P245 - BIOSIG 2015 - Proceedings of the 14th International Conference of the Biometrics Special Interest Group
Auflistung P245 - BIOSIG 2015 - Proceedings of the 14th International Conference of the Biometrics Special Interest Group nach Erscheinungsdatum
1 - 10 von 34
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragFingerprint image enhancement with easy to use algorithms(BIOSIG 2015, 2015) Klir, ThomasThis paper looks at measures to enhance image quality with the intention of improving recognition rates of finger recognition systems. There are thus different algorithms when compared to each other. The methods cover sharpness enhancement in general; wavelet sharpness, photocopy filters, EAW filters, DoG filters and Cartoon filters. The FVC2000 Db1a is used as reference dataset. The scores for the comparison are based on the NFIQ quality scores. The approach of the paper is to use a few single algorithms of the GIMP program and evaluate which one improves the reference database the most. GIMP is open-source software so everybody can use it to improve fingerprint images without having advanced programming skills.
- KonferenzbeitragLiveness Detectionin Biometrics(BIOSIG 2015, 2015) Krieg, Maximilian; Rogmann, NilsThe use of biometrics as an alternative for PIN and password-based authentication systems becomes increasingly attractive in this day and age. Biometric systems perform an authentication by personal biological or behavioral characteristics. A negative side effect of the increasing use of biometric systems is the progressing development of sophisticated attacks, in particular presentation attacks. Liveness detection has the aim to identify a living and during the biometric authentication process present individual as such and to repel spoofing attacks at the data capture subsystem. In this paper different current attack scenarios are described. Based on these scenarios, several liveness detection techniques are elaborated and investigated as possible countermeasures.
- KonferenzbeitragPrivacy preserving technique for set-based biometric authentication using Reed-Solomon decoding(BIOSIG 2015, 2015) Hartloff, Jesse; Mandal, Avradip; Roy, ArnabIn this work, we present a single-factor biometric authentication system that provides template security against an adversarial server while allowing errortolerant matching. Our approach is to secure templates represented as sets using errorcorrecting codes and Reed-Solomon decoding. To accomplish this, each element in the set is combined with a random codeword and a secret share is computed using the codeword and a Reed-Solomon based secret sharing scheme. These random codewords provide uncertainty for an attacker, while the genuine user can decode to the correct values for verification. Without a reading from the enrolling biometric the shares will appear random, thus protecting the users biometric. We show implementation results for this system on fingerprints using pairs of minutia points. Our system overcomes many common weaknesses for template security systems including replay attacks, malicious servers, eavesdroppers, and record multiplicity attacks.
- KonferenzbeitragPalm vein database and experimental framework for reproducible research(BIOSIG 2015, 2015) Tome, Pedro; Marcel, SébastienA palm vein database acquired by a contactless sensor together with an experimental framework freely available for fair reproducible research purposes are described. The palm vein recognition system uses automatic palm region segmentation and circular Gabor filter approach to enhance the veins in the preprocessing, LBP features and histogram intersection as matching. Results are presented comparing two automatic segmentation using the ROI-1 region proportioned by the acquisition sensor and the ROI-2 region generated by the recognition software developed. Complete benchmark results using popular methods and the source code are attached to the database as a reference for other researchers.
- KonferenzbeitragImproved fuzzy vault scheme for alignment-free fingerprint features(BIOSIG 2015, 2015) Tams, Benjamin; Merkle, Johannes; Rathgeb, Christian; Wagner, Johannes; Korte, Ulrike; Busch, ChristophThe fuzzy vault scheme is one of the most prominent tools for protecting fingerprint templates, typically being minutiae-based. However, there exist two major problems. Firstly, the fuzzy vault scheme is vulnerable to attacks correlating different templates of the same user. Secondly, auxiliary alignment data may leak information about the protected fingerprints which negatively affects security and privacy. In this paper, we tackle both problems. Our implementation uses alignment-free fingerprint features and fusions thereof, thereby removing the need to store alignment parameters. Furthermore, the features are passed through a quantization scheme and then dispersed in a maximal number of chaff, thereby thwarting correlation attacks.
