Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Engineering

Visible-To-Thermal Transfer Learning For Facial Landmark Detection, Domenick D. Poster, Shuowen Hu, Nathan J. Short, Benjamin S. Riggan, Nasser M. Nasrabadi Apr 2021

Visible-To-Thermal Transfer Learning For Facial Landmark Detection, Domenick D. Poster, Shuowen Hu, Nathan J. Short, Benjamin S. Riggan, Nasser M. Nasrabadi

Department of Electrical and Computer Engineering: Faculty Publications

There has been increasing interest in face recognition in the thermal infrared spectrum. A critical step in this process is face landmark detection. However, landmark detection in the thermal spectrum presents a unique set of challenges compared to in the visible spectrum: inherently lower spatial resolution due to longer wavelength, differences in phenomenology, and limited availability of labeled thermal face imagery for algorithm development and training. Thermal infrared imaging does have the advantage of being able to passively acquire facial heat signatures without the need for active or ambient illumination in low light and nighttime environments. In such scenarios, thermal …


A Bibliometric Analysis Of Face Anti Spoofing, Swapnil Ramesh Shinde, Shraddha Phansalkar, Sudeep D. Thepade Oct 2020

A Bibliometric Analysis Of Face Anti Spoofing, Swapnil Ramesh Shinde, Shraddha Phansalkar, Sudeep D. Thepade

Library Philosophy and Practice (e-journal)

Face Recognition Systems are used widely in all areas as a medium of authentication, the ease of implementation and accuracy provides it with a broader scope. The face recognition systems are vulnerable to some extent and are attacked by performing different types of attacks using a variety of techniques. The term used to describe the measures taken to prevent these types of attacks is known as face anti spoofing. Research has been carried on since decades to design systems that are robust against these attacks. The focus of the work in this paper is to explore the area of face …


A Novel Privacy Preserving User Identification Approach For Network Traffic, Nathan Clarke, Fudong Li, Steven Furnell Sep 2017

A Novel Privacy Preserving User Identification Approach For Network Traffic, Nathan Clarke, Fudong Li, Steven Furnell

Research outputs 2014 to 2021

The prevalence of the Internet and cloud-based applications, alongside the technological evolution of smartphones, tablets and smartwatches, has resulted in users relying upon network connectivity more than ever before. This results in an increasingly voluminous footprint with respect to the network traffic that is created as a consequence. For network forensic examiners, this traffic represents a vital source of independent evidence in an environment where anti-forensics is increasingly challenging the validity of computer-based forensics. Performing network forensics today largely focuses upon an analysis based upon the Internet Protocol (IP) address – as this is the only characteristic available. More typically, …


Lightweight Three-Factor Authentication And Key Agreement Protocol For Internet-Integrated Wireless Sensor Networks, Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He Mar 2017

Lightweight Three-Factor Authentication And Key Agreement Protocol For Internet-Integrated Wireless Sensor Networks, Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He

Information Science Faculty Publications

Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of this integration, it also brings new threats, such as the exposure of sensor nodes to attacks originating from the Internet. In this context, lightweight authentication and key agreement protocols must be in place to enable end-to-end secure communication. Recently, Amin et al. proposed a three-factor mutual authentication protocol for WSNs. However, we identified several flaws in their protocol. We found that their …


Proactive Biometric-Enabled Forensic Imprinting, Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven M. Furnell Jan 2016

Proactive Biometric-Enabled Forensic Imprinting, Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven M. Furnell

Research outputs 2014 to 2021

Threats to enterprises have become widespread in the last decade. A major source of such threats originates from insiders who have legitimate access to the organization's internal systems and databases. Therefore, preventing or responding to such incidents has become a challenging task. Digital forensics has grown into a de-facto standard in the examination of electronic evidence; however, a key barrier is often being able to associate an individual to the stolen data. Stolen credentials and the Trojan defense are two commonly cited arguments used. This paper proposes a model that can more inextricably links the use of information (e.g. images, …


Coupled Auto-Associative Neural Networks For Heterogeneous Face Recognition, Benjamin S. Riggan, Christopher Reale, Nasser M. Nasrabadi Sep 2015

Coupled Auto-Associative Neural Networks For Heterogeneous Face Recognition, Benjamin S. Riggan, Christopher Reale, Nasser M. Nasrabadi

Department of Electrical and Computer Engineering: Faculty Publications

Several models have been previously suggested for learning correlated representations between source and target modalities. In this paper, we propose a novel coupled autoassociative neural network for learning a target-to-source image representation for heterogenous face recognition. This coupled network is unique, because a cross-modal transformation is learned by forcing the hidden units (latent features) of two neural networks to be as similar as possible, while simultaneously preserving information from the input. The effectiveness of this model is demonstrated using multiple existing heterogeneous face recognition databases. Moreover, the empirical results show that the learned image representation—common latent features—by the coupled auto-associative …


Research Project On Biometrics, Alia Hassan, Ingy Nazif Jan 2013

Research Project On Biometrics, Alia Hassan, Ingy Nazif

Papers, Posters, and Presentations

As technology evolves, and our personal details become more and more susceptible to hacking, one of the most important concerns we now have is being sure our phones, computers, networks are secure. We have begun to move on from simple password and motion patterns onto using facial recognition, and other forms of biometric recognition technology to protect our private information. The iPhone 5 for example, now presents features to identify uniquely the owner of the device, in the form of fingerprint detection. So we decided to focus on the topic biometrics for this research paper, which is basically how to …


Biometric Alternatives To Captcha: Exploring Accessible Interface Options, Anita Foley Jan 2012

Biometric Alternatives To Captcha: Exploring Accessible Interface Options, Anita Foley

Dissertations

In the computing domain the relationship between accessibility and security is a complex and evolving one; accessibility attempts to ensure that as wide a range of individuals as possible are granted access to systems, whereas security attempts to restrict access only to individuals who are entitled to access those systems. A key security concern is to determine whether or not the system is being accessed by a software agent or a real human being, and a number of approaches have been developed to determine the answer to this question. This issue has been discussed throughout the history of computer science …


Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle Jan 2010

Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle

Conference papers

The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed …