Virtual U: Defeating Face Liveness Detection by Building Virtual Models From Your Public Photos
|
|
- Cynthia Henry
- 6 years ago
- Views:
Transcription
1 Virtual U: Defeating Face Liveness Detection by Building Virtual Models From Your Public Photos Yi Xu, True Price, Jan-Michael Frahm, and Fabian Monrose Department of Computer Science, University of North Carolina at Chapel Hill USENIX Security August 11, 2016
2 Face Authentication: Convenient Security image source
3 Evolution of Adversarial Models Attack: Still-image Spoofing
4 Evolution of Adversarial Models Attack: Still-image Spoofing Defense: Liveness Detection
5 Evolution of Adversarial Models Attack: Still-image Spoofing Defense: Liveness Detection Attack:Video Spoofing
6 Evolution of Adversarial Models Attack: Still-image Spoofing Defense: Liveness Detection Attack:Video Spoofing Defense: Motion Consistency
7 Evolution of Adversarial Models Attack: Still-image Spoofing Defense: Liveness Detection Attack:Video Spoofing Defense: Motion Consistency Attack: 3D-Printed Masks
8 Virtual U: A New Attack We introduce a new VR-based attack on face authentication systems solely using publicly available photos of the victim
9 Virtual U: A New Attack ❶ ❷ ❸ ❹ Input Web Photos Landmark Extraction 3D Model Reconstruction Image-based Texturing Gaze Correction ❻ ❺ Viewing with Virtual Reality System Expression Animation
10 Leveraging Social Media
11 Landmark Extraction
12 Identity Variation (e.g., thin-to-heavyset) 3D Face Model Expression Variation (e.g., frowning-to-smiling)
13 Identity Variation (e.g., thin-to-heavyset) 3D Face Model A exp S = S + A id α id + A exp α exp S Expression Variation (e.g., frowning-to-smiling) A id
14 3D Face Model S = S + A id α id + A exp α exp S Reprojection
15 3D Face Model S = S + A id α id + A exp α exp Pose α id α exp
16 3D Face Model S = S + A id α id + A exp α exp Pose α id α exp
17 3D Face Model S = S + A id α id + A exp α exp Pose α id α exp
18 3D Face Model
19 3D Face Model
20 3D Face Model
21 3D Face Model Pose α exp Pose α exp α id Pose α exp Pose α exp
22 Multi-Image Modeling Single image Multiple images
23 Texturing Direct Texturing 2D Poisson Editing
24 Texturing Direct Texturing 2D Poisson Editing 3D Poisson Editing
25 Gaze Correction R R B B G G
26 Gaze Correction
27 Virtual U: A New Attack ❶ ❷ ❸ ❹ Input Web Photos Landmark Extraction 3D Model Reconstruction Image-based Texturing Gaze Correction ❻ ❺ Viewing with Virtual Reality System Expression Animation
28 Expression Animation S = S + A id α id + A exp α exp Smiling Laughing Blinking Raising Eyebrows
29 VR Display Printed Marker VR System Authentication Device
30 VR Display
31 * * Experiments KeyLemon Mobius TrueKey Interaction-based liveness detection Motion-based liveness detection BioID 1U Texture-based liveness detection
32 Experiments 20 participants Aged 24 to males, 6 females Various ethnicities Two tests Indoor photo of the subject in the same environment as registration Publicly accessible photos Anywhere from 3 to 27 photos per person Low-, medium-, and high-quality Potentially strong changes in appearance over time
33 Experiments Indoor Image (Single frontal image) Online Avg. # Tries KeyLemon Mobius TrueKey BioID 1U 100% 100% 100% 100% 100% 85% % % % 1.7 0% --
34 Observations Medium- and high-resolution photos work best Photos from professional photographers (weddings, etc.) Group photos provide consistent frontal views Often lower resolution Only a small number of photos required One or two forward-facing photos One or two higher-resolution photos
