- Read more about IMPROVING CROSS-DATASET PERFORMANCE OF FACE PRESENTATION ATTACK DETECTION SYSTEMS USING FACE RECOGNITION DATASETS
- Log in to post comments
Presentation attack detection (PAD) is now considered critically important for any face-recognition (FR) based access-control system. Current deep-learning based PAD systems show excellent performance when they are tested in intra-dataset scenarios. Under cross-dataset evaluation the performance of these PAD systems drops significantly. This lack of generalization is attributed to domain-shift. Here, we propose a novel PAD method that leverages the large variability present in FR datasets to induce invariance to factors that cause domain-shift.
- Categories:
- Read more about DOMAIN ADAPTATION FOR GENERALIZATION OF FACE PRESENTATION ATTACK DETECTION IN MOBILE SETTINGS WITH MINIMAL INFORMATION
- Log in to post comments
With face-recognition (FR) increasingly replacing fingerprint sensors for user-authentication on mobile devices, presentation attacks (PA) have emerged as the single most significant hurdle for manufacturers of FR systems. Current machine-learning based presentation attack detection (PAD) systems, trained in a data-driven fashion, show excellent performance when evaluated in intra-dataset scenarios. Their performance typically degrades significantly in cross-dataset evaluations. This lack of generalization in current PAD systems makes them unsuitable for deployment in real-world scenarios.
- Categories:
- Read more about Augmentation Data Synthesis via GANs: Boosting Latent Fingerprint Reconstruction
- Log in to post comments
Latent fingerprint reconstruction is a vital preprocessing step for its identification. This task is very challenging due to not only existing complicated degradation patterns but also its scarcity of paired training data. To address these challenges, we propose a novel generative adversarial network (GAN) based data augmentation scheme to improve such reconstruction.
ICASSP1263.pdf
- Categories:
- Read more about A LIGHTWEIGHT MULTI-LABEL SEGMENTATION NETWORK FOR MOBILE IRIS BIOMETRICS
- Log in to post comments
- Categories:
- Read more about Low-complexity and Reliable Transforms for Physical Unclonable Functions
- Log in to post comments
Noisy measurements of a physical unclonable function (PUF) are used to store secret keys with reliability, security, privacy, and complexity constraints. A new set of low-complexity and orthogonal transforms with no multiplication is proposed to obtain bit-error probability results significantly better than all methods previously proposed for key binding with PUFs. The uniqueness and security performance of a transform selected from the proposed set is shown to be close to optimal.
- Categories:
- Read more about DuoDepth: Static Gesture Recognition with Dual Depth Sensors
- Log in to post comments
Static gesture recognition is an effective non-verbal communication channel between a user and their devices; however many modern methods are sensitive to the relative pose of the user’s hands with respect to the capture device, as parts of the gesture can become occluded. We present two methodologies for gesture recognition via synchronized recording from two depth cameras to alleviate this occlusion problem.
- Categories:
- Read more about DYNAMIC FACIAL FEATURES FOR INHERENTLY SAFER FACE RECOGNITION
- Log in to post comments
Among the many known type of intra-class variations, facial expressions are considered particularly challenging, as witnessed by the large number of methods that have been proposed to cope with them. The idea inspiring this work is that dynamic facial features (DFF) extracted from facial expressions while a sentence is pronounced, could possibly represent a salient and inherently safer biometric identifier, due to the greater difficulty in forging a time variable descriptor instead of a static one.
- Categories:
State-of-the-art face recognition methods have achieved ex- cellent performance on the clean datasets. However, in real- world applications, the captured face images are usually contaminated with noise, which significantly decreases the performance of these face recognition methods. In this pa- per, we propose a cascaded noise-robust deep convolutional neural network (CNR-CNN) method, consisting of two sub- networks, i.e., a denoising sub-network and a face recognition sub-network, for face recognition under noise.
- Categories:
- Read more about Securing smartphone handwritten PIN codes with recurrent neural networks
- Log in to post comments
- Categories:
This paper proposes a group membership verification protocol preventing the curious but honest server from reconstructing the enrolled signatures and inferring the identity of querying clients. The protocol quantizes the signatures into discrete embeddings, making reconstruction difficult. It also aggregates multiple embeddings into representative values, impeding identification. Theoretical and experimental results show the trade-off between the security and error rates.
- Categories: