dc.contributor.author | Drozdowski, Pawel | |
dc.contributor.author | Rathgeb, Christian | |
dc.contributor.author | Busch, Christoph | |
dc.date.accessioned | 2019-06-07T12:10:34Z | |
dc.date.available | 2019-06-07T12:10:34Z | |
dc.date.created | 2019-05-09T13:16:58Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2019 | nb_NO |
dc.identifier.isbn | 978-1-4799-8131-1 | |
dc.identifier.uri | http://hdl.handle.net/11250/2600348 | |
dc.description.abstract | In recent years, morphing of facial images has arisen as an important attack vector on biometric systems. Detection of morphed images has proven challenging for automated systems and human experts alike. Likewise, in recent years, the importance of efficient (fast) biometric identification has been emphasised by the rapid rise and growth of large-scale biometric systems around the world. In this paper, the aforementioned, hitherto unrelated, topics within the biometrics domain are combined: the properties of morphed images are exploited for the purpose of improving the transaction times of a biometric identification system. Specifically, morphs of two or more samples are used in the pre-selection step of a two-stage biometric identification system. In a proof-of-concept experimental evaluation using two state-of-the-art open-source facial recognition frameworks it is shown, that the proposed system achieves hit rates comparable to that of an exhaustive search-based baseline, while significantly reducing the penetration rate (and thus the computational workload) associated with the biometric identification transactions. | nb_NO |
dc.description.abstract | Turning a vulnerability into an asset: Accelerating Facial Identification with Morphing | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | nb_NO |
dc.relation.ispartof | 2019 IEEE International Conference on Acoustics, Speech, and Signal Processing | |
dc.title | Turning a vulnerability into an asset: Accelerating Facial Identification with Morphing | nb_NO |
dc.type | Chapter | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 2582-2586 | nb_NO |
dc.identifier.doi | 10.1109/ICASSP.2019.8683326 | |
dc.identifier.cristin | 1696638 | |
dc.description.localcode | © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |