Introduction To Synthesis in Biometrics PDF
Introduction To Synthesis in Biometrics PDF
net/publication/228742122
CITATIONS READS
9 418
5 authors, including:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Patrick Shen-Pei Wang on 01 April 2016.
Chapter 1
Contents
1.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.1.1. Basic Paradigm of Synthetic Biometric Data . . . . . . . . . . . . 7
1.2. Synthetic Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.2.1. Image Synthesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.2.2. Physics-Based Modeling . . . . . . . . . . . . . . . . . . . . . . . 10
5
April 2, 2007 14:42 World Scientific Review Volume - 9in x 6in Main˙WorldSc˙IPR˙SAB
1.1. Introduction
iris images, “wet” fingerprints etc.) Synthetic data can also be used for
“spoofing” biometric devices with “forged” data. We argue that synthetic
biometric data can:
Improve the performance of existing identification systems. This can be
accomplished by using automatically generated biometric data to cre-
ate statistically meaningful sets of data variations (appearance, envi-
ronmental, and others, including “forgeries”).
Improve the robustness of biometric devices by modeling the strategies and
tactics of forgery.
Improve the efficiency of training systems by providing the user-in-training
with the tools to model various conditions of biometric data acquisi-
tion (non-contact such as passive surveillance, contact, cooperative,
non-cooperative), environmental factors (light, smog, temperature),
appearance (aging, camouflage).
Therefore, synthetic biometric data plays an important role in enhancing
the security of biometric systems. Traditionally, security strategies (security
levels, tools, etc.) are designed based on assumptions about a hypothetical
robber or forger. Properly created artificial biometric data provides for
detailed and controlled modeling of a wide range of training skills, strategies
and tactics, thus enabling a better approach to enhancing the system’s
performance. This study aims to develop new approaches for the detection
of attacks on security systems. Figure 1.1 introduces the basic configuration
for inverse biometric problems.
BEHAVIORAL
PHYSICAL
MODELS
VISIBAL BAND
IR BAND
ACOUSTIC BAND
DISTANCE
NEAR DISTANCE
CONTACT
MODELS
KNOWLEDGE
DOMAIN
SIGNAL DOMAIN
REPRESENTATION
NON-
CORRELATED
CORRELATED
DATA
Fig. 1.1. Basic tools for inverse biometric problems include facilities for generation of
synthetic data and its analysis.
Image synthesis
Fig. 1.4. Synthetic fingerprint assembly (growth) using a Gabor filter with polar trans-
form.
(a) (b)
Fig. 1.5. Synthetic 3D (a) and 2D (b) fingerprint design based on physical modeling
(reprinted with permission from Elsevier).
Fig. 1.6. In-class scenario: the original signature (left) and the synthetic one (right),
courtesy of Prof. D. Popel, Baker University.
Fig. 1.8. Synthetic collarette topology modelled by Bezier curves and a randomly gen-
erated curve.
Fig. 1.10. Parameter extraction in gait model: shape estimation (a), period estimation
(b), adaptive model (c), and deformable countours (d), courtesy of Prof. M. Nixon,
University of Southampton, UK.
Fig. 1.11. Modeling of facial accessories, aging, drunk, and a badly lit faces.
Texture Texture
Ear Ear
Nose Nose
Lips Lips
Mouth Mouth
Brow Brow
Eye Eye
primitive composition
LIBRARY OF MASTER
PRIMITIVES MODEL SYNTHESIZER
Fig. 1.12. Partitioning of the face into regions in the model for facial analysis and
synthesis.
a Visual pattern analysis and classification can be carried out in 100 msec and involves a
minimum of 10 synaptic stages from the retina to the temporal lobe (see, for example,
Rolls ET. Brain mechanisms for invariant visual recognition and learning, Behavioural
Processes, 33:113–138, 1994.
April 2, 2007 14:42 World Scientific Review Volume - 9in x 6in Main˙WorldSc˙IPR˙SAB
Irritation; Unexpectedness;
Mouth = Aggression; Brows = Astonishment;
Discontent. Embarrassment.
Decision making
Psychological information
art-style of the caricaturist. The reason why the art-style of the caricaturist
is of interest for image analysis, synthesis, and especially facial expression
recognition and synthesis is as follows [19,28]. Facial caricatures incorporate
the most important facial features and a significant set of distorted features.
Some original features (coordinates, corresponding shapes, and the total
number of features) in a caricature are very sensitive to variation, however
the rest of the features can be distorted significantly. Restoration of a facial
image based on caricatures is an inverse problem itself [29]. Various benefits
are expected in identification, recognition and matching techniques, if the
art-style of the caricaturist can be understood.
1.4.1. Testing
The commercially available synthetic fingerprints generator [6,7] has been
used, in particular, in the Fingerprint Verification Test competition
April 2, 2007 14:42 World Scientific Review Volume - 9in x 6in Main˙WorldSc˙IPR˙SAB
Tested person
(a) Synthetic biometric information can be used not only for improving the
characteristics of biometric devices and systems, but also can be used
by forgers to discover new strategies of attack.
(b) Synthetic biometric information can be used for generating multiple
copies of original biometric information.
1.7. Conclusion
Acknowledgment
The authors acknowledge the help and suggestions of Dr. M. S. Nixon and
Dr. D. J. Hurley.
Bibliography
cial Caricaturing. In Proc. 3rd IEEE Int. Conf. 3D Digital Imaging and
Modeling, Canada, pp. 385–392.
