• Non ci sono risultati.

Biometrics Recent Research Trends in

N/A
N/A
Protected

Academic year: 2021

Condividi "Biometrics Recent Research Trends in"

Copied!
40
0
0

Testo completo

(1)

Image Processing for Biometric Applications

Ruggero Donida Labati

Recent Research Trends in Biometrics

Academic year 2016/2017

(2)

• Research trends

• Iris

• Face

Summary

(3)

Research trends

(4)

• Increase the accuracy

• Multimodal and multibiometric systems

• Reduce the sensor costs

• Less-cooperative acquisition techniques

• Increase the usability and user’s acceptance

• Increase of the distances from the sensors

• Continuous authentication

• Adaptive biometrics

• Security and privacy

• New biometric traits

Research trends

(5)

• Enhancement

• Segmentation

• Feature extraction

• Matching

• Classification methods

• Deep learning

Increase the accuracy

(6)

Multimodal systems

Advantages

o Accuracy

– FNMR, FMR

o Enrollment

– FTE

– Universal registration requirements

o Anti-Spoofing

(7)

Multimodal systems: examples

(8)

• Data Fusion Level of Fusion

o Fusion at Sensor level o Fusion at Feature level o Fusion at Opinion level o Fusion at Decision level

Multimodal systems: fusion levels

(9)

Multimodal systems:

the most diffused methods

Feature Extraction 1

Fusion Matching Decision Feature

Extraction 2

DB1

yes/no score

Feature

Extraction 1 Matching 1

Fusion Decision Feature

Extraction 2 Matching 2

DB1

DB2

yes/no score

Feature level

Score level

(10)

Multimodal systems: data fusion

(11)

Reduce the sensor costs

• New application scenarios

• Wider diffusion of the technology

(12)

Less-cooperative acquisition techniques

(13)

Increase the usability and user’s acceptance

• ISO 9241-11: The usability is the extent to which a product can be used by specified users to achieve specified goals with

effectiveness, efficiency and satisfaction in a specified context of use

• User acceptance: subjective

https://www.nist.gov/sites/default/files/nistir-7504-height-angle.pdf

(14)

Increase of the distances from the sensors

(15)

Continuous authentication

(16)

Adaptive biometrics

(17)

• Security: authentication, data integrity, confi- dentiality, and non-repudiation

• Privacy: security, data protection

Security and privacy

(18)

Security and privacy: points of attack

(19)

Security and privacy:

anti spoofing

(20)

Key-binding biometric cryptosystem

Key generating biometric cryptosystem

Security and privacy:

template protection (1/2)

(21)

Security and privacy:

template protection (2/2)

(22)

New biometric traits (1/3)

(23)

New biometric traits (2/3)

(24)

New biometric traits (3/3)

(25)

Iris

(26)

Iris recognition roadmap

(27)

Iris recognition roadmap

1: close-range iris recognition

2: active iris recognition

(28)

Iris recognition roadmap

3: iris recognition at a distance

4: active iris recognition at a distance

(29)

Iris recognition roadmap

5: passive iris recognition on the move

6: active iris recognition on the move

(30)

Iris recognition roadmap

7: iris recognition for surveillance

Diana John

fake iris

non-enrolled user

(31)

Open problems

• Segmentation

• Gaze deviation

• Pupil dilation

(32)

Face

(33)

Surveillance Mobile

Gaming Video indexing

Recent applications

(34)

Open problems: occlusions

(35)

Open problems: pose variations

(36)

Open problems: expression variations

(37)

Open problems: illumination

(38)

Illumination compensation:

Single Scale Retinex Algorithm

• Ii(x,y): the image distribution in the ith spectral band

• Ri(x,y): retinex output

• Gaussian function: F(x,y)=Ke-(x2+y2)/c2

– K determined by:

– C is the Gaussian surround space constant )

, (

) , log (

log )

, (

)]

, (

* ) , ( log[

) , ( log )

, (

) , (

* ) , (

) , (

y x I

y x y I

x R

y x I y x F y

x I y

x R

i i y

x I y x F

y x I i

i i

i

i

i

 F ( x , y ) dxdy 1

(39)

Open problems: aging (1/2)

(40)

Open problems: aging (2/2)

Simulation Template update

Riferimenti

Documenti correlati

This happens when the number of hidden policies is greater than 48%, because in this case the anomaly level is less precise, thus some normal events are detected as emergencies and

The main idea, in the application of elastic wavelets to the evolution of solitary waves, consists not only in the wavelet representation of the wave, but also in the assumption

In order to assess whether KIT M541L substitution was constitutive or somatic in nature, we investigated its presence in the 4 mutated patients (numbered 1, 2, 4, 5 in our

Therefore, the value of reliability 0.99865 (3  ) in calculations for load-bearing capacity and should be assigned to structures of buildings and structures of a normal level of

In our graph representation we construct a new node where the part representing the store of the labeling function is defined as the union of the store in the previous state and

There- fore an important development of the present work would be represented by the implementation of the developed algorithms on GPU-base hardware, which would allow the

In order to evaluate whether 3-HAA could bind NCOA7 in cells physiologically expressing high levels of the nuclear coactivator, MLN cells were treated with Ncoa7-specific or

j Also at Key Laboratory of Nuclear Physics and Ion-beam Application (MOE) and Institute of Modern Physics, Fudan University, Shanghai 200443, People ’s Republic of China.. k