Computational Intelligence Technologies for Biometric

advertisement
Computational Intelligence
for Biometric Applications
Vincenzo Piuri
Università degli Studi di Milano, Italy
In cooperation with Ruggero Donida Labati, Angelo Genovese,
Enrique Muñoz, Fabio Scotti and Gianluca Sforza
EU FP7 Project “ABC GATES
FOR EUROPE”
IDAACS 2015
Summary
1.
2.
3.
Introduction to biometrics
Computational intelligence for biometrics
Applications and examples






4.
Computational intelligence for sensors
Signal preprocessing
Feature extraction and selection
Computational intelligence for data fusion
Computational intelligence for classification
and quality measurement
Computational intelligence for system optimization
Conclusions
© 2015 Vincenzo Piuri
2/48
Biometrics
“Automated methods of recognizing a person
based on physiological or behavioral characteristics”

Physiological biometrics


Fingerprint, Face, Hand shape, Iris, Ear, DNA, Odor, …
Behavioral biometrics

Voice, Signature, Gait, Keystroke dynamics, …
© 2015 Vincenzo Piuri
3/48
Biometrics vs
Classical Identification

From something you have (token, key) or something
you know (password) to something you are
Security
level
Something you are
Something you know
Something
you have
Identification method
© 2015 Vincenzo Piuri
4/48
Biometrics Systems (1)

Dimension: from embedded to AFIS (FBI)
© 2015 Vincenzo Piuri
5/48
Biometrics Systems (2)

Cooperative user or “hidden” system
Cooperative
Hidden system
© 2015 Vincenzo Piuri
6/48
Biometrics  Pattern Recognition
Trait
Sample
Features
Feature
extraction
Acquisition
Coding
Template
Enrollment
Database
Identification
Acquisition
Feature
Extraction
Coding
© 2015 Vincenzo Piuri
Matching
Yes/No
7/48
Matching Score and Biometric Threshold
Identification
Database
Acquisition
Feature
Extraction
Matching
Coding
High
Treshold = 87%
Matching
Score
>?
Low
© 2015 Vincenzo Piuri
Yes/No
8/48
Impostor and Genuine Distributions
False Match Rate (FMR)
False Non-Match Rate (FNMR)
© 2015 Vincenzo Piuri
9/48
Performance Representation


The Receiving Operating
Curve (FNMR vs FMR
varying the threshold t)
is used to express
the accuracy performance
of the systems
The equal error rate EER
(FNMR=FMR)
resume the performance
of the system
© 2015 Vincenzo Piuri
EER
10/48
Technologies for Biometric Systems

Sensors and measurement systems


Signal processing


Face, fingerprint, hand, iris, gait , ear
Sensor data fusion


Feature extraction, liveness test
Image processing


Biometric sensor, liveness tests
Matching module , multimodal biometric systems
Classification and clustering

Organization of very-large DB of biomeric templates (National
identification systems, large scale identification systems)
© 2015 Vincenzo Piuri
11/48
Conventional Algorithmic Techniques
Computational complexity
Require a model
Not able to learn from experience
© 2015 Vincenzo Piuri
12/48
Computational Intelligence
for Biometrics
Intelligent
Smarter
Adaptive
© 2015 Vincenzo Piuri
Evolvable
13/48
Composite Systems for Biometrics
Input
Neural Network
Filter
Fuzzy
Algorithm
Output
Designer
Routine
TRADITIONAL PARADIGMS +
COMPUTATIONAL INTELLIGENCE =
_________________________________
+ MORE DESIGN DEGREES OF FREEDOM
+ ACCURACY
+ PERFORMACE
© 2015 Vincenzo Piuri
14/48
Main Problem
Tackling different aspects at the same time:







Instrumentation and measurement systems
Image and signal processing.
Feature extraction
Sensor fusion
System modeling
Data analysis
Classification
© 2015 Vincenzo Piuri
15/48
How to Deal
with Heterogeneous Aspects?
Nowadays:



