89 research outputs found

    Fusion of fingerprint presentation attacks detection and matching: a real approach from the LivDet perspective

    Get PDF
    The liveness detection ability is explicitly required for current personal verification systems in many security applications. As a matter of fact, the project of any biometric verification system cannot ignore the vulnerability to spoofing or presentation attacks (PAs), which must be addressed by effective countermeasures from the beginning of the design process. However, despite significant improvements, especially by adopting deep learning approaches to fingerprint Presentation Attack Detectors (PADs), current research did not state much about their effectiveness when embedded in fingerprint verification systems. We believe that the lack of works is explained by the lack of instruments to investigate the problem, that is, modelling the cause-effect relationships when two systems (spoof detection and matching) with non-zero error rates are integrated. To solve this lack of investigations in the literature, we present in this PhD thesis a novel performance simulation model based on the probabilistic relationships between the Receiver Operating Characteristics (ROC) of the two systems when implemented sequentially. As a matter of fact, this is the most straightforward, flexible, and widespread approach. We carry out simulations on the PAD algorithms’ ROCs submitted to the editions of LivDet 2017-2019, the NIST Bozorth3, and the top-level VeriFinger 12.0 matchers. With the help of this simulator, the overall system performance can be predicted before actual implementation, thus simplifying the process of setting the best trade-off among error rates. In the second part of this thesis, we exploit this model to define a practical evaluation criterion to assess whether operational points of the PAD exist that do not alter the expected or previous performance given by the verification system alone. Experimental simulations coupled with the theoretical expectations confirm that this trade-off allows a complete view of the sequential embedding potentials worthy of being extended to other integration approaches

    Balancing Accuracy and Error Rates in Fingerprint Verification Systems Under Presentation Attacks With Sequential Fusion

    Get PDF
    The assessment of the fingerprint PADs embedded into a comparison system represents an emerging topic in biometric recognition. Providing models and methods for this aim helps scientists, technologists, and companies to simulate multiple scenarios and have a realistic view of the process’s consequences on the recognition system. The most recent models aimed at deriving the overall system performance, especially in the sequential assessment of the fingerprint liveness and comparison pointed out a significant decrease in Genuine Acceptance Rate (GAR). In particular, our previous studies showed that PAD contributes predominantly to this drop, regardless of the comparison system used. This paper’s goal is to establish a systematic approach for the “trade-off” computation between the gain in Impostor Attack Presentation Accept Rate (IAPAR) and the loss in GAR mentioned above. We propose a formal “trade-off” definition to measure the balance between tackling presentation attacks and the performance drop on genuine users. Experimental simulations and theoretical expectations confirm that an appropriate “trade-off” definition allows a complete view of the sequential embedding potentials

    LivDet in Action - Fingerprint Liveness Detection Competition 2019

    Full text link
    The International Fingerprint liveness Detection Competition (LivDet) is an open and well-acknowledged meeting point of academies and private companies that deal with the problem of distinguishing images coming from reproductions of fingerprints made of artificial materials and images relative to real fingerprints. In this edition of LivDet we invited the competitors to propose integrated algorithms with matching systems. The goal was to investigate at which extent this integration impact on the whole performance. Twelve algorithms were submitted to the competition, eight of which worked on integrated systems.Comment: Preprint version of a paper accepted at ICB 201

    Texture and artifact decomposition for improving generalization in deep-learning-based deepfake detection

    Get PDF
    The harmful utilization of DeepFake technology poses a significant threat to public welfare, precipitating a crisis in public opinion. Existing detection methodologies, predominantly relying on convolutional neural networks and deep learning paradigms, focus on achieving high in-domain recognition accuracy amidst many forgery techniques. However, overseeing the intricate interplay between textures and artifacts results in compromised performance across diverse forgery scenarios. This paper introduces a groundbreaking framework, denoted as Texture and Artifact Detector (TAD), to mitigate the challenge posed by the limited generalization ability stemming from the mutual neglect of textures and artifacts. Specifically, our approach delves into the similarities among disparate forged datasets, discerning synthetic content based on the consistency of textures and the presence of artifacts. Furthermore, we use a model ensemble learning strategy to judiciously aggregate texture disparities and artifact patterns inherent in various forgery types, thereby enabling the model’s generalization ability. Our comprehensive experimental analysis, encompassing extensive intra-dataset and cross-dataset validations along with evaluations on both video sequences and individual frames, confirms the effectiveness of TAD. The results from four benchmark datasets highlight the significant impact of the synergistic consideration of texture and artifact information, leading to a marked improvement in detection capabilities

    Cost analysis of GER-induced asthma: A controlled study vs. atopic asthma of comparable severity

    Get PDF
    SummaryBronchial asthma is a costly disease: while the role of pharmaceutical strategies was greatly emphasised in order to alleviate its economic burden, the aetiological approach to asthma has received much less attention from this point of view. The impact of gastro-oesophageal reflux (GER)-related asthma was assessed in comparison to atopic asthma in 262 matched patients, and the corresponding direct and indirect annual costs calculated. All subjects were screened by means of a 95-item self-questionnaire. The overall resource utilisation was calculated for the last 12 months. Drug-induced annual costs were €290.4 (interquartile range—iqr 32.8) in atopic and €438.4 (iqr 27.8) in GER-related asthma (p<0.001); expenditure for medical consultations and diagnostics were €166.1 (iqr 14.8) vs. €71.6 (iqr 11.0) (p<0.001), and €338.4 (20.0) vs. 186.9 (iqr 26.5) (p<0.001), respectively. Direct costs due to hospital admissions and indirect costs due to absenteeism were also higher in GER-related asthmatics: 2.201.7±90.0 vs. €567.1±11.0 (p<0.001), and €748.7±94.7 vs. €103.6±33.9 (p<0.001), respectively. The total annual cost per patient was €1246.7 (iqr 1979.6) in atopic and €3967.1 (iqr 3751.5) in GER-related asthma, p<0.001. In conclusion, GER-induced asthma has a more relevant economic impact on healthcare resources than atopic asthma. Although further studies are needed, present data tend to demonstrate that when facing difficult asthma (GER-related asthma in this case), the aetiological assessment of the disease plays a critical role in optimising the approach to patients’ needs

