Amine HMANI, Dijana Petrovska-Delacrétaz and Bernadette Dorizzi. This paper focusses on template protection schemes for face biometrics and introduces a novel approach to binarising biometric data using Deep Neural Networks (DNN) applied to facial data. The authors propose the use of DNN to extract binary embeddings from face images directly. The proposed binary embeddings give a state-of-the-art performance on two well-known databases (MOBIO and the Labelled Faces in the Wild (LFW)) with almost negligible degradation compared to the baseline. Further, as an application, the paper proposes a cancellable system based on the binary embeddings using a shuffling transformation with a randomisation key as a second factor. The cancellable system is analysed according to the ISO/IEC 24745:2011 standardised metrics. The templates generated by the cancellable system are unlinkable without the disclosure of the second factor.</p><p>Paper “Reliable Detection of Doppelgängers based on Deep Face Representations” was submitted by Christian Rathgeb, Daniel Fischer, Pawel Drozdowski and Christoph Busch. This paper assesses the impact of doppelgängers (people that look alike) on the <i>HDA Doppelgänger</i> and <i>Disguised Faces in The Wild</i> databases using a state-of-the-art face recognition system, confirming that the existence of doppelgängers significantly increases false match rates. The paper then presents a method able to distinguish doppelgängers from mated comparison trials, by analysing differences in deep representations obtained from face image pairs. The proposed detection system achieves a state-of-the-art detection equal error rate of approximately 2.7% for the task of separating mated authentication attempts from doppelgängers in the mentioned databases.</p><p>Paper “Benchmarking Human Face Similarity Using Identical Twins” was authored by Shoaib Meraj Sami, John McCauley, Sobhan Soleymani, Nasser Nasrabadi, and Jeremy Dawson. This paper addresses the problem of distinguishing identical twins and non-twin look-alikes in automated facial recognition (FR) applications. This work makes use of one of the largest twin datasets compiled to date to address two FR challenges: 1) determining a baseline measure of facial similarity between identical twins and 2) applying this similarity measure to determine the impact of doppelgangers, or look-alikes, on FR performance for large face datasets. The methodology proposed for facial similarity measure is based on a deep convolutional neural network trained on a tailored verification task designed to encourage the network to group together highly similar face pairs in the embedding space and achieves a test AUC of 0.9799. The proposed network provides a quantitative similarity score for any two given faces and has been applied to large-scale face datasets to identify similar face pairs. An additional analysis which correlates the comparison score returned by a facial recognition tool and the similarity score returned by the proposed network has also been performed.</p><p>Paper “Discriminative Training of Spiking Neural Networks Organised in Columns for Stream-based Biometric Authentication” was authored by Enrique Argones Rúa, Tim Van hamme, Davy Preuveneers, and Wouter Joosen. In this paper, the authors address stream-based biometric authentication using a novel approach based on spiking neural networks (SNNs). SNNs have proven advantages regarding energy consumption and they are a perfect match with some proposed neuromorphic hardware chips, which can lead to a broader adoption of user device applications of artificial intelligence technologies. One of the challenges when using SNNs is the discriminative training of the network, since it is not straightforward to apply the well-known error backpropagation (EBP), massively used in traditional artificial neural networks (ANNs). Thus, the authors propose to use a network structure based on neuron columns, resembling cortical columns in the human cortex, and a new derivation of error backpropagation for the spiking neural networks that integrates the lateral inhibition in these structures. In the experiments presented, the potential of the proposed approach is tested in the task of inertial gait authentication, where gait is quantified as signals from Inertial Measurement Units (IMU). The proposed approach is compared to state-of-the-art ANNs being shown that SNNs provide competitive results, obtaining a difference of around 1% in Half Total Error Rate when compared to state-of-the-art ANNs in the context of IMU-based gait authentication.</p><p>Paper “Towards Understanding the Character of Quality Sampling in Deep Learning Face Recognition” was authored by Iurii Medvedev, João Tremoço, Luís Espírito Santo, Beatriz Mano, and Nuno Gonçalves. This paper addresses the problem of the inconsistency between the training data and the deployment scenario in face-based biometric systems, which are developed specifically for dealing with ID document compliant images. This inconsistency is often caused by the choice of unconstrained face images of celebrities for training, motivated by its public availability opposed to the fact that existing document compliant face image collections are hardly accessible due to security and privacy issues. To mitigate the addressed problem, the authors propose to regularise the training of the deep face recognition network with a specific sample mining strategy, which penalises the samples by their estimated quality. This deep learning strategy is expanded to seek for the penalty (sampling character) that better satisfies the purpose of adapting deep learning face recognition for images of ID and travel documents. The presented experiments demonstrate the efficiency of the approach for ID document compliant face images.</p><p>Paper “Masked Face Recognition: Human versus Machine” was authored by Naser Damer, Fadi Boutros, Marius Süßmilch, Meiling Fang, Florian Kirchbuchner and Arjan Kuijper. This paper focusses on the assessment of the effect of wearing a mask on face recognition (FR) in a collaborative environment. This work provides a joint evaluation and in-depth analyses of the face verification performance of human experts in comparison to state-of-the-art automatic FR solutions. In this paper, an extensive evaluation by human experts is presented along with four automatic recognition solutions. An analysis was made of the correlations between the verification behaviours of human experts and automatic FR solutions under different settings, such as involved unmasked pairs, masked probes and unmasked references, and masked pairs, with real and synthetic masks. The study concludes with a set of take-home messages on different aspects of the correlation between the verification behaviour of humans and machines.</p>\",\"PeriodicalId\":48821,\"journal\":{\"name\":\"IET Biometrics\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.8000,\"publicationDate\":\"2022-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/bme2.12101\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Biometrics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1049/bme2.12101\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Biometrics","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/bme2.12101","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

