Skip to main content
Erschienen in:
Buchtitelbild

2019 | OriginalPaper | Buchkapitel

1. Introduction to Selfie Biometrics

verfasst von : Ajita Rattani, Reza Derakhshani, Arun Ross

Erschienen in: Selfie Biometrics

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Traditional password-based solutions are being predominantly replaced by biometric technology for mobile user authentication. Since the inception of smartphones, smartphone cameras have made substantial progress in image resolution, aperture size, and sensor size. These advances facilitate the use of selfie biometrics such as the self-acquired face, fingerphoto, and ocular region for mobile user authentication. This chapter introduces the topic of selfie biometrics to the readers. Overview of the methods for different selfie biometrics modalities is provided. Liveness detection, soft-biometrics prediction, and cloud-based infrastructure for selfie biometrics are also discussed. Open issues and research directions are included to provide the path forward. The overall aim is to improve the understanding and advance the state-of-the-art in this field.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jain A, Ross A, Nandakumar A (2011) Introduction to biometrics. Springer Publishers Jain A, Ross A, Nandakumar A (2011) Introduction to biometrics. Springer Publishers
2.
Zurück zum Zitat Han S, Park H, Cho D, Park D, Lee S (2007) Face recognition based on near-infrared light using mobile phone. In: Beliczynski B, Dzielinski A, Iwanowski M, Ribeiro B (eds) Adaptive and natural computing algorithms, vol 4432. Lecture Notes in Computer Science. Springer, Heidelberg, pp 440–448CrossRef Han S, Park H, Cho D, Park D, Lee S (2007) Face recognition based on near-infrared light using mobile phone. In: Beliczynski B, Dzielinski A, Iwanowski M, Ribeiro B (eds) Adaptive and natural computing algorithms, vol 4432. Lecture Notes in Computer Science. Springer, Heidelberg, pp 440–448CrossRef
3.
Zurück zum Zitat Jung S, Chung Y, Yoo J, Moon K (2008) Real-time face verification for mobile platforms. In: Bebis G, Boyle R, Parvin B, Koracin D, Remagnino P, Porikli F, Peters J, Klosowski J, Arns L, Chun Y, Rhyne T, Monroe L (eds) Advances in visual computing, vol 5359. Lecture Notes in Computer Science. Springer, Heidelberg, pp 823–832CrossRef Jung S, Chung Y, Yoo J, Moon K (2008) Real-time face verification for mobile platforms. In: Bebis G, Boyle R, Parvin B, Koracin D, Remagnino P, Porikli F, Peters J, Klosowski J, Arns L, Chun Y, Rhyne T, Monroe L (eds) Advances in visual computing, vol 5359. Lecture Notes in Computer Science. Springer, Heidelberg, pp 823–832CrossRef
4.
Zurück zum Zitat Tao Q, Veldhuis R (2006) Biometric authentication for a mobile personal device. In: Third annual international conference on mobile and ubiquitous systems: networking services, San Jose, CA, pp 1–3 Tao Q, Veldhuis R (2006) Biometric authentication for a mobile personal device. In: Third annual international conference on mobile and ubiquitous systems: networking services, San Jose, CA, pp 1–3
5.
Zurück zum Zitat Walgamage T, Farook C (2014) A real-time hybrid approach for mobile face recognition. In: International conference on intelligent systems, modelling and simulation, pp 1–6 Walgamage T, Farook C (2014) A real-time hybrid approach for mobile face recognition. In: International conference on intelligent systems, modelling and simulation, pp 1–6
6.
Zurück zum Zitat Rattani A, Derakhshani R (2017) Ocular biometrics in the visible spectrum: a survey. Image Vis Comput 59:1–16CrossRef Rattani A, Derakhshani R (2017) Ocular biometrics in the visible spectrum: a survey. Image Vis Comput 59:1–16CrossRef
7.
Zurück zum Zitat Rattani A, Derakhshani R (2017) On fine-tuning convolutional neural networks for smartphone based ocular recognition. In: IEEE international joint conference on biometrics (IJCB), pp 762–767 Rattani A, Derakhshani R (2017) On fine-tuning convolutional neural networks for smartphone based ocular recognition. In: IEEE international joint conference on biometrics (IJCB), pp 762–767
8.
Zurück zum Zitat Sankaran A, Malhotra A, Mittal A, Vatsa M, Singh R (2015) On smartphone camera based fingerphoto authentication. In: IEEE 7th international conference on biometrics theory, applications and systems, pp 1–7 Sankaran A, Malhotra A, Mittal A, Vatsa M, Singh R (2015) On smartphone camera based fingerphoto authentication. In: IEEE 7th international conference on biometrics theory, applications and systems, pp 1–7
9.
Zurück zum Zitat Maiorana E, Campisi P, González-Carballo N, Neri A (2011) Keystroke dynamics authentication for mobile phones. In: ACM symposium on applied computing, New York, NY, USA, pp 21–26 Maiorana E, Campisi P, González-Carballo N, Neri A (2011) Keystroke dynamics authentication for mobile phones. In: ACM symposium on applied computing, New York, NY, USA, pp 21–26
10.
Zurück zum Zitat Derawi MO, Nickel C, Bours P, Busch C (2010) Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Sixth international conference on intelligent information hiding and multimedia signal processing, pp 306–311 Derawi MO, Nickel C, Bours P, Busch C (2010) Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Sixth international conference on intelligent information hiding and multimedia signal processing, pp 306–311
11.
Zurück zum Zitat Tao Q, Veldhuis R (2010) Biometric authentication system on mobile personal devices. IEEE Trans Instrum Measur 59(4):763–773CrossRef Tao Q, Veldhuis R (2010) Biometric authentication system on mobile personal devices. IEEE Trans Instrum Measur 59(4):763–773CrossRef
12.
Zurück zum Zitat Chen B, Shen J, Sun H (2012) A fast face recognition system on mobile phone. In: International conference on systems and informatics, Yantai, pp 1783–1786 Chen B, Shen J, Sun H (2012) A fast face recognition system on mobile phone. In: International conference on systems and informatics, Yantai, pp 1783–1786
13.
Zurück zum Zitat Yang J, Chen X, Kunz W (2002) A PDA-based face recognition system. In: Sixth IEEE workshop on applications of computer vision, pp 19–23 Yang J, Chen X, Kunz W (2002) A PDA-based face recognition system. In: Sixth IEEE workshop on applications of computer vision, pp 19–23
14.
Zurück zum Zitat Doukas C, Maglogiannis I (2010) A fast mobile face recognition system for android os based on eigenfaces decomposition. In: Papadopoulos H, Andreou A, Bramer M (eds) Artificial intelligence applications and innovations, vol 339. IFIP Advances in Information and Communication Technology. Springer, Heidelberg, pp 295–302CrossRef Doukas C, Maglogiannis I (2010) A fast mobile face recognition system for android os based on eigenfaces decomposition. In: Papadopoulos H, Andreou A, Bramer M (eds) Artificial intelligence applications and innovations, vol 339. IFIP Advances in Information and Communication Technology. Springer, Heidelberg, pp 295–302CrossRef
15.
Zurück zum Zitat Kumar S, Singh P, Kumar V (2010) Architecture for mobile based face detection/recognition. Int J Comput Sci Eng 2(3):889–894 Kumar S, Singh P, Kumar V (2010) Architecture for mobile based face detection/recognition. Int J Comput Sci Eng 2(3):889–894
16.
Zurück zum Zitat Yu H (2010) Face recognition for mobile phone using eigenfaces. University of Michigan, Tech. rep Yu H (2010) Face recognition for mobile phone using eigenfaces. University of Michigan, Tech. rep
17.
