294 research outputs found
A Multi-Sensor System for Enhancing Situational Awareness and Stress Management for People with ASD in the Workplace and in Everyday Life
Autism spectrum disorders (ASD) present challenges for affected people at work and in everyday life. The barrier increases further with changing environmental situations. Deviations in factors like lighting or sound may lead to increased stress. The intervention plans to instil positive behaviour support (PBS) suggest that a customised environment can minimise the impacts due to these variations. This work proposes a novel framework which leverages the information from multi-sensor channels in a combined manner to customise the environment so that situational awareness (SA) can be improved. The proposed framework allows for monitoring the environment by combining the information from different sensor channels including both personal sensors (i.e. on board of a mobile device) as well as environmental sensors/actuators (i.e. embedded in smart-buildings). In this preliminary work, the system architecture is introduced. To demonstrate the potential of the proposed system, a case study is also considered through the development of a prototype for a mobile application and by reporting results on a scale model of a smart workplace with customisable environment
Differential Newborn Face Morphing Attack Detection using Wavelet Scatter Network
Face Recognition System (FRS) are shown to be vulnerable to morphed images of
newborns. Detecting morphing attacks stemming from face images of newborn is
important to avoid unwanted consequences, both for security and society. In
this paper, we present a new reference-based/Differential Morphing Attack
Detection (MAD) method to detect newborn morphing images using Wavelet
Scattering Network (WSN). We propose a two-layer WSN with 250 250
pixels and six rotations of wavelets per layer, resulting in 577 paths. The
proposed approach is validated on a dataset of 852 bona fide images and 2460
morphing images constructed using face images of 42 unique newborns. The
obtained results indicate a gain of over 10\% in detection accuracy over other
existing D-MAD techniques.Comment: accepted in 5th International Conference on Bio-engineering for Smart
Technologies (BIO-SMART 2023
On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection
Face morphing attacks have raised critical concerns as they demonstrate a new
vulnerability of Face Recognition Systems (FRS), which are widely deployed in
border control applications. The face morphing process uses the images from
multiple data subjects and performs an image blending operation to generate a
morphed image of high quality. The generated morphed image exhibits similar
visual characteristics corresponding to the biometric characteristics of the
data subjects that contributed to the composite image and thus making it
difficult for both humans and FRS, to detect such attacks. In this paper, we
report a systematic investigation on the vulnerability of the
Commercial-Off-The-Shelf (COTS) FRS when morphed images under the influence of
ageing are presented. To this extent, we have introduced a new morphed face
dataset with ageing derived from the publicly available MORPH II face dataset,
which we refer to as MorphAge dataset. The dataset has two bins based on age
intervals, the first bin - MorphAge-I dataset has 1002 unique data subjects
with the age variation of 1 year to 2 years while the MorphAge-II dataset
consists of 516 data subjects whose age intervals are from 2 years to 5 years.
To effectively evaluate the vulnerability for morphing attacks, we also
introduce a new evaluation metric, namely the Fully Mated Morphed Presentation
Match Rate (FMMPMR), to quantify the vulnerability effectively in a realistic
scenario. Extensive experiments are carried out by using two different COTS FRS
(COTS I - Cognitec and COTS II - Neurotechnology) to quantify the vulnerability
with ageing. Further, we also evaluate five different Morph Attack Detection
(MAD) techniques to benchmark their detection performance with ageing.Comment: Accepted in IJCB 202
Towards minimizing efforts for Morphing Attacks -- Deep embeddings for morphing pair selection and improved Morphing Attack Detection
Face Morphing Attacks pose a threat to the security of identity documents,
especially with respect to a subsequent access control process, because it
enables both individuals involved to exploit the same document. In this study,
face embeddings serve two purposes: pre-selecting images for large-scale
Morphing Attack generation and detecting potential Morphing Attacks. We build
upon previous embedding studies in both use cases using the MagFace model. For
the first objective, we employ an pre-selection algorithm that pairs
individuals based on face embedding similarity. We quantify the attack
potential of differently morphed face images to compare the usability of
pre-selection in automatically generating numerous successful Morphing Attacks.
Regarding the second objective, we compare embeddings from two state-of-the-art
face recognition systems in terms of their ability to detect Morphing Attacks.
Our findings demonstrate that ArcFace and MagFace provide valuable face
embeddings for image pre-selection. Both open-source and COTS face recognition
systems are susceptible to generated attacks, particularly when pre-selection
is based on embeddings rather than random pairing which was only constrained by
soft biometrics. More accurate face recognition systems exhibit greater
vulnerability to attacks, with COTS systems being the most susceptible.
Additionally, MagFace embeddings serve as a robust alternative for detecting
morphed face images compared to the previously used ArcFace embeddings. The
results endorse the advantages of face embeddings in more effective image
pre-selection for face morphing and accurate detection of morphed face images.
This is supported by extensive analysis of various designed attacks. The
MagFace model proves to be a powerful alternative to the commonly used ArcFace
model for both objectives, pre-selection and attack detection
A Comprehensive Analysis of AI Biases in DeepFake Detection With Massively Annotated Databases
In recent years, image and video manipulations with Deepfake have become a
severe concern for security and society. Many detection models and datasets
have been proposed to detect Deepfake data reliably. However, there is an
increased concern that these models and training databases might be biased and,
thus, cause Deepfake detectors to fail. In this work, we investigate the bias
issue caused by public Deepfake datasets by (a) providing large-scale
demographic and non-demographic attribute annotations of 47 different
attributes for five popular Deepfake datasets and (b) comprehensively analysing
AI-bias of three state-of-the-art Deepfake detection backbone models on these
datasets. The investigation analyses the influence of a large variety of
distinctive attributes (from over 65M labels) on the detection performance,
including demographic (age, gender, ethnicity) and non-demographic (hair, skin,
accessories, etc.) information. The results indicate that investigated
databases lack diversity and, more importantly, show that the utilised Deepfake
detection backbone models are strongly biased towards many investigated
attributes. The Deepfake detection backbone methods, which are trained with
biased datasets, might output incorrect detection results, thereby leading to
generalisability, fairness, and security issues. We hope that the findings of
this study and the annotation databases will help to evaluate and mitigate bias
in future Deepfake detection techniques. The annotation datasets and the
corresponding code are publicly available
- …