20. Guyon, I. (1996). Handwriting synthesis from handwritten glyphs, Proc. 5th
Int. Workshop Frontiers of Handwriting Recognition, Colchester, UK, pp.
309-312.
21. Hurley, D. J. (2006). Synthetic ear biometric based on force field modeling,
Private Communication, University of Southampton, UK.
22. Hurley, D. J. Nixon, M. S. and Carter, J. N. (2005). Force field feature
extraction for ear biometrics, Computer Vision and Image Understanding,
98, pp. 491–512.
23. Hollerbach, J. M. (1981). An oscilation theory of handwriting, Biological
Cybernetics, 39, pp. 139–156.
24. Jain, A. K. Ross, A. and Prabhakar, S. (2004). An introduction to biometric
recognition, IEEE Trans. Circuit and Systems for Video Technology, 14, 1,
pp. 4–20.
25. Koch, R. (1993). Dynamic 3-D scene analysis through synthesis feedback
control, IEEE Trans. Pattern Analysis and Machine Intelligence, 15, 6, pp.
556–568.
26. Kuecken, M. U. and Newell, A. C. (2004). A model for fingerprint formation,
Europhysics Letters 68, 1, pp. 141–146.
27. Lefohn, A., Budge, B., Shirley, P., Caruso, R. and Reinhard, E. (2003).
An ocularists approach to human iris synthesis, Computer Graphics and
Applications, IEEE Magazine, 23, 6, pp. 70–75.
28. Luo W. C., Liu, P. C. and Ouhyoung, M. (2002). Exaggeration of Facial
Features in Caricaturing, Proc. Int. Computer Symposium, China.
29. Luo, Y., Gavrilova, M. L., Sousa, M. C., Pivovarov, J. and Yanushkevich, S.
(2005). Morphing Facial Expressions from Artistic Drawings, In T. Simos,
G. Maroulis, Eds., Advanced in Computational Methods in Sciences and
Engineering. Lecture Series on Computer and Computational Sciences, Brill
Academic Publishers, The Netherlands, Vol. 4, pp. 1507–1511.
30. Ma, Y., Schuckers, M. and Cukic, B. (2005). Guidelines for appropriate use
of simulated data for bio-authentication research, Proc. 4th IEEE Workshop
Automatic Identification Advanced Technologies, Buffalo, New York, pp.
251–256.
31. Manolakis, D. and Shaw, G. (2002). Detection algorithms for hyperspectral
imaging applications, IEEE Signal Processing Magazin, 19, pp. 29–43.
32. Mansfield, A. and Wayman, J. (2002). Best Practice Standards for Testing
and Reporting on Biometric Device Performance, National Physical Labo-
ratory of UK.
33. Matsumoto, H., Yamada, K. and Hoshino, S. (2002). Impact of Artificial
Gummy Fingers on Fingerprint Systems, In Proc. SPIE, Optical Security
and Counterfeit Deterrence Techniques IV, 4677, pp. 275–289.
34. Moriyama, T., Xiao, J., Kanade, T. and Cohn, J. F. (2004). Meticulously
Detailed Eye Model and its Application to Analysis of Facial Image. Proc.
IEEE Int. Conf. Systems, Man, and Cybernetics, pp. 629–634.
35. Nixon, M. S., Carter, J. N., Grant, M. G., Gordon, L. and Hayfron-Acquah,
April 2, 2007 14:42 World Scientific Review Volume - 9in x 6in Main˙WorldSc˙IPR˙SAB
Approach, Kluwer.
53. Stoica, A. (1999). Learning Eye-Arm Coordination Using Neural and Fuzzy
Neural Techniques, In H. N. Teodorescu, A. Kandel, and L. Jain, Eds., Soft
Computing in Human-Related Sciences, pp. 31–61, CRC Press, Boca Raton,
FL.
54. Sugimoto, Y., Yoshitomi, Y. and Tomita, S. (2000). A Method for detecting
transitions of emotional states using a thermal facial image based on a
synthesis of facial expressions, Robotics and Autonomous Systems, 31, pp.
147–160.
55. Sumi, K., Liu, C. and Matsuyama, T. (2006). Study on Synthetic Face
Database for Performance Evaluation, Proc. Int. Conf. Biometric Authen-
tication, pp. 598–604, LNCS-3832, Springer.
56. Tilton, C. J. (2001). An Emergin Biometric Standards, IEEE Computer
Magazine. Special Issue on Biometrics, 1, pp. 130–135.
57. Wang, J., Wu, C., Xu, Y. Q., Shum, H. Y. and Li, L. (2002). Learning
Based Cursive Handwriting Synthesis, Proc. 8th Int. Workshop Frontiers in
Handwriting Recognition, Ontario, Canada, pp. 157–162.
58. Yamamoto, E, Nakamura, S. and Shikano, K. (1998). Lip Movement Synthe-
sis From Speech Based on Hidden Markov Models, Speech Communication
26, 1,2, pp. 105–115
59. Yanushkevich, S. N., Stoica, A. Srihari, S. N., Shmerko, V. P. and Gavrilova,
M. L. (2004). Simulation of Biometric Information: The New Generation
of Biometric Systems, In Proc. Int. Workshop Modeling and Simulation in
Biometric Technology, Calgary, Canada, pp. 87–98.
60. Yanushkevich, S. N., Stoica, A., Shmerko, V. P. and Popel, D. V. (2005).
Biometric Inverse Problems, Taylor & Francis/CRC Press, Boca Raton, FL.
61. Yanushkevich, S. N., Stoica, A. and Shmerko, V. P. (2006). Fundamentals
of Biometric-Based Training System Design, this issue.