21th International Conference of the Biometrics Special Interest Group (BIOSIG 2022)

Termin: 14.-16.09.2022
Dauer: 10:00-17:00
Ort: Fraunhofer IGD
Fraunhoferstraße 5
64283 Darmstadt
Diese Veranstaltung wird als Weiterbildung im Sinne der T.I.S.P.-Rezertifizierung anerkannt

Programm

Wednesday, September 14
16:30
Claudia Prediger
CAST e.V.
Claudia Prediger
BIOSIG welcome reception (Starting time 16:30) and EAB Award ceremony (Starting time 19:30)

Thursday, September 15


BIOSIG - MAIN CONFERENCE -

10:00
Marta Gomez-Barrero
Hochschule Ansbach
Marta Gomez-Barrero
BIOSIG Conference Opening
Chair: Marta Gomez-Barrero
10:10
Rosario Arjona
Universidad de Sevilla
Rosario Arjona
A Quantum-Resistant Face Template Protection Scheme using Kyber and Saber Public Key Encryption Algorithms

This work proposes the use of lattice-based Kyber and Saber public key encryption algorithms (from the NIST post-quantum cryptography standardization process) together with homomorphic encryption in a face recognition system. Experimental results show that the recognition performance is preserved, achieving small sizes of protected templates and keys, and short execution times. The parameter sets considered achieve security levels of 128, 192 and 256 bits.

10:30
Simon Kirchgasser
University of Salzburg
Simon Kirchgasser
Template Protection: On the need to adapt the current Unlinkability Evaluation Protocol

y the performed template protection experiments using not only randomly selected keys, but also considering the best of insufficient (improper) keys, it was revealed that the standard unlinkability evaluation protocol is influenced by the key selection. Hence, it is recommended to use both mentioned key types to analyse template protection methods. This means that the protocol has to be fine-tuned, in so far that for the best of the worst key choice (which then has to be used in the protocol) unlinkability still needs to be given.

10:50
Hidetsugu Uchida
Fujitsu Ltd.
Hidetsugu Uchida
DeDiM: De-identification using a diffusion model

We propose a novel de-identification using diffusion model (DeDiM). The DeDiM manipulates shapes of face parts to make its be difficult to judge the identity by face recognition systems. The experiments in the study shows that DeDiM is more robust against unknown recognition models than adversarial example-based de-identification methods.

11:10 Break
Chair: Christian Rathgeb
11:40
Laurent Colbois
Idiap Research Institute
Laurent Colbois
On the detection of morphing attacks generated by GANs

New types of morphing attacks exploiting Generative Adversarial Networks have been developed in the past few years. We establish an overview of the detection capability of those “deep” morphs, using both linear classifiers based on handcrafted features, and deep neural networks. A pretrained generic GAN-image detector performs best, but some more interpretable solutions, based on Local Binary Patterns features, also showcase interesting properties, in particular in a score-fusion setting.

12:00
Pedro C. Neto
FEUP & INESC TEC
Pedro C. Neto
OrthoMAD: Morphing Attack Detection Through Orthogonal Identity Disentanglement

Differently from other attacks, Face Morphing attacks rely on the merge of two identities. We propose a new disentanglement approach based on a novel regularization term based on the orthogonality of two identity vectors.

12:20 Lunch Break
Chair: Andreas Uhl
13:20
Uwe Seidel
Bundeskriminalamt (BKA)
Uwe Seidel
KEYNOTE
Recent developments and challenges for the identity (document) ecosystem

Identity and especially identity documents are subject to a rapid technological change: the introduction of biometrics and the megatrend of digitization lead to new convenient solutions and facilitating use cases such as Digital Travel Credentials, but will the security of the application and data keep abreast with the new possibilities?

14:05
Alexander Unnervik
Idiap Research Institute
Alexander Unnervik
An anomaly detection approach for backdoored neural networks: face recognition as a case study

Backdoor attacks allow an attacker to embed functionality jeopardizing proper behavior of any algorithm, machine learning or not. This hidden functionality can remain inactive for normal use of the algorithm until activated by the attacker. Given how stealthy backdoor attacks are, consequences of these backdoors could be disastrous if such networks were to be deployed for applications as critical as border or access control.