35 Experiments How does resolution affect reconstruction quality?
36 Experiments How does rotation affect reconstruction quality?
37 Experiments Combining high-res rotation with low-res front-facing? +
38 Experiments Virtual U is successful against liveness detection
39 Experiments Virtual U is successful against liveness detection Also successful against motion consistency
40 Experiments Seeing Your Face is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication (Li et al., ACM CCS 15) Device motion measured by inertial sensor data Head pose estimated from input video Train a classifier to identify real data (correlated signals) versus spoofed video data
41 Experiments Training Data (Pos. Data vs. Neg. Data) Test Result (Accept Rate) Real Face Video Spoof VR Spoof Real vs. Video 98.0% 1.0% 99.5%
42 Experiments Training Data (Pos. Data vs. Neg. Data) Test Result (Accept Rate) Real Face Video Spoof VR Spoof Real vs. Video 98.0% 1.0% 99.5% Real vs. Video +VR 67.0% 0.0% 50.0%
43 Experiments Training Data (Pos. Data vs. Neg. Data) Test Result (Accept Rate) Real Face Video Spoof VR Spoof Real vs. Video 98.0% 1.0% 99.5% Real vs. Video +VR 67.0% 0.0% 50.0% Real vs. VR 67.0% %
44 Mitigations Alternative/additional hardware Infrared imaging (e.g. Windows Hello) Random structured light projection image source
45 Mitigations Alternative/additional hardware Infrared imaging (e.g. Windows Hello) Random structured light projection Improved defense against low-resolution synthetic textures Original Downsized to 50px
46 Conclusion We introduce a new VR-based attack on face authentication systems solely using publicly available photos of the victim This attack bypasses existing defenses of liveness detection and motion consistency At a minimum, face authentication software must improve against VRbased attacks with low-resolution textures The increasing ubiquity of VR will continue to challenge computervision-based authentication systems
47 Thank you! Questions?
48
49 Overview Face Authentication Virtual U: A VR-based attack Evaluation Mitigations Conclusion
50 Evolution of Adversarial Models Attack: Still-image Spoofing Defense: Liveness Detection Attack:Video Spoofing Defense: Motion Consistency Attack: 3D-Printed Masks Defense: Texture Detection
51 Identity Variation (e.g., thin-to-heavyset) 3D Face Model Expression Variation (e.g., frowning-to-smiling)
52 Identity Variation (e.g., thin-to-heavyset) 3D Face Model A exp S = S + A id α id + A exp α exp S Expression Variation (e.g., frowning-to-smiling) A id
53 3D Face Model S = S + A id α id + A exp α exp S Reprojection min P,α id,α exp i s i PS i 2 + β id α id 2 + β exp α exp 2 Pose Summed over all landmarks Normalization
54 3D Face Model
55 Multi-Image Modeling Single Image min P,α id,α exp i s i PS i 2 + β id α id 2 + β exp α exp 2 Multiple Images min P,α id,α exp m i s mi P m S mi 2 + β id α id 2 + β exp m α m exp 2 Sum over all images
56 Multi-Image Modeling Corners of the eyes and mouth are stable landmarks Contour points are variable landmarks
57 Multi-Image Modeling Multiple Images min P,α id,α exp m i s mi P m S mi 2 + norm. Multiple Images with Landmark Weighting min P,α id,α exp m i 1 σ i s 2 s mi P m S mi 2 + norm. Higher weighting for stable landmarks
58
59
60 Experiments 20 participants Aged 24 to males, 6 females Various ethnicities Two tests Indoor photo of the subject in the same environment as registration Publicly accessible photos Anywhere from 3 to 27 photos per person Low-, medium-, and high-quality Potentially strong changes in appearance over time
61 Experiments How does rotation affect reconstruction quality?
62 Experiments VR System Google Cardboard Authentication Device
Virtual U: Defeating Face Liveness Detection by Building Virtual Models From Your Public Photos
Virtual U: Defeating Face Liveness Detection by Building Virtual Models From Your Public Photos Yi Xu, True Price, Jan-Michael Frahm, Fabian Monrose Department of Computer Science, University of North
More informationFrom Structure-from-Motion Point Clouds to Fast Location Recognition
From Structure-from-Motion Point Clouds to Fast Location Recognition Arnold Irschara1;2, Christopher Zach2, Jan-Michael Frahm2, Horst Bischof1 1Graz University of Technology firschara, bischofg@icg.tugraz.at
More informationSecurity and Usability Challenges of Moving-Object CAPTCHAs
Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose and Paul Van Oorschot 1 2 CAPTCHAs Application
More informationCrazyTalk 5 Basic Face Fitting and Techniques
Category CrazyTalk 5 Basic Face Fitting and Techniques Date 2008.01.10 CrazyTalk_Tutorial_Model Version CrazyTalk 5.0 Author Abstract James C. Martin Fitting an image for use in CrazyTalk is quick and
More informationData-Driven Face Modeling and Animation
1. Research Team Data-Driven Face Modeling and Animation Project Leader: Post Doc(s): Graduate Students: Undergraduate Students: Prof. Ulrich Neumann, IMSC and Computer Science John P. Lewis Zhigang Deng,
More informationModel-Based Face Computation
Model-Based Face Computation 1. Research Team Project Leader: Post Doc(s): Graduate Students: Prof. Ulrich Neumann, IMSC and Computer Science John P. Lewis Hea-juen Hwang, Zhenyao Mo, Gordon Thomas 2.
