64 research outputs found

    Application of Photocatalytic Processes for Water Treatment

    Full text link
    Tesis doctoral inédita leída en la Universidad Autónoma de Madrid. Facultad de Ciencias, Departamento de Ingeniería Química. Fecha de lectura: 05-07-2019El trabajo de esta Tesis ha sido financiado a través de los proyectos CTM2015-64895-R y CTM2016-76454-R del Ministerio de Economía y Competitividad

    Update Strategies for HMM-Based Dynamic Signature Biometric Systems

    Full text link
    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. [R. Tolosana, R. Vera-Rodriguez, J. Ortega-Garcia and J. Fierrez, "Update strategies for HMM-based dynamic signature biometric systems," Information Forensics and Security (WIFS), 2015 IEEE International Workshop on, Rome, 2015, pp. 1-6. doi: 10.1109/WIFS.2015.7368583Biometric authentication on devices such as smart- phones and tablets has increased significantly in the last years. One of the most acceptable and increasing traits is the handwrit- ing signature as it has been used in financial and legal agreements scenarios for over a century. Nowadays, it is frequent to sign in banking and commercial areas on digitizing tablets. For these reasons, it is necessary to consider a new scenario where the number of training signatures available to generate the user template is variable and besides it has to be taken into account the lap of time between them (inter-session variability). In this work we focus on dynamic signature verification. The main goal of this work is to study system configuration update strategies of time functions-based systems such as Hidden Markov Model (HMM) and Gaussian Mixture Models (GMM). Therefore, two different cases have been considered. First, the usual case of having an HMM-based system with a fixed configuration (i.e. Baseline System). Second, an HMM-based and GMM-based sys- tems whose configurations are optimized regarding the number of training signatures available to generate the user template. The experimental work has been carried out using an extended version of the Signature Long-Term database taking into account skilled and random or zero-effort forgeries. This database is comprised of a total of 6 different sessions distributed in a 15-month time span. Analyzing the results, the Proposed Systems achieve an average absolute improvement of 4.6% in terms of EER(%) for skilled forgeries cases compared to the Baseline System whereas the average absolute improvement for the random forgeries cases is of 2.7% EER. These results show the importance of optimizing the configuration of the systems compared to a fixed configuration system when the number of training signatures available to generate the user template increases.This work was supported in part by the Project Bio-Shield (TEC2012-34881), in part by Cecabank e-BioFirma Contract, in part by the BEAT Project (FP7-SEC-284989) and in part by Catedra UAM-Telefonica

    Preprocessing and feature selection for improved sensor interoperability in online biometric signature verification

    Full text link
    Under a IEEE Open Access Publishing Agreement.Due to the technological evolution and the increasing popularity of smartphones, people can access an application using authentication based on biometric approaches from many different devices. Device interoperability is a very challenging problem for biometrics, which needs to be further studied. In this paper, we focus on interoperability device compensation for online signature verification since this biometric trait is gaining a significant interest in banking and commercial sector in the last years. The proposed approach is based on two main stages. The first one is a preprocessing stage where data acquired from different devices are processed in order to normalize the signals in similar ranges. The second one is based on feature selection taking into account the device interoperability case, in order to select to select features which are robust in these conditions. This proposed approach has been successfully applied in a similar way to two common system approaches in online signature verification, i.e., a global features-based system and a time functions-based system. Experiments are carried out using Biosecure DS2 (Wacom device) and DS3 (Personal Digital Assistant mobile device) dynamic signature data sets which take into account multisession and two different scenarios emulating real operation conditions. The performance of the proposed global features-based and time functions-based systems applying the two main stages considered in this paper have provided an average relative improvement of performance of 60.3% and 26.5% Equal Error Rate (EER), respectively, for random forgeries cases, compared with baseline systems. Finally, a fusion of the proposed systems has achieved a further significant improvement for the device interoperability problem, especially for skilled forgeries. In this case, the proposed fusion system has achieved an average relative improvement of 27.7% EER compared with the best performance of time functions-based system. These results prove the robustness of the proposed approach and open the door for future works using devices as smartphones or tablets, commonly used nowadays.This work was supported in part by the Project Bio-Shield under Grant TEC2012-34881, in part by Cecabank e-BioFirma Contract, and in part by Catedra UAM-Telefonic