Zurück zum Zitat Findling RD, Mayrhofer R (2012) Towards face unlock: on the difficulty of reliably detecting faces on mobile phones. In: International conference on advances in mobile computing and multimedia, Bali, Indonesia, pp 275–280 Findling RD, Mayrhofer R (2012) Towards face unlock: on the difficulty of reliably detecting faces on mobile phones. In: International conference on advances in mobile computing and multimedia, Bali, Indonesia, pp 275–280
18.
Zurück zum Zitat Kremic E, Subasi A, Hajdarevic K (2012) Face recognition implementation for client server mobile architecture. In: International conference on information technology interfaces, Dubrovnik, Croatia, pp 435–440 Kremic E, Subasi A, Hajdarevic K (2012) Face recognition implementation for client server mobile architecture. In: International conference on information technology interfaces, Dubrovnik, Croatia, pp 435–440
19.
Zurück zum Zitat Mukherjee S, Chen Z, Gangopadhyay A, Russell A (2008) A secure face recognition system for mobile-devices without the need of decryption. In: Workshop on secure knowledge management, pp 11–16 Mukherjee S, Chen Z, Gangopadhyay A, Russell A (2008) A secure face recognition system for mobile-devices without the need of decryption. In: Workshop on secure knowledge management, pp 11–16
20.
Zurück zum Zitat Schneider C, Esau N, Kleinjohann L, Kleinjohann B (2006) Feature based face localization and recognition on mobile devices. In: International conference on control, automation, robotics and vision, Singapore, pp 1–6 Schneider C, Esau N, Kleinjohann L, Kleinjohann B (2006) Feature based face localization and recognition on mobile devices. In: International conference on control, automation, robotics and vision, Singapore, pp 1–6
22.
Zurück zum Zitat Gnther M, Costa-Pazo A, Ding C, Boutellaa E, Chiachia G, Zhang H, de Assis Angeloni M, Truc V, Khoury E, Vazquez-Fernandez E, Tao D, Bengherabi M, Cox D, Kiranyaz S, de Freitas Pereira T, Ganec Gros J, Argones-Ra E, Pinto N, Gabbouj M, Simes F, Dobriek S, Gonzlez-Jimnez D, Rocha A, Neto MU, Pavei N, Falco A, Violato R, Marcel S (2013) The 2013 face recognition evaluation in mobile environment. In: International conference on biometrics, Madrid, pp 1–7 Gnther M, Costa-Pazo A, Ding C, Boutellaa E, Chiachia G, Zhang H, de Assis Angeloni M, Truc V, Khoury E, Vazquez-Fernandez E, Tao D, Bengherabi M, Cox D, Kiranyaz S, de Freitas Pereira T, Ganec Gros J, Argones-Ra E, Pinto N, Gabbouj M, Simes F, Dobriek S, Gonzlez-Jimnez D, Rocha A, Neto MU, Pavei N, Falco A, Violato R, Marcel S (2013) The 2013 face recognition evaluation in mobile environment. In: International conference on biometrics, Madrid, pp 1–7
23.
Zurück zum Zitat Das A, Pal U, Ballester M, Blumenstein M (2014) A new efficient and adaptive sclera recognition system. In: IEEE symposium on computational intelligence in biometrics and identity management (CIBIM), pp 1–8 Das A, Pal U, Ballester M, Blumenstein M (2014) A new efficient and adaptive sclera recognition system. In: IEEE symposium on computational intelligence in biometrics and identity management (CIBIM), pp 1–8
24.
Zurück zum Zitat Park U, Ross A, Jain A (2009) Periocular biometrics in the visible spectrum: a feasibility study. In: IEEE 3rd international conference on biometrics: theory applications and systems, pp 1–6 Park U, Ross A, Jain A (2009) Periocular biometrics in the visible spectrum: a feasibility study. In: IEEE 3rd international conference on biometrics: theory applications and systems, pp 1–6
25.