In this paper, we propose a novel backdoored network detection method based on the principle of anomaly detection, involving access to the clean part of the training data and the trained network. We highlight its promising potential when considering various triggers, locations and identity pairs, without the need to make any assumptions on the nature of the backdoor and its setup. We test our method on a novel dataset of backdoored networks and report detectability results with perfect scores.

14:25
Muku Akasaka
Shizuoka University
Muku Akasaka
Model-Free Template Reconstruction Attack with Feature Converter

State-of-the-art template reconstruction attacks assume that an adversary has access part or whole of the functionality of a target model. However, in a practical scenario, rigid protection of the target system prevents them from gaining knowledge of the target model. In this paper, we propose a novel template reconstruction attack method utilizing a feature converter. The feature converter enables an adversary to reconstruct an image from a corresponding compromised template about the target model. The proposed method was evaluated with qualitative and quantitative measures. We achieved the Successful Attack Rate(SAR) of 0.90 on without knowledge Labeled Faces in the Wild Dataset(LFW) with compromised templates of only 1280 identities.

14:45 Break
Chair: Raymond Veldhuis
15:15
Olaf Henniger
Fraunhofer IGD
Olaf Henniger
Utility-based performance evaluation of biometric sample quality assessment algorithms

The quality score of a biometric sample is expected to predict the sample’s utility, but a universally valid definition of utility is missing. A harmonized definition of utility would be useful to facilitate the comparison of biometric sample quality assessment algorithms. This paper generalizes the utility of a biometric sample as normalized difference between the means of non-mated and mated comparison scores with respect to this sample.

15:35
Simon Kirchgasser
Univeristy of Salzburg
Simon Kirchgasser
Fingervein Sample Image Quality Assessment using Natural Scene Statistics

Natural Scene Statistics as used in non-reference image quality measures are proposed to be used as fingervein sample quality indicators. While NIQE and BRISQUE trained on common images with usual distortions do not work well in the fingervein quality context, their variants being trained on high and low quality fingervein sample data behave as expected from a biometric quality estimator. Experiments involve two publicly available fingervein datasets and two distinct template representations. The proposed (trained) quality measures are compared to a set of classical fingervein quality metrics which underlines their highly promising behaviour.

15:55
Tim Rohwedder
Hochschule Darmstadt
Tim Rohwedder
Analysis of Minutiae Quality for Improved Workload Reduction in Fingerprint Identification

The workload of biometric identification in large fingerprint databases poses a challenging problem. Some of the state-of-the art approaches rely on triangles of minutia points generated by Delaunay triangulation, which are then used for indexing. In this paper, we investigate how quality estimation at the minutia level can improve the performance of such algorithms and hence the system workload.

16:15 Break
CHAIR: Naser Damer and Christian Rathgeb
16:45
Poster Session

1

Marcel Grimmer

NTNU

Time flies by: Analyzing the Performance Impact of Ageing in Face Recognition with Synthetic Data

2

Daigo Muramatsu

Osaka University

Incorporation of Extra Pseudo Labels for CNN-based Gait Recognition

3

M Charity

New York University

Diversity and Novelty MasterPrints: Generating Multiple DeepMasterPrints for Increased User Coverage

4

Sebastian Bunda

University of Twente

Sub-byte quantization of Mobile Face Recognition Convolutional Neural Networks

5

Md Atikur Rahman

Tottori University

Person Authentication Using Brain Waves Evoked by Individual-related and Imperceptible Visual Stimuli

6

Aeddon Berti

West Virginia University

Investigating the impact of demographic factors on contactless fingerprint interoperability

7

Lydia Belkadi

WKU Leuven

Processing Information Extracted from the Human Body: Measurements of Biological and Behavioural Signals as a Unifying Link

8

Muriel van der Spek

University of Twente

Understanding and Modelling the Vascular Biometric Imaging Procedure

10

Georg Wimmer

University of Salzburg

Cross-Sensor Finger Vein Recogition

11

Iain Martin

University of Dundee

Verification Failures: Assessing the Sample Quality of Fingerprints collected in an African Election Setting

12

A.G. Ramakrishnan

Indian Institute of Science

EEG-based biometrics: phase-locking value from gamma band performs well across heterogeneous datasets

