Logo des Repositoriums
 

P230 - BIOSIG 2014 - Proceedings of the 13th International Conference of the Biometrics Special Interest Group

Autor*innen mit den meisten Dokumenten  

Auflistung nach:

Neueste Veröffentlichungen

1 - 10 von 26
  • Konferenzbeitrag
    Pre-processing cascades and fusion in finger vein recognition
    (BIOSIG 2014, 2014) Kauba, Christoph; Reissig, Jakob; Uhl, Andreas
    Preprocessing and fusion techniques for finger vein recognition are investigated. An experimental study involving a set of preprocessing approaches shows the importance of selecting the appropriate single technique and the usefulness of cascading several different preprocessing methods for subsequent feature extraction of various types. Score level fusion is able to significantly improve recognition results, in particular when combining features describing complementary finger image properties.
  • Konferenzbeitrag
    On the vulnerability of finger vein recognition to spoofing
    (BIOSIG 2014, 2014) Tome, Pedro; Vanoni, Matthias; Marcel, Sébastien
    The vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of spoofing finger vein images has been created from real finger vein samples. Finger vein images are printed using a commercial printer and then, presented at an open source finger vein sensor. Experiments are carried out using an extensible framework, which allows fair and reproducible benchmarks. Experimental results lead to a spoofing false accept rate of 86\%, thus showing that finger vein biometrics is vulnerable to spoofing attacks, pointing out the importance to investigate countermeasures against this type of fraudulent actions.
  • Konferenzbeitrag
    Shattering the glass maze
    (BIOSIG 2014, 2014) Hermans, Jens; Peeters, Roel; Mennink, Bart
    Template protection plays a crucial role in protecting the privacy of biometric data, by providing irreversibility and unlinkability. The Glass Maze, as presented by Trugenberger at BIOSIG 2011, is a fingerprint key binding mechanism that is claimed to provide template protection. With the correct fingerprint, the key that is entangled with the fingerprint data can be retrieved. The template protection of the Glass Maze is based on the convergence properties of a Hopfield model, a neural network. We however show how to revert the Glass Maze to recover the key, without requiring a correct fingerprint. This completely breaks the irreversibility property, and hence also unlinkability.
  • Konferenzbeitrag
    Bimodal palm biometric feature extraction using a single RGB image
    (BIOSIG 2014, 2014) Eglitis, Teodors; Pudzs, Mihails; Greitans, Modris
    This paper proposes a method for palm bimodal biometric feature (vein and crease pattern) acquisition from a single RGB image. Typical bimodal biometric systems require combining infrared and visible images for this task. We use a single CMOS color sensor and a specific illumination comprising of two wavelengths to acquire the image. As a result each biometric modality is more pronounced in its own color channel. The image is processed by applying adapted matched filters with nonlinear modifications. Performance of the proposed method is evaluated against feature separation with optical band-pass and band-stop approach on a database of 64 people. The results show the average true positive rate is 70.6 \% for vein detection and 64.7 \% for crease detection, whereas in 14.8 \% and 9.29 \% of the cases feature of wrong modality is detected.
  • Konferenzbeitrag
    When a bloom filter is a doom filter: security assessment of a novel iris biometric template protection system
    (BIOSIG 2014, 2014) Hermans, Jens; Mennink, Bart; Peeters, Roel
    Biometric template protection systems are expected to meet two major security requirements: irreversibility and unlinkability. We analyze the Bloom filter based iris biometric template protection system recently introduced by Rathgeb et al. at ICB 2013 and IET Biometrics 2014. We demonstrate that the scheme does not achieve unlinkability, presenting a simple attack that in the worst case succeeds with probability at least 96\%. We also present a security analysis on generating false positives or recovering the key, both leading to undesirably low attack complexities: 225 for generating false positives for the smaller versions of the scheme, and a complexity between 22 and 28 for recovering the secret key.
  • Konferenzbeitrag
    Speedup for European epassport authentication
    (BIOSIG 2014, 2014) Peeters, Roel; Hermans, Jens; Mennink, Bart