Separate issues
Module-oriented solutions
Ad-hoc solutions



© 2015 Vincenzo Piuri
Limited optimization
Limited reusability
Limited integrability
16/48
A Comprehensive Design Approach
Feature
Extraction
System
Modeling
Sensor
Fusion
Data
Analysis
Classification
Design methodology
© 2015 Vincenzo Piuri
Biometric
system
17/48
Biometric system
Design Methodology
© 2015 Vincenzo Piuri
18/48
A.
Signal and image acquisition
B.
Signal and image preprocessing
C.
Feature extraction and selection
D.
Data fusion
E.
Classification and quality measurement
F.
System optimization
© 2015 Vincenzo Piuri
19/48
A. Signal and Image Acquisition

Conventional techniques:





Sensor enhancement
Sensor linearization
Sensor diagnosis
Sensor calibration
Computational intelligence approaches



Self-calibration
Non-linearity reduction
Error and faults detection
© 2015 Vincenzo Piuri
20/48
B. Signal Preprocessing


Signal preprocessing:
enhancing the signals and correcting the errors
Features processing:
extract from the input signals a set of features
Neural and fuzzy techniques
for signal and feature processing:

© 2015 Vincenzo Piuri
Adaptivity, intelligence, learning from examples, ...
21/48
C. Feature Extraction and Selectiton

How many features?
Complexity
Accuracy
Few features


Many features


?!?
© 2015 Vincenzo Piuri
22/48
Curse of Dimensionality Problem

Due to an excessive number of features
d=2
d=3
Space occupation= 10%
© 2015 Vincenzo Piuri
Space occupation= 1%
23/48
Dimensionality reduction problem
Simplification of the classifier
© 2015 Vincenzo Piuri

Faster

Use less memory
24/48
Selection or Extraction

Feature
selection:
Feature 1
Feature 2
Feature 3
Feature
Selection
Feature 4
Feature 2
Feature 3
Feature 5
Feature 5
Feature 6

Feature
extraction:
Feature 1
Feature 2
Feature 3
Feature A
Feature
Extraction
Feature B
Feature 4
Feature C
Feature 5
Feature D
Feature 6
© 2015 Vincenzo Piuri
25/48
Selection and Extraction
Feature 1
Feature 2
Feature 3
Feature 4
Feature 5
Feature A
Feature
Extraction
Feature B
Feature C
Feature
Selection
Feature A
Feature C
Feature D
Feature 6
© 2015 Vincenzo Piuri
26/48
Feature Extraction Algorithms





Principal Component
Analysis
Linear Discriminant Analysis
Independent Component
Analysis
Kernel PCA
PCA network
© 2015 Vincenzo Piuri





Nonlinear PCA
Feed-Forward Neural
Networks
Nonlinear autoassociative
network
Multidimensional Scaling
Self-Organizing Map (MAP)
27/48
Feature Selection Algorithms