摘要

本期IET生物识别特刊“BIOSIG 2021高效、可靠和隐私友好型生物识别特刊”以2021年版生物识别特别兴趣小组(BIOSIG)会议为起点。本期特刊收集了有关生物识别的研究成果,从新的角度探讨了生物识别系统和方法的效率、可靠性和隐私性。“BIOSIG 2021高效、可靠和隐私友好型生物识别技术特刊”包含12篇论文,其中几篇是BIOSIG 2021会议上发表的论文的扩展版本,涉及生物识别技术的具体研究领域,如面部和虹膜的呈现攻击检测,生物识别模板保护方案和生物识别的深度学习技术。论文“人脸变形攻击与人脸图像质量:变形的影响和攻击的质量可检测性”由傅碧颖和Naser Damer撰写。本文讨论了与真实样本相比,变形过程对感知图像质量和图像在人脸识别(FR)中的效用的影响。这项工作提供了变形对人脸图像质量的影响的广泛分析,包括一般图像质量测量和人脸图像效用测量,分析了六种不同的变形技术和五种不同的数据源,使用10种不同的质量测量。变形攻击的质量分数与某些质量度量测量的真实样本之间具有一致的可分离性,这支持了基于质量分数进行无监督变形攻击检测(MAD)的提议。该研究着眼于数据集内部和数据集之间的可检测性,以评估这种检测概念在不同变形技术和真实来源上的普遍性。结果表明,MagFace和CNNNIQA等一组质量度量可以用于无监督的广义MAD,正确分类准确率超过70%。论文“基于像素的ID卡表示攻击检测监督”由Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra和Naser Damer撰写。本文解决了假身份证的检测问题,这些假身份证被打印出来,然后在无监督的环境中以数字方式呈现,用于生物识别认证目的。作者提出了一种基于像素监督的方法,使用DenseNet来利用各种人工制品上的微小线索,如波纹图案和打印机留下的人工制品。为了测试提议的系统,从一个操作系统中获得了一个新的数据库,该数据库由886个用户组成,其中有433次真实攻击,67次打印攻击和366次显示攻击(由于GPDR法规而未公开)。与手工特征和深度学习模型相比,该方法具有更好的性能,相等错误率(EER)为2.22%,真实表示分类错误率(BPCER)为1.83%和1.67%;攻击表示分类错误率(APCER)分别为5%和10%。论文“Deep Patch-Wise Supervision for Presentation Attack Detection”由Alperen kantarci, Hasan Dertli和Hazım Ekenel撰写。本文研究了人脸表示攻击检测(PAD)中的泛化问题。具体来说,基于卷积神经网络(CNN)的系统由于其在数据集内实验中的高性能,最近获得了显著的普及。然而,这些系统往往不能泛化到他们没有训练过的数据集。这表明它们倾向于记忆特定于数据集的欺骗痕迹。为了缓解这个问题,作者提出了一种新的表示攻击检测(PAD)方法,该方法将逐像素二进制监督与基于补丁的CNN相结合。实验表明,基于补丁的方法使模型不需要记忆背景信息或特定于数据集的轨迹。该方法在广泛使用的PAD数据集(replay - mobile, OULU-NPU)和为真实PAD用例收集的真实数据集上进行了测试。结果表明,该方法在具有挑战性的实验设置中具有优越性。也就是说,它在OULU-NPU协议3,4和数据集间真实世界实验中取得了更高的性能。Zohra Rezgui, Amina Bassit和Raymond Veldhuis撰写的论文“性别分类对抗性攻击到人脸识别的可转移性分析:固定和可变攻击扰动”。本文主要研究对抗性攻击的可转移性问题。 这项工作的动机是,在文献中证明了这些针对特定模型的攻击在执行相同任务的模型之间是可转移的,然而,对于执行不同任务但共享相同输入空间和模型架构的模型,文献中没有考虑可转移性场景。在本文中,作者研究了基于vgg16和基于resnet50的生物识别分类器的上述挑战。研究了两种白盒攻击对性别分类器的影响,然后采用特征引导去噪方法评估了它们对防御方法的鲁棒性。一旦确定了这些攻击在欺骗性别分类器方面的有效性,我们就以黑盒方式测试了它们从性别分类任务到具有类似架构的面部识别任务的可转移性。采用了两种验证比较设置,其中作者比较了扰动大小相同和不同的图像。