Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 20 de 22
Filter
1.
Neural Netw ; 127: 82-95, 2020 Jul.
Article in English | MEDLINE | ID: mdl-32344155

ABSTRACT

Field classification is a new extension of traditional classification frameworks that attempts to utilize consistent information from a group of samples (termed fields). By forgoing the independent identically distributed (i.i.d.) assumption, field classification can achieve remarkably improved accuracy compared to traditional classification methods. Most studies of field classification have been conducted on traditional machine learning methods. In this paper, we propose integration with a Bayesian framework, for the first time, in order to extend field classification to deep learning and propose two novel deep neural network architectures: the Field Deep Perceptron (FDP) and the Field Deep Convolutional Neural Network (FDCNN). Specifically, we exploit a deep perceptron structure, typically a 6-layer structure, where the first 3 layers remove (learn) a 'style' from a group of samples to map them into a more discriminative space and the last 3 layers are trained to perform classification. For the FDCNN, we modify the AlexNet framework by adding style transformation layers within the hidden layers. We derive a novel learning scheme from a Bayesian framework and design a novel and efficient learning algorithm with guaranteed convergence for training the deep networks. The whole framework is interpreted with visualization features showing that the field deep neural network can better learn the style of a group of samples. Our developed models are also able to achieve transfer learning and learn transformations for newly introduced fields. We conduct extensive comparative experiments on benchmark data (including face, speech, and handwriting data) to validate our learning approach. Experimental results demonstrate that our proposed deep frameworks achieve significant improvements over other state-of-the-art algorithms, attaining new benchmark performance.


Subject(s)
Biometric Identification/methods , Deep Learning , Neural Networks, Computer , Pattern Recognition, Automated/methods , Algorithms , Bayes Theorem , Biometric Identification/trends , Deep Learning/trends , Handwriting , Humans , Machine Learning/trends , Pattern Recognition, Automated/trends
2.
Sensors (Basel) ; 20(7)2020 Mar 25.
Article in English | MEDLINE | ID: mdl-32218126

ABSTRACT

Although face-based biometric recognition systems have been widely used in many applications, this type of recognition method is still vulnerable to presentation attacks, which use fake samples to deceive the recognition system. To overcome this problem, presentation attack detection (PAD) methods for face recognition systems (face-PAD), which aim to classify real and presentation attack face images before performing a recognition task, have been developed. However, the performance of PAD systems is limited and biased due to the lack of presentation attack images for training PAD systems. In this paper, we propose a method for artificially generating presentation attack face images by learning the characteristics of real and presentation attack images using a few captured images. As a result, our proposed method helps save time in collecting presentation attack samples for training PAD systems and possibly enhance the performance of PAD systems. Our study is the first attempt to generate PA face images for PAD system based on CycleGAN network, a deep-learning-based framework for image generation. In addition, we propose a new measurement method to evaluate the quality of generated PA images based on a face-PAD system. Through experiments with two public datasets (CASIA and Replay-mobile), we show that the generated face images can capture the characteristics of presentation attack images, making them usable as captured presentation attack samples for PAD system training.


Subject(s)
Biometric Identification/trends , Computer Security/trends , Facial Recognition , Image Processing, Computer-Assisted , Algorithms , Face , Humans , Neural Networks, Computer
4.
Rev. derecho genoma hum ; (50): 15-25, ene.-jun. 2019.
Article in Spanish | IBECS | ID: ibc-191216

ABSTRACT

El artículo realiza una valoración en torno a la evolución de la medicina del futuro y su incidencia en la protección de los derechos fundamentales. El autor centra su discurso en dos enfoques que, en la actualidad, parecen dominar el campo de la medicina: la medicina genómica y la medicina personalizada de precisión, entendiendo que existen diferencias entre medicina genómica y medicina personalizada de precisión que no permiten identificarlas. Una amplia exposición es dedicada al tema que el autor considera más relevante en la actualidad, esto es, el de la medicina personalizada de precisión, íntimamente ligada a los big data y a la inteligencia artificial


