8,965 research outputs found
Offline Handwritten Signature Verification - Literature Review
The area of Handwritten Signature Verification has been broadly researched in
the last decades, but remains an open research problem. The objective of
signature verification systems is to discriminate if a given signature is
genuine (produced by the claimed individual), or a forgery (produced by an
impostor). This has demonstrated to be a challenging task, in particular in the
offline (static) scenario, that uses images of scanned signatures, where the
dynamic information about the signing process is not available. Many
advancements have been proposed in the literature in the last 5-10 years, most
notably the application of Deep Learning methods to learn feature
representations from signature images. In this paper, we present how the
problem has been handled in the past few decades, analyze the recent
advancements in the field, and the potential directions for future research.Comment: Accepted to the International Conference on Image Processing Theory,
Tools and Applications (IPTA 2017
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Voice Processing Systems (VPSes), now widely deployed, have been made
significantly more accurate through the application of recent advances in
machine learning. However, adversarial machine learning has similarly advanced
and has been used to demonstrate that VPSes are vulnerable to the injection of
hidden commands - audio obscured by noise that is correctly recognized by a VPS
but not by human beings. Such attacks, though, are often highly dependent on
white-box knowledge of a specific machine learning model and limited to
specific microphones and speakers, making their use across different acoustic
hardware platforms (and thus their practicality) limited. In this paper, we
break these dependencies and make hidden command attacks more practical through
model-agnostic (blackbox) attacks, which exploit knowledge of the signal
processing algorithms commonly used by VPSes to generate the data fed into
machine learning systems. Specifically, we exploit the fact that multiple
source audio samples have similar feature vectors when transformed by acoustic
feature extraction algorithms (e.g., FFTs). We develop four classes of
perturbations that create unintelligible audio and test them against 12 machine
learning models, including 7 proprietary models (e.g., Google Speech API, Bing
Speech API, IBM Speech API, Azure Speaker API, etc), and demonstrate successful
attacks against all targets. Moreover, we successfully use our maliciously
generated audio samples in multiple hardware configurations, demonstrating
effectiveness across both models and real systems. In so doing, we demonstrate
that domain-specific knowledge of audio signal processing represents a
practical means of generating successful hidden voice command attacks
PALMAR: Towards Adaptive Multi-inhabitant Activity Recognition in Point-Cloud Technology
With the advancement of deep neural networks and computer vision-based Human
Activity Recognition, employment of Point-Cloud Data technologies (LiDAR,
mmWave) has seen a lot interests due to its privacy preserving nature. Given
the high promise of accurate PCD technologies, we develop, PALMAR, a
multiple-inhabitant activity recognition system by employing efficient signal
processing and novel machine learning techniques to track individual person
towards developing an adaptive multi-inhabitant tracking and HAR system. More
specifically, we propose (i) a voxelized feature representation-based real-time
PCD fine-tuning method, (ii) efficient clustering (DBSCAN and BIRCH), Adaptive
Order Hidden Markov Model based multi-person tracking and crossover ambiguity
reduction techniques and (iii) novel adaptive deep learning-based domain
adaptation technique to improve the accuracy of HAR in presence of data
scarcity and diversity (device, location and population diversity). We
experimentally evaluate our framework and systems using (i) a real-time PCD
collected by three devices (3D LiDAR and 79 GHz mmWave) from 6 participants,
(ii) one publicly available 3D LiDAR activity data (28 participants) and (iii)
an embedded hardware prototype system which provided promising HAR performances
in multi-inhabitants (96%) scenario with a 63% improvement of multi-person
tracking than state-of-art framework without losing significant system
performances in the edge computing device.Comment: Accepted in IEEE International Conference on Computer Communications
202
PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces
Abstract—Cameras are now commonplace in our social and computing landscapes and embedded into consumer devices like smartphones and tablets. A new generation of wearable devices (such as Google Glass) will soon make ‘first-person ’ cameras nearly ubiquitous, capturing vast amounts of imagery without deliberate human action. ‘Lifelogging ’ devices and applications will record and share images from people’s daily lives with their social networks. These devices that automatically capture images in the background raise serious privacy concerns, since they are likely to capture deeply private information. Users of these devices need ways to identify and prevent the sharing of sensitive images. As a first step, we introduce PlaceAvoider, a technique for owners of first-person cameras to ‘blacklist ’ sensitive spaces (like bathrooms and bedrooms). PlaceAvoider recognizes images captured in these spaces and flags them for review before the images are made available to applications. PlaceAvoider performs novel image analysis using both fine-grained image features (like specific objects) and coarse-grained, scene-level features (like colors and textures) to classify where a photo was taken. PlaceAvoider combines these features in a probabilistic framework that jointly labels streams of images in order to improve accuracy. We test the technique on five realistic first-person image datasets and show it is robust to blurriness, motion, and occlusion. I
- …