提出了一种生成软糖手指的新方法。描述了一个中型的假指纹数据库,并在其上评估了两个不同的指纹验证系统。实验中考虑了三种不同的情况,即:使用真实的指纹注册和测试,用假指纹进行注册和测试,以及带有真实指纹的注册,并用假指纹进行测试。给出了光学和热扫描传感器的结果。两种系统都被证明容易受到直接攻击。
translated by 谷歌翻译
提出了基于质量度量的LIVISE检测的新指纹参数化。新颖的功能集用于完整的LIVESTECTY检测系统中,并在Livdet竞争的开发集中进行了测试,其中包括具有三个不同光学传感器的4,500多个真实图像和假图像。提出的解决方案证明对多传感器方案是可靠的,并且总体率是正确分类的样品的93%。此外,提出的LIVISE检测方法比先前研究的技术具有额外的优势,即仅需要一个图像从手指决定是真实还是假货。
translated by 谷歌翻译
虹膜识别技术在过去几十年中吸引了日益增长的兴趣,我们目睹了从研究实验室迁移到现实世界应用的迁移。该技术的部署提出了关于与这些系统相关的主要漏洞和安全威胁的问题。在这些威胁中,介绍攻击突出了一些最相关和研究的。呈现攻击可以被定义为人类特征或工件的呈现直接到试图干扰其正常操作的生物识别系统的捕获设备。在虹膜的情况下,这些攻击包括使用真正的虹膜以及具有不同级别的复杂程度的工件,例如照片或视频。本章介绍了已开发的虹膜演示攻击检测(PAD)方法,以降低呈现攻击所带来的风险。首先,我们总结了最受欢迎的攻击类型,包括地址的主要挑战。其次,我们提出了一个介绍攻击检测方法的分类,作为这一非常活跃的研究区域的简要介绍。最后,我们讨论了这些方法根据实际应用中最重要的情况识别虹膜识别系统。
translated by 谷歌翻译
本章的主要范围是作为面部介绍攻击检测的介绍,包括过去几年的关键资源和领域的进步。下一页呈现了面部识别系统可以面对的不同演示攻击,其中攻击者向传感器提供给传感器,主要是相机,呈现攻击仪器(PAI),这通常是照片,视频或掩码,试图冒充真正的用户。首先,我们介绍了面部识别的现状,部署水平及其挑战。此外,我们介绍了面部识别系统可能暴露的漏洞和可能的攻击,表明呈现攻击检测方法的高度重要性。我们审核不同类型的演示攻击方法,从更简单到更复杂,在哪个情况下它们可能是有效的。然后,我们总结了最受欢迎的演示文稿攻击检测方法来处理这些攻击。最后,我们介绍了研究界使用的公共数据集,以探索面部生物识别性的脆弱性,以呈现攻击,并对已知的PAI制定有效的对策。
translated by 谷歌翻译
展示了在欧洲生物安全卓越网络框架内设计和获取的新的多模态生物识别数据库。它由600多个个人在三种情况下在三种情况下获得:1)在互联网上,2)在带台式PC的办公环境中,以及3)在室内/室外环境中,具有移动便携式硬件。这三种方案包括音频/视频数据的共同部分。此外,已使用桌面PC和移动便携式硬件获取签名和指纹数据。此外,使用桌面PC在第二个方案中获取手和虹膜数据。收购事项已于11名欧洲机构进行。 BioSecure多模式数据库(BMDB)的其他功能有:两个采集会话,在某些方式的几种传感器,均衡性别和年龄分布,多式化现实情景,每种方式,跨欧洲多样性,人口统计数据的可用性,以及人口统计数据的可用性与其他多模式数据库的兼容性。 BMDB的新型收购条件允许我们对单币或多模式生物识别系统进行新的具有挑战性的研究和评估,如最近的生物安全的多模式评估活动。还给出了该活动的描述,包括来自新数据库的单个模式的基线结果。预计数据库将通过2008年通过生物安全协会进行研究目的
translated by 谷歌翻译
提出了一种使用基于质量相关特征的新颖的指纹参数化的新的基于软件的活性检测方法。该系统在高度挑战的数据库上测试,该数据库包括超过10,500个实际和假图像,其中包含不同技术的五个传感器,并在材料和程序中覆盖各种直接攻击情景,然后遵循生成胶状手指。所提出的解决方案证明对多场景数据集具有强大,并呈现90%正确分类的样本的总速率。此外,所呈现的活性检测方法具有上述从手指中仅需要一个图像的先前研究的技术的额外优点,以决定它是真实还是假的。最后一个特征提供了具有非常有价值的功能的方法,因为它使其更不具有侵入性,更多的用户友好,更快,并降低其实现成本。
translated by 谷歌翻译
We report on experiments for the fingerprint modality conducted during the First BioSecure Residential Workshop. Two reference systems for fingerprint verification have been tested together with two additional non-reference systems. These systems follow different approaches of fingerprint processing and are discussed in detail. Fusion experiments I volving different combinations of the available systems are presented. The experimental results show that the best recognition strategy involves both minutiae-based and correlation-based measurements. Regarding the fusion experiments, the best relative improvement is obtained when fusing systems that are based on heterogeneous strategies for feature extraction and/or matching. The best combinations of two/three/four systems always include the best individual systems whereas the best verification performance is obtained when combining all the available systems.