13

Chiara Galdi

EURECOM

GAIT3: An Event-based, RGB and Thermal Gait Database

14

Torsten Schlett

Hochschule Darmstadt

Evaluating Face Image Quality Score Fusion for Modern Deep Learning Models

15

Lazaro Janier Gonzalez-Soler

Hochschule Darmstadt

When Biometric Systems become Presentation Attack Detectors

16

Fadi Boutros

Fraunhofer IGD

Low-resolution Iris Recognition via Knowledge Transformation

18:30 Barbecue and get together
Friday, September 16, Chair: Kiran Raja
09:00
Luisa Verdoliva
University Federico II of Naples, Italy
Luisa Verdoliva
KEYNOTE
Deepfake detection: state-of-the-art and future directions

In recent years there have been astonishing advances in AI-based synthetic media generation. Thanks to deep learning-based approaches it is now possible to generate data with a high level of realism. While this opens up new opportunities for the entertainment industry, it simultaneously undermines the reliability of multimedia content and supports the spread of false or manipulated information on the Internet. This is especially true for human faces, allowing to easily create new identities or change only some specific attributes of a real face in a video, so-called deepfakes. In this context, it is important to develop automated tools to detect manipulated media in a reliable and timely manner. This talk will describe the most reliable deep learning-based approaches for detecting deepfakes, with a focus on those that enable domain generalization. The results will be presented on challenging datasets with reference to realistic scenarios, such as the dissemination of manipulated images and videos on social networks. Finally, new possible directions will be outlined.

09:45
Bilgesu Sumer
KU Leuven
Bilgesu Sumer
When do the images of biometric characteristics qualify as special categories of data under the GDPR?: a systemic approach to biometric data processing

This conference paper scrutinizes the difference between biometric data’s technical (pursuant to ISO standards) and legal meaning under the GDPR. After analyzing the European Data Protection Board’s (EDPB) guidance and the recent Clearview AI decisions, the paper interprets the GDPR in two ways to address the confusing status quo:

  • dissecting the objective nature of the data under the sensitive data regime of the GDPR and the case law of the Court of Justice (CJEU) ;
  • inquiring about the meaning of the purpose of the controller in the GDPR and how it can help us understand the margins of the sensitive data regime.
10:05
Catherine Jasserand
KU Leuven
Catherine Jasserand
Research, the GDPR, and Mega Biometric Training Datasets: Opening the Pandora Box

The paper addresses a legal issue relevant to the research community in EU: whether researchers can constitute large-scale biometric training datasets under the EU data protection rules (GDPR). It clarifies a misconception concerning the re-usability of online accessible data and discusses the challenges faced by researchers to find an adequate legal basis to scrape a vast amount of personal data for research purposes.

10:25 Break
Chair: Massimiliano Todisco
10:55
Christian Rathgeb
Secunet
Christian Rathgeb
Fusion of Face Demorphing and Deep Face Representations for Differential Morphing Attack Detection

Algorithm fusion is frequently employed to improve the accuracy of pattern recognition tasks. This particularly applies to biometrics including attack detection mechanisms. In this work, we apply a fusion of two differential morphing attack detection methods, i.e. Demorphing and Deep Face Representations. Experiments are performed in a cross-database scenario using high-quality face morphs along with realistic live captures. Obtained results reveal that a weighted sum-based score-level fusion of Demorphing and Deep Face Representations improves the morphing attack detection accuracy. With the proposed fusion, a detection equal error rate of 4.9\% is achieved, compared to detection equal error rates of 5.6\% and 5.8\% of the best individual morphing attack detection methods, respectively.

11:15
Una Kelly
University of Twente
Una Kelly
Worst-Case Morphs: a Theoretical and a Practical Approach

Face Recognition (FR) systems have been shown to be vulnerable to morphing attacks. We examine exactly how challenging morphs can become. By showing a worst-case construction in the embedding space of an FR system and using a mapping from embedding space back to image space we generate images that show that this theoretical upper bound can be approximated if the FR system is known. The resulting morphs can also succesfully fool unseen FR systems and are useful for exploring and understanding the weaknesses of FR systems. Our method contributes to gaining more insight into the vulnerability of FR systems.

