http://iet.metastore.ingenta.com
1887

access icon openaccess Non-reference image quality assessment and natural scene statistics to counter biometric sensor spoofing

  • HTML
    92.4736328125Kb
  • XML
    114.7392578125Kb
  • PDF
    3.280003547668457MB
Loading full text...

Full text loading...

/deliver/fulltext/iet-bmt/7/4/IET-BMT.2017.0146.html;jsessionid=akni5a8a82in.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-bmt.2017.0146&mimeType=html&fmt=ahah

References

    1. 1)
      • (2014)
        1. Marcel, S., Nixon, M.S., Li, S.Z. (Eds.): ‘Handbook of biometric anti-spoofing’ (Springer, London, 2014).
        .
    2. 2)
      • D. Gragnaniello , G. Poggi , C. Sansone .
        2. Gragnaniello, D., Poggi, G., Sansone, C., et al: ‘An investigation of local descriptors for biometric spoofing detection’, IEEE Trans. Inf. Forensics Sec., 2015, 10, (4), pp. 849861.
        . IEEE Trans. Inf. Forensics Sec. , 4 , 849 - 861
    3. 3)
      • D. Menotti , G. Chiachia , A. Pinto .
        3. Menotti, D., Chiachia, G., Pinto, A., et al: ‘Deep representations for iris, face, and fingerprint spoofing detection’, IEEE Trans. Inf. Forensics Sec., 2015, 10, (4), pp. 864879.
        . IEEE Trans. Inf. Forensics Sec. , 4 , 864 - 879
    4. 4)
      • R. Raghavendra , K. Raja , S. Venkatesh .
        4. Raghavendra, R., Raja, K., Venkatesh, S., et al: ‘Transferable deep convolutional neural network features for fingervein presentation attack detection’. Proc. of the 5th Int. Workshop on Biometrics and Forensics (IWBF'17), Coventry, UK, 2017, pp. 16.
        . Proc. of the 5th Int. Workshop on Biometrics and Forensics (IWBF'17) , 1 - 6
    5. 5)
      • J. Galbally , S. Marcel , J. Fierrez .
        5. Galbally, J., Marcel, S., Fierrez, J.: ‘Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition’, IEEE Trans. Image Process., 2014, 23, (2), pp. 710724.
        . IEEE Trans. Image Process. , 2 , 710 - 724
    6. 6)
      • A.P.S Bhogal , D. Söllinger , P. Trung .
        6. Bhogal, A.P.S, Söllinger, D., Trung, P., et al: ‘Non-reference image quality assessment for biometric presentation attack detection (best reviewed papers session)’. Proc. of the 5th Int. Workshop on Biometrics and Forensics (IWBF'17), Coventry, UK, 2017, pp. 16.
        . Proc. of the 5th Int. Workshop on Biometrics and Forensics (IWBF'17) , 1 - 6
    7. 7)
      • D. Wen , H. Han , A.K. Jain .
        7. Wen, D., Han, H., Jain, A.K.: ‘Face spoof detection with image distortion analysis’, IEEE Trans. Inf. Forensics Sec., 2015, 10, (4), pp. 746761.
        . IEEE Trans. Inf. Forensics Sec. , 4 , 746 - 761
    8. 8)
      • A.P.S Bhogal , D. Söllinger , P. Trung .
        8. Bhogal, A.P.S, Söllinger, D., Trung, P., et al: ‘Non-reference image quality assessment for fingervein presentation attack detection’. Proc. of 20th Scandinavian Conf. on Image Analysis (SCIA'17)(Springer Lecture Notes on Computer Science, 10269), 2017, pp. 184196.
        . Proc. of 20th Scandinavian Conf. on Image Analysis (SCIA'17) , 184 - 196
    9. 9)
      • A. Nouri , C. Charrier , A. Saadane .
        9. Nouri, A., Charrier, C., Saadane, A., et al: ‘Statistical comparison of no-reference images quality assessment algorithms’. Proc. of the Colour and Visual Computing Symp. (CVCS'13), 2013.
        . Proc. of the Colour and Visual Computing Symp. (CVCS'13)
    10. 10)
      • C. Charrier , A. Saadane , C. Fernandez-Maloigne .
        10. Charrier, C., Saadane, A., Fernandez-Maloigne, C.: ‘Comparison of no-reference image quality assessment machine learning-based algorithms on compressed images’. Image Quality and System Performance XII, volume 9396 of Proceedings of SPIE, 2015.
        . Image Quality and System Performance XII, volume 9396 of Proceedings of SPIE
    11. 11)
      • A. Mittal , R. Soundararajan , A.C. Bovik .