研究结果表明,在固定扰动条件下,快速梯度符号法(FGSM)攻击具有可转移性,在投影梯度下降法(PGD)攻击条件下具有不可转移性。对这种不可转移性的解释可以支持使用针对软生物识别分类器的快速和无训练的对抗性攻击,作为实现软生物识别隐私保护的手段,同时保持面部身份的实用性。论文“结合二维纹理和三维几何特征进行可靠的虹膜呈现攻击检测,使用光场焦点堆栈”由罗正全,王云龙,刘年峰,王子磊撰写。在本文中,作者利用光场(LF)成像和深度学习(DL)的优点,将二维纹理和三维几何特征结合起来进行虹膜呈现攻击检测(PAD)。提出的研究探索了在渲染焦点堆栈上面向平面和面向序列的深度神经网络(dnn)的现成深度特征。该框架挖掘了LF相机捕获的真实虹膜和欺骗虹膜在三维几何结构和二维空间纹理上的差异。采用一组预训练好的深度学习模型作为特征提取器,并在有限数量的样本上优化SVM分类器的参数。此外,两分支特征融合进一步增强了框架对严重运动模糊、噪声和其他退化因素的鲁棒性和可靠性。结果表明,所提出的框架的变体明显超过了以2D平面图像或LF焦点堆栈作为输入的PAD方法,甚至是最近在所采用的数据库上进行微调的最先进的方法。多类攻击检测实验结果也验证了该框架对不可见表示攻击具有良好的泛化能力。论文“混合生物识别模板保护:解决布隆过滤器和同态加密之间选择的痛苦”由Amina Bassit, Florian Hahn, Chris Zeinstra, Raymond Veldhuis和Andreas Peter撰写。本文讨论了生物特征模板保护(BTP)方案的发展,研究了布隆过滤器(BFs)和同态加密(HE)的优缺点。本文指出,基于bf和he的BTPs的优缺点在文献中没有得到很好的研究,从理论角度来看,这两种方法似乎都很有希望。因此,本文从理论角度对现有的基于bf的BTPs和基于he的BTPs进行了比较研究,考察了它们的优缺点。将这种比较应用于虹膜识别作为研究案例,在相同的设置、数据集和实现语言上测试了BTP方法的生物特征和运行时性能。作为本研究的综合,作者提出了一种混合BTP方案,该方案结合了bf和HE的良好特性,保证了不可链接性和较高的识别精度,同时比传统的基于HE的方法快7倍左右。对该方案的评估证实了其生物识别精度(IITD虹膜数据库的EER为0:17%)和运行效率(128、192和256位安全级别分别为104:35 ms、155:15 ms和171:70 ms)。论文“Locality Preserving Binary Face Representations Using Auto-encoders”由Mohamed Amine HMANI, Dijana petrovska - delacr<s:1> taz和Bernadette Dorizzi撰写。本文重点研究了人脸生物识别的模板保护方案,并介绍了一种将深度神经网络(DNN)应用于人脸数据的生物识别数据二值化的新方法。作者提出使用深度神经网络直接从人脸图像中提取二值嵌入。 所提出的二值嵌入在两个知名数据库(MOBIO和labeled Faces in The Wild (LFW))上提供了最先进的性能,与基线相比几乎可以忽略不计。此外,作为一种应用,本文提出了一种基于二值嵌入的可取消系统,该系统使用随机化密钥作为第二因素的洗牌变换。可取消系统根据ISO/IEC 24745:2011标准化指标进行分析。在没有披露第二个因素的情况下,可取消系统生成的模板是不可链接的。论文“基于深度人脸表征的Doppelgängers可靠检测”由Christian Rathgeb, Daniel Fischer, Pawel Drozdowski和Christoph Busch提交。本文使用最先进的人脸识别系统评估了doppelgängers(长得很像的人)对HDA Doppelgänger和the Wild数据库中伪装的面孔的影响,确认doppelgängers的存在显著增加了错误匹配率。然后,通过分析从面部图像对获得的深度表示的差异,提出了一种能够从配对比较试验中区分doppelgängers的方法。所提出的检测系统在上述数据库中分离来自doppelgängers的配对身份验证尝试的任务中实现了最先进的检测相等错误率约为2.7%。