Exhaustive Search
Branch and Bound
Sequential Forward Selection
Sequential Backward Selection
Sequential Floating Search methods
© 2015 Vincenzo Piuri
28/48
D. Biometric Data Fusion
optical and
capacitance sensors
Multiple
sensors
Multiple
biometrics
face and
fingerprint
© 2015 Vincenzo Piuri
Multiple
matchers
Multimodal
Biometrics
minutiae and
non-minutiae
based matchers
Multiple
snapshots
Multiple
units
two attempts or two
templates
right index and
middlefingers
29/48
Classical Fusion Schema
Multimodal
Match score fusion
Features fusion
DB1
DB1
Feature
Extraction 1
Feature
Extraction 2
Feature
Extraction 1
score
Fusion
Matching
Decision
Feature
Extraction 2
Matching 1
score
Fusion
Matching 2
Decision
yes/no
yes/no
DB2
Multi-paradigmatic
Feature
Extraction 1
Feature
Extraction 2
DB1
Matching 1
Match score fusion
score
Fusion
Matching 2
Decision
yes/no
DB2
© 2015 Vincenzo Piuri
30/48
Information Fusion Levels
FM: Fusion Module
DM: Decision Module
MM: Matching Module
© 2015 Vincenzo Piuri
31/48
Matching Fusion Level (Results)
DB1
Feature
Extraction 1
Feature
Extraction 2
Matching 1
score
Fusion
Matching 2
Decision
yes/no
DB2
1.
2.
© 2015 Vincenzo Piuri
32/48
E. Computational Intelligence
for Classification and Measurement
Features
an integer:
α
...
© 2015 Vincenzo Piuri
Classifier
γ
d-dimensional vector
β
classification
of the quality
a floating point value:
an index of quality
33/48
Classification (Quality Checker and Binning)
Enrollment
Acquisition
Module
Quality
Checker
Feature
Extraction
Module
Classifier
Traits
#1
Samples
Samples
Template
 Quality checker of input samples
 Sub-class classification
DX “arch”
SX “arch”
© 2015 Vincenzo Piuri
DX “loop”
SX “arch”
DX “arch”
SX “loop”
DX “loop”
SX “loop”
34/48
Computational Intelligence
for Classification and Measurement (2)
© 2015 Vincenzo Piuri
35/48
Computational Intelligence Techiniques
Statistical
Approaches
Neural
Networks
Fuzzy
Classifiers
Uscite
Ingressi
Solve complex problems by mimicking the human reasoning
© 2015 Vincenzo Piuri
36/48
F. System Optimization

System parameters difficult to fix

Very often trial-and-error approaches

Evolutionary computation techniques can solve this
optimization task
© 2015 Vincenzo Piuri
37/48
State of the Art

The conventional approach: trial and error
© 2015 Vincenzo Piuri
38/48
Design Methodology Goals

Applying the high-level system design knowledge
for the semi-automatic design of biometric systems.

The choice of algorithms
to be inserted into the biometric system

The optimization of the hardware system architecture
The output produced is:


Ready-to-compile code
Suitable configuration of the hardware architecture.
© 2015 Vincenzo Piuri
39/48
What is the High-Level System Design?

High-level synthesis is the process of mapping a
behavioural description at the algorithmic level to a structural
description in terms of functional units, memory elements, and
interconnections

The term behavioural description refers to a description of the
input/output relationship of the system to be implemented.

(algorithm written, e.g., in C, C++ , VHDL, and System C)
© 2015 Vincenzo Piuri
40/48
Methodolgy

(1)(2)(3)
The proposed methodology can be summarized in the three following main
activities:
(1) To model the possible hardware architectures
(2) To specify the behavioural description of the biometric system for the
envisioned application
(3) To map the behavioural description for the specific application into a
hardware model satisfying the designer’s requirement
bio = HW ( A)
OPTIM
A
HW
figures
© 2015 Vincenzo Piuri
41/48
Hardware Architecture Model (1)
© 2015 Vincenzo Piuri
42/48
Behavioural Description (2)
The behavioural description of the biometric system consists of the sequence
of the operations that allow the biometric system to identify the person
presented at its input sensors.
© 2015 Vincenzo Piuri
43/48
Mapping the Behavioural Description onto the
Hardware Model (3)


The goal of the mapping phase consists of
binding each component of the behavioural description, A, to the
corresponding hardware resources, HW, which implement its computation in
the biometric system.
The optimum mapping is an iterative process in which proper figures of
merit are evaluated and in which
system’s independent variables are tuned to enhance the system’s figures
of merit while satisfying the design requirements.
bio = HW ( A)
OPTIM
A
HW
figures
© 2015 Vincenzo Piuri
44/48
Figures of Merit for a
Multimodal Biometric System

The most common figures of merit considered for a biometric system
characterize its accuracy

Indexes used:




Error plots:



The False Match Rate (FMR)
The False Non-Match Rate (FNMR)
The Equal Error Rate (EER)
Receiving Operating Curve (ROC)
Detection Error Trade-off (DET)
Other figures of merit :



Response time
Memory usage
Component costs
© 2015 Vincenzo Piuri
[s]
[MB]
[$]
45/48
Figures and Design Requirements

Given the biometric model bio = HW(A) and the data benchData required to test the system,
it is possible to evaluate the figures of merit with:
[ f1, f 2 ,, f m ]  figures HW  A, benchData 

The design requirements are expressed by the designer as a set of equations in the figures of
merit:
h( f1, f 2 , , f m )  P

Example of design requirements:
© 2015 Vincenzo Piuri
EER  0.01

 zeroFMR  0.02 AND zeroFNMR  0.98


responseTi me  2s


memoryOccupation  4MB

46/48
Experimental Results

To verify the feasibility and the usability of the proposed methodology,
we implemented a prototype of the methodology
Matlab
EER, zeroFMR, zeroFNMR.
Rule-based system
© 2015 Vincenzo Piuri
47/48
Conclusions




Biometric systems are critical for security
Aspects in different technological areas should be
tackled at the same time
A comprehensive design methodology should deal with
all aspects in an integrated way
Computational intelligence offer additional
opportunities for adaptable and evolvable systems
© 2015 Vincenzo Piuri
48/48
References (1)
R. Donida Labati, V. Piuri, F. Scotti
Touchless Fingerprint Biometrics
CRC Press
ISBN: 978-1-498-70761-9
A. Genovese, V. Piuri, F. Scotti
Touchless Palmprint Recognition Systems
Springer
ISBN: 978-3-319-10364-8
A. Amato, V. Di Lecce, V. Piuri
Semantic Analysis and Understanding
of Human Behavior in Video Streaming
Springer
ISBN: 978-1-461-45485-4
© 2015 Vincenzo Piuri
References (2)

Introduction




S. Z. Li, A. K. Jain, Encyclopedia of Biometrics, Springer Publishing Company,
Incorporated, 2009.
M. Tistarelli, S. Z. Li, R. Chellappa, Handbook of Remote Biometrics: For Surveillance and
Securit,Springer Publishing Company, Incorporated, 2009.
N. V. Boulgouris, K. N. Plataniotis, E. Micheli-Tzanakou, Biometrics: Theory, Methods, and
Applications, IEEE Computer Society Press, 2009.
A. K. Jain, P. Flynn, A. Ross, Handbook of Biometrics, Springer-Verlag New York,
Incorporated, 2007.
© 2015 Vincenzo Piuri

Fingerprint











References (3)
D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition, 2nd ed., Springer Publishing
Company, Incorporated, 2009.
D. Maltoni, "Fingerprint Recognition, Overview", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer
Publishing Company, Incorporated, pp. 510 – 513, 2009.
R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Toward Unconstrained Fingerprint Recognition: a FullyTouchless 3-D System Based on Two Views on the Move", in IEEE Transactions on Systems, Man, and
Cybernetics: Systems, 2015.
V. Piuri, and F. Scotti, "Fingerprint Biometrics via Low-cost Sensors and Webcams", in Biometrics: Theory,
Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference on, pp. 1-6, October 2008.
R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Touchless fingerprint biometrics: a survey on 2D and 3D
technologies", in Journal of Internet Technology, pp. 325 - 332, May, 2014.
N. Yager, A. Amin, "Fingerprint verification based on minutiae features: a review", Pattern Analysis &
Applications, Springer London, vol. 7, pp. 94-113, 2004.
P. Komarinski, Automated fingerprint identification systems (AFIS), Elsevier Academic, Amsterdam, 2005.
N.K. Ratha, R.M. Bolle, Automatic Fingerprint Recognition Systems, Springer-Verlag, 2003.
R. Donida Labati, V. Piuri, and F. Scotti, "A neural-based minutiae pair identification method for touchless
fingerprint images", in IEEE Symposium Series in Computational Intelligence 2011 (SSCI 2011), April 2011.
R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Touchless Fingerprint Biometrics: a Survey on 2D and
3D Technologies", in Journal of Internet Technology, 2014
R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Accurate 3D Fingerprint Virtual Environment for
Biometric Technology Evaluations and Experiment Design", in Proc. of the 2013 IEEE Int. Conf. on
Computational Intelligence and Virtual Environments for Measurement Systems and Applications
(CIVEMSA 2013), Milan, Italy, pp. 43 - 48, July 15 - 17, 2013
© 2015 Vincenzo Piuri
References (4)