        11. Mittal, A., Soundararajan, R., Bovik, A.C.: ‘Making image quality assessment robust’. Proceedings of the 46th Asilomar Conf. on Signals, Systems and Computers (ASILOMAR), 2012.
        . Proceedings of the 46th Asilomar Conf. on Signals, Systems and Computers (ASILOMAR)
    12. 12)
      • M. Saad , A.C. Bovik , C. Charrier .
        12. Saad, M., Bovik, A.C., Charrier, C.: ‘Blind image quality assessment: a natural scene statistics approach in the DCT domain’, IEEE Trans. Image Process., 2012, 21, (8), pp. 33393352.
        . IEEE Trans. Image Process. , 8 , 3339 - 3352
    13. 13)
      • S. Gabarda , G. Cristobal .
        13. Gabarda, S., Cristobal, G.: ‘Blind image quality assessment through anisotropy’, J. Opt. Soc. Am. A, 2007, 24, pp. 2451.
        . J. Opt. Soc. Am. A , 24 - 51
    14. 14)
      • A. Mittal , A.K. Moorthy , A.C. Bovik .
        14. Mittal, A., Moorthy, A.K., Bovik, A.C.: ‘No-reference image quality assessment in the spatial domain’, IEEE Trans. Image Process., 2012, 21, (12), pp. 46954708.
        . IEEE Trans. Image Process. , 12 , 4695 - 4708
    15. 15)
      • A.K. Moorthy , A.C. Bovik .
        15. Moorthy, A.K., Bovik, A.C.: ‘Blind image quality assessment: from natural scene statistics to perceptual quality’, IEEE Trans. Image Process., 2011, 20, (12), pp. 33503364.
        . IEEE Trans. Image Process. , 12 , 3350 - 3364
    16. 16)
      • A.K. Moorthy , A.C. Bovik .
        16. Moorthy, A.K., Bovik, A.C.: ‘A two-step framework for constructing blind image quality indices’, IEEE Signal Process. Lett., 2010, 17, (5), pp. 513516.
        . IEEE Signal Process. Lett. , 5 , 513 - 516
    17. 17)
      • J. Fierrez , J. Ortega-Garcia , D. Torre-Toledano .
        17. Fierrez, J., Ortega-Garcia, J., Torre-Toledano, D., et al: ‘Biosec baseline corpus: a multimodal biometric database’, Pattern Recognit., 2007, 40, (4), pp. 13891392.
        . Pattern Recognit. , 4 , 1389 - 1392
    18. 18)
      • J. Galbally , J. Ortiz-Lopez , J. Fierrez .
        18. Galbally, J., Ortiz-Lopez, J., Fierrez, J., et al: ‘Iris liveness detection based on quality related features’. Proc. of the IAPR/IEEE Int. Conf. on Biometrics (ICB'12), March 2012, pp. 271276.
        . Proc. of the IAPR/IEEE Int. Conf. on Biometrics (ICB'12) , 271 - 276
    19. 19)
      • J. Galbally , F. Alonso-Fernandez , J. Fierrez .
        19. Galbally, J., Alonso-Fernandez, F., Fierrez, J., et al: ‘A high performance fingerprint liveness detection method based on quality related features’, Future Gener. Comput. Syst., 2012, 28, pp. 311321.
        . Future Gener. Comput. Syst. , 311 - 321
    20. 20)
      • I. Bhardwaj , N.D. Londhe , S.K. Kopparau .
        20. Bhardwaj, I., Londhe, N.D., Kopparau, S.K.: ‘A spoof resistant multibiometric system based on the physiological and behavioral characteristics of fingerprint’, Pattern Recognit., 2017, 62, pp. 214224.
        . Pattern Recognit. , 214 - 224
    21. 21)
      • M. Lu , Z. Chen , W. Sheng .
        21. Lu, M., Chen, Z., Sheng, W.: ‘Fingerprint liveness detection based on pore analysis’. Biometric Recognition – Proc. of the Chinese Conf. on Biometric Recognition (CCBR'15, Springer LNCS, 9428), 2015, pp. 233240.
        . Biometric Recognition – Proc. of the Chinese Conf. on Biometric Recognition (CCBR'15 , 233 - 240
    22. 22)
      • I. Chingovska , A. Anjos , S. Marcel .
        22. Chingovska, I., Anjos, A., Marcel, S.: ‘On the effectiveness of local binary patterns in face anti-spoofing’. Proc. of the Int. Conf. of the Biometrics Special Interest Group (BIOSIG'16), September 2012.
        . Proc. of the Int. Conf. of the Biometrics Special Interest Group (BIOSIG'16)
    23. 23)
      • P. Tome , R. Raghavendra , C. Busch .
        23. Tome, P., Raghavendra, R., Busch, C., et al: ‘The 1st competition on counter measures to finger vein spoofing attacks’. 2015 Int. Conf. on Biometrics (ICB), May 2015, pp. 513518.