Zurück zum Zitat Marsico MD, Nappi M, Proena H (2017) Results from miche ii mobile iris challenge evaluation ii, Pattern Recogn Lett 91(C):3–10 Marsico MD, Nappi M, Proena H (2017) Results from miche ii mobile iris challenge evaluation ii, Pattern Recogn Lett 91(C):3–10
27.
Zurück zum Zitat Rattani A, Derakhshani R, Saripalle SK, Gottemukkula V (2016) ICIP 2016 competition on mobile ocular biometric recognition. In: IEEE International Conference on image processing, challenge session on mobile ocular biometric recognition, Phoenix, AZ, pp 320–324 Rattani A, Derakhshani R, Saripalle SK, Gottemukkula V (2016) ICIP 2016 competition on mobile ocular biometric recognition. In: IEEE International Conference on image processing, challenge session on mobile ocular biometric recognition, Phoenix, AZ, pp 320–324
28.
Zurück zum Zitat Stein C, Nickel C, Busch C (2012) Fingerphoto recognition with smartphone cameras. In: BIOSIG—Proceedings of the international conference of biometrics special interest group, pp 1–12 Stein C, Nickel C, Busch C (2012) Fingerphoto recognition with smartphone cameras. In: BIOSIG—Proceedings of the international conference of biometrics special interest group, pp 1–12
29.
Zurück zum Zitat Carney LA, Kane J, Mather JF, Othman A, Simpson AG, Tavanai A, Tyson RA, Xue Y (2017) A multi-finger touchless fingerprinting system: mobile fingerphoto and legacy database interoperability. In: Proceedings of the 2017 4th international conference on biomedical and bioinformatics engineering, ICBBE 2017, New York, NY, USA, pp 139–147 Carney LA, Kane J, Mather JF, Othman A, Simpson AG, Tavanai A, Tyson RA, Xue Y (2017) A multi-finger touchless fingerprinting system: mobile fingerphoto and legacy database interoperability. In: Proceedings of the 2017 4th international conference on biomedical and bioinformatics engineering, ICBBE 2017, New York, NY, USA, pp 139–147
30.
Zurück zum Zitat Chingovska I, dos Anjos AR, Marcel S (2014) Biometrics evaluation under spoofing attacks. IEEE Trans Inf Forensics Secur 9(12):2264–2276CrossRef Chingovska I, dos Anjos AR, Marcel S (2014) Biometrics evaluation under spoofing attacks. IEEE Trans Inf Forensics Secur 9(12):2264–2276CrossRef
31.
Zurück zum Zitat Liu S, Yang B, Yuen P, Zhao G (2016) A 3D mask face anti-spoofing database with real world variations. In: The IEEE conference on computer vision and pattern recognition (CVPR) workshops, pp 1551–1557 Liu S, Yang B, Yuen P, Zhao G (2016) A 3D mask face anti-spoofing database with real world variations. In: The IEEE conference on computer vision and pattern recognition (CVPR) workshops, pp 1551–1557
32.
Zurück zum Zitat Patel K, Han H, Jain AK (2016) Cross-database face antispoofing with robust feature representation. In: You Z, Zhou J, Wang Y, Sun Z, Shan S, Zheng W, Feng J, Zhao Q (eds) Biometric recognition. Springer International Publishing, Cham, pp 611–619CrossRef Patel K, Han H, Jain AK (2016) Cross-database face antispoofing with robust feature representation. In: You Z, Zhou J, Wang Y, Sun Z, Shan S, Zheng W, Feng J, Zhao Q (eds) Biometric recognition. Springer International Publishing, Cham, pp 611–619CrossRef
33.
Zurück zum Zitat Siddiqui IA, Bharadwaj S, Dhamecha TI, Agarwal A, Vatsa M, Singh R, Ratha N (2016) Face anti-spoofing with multifeature videolet aggregation. In: International conference on pattern recognition, Cancun, pp 1035–1040 Siddiqui IA, Bharadwaj S, Dhamecha TI, Agarwal A, Vatsa M, Singh R, Ratha N (2016) Face anti-spoofing with multifeature videolet aggregation. In: International conference on pattern recognition, Cancun, pp 1035–1040
34.