Fingerprint (cont’d)








R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Contactless Fingerprint Recognition: a Neural
Approach for Perspective and Rotation Effects Reduction", in Proc. of the IEEE Workshop on
Computational Intelligence in Biometrics and Identity Management (CIBIM), Singapore, Singapore, pp.
22 - 30, April 16 - 19, 2013
R. Donida Labati, V. Piuri, F. Scotti, "Measurement of the principal singular point in fingerprint images: a
neural approach", in 2010 IEEE International Conference on Computational Intelligence for Measurement Systems
and Applications (CIMSA), pp. 18 - 23, September 6-8, 2010.
R. Donida Labati, V. Piuri, F. Scotti, "Neural-based Quality Measurement of Fingerprint Images in
Contactless Biometric Systems", in The 2010 International Joint Conference on Neural Networks (IJCNN), pp. 1
– 8, July 18-23, 2010.
M . Gamassi, V. Piuri, and F. Scotti, "Fingerprint local analysis for high-performance minutiae
extraction", in IEEE International Conference on Image Processing, 2005 (ICIP 2005), pp. III - 265-8,
September, 2005
R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Two-view Contactless Fingerprint Acquisition
Systems: a Case Study for Clay Artworks", in 2012 IEEE Workshop on Biometric Measurements and Systems for
Security and Medical Applications, 2012
R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Virtual Environment for 3-D Synthetic
Fingerprints", 2012 IEEE International Conference on Virtual Environments, Human-Computer Interfaces and
Measurement Systems, pp. 48 - 53, 2012
R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Quality Measurement of Unwrapped Threedimensional Fingerprints: a Neural Networks Approach", in 2012 International Joint Conference on Neural
Networks (IJCNN 2012), pp. 1123 - 1130, 2012
R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Fast 3-D Fingertip Reconstruction Using a
Single Two-View Structured Light Acquisition", in IEEE Workshop on Biometric Measurements and Systems for
Security and Medical Applications, pp. 1 - 8, 2011
© 2015 Vincenzo Piuri
References (5)

Fingerprint (cont’d)



R. Donida Labati, V. Piuri, and F. Scotti, "A neural-based minutiae pair identification method for
touchless fingeprint images", in 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity
Management (CIBIM), pp. 96 -102, April, 2011
R. Donida Labati, V. Piuri, and F. Scotti, "Neural-based Quality Measurement of Fingerprint Images in
Contactless Biometric Systems", in The 2010 International Joint Conference on Neural Networks (IJCNN), pp. 1
- 8, July 18-23, 2010
R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Measurement of the Principal Singular Point in
Contact and Contactless Fingerprint Images by using Computational Intelligence Techniques", in 2010
IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA
2010), pp. 18 - 23, 2010
© 2015 Vincenzo Piuri
References (6)