    Biliary pancreatic diversion and laparoscopic adjustable gastric banding in morbid obesity: their long-term effects on metabolic syndrome and on cardiovascular parameters

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Bariatric surgery is able to improve glucose and lipid metabolism, and cardiovascular function in morbid obesity. Aim of this study was to compare the long-term effects of malabsorptive (biliary pancreatic diversion, BPD), and restrictive (laparoscopic gastric banding, LAGB) procedures on metabolic and cardiovascular parameters, as well as on metabolic syndrome in morbidly obese patients.</p> <p>Methods</p> <p>170 patients studied between 1989 and 2001 were called back after a mean period of 65 months. 138 patients undergoing BPD (n = 23) or LAGB (n = 78), and control patients (refusing surgery and treated with diet, n = 37) were analysed for body mass index (BMI), blood glucose, cholesterol, and triglycerides, blood pressure, heart rate, and ECG indexes (QTc, Cornell voltage-duration product, and rate-pressure-product).</p> <p>Results</p> <p>After a mean 65 months period, surgery was more effective than diet on all items under evaluation; diabetes, hypertension, and metabolic syndrome disappeared more in surgery than in control patients, and new cases appeared only in controls. BPD was more effective than LAGB on BMI, on almost all cardiovascular parameters, and on cholesterol, not on triglyceride and blood glucose. Disappearance of diabetes, hypertension, and metabolic syndrome was similar with BPD and with LAGB, and no new cases were observed.</p> <p>Conclusion</p> <p>These data indicate that BPD, likely due to a greater BMI decrease, is more effective than LAGB in improving cardiovascular parameters, and similar to LAGB on metabolic parameters, in obese patients. The greater effect on cholesterol levels is probably due to the different mechanism of action.</p

    Normative growth charts for Shwachman-Diamond syndrome from Italian cohort of 0-8 years old

    Get PDF
    Shwachman-Diamond syndrome (SDS) is a rare autosomal recessive disorder. Its predominant manifestations include exocrine pancreatic insufficiency, bone marrow failure and skeletal abnormalities. Patients frequently present failure to thrive and susceptibility to short stature. Average birth weight is at the 25th percentile; by the first birthday, &gt;50% of patients drop below the third percentile for height and weight.The study aims at estimating the growth charts for patients affected by SDS in order to give a reference tool helpful for medical care and growth surveillance through the first 8 years of patient's life

    Fingerprint Presentation Attacks: Tackling the Ongoing Arms Race in Biometric Authentication

    Get PDF
    The widespread use of Automated Fingerprint Identification Systems (AFIS) in consumer electronics opens for the development of advanced presentation attacks, i.e. procedures designed to bypass an AFIS using a forged fingerprint. As a consequence, AFIS are often equipped with a fingerprint presentation attack detection (FPAD) module, to recognize live fingerprints from fake replicas, in order to both minimize the risk of unauthorized access and avoid pointless computations. The ongoing arms race between attackers and detector designers demands a comprehensive understanding of both the defender’s and attacker’s perspectives to develop robust and efficient FPAD systems. This paper proposes a dual-perspective approach to FPAD, which encompasses the presentation of a new technique for carrying out presentation attacks starting from perturbed samples with adversarial techniques and the presentation of a new detection technique based on an adversarial data augmentation strategy. In this case, attack and defence are based on the same assumptions demonstrating that this dual research approach can be exploited to enhance the overall security of fingerprint recognition systems against spoofing attacks

    LivDet2023 - Fingerprint Liveness Detection Competition: Advancing Generalization

    Get PDF
    The International Fingerprint Liveness Detection Competition (LivDet) is a biennial event that invites academic and industry participants to prove their advancements in Fingerprint Presentation Attack Detection (PAD). This edition, LivDet2023, proposed two challenges, "Liveness Detection in Action" and "Fingerprint Representation", to evaluate the efficacy of PAD embedded in verification systems and the effectiveness and compactness of feature sets. A third, "hidden" challenge is the inclusion of two subsets in the training set whose sensor information is unknown, testing participants' ability to generalize their models. Only bona fide fingerprint samples were provided to participants, and the competition reports and assesses the performance of their algorithms suffering from this limitation in data availability

    Leveraging Artificial Intelligence to Fight (Cyber)Bullying for Human Well-being: The BullyBuster Project

    Get PDF
    Bullying and cyberbullying are phenomena which, due to their growing diffusion, have become a real social emergency. In this context, artificial intelligence can be a powerful weapon to identify episodes of violence and fight bullying both in the virtual and in the real world. Through machine learning, it is possible to detect the language patterns used by bullies and their victims and develop rules to detect cyberbullying content automatically. The BullyBuster project merges the know-how of four interdisciplinary research groups to develop a framework useful for maintaining psycho-physical well-being in educational contexts
    • …
    corecore