论文“用同卵双胞胎测试人脸相似性”由Shoaib Meraj Sami, John McCauley, Sobhan Soleymani, Nasser Nasrabadi和Jeremy Dawson撰写。本文研究了在自动人脸识别(FR)应用中识别同卵双胞胎和异卵双胞胎的问题。这项工作利用迄今为止最大的双胞胎数据集之一来解决两个FR挑战:1)确定同卵双胞胎之间面部相似性的基线测量,2)应用该相似性测量来确定二重人格或长相相似者对大型面部数据集的FR性能的影响。所提出的面部相似性度量方法基于深度卷积神经网络,该神经网络在定制的验证任务上训练,旨在鼓励网络在嵌入空间中将高度相似的面部对组合在一起,并实现了0.9799的测试AUC。该网络为任意两个给定的人脸提供了定量的相似性评分,并已应用于大规模的人脸数据集来识别相似的人脸对。还进行了另一项分析,该分析将面部识别工具返回的比较分数与所提出的网络返回的相似性分数相关联。论文“为基于流的生物识别认证组织的柱状脉冲神经网络的判别训练”由Enrique Argones Rúa, Tim Van hamme, Davy preuveners和Wouter Joosen撰写。在本文中,作者使用一种基于峰值神经网络(snn)的新方法解决了基于流的生物识别认证问题。snn在能源消耗方面已经被证明具有优势,并且它们与一些提出的神经形态硬件芯片完美匹配,这可以导致更广泛地采用人工智能技术的用户设备应用。使用snn时面临的挑战之一是网络的判别训练,因为应用传统人工神经网络(ann)中大量使用的众所周知的误差反向传播(EBP)并不直接。因此,作者建议使用一种基于神经元柱的网络结构,类似于人类皮层的皮层柱,以及一种新的误差反向传播推导,用于集成这些结构中的侧抑制的尖峰神经网络。在所提出的实验中,在惯性步态认证任务中测试了该方法的潜力,其中步态被量化为来自惯性测量单元(IMU)的信号。将所提出的方法与最先进的人工神经网络进行了比较,结果表明,snn提供了有竞争力的结果,在基于imu的步态认证背景下,与最先进的人工神经网络相比,其总误差率的差异约为1%。论文“Towards Understanding Quality Sampling in Deep Learning Face Recognition”由Iurii Medvedev、jo<e:1> o tremoo、Luís Espírito Santo、Beatriz Mano和Nuno gonalves撰写。本文解决了人脸生物识别系统中训练数据与部署场景不一致的问题,人脸生物识别系统是专门为处理符合身份证件的图像而开发的。这种不一致通常是由于选择不受约束的名人面部图像进行培训造成的,其动机是其公开可用性,而不是由于安全和隐私问题而难以访问现有文档兼容的面部图像集。 为了缓解所解决的问题,作者提出用特定的样本挖掘策略来规范深度人脸识别网络的训练,该策略根据样本的估计质量对样本进行惩罚。将这种深度学习策略扩展到寻找更好地满足将深度学习人脸识别应用于身份证和旅行证件图像的目的的惩罚(采样字符)。实验证明了该方法对符合身份证件的人脸图像的有效性。论文“面具人脸识别:人类与机器”由Naser Damer, Fadi Boutros, Marius s<s:1> ßmilch, Meiling Fang, Florian Kirchbuchner和Arjan Kuijper撰写。本文主要研究了协作环境下戴口罩对人脸识别(FR)的影响。与最先进的自动人脸识别解决方案相比,这项工作提供了对人类专家人脸验证性能的联合评估和深入分析。在本文中,由人类专家进行了广泛的评估,并提出了四种自动识别解决方案。分析了人工专家验证行为与自动FR解决方案在不同设置下的相关性,如涉及非掩码对、被掩码探针和被掩码参考、被掩码对、真实掩码和合成掩码。该研究总结了一系列关于人类和机器验证行为之间相关性的不同方面的信息。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
BIOSIG 2021 Special issue on efficient, reliable, and privacy-friendly biometrics

