310 research outputs found
Biometric walk recognizer. Research and results on wearable sensor-based gait recognition
Gait is a biometric trait that can allow user authentication, though being classified as a "soft" one due to a certain lack in permanence, and to sensibility to specific conditions. The earliest research relies on computer vision-based approaches, especially applied in video surveillance. More recently, the spread of wearable sensors, especially those embedded in mobile devices, which are able to capture the dynamics of the walking pattern through simpler 1D signals, has spurred a different research line. This capture modality can avoid some problems related to computer vision-based techniques, but suffers from specific limitations. Related research is still in a less advanced phase with respect to other biometric traits. However, the promising results achieved so far, the increasing accuracy of sensors, the ubiquitous presence of mobile devices, and the low cost of related techniques, make this biometrics attractive and suggest to continue the investigations in this field. The first Chapters of this thesis deal with an introduction to biometrics, and more specifically to gait trait. A comprehensive review of technologies, approaches and strategies exploited by gait recognition proposals in the state-of-the-art is also provided. After such introduction, the contributions of this work are presented in details. Summarizing, it improves preceding result achieved during my Master Degree in Computer Science course of Biometrics and extended in my following Master Degree Thesis. The research deals with different strategies, including preprocessing and recognition techniques, applied to the gait biometrics, in order to allow both an automatic recognition and an improvement of the system accuracy
Deep Adversarial Frameworks for Visually Explainable Periocular Recognition
Machine Learning (ML) models have pushed stateÂofÂtheÂart performance closer to (and
even beyond) human level. However, the core of such algorithms is usually latent and
hardly understandable. Thus, the field of Explainability focuses on researching and adopting techniques that can explain the reasons that support a model’s predictions. Such explanations of the decisionÂmaking process would help to build trust between said model
and the human(s) using it. An explainable system also allows for better debugging, during
the training phase, and fixing, upon deployment. But why should a developer devote time
and effort into refactoring or rethinking Artificial Intelligence (AI) systems, to make them
more transparent? Don’t they work just fine?
Despite the temptation to answer ”yes”, are we really considering the cases where these
systems fail? Are we assuming that ”almost perfect” accuracy is good enough? What if,
some of the cases where these systems get it right, were just a small margin away from
a complete miss? Does that even matter? Considering the everÂgrowing presence of ML
models in crucial areas like forensics, security and healthcare services, it clearly does.
Motivating these concerns is the fact that powerful systems often operate as blackÂboxes,
hiding the core reasoning underneath layers of abstraction [Gue]. In this scenario, there
could be some seriously negative outcomes if opaque algorithms gamble on the presence
of tumours in XÂray images or the way autonomous vehicles behave in traffic.
It becomes clear, then, that incorporating explainability with AI is imperative. More recently, the politicians have addressed this urgency through the General Data Protection
Regulation (GDPR) [Com18]. With this document, the European Union (EU) brings forward several important concepts, amongst which, the ”right to an explanation”. The definition and scope are still subject to debate [MF17], but these are definite strides to formally
regulate the explainable depth of autonomous systems.
Based on the preface above, this work describes a periocular recognition framework that
not only performs biometric recognition but also provides clear representations of the features/regions that support a prediction. Being particularly designed to explain nonÂmatch
(”impostors”) decisions, our solution uses adversarial generative techniques to synthesise
a large set of ”genuine” image pairs, from where the most similar elements with respect to
a query are retrieved. Then, assuming the alignment between the query/retrieved pairs,
the elementÂwise differences between the query and a weighted average of the retrieved
elements yields a visual explanation of the regions in the query pair that would have to
be different to transform it into a ”genuine” pair. Our quantitative and qualitative experiments validate the proposed solution, yielding recognition rates that are similar to the
stateÂofÂtheÂart, while adding visually pleasing explanations
A Multimodal and Multi-Algorithmic Architecture for Data Fusion in Biometric Systems
Software di autenticazione basato su tratti biometric
Analysis Of Data Stratification In A Multi-Sensor Fingerprint Dataset Using Match Score Statistics
Biometric data is an essential feature employed in testing the performance of any real time biometric recognition system prior to its usage. The variations introduced in the match performance critically determine the authenticity of the biometric data to be able to be used in an everyday scenario for the testing of biometric verification systems. This study in totality aims at understanding the impact of data stratification of a such a biometric test dataset on the match performance of each of its stratum. In order to achieve this goal, the fingerprint dataset of the West Virginia University\u27s 2012 BioCOP has been employed which is a part of the many multimodal biometric data collection projects that the University has accomplished. This test dataset has been initially segmented based on the scanners employed in the process of data acquisition to check for the variations in match performance with reference to the acquisition device. The secondary stage of data stratification included the creation of stratum based on the demographic features of the subjects in the dataset.;The main objectives this study aims to achieve are:;• Developing a framework to assess the match score distributions of each stratum..;• Assessing the match performance of demographic strata in comparison to the total dataset..;• Statistical match performance evaluation using match score statistics..;Following the generation of genuine and imposter match score distributions , Receiver Operating Characteristic Curves (ROC) were plotted to compare the match performance of each demographic stratum with respect to the total dataset. The divergence measures KLD and JSD have been calculated which signify the amount of variation between the match score distributions of each stratum. With the help of these procedures, the task of estimating the effect of data stratification on the match performance has been accomplished which serves as a measure of understanding the impact of this fingerprint dataset when used for biometric testing purposes
Biometric Systems
Biometric authentication has been widely used for access control and security systems over the past few years. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics. In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time includes state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications
Visual Passwords Using Automatic Lip Reading
This paper presents a visual passwords system to increase security. The
system depends mainly on recognizing the speaker using the visual speech signal
alone. The proposed scheme works in two stages: setting the visual password
stage and the verification stage. At the setting stage the visual passwords
system request the user to utter a selected password, a video recording of the
user face is captured, and processed by a special words-based VSR system which
extracts a sequence of feature vectors. In the verification stage, the same
procedure is executed, the features will be sent to be compared with the stored
visual password. The proposed scheme has been evaluated using a video database
of 20 different speakers (10 females and 10 males), and 15 more males in
another video database with different experiment sets. The evaluation has
proved the system feasibility, with average error rate in the range of 7.63% to
20.51% at the worst tested scenario, and therefore, has potential to be a
practical approach with the support of other conventional authentication
methods such as the use of usernames and passwords
- …