Iris









R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Iris segmentation: state of the art and innovative
methods", in Cross Disciplinary Biometric Systems, C. Liu, and V.K. Mago (eds.), Springer, pp. 151-182, 2012
H. Proença, "Quality Assessment of Degraded Iris Images Acquired in the Visible Wavelength", IEEE
Transactions on Information Forensics and Security,vol.6, no.1, pp.82-95, March 2011.
Yung-hui Li, M. Savvides,"Iris Recognition, Overview", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain,
Springer Publishing Company, Incorporated, pp. 810 – 819, 2009.
K.W. Bowyer, K. Hollingsworth and P.J. Flynn, Image understanding for iris biometrics: a survey,
Computer Vision and Image Understanding, vol. 110, pp. 281-307, 2008.
J. Daugman, "New Methods in Iris Recognition", IEEE Transactions on Systems, Man, and Cybernetics, Part B:
Cybernetics, vol.37, no.5, pp.1167-1175, October 2007.
V. Piuri, and F. Scotti, "Adaptive Reflection Detection and Location in Iris Biometric Images by Using
Computational Intelligence Techniques", in IEEE Transactions of Instrumentation and Measurement, pp.18251833, July 2010.
R. Donida Labati, and F. Scotti, "Noisy iris segmentation with boundary regularization and reflections
removal", in Image and Vision Computing, Iris Images Segmentation Special Issue, Elsevier, pp. 270-277, February
2010.
R. Donida Labati, V. Piuri, and F. Scotti, "Neural-based Iterative Approach for Iris Detection in Iris
recognition systems", in IEEE Symposium on Computational Intelligence for Security and Defence Applications, pp.
1-6, December 18, 2009.
R. Donida Labati, V. Piuri, and F. Scotti, "Agent-Based Image Iris Segmentation and Multiple Views
Boundary Refining", in IEEE Third International Conference on Biometrics: Theory, Applications and Systems, pp.
1-7, November 20, 2009.
© 2015 Vincenzo Piuri
References (7)

Face







Yun Fu, Guodong Guo, T. S. Huang, "Age Synthesis and Estimation via Faces: A Survey", IEEE
Transactions on Pattern Analysis and Machine Intelligence, vol.32, no.11, pp.1955-1976, November 2010.
A. M. Martinez, "Face Recognition, Overview", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain,
Springer Publishing Company, Incorporated, pp. 555 – 559, 2009.
S. Romdhani, J. Ho, T. Vetter, D. J. Kriegman, "Face Recognition Using 3-D Models: Pose and
Illumination", Proceedings of the IEEE , vol.94, no.11, pp.1977-1999, November 2006.
Z. Li, A. K. Jain, Handbook of Face Recognition, Springer-Verlag, 2005.
W. Zhao, R. Chellappa, A. Rosenfeld, P.J. Phillips, "Face Recognition: A Literature Survey", ACM
Computing Surveys, pp. 399-458S, 2003.
S. S. Rakover & B. Cahlon, Face recognition: cognitive and computational processes, John Benjamins Publishing
Co., Amsterdam, The Netherlands, 2001.
Ear shape




M. Choras, "Ear Biometrics", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing
Company, Incorporated, pp. 233 – 240, 2009.
B. Bhanu, H. Chen, Human Ear Recognition by Computer (Advances in Pattern Recognition), Springer Publishing
Company, Incorporated, 2008.
D. J. Hurley, B. Arbab-Zavar, M. S. Nixon, “The Ear as a Biometric”, in: Handbook of Biometrics, pp. 131150. A. K. Jain, P. Flynn, A. Ross, Springer-Verlag New York, Incorporated, 2007.
S. M. S. Islam, M. Bennamoun, R. A. Owens, R. Davies, "Biometric Approaches of 2D-3D Ear and Face:
A Survey", in Advances in Computer and Information Sciences and Engineering. Springer Netherlands, pp. 509514 , 2007.
© 2015 Vincenzo Piuri
References (8)