More informationNormalized cuts and image segmentation
Normalized cuts and image segmentation Department of EE University of Washington Yeping Su Xiaodan Song Normalized Cuts and Image Segmentation, IEEE Trans. PAMI, August 2000 5/20/2003 1 Outline 1. Image
More informationBiometricks: Bypassing an Enterprise-Grade Biometric Face Authentication System
Biometricks: Bypassing an Enterprise-Grade Biometric Face Authentication System October 13, 2018 October 13, 2018 Matthias Deeg Hacktivity 2018 1 Who am I? Dipl.-Inf. Matthias Deeg Expert IT Security Consultant
More informationFace ID Security. November 2017
Face ID Security November 2017 Face ID Security Overview With a simple glance, Face ID securely unlocks iphone X. It provides intuitive and secure authentication enabled by the TrueDepth camera system,
More informationAnalyzing the Relationship Between Head Pose and Gaze to Model Driver Visual Attention
Analyzing the Relationship Between Head Pose and Gaze to Model Driver Visual Attention Sumit Jha and Carlos Busso Multimodal Signal Processing (MSP) Laboratory Department of Electrical Engineering, The
More informationObject Recognition Using Pictorial Structures. Daniel Huttenlocher Computer Science Department. In This Talk. Object recognition in computer vision
Object Recognition Using Pictorial Structures Daniel Huttenlocher Computer Science Department Joint work with Pedro Felzenszwalb, MIT AI Lab In This Talk Object recognition in computer vision Brief definition
More informationEyeFaceGUI. User Guide. Version
EyeFaceGUI User Guide Version 4.4.0615.1 010001010111100101100101011001000110010101100001001000000 101001001100101011000110110111101100111011011100110100101 110100011010010110111101101110010001010111100101100101011
More informationGraphics, Vision, HCI. K.P. Chan Wenping Wang Li-Yi Wei Kenneth Wong Yizhou Yu
Graphics, Vision, HCI K.P. Chan Wenping Wang Li-Yi Wei Kenneth Wong Yizhou Yu Li-Yi Wei Background Stanford (95-01), NVIDIA (01-05), MSR (05-11) Research Nominal: Graphics, HCI, parallelism Actual: Computing
More informationSpoofing Face Recognition Using Neural Network with 3D Mask
Spoofing Face Recognition Using Neural Network with 3D Mask REKHA P.S M.E Department of Computer Science and Engineering, Gnanamani College of Technology, Pachal, Namakkal- 637018. rekhaps06@gmail.com
More informationDA Progress report 2 Multi-view facial expression. classification Nikolas Hesse
DA Progress report 2 Multi-view facial expression classification 16.12.2010 Nikolas Hesse Motivation Facial expressions (FE) play an important role in interpersonal communication FE recognition can help
More informationSkin and Face Detection
Skin and Face Detection Linda Shapiro EE/CSE 576 1 What s Coming 1. Review of Bakic flesh detector 2. Fleck and Forsyth flesh detector 3. Details of Rowley face detector 4. Review of the basic AdaBoost
More informationMulti-Modal Human- Computer Interaction
Multi-Modal Human- Computer Interaction Attila Fazekas University of Debrecen, Hungary Road Map Multi-modal interactions and systems (main categories, examples, benefits) Face detection, facial gestures
More informationAn Image Based 3D Reconstruction System for Large Indoor Scenes
36 5 Vol. 36, No. 5 2010 5 ACTA AUTOMATICA SINICA May, 2010 1 1 2 1,,,..,,,,. : 1), ; 2), ; 3),.,,. DOI,,, 10.3724/SP.J.1004.2010.00625 An Image Based 3D Reconstruction System for Large Indoor Scenes ZHANG
More informationOn Modeling Variations for Face Authentication
On Modeling Variations for Face Authentication Xiaoming Liu Tsuhan Chen B.V.K. Vijaya Kumar Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213 xiaoming@andrew.cmu.edu
More informationEye tracking by image processing for helping disabled people. Alireza Rahimpour
An Introduction to: Eye tracking by image processing for helping disabled people Alireza Rahimpour arahimpo@utk.edu Fall 2012 1 Eye tracking system: Nowadays eye gaze tracking has wide range of applications
More informationFigure 1. Example sample for fabric mask. In the second column, the mask is worn on the face. The picture is taken from [5].
ON THE VULNERABILITY OF FACE RECOGNITION SYSTEMS TO SPOOFING MASK ATTACKS Neslihan Kose, Jean-Luc Dugelay Multimedia Department, EURECOM, Sophia-Antipolis, France {neslihan.kose, jean-luc.dugelay}@eurecom.fr
More informationSynthesizing Realistic Facial Expressions from Photographs
Synthesizing Realistic Facial Expressions from Photographs 1998 F. Pighin, J Hecker, D. Lischinskiy, R. Szeliskiz and D. H. Salesin University of Washington, The Hebrew University Microsoft Research 1
More informationRobust Multimodal Dictionary Learning
Robust Multimodal Dictionary Learning Tian Cao 1, Vladimir Jojic 1, Shannon Modla 3, Debbie Powell 3, Kirk Czymmek 4, and Marc Niethammer 1,2 1 University of North Carolina at Chapel Hill, NC 2 Biomedical
More informationEyeFaceGUI v User Guide
EyeFaceGUI v3.12.0.1 User Guide Copyright 2016, Eyedea Recognition s.r.o. All rights reserved Eyedea Recognition s.r.o. is not responsible for any damages or losses caused by incorrect or inaccurate results
More informationMichael2XprssnMagic 2002 Elisa Griffin, all rights reserved
Michael2XprssnMagic 2002 Elisa Griffin, all rights reserved Welcome to Michael2XprssnMagic!* This program is a free-standing application, however, to use the expression information you must own Poser 4,
More informationGeneric Face Alignment Using an Improved Active Shape Model
Generic Face Alignment Using an Improved Active Shape Model Liting Wang, Xiaoqing Ding, Chi Fang Electronic Engineering Department, Tsinghua University, Beijing, China {wanglt, dxq, fangchi} @ocrserv.ee.tsinghua.edu.cn
More informationBasic Algorithms for Digital Image Analysis: a course
Institute of Informatics Eötvös Loránd University Budapest, Hungary Basic Algorithms for Digital Image Analysis: a course Dmitrij Csetverikov with help of Attila Lerch, Judit Verestóy, Zoltán Megyesi,
More informationFace Image Data Acquisition and Database Creation
Chapter 3 Face Image Data Acquisition and Database Creation 3.1 Introduction The availability of a database that contains an appropriate number of representative samples is a crucial part of any pattern
More informationSubject-Oriented Image Classification based on Face Detection and Recognition
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
More informationSearch Costs vs. User Satisfaction on Mobile
Search Costs vs. User Satisfaction on Mobile Manisha Verma, Emine Yilmaz University College London mverma@cs.ucl.ac.uk, emine.yilmaz@ucl.ac.uk Abstract. Information seeking is an interactive process where
More informationHigh-Fidelity Facial and Speech Animation for VR HMDs
High-Fidelity Facial and Speech Animation for VR HMDs Institute of Computer Graphics and Algorithms Vienna University of Technology Forecast facial recognition with Head-Mounted Display (HMD) two small
More informationFACE RECOGNITION USING INDEPENDENT COMPONENT
Chapter 5 FACE RECOGNITION USING INDEPENDENT COMPONENT ANALYSIS OF GABORJET (GABORJET-ICA) 5.1 INTRODUCTION PCA is probably the most widely used subspace projection technique for face recognition. A major
More informationLandmark Weighting for 3DMM Shape Fitting
Landmark Weighting for 3DMM Shape Fitting Yu Yang a, Xiao-Jun Wu a, and Josef Kittler b a School of Internet of Things Engineering, Jiangnan University, Wuxi 214122, China b CVSSP, University of Surrey,
More informationImage processing and features
Image processing and features Gabriele Bleser gabriele.bleser@dfki.de Thanks to Harald Wuest, Folker Wientapper and Marc Pollefeys Introduction Previous lectures: geometry Pose estimation Epipolar geometry
More informationMixed-Reality for Intuitive Photo-Realistic 3D-Model Generation
Mixed-Reality for Intuitive Photo-Realistic 3D-Model Generation Wolfgang Sepp, Tim Bodenmueller, Michael Suppa, and Gerd Hirzinger DLR, Institut für Robotik und Mechatronik @ GI-Workshop VR/AR 2009 Folie
More informationFace detection and recognition. Many slides adapted from K. Grauman and D. Lowe
Face detection and recognition Many slides adapted from K. Grauman and D. Lowe Face detection and recognition Detection Recognition Sally History Early face recognition systems: based on features and distances
More informationThe SIFT (Scale Invariant Feature
The SIFT (Scale Invariant Feature Transform) Detector and Descriptor developed by David Lowe University of British Columbia Initial paper ICCV 1999 Newer journal paper IJCV 2004 Review: Matt Brown s Canonical
More informationGirl6-Genesis2FemaleXprssnMagic 2014 Elisa Griffin, all rights reserved
Girl6-Genesis2FemaleXprssnMagic 2014 Elisa Griffin, all rights reserved Welcome to Girl6G2FemXprssnMagic!* To use this application you need the Genesis 2 Female figure that comes with Genesis 2 Female
More informationPart-based Face Recognition Using Near Infrared Images
Part-based Face Recognition Using Near Infrared Images Ke Pan Shengcai Liao Zhijian Zhang Stan Z. Li Peiren Zhang University of Science and Technology of China Hefei 230026, China Center for Biometrics
More informationGAN Related Works. CVPR 2018 & Selective Works in ICML and NIPS. Zhifei Zhang
GAN Related Works CVPR 2018 & Selective Works in ICML and NIPS Zhifei Zhang Generative Adversarial Networks (GANs) 9/12/2018 2 Generative Adversarial Networks (GANs) Feedforward Backpropagation Real? z
More informationBalancing Usability and Security in a Video CAPTCHA
Balancing Usability and Security in a Video CAPTCHA Google, Inc. kak@google.com Rochester Institute of Technology rlaz@cs.rit.edu Symposium on Usable Privacy and Security (SOUPS) 2009 July 15th-17th, 2009,
More informationSpoofing Detection in Wireless Networks
RESEARCH ARTICLE OPEN ACCESS Spoofing Detection in Wireless Networks S.Manikandan 1,C.Murugesh 2 1 PG Scholar, Department of CSE, National College of Engineering, India.mkmanikndn86@gmail.com 2 Associate
More informationPart-based Face Recognition Using Near Infrared Images
Part-based Face Recognition Using Near Infrared Images Ke Pan Shengcai Liao Zhijian Zhang Stan Z. Li Peiren Zhang University of Science and Technology of China Hefei 230026, China Center for Biometrics
More informationMobile Mapping and Navigation. Brad Kohlmeyer NAVTEQ Research
Mobile Mapping and Navigation Brad Kohlmeyer NAVTEQ Research Mobile Mapping & Navigation Markets Automotive Enterprise Internet & Wireless Mobile Devices 2 Local Knowledge & Presence Used to Create Most
More informationDiscriminative classifiers for image recognition
Discriminative classifiers for image recognition May 26 th, 2015 Yong Jae Lee UC Davis Outline Last time: window-based generic object detection basic pipeline face detection with boosting as case study
More informationDigital Vision Face recognition
Ulrik Söderström ulrik.soderstrom@tfe.umu.se 27 May 2007 Digital Vision Face recognition 1 Faces Faces are integral to human interaction Manual facial recognition is already used in everyday authentication
More informationA 3D Face Model for Pose and Illumination Invariant Face Recognition
A 3D Face Model for Pose and Illumination Invariant Face Recognition Pascal Paysan Reinhard Knothe Brian Amberg pascal.paysan@unibas.ch reinhard.knothe@unibas.ch brian.amberg@unibas.ch Sami Romdhani Thomas
More informationl ealgorithms for Image Registration
FAIR: exib Image Registration l F l ealgorithms for Jan Modersitzki Computing And Software, McMaster University 1280 Main Street West, Hamilton On, L8S 4K1, Canada modersit@cas.mcmaster.ca August 13, 2008
More informationData-driven Methods: Faces. Portrait of Piotr Gibas Joaquin Rosales Gomez (2003)
Data-driven Methods: Faces Portrait of Piotr Gibas Joaquin Rosales Gomez (2003) CS194: Image Manipulation & Computational Photography Alexei Efros, UC Berkeley, Fall 2016 The Power of Averaging 8-hour
More informationReality Modeling Drone Capture Guide
Reality Modeling Drone Capture Guide Discover the best practices for photo acquisition-leveraging drones to create 3D reality models with ContextCapture, Bentley s reality modeling software. Learn the
More informationMulti-feature face liveness detection method combining motion information
Volume 04 - Issue 11 November 2018 PP. 36-40 Multi-feature face liveness detection method combining motion information Changlin LI (School of Computer Science and Technology, University of Science and
More informationPERFORMANCE CAPTURE FROM SPARSE MULTI-VIEW VIDEO
Stefan Krauß, Juliane Hüttl SE, SoSe 2011, HU-Berlin PERFORMANCE CAPTURE FROM SPARSE MULTI-VIEW VIDEO 1 Uses of Motion/Performance Capture movies games, virtual environments biomechanics, sports science,
More informationFace Alignment Under Various Poses and Expressions
Face Alignment Under Various Poses and Expressions Shengjun Xin and Haizhou Ai Computer Science and Technology Department, Tsinghua University, Beijing 100084, China ahz@mail.tsinghua.edu.cn Abstract.
More informationDigital Makeup Face Generation
Digital Makeup Face Generation Wut Yee Oo Mechanical Engineering Stanford University wutyee@stanford.edu Abstract Make up applications offer photoshop tools to get users inputs in generating a make up
More informationStable Vision-Aided Navigation for Large-Area Augmented Reality
Stable Vision-Aided Navigation for Large-Area Augmented Reality Taragay Oskiper, Han-Pang Chiu, Zhiwei Zhu Supun Samarasekera, Rakesh Teddy Kumar Vision and Robotics Laboratory SRI-International Sarnoff,
More informationFace Recognition At-a-Distance Based on Sparse-Stereo Reconstruction
Face Recognition At-a-Distance Based on Sparse-Stereo Reconstruction Ham Rara, Shireen Elhabian, Asem Ali University of Louisville Louisville, KY {hmrara01,syelha01,amali003}@louisville.edu Mike Miller,
More informationA Feature Point Matching Based Approach for Video Objects Segmentation
A Feature Point Matching Based Approach for Video Objects Segmentation Yan Zhang, Zhong Zhou, Wei Wu State Key Laboratory of Virtual Reality Technology and Systems, Beijing, P.R. China School of Computer
More information3D Active Appearance Model for Aligning Faces in 2D Images
3D Active Appearance Model for Aligning Faces in 2D Images Chun-Wei Chen and Chieh-Chih Wang Abstract Perceiving human faces is one of the most important functions for human robot interaction. The active
More informationAn Introduction to 3D Computer Graphics, Stereoscopic Image, and Animation in OpenGL and C/C++ Fore June
An Introduction to 3D Computer Graphics, Stereoscopic Image, and Animation in OpenGL and C/C++ Fore June Appendix B Video Compression using Graphics Models B.1 Introduction In the past two decades, a new
More informationNetwork Access Control and VoIP. Ben Hostetler Senior Information Security Advisor
Network Access Control and VoIP Ben Hostetler Senior Information Security Advisor Objectives/Discussion Points Network Access Control Terms & Definitions Certificate Based 802.1X MAC Authentication Bypass
More informationSecurity of Wireless Networks in Intelligent Vehicle Systems
Security of Wireless Networks in Intelligent Vehicle Systems Syed M. Mahmud and Shobhit Shanker Electrical and Computer Engg. Dept. Wayne State University Detroit, MI 48202 Email: smahmud@eng.wayne.edu
More informationThe Implementation of Face Security for Authentication Implemented on Mobile Phone. Emir Kremic Abdulhamit Subasi
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremic Abdulhamit Subasi The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir
More informationMotion Capture using Body Mounted Cameras in an Unknown Environment
Motion Capture using Body Mounted Cameras in an Unknown Environment Nam Vo Taeyoung Kim Siddharth Choudhary 1. The Problem Motion capture has been recently used to provide much of character motion in several
More informationIntensity-Depth Face Alignment Using Cascade Shape Regression
Intensity-Depth Face Alignment Using Cascade Shape Regression Yang Cao 1 and Bao-Liang Lu 1,2 1 Center for Brain-like Computing and Machine Intelligence Department of Computer Science and Engineering Shanghai
More informationHigh Altitude Balloon Localization from Photographs
High Altitude Balloon Localization from Photographs Paul Norman and Daniel Bowman Bovine Aerospace August 27, 2013 Introduction On December 24, 2011, we launched a high altitude balloon equipped with a
More informationSYNTHETIC DATA GENERATION FOR AN ALL-IN-ONE DMS. Sagar Bhokre
SYNTHETIC DATA GENERATION FOR AN ALL-IN-ONE DMS Sagar Bhokre NEED FOR SYNTHETIC DATA Where does real world data fall short? High resolution devices are needed for measuring parameters headpose, gaze Some
More informationNeue Verfahren der Bildverarbeitung auch zur Erfassung von Schäden in Abwasserkanälen?
Neue Verfahren der Bildverarbeitung auch zur Erfassung von Schäden in Abwasserkanälen? Fraunhofer HHI 13.07.2017 1 Fraunhofer-Gesellschaft Fraunhofer is Europe s largest organization for applied research.
More informationMichael3XprssnMagic 2003, 2014 Elisa Griffin, all rights reserved
Michael3XprssnMagic 2003, 2014 Elisa Griffin, all rights reserved Welcome to Michael3XprssnMagic!* This program is a free-standing application. To use the expression information you must own the Michael
More informationEBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.
EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have
More informationWaleed Pervaiz CSE 352
Waleed Pervaiz CSE 352 Computer Vision is the technology that enables machines to see and obtain information from digital images. It is seen as an integral part of AI in fields such as pattern recognition
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationControllable Generative Adversarial Network
Controllable Generative Adversarial Network arxiv:1708.00598v2 [cs.lg] 12 Sep 2017 Minhyeok Lee 1 and Junhee Seok 1 1 School of Electrical Engineering, Korea University, 145 Anam-ro, Seongbuk-gu, Seoul,
More informationSecurity server using CAPTCHA. Introduction to CAPTCHA
Security server using CAPTCHA Introduction to CAPTCHA A key area in security research and practice is authentication, the determination of whether a user should be allowed to access to a given system or
More informationInformation technology Biometric data interchange formats Part 5: Face image data
INTERNATIONAL STANDARD ISO/IEC 19794-5:2005 TECHNICAL CORRIGENDUM 2 Published 2008-07-01 INTERNATIONAL ORGANIZATION FOR STANDARDIZATION МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ ORGANISATION INTERNATIONALE
More informationCountermeasure for the Protection of Face Recognition Systems Against Mask Attacks
Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks Neslihan Kose, Jean-Luc Dugelay Multimedia Department EURECOM Sophia-Antipolis, France {neslihan.kose, jean-luc.dugelay}@eurecom.fr
More information3D from Photographs: Automatic Matching of Images. Dr Francesco Banterle
3D from Photographs: Automatic Matching of Images Dr Francesco Banterle francesco.banterle@isti.cnr.it 3D from Photographs Automatic Matching of Images Camera Calibration Photographs Surface Reconstruction
More informationComputer Vision Course Lecture 04. Template Matching Image Pyramids. Ceyhun Burak Akgül, PhD cba-research.com. Spring 2015 Last updated 11/03/2015
Computer Vision Course Lecture 04 Template Matching Image Pyramids Ceyhun Burak Akgül, PhD cba-research.com Spring 2015 Last updated 11/03/2015 Photo credit: Olivier Teboul vision.mas.ecp.fr/personnel/teboul
More informationDe-identifying Facial Images using k-anonymity
De-identifying Facial Images using k-anonymity Ori Brostovski March 2, 2008 Outline Introduction General notions Our Presentation Basic terminology Exploring popular de-identification algorithms Examples
More informationrtcaptcha: A Real-Time CAPTCHA Based Liveness Detection System
rtcaptcha: A Real-Time CAPTCHA Based Liveness Detection System Erkam Uzun, Simon Pak Ho Chung, Irfan Essa and Wenke Lee Georgia Institute of Technology euzun@gatech.edu, pchung34@mail.gatech.edu, irfan@gatech.edu
More informationSupplementary Material for Synthesizing Normalized Faces from Facial Identity Features
Supplementary Material for Synthesizing Normalized Faces from Facial Identity Features Forrester Cole 1 David Belanger 1,2 Dilip Krishnan 1 Aaron Sarna 1 Inbar Mosseri 1 William T. Freeman 1,3 1 Google,
More informationClassification of Upper and Lower Face Action Units and Facial Expressions using Hybrid Tracking System and Probabilistic Neural Networks
Classification of Upper and Lower Face Action Units and Facial Expressions using Hybrid Tracking System and Probabilistic Neural Networks HADI SEYEDARABI*, WON-SOOK LEE**, ALI AGHAGOLZADEH* AND SOHRAB
More informationA Multiresolutional Approach for Facial Motion Retargetting Using Subdivision Wavelets
A Multiresolutional Approach for Facial Motion Retargetting Using Subdivision Wavelets Kyungha Min and Moon-Ryul Jung Dept. of Media Technology, Graduate School of Media Communications, Sogang Univ., Seoul,
More informationFACE DETECTION BY HAAR CASCADE CLASSIFIER WITH SIMPLE AND COMPLEX BACKGROUNDS IMAGES USING OPENCV IMPLEMENTATION
FACE DETECTION BY HAAR CASCADE CLASSIFIER WITH SIMPLE AND COMPLEX BACKGROUNDS IMAGES USING OPENCV IMPLEMENTATION Vandna Singh 1, Dr. Vinod Shokeen 2, Bhupendra Singh 3 1 PG Student, Amity School of Engineering
More informationComparison of Vessel Segmentations using STAPLE
Comparison of Vessel Segmentations using STAPLE Julien Jomier, Vincent LeDigarcher, and Stephen R. Aylward Computer-Aided Diagnosis and Display Lab The University of North Carolina at Chapel Hill, Department
More informationGenesis8FemaleXprssnMagic 2018 Elisa Griffin, all rights reserved
Genesis8FemaleXprssnMagic 2018 Elisa Griffin, all rights reserved Welcome to Genesis8FemaleXprssnMagic!* To use this free-standing application you need DAZ Studio and the Genesis 8 Female figure that comes
More informationAugmented Reality VU. Computer Vision 3D Registration (2) Prof. Vincent Lepetit
Augmented Reality VU Computer Vision 3D Registration (2) Prof. Vincent Lepetit Feature Point-Based 3D Tracking Feature Points for 3D Tracking Much less ambiguous than edges; Point-to-point reprojection
More informationUser Authentication + Other Human Aspects
CSE 484 (Winter 2010) User Authentication + Other Human Aspects Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for
More informationReal-time facial feature point extraction
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2007 Real-time facial feature point extraction Ce Zhan University of Wollongong,
More informationStyle-based Inverse Kinematics
Style-based Inverse Kinematics Keith Grochow, Steven L. Martin, Aaron Hertzmann, Zoran Popovic SIGGRAPH 04 Presentation by Peter Hess 1 Inverse Kinematics (1) Goal: Compute a human body pose from a set
More informationHuman Body Shape Deformation from. Front and Side Images
Human Body Shape Deformation from Front and Side Images Yueh-Ling Lin 1 and Mao-Jiun J. Wang 2 Department of Industrial Engineering and Engineering Management, National Tsing Hua University, Hsinchu, Taiwan
More informationCamera Registration in a 3D City Model. Min Ding CS294-6 Final Presentation Dec 13, 2006
Camera Registration in a 3D City Model Min Ding CS294-6 Final Presentation Dec 13, 2006 Goal: Reconstruct 3D city model usable for virtual walk- and fly-throughs Virtual reality Urban planning Simulation
More informationSupplemental Material for Face Alignment Across Large Poses: A 3D Solution
Supplemental Material for Face Alignment Across Large Poses: A 3D Solution Xiangyu Zhu 1 Zhen Lei 1 Xiaoming Liu 2 Hailin Shi 1 Stan Z. Li 1 1 Institute of Automation, Chinese Academy of Sciences 2 Department
More informationStructure from Motion. Introduction to Computer Vision CSE 152 Lecture 10
Structure from Motion CSE 152 Lecture 10 Announcements Homework 3 is due May 9, 11:59 PM Reading: Chapter 8: Structure from Motion Optional: Multiple View Geometry in Computer Vision, 2nd edition, Hartley
More information3D Morphable Model Based Face Replacement in Video
3D Morphable Model Based Face Replacement in Video Yi-Ting Cheng, Virginia Tzeng, Yung-Yu Chuang, Ming Ouhyoung Dept. of Computer Science and Information Engineering, National Taiwan University E-mail:
More informationGender Classification Technique Based on Facial Features using Neural Network
Gender Classification Technique Based on Facial Features using Neural Network Anushri Jaswante Dr. Asif Ullah Khan Dr. Bhupesh Gour Computer Science & Engineering, Rajiv Gandhi Proudyogiki Vishwavidyalaya,
More informationTwo Routes for Image to Image Translation: Rule based vs. Learning based. Minglun Gong, Memorial Univ. Collaboration with Mr.
Two Routes for Image to Image Translation: Rule based vs. Learning based Minglun Gong, Memorial Univ. Collaboration with Mr. Zili Yi Introduction A brief history of image processing Image to Image translation
More informationFrom the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems
From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems Javier Galbally Biometrics Recognition Group - ATVS Escuela Politécnica Superior Universidad Autónoma de Madrid, SPAIN http://atvs.ii.uam.es
More information3D Face Recognition. Anil K. Jain. Dept. of Computer Science & Engineering Michigan State University.
3D Face Recognition Anil K. Jain Dept. of Computer Science & Engineering Michigan State University http://biometrics.cse.msu.edu Face Recognition 1959? 1960 1972 1973 Face detection using OpenCV Viola-Jones
More informationImage Processing Pipeline for Facial Expression Recognition under Variable Lighting
Image Processing Pipeline for Facial Expression Recognition under Variable Lighting Ralph Ma, Amr Mohamed ralphma@stanford.edu, amr1@stanford.edu Abstract Much research has been done in the field of automated
More informationStatic Scene Reconstruction
GPU supported Real-Time Scene Reconstruction with a Single Camera Jan-Michael Frahm, 3D Computer Vision group, University of North Carolina at Chapel Hill Static Scene Reconstruction 1 Capture on campus
More information