Zurück zum Zitat Tirunagari S, Poh N, Windridge D, Iorliam A, Suki N, Ho ATS (2015) Detection of face spoofing using visual dynamics. IEEE Trans Inf Forensics Secur 10(4):762–777CrossRef Tirunagari S, Poh N, Windridge D, Iorliam A, Suki N, Ho ATS (2015) Detection of face spoofing using visual dynamics. IEEE Trans Inf Forensics Secur 10(4):762–777CrossRef
35.
Zurück zum Zitat Pinto A, Pedrini H, Schwartz WR, Rocha A (2015) Face spoofing detection through visual codebooks of spectral temporal cubes. IEEE Trans Image Process 24(12):4726–4740MathSciNetCrossRef Pinto A, Pedrini H, Schwartz WR, Rocha A (2015) Face spoofing detection through visual codebooks of spectral temporal cubes. IEEE Trans Image Process 24(12):4726–4740MathSciNetCrossRef
36.
Zurück zum Zitat Akhtar Z, Michelon C, Foresti GL (2014) Liveness detection for biometric authentication in mobile applications. In: 2014 international Carnahan conference on security technology, Rome, pp 1–6 Akhtar Z, Michelon C, Foresti GL (2014) Liveness detection for biometric authentication in mobile applications. In: 2014 international Carnahan conference on security technology, Rome, pp 1–6
37.
Zurück zum Zitat Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: International conference of biometrics special interest group (BIOSIG), Germany, pp 1–7 Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: International conference of biometrics special interest group (BIOSIG), Germany, pp 1–7
38.
Zurück zum Zitat Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: a mobile face presentation attack database with real-world variations. In: IEEE international conference on automatic face gesture recognition, Washington, DC, pp 612–618 Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: a mobile face presentation attack database with real-world variations. In: IEEE international conference on automatic face gesture recognition, Washington, DC, pp 612–618
39.
Zurück zum Zitat Costa-Pazo A, Bhattacharjee S, Vazquez-Fernandez E, Marcel S (2016) The replay-mobile face presentation-attack database. In: International conference of the biometrics special interest group, Germany, pp 1–7 Costa-Pazo A, Bhattacharjee S, Vazquez-Fernandez E, Marcel S (2016) The replay-mobile face presentation-attack database. In: International conference of the biometrics special interest group, Germany, pp 1–7
40.
Zurück zum Zitat Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. IEEE Trans Inf Forensics Secur 11(8):1818–1830CrossRef Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. IEEE Trans Inf Forensics Secur 11(8):1818–1830CrossRef
41.
Zurück zum Zitat Arashloo SR, Kittler J, Christmas W (2015) Face spoofing detection based on multiple descriptor fusion using multiscale dynamic binarized statistical image features. IEEE Trans Inf Forensics Secur 10(11):2396–2407CrossRef Arashloo SR, Kittler J, Christmas W (2015) Face spoofing detection based on multiple descriptor fusion using multiscale dynamic binarized statistical image features. IEEE Trans Inf Forensics Secur 10(11):2396–2407CrossRef
42.
Zurück zum Zitat Gan J, Li S, Zhai Y, Liu C (2017) 3D convolutional neural network based on face anti-spoofing. In: International conference on multimedia and image processing, Wuhan, pp 1–5 Gan J, Li S, Zhai Y, Liu C (2017) 3D convolutional neural network based on face anti-spoofing. In: International conference on multimedia and image processing, Wuhan, pp 1–5
43.
