The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A spoof or fake is a counterfeit biometric that is used in an attempt to circumvent a biometric sensor. Liveness detection distinguishes between live and fake biometric traits. Liveness detection is based on the principle that additional information can be garnered above and beyond the data procured by a standard authentication system, and this additional data can be used to determine if a biometric...
Biometrics systems are being challenged at the sensor level using artefact presentation such as printed artefacts or electronic screen attacks. In this work, we propose a novel technique to detect the artefact iris images by decomposing the images into Laplacian pyramids of various scales and obtain frequency responses in different orientations. The obtained features are classified using a support...
We propose a new method called the Pokerface for extreme face illumination normalization. The Pokerface is a two-phase approach. It first aims at maximizing the minimum gap between adjacently-valued pixels while keeping the partial ordering of the pixels in the face image under extreme illumination condition, an intuitive effort based on order theory to unveil the underlying structure of a dark image...
The paper presents a reading-based eye movement biometrics model. The model is able to process passages of text and extract metrics that represent the physiological and behavioral aspects of the eye movements in reading. When tested on a database of eye movements from 103 individuals, the model yielded the Equal Error Rate of 10.2%. The proposed method performed better in the template-aging scenario...
Sclera segmentation is shown to be of significant importance for eye and iris biometrics. However, sclera segmentation has not been extensively researched as a separate topic, but mainly summarized as a component of a broader task. This paper proposes a novel sclera segmentation algorithm for colour images which operates at pixel-level. Exploring various colour spaces, the proposed approach is robust...
Facial recognition at-a-distance in surveillance scenarios remains an open problem, particularly due to the small number of pixels representing the facial region. The use of pan-tilt-zoom (PTZ) cameras has been advocated to solve this problem, however, the existing approaches either rely on rough approximations or additional constraints to estimate the mapping between image coordinates and pan-tilt...
This work proposes a new benchmark for keystroke dynamics recognition on the basis of fully reproducible research. Instead of traditional authentication approaches based on complex passwords, we propose a novel keystroke recognition based on typing patterns from personal data. We present a new database made up with the keystroke patterns of 63 users and 7560 samples. The proposed approach eliminates...
We present an algorithm for unconstrained face verification using Fisher vectors computed from frontalized off-frontal gallery and probe faces. In the training phase, we use the Labeled Faces in the Wild (LFW) dataset to learn the Fisher vector encoding and the joint Bayesian metric. Given an image containing the query face, we perform face detection and landmark localization followed by frontalization...
In this paper, we demonstrate that gait patterns of an individual captured through a smartphone accelerometer can be imitated with the support of a digital treadmill. Furthermore, we design an attack for a baseline gait based authentication system (GBAS) and rigorously test its performance over an eighteen user data-set. By employing only two imitators and using a simple digital treadmill with speed...
Real-world biometric applications often operate in the context of an identity transaction that allows up to three attempts. That is, if a biometric sample is acquired and if it does not result in a match, the user is allowed to acquire a second sample, and if it again does not result in a match, the user is allowed to acquire a third sample. If the third sample does not result in a match, then the...
In this paper, we present an automated system for robust biometric recognition based upon sparse representation and dictionary learning. In sparse representation, extracted features from the training data are used to develop a dictionary. Classification is achieved by representing the extracted features of the test data as a linear combination of entries in the dictionary. Dictionary learning for...
In this paper, we address the problem of still-to-video (S2V) face recognition. Still images usually have high qualities, captured from cooperative users under controlled environment, such as the mugshot photos. On the contrary, video clips may be acquired with low resolutions and low qualities, from non-cooperative users under uncontrolled environment. Because of these significant differences, we...
An innovative inheritable Fisher vector feature (IFVF) method is presented in this paper for kinship verification. Specifically, Fisher vector is first derived for each image by aggregating the densely sampled SIFT features in the opponent color space. Second, a new inheritable transformation, which maximizes the similarity between kinship images while minimizes that between non-kinship images for...
Face recognition research has primarily focused on the visible spectrum, due to the prevalence and low cost of visible cameras. However, face recognition in the visible spectrum is sensitive to illumination variations, and is infeasible in low-light or nighttime settings. In contrast, thermal imaging acquires naturally emitted radiation from facial skin tissue, and is therefore ideal for nighttime...
This paper presents a new tool specifically designed to carry out dynamic signature forensic analysis and give scientific support to forensic handwriting examiners (FHEs). Traditionally FHEs have performed forensic analysis of paper-based signatures for court cases, but with the rapid evolution of the technology, nowadays they are being asked to carry out analysis based on signatures acquired by digitizing...
This paper concerns the authentication of individuals through analysis of electrocardiogram (ECG) signals. Because the human heart differs physiologically from one person to the next, ECG signals represent a rich source of information that offers strong potential for authentication or identification. We describe a novel approach to ECG-based biometrics in which a dynamical-systems model is employed,...
This paper presents applications of special types of deep neural networks (DNNs) for audio-visual biometrics. A common example is the DBN-DNN that uses the generative weights of deep belief networks (DBNs) to initialize the feature detecting layers of deterministic feed forward DNNs. In this paper, we propose the DBM-DNN that uses the generative weights of deep Boltzmann machines (DBMs) for initialization...
The traditional iris recognition algorithms segment the iris image at the cornea-sclera border as the outer boundary because they consider the visible portion of iris as the entire iris texture. However, limbus, an additional semitransparent eye structure at junction of the cornea and sclera, occludes iris textures at the sides that cannot be seen at the off-angle iris images. In the biometrics community,...
Touch-based authentication is now a promising method for ensuring secure access on mobile devices with some researchers reporting very low EERs for authentication. However, these works have not shown experimentally the impact of contexts beyond phone orientation on touch-based authentication. In this work, we present experimental results on how touch-based authentication is impacted by users who are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.