This special issue of IET Biometrics, “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics”, has as starting point the 2021 edition of the Biometric Special Interest Group (BIOSIG) conference. This special issue gathers works focussing on topics of biometric recognition put under the new light of fostering the efficiency, reliability and privacy of biometrics systems and methods.

The “BIOSIG 2021 Special Issue on Efficient, Reliable, and Privacy-Friendly Biometrics” issue contains 12 papers, several of them being extended versions of papers presented at the BIOSIG 2021 conference, dealing with concrete research areas within biometrics such as Presentation Attack Detection for Face and Iris, Biometric Template Protection Schemes and Deep Learning techniques for Biometrics.

Paper “Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Attack Detectability by Quality” was authored by Biying Fu and Naser Damer. This paper addresses the effect of morphing processes both on the perceptual image quality and the image utility in face recognition (FR) when compared to bona fide samples. This work provides an extensive analysis of the effect of morphing on face image quality, including both general image quality measures and face image utility measures, analysing six different morphing techniques and five different data sources using 10 different quality measures. The consistent separability between the quality scores of morphing attack and bona fide samples measured by certain quality measures sustains the proposal of performing unsupervised morphing attack detection (MAD) based on quality scores. The study looks into intra- and inter-dataset detectability to evaluate the generalisability of such a detection concept on different morphing techniques and bona fide sources. The results obtained point out that a set of quality measures, such as MagFace and CNNNIQA, can be used to perform unsupervised and generalised MAD with a correct classification accuracy of over 70%.

Paper “Pixel-Wise Supervision for Presentation Attack Detection on ID Cards” was authored by Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, and Naser Damer. This paper addresses the problem of detection of fake ID cards that are printed and then digitally presented for biometric authentication purposes in unsupervised settings. The authors propose a method based on pixel-wise supervision, using DenseNet, to leverage minute cues on various artefacts such as moiré patterns and artefacts left by the printers. To test the proposed system, a new database was obtained from an operational system, consisting of 886 users with 433 bona fide, 67 print and 366 display attacks (not publicly available due to GPDR regulations). The proposed approach achieves better performance compared to handcrafted features and deep learning models, with an Equal Error Rate (EER) of 2.22% and Bona fide Presentation Classification Error Rate (BPCER) of 1.83% and 1.67% @ Attack Presentation Classification Error Rate (APCER) of 5% and 10%, respectively.