        . 2015 Int. Conf. on Biometrics (ICB) , 513 - 518
    24. 24)
      • S. Tirunagari , N. Poh , M. Bober .
        24. Tirunagari, S., Poh, N., Bober, M., et al: ‘Windowed DMD as a microtexture descriptor for finger vein counter-spoofing in biometrics’. 2015 IEEE Int. Workshop on Information Forensics and Security (WIFS), November 2015, pp. 16.
        . 2015 IEEE Int. Workshop on Information Forensics and Security (WIFS) , 1 - 6
    25. 25)
      • R. Raghavendra , C. Busch .
        25. Raghavendra, R., Busch, C.: ‘Presentation attack detection algorithms for finger vein biometrics: a comprehensive study’. 2015 11th Int. Conf. on Signal-Image Technology Internet-Based Systems (SITIS), November 2015, pp. 628632.
        . 2015 11th Int. Conf. on Signal-Image Technology Internet-Based Systems (SITIS) , 628 - 632
    26. 26)
      • D. Kocher , S. Schwarz , A. Uhl .
        26. Kocher, D., Schwarz, S., Uhl, A.: ‘Empirical evaluation of LBP-extension features for finger vein spoofing detection’. Proc. of the Int. Conf. of the Biometrics Special Interest Group (BIOSIG'16), Darmstadt, Germany, 2016, p. 8.
        . Proc. of the Int. Conf. of the Biometrics Special Interest Group (BIOSIG'16) , 8
    27. 27)
      • C.-C. Chang , C.-J. Lin .
        27. Chang, C.-C., Lin, C.-J.: ‘LIBSVM: a library for support vector machines’, ACM Trans. Intell. Syst. Technol., 2011, 2, (27), pp. 127. Available at http://www.csie.ntu.edu.tw/cjlin/libsvm.
        . ACM Trans. Intell. Syst. Technol. , 27 , 1 - 27
    28. 28)
      • A. Rattani , W.J. Scheirer , A. Ross .
        28. Rattani, A., Scheirer, W.J., Ross, A.: ‘Open set fingerprint spoof detection across novel fabrication materials’, IEEE Trans. Inf. Forensics Sec. (T-IFS), 2015, 10, pp. 24472460.
        . IEEE Trans. Inf. Forensics Sec. (T-IFS) , 2447 - 2460
    29. 29)
      • A. Torralba , A. Efros .
        29. Torralba, A., Efros, A.: ‘Unbiased look at dataset bias’. Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition (CVPR'11), 2011.
        . Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition (CVPR'11)
    30. 30)
      • Y. Guan , X. Wei , C.-T. Li .
        30. Guan, Y., Wei, X., Li, C.-T.: ‘On the generalization power of face and gait in gender recognition’, Int. J. Digit. Crime Forensics, 2014, 6, (1), pp. 18.
        . Int. J. Digit. Crime Forensics , 1 , 1 - 8
    31. 31)
      • W.J. Scheirer , A. Rocha , A. Sapkota .
        31. Scheirer, W.J., Rocha, A., Sapkota, A., et al: ‘Towards open set recognition’, IEEE Trans. Pattern Anal. Mach. Intell. (T-PAMI), 2013, 35, pp. 17571772.
        . IEEE Trans. Pattern Anal. Mach. Intell. (T-PAMI) , 1757 - 1772
    32. 32)
      • W.J. Scheirer , L.P. Jain , T.E. Boult .
        32. Scheirer, W.J., Jain, L.P., Boult, T.E.: ‘Probability models for open set recognition’, IEEE Trans. Pattern Anal. Mach. Intell. (T-PAMI), 2014, 36, pp. 23172324.
        . IEEE Trans. Pattern Anal. Mach. Intell. (T-PAMI) , 2317 - 2324
    33. 33)
      • L.P. Jain , W.J. Scheirer , T.E. Boult .
        33. Jain, L.P., Scheirer, W.J., Boult, T.E.: ‘Multi-class open set recognition using probability of inclusion’. The European Conf. on Computer Vision (ECCV), September 2014.
        . The European Conf. on Computer Vision (ECCV)
    34. 34)
      • B. Heflin , W.J. Scheirer , T.E. Boult .
        34. Heflin, B., Scheirer, W.J., Boult, T.E.: ‘Detecting and classifying scars, marks, and tattoos found in the wild’. The IEEE Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS), September 2012.
        . The IEEE Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS)
    35. 35)
      • F.O. Costa , E. Silva , M. Eckmann .
        35. Costa, F.O., Silva, E., Eckmann, M., et al: ‘Open set source camera attribution and device linking’, Pattern Recognit. Lett., 2014, 36, pp. 92101.
        . Pattern Recognit. Lett. , 92 - 101
    36. 36)