Zurück zum Zitat Atoum Y, Liu Y, Jourabloo A, Liu X (2017) Face anti-spoofing using patch and depth-based CNNs. In: IEEE international joint conference on biometrics, Denver, CO, pp 319–328 Atoum Y, Liu Y, Jourabloo A, Liu X (2017) Face anti-spoofing using patch and depth-based CNNs. In: IEEE international joint conference on biometrics, Denver, CO, pp 319–328
44.
Zurück zum Zitat Pereira F, Komulainen J, Anjos A, Martino MD, Hadid A, Pietikäinen M, Marcel S (2014) Face liveness detection using dynamic texture. EURASIP J Image Video Process 2014(1):2CrossRef Pereira F, Komulainen J, Anjos A, Martino MD, Hadid A, Pietikäinen M, Marcel S (2014) Face liveness detection using dynamic texture. EURASIP J Image Video Process 2014(1):2CrossRef
45.
Zurück zum Zitat Patel K, Han H, Jain AK, Ott G (2015) Live face video vs. spoof face video: use of moire patterns to detect replay video attacks. In: International conference on biometrics, Phuket, pp 98–105 Patel K, Han H, Jain AK, Ott G (2015) Live face video vs. spoof face video: use of moire patterns to detect replay video attacks. In: International conference on biometrics, Phuket, pp 98–105
46.
Zurück zum Zitat Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761CrossRef Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761CrossRef
47.
Zurück zum Zitat Galbally J, Marcel S (2014) Face anti-spoofing based on general image quality assessment. In: International conference on pattern recognition, Stockholm, pp 1173–1178 Galbally J, Marcel S (2014) Face anti-spoofing based on general image quality assessment. In: International conference on pattern recognition, Stockholm, pp 1173–1178
48.
Zurück zum Zitat Boulkenafet Z, Komulainen J, Akhtar Z, Benlamoudi A, Samai D, Bekhouche SE, Ouafi A, Dornaika F, Taleb-Ahmed A, Qin L, Peng F, Zhang LB, Long M, Bhilare S, Kanhangad V, Costa-Pazo A, Vazquez-Fernandez E, Perez-Cabo D, Moreira-Perez JJ, Gonzalez-Jimenez D, Mohammadi A, Bhattacharjee S, Marcel S, Volkova S, Tang Y, Abe N, Li L, Feng X, Xia Z, Jiang X, Liu S, Shao R, Yuen PC, Almeida WR, Andalo F, Padilha R, Bertocco G, Dias W, Wainer J, Torres R, Rocha A, Angeloni MA, Folego G, Godoy A, Hadid A (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. In: IEEE international joint conference on biometrics, Denver, CO, pp 688–696 Boulkenafet Z, Komulainen J, Akhtar Z, Benlamoudi A, Samai D, Bekhouche SE, Ouafi A, Dornaika F, Taleb-Ahmed A, Qin L, Peng F, Zhang LB, Long M, Bhilare S, Kanhangad V, Costa-Pazo A, Vazquez-Fernandez E, Perez-Cabo D, Moreira-Perez JJ, Gonzalez-Jimenez D, Mohammadi A, Bhattacharjee S, Marcel S, Volkova S, Tang Y, Abe N, Li L, Feng X, Xia Z, Jiang X, Liu S, Shao R, Yuen PC, Almeida WR, Andalo F, Padilha R, Bertocco G, Dias W, Wainer J, Torres R, Rocha A, Angeloni MA, Folego G, Godoy A, Hadid A (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. In: IEEE international joint conference on biometrics, Denver, CO, pp 688–696
49.
Zurück zum Zitat Taneja A, Tayal A, Malhorta A, Sankaran A, Vatsa M, Singh R (2016) Fingerphoto spoofing in mobile devices: a preliminary study. In: IEEE international conference on biometrics theory, applications and systems, pp 1–7 Taneja A, Tayal A, Malhorta A, Sankaran A, Vatsa M, Singh R (2016) Fingerphoto spoofing in mobile devices: a preliminary study. In: IEEE international conference on biometrics theory, applications and systems, pp 1–7
50.