    The overall ePassport authentication procedure should be fast to have a sufficient throughput of people at border crossings such as airports. At the same time, the ePassport and its holder should be checked as thoroughly as possible. By speeding up the ePassport authentication procedure, more time can be spend on verification of biometrics. We demonstrate that our proposed solution allows to replace the current combination of PACE and EAC with a more efficient authentication procedure that provides even better security and privacy guarantees. When abstracting away from the time needed for the ePassport to verify the terminal's certificate, a speed-up of at least 40\% in comparison with the current ePassport authentication procedure is to be expected.
  • Konferenzbeitrag
    Symmetry assessment by finite expansion: application to forensic fingerprints
    (BIOSIG 2014, 2014) Mikaelyan, Anna; Bigun, Josef
    Common image features have too poor information for identification of forensic images of fingerprints, where only a small area of the finger is imaged and hence a small amount of key points are available. Noise, nonlinear deformation, and unknown rotation are additional issues that complicate identification of forensic fingerprints. We propose a feature extraction method which describes image information around key points: Symmetry Assessment by Finite Expansion (SAFE). The feature set has built-in quality estimates as well as a rotation invariance property. The theory is developed for continuous space, allowing compensation for features directly in the feature space when images undergo such rotation without actually rotating them. Experiments supporting that use of these features improves identification of forensic fingerprint images of the public NIST SD27 database are presented. Performance of matching orientation information in a neighborhood of core points has an EER of 24\% with these features alone, without using minutiae constellations, in contrast to 36\% when using minutiae alone. Rank-20 CMC is 58\%, which is lower than 67\% when using notably more manually collected minutiae information.
  • Konferenzbeitrag
    An unconstrained Activity Recognition Method using Smart Phones
    (BIOSIG 2014, 2014) Çelenli, Naciye; Seviş, Kamile N.; Esgin, Muhammed F.; Altundaǧ, Kemal; Uludaǧ, Umut
    In this paper, we provide human activity recognition performance rates, using accelerometer and gyroscope signals acquired using smart phones. Covering seven basic actions (walking, running, jumping, standing, ascending stairs, descending stairs, and standing up and sitting down as one action) and a complex action (getting in and out of a car), with more than 100 subjects in a database collected in different environments, we provide recognition results on the largest database in the published literature. Utilizing features (e.g. extrema, zero crossing rates$\dots $) extracted from time-windows (e.g. with a duration of 2 seconds), K-Star classifier led to the best performance among 6 classifiers tested, exceeding 98\% recognition accuracy. A detailed comparison with current approaches is provided, along with possible future research directions. The associated technology could be helpful for health-related monitoring of one's activities, generating automatic status feeds for social networking sites, and calculating precise/adaptive calorie intake needs for individuals.
  • Konferenzbeitrag
    Assessing facial age similarity: A framework for evaluating the robustness of different feature sets
    (BIOSIG 2014, 2014) Lanitis, Andreas; Tsapatsoulis, Nicolas
    A framework that can be used for assessing the suitability of different feature vectors in the task of determining the age similarity between a pair of faces is
  • Konferenzbeitrag
    Automatic speaker verification using nearest neighbor normalization (3N) on an ipad tablet
    (BIOSIG 2014, 2014) Khemiri, Houssemeddine; Usoltsev, Alexander; Legout, Marie-Christine; Petrovska-Delacrétaz, Dijana; Chollet, Gérard
    This paper describes the development, implementation and validation of an automatic speaker recognition system on an iPad tablet. A score normalization approach, referred as Nearest Neighbor Normalization (3N), is applied in order to improve the baseline speaker verification system. The system is evaluated on the MOBIO corpus and results show an absolute improvement of the HTER by more than 4\% when the score normalization is performed. A human-centered interface is implemented for the speaker recognition system and a survey is collected from 28 users in order to evaluate the application. The results showed that the users, familiar with touchscreen interface, found the application easy to learn and use.