- KonferenzbeitragPose Variability Compensation Using Projective Transformation Forensic Face Recognition(BIOSIG 2015, 2015) Gonzalez-Sosa, Ester; Vera-Rodriguez, Ruben; Fierrez, Julian; Tome, Pedro; Ortega-Garcia, JavierThe forensic scenario is a very challenging problem within the face recognition community. The verification problem in this case typically implies the comparison between a high quality controlled image against a low quality image extracted from a close circuit television (CCTV). One of the downsides that frequently presents this scenario is pose deviation since CCTV devices are usually placed in ceilings and the subject normally walks facing forward. This paper proves the value of the projective transformation as a simple tool to compensate the pose distortion present in surveillance images in forensic scenarios. We evaluate the influence of this projective transformation over a baseline system based on principal component analysis and support vector machines (PCA-SVM) for the SCface database. The application of this technique improves greatly the performance, being this improvement more striking with closer images. Results suggest the convenience of this transformation within the preprocessing stage of all CCTV images. The average relative improvement reached with this method is around 30\% of EER.
- KonferenzbeitragExploring how user routine affects the recognition performance of a lock pattern(BIOSIG 2015, 2015) Wilde, Lisa De; Spreeuwers, Luuk; Veldhuis, RaymondTo protect an Android smartphone against attackers, a lock pattern can be used. Nevertheless, shoulder-surfing and smudge attacks can be used to get access despite of this protection. To combat these attacks, biometric recognition can be added to the lock pattern, such that the lock-pattern application keeps track of the way users draw the pattern. This research explores how users change the way they draw lock patterns over time and its effect on the recognition performance of the pattern. A lock-pattern dataset has been collected and a classifier is proposed. In this research the best result was obtained using the x- and y-coordinate as the user's biometrics. Unfortunately, in this paper it is shown that adding biometrics to a lock pattern is only an additional security that provides no guarantee for a secure lock pattern. It is just a small improvement over using a lock pattern without biometric identification.
- KonferenzbeitragEEG biometrics for user recognition using visually evoked potentials(BIOSIG 2015, 2015) Das, Rig; Maiorana, Emanuele; Rocca, Daria La; Campisi, PatrizioElectroencephalographic signals (EEG) have been long supposed to contain features characteristic of each individual, yet a substantial interest for exploiting them as a potential biometrics for people recognition has only recently grown. The biggest advantages of EEG-based biometrics lie in its universality and security, while its major concerns are related to the acquisition protocol that can be inconvenient and time consuming. This paper investigates the use of EEG signals, elicited using visual stimuli, for the purpose of biometric recognition, and evaluates the performance obtained considering various frequency bands, different number of visual stimuli, and various subsets of time intervals after the stimuli presentation. An exhaustive set of experimental tests has been performed by employing EEG data of 50 different healthy subjects acquired in two different sessions, separated by one week time.
- KonferenzbeitragFace tracking using optical flow development of a real-time adaboost cascade face tracker(BIOSIG 2015, 2015) Ranftl, Andreas; Alonso-Fernandez, Fernando; Karlsson, StefanIn this paper a novel face tracking approach is presented where optical flow information is incorporated into the Viola-Jones face detection algorithm. In the original algorithm from Viola and Jones face detection is static as information from previous frames is not considered. In contrast to the Viola- Jones face detector and also to other known dynamic enhancements, the proposed face tracker preserves information about near-positives. The algorithm builds a likelihood map from the intermediate results of the Viola-Jones algorithm which is extrapolated using optical flow. The objects get extracted from the likelihood map using image segmentation techniques. All steps can be computed very efficiently in real-time. The tracker is verified on the Boston Head Tracking Database showing that the proposed algorithm outperforms the standard Viola-Jones face detector.
- KonferenzbeitragJPEG optimisation for fingerprint recognition: generalisation potential of an evolutionary approach(BIOSIG 2015, 2015) Herzog, Thomas; Uhl, AndreasFor fingerprint-based biometric systems, JPEG has traditionally been one of the primary storage formats. In this paper, we investigate methods of optimising JPEG compression for increased matching scores at constant compression rates. To achieve this, an evolutionary approach is employed to optimise the quantisation matrix used by JPEG. While finding matrices that are better suited for different sets of fingerprints, different fingerprint sensors, and different recognition algorithms as they have been optimised for remains elusive, we find improvements in matching performance for dataset fitting scenarios.