393,399 research outputs found

    The Science of Disguise

    Get PDF
    Technological advances have made digital cameras ubiquitous, to the point where it is difficult to purchase even a mobile phone without one. Coupled with similar advances in face recognition technology, we are seeing a marked increase in the use of biometrics, such as face recognition, to identify individuals. However, remaining unrecognized in an era of ubiquitous camera surveillance remains desirable to some citizens, notably those concerned with privacy. Since biometrics are an intrinsic part of a person\u27s identity, it may be that the only means of evading detection is through disguise. We have created a comprehensive database of high-quality imagery that will allow us to explore the effectiveness of disguise as an approach to avoiding unwanted recognition. Using this database, we have evaluated the performance of a variety of automated machine-based face recognition algorithms on disguised faces. Our data-driven analysis finds that for the sample population contained in our database: (1) disguise is effective; (2) there are significant performance differences between individuals and demographic groups; and (3) elements including coverage, contrast, and disguise combination are determinative factors in the success or failure of face recognition algorithms on an image. In this dissertation, we examine the present-day uses of face recognition and their interplay with privacy concerns. We sketch the capabilities of a new database of facial imagery, unique both in the diversity of the imaged population, and in the diversity and consistency of disguises applied to each subject. We provide an analysis of disguise performance based on both a highly-rated commercial face recognition system and an open-source algorithm available to the FR community. Finally, we put forth hypothetical models for these results, and provide insights into the types of disguises that are the most effective at defeating facial recognition for various demographic populations. As cameras become more sophisticated and algorithms become more advanced, disguise may become less effective. For security professionals, this is a laudable outcome; privacy advocates will certainly feel differently

    A Comprehensive Study on Face Recognition Biases Beyond Demographics

    Full text link
    Face recognition (FR) systems have a growing effect on critical decision-making processes. Recent works have shown that FR solutions show strong performance differences based on the user's demographics. However, to enable a trustworthy FR technology, it is essential to know the influence of an extended range of facial attributes on FR beyond demographics. Therefore, in this work, we analyse FR bias over a wide range of attributes. We investigate the influence of 47 attributes on the verification performance of two popular FR models. The experiments were performed on the publicly available MAADFace attribute database with over 120M high-quality attribute annotations. To prevent misleading statements about biased performances, we introduced control group based validity values to decide if unbalanced test data causes the performance differences. The results demonstrate that also many non-demographic attributes strongly affect the recognition performance, such as accessories, hair-styles and colors, face shapes, or facial anomalies. The observations of this work show the strong need for further advances in making FR system more robust, explainable, and fair. Moreover, our findings might help to a better understanding of how FR networks work, to enhance the robustness of these networks, and to develop more generalized bias-mitigating face recognition solutions.Comment: Under review in IEEE Transactions on Technology and Societ

    Iris Recognition: The Consequences of Image Compression

    Get PDF
    Iris recognition for human identification is one of the most accurate biometrics, and its employment is expanding globally. The use of portable iris systems, particularly in law enforcement applications, is growing. In many of these applications, the portable device may be required to transmit an iris image or template over a narrow-bandwidth communication channel. Typically, a full resolution image (e.g., VGA) is desired to ensure sufficient pixels across the iris to be confident of accurate recognition results. To minimize the time to transmit a large amount of data over a narrow-bandwidth communication channel, image compression can be used to reduce the file size of the iris image. In other applications, such as the Registered Traveler program, an entire iris image is stored on a smart card, but only 4 kB is allowed for the iris image. For this type of application, image compression is also the solution. This paper investigates the effects of image compression on recognition system performance using a commercial version of the Daugman iris2pi algorithm along with JPEG-2000 compression, and links these to image quality. Using the ICE 2005 iris database, we find that even in the face of significant compression, recognition performance is minimally affected