11:35 Break
Chair: Christoph Busch
11:55
Bernhard Kohn
AIT Austrian Institute of Technology GmbH
Bernhard Kohn
Case study of the acquisition of contactless fingerprints in a real police setting

We present a case study of a comprehensive comparison of real fingerprint data captured by national police officers in real-world situations. The goal of this study is to compare data captured with a typical contact-based fingerprint device with data captured with a new contactless device. In addition, feedback from end users (national police officers) regarding the collection process is reported.

12:15
Yoshinori Koda
NEC Corporation
Yoshinori Koda
Fundamental Study of Neonate Fingerprint Recognition Using Fingerprint Classification

UNICEF reported many of 2.4 million cases of deaths in the first 28 days of life were preventable through appropriate vaccination. It apparently needs an assistance of identification methods for newborn. This paper develops a fingerprint scanner having 2,674 ppi high resolution CMOS sensor working with physical designs especially crafted for the purpose of acquiring newborn fingerprint by merging the feedback from users at research site about former prototypes and proposes a neonate fingerprint identification method based on fingerprint classification.

12:35 Lunch Break
Chair: Naser Damer
13:35
Md Mahedi Hasan
West Virginia University
Md Mahedi Hasan
Deep Coupled GAN-Based Score-Level Fusion for Multi-Finger Contact to Contactless Fingerprint Matching

Interoperability between contact to contactless images in fingerprint matching is a key factor in the success of contactless fingerprinting devices, which have recently witnessed an increasing demand for biometric authentication due to several limitations of the contact-based fingerprinting system. In this paper, to improve interoperability, we project both the fingerphoto and the fingerprint into a common embedding subspace using a coupled generative learning framework (CpGAN) to find the hidden relationship between the feature embedding. Comparisons of the proposed CpGAN model with state-of-the-art methods and two top-performing commercial off-the-shelf matchers on three challenging datasets verify the effectiveness of our method.

13:55
Dominik Söllinger
University of Salzburg
Dominik Söllinger
Can point-cloud based neural networks learn fingerprint variability?

Subject- and environmental-specific variations affect the fingerprint recognition process. We propose the use of genuine comparison scores as a measure of variability and demonstrate that the publicly available PLUS-MSL-FP dataset indeed exhibits large natural variations. Furthermore, we showcase that point-cloud (set) based neural networks are promising candidates for processing fingerprint imagery.

14:15
Tugce Arican
University of Twente
Tugce Arican
Fingers Crossed: An Analysis of Cross-Device Finger Vein Recognition

Finger veins are one of the emerging biometric traits in biometric recognition. Despite the growing literature on finger vein recognition, little interest has been shown in the impact of acquisition devices on recognition performance. This work discuss the challenges introduced by different finger vein acquisition devices, and investigates possibility of a cross-device finger vein recognition.

14:35 Break
Chair: Marta Gomez-Barrero
15:05
Claude Bauzou
Idemia
Claude Bauzou
KEYNOTE
Document Validation and Fraud Detection in iMARS

This talk will explain how, in the context of the iMARS research funded project, a group of industrial actors are working together to find innovative solutions to detect ID document fraud using mobile platforms.

The presentation will explain the work carried out, and the different approaches considered, and will also consider the benefit for industrial partners to work together in the same project.

15:50
Marta Gomez-Barrero
Hochschule Ansbach
Awards/ Closing Remarks

Informationen und Kontakt

Wenn Sie noch Fragen haben, wenden Sie sich bitte an:

Moderation

Marta Gomez-Barrero
Hochschule Ansbach
E-Mail:

Administration

Simone Zimmermann
CAST e.V.
Tel.: +49 6151 869-230
E-Mail:

Reiseplanung

Start


CAST e.V.
Rheinstraße 75
64295 Darmstadt

Kommende CAST Veranstaltungen

ID:SMART Workshop 2025 19.-20.02.2025
Recht und IT-Sicherheit 06.03.2025
hot topic "Kryptoagilität" 15.05.2025
MedCAST 25 - Sicheres digitales Gesundheitswesen 22.05.2025
24th International Conference of the Biometrics Special Interest Group (BIOSIG 2025) 25.-26.09.2025
Quantentechnologie und Quantencomputer-resistente Sicherheit 23.10.2025