This paper deals with the evolution of the medicine of the future and its impact on the protection of fundamental rights. The author focuses the discourse on two approaches that currently seem to dominate the field of medicine: genomic medicine and personalized precision medicine, understanding that there are differences between genomic medicine and personalized precision medicine that do not allow them to be identified. An extensive exposition is dedicated to the subject that the author considers most relevant today, that is, precision personalized medicine, intimately linked to big data and artificial intelligence


Subject(s)
Humans , Precision Medicine/trends , Human Rights/trends , Genomics/trends , Big Data , Artificial Intelligence/trends , Biometric Identification/trends , Privacy/legislation & jurisprudence , Health Status Disparities , Forecasting
5.
IEEE Trans Neural Netw Learn Syst ; 30(5): 1486-1496, 2019 05.
Article in English | MEDLINE | ID: mdl-30295631

ABSTRACT

Video-based facial expression recognition has received substantial attention over the past decade, while early expression detection (EED) is still a relatively new and challenging problem. The goal of EED is to identify an expression as quickly as possible after the expression starts and before it ends. This timely ability has many potential applications, ranging from human-computer interaction to security. The max-margin early event detector (MMED) is a well-known ranking model for early event detection. It can achieve competitive EED performance but suffers from several critical limitations: 1) MMED lacks flexibility in extracting useful information for segment comparison, which leads to poor performance in exploring the ranking relation between segment pairs; 2) the training process is slow due to the large number of constraints, and the memory requirement is also usually hard to satisfy; and 3) MMED is linear in nature, and hence may not be appropriate for data in a nonlinear feature space. To overcome these limitations, we propose an online multi-instance learning (MIL) framework for EED. In particular, the MIL technique is first introduced to generalize MMED, resulting in the proposed MIL-based EED (MIED), which is more general and flexible than MMED, since various instance construction and combination strategies can be adopted. To accelerate the training process, we reformulate MIED in the online setting and develop online multi-instance learning framework for EED (OMIED). To further exploit the nonlinear structure of the data distribution, we incorporate the kernel methods in OMIED, which results in the proposed online kernel multi-instance learning for early expression detection. Experiments on two popular and one challenging video-based expression data sets demonstrate both the efficiency and effectiveness of the proposed methods.


Subject(s)
Biometric Identification/methods , Facial Expression , Machine Learning , Nonlinear Dynamics , Video Recording/methods , Artificial Intelligence/trends , Biometric Identification/trends , Humans , Machine Learning/trends , Neural Networks, Computer , Pattern Recognition, Automated/methods , Pattern Recognition, Automated/trends , Time Factors , Video Recording/trends
6.
Pediatrics ; 141(4)2018 04.
Article in English | MEDLINE | ID: mdl-29540571

ABSTRACT

OBJECTIVES: Young children in resource-poor settings remain inadequately immunized. We evaluated the role of compliance-linked incentives versus mobile phone messaging to improve childhood immunizations. METHODS: Children aged ≤24 months from a rural community in India were randomly assigned to either a control group or 1 of 2 study groups. A cloud-based, biometric-linked software platform was used for positive identification, record keeping for all groups, and delivery of automated mobile phone reminders with or without compliance-linked incentives (Indian rupee Rs30 or US dollar $0.50 of phone talk time) for the study groups. Immunization coverage was analyzed by using multivariable Poisson regression. RESULTS: Between July 11, 2016, and July 20, 2017, 608 children were randomly assigned to the study groups. Five hundred and forty-nine (90.3%) children fulfilled eligibility criteria, with a median age of 5 months; 51.4% were girls, 83.6% of their mothers had no schooling, and they were in the study for a median duration of 292 days. Median immunization coverage at enrollment was 33% in all groups and increased to 41.7% (interquartile range [IQR]: 23.1%-69.2%), 40.1% (IQR: 30.8%-69.2%), and 50.0% (IQR: 30.8%-76.9%) by the end of the study in the control group, the group with mobile phone reminders, and the compliance-linked incentives group, respectively. The administration of compliance-linked incentives was independently associated with improvement in immunization coverage and a modest increase in timeliness of immunizations. CONCLUSIONS: Compliance-linked incentives are an important intervention for improving the coverage and timeliness of immunizations in young children in resource-poor settings.