    DeepFakes Detection Based on Heart Rate Estimation: Single- and Multi-frame

    Full text link
    This chapter describes a DeepFake detection framework based on physiological measurement. In particular, we consider information related to the heart rate using remote photoplethysmography (rPPG). rPPG methods analyze video sequences looking for subtle color changes in the human skin, revealing the presence of human blood under the tissues. This chapter explores to what extent rPPG is useful for the detection of DeepFake videos. We analyze the recent fake detector named DeepFakesON-Phys that is based on a Convolutional Attention Network (CAN), which extracts spatial and temporal information from video frames, analyzing and combining both sources to better detect fake videos. DeepFakesON-Phys has been experimentally evaluated using the latest public databases in the field: Celeb-DF v2 and DFDC. The results achieved for DeepFake detection based on a single frame are over 98% AUC (Area Under the Curve) on both databases, proving the success of fake detectors based on physiological measurement to detect the latest DeepFake videos. In this chapter, we also propose and study heuristical and statistical approaches for performing continuous DeepFake detection by combining scores from consecutive frames with low latency and high accuracy (100% on the Celeb-DF v2 evaluation dataset). We show that combining scores extracted from short-time video sequences can improve the discrimination power of DeepFakesON-PhysThis work has been supported by projects: PRIMA (H2020-MSCA-ITN2019-860315), TRESPASS-ETN (H2020-MSCA-ITN-2019-860813), BIBECA (MINECO/FEDER RTI2018-101248-B-I00), and COST CA16101 (MULTI-FORESEE). J. H.-O. is supported by a PhD fellowship from UA

    e-BioSign Tool: Towards Scientific Assessment of Dynamic Signatures under Forensic Conditions

    Full text link
    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. R. Vera-Rodriguez, J. Fierrez, J. Ortega-Garcia, A. Acien and R. Tolosana, "e-BioSign tool: Towards scientific assessment of dynamic signatures under forensic conditions," 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, VA, 2015, pp. 1-6. doi: 10.1109/BTAS.2015.7358756This paper presents a new tool specifically designed to carry out dynamic signature forensic analysis and give sci- entific support to forensic handwriting examiners (FHEs). Traditionally FHEs have performed forensic analysis of paper-based signatures for court cases, but with the rapid evolution of the technology, nowadays they are being asked to carry out analysis based on signatures acquired by digi- tizing tablets more and more often. In some cases, an option followed has been to obtain a paper impression of these sig- natures and carry out a traditional analysis, but there are many deficiencies in this approach regarding the low spa- tial resolution of some devices compared to original off-line signatures and also the fact that the dynamic information, which has been proved to be very discriminative by the bio- metric community, is lost and not taken into account at all. The tool we present in this paper allows the FHEs to carry out a forensic analysis taking into account both the tra- ditional off-line information normally used in paper-based signature analysis, and also the dynamic information of the signatures. Additionally, the tool incorporates two impor- tant functionalities, the first is the provision of statistical support to the analysis by including population statistics for genuine and forged signatures for some selected features, and the second is the incorporation of an automatic dy- namic signature matcher, from which a likelihood ratio (LR) can be obtained from the matching comparison between the known and questioned signatures under analysis.This work was supported in part by the Project Bio-Shield (TEC2012-34881), in part by Cecabank e-BioFirma Contract, in part by the BEAT Project (FP7-SEC-284989) and in part by Catedra UAM-Telefonica

    GANprintR: Improved Fakes and Evaluation of the State of the Art in Face Manipulation Detection