Zurück zum Zitat Stein C, Bouatou V, Busch C (2013) Video-based fingerphoto recognition with anti-spoofing techniques with smartphone cameras. In: International conference of the BIOSIG Special Interest Group (BIOSIG), pp 1–12 Stein C, Bouatou V, Busch C (2013) Video-based fingerphoto recognition with anti-spoofing techniques with smartphone cameras. In: International conference of the BIOSIG Special Interest Group (BIOSIG), pp 1–12
51.
Zurück zum Zitat Fujio M, Kaga Y, MurakamiT, Ohki T, Takahashi K (2018) Face/fingerphoto spoof detection under noisy conditions by using deep convolutional neural network. In: International joint conference on biomedical engineering systems and technologies, pp 54–62 Fujio M, Kaga Y, MurakamiT, Ohki T, Takahashi K (2018) Face/fingerphoto spoof detection under noisy conditions by using deep convolutional neural network. In: International joint conference on biomedical engineering systems and technologies, pp 54–62
52.
Zurück zum Zitat Sequeira AF, Murari J, Cardoso JS (2014) Iris liveness detection methods in the mobile biometrics scenario. In: International joint conference on neural networks (IJCNN), pp 3002–3008 Sequeira AF, Murari J, Cardoso JS (2014) Iris liveness detection methods in the mobile biometrics scenario. In: International joint conference on neural networks (IJCNN), pp 3002–3008
53.
Zurück zum Zitat Sequeira AF, Oliveira HP, Monteiro JC, Monteiro JP, Cardoso JS (2014) Mobilive 2014 mobile iris liveness detection competition. In: IEEE international joint conference on biometrics, pp 1–6 Sequeira AF, Oliveira HP, Monteiro JC, Monteiro JP, Cardoso JS (2014) Mobilive 2014 mobile iris liveness detection competition. In: IEEE international joint conference on biometrics, pp 1–6
54.
Zurück zum Zitat Talreja V, Ferrett T, Valenti MC, Ross A (2018) Biometrics-as-a-service: a framework to promote innovative biometric recognition in the cloud. In: IEEE international conference on consumer electronics (ICCE), pp 1–6 Talreja V, Ferrett T, Valenti MC, Ross A (2018) Biometrics-as-a-service: a framework to promote innovative biometric recognition in the cloud. In: IEEE international conference on consumer electronics (ICCE), pp 1–6
55.
Zurück zum Zitat Mell P, Granc T (2011) The nist definition of cloud computing. Tech. rep, Recommendations of the National Institute of Standards and Technology Mell P, Granc T (2011) The nist definition of cloud computing. Tech. rep, Recommendations of the National Institute of Standards and Technology
56.
Zurück zum Zitat Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, Song Z (2010) Authentication in the clouds: a framework and its application to mobile users. In: ACM cloud computing security workshop (CCSW), New York, NY, USA, pp 1–6 Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, Song Z (2010) Authentication in the clouds: a framework and its application to mobile users. In: ACM cloud computing security workshop (CCSW), New York, NY, USA, pp 1–6
57.
Zurück zum Zitat Barra S, Casanova A, Narducci F, Ricciardi S (2015) Ubiquitous iris recognition by means of mobile devices. Pattern Recogn Lett 57:66–73CrossRef Barra S, Casanova A, Narducci F, Ricciardi S (2015) Ubiquitous iris recognition by means of mobile devices. Pattern Recogn Lett 57:66–73CrossRef
58.
Zurück zum Zitat Patel VM, Chellappa R, Chandra D, Barbello B (2016) Continuous user authentication on mobile devices: recent progress and remaining challenges. IEEE Signal Process Mag 33(4):49–61CrossRef Patel VM, Chellappa R, Chandra D, Barbello B (2016) Continuous user authentication on mobile devices: recent progress and remaining challenges. IEEE Signal Process Mag 33(4):49–61CrossRef
59.