Hand geometry




Palmprint & Palmvein





N. Duta, "A survey of biometric technology based on hand shape", Pattern Recognition, vol. 42, n. 11,
pp. 2797-2806, November 2009.
N. Duta, "Hand Shape", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company,
Incorporated, pp. 682 – 687, 2009.
R. Sanchez-Reillo, C. Sanchez-Avila, A. Gonzalez-Marcos, "Biometric identification through hand
geometry measurements," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.22,
no.10, pp. 1168- 1171, October 2000.
D. Zhang, Z. Guo, G. Lu, L. Zhang, Y. Liu, W. Zuo, "Online joint palmprint and palmvein verification",
Expert Systems with Applications, vol. 38, no. 3, pp. 2621-2631, March 2011.
A. Kong, D. Zhang, M. Kamel, "A Survey of Palmprint Recognition", Pattern Recognition, vol. 42, no. 7,
pp. 1408-1418, July 2009.
M. Watanabe, " Palm Vein", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing
Company, Incorporated, pp. 1028 – 1033, 2009.
D. Zhang, V. Kanhangad, "Palmprint, 3D", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer
Publishing Company, Incorporated, pp. 1037 – 1042, 2009.
ECG


R. Donida Labati, V. Piuri, R. Sassi, G. Sforza, F. Scotti, "Adaptive ECG biometric recognition: a study
on re-enrollment methods for QRS signals", in Proc. of the IEEE Workshop on Computational Intelligence in
Biometrics and Identity Management (CIBIM 2014), Orlando, FL, USA, pp. 30 - 37, December 9-12, 2014.
R. Donida Labati, V. Piuri, R. Sassi and F. Scotti, "HeartCode: a novel binary ECG-based template", in
Proc. of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS
2014), Rome, Italy, October 17, 2014.
© 2015 Vincenzo Piuri
References (9)

DNA




J.M. Butler, Fundamentals of Forensic DNA Typing, Elsevier Academic Press, San Diego, 2010.
R.A.H. van Oorschot, K. N. Ballantyne, R. J. Mitchell, "Forensic trace DNA: a review", Investigative
Genetics, pp. 1 – 14, 2010.
T. Hicks, R. Coquoz, " Forensic DNA Evidence", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain,
Springer Publishing Company, Incorporated, pp. 573 – 579, 2009.
P. M. Vallone, C. R. Hill, J. M. Butler, "Demonstration of rapid multiplex PCR amplification involving 16
genetic loci", Forensic Science International: Genetics, vol. 3, no. 1, pp. 42-45, December 2008.
© 2015 Vincenzo Piuri
References (10)

Voice





H. Beigi, Fundamentals of Speaker Recognition, Springer-Verlag New York Inc., January 2011.
J. Markowitz, "Speaker Recognition, Standardization", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain,
Springer Publishing Company, Incorporated, pp. 1270 – 1277, 2009.
J. Benesty, M. Mohan Sondhi, Y. Huang, Springer Handbook of Speech Processing, Springer-Verlag, January
2008.
R. D. Peacocke, D. H. Graf, "An introduction to speech and speaker recognition", Computer , vol.23,
no.8, pp.26-33, August 1990.
Gait




M. Goffredo, I. Bouchrika, J. N. Carter, M. S. Nixon, "Self-Calibrating View-Invariant Gait Biometrics",
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol.40, no.4, pp.997-1008, August
2010.
R. Chellappa, A. Veeraraghavan, N. Ramanathan, "Gait Biometrics, Overview", in Encyclopedia of
Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 628 – 633, 2009.
M.S. Nixon, J. N. Carter, "Automatic Recognition by Gait," Proceedings of the IEEE , vol.94, no.11,
pp.2013-2024, November 2006.
N.V. Boulgouris, D. Hatzinakos, K.N. Plataniotis, "Gait recognition: a challenging signal processing
technology for biometric identification", IEEE Signal Processing Magazine, vol.22, no.6, pp. 78- 90,
November 2005.
© 2015 Vincenzo Piuri
References (11)

