1,497 research outputs found

    Semi-Adversarial Networks: Convolutional Autoencoders for Imparting Privacy to Face Images

    Full text link
    In this paper, we design and evaluate a convolutional autoencoder that perturbs an input face image to impart privacy to a subject. Specifically, the proposed autoencoder transforms an input face image such that the transformed image can be successfully used for face recognition but not for gender classification. In order to train this autoencoder, we propose a novel training scheme, referred to as semi-adversarial training in this work. The training is facilitated by attaching a semi-adversarial module consisting of a pseudo gender classifier and a pseudo face matcher to the autoencoder. The objective function utilized for training this network has three terms: one to ensure that the perturbed image is a realistic face image; another to ensure that the gender attributes of the face are confounded; and a third to ensure that biometric recognition performance due to the perturbed image is not impacted. Extensive experiments confirm the efficacy of the proposed architecture in extending gender privacy to face images

    Alternative to Comprehensive Ecosystem Services Markets: The Contribution of Forest-Related Programs in New Zealand

    Get PDF
    Due to the public goods characteristics of many ecosystem services and their vital importance to human welfare, various mechanisms have been put in place to motivate private landowners in the provision of ecosystem services. A common approach is to try to develop a comprehensive ecosystem services market where landowners can receive payments from beneficiaries of ecosystem services. Much research has been directed at developing methods for valuing the range of ecosystem services so that they can be incorporated into ecosystem services markets. However, valuation methods are difficult, expensive and time consuming. Other approaches to the provision of ecosystem services such as payments for ecosystem services usually focus on a single service like water or biodiversity. However, in the provision of a particular ecosystem service, there are spill-over effects of providing other ecosystem services, and thus studying those spill-over effects may provide a simple and cost-effective way of ensuring the provision of a wide range of ecosystem services. In New Zealand, there are a variety of forestry programs which provide incentives to landowners to plant trees on their lands to meet particular objectives, but which also produce other ES. This research aims to evaluate the cost-effectiveness of the provision of a wide range of ES by these approaches, the New Zealand Emissions Trading Scheme, the East Coast Forestry Scheme, and the QEII National Trust.ecosystem services market, spill-over effect, cost-effectiveness, New Zealand, Environmental Economics and Policy,

    Biometrics-as-a-Service: A Framework to Promote Innovative Biometric Recognition in the Cloud

    Full text link
    Biometric recognition, or simply biometrics, is the use of biological attributes such as face, fingerprints or iris in order to recognize an individual in an automated manner. A key application of biometrics is authentication; i.e., using said biological attributes to provide access by verifying the claimed identity of an individual. This paper presents a framework for Biometrics-as-a-Service (BaaS) that performs biometric matching operations in the cloud, while relying on simple and ubiquitous consumer devices such as smartphones. Further, the framework promotes innovation by providing interfaces for a plurality of software developers to upload their matching algorithms to the cloud. When a biometric authentication request is submitted, the system uses a criteria to automatically select an appropriate matching algorithm. Every time a particular algorithm is selected, the corresponding developer is rendered a micropayment. This creates an innovative and competitive ecosystem that benefits both software developers and the consumers. As a case study, we have implemented the following: (a) an ocular recognition system using a mobile web interface providing user access to a biometric authentication service, and (b) a Linux-based virtual machine environment used by software developers for algorithm development and submission

    DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution

    Full text link
    Recent research has demonstrated the vulnerability of fingerprint recognition systems to dictionary attacks based on MasterPrints. MasterPrints are real or synthetic fingerprints that can fortuitously match with a large number of fingerprints thereby undermining the security afforded by fingerprint systems. Previous work by Roy et al. generated synthetic MasterPrints at the feature-level. In this work we generate complete image-level MasterPrints known as DeepMasterPrints, whose attack accuracy is found to be much superior than that of previous methods. The proposed method, referred to as Latent Variable Evolution, is based on training a Generative Adversarial Network on a set of real fingerprint images. Stochastic search in the form of the Covariance Matrix Adaptation Evolution Strategy is then used to search for latent input variables to the generator network that can maximize the number of impostor matches as assessed by a fingerprint recognizer. Experiments convey the efficacy of the proposed method in generating DeepMasterPrints. The underlying method is likely to have broad applications in fingerprint security as well as fingerprint synthesis.Comment: 8 pages; added new verification systems and diagrams. Accepted to conference Biometrics: Theory, Applications, and Systems 201

    Conjunctival scanning for biometric identification

    Get PDF
    Researchers at UMKC have developed a biometric device which recognizes the physical characteristics of sclera veins which are visible through the conjunctival membrane in the human eye. The vascular structures of the conjunctiva and episclera are rich with specific details that are useful in identifying individuals. Unlike retinal scans, the vascular structures of the conjunctiva and episclera provide extensive and unique information that can be obtained from various and selected regions of the eye and processed to authenticate or identify individuals. The technology can work with less light, on non-compliant targets, and from much greater distances than currently employed methods. It can function as a stand-alone biometric or could be used in conjunction with exiting ocular-based biometrics to achieve enhanced performance and spoof-proofing. Potential Areas of Applications: * Airport /border security * Law enforcement * Casinos * Private security Patent Status: U.S. Patent no. 7,327,860 Inventor(s): Reza Derakhshani; Arun Ross Contact Info: 0James Brazeal - [email protected] (816) 235-509
    • 

    corecore