Paper “Deep Patch-Wise Supervision for Presentation Attack Detection” was authored by Alperen Kantarcı, Hasan Dertli, and Hazım Ekenel. This paper addresses the generalisation problem in face presentation attack detection (PAD). Specifically, convolutional neural networks (CNN)-based systems have gained significant popularity recently due to their high performance on intra-dataset experiments. However, these systems often fail to generalise to the datasets that they have not been trained on. This indicates that they tend to memorise dataset-specific spoof traces. To mitigate this problem, the authors propose a new presentation attack detection (PAD) approach that combines pixel-wise binary supervision with patch-based CNN. The presented experiments show that the proposed patch-based method forces the model not to memorise the background information or dataset-specific traces. The proposed method was tested on widely used PAD datasets—Replay-Mobile, OULU-NPU— and on a real-world dataset that has been collected for real-world PAD use cases. The results presented show that the proposed approach is found to be superior on challenging experimental setups. Namely, it achieves higher performance on OULU-NPU protocol 3, 4 and on inter-dataset real-world experiments.

Paper “Transferability Analysis of Adversarial Attacks on Gender Classification to Face Recognition: Fixed and Variable Attack Perturbation” was authored by Zohra Rezgui, Amina Bassit, and Raymond Veldhuis. This paper focusses on the challenge of transferability of adversarial attacks. This work is motivated by the fact that it was proved in the literature that these attacks, targeting a specific model, are transferable among models performing the same task, however, the transferability scenarios are not considered in the literature for models performing different tasks but sharing the same input space and model architecture. In this paper, the authors study the above mentioned challenge regarding VGG16-based and ResNet50-based biometric classifiers. The impact of two white-box attacks on a gender classifier is investigated and then their robustness to defence methods is assessed by applying a feature-guided denoising method. Once the effectiveness of these attacks was established in fooling the gender classifier, we tested their transferability from the gender classification task to the facial recognition task with similar architectures in a black-box manner. Two verification comparison settings are employed, in which the authors compare images perturbed with the same and different magnitude of the perturbation. The presented results indicate transferability in the fixed perturbation setting for a Fast Gradient Sign Method (FGSM) attack and non-transferability in a Projected Gradient Descent (PGD) attack setting. The interpretation of this non-transferability can support the use of fast and train-free adversarial attacks targeting soft biometric classifiers as means to achieve soft biometric privacy protection while maintaining facial identity as utility.

Paper “Combining 2D Texture and 3D Geometry Features for Reliable Iris Presentation Attack Detection using Light Field Focal Stack” was authored by Zhengquan Luo, Yunlong Wang, Nianfeng Liu, and Zilei Wang. In this paper, the authors leverage the merits of both light field (LF) imaging and deep learning (DL) to combine 2D texture and 3D geometry features for iris presentation attack detection (PAD). The proposed study explores off-the-shelf deep features of planar-oriented and sequence-oriented deep neural networks (DNNs) on the rendered focal stack. The proposed framework excavates the differences in 3D geometric structure and 2D spatial texture between bona fide and spoofing irises captured by LF cameras. A group of pre-trained DL models are adopted as feature extractor and the parameters of SVM classifiers are optimised on a limited number of samples. Moreover, two branch feature fusion further strengthens the framework's robustness and reliability against severe motion blur, noise, and other degradation factors. The results indicate that variants of the proposed framework significantly surpass the PAD methods that take 2D planar images or LF focal stack as input, even recent state-of-the-art methods fined-tuned on the adopted database. The results of multi-class attack detection experiments also verify the good generalisation ability of the proposed framework on unseen presentation attacks.

Paper “Hybrid Biometric Template Protection: Resolving the Agony of Choice between Bloom Filters and Homomorphic Encryption” was authored by Amina Bassit, Florian Hahn, Chris Zeinstra, Raymond Veldhuis and Andreas Peter. This paper addresses the development of biometric template protection (BTP) schemes investigating the strengths and weaknesses of Bloom filters (BFs) and homomorphic encryption (HE). The paper notes that the pros and cons of BF-based and HE-based BTPs are not well studied in the literature and these two approaches both seem promising from a theoretical viewpoint. Thus, this work presents a comparative study of the existing BF-based BTPs and HE-based BTPs by examining their advantages and disadvantages from a theoretical standpoint. This comparison was applied to iris recognition as a study case, where the biometric and runtime performances of the BTP approaches were tested on the same setting, dataset, and implementation language. As a synthesis of this study, the authors propose a hybrid BTP scheme that combines the good properties of BFs and HE, ensuring unlinkability and high recognition accuracy, while being about 7 times faster than the traditional HE-based approach. The evaluation of the proposed scheme confirmed its biometric accuracy (an EER of 0:17% over the IITD iris database) and runtime efficiency (104:35 ms, 155:15 ms and 171:70 ms for 128,192, and 256 bits security level, respectively).