Subject(s)
Biometric Identification/trends , Cell Phone/trends , Immunization Programs/trends , Motivation , Reminder Systems/trends , Rural Population/trends , Biometric Identification/methods , Female , Humans , Immunization/methods , Immunization/trends , Immunization Programs/methods , India/epidemiology , Infant , Male , Prospective Studies , Text Messaging/trends
8.
IEEE Trans Neural Netw Learn Syst ; 29(1): 183-194, 2018 01.
Article in English | MEDLINE | ID: mdl-27831893

ABSTRACT

In this paper, we present a deep regression approach for face alignment. The deep regressor is a neural network that consists of a global layer and multistage local layers. The global layer estimates the initial face shape from the whole image, while the following local layers iteratively update the shape with local image observations. Combining standard derivations and numerical approximations, we make all layers able to backpropagate error differentials, so that we can apply the standard backpropagation to jointly learn the parameters from all layers. We show that the resulting deep regressor gradually and evenly approaches the true facial landmarks stage by stage, avoiding the tendency that often occurs in the cascaded regression methods and deteriorates the overall performance: yielding early stage regressors with high alignment accuracy gains but later stage regressors with low alignment accuracy gains. Experimental results on standard benchmarks demonstrate that our approach brings significant improvements over previous cascaded regression algorithms.


Subject(s)
Biometric Identification/methods , Facial Expression , Image Processing, Computer-Assisted/methods , Machine Learning , Neural Networks, Computer , Biometric Identification/trends , Humans , Image Processing, Computer-Assisted/trends , Machine Learning/trends , Photic Stimulation/methods , Regression Analysis
10.
Public Underst Sci ; 26(2): 195-211, 2017 02.
Article in English | MEDLINE | ID: mdl-28168941

ABSTRACT

The decision in Europe to implement biometric passports, visas and residence permits was made at the highest levels without much consultation, checks and balances. Council regulation came into force relatively unnoticed in January 2005, as part of wider securitization policies urging systems interoperability and data sharing across borders. This article examines the biometric imaginary that characterizes this European Union decision, dictated by executive powers in the policy vacuum after 9/11 - a depiction of mobility governance, technological necessity and whom/what to trust or distrust, calling upon phantom publics to justify decisions rather than test their grounding. We consult an online blog we operated in 2010 to unravel this imaginary years on. Drawing on Dewey's problem of the public, we discuss this temporary opening of a public space in which the imaginary could be reframed and contested, and how such activities may shape, if at all, relations between politics, publics, policy intervention and societal development.


Subject(s)
Biometric Identification/statistics & numerical data , Community Participation , European Union , Public Policy , Trust , Biometric Identification/trends , Imagination
13.
J Med Syst ; 39(6): 65, 2015 Jun.
Article in English | MEDLINE | ID: mdl-25900328

ABSTRACT

The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.


Subject(s)
Biometric Identification/standards , Computer Security/standards , Confidentiality/standards , Health Information Systems/standards , Health Smart Cards/standards , Patient Access to Records/standards , Telemedicine/standards , Biometric Identification/methods , Biometric Identification/trends , Computer Security/instrumentation , Health Information Systems/organization & administration , Health Information Systems/trends , Health Smart Cards/trends , Humans , Patient Access to Records/trends , Telemedicine/methods , Telemedicine/trends
15.
J Med Syst ; 38(12): 142, 2014 Dec.
Article in English | MEDLINE | ID: mdl-25371272

ABSTRACT

The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.