    Full text link
    © 2020 IEEE.  Personal use of this material is permitted.  Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other worksThe availability of large-scale facial databases, together with the remarkable progresses of deep learning technologies, in particular Generative Adversarial Networks (GANs), have led to the generation of extremely realistic fake facial content, raising obvious concerns about the potential for misuse. Such concerns have fostered the research on manipulation detection methods that, contrary to humans, have already achieved astonishing results in various scenarios. In this study, we focus on the synthesis of entire facial images, which is a specific type of facial manipulation. The main contributions of this study are four-fold: i) a novel strategy to remove GAN 'fingerprints' from synthetic fake images based on autoencoders is described, in order to spoof facial manipulation detection systems while keeping the visual quality of the resulting images; ii) an in-depth analysis of the recent literature in facial manipulation detection; iii) a complete experimental assessment of this type of facial manipulation, considering the state-of-the-art fake detection systems (based on holistic deep networks, steganalysis, and local artifacts), remarking how challenging is this task in unconstrained scenarios; and finally iv) we announce a novel public database, named iFakeFaceDB, yielding from the application of our proposed GAN-fingerprint Removal approach (GANprintR) to already very realistic synthetic fake images. The results obtained in our empirical evaluation show that additional efforts are required to develop robust facial manipulation detection systems against unseen conditions and spoof techniques, such as the one proposed in this studyThis work has been supported by projects: PRIMA (H2020-MSCA-ITN-2019-860315), TRESPASS-ETN (H2020-MSCA-ITN2019-860813), BIBECA (RTI2018-101248-B-I00 MINECO/FEDER), BioGuard (Ayudas Fundación BBVA a Equipos de Investigación Cientíifica 2017), Accenture, by NOVA LINCS (UIDB/04516/2020) with the financial support of FCT - Fundação para a Ciência e a Tecnologia, through national funds, and by FCT/MCTES through national funds and co-funded by EU under the project UIDB/EEA/50008/202

    IJCB 2022 Mobile Behavioral Biometrics Competition (MobileB2C)

    Full text link
    © 2022 IEEE.  Personal use of this material is permitted.  Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Artículo escrito por un elevado número de autores, solo se referencian el que aparece en primer lugar, los autores pertenecientes a la UAM y el nombre del grupo de colaboración, si lo hubiereThis paper describes the experimental framework and results of the IJCB 2022 Mobile Behavioral Biometrics Competition (MobileB2C). The aim of MobileB2C is bench-marking mobile user authentication systems based on behavioral biometric traits transparently acquired by mobile devices during ordinary Human-Computer Interaction (HCI), using a novel public database, BehavePassDB 1 1 https://github.com/BiDAlab/MobileB2C_BehavePassDE, and a standard experimental protocol. The competition is divided into four tasks corresponding to typical user activities: keystroke, text reading, gallery swiping, and tapping. The data are composed of touchscreen data and several background sensor data simultaneously acquired. “Random” (different users with different devices) and “skilled” (different user on the same device attempting to imitate the legitimate one) impostor scenarios are considered. The results achieved by the participants show the feasibility of user authentication through behavioral biometrics, although this proves to be a non-trivial challenge. MobileB2C will be established as an on-going competition 2 2 https://sites.google.com/view/mobileb2c/.This project has received funding from the European Union's Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grant agreement No 860315, and from Orange Labs. R. Vera-Rodriguez, R. Tolosana, and A. Morales are also supported by INTERACTION (PID2021-1265210B-IOO MICINN/FEDER)

    New trends on photoelectrocatalysis (PEC):nanomaterials, wastewater treatment and hydrogen generation

    Get PDF
    The need for novel water treatment technologies has been recently recognised as concerning contaminants (organics and pathogens) are resilient to standard technologies. Advanced oxidation processes degrade organics and inactivate microorganisms via generated reactive oxygen species (ROS). Among them, heterogeneous photocatalysis may have reduced efficiency due to, fast electron-hole pair recombination in the photoexcited semiconductor and reduced effective surface area of immobilised photocatalysts. To overcome these, the process can be electrically assisted by using an external bias, an electrically conductive support for the photocatalyst connected to a counter electrode, this is known as photoelectrocatalysis (PEC). Compared to photocatalysis, PEC increases the efficiency of the generation of ROS due to the prevention of charge recombination between photogenerated electron-hole pairs thanks the electrical bias applied. This review presents recent trends, challenges, nanomaterials and different water applications of PEC (degradation of organic pollutants, disinfection and generation of hydrogen from wastewater)
    corecore