Paper “Locality Preserving Binary Face Representations Using Auto-encoders” was authored by Mohamed Amine HMANI, Dijana Petrovska-Delacrétaz and Bernadette Dorizzi. This paper focusses on template protection schemes for face biometrics and introduces a novel approach to binarising biometric data using Deep Neural Networks (DNN) applied to facial data. The authors propose the use of DNN to extract binary embeddings from face images directly. The proposed binary embeddings give a state-of-the-art performance on two well-known databases (MOBIO and the Labelled Faces in the Wild (LFW)) with almost negligible degradation compared to the baseline. Further, as an application, the paper proposes a cancellable system based on the binary embeddings using a shuffling transformation with a randomisation key as a second factor. The cancellable system is analysed according to the ISO/IEC 24745:2011 standardised metrics. The templates generated by the cancellable system are unlinkable without the disclosure of the second factor.

Paper “Reliable Detection of Doppelgängers based on Deep Face Representations” was submitted by Christian Rathgeb, Daniel Fischer, Pawel Drozdowski and Christoph Busch. This paper assesses the impact of doppelgängers (people that look alike) on the HDA Doppelgänger and Disguised Faces in The Wild databases using a state-of-the-art face recognition system, confirming that the existence of doppelgängers significantly increases false match rates. The paper then presents a method able to distinguish doppelgängers from mated comparison trials, by analysing differences in deep representations obtained from face image pairs. The proposed detection system achieves a state-of-the-art detection equal error rate of approximately 2.7% for the task of separating mated authentication attempts from doppelgängers in the mentioned databases.

Paper “Benchmarking Human Face Similarity Using Identical Twins” was authored by Shoaib Meraj Sami, John McCauley, Sobhan Soleymani, Nasser Nasrabadi, and Jeremy Dawson. This paper addresses the problem of distinguishing identical twins and non-twin look-alikes in automated facial recognition (FR) applications. This work makes use of one of the largest twin datasets compiled to date to address two FR challenges: 1) determining a baseline measure of facial similarity between identical twins and 2) applying this similarity measure to determine the impact of doppelgangers, or look-alikes, on FR performance for large face datasets. The methodology proposed for facial similarity measure is based on a deep convolutional neural network trained on a tailored verification task designed to encourage the network to group together highly similar face pairs in the embedding space and achieves a test AUC of 0.9799. The proposed network provides a quantitative similarity score for any two given faces and has been applied to large-scale face datasets to identify similar face pairs. An additional analysis which correlates the comparison score returned by a facial recognition tool and the similarity score returned by the proposed network has also been performed.

Paper “Discriminative Training of Spiking Neural Networks Organised in Columns for Stream-based Biometric Authentication” was authored by Enrique Argones Rúa, Tim Van hamme, Davy Preuveneers, and Wouter Joosen. In this paper, the authors address stream-based biometric authentication using a novel approach based on spiking neural networks (SNNs). SNNs have proven advantages regarding energy consumption and they are a perfect match with some proposed neuromorphic hardware chips, which can lead to a broader adoption of user device applications of artificial intelligence technologies. One of the challenges when using SNNs is the discriminative training of the network, since it is not straightforward to apply the well-known error backpropagation (EBP), massively used in traditional artificial neural networks (ANNs). Thus, the authors propose to use a network structure based on neuron columns, resembling cortical columns in the human cortex, and a new derivation of error backpropagation for the spiking neural networks that integrates the lateral inhibition in these structures. In the experiments presented, the potential of the proposed approach is tested in the task of inertial gait authentication, where gait is quantified as signals from Inertial Measurement Units (IMU). The proposed approach is compared to state-of-the-art ANNs being shown that SNNs provide competitive results, obtaining a difference of around 1% in Half Total Error Rate when compared to state-of-the-art ANNs in the context of IMU-based gait authentication.