Signature & hand writing




Keystroke




V. A. Bharadi, H. B. Kekre, "Off-Line Signature Recognition Systems", International Journal of Computer
Applications vol. 1, no. 27, pp. 48–56, February 2010.
O. Henniger, D. Muramatsu, T. Matsumoto, I. Yoshimura, M. Yoshimura, " Signature Recognition", in
Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 1196 –
1205, 2009.
D. Impedovo, G. Pirlo, "Automatic Signature Verification: The State of the Art", IEEE Transactions on
Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol.38, no.5, pp.609-635, September 2008.
N. Bartlow, "Keystroke Recognition", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer
Publishing Company, Incorporated, pp. 877 – 882, 2009.
D. Shanmugapriya, "A survey of biometric keystroke dynamics: approaches, security and challenges",
International Journal of Computer Science and Information Security, vol. 5, pp. 115 – 119, September 2009.
Enzhe Yu, Sungzoon Cho, "Keystroke dynamics identity verification - its problems and practical
solutions", Computers & Security, vol. 23, no. 5, pp. 428-440, July 2004.
Weight

R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Weight Estimation from Frame Sequences Using
Computational Intelligence Techniques", 2012 IEEE International Conference on Computational Intelligence for
Measurement Systems and Applications (CIMSA 2012), pp. 29 - 34, 2012
© 2015 Vincenzo Piuri
References (12)

Biometric Privacy







M. Upmanyu, A. Namboodiri, K. Srinathan, and C. Jawahar, "Blind authentication: A secure cryptobiometric verification protocol", Information Forensics and Security, IEEE Transactions on, vol. 5, no.
2, pp. 255 –268, June2010.
J. Golic, M. Baltatu, “Entropy analysis and new constructions of biometric key generation systems,”
IEEE Transactions on Information Theory, vol. 54, no. 5,pp. 2026–2040, 2008.
A. K. Jain, K. Nandakumar, A. Nagar, "Biometric template security", EURASIP Journal on Advances Signal
Processing, vol. 2008, pp. 1-17, 2008.
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from
biometrics and other noisy data", SIAM Journal on Computing, vol. 38, no. 1, pp. 97–139, 2008.
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates",
IEEE Transaction on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561–572, 2007.
A. Teoh, A. Goh, and D. Ngo, "Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs", IEEE Transactions on Pattern Analysis and Machine
Intelligence, vol. 28, no. 12, pp. 1892 –1901, December 2006.
M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti,
V. Piuri, F. Scotti, and A. Piva, "A Privacy-compliant Fingerprint Recognition System Based on
Homomorphic Encryption and Fingercode Templates", in 2010 Fourth IEEE International Conference on
Biometrics: Theory Applications and Systems (BTAS), pp. 1-7, September 27-29, 2010.
© 2015 Vincenzo Piuri
References (13)

Biometric Privacy (cont’s)







M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti,
V. Piuri, F. Scotti, and A. Piva, "Privacy-Preserving Fingercode Authentication", in Proceedings of the 12th
ACM workshop on Multimedia and security, ACM, New York, NY, USA, pp. 231 - 240, September 9-10,
2010.
T. Bianchi, R. Donida Labati, V. Piuri, A. Piva, F. Scotti, S. Turchi, "Implementing FingerCode-Based
Identity Matching in the Encrypted Domain", in 2010 IEEE Workshop on Biometric Measurements and
Systems for Security and Medical Applications (BIOMS), pp. 15 - 21, September 9, 2010.
S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti, "Privacy in Biometrics", in Biometrics: Theory,
Methods, and Applications, Wiley-IEEE Press, 2008.
S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti, "Privacy-Aware Biometrics: Design and
Implementation of a Multimodal Verification System", in Annual Computer Security Applications Conference,
2008. ACSAC 2008, pp. 130-139, December, 2008
S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti, "A Multi-Biometric Verification System for the
Privacy Protection of Iris Templates", in International Workshop on Computational Intelligence in Security for
Information Systems, October 23-24, 2008
S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Cimato, and F. Scotti, "A Biometric Verification System
Addressing Privacy Concerns", in Computational Intelligence and Security, 2007 International Conference on, pp.
594-598, December 2007.
S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, and F. Scotti, "Personal identification and verification
using multimodal biometric data", in Proceedings of the 2006 IEEE International Conference on Computational
Intelligence for Homeland Security and Personal Safety, pp. 41-45, October, 2006
© 2015 Vincenzo Piuri
Download