78 research outputs found
ECG Biometric Recognition: Review, System Proposal, and Benchmark Evaluation
Electrocardiograms (ECGs) have shown unique patterns to distinguish between
different subjects and present important advantages compared to other biometric
traits, such as difficulty to counterfeit, liveness detection, and ubiquity.
Also, with the success of Deep Learning technologies, ECG biometric recognition
has received increasing interest in recent years. However, it is not easy to
evaluate the improvements of novel ECG proposed methods, mainly due to the lack
of public data and standard experimental protocols. In this study, we perform
extensive analysis and comparison of different scenarios in ECG biometric
recognition. Both verification and identification tasks are investigated, as
well as single- and multi-session scenarios. Finally, we also perform single-
and multi-lead ECG experiments, considering traditional scenarios using
electrodes in the chest and limbs and current user-friendly wearable devices.
In addition, we present ECGXtractor, a robust Deep Learning technology
trained with an in-house large-scale database and able to operate successfully
across various scenarios and multiple databases. We introduce our proposed
feature extractor, trained with multiple sinus-rhythm heartbeats belonging to
55,967 subjects, and provide a general public benchmark evaluation with
detailed experimental protocol. We evaluate the system performance over four
different databases: i) our in-house database, ii) PTB, iii) ECG-ID, and iv)
CYBHi. With the widely used PTB database, we achieve Equal Error Rates of 0.14%
and 2.06% in verification, and accuracies of 100% and 96.46% in identification,
respectively in single- and multi-session analysis. We release the source code,
experimental protocol details, and pre-trained models in GitHub to advance in
the field.Comment: 11 pages, 4 figure
Biometric presentation attack detection: beyond the visible spectrum
The increased need for unattended authentication in
multiple scenarios has motivated a wide deployment of biometric
systems in the last few years. This has in turn led to the
disclosure of security concerns specifically related to biometric
systems. Among them, presentation attacks (PAs, i.e., attempts
to log into the system with a fake biometric characteristic or
presentation attack instrument) pose a severe threat to the
security of the system: any person could eventually fabricate
or order a gummy finger or face mask to impersonate someone
else. In this context, we present a novel fingerprint presentation
attack detection (PAD) scheme based on i) a new capture device
able to acquire images within the short wave infrared (SWIR)
spectrum, and i i) an in-depth analysis of several state-of-theart
techniques based on both handcrafted and deep learning
features. The approach is evaluated on a database comprising
over 4700 samples, stemming from 562 different subjects and
35 different presentation attack instrument (PAI) species. The
results show the soundness of the proposed approach with a
detection equal error rate (D-EER) as low as 1.35% even in a
realistic scenario where five different PAI species are considered
only for testing purposes (i.e., unknown attacks
BehavePassDB: Public Database for Mobile Behavioral Biometrics and Benchmark Evaluation
Mobile behavioral biometrics have become a popular topic of research,
reaching promising results in terms of authentication, exploiting a multimodal
combination of touchscreen and background sensor data. However, there is no way
of knowing whether state-of-the-art classifiers in the literature can
distinguish between the notion of user and device. In this article, we present
a new database, BehavePassDB, structured into separate acquisition sessions and
tasks to mimic the most common aspects of mobile Human-Computer Interaction
(HCI). BehavePassDB is acquired through a dedicated mobile app installed on the
subjects' devices, also including the case of different users on the same
device for evaluation. We propose a standard experimental protocol and
benchmark for the research community to perform a fair comparison of novel
approaches with the state of the art. We propose and evaluate a system based on
Long-Short Term Memory (LSTM) architecture with triplet loss and modality
fusion at score level.Comment: 11 pages, 3 figure
Biometric Signature Verification Using Recurrent Neural Networks
“© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.”Architectures based on Recurrent Neural Networks (RNNs) have been successfully applied to many different tasks such as speech or handwriting recognition with state-of-The art results. The main contribution of this work is to analyse the feasibility of RNNs for on-line signature verification in real practical scenarios. We have considered a system based on Long Short-Term Memory (LSTM) with a Siamese architecture whose goal is to learn a similarity metric from pairs of signatures. For the experimental work, the BiosecurID database comprised of 400 users and 4 separated acquisition sessions are considered. Our proposed LSTM RNN system has outperformed the results of recent published works on the BiosecurID benchmark in figures ranging from 17.76% to 28.00% relative verification performance improvement for skilled forgeriesThis work has been supported by project TEC2015-70627-R MINECO/FEDER and by UAM-CecaBank Project. Ruben Tolosana is supported by a FPU Fellowship from Spanish MEC
DeepSign: Deep On-Line Signature Verification
Deep learning has become a breathtaking technology in the last years,
overcoming traditional handcrafted approaches and even humans for many
different tasks. However, in some tasks, such as the verification of
handwritten signatures, the amount of publicly available data is scarce, what
makes difficult to test the real limits of deep learning. In addition to the
lack of public data, it is not easy to evaluate the improvements of novel
proposed approaches as different databases and experimental protocols are
usually considered.
The main contributions of this study are: i) we provide an in-depth analysis
of state-of-the-art deep learning approaches for on-line signature
verification, ii) we present and describe the new DeepSignDB on-line
handwritten signature biometric public database, iii) we propose a standard
experimental protocol and benchmark to be used for the research community in
order to perform a fair comparison of novel approaches with the state of the
art, and iv) we adapt and evaluate our recent deep learning approach named
Time-Aligned Recurrent Neural Networks (TA-RNNs) for the task of on-line
handwritten signature verification. This approach combines the potential of
Dynamic Time Warping and Recurrent Neural Networks to train more robust systems
against forgeries. Our proposed TA-RNN system outperforms the state of the art,
achieving results even below 2.0% EER when considering skilled forgery
impostors and just one training signature per user
Keystroke Biometrics in Response to Fake News Propagation in a Global Pandemic
This work proposes and analyzes the use of keystroke biometrics for content
de-anonymization. Fake news have become a powerful tool to manipulate public
opinion, especially during major events. In particular, the massive spread of
fake news during the COVID-19 pandemic has forced governments and companies to
fight against missinformation. In this context, the ability to link multiple
accounts or profiles that spread such malicious content on the Internet while
hiding in anonymity would enable proactive identification and blacklisting.
Behavioral biometrics can be powerful tools in this fight. In this work, we
have analyzed how the latest advances in keystroke biometric recognition can
help to link behavioral typing patterns in experiments involving 100,000 users
and more than 1 million typed sequences. Our proposed system is based on
Recurrent Neural Networks adapted to the context of content de-anonymization.
Assuming the challenge to link the typed content of a target user in a pool of
candidate profiles, our results show that keystroke recognition can be used to
reduce the list of candidate profiles by more than 90%. In addition, when
keystroke is combined with auxiliary data (such as location), our system
achieves a Rank-1 identification performance equal to 52.6% and 10.9% for a
background candidate list composed of 1K and 100K profiles, respectively.Comment: arXiv admin note: text overlap with arXiv:2004.0362
- …