Paper “Towards Understanding the Character of Quality Sampling in Deep Learning Face Recognition” was authored by Iurii Medvedev, João Tremoço, Luís Espírito Santo, Beatriz Mano, and Nuno Gonçalves. This paper addresses the problem of the inconsistency between the training data and the deployment scenario in face-based biometric systems, which are developed specifically for dealing with ID document compliant images. This inconsistency is often caused by the choice of unconstrained face images of celebrities for training, motivated by its public availability opposed to the fact that existing document compliant face image collections are hardly accessible due to security and privacy issues. To mitigate the addressed problem, the authors propose to regularise the training of the deep face recognition network with a specific sample mining strategy, which penalises the samples by their estimated quality. This deep learning strategy is expanded to seek for the penalty (sampling character) that better satisfies the purpose of adapting deep learning face recognition for images of ID and travel documents. The presented experiments demonstrate the efficiency of the approach for ID document compliant face images.

Paper “Masked Face Recognition: Human versus Machine” was authored by Naser Damer, Fadi Boutros, Marius Süßmilch, Meiling Fang, Florian Kirchbuchner and Arjan Kuijper. This paper focusses on the assessment of the effect of wearing a mask on face recognition (FR) in a collaborative environment. This work provides a joint evaluation and in-depth analyses of the face verification performance of human experts in comparison to state-of-the-art automatic FR solutions. In this paper, an extensive evaluation by human experts is presented along with four automatic recognition solutions. An analysis was made of the correlations between the verification behaviours of human experts and automatic FR solutions under different settings, such as involved unmasked pairs, masked probes and unmasked references, and masked pairs, with real and synthetic masks. The study concludes with a set of take-home messages on different aspects of the correlation between the verification behaviour of humans and machines.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IET Biometrics
IET Biometrics COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-
CiteScore
5.90
自引率
0.00%
发文量
46
审稿时长
33 weeks
期刊介绍: The field of biometric recognition - automated recognition of individuals based on their behavioural and biological characteristics - has now reached a level of maturity where viable practical applications are both possible and increasingly available. The biometrics field is characterised especially by its interdisciplinarity since, while focused primarily around a strong technological base, effective system design and implementation often requires a broad range of skills encompassing, for example, human factors, data security and database technologies, psychological and physiological awareness, and so on. Also, the technology focus itself embraces diversity, since the engineering of effective biometric systems requires integration of image analysis, pattern recognition, sensor technology, database engineering, security design and many other strands of understanding. The scope of the journal is intentionally relatively wide. While focusing on core technological issues, it is recognised that these may be inherently diverse and in many cases may cross traditional disciplinary boundaries. The scope of the journal will therefore include any topics where it can be shown that a paper can increase our understanding of biometric systems, signal future developments and applications for biometrics, or promote greater practical uptake for relevant technologies: Development and enhancement of individual biometric modalities including the established and traditional modalities (e.g. face, fingerprint, iris, signature and handwriting recognition) and also newer or emerging modalities (gait, ear-shape, neurological patterns, etc.) Multibiometrics, theoretical and practical issues, implementation of practical systems, multiclassifier and multimodal approaches Soft biometrics and information fusion for identification, verification and trait prediction Human factors and the human-computer interface issues for biometric systems, exception handling strategies Template construction and template management, ageing factors and their impact on biometric systems Usability and user-oriented design, psychological and physiological principles and system integration Sensors and sensor technologies for biometric processing Database technologies to support biometric systems Implementation of biometric systems, security engineering implications, smartcard and associated technologies in implementation, implementation platforms, system design and performance evaluation Trust and privacy issues, security of biometric systems and supporting technological solutions, biometric template protection Biometric cryptosystems, security and biometrics-linked encryption Links with forensic processing and cross-disciplinary commonalities Core underpinning technologies (e.g. image analysis, pattern recognition, computer vision, signal processing, etc.), where the specific relevance to biometric processing can be demonstrated Applications and application-led considerations Position papers on technology or on the industrial context of biometric system development Adoption and promotion of standards in biometrics, improving technology acceptance, deployment and interoperability, avoiding cross-cultural and cross-sector restrictions Relevant ethical and social issues
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信