Zurück zum Zitat Rattani A, Reddy N, Derakhshani R (2017) Gender prediction from mobile ocular images: a feasibility study. In: IEEE international symposium on technologies for homeland security, pp 1–6 Rattani A, Reddy N, Derakhshani R (2017) Gender prediction from mobile ocular images: a feasibility study. In: IEEE international symposium on technologies for homeland security, pp 1–6
60.
Zurück zum Zitat Buriro A, Akhtar Z, Crispo B, Frari FD (2016) Age, gender and operating-hand estimation on smart mobile devices. In: International conference of the biometrics special interest group, pp 1–5 Buriro A, Akhtar Z, Crispo B, Frari FD (2016) Age, gender and operating-hand estimation on smart mobile devices. In: International conference of the biometrics special interest group, pp 1–5
61.
Zurück zum Zitat Rattani A, Reddy N, Derakhshani R (2018) Convolutional neural networks for gender prediction from smartphone-based ocular images. IET Biometrics 7:423–430CrossRef Rattani A, Reddy N, Derakhshani R (2018) Convolutional neural networks for gender prediction from smartphone-based ocular images. IET Biometrics 7:423–430CrossRef
64.
Zurück zum Zitat Mohammad AS, Rattani A, Derakhshani R (2018) Short-term user authentication using eyebrows biometric for smartphone devices. In: IEEE computer science and electronic engineering conference, pp 1 – 6 Mohammad AS, Rattani A, Derakhshani R (2018) Short-term user authentication using eyebrows biometric for smartphone devices. In: IEEE computer science and electronic engineering conference, pp 1 – 6
65.
Zurück zum Zitat Nguyen H, Sai R, Li Z, Derakhshan R (2018) User re-identification using clothing information for smartphones. In: IEEE international symposium on technologies for homeland security (HST), pp 1–5 Nguyen H, Sai R, Li Z, Derakhshan R (2018) User re-identification using clothing information for smartphones. In: IEEE international symposium on technologies for homeland security (HST), pp 1–5
66.
Zurück zum Zitat Samangouei P, Patel VM, Chellappa R (2015) Attribute-based continuous user authentication on mobile devices. In: IEEE 7th international conference on biometrics theory, applications and systems (BTAS), pp 1–8 Samangouei P, Patel VM, Chellappa R (2015) Attribute-based continuous user authentication on mobile devices. In: IEEE 7th international conference on biometrics theory, applications and systems (BTAS), pp 1–8
67.
Zurück zum Zitat Rattani A, Scheirer WJ, Ross A (2015) Open set fingerprint spoof detection across novel fabrication materials. IEEE Trans Inf Forensics Secur 10(11):2447–2460CrossRef Rattani A, Scheirer WJ, Ross A (2015) Open set fingerprint spoof detection across novel fabrication materials. IEEE Trans Inf Forensics Secur 10(11):2447–2460CrossRef
68.
Zurück zum Zitat Schroff F, Kalenichenko D, Philbin J. FaceNet: a unified embedding for face recognition and clustering, CoRR abs/1503.03832 Schroff F, Kalenichenko D, Philbin J. FaceNet: a unified embedding for face recognition and clustering, CoRR abs/1503.03832
69.
Zurück zum Zitat Wen Y, Zhang K, Li Z, Qiao Y (2016) A discriminative feature learning approach for deep face recognition. In: Leibe B, Matas J, Sebe N, Welling M (eds) European conference on computer vision. Cham, pp 499–515 Wen Y, Zhang K, Li Z, Qiao Y (2016) A discriminative feature learning approach for deep face recognition. In: Leibe B, Matas J, Sebe N, Welling M (eds) European conference on computer vision. Cham, pp 499–515
Metadaten
Titel
Introduction to Selfie Biometrics
verfasst von
Ajita Rattani
Reza Derakhshani
Arun Ross
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-26972-2_1

Premium Partner