Subject(s)
Biometric Identification/standards , Computer Security/standards , Confidentiality/standards , Health Information Systems/standards , Telemedicine/standards , Biometric Identification/methods , Biometric Identification/trends , Computer Security/trends , Health Information Systems/organization & administration , Health Information Systems/trends , Humans , Internet , Physician-Patient Relations , Remote Consultation/methods , Remote Consultation/standards , Telemedicine/methods , Telemedicine/trends , User-Computer Interface
16.
J Med Syst ; 38(12): 136, 2014 Dec.
Article in English | MEDLINE | ID: mdl-25352490

ABSTRACT

Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.


Subject(s)
Biometric Identification/standards , Computer Security/standards , Confidentiality/standards , Health Information Systems/standards , Telemedicine/standards , Biometric Identification/methods , Biometric Identification/trends , Health Information Systems/organization & administration , Health Information Systems/trends , Humans , Internet/trends , Telemedicine/methods , Telemedicine/trends
17.
ScientificWorldJournal ; 2014: 749096, 2014.
Article in English | MEDLINE | ID: mdl-25126604

ABSTRACT

Biometric recognition (also known as biometrics) refers to the automated recognition of individuals based on their biological or behavioral traits. Examples of biometric traits include fingerprint, palmprint, iris, and face. The brain is the most important and complex organ in the human body. Can it be used as a biometric trait? In this study, we analyze the uniqueness of the brain and try to use the brain for identity authentication. The proposed brain-based verification system operates in two stages: gray matter extraction and gray matter matching. A modified brain segmentation algorithm is implemented for extracting gray matter from an input brain image. Then, an alignment-based matching algorithm is developed for brain matching. Experimental results on two data sets show that the proposed brain recognition system meets the high accuracy requirement of identity authentication. Though currently the acquisition of the brain is still time consuming and expensive, brain images are highly unique and have the potential possibility for authentication in view of pattern recognition.


Subject(s)
Algorithms , Biometric Identification/methods , Biometric Identification/trends , Gray Matter/anatomy & histology , Image Processing, Computer-Assisted/methods , Neuroimaging/methods , Neuroimaging/trends , Humans , Magnetic Resonance Imaging
18.
PLoS One ; 9(7): e99212, 2014.
Article in English | MEDLINE | ID: mdl-25029188

ABSTRACT

Face verification, though an easy task for humans, is a long-standing open research area. This is largely due to the challenging covariates, such as disguise and aging, which make it very hard to accurately verify the identity of a person. This paper investigates human and machine performance for recognizing/verifying disguised faces. Performance is also evaluated under familiarity and match/mismatch with the ethnicity of observers. The findings of this study are used to develop an automated algorithm to verify the faces presented under disguise variations. We use automatically localized feature descriptors which can identify disguised face patches and account for this information to achieve improved matching accuracy. The performance of the proposed algorithm is evaluated on the IIIT-Delhi Disguise database that contains images pertaining to 75 subjects with different kinds of disguise variations. The experiments suggest that the proposed algorithm can outperform a popular commercial system and evaluates them against humans in matching disguised face images.


Subject(s)
Algorithms , Biometric Identification/methods , Biometric Identification/trends , Face , Pattern Recognition, Visual/physiology , Recognition, Psychology/physiology , Age Factors , Female , Humans , Male , Photic Stimulation , Surveys and Questionnaires
19.
ScientificWorldJournal ; 2014: 260187, 2014.
Article in English | MEDLINE | ID: mdl-24701149

ABSTRACT

Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.


Subject(s)
Computer Security/standards , Internet/standards , Trust , Biometric Identification/standards , Biometric Identification/trends , Computer Security/trends , Humans , Information Storage and Retrieval/standards , Information Storage and Retrieval/trends , Internet/trends
SELECTION OF CITATIONS
SEARCH DETAIL