13 research outputs found
Finger-NestNet: Interpretable Fingerphoto Verification on Smartphone using Deep Nested Residual Network
Fingerphoto images captured using a smartphone are successfully used to
verify the individuals that have enabled several applications. This work
presents a novel algorithm for fingerphoto verification using a nested residual
block: Finger-NestNet. The proposed Finger-NestNet architecture is designed
with three consecutive convolution blocks followed by a series of nested
residual blocks to achieve reliable fingerphoto verification. This paper also
presents the interpretability of the proposed method using four different
visualization techniques that can shed light on the critical regions in the
fingerphoto biometrics that can contribute to the reliable verification
performance of the proposed method. Extensive experiments are performed on the
fingerphoto dataset comprised of 196 unique fingers collected from 52 unique
data subjects using an iPhone6S. Experimental results indicate the improved
verification of the proposed method compared to six different existing methods
with EER = 1.15%.Comment: a preprint paper accepted in wacv2023 worksho
An overview of touchless 2D fingerprint recognition
Touchless fingerprint recognition represents a rapidly growing field of research which has been studied for more than a decade. Through a touchless acquisition process, many issues of touch-based systems are circumvented, e.g., the presence of latent fingerprints or distortions caused by pressing fingers on a sensor surface. However, touchless fingerprint recognition systems reveal new challenges. In particular, a reliable detection and focusing of a presented finger as well as an appropriate preprocessing of the acquired finger image represent the most crucial tasks. Also, further issues, e.g., interoperability between touchless and touch-based fingerprints or presentation attack detection, are currently investigated by different research groups. Many works have been proposed so far to put touchless fingerprint recognition into practice. Published approaches range from self identification scenarios with commodity devices, e.g., smartphones, to high performance on-the-move deployments paving the way for new fingerprint recognition application scenarios.This work summarizes the state-of-the-art in the field of touchless 2D fingerprint recognition at each stage of the recognition process. Additionally, technical considerations and trade-offs of the presented methods are discussed along with open issues and challenges. An overview of available research resources completes the work
A Survey of Machine Learning Techniques for Behavioral-Based Biometric User Authentication
Authentication is a way to enable an individual to be uniquely identified usually based on passwords and personal identification number (PIN). The main problems of such authentication techniques are the unwillingness of the users to remember long and challenging combinations of numbers, letters, and symbols that can be lost, forged, stolen, or forgotten. In this paper, we investigate the current advances in the use of behavioral-based biometrics for user authentication. The application of behavioral-based biometric authentication basically contains three major modules, namely, data capture, feature extraction, and classifier. This application is focusing on extracting the behavioral features related to the user and using these features for authentication measure. The objective is to determine the classifier techniques that mostly are used for data analysis during authentication process. From the comparison, we anticipate to discover the gap for improving the performance of behavioral-based biometric authentication. Additionally, we highlight the set of classifier techniques that are best performing for behavioral-based biometric authentication
On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain
Nowadays, fingerprint-based biometric recognition systems are becoming
increasingly popular. However, in spite of their numerous advantages, biometric
capture devices are usually exposed to the public and thus vulnerable to
presentation attacks (PAs). Therefore, presentation attack detection (PAD)
methods are of utmost importance in order to distinguish between bona fide and
attack presentations. Due to the nearly unlimited possibilities to create new
presentation attack instruments (PAIs), unknown attacks are a threat to
existing PAD algorithms. This fact motivates research on generalisation
capabilities in order to find PAD methods that are resilient to new attacks. In
this context, we evaluate the generalisability of multiple PAD algorithms on a
dataset of 19,711 bona fide and 4,339 PA samples, including 45 different PAI
species. The PAD data is captured in the short wave infrared domain and the
results discuss the advantages and drawbacks of this PAD technique regarding
unknown attacks
Biometric walk recognizer. Research and results on wearable sensor-based gait recognition
Gait is a biometric trait that can allow user authentication, though being classified as a "soft" one due to a certain lack in permanence, and to sensibility to specific conditions. The earliest research relies on computer vision-based approaches, especially applied in video surveillance. More recently, the spread of wearable sensors, especially those embedded in mobile devices, which are able to capture the dynamics of the walking pattern through simpler 1D signals, has spurred a different research line. This capture modality can avoid some problems related to computer vision-based techniques, but suffers from specific limitations. Related research is still in a less advanced phase with respect to other biometric traits. However, the promising results achieved so far, the increasing accuracy of sensors, the ubiquitous presence of mobile devices, and the low cost of related techniques, make this biometrics attractive and suggest to continue the investigations in this field. The first Chapters of this thesis deal with an introduction to biometrics, and more specifically to gait trait. A comprehensive review of technologies, approaches and strategies exploited by gait recognition proposals in the state-of-the-art is also provided. After such introduction, the contributions of this work are presented in details. Summarizing, it improves preceding result achieved during my Master Degree in Computer Science course of Biometrics and extended in my following Master Degree Thesis. The research deals with different strategies, including preprocessing and recognition techniques, applied to the gait biometrics, in order to allow both an automatic recognition and an improvement of the system accuracy