22
Biometric systems and Presentation Attack Detection Jalil Nourmohammadi Khiarak Advisor: Assistant Lecturer in WUT Prof. Andrzej Pacut 1 22 Slides

Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Biometric systems and Presentation Attack Detection

Jalil Nourmohammadi Khiarak Advisor:

Assistant Lecturer in WUT Prof. Andrzej Pacut

1

22 Slides

Page 2: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Outline

• Introduction

• What should I do?

• Anti-Spoofing or PAD

2

Page 3: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Introduction

3

Birth date: 16 September, 1989Nationality: IranianGender: MaleMarital status: Single

Phone (Cell):+48-510608921+48-669948297Skype Name: Jalilnoormohammadi

E-mail:[email protected]@[email protected]

Page 4: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Ardabil

4

Page 5: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Education

University of TabrizTabriz, Iran

M.Sc., Artificial Intelligence2013-2015

5

Page 6: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Thesis (MSc)

Learning Hierarchical Representations for Video Analysis Using Deep Learning

6

Advisors:Dr. Seyed-Naser Razavi

Dr. Ghader Karimian-Khosroshahi

Page 7: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Publications

Nourmohammadi-Khiarak, J., Zamani-Harghalani, Y. & Feizi-Derakhshi, M. (2017). CombinedMulti-Agent Method to Control Inter-Department Common Events Collision for UniversityCourses Timetabling. Journal of Intelligent Systems, 0(0), pp. -. Retrieved 5 Jan. 2018, fromdoi:10.1515/jisys-2017-0249•

7

➢ Title:Combined Multi-Agent Method to Control Inter-Department Common Events Collision for University Courses Timetabling

➢ Authors:Jalil Nourmohammadi-Khiarak, Y. Zamani-Harghalani,

Mohammad-Reza Feizi-Derakhshi

➢ Journal:Journal of Intelligent Systems

Page 8: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Publications

Jalil Nourmohammadi Khiarak, Fatemeh Razeghi, Mohammad Reza Feizi Derakhshi, Samaneh Mazaheri,Yashar Zamani-Harghalani, Rohollah Moosavi Tayebi, “New Hybrid Method for Feature Selection andClassification using Meta-heuristic Algorithm in Credit Risk Assessment”, Advances in Electrical andComputer Engineering (Withdraw), 2017. 8

➢ Title:New Hybrid Method for Feature Selection and Classification

using Meta-heuristic Algorithm in Credit Risk Assessment➢ Authors:

Jalil Nourmohammadi Khiarak, Fatemeh Razeghi, Mohammad Reza FeiziDerakhshi, Samaneh Mazaheri, Yashar Zamani-Harghalani, Rohollah Moosavi

Tayebi

➢ Journal:To be submitted

Page 9: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Publications

Jalil Nourmohammadi-Khiarak*1, Mohammad-Reza Feizi-Derakhshi2, Khadijeh Behrouzi3, SamanehMazaheri4, Yashar Zamani-Harghalani5, Rohollah Moosavi Tayebi6, “New Hybrid Method for Heart DiseaseDiagnosis Utilizing Optimization Algorithm in Feature Selection”, BioData Mining (submitted), 2017. 9

➢ Title:New Hybrid Method for Heart Disease Diagnosis Utilizing

Optimization Algorithm in Feature Selection➢ Authors:

Jalil Nourmohammadi Khiarak, Fatemeh Razeghi, Mohammad Reza FeiziDerakhshi, Samaneh Mazaheri, Yashar Zamani-Harghalani, Rohollah Moosavi

Tayebi

➢ Journal:BioData Mining (submitted)

Page 10: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Other Publications•Firouzeh Razavi, Jalil Nourmohammadi Khiarak, Samaneh Mazaheri,Mohamad Jafar Tarokh,”Recognizing Farsi Numbers utilizing Deep BeliefNetwork and Limited Training Samples”, The 10th Iranian Conference onMachine Vision and Image Processing, (in press), 2017.

•Yashar Zamani-Harghalani, Jalil Nourmohamadi-Khiarak, “ImprovingRecommender System Using Cuckoo Algorithm", 7th International Conferenceon Electrical and Computer Engineering, Iran, 2015, (Persian Language).

•Nasim goldust,Mohammad-Ali Balafar, Yashar Zamani Harghalani, JalilNourmohamadi-Khiarak, “Segmentation Of Medical Images Based OnLandmark Using Cooperative Game Theory", 7th International Conference onElectrical and Computer Engineering, Iran, 2015, (Persian Language).

•Abbas Mirzaei Somarin, Jalil Nourmohamadi-Khiarak, “A new method tooptimize estimate distance using the normalized and calibration Algorithm”,3th International Conference on Electrical and Computer Engineering, Iran,2011, (Persian Language).

10

Page 11: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

ESR 5 – Countermeasure algorithms against subterfuge in mobile biometric systems

• Propose a Presentation attack detection methods

• Statistical methodology for PAD

• A working prototype on an example mobile device.

What Should I do?

11

Page 12: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Attack

An act of circumventing a biometric system by adversaries is referred as an attack.

➢ Indirect: these attacks are performed inside the system.

➢Direct: It refers to the attacks that do notrequire any specific knowledge

12Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing AttacksSébastien Marcel, Mark S. Nixon, Stan Z. Li, Springer, Jul 17, 2014 - Computers - 281 pages

Page 13: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Spoofing

Is a direct attack performed at the sensor level outside the digital limits on the system.

13

Page 14: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Anti-Spoofing = PAD

Refers to the countermeasures to detect and avert these attempt.

14

Page 15: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Voice Spoofing(Sneakers)

15

Page 16: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Iris Spoofing(from YouTube)

16

Page 17: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

DNA

Lecture_ Spoofing and Anti-Spoofing in Biometrics, From YouTube17

Page 18: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Fingerprint Spoofing

18

Page 19: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Face PAD

19

Page 20: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Three main group Anti-Spoofing = PAD

• Checking Intrinsic Properties

• Detecting Liveness

• Detecting Counterfeit

20

Page 21: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Next Session

• State-of-the-art Anti-Spoofing on mobile

21

Page 22: Biometric systems and Presentation Attack Detectionzbum.ia.pw.edu.pl/PRESENTATIONS/PAD_Jalil.pdf · Thesis (MSc) Learning Hierarchical Representations for Video Analysis Using Deep

Question?

22