    Wavelet-Based Kernel Construction for Heart Disease Classification

    Get PDF
    © 2019 ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERINGHeart disease classification plays an important role in clinical diagnoses. The performance improvement of an Electrocardiogram classifier is therefore of great relevance, but it is a challenging task too. This paper proposes a novel classification algorithm using the kernel method. A kernel is constructed based on wavelet coefficients of heartbeat signals for a classifier with high performance. In particular, a wavelet packet decomposition algorithm is applied to heartbeat signals to obtain the Approximation and Detail coefficients, which are used to calculate the parameters of the kernel. A principal component analysis algorithm with the wavelet-based kernel is employed to choose the main features of the heartbeat signals for the input of the classifier. In addition, a neural network with three hidden layers in the classifier is utilized for classifying five types of heart disease. The electrocardiogram signals in nine patients obtained from the MIT-BIH database are used to test the proposed classifier. In order to evaluate the performance of the classifier, a multi-class confusion matrix is applied to produce the performance indexes, including the Accuracy, Recall, Precision, and F1 score. The experimental results show that the proposed method gives good results for the classification of the five mentioned types of heart disease.Peer reviewedFinal Published versio

    21st Century Simulation: Exploiting High Performance Computing and Data Analysis

    Get PDF
    This paper identifies, defines, and analyzes the limitations imposed on Modeling and Simulation by outmoded paradigms in computer utilization and data analysis. The authors then discuss two emerging capabilities to overcome these limitations: High Performance Parallel Computing and Advanced Data Analysis. First, parallel computing, in supercomputers and Linux clusters, has proven effective by providing users an advantage in computing power. This has been characterized as a ten-year lead over the use of single-processor computers. Second, advanced data analysis techniques are both necessitated and enabled by this leap in computing power. JFCOM's JESPP project is one of the few simulation initiatives to effectively embrace these concepts. The challenges facing the defense analyst today have grown to include the need to consider operations among non-combatant populations, to focus on impacts to civilian infrastructure, to differentiate combatants from non-combatants, and to understand non-linear, asymmetric warfare. These requirements stretch both current computational techniques and data analysis methodologies. In this paper, documented examples and potential solutions will be advanced. The authors discuss the paths to successful implementation based on their experience. Reviewed technologies include parallel computing, cluster computing, grid computing, data logging, OpsResearch, database advances, data mining, evolutionary computing, genetic algorithms, and Monte Carlo sensitivity analyses. The modeling and simulation community has significant potential to provide more opportunities for training and analysis. Simulations must include increasingly sophisticated environments, better emulations of foes, and more realistic civilian populations. Overcoming the implementation challenges will produce dramatically better insights, for trainees and analysts. High Performance Parallel Computing and Advanced Data Analysis promise increased understanding of future vulnerabilities to help avoid unneeded mission failures and unacceptable personnel losses. The authors set forth road maps for rapid prototyping and adoption of advanced capabilities. They discuss the beneficial impact of embracing these technologies, as well as risk mitigation required to ensure success

    Design of Cognitive Radio Database using Terrain Maps and Validated Propagation Models

    Get PDF
    Cognitive Radio (CR) encompasses a number of technologies which enable adaptive self-programing of systems at different levels to provide more effective use of the increasingly congested radio spectrum. CRs have potential to use spectrum allocated to TV services, which is not used by the primary user (TV), without causing disruptive interference to licensed users by using appropriate propagation modelling in TV White Spaces (TVWS). In this paper we address two related aspects of channel occupancy prediction for cognitive radio. Firstly, we continue to investigate the best propagation model among three propagation models (Extended-Hata, Davidson-Hata and Egli) for use in the TV band, whilst also finding the optimum terrain data resolution to use (1000, 100 or 30 m). We compare modelled results with measurements taken in randomly-selected locations around Hull UK, using the two comparison criteria of implementation time and accuracy, when used for predicting TVWS system performance. Secondly, we describe how such models can be integrated into a database-driven tool for CR channel selection within the TVWS environment by creating a flexible simulation system for creating a TVWS database
    • …
    corecore