Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf ·...
Transcript of Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf ·...
![Page 1: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/1.jpg)
Biometric systems and Presentation Attack Detection
Jalil Nourmohammadi Khiarak Advisor:
Assistant Lecturer in WUT Prof. Andrzej Pacut
1
22 Slides
![Page 2: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/2.jpg)
Outline
• Introduction
• What should I do?
• Anti-Spoofing or PAD
2
![Page 3: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/3.jpg)
Introduction
3
Birth date: 16 September, 1989Nationality: IranianGender: MaleMarital status: Single
Phone (Cell):+48-510608921+48-669948297Skype Name: Jalilnoormohammadi
![Page 4: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/4.jpg)
Ardabil
4
![Page 5: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/5.jpg)
Education
University of TabrizTabriz, Iran
M.Sc., Artificial Intelligence2013-2015
5
![Page 6: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/6.jpg)
Thesis (MSc)
Learning Hierarchical Representations for Video Analysis Using Deep Learning
6
Advisors:Dr. Seyed-Naser Razavi
Dr. Ghader Karimian-Khosroshahi
![Page 7: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/7.jpg)
Publications
Nourmohammadi-Khiarak, J., Zamani-Harghalani, Y. & Feizi-Derakhshi, M. (2017). CombinedMulti-Agent Method to Control Inter-Department Common Events Collision for UniversityCourses Timetabling. Journal of Intelligent Systems, 0(0), pp. -. Retrieved 5 Jan. 2018, fromdoi:10.1515/jisys-2017-0249•
7
➢ Title:Combined Multi-Agent Method to Control Inter-Department Common Events Collision for University Courses Timetabling
➢ Authors:Jalil Nourmohammadi-Khiarak, Y. Zamani-Harghalani,
Mohammad-Reza Feizi-Derakhshi
➢ Journal:Journal of Intelligent Systems
![Page 8: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/8.jpg)
Publications
Jalil Nourmohammadi Khiarak, Fatemeh Razeghi, Mohammad Reza Feizi Derakhshi, Samaneh Mazaheri,Yashar Zamani-Harghalani, Rohollah Moosavi Tayebi, “New Hybrid Method for Feature Selection andClassification using Meta-heuristic Algorithm in Credit Risk Assessment”, Advances in Electrical andComputer Engineering (Withdraw), 2017. 8
➢ Title:New Hybrid Method for Feature Selection and Classification
using Meta-heuristic Algorithm in Credit Risk Assessment➢ Authors:
Jalil Nourmohammadi Khiarak, Fatemeh Razeghi, Mohammad Reza FeiziDerakhshi, Samaneh Mazaheri, Yashar Zamani-Harghalani, Rohollah Moosavi
Tayebi
➢ Journal:To be submitted
![Page 9: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/9.jpg)
Publications
Jalil Nourmohammadi-Khiarak*1, Mohammad-Reza Feizi-Derakhshi2, Khadijeh Behrouzi3, SamanehMazaheri4, Yashar Zamani-Harghalani5, Rohollah Moosavi Tayebi6, “New Hybrid Method for Heart DiseaseDiagnosis Utilizing Optimization Algorithm in Feature Selection”, BioData Mining (submitted), 2017. 9
➢ Title:New Hybrid Method for Heart Disease Diagnosis Utilizing
Optimization Algorithm in Feature Selection➢ Authors:
Jalil Nourmohammadi Khiarak, Fatemeh Razeghi, Mohammad Reza FeiziDerakhshi, Samaneh Mazaheri, Yashar Zamani-Harghalani, Rohollah Moosavi
Tayebi
➢ Journal:BioData Mining (submitted)
![Page 10: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/10.jpg)
Other Publications•Firouzeh Razavi, Jalil Nourmohammadi Khiarak, Samaneh Mazaheri,Mohamad Jafar Tarokh,”Recognizing Farsi Numbers utilizing Deep BeliefNetwork and Limited Training Samples”, The 10th Iranian Conference onMachine Vision and Image Processing, (in press), 2017.
•Yashar Zamani-Harghalani, Jalil Nourmohamadi-Khiarak, “ImprovingRecommender System Using Cuckoo Algorithm", 7th International Conferenceon Electrical and Computer Engineering, Iran, 2015, (Persian Language).
•Nasim goldust,Mohammad-Ali Balafar, Yashar Zamani Harghalani, JalilNourmohamadi-Khiarak, “Segmentation Of Medical Images Based OnLandmark Using Cooperative Game Theory", 7th International Conference onElectrical and Computer Engineering, Iran, 2015, (Persian Language).
•Abbas Mirzaei Somarin, Jalil Nourmohamadi-Khiarak, “A new method tooptimize estimate distance using the normalized and calibration Algorithm”,3th International Conference on Electrical and Computer Engineering, Iran,2011, (Persian Language).
10
![Page 11: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/11.jpg)
ESR 5 – Countermeasure algorithms against subterfuge in mobile biometric systems
• Propose a Presentation attack detection methods
• Statistical methodology for PAD
• A working prototype on an example mobile device.
What Should I do?
11
![Page 12: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/12.jpg)
Attack
An act of circumventing a biometric system by adversaries is referred as an attack.
➢ Indirect: these attacks are performed inside the system.
➢Direct: It refers to the attacks that do notrequire any specific knowledge
12Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing AttacksSébastien Marcel, Mark S. Nixon, Stan Z. Li, Springer, Jul 17, 2014 - Computers - 281 pages
![Page 13: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/13.jpg)
Spoofing
Is a direct attack performed at the sensor level outside the digital limits on the system.
13
![Page 14: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/14.jpg)
Anti-Spoofing = PAD
Refers to the countermeasures to detect and avert these attempt.
14
![Page 15: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/15.jpg)
Voice Spoofing(Sneakers)
15
![Page 16: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/16.jpg)
Iris Spoofing(from YouTube)
16
![Page 17: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/17.jpg)
DNA
Lecture_ Spoofing and Anti-Spoofing in Biometrics, From YouTube17
![Page 18: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/18.jpg)
Fingerprint Spoofing
18
![Page 19: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/19.jpg)
Face PAD
19
![Page 20: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/20.jpg)
Three main group Anti-Spoofing = PAD
• Checking Intrinsic Properties
• Detecting Liveness
• Detecting Counterfeit
20
![Page 21: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/21.jpg)
Next Session
• State-of-the-art Anti-Spoofing on mobile
21
![Page 22: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep](https://reader033.fdocuments.in/reader033/viewer/2022041611/5e379baae90d5c5a2b4f56ff/html5/thumbnails/22.jpg)
Question?
22