On Learning Joint Multi-biometric Representations by Deep Fusion

被引:2
|
作者
Damer, Naser [1 ,2 ]
Dimitrov, Kristiyan [1 ]
Braun, Andreas [1 ]
Kuijper, Arjan [1 ,2 ]
机构
[1] Fraunhofer Inst Comp Graph Res IGD, Darmstadt, Germany
[2] Tech Univ Darmstadt, Math & Appl Visual Comp, Darmstadt, Germany
关键词
RECOGNITION;
D O I
10.1109/btas46853.2019.9186011
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Multi-biometrics combines different biometric sources to enhance recognition, template protection, and indexing performances. One of the main challenges here is the need for joint discriminant feature representation of multi-biometric data. This is typically achieved by feature-level fusion, imposing limitations on the combinations of biometric characteristics and algorithms. Including multiple imaging sources within deep-learning networks was generally limited to multiple sources of images of the same physical object, e.g., multi-spectral object detection. Previous biometrics works were limited to use deep-learning to extract representations of single biometric characteristics. In contrast to that, our work studies creating representations of one identity by sampling different physical objects,i.e. biometric characteristics. We adapted three architectures successfully to produce and discuss jointly learned representations for different levels of correlated data, modalities, instances, and presentations. Our evaluation proved the applicability of jointly learning biometric representations, especially when the data correlation is low.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] An efficient multi-biometric cancellable biometric scheme based on deep fusion and deep dream
    Basma Abd El-Rahiem
    Mohamed Amin
    Ahmed Sedik
    Fathi E. Abd El Samie
    Abdullah M. Iliyasu
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 2177 - 2189
  • [2] An efficient multi-biometric cancellable biometric scheme based on deep fusion and deep dream
    Abd El-Rahiem, Basma
    Amin, Mohamed
    Sedik, Ahmed
    Abd El Samie, Fathi E.
    Iliyasu, Abdullah M.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (04) : 2177 - 2189
  • [3] Multi-biometric cohort analysis for biometric fusion
    Aggarwal, Gaurav
    Ratha, Nalini K.
    Bolle, Ruud M.
    Chellappa, Rama
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 5224 - +
  • [4] Cancelable multi-biometric recognition system based on deep learning
    Abdellatef, Essam
    Ismail, Nabil A.
    Abd Elrahman, Salah Eldin S. E.
    Ismail, Khalid N.
    Rihan, Mohamed
    Abd El-Samie, Fathi E.
    [J]. VISUAL COMPUTER, 2020, 36 (06): : 1097 - 1109
  • [5] Cancelable multi-biometric recognition system based on deep learning
    Abdellatef, Essam
    Ismail, Nabil A.
    Abd Elrahman, Salah Eldin S. E.
    Ismail, Khalid N.
    Rihan, Mohamed
    Abd El-Samie, Fathi E.
    [J]. Visual Computer, 2020, 36 (06): : 1097 - 1109
  • [6] Cancelable multi-biometric recognition system based on deep learning
    Essam Abdellatef
    Nabil A. Ismail
    Salah Eldin S. E. Abd Elrahman
    Khalid N. Ismail
    Mohamed Rihan
    Fathi E. Abd El-Samie
    [J]. The Visual Computer, 2020, 36 : 1097 - 1109
  • [7] A classification approach to multi-biometric score fusion
    Ma, Y
    Cukic, B
    Singh, H
    [J]. AUDIO AND VIDEO BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2005, 3546 : 484 - 493
  • [8] Trust the Biometric Mainstream: Multi-biometric Fusion and Score Coherence
    Damer, Naser
    Rhaibani, Chadi Izzou
    Braun, Andreas
    Kuijper, Arjan
    [J]. 2017 25TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2017, : 2191 - 2195
  • [9] GEC-Based Multi-Biometric Fusion
    Alford, Aniesha
    Hansen, Caresse
    Dozier, Gerry
    Bryant, Kelvin
    Kelly, John
    Abegaz, Tamirat
    Ricanek, Karl
    [J]. 2011 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2011, : 2071 - 2074
  • [10] Watermarking Based Multi-biometric Fusion Approach
    Ghouzali, Sanaa
    [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 342 - 351