      • Z. Akhtar , C. Micheloni , G.L. Foresti .
        36. Akhtar, Z., Micheloni, C., Foresti, G.L.: ‘Correlation based fingerprint liveness detection’. Proc. of the Int. Conf. on Biometrics (ICB'15), May 2015, pp. 305310.
        . Proc. of the Int. Conf. on Biometrics (ICB'15) , 305 - 310
    37. 37)
      • E. Marasco , P. Wild , B. Cukic .
        37. Marasco, E., Wild, P., Cukic, B.: ‘Robust and interoperable fingerprint spoof detection via convolutional neural networks’. Proc. of the IEEE Symp. on Technologies for Homeland Security (HST'16), May 2016, pp. 16.
        . Proc. of the IEEE Symp. on Technologies for Homeland Security (HST'16) , 1 - 6
    38. 38)
      • T. Chugh , K. Cao , A.K. Jain .
        38. Chugh, T., Cao, K., Jain, A.K.: ‘Fingerprint spoof detection using minutiae-based local patches’. Proc. of the Int. Joint Conf. on Biometrics (IJCB'17), 2017.
        . Proc. of the Int. Joint Conf. on Biometrics (IJCB'17)
    39. 39)
      • K Patel , H. Han , A.K. Jain .
        39. Patel, K, Han, H., Jain, A.K.: ‘Cross-database face antispoofing with robust feature representation’. Proc. of the 11th Chinese Conf. on Biometric Recognition (CCBR'16), 2016, pp. 611619.
        . Proc. of the 11th Chinese Conf. on Biometric Recognition (CCBR'16) , 611 - 619
    40. 40)
      • P. Korshunov , S. Marcel .
        40. Korshunov, P., Marcel, S.: ‘Cross-database evaluation of audio-based spoofing detection systems’. Proc. of the Annual Conf. of the Int. Speech Communication Association, 2016, pp. 17051709.
        . Proc. of the Annual Conf. of the Int. Speech Communication Association , 1705 - 1709
    41. 41)
      • J.S. Doyle , K.W. Bowyer , P.J. Flynn .
        41. Doyle, J.S., Bowyer, K.W., Flynn, P.J.: ‘Variation in accuracy of textured contact lens detection based on sensor and lens pattern’. Proc. of the Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS'13), September 2013, pp. 17.
        . Proc. of the Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS'13) , 1 - 7
    42. 42)
      • A. Czajka , K.W. Bowyer , M. Krumdick .
        42. Czajka, A., Bowyer, K.W., Krumdick, M., et al: ‘Recognition of image-orientation-based iris spoofing’, IEEE Trans. Inf. Forensics Sec., 2017, 12, (9), pp. 21842196.
        . IEEE Trans. Inf. Forensics Sec. , 9 , 2184 - 2196
    43. 43)
      • Y. Yin , L. Liu , X. Sun .
        43. Yin, Y., Liu, L., Sun, X.: ‘SDUMLA-HMT: A multimodal biometric database’. The 6th Chinese Conf. on Biometric Recognition (CCBR 2011), volume 7098 of Springer Lecture Notes on Computer Science, 2011, pp. 260268.
        . The 6th Chinese Conf. on Biometric Recognition (CCBR 2011), volume 7098 of Springer Lecture Notes on Computer Science , 260 - 268
    44. 44)
      • S. Kirchgasser , A. Uhl .
        44. Kirchgasser, S., Uhl, A.: ‘Template ageing and quality analysis in time-span separated fingerprint data’. Proc. of the IEEE Int. Conf. on Identity, Security and Behavior Analysis (ISBA ‘17), New Delhi, India, 2017, pp. 18.
        . Proc. of the IEEE Int. Conf. on Identity, Security and Behavior Analysis (ISBA ‘17) , 1 - 8
    45. 45)
      • S. Kirchgasser , A. Uhl .
        45. Kirchgasser, S., Uhl, A.: ‘Template ageing in non-minutiae fingerprint recognition’. Proc. of the Int. Workshop on Biometrics and Forensics (IWBF ‘17), Coventry, UK, 2017, pp. 16.
        . Proc. of the Int. Workshop on Biometrics and Forensics (IWBF ‘17) , 1 - 6
    46. 46)
      • B.T. Ton , R.N.J. Veldhuis .
        46. Ton, B.T., Veldhuis, R.N.J.: ‘A high quality finger vascular pattern dataset collected using a custom designed capturing device’. Int. Conf. on Biometrics, ICB 2013. IEEE, 2013.
        . Int. Conf. on Biometrics, ICB 2013. IEEE
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2017.0146
Loading

Related content

content/journals/10.1049/iet-bmt.2017.0146
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address