translated by 谷歌翻译
Reinforcement Learning has emerged as a strong alternative to solve optimization tasks efficiently. The use of these algorithms highly depends on the feedback signals provided by the environment in charge of informing about how good (or bad) the decisions made by the learned agent are. Unfortunately, in a broad range of problems the design of a good reward function is not trivial, so in such cases sparse reward signals are instead adopted. The lack of a dense reward function poses new challenges, mostly related to exploration. Imitation Learning has addressed those problems by leveraging demonstrations from experts. In the absence of an expert (and its subsequent demonstrations), an option is to prioritize well-suited exploration experiences collected by the agent in order to bootstrap its learning process with good exploration behaviors. However, this solution highly depends on the ability of the agent to discover such trajectories in the early stages of its learning process. To tackle this issue, we propose to combine imitation learning with intrinsic motivation, two of the most widely adopted techniques to address problems with sparse reward. In this work intrinsic motivation is used to encourage the agent to explore the environment based on its curiosity, whereas imitation learning allows repeating the most promising experiences to accelerate the learning process. This combination is shown to yield an improved performance and better generalization in procedurally-generated environments, outperforming previously reported self-imitation learning methods and achieving equal or better sample efficiency with respect to intrinsic motivation in isolation.
translated by 谷歌翻译
Purpose: This study aims to explore training strategies to improve convolutional neural network-based image-to-image registration for abdominal imaging. Methods: Different training strategies, loss functions, and transfer learning schemes were considered. Furthermore, an augmentation layer which generates artificial training image pairs on-the-fly was proposed, in addition to a loss layer that enables dynamic loss weighting. Results: Guiding registration using segmentations in the training step proved beneficial for deep-learning-based image registration. Finetuning the pretrained model from the brain MRI dataset to the abdominal CT dataset further improved performance on the latter application, removing the need for a large dataset to yield satisfactory performance. Dynamic loss weighting also marginally improved performance, all without impacting inference runtime. Conclusion: Using simple concepts, we improved the performance of a commonly used deep image registration architecture, VoxelMorph. In future work, our framework, DDMR, should be validated on different datasets to further assess its value.
translated by 谷歌翻译
Reinforcement learning (RL) is a promising solution for autonomous vehicles to deal with complex and uncertain traffic environments. The RL training process is however expensive, unsafe, and time consuming. Algorithms are often developed first in simulation and then transferred to the real world, leading to a common sim2real challenge that performance decreases when the domain changes. In this paper, we propose a transfer learning process to minimize the gap by exploiting digital twin technology, relying on a systematic and simultaneous combination of virtual and real world data coming from vehicle dynamics and traffic scenarios. The model and testing environment are evolved from model, hardware to vehicle in the loop and proving ground testing stages, similar to standard development cycle in automotive industry. In particular, we also integrate other transfer learning techniques such as domain randomization and adaptation in each stage. The simulation and real data are gradually incorporated to accelerate and make the transfer learning process more robust. The proposed RL methodology is applied to develop a path following steering controller for an autonomous electric vehicle. After learning and deploying the real-time RL control policy on the vehicle, we obtained satisfactory and safe control performance already from the first deployment, demonstrating the advantages of the proposed digital twin based learning process.
translated by 谷歌翻译