sadaf-ali
I am Sadaf, postdoctoral research at ENSEA, ETIS-CNRS, France. My present research is regarding Image Forgery Detection using Computer Vision and Deep Learning.
ENSEA FranceParis, France
Pinned Repositories
-A-few-techniques-for-fingerprint-template-protection
The role of authentication systems has turned out to be exceptionally vital in the present automated world. Conventional authentication systems rely on ID cards and secret information. While these procedures are extremely prominent, they have a few constraints and hindrances, for example, the watchword of a client can effortlessly be overlooked, stolen or speculated and the ID cards can be lost, stolen, shared or harmed. These shortcomings can be overcome by the use of authentication systems based on biometrics. Biometrics deals with recognizing a user based on his/her physiological or behavioral characteristics. By applying sensors, both physiological (such as fingerprint, iris, face, ear etc.) as well as behavioral (such as signature, handwriting, voice, etc.) characteristics can be captured from the user. These characteristics are relatively unique, permanent and difficult to forge and share. Also, a user does not need to worry about forgetting them or making any special effort to carry them along. Among various biometric traits (features), fingerprint is the most widely used trait for user authentication. The use of fingerprint is becoming popular day by day and many countries are currently using it as a prime tool for the authentication of their citizens.Fingerprints provide several advantages; however, there are many issues related to privacy and security in fingerprint-based authentication systems. The authentication systems relying on fingerprint usually use minutiae points information and store it directly as a user template in the database. It has been proven from various studies that from the information of minutiae points, the original fingerprint can be reconstructed. Databases are prone to get attacked by an adversary, and in the case of fingerprint-based authentication system, if the fingerprint features (minutiae points) of a human being are compromised (through an attack by the adversary), then they cannot be replaced or revoked. As fingerprint can be generated using the information of its minutiae points, it is essential to ensure the security of the fingerprint data in biometric systems. Primarily, the work presented in the thesis addresses the security issues related to fingerprint based user templates. It proposes various efficient techniques for the computation of a secure fingerprint based user template. The user template generated using the proposed techniques show good resistance against various attacks and no information about the original fingerprint features can be obtained (revealed) from the user template generated by these techniques. The user template computed by these techniques fulfills the essential requirements such as revocability, diversity, security, and performance of a secure and robust template. Outcomes of the experimental analysis conducted on FVC2002 DB1, FVC2002 DB2, and FVC2002 DB3 fingerprint databases show highly encouraging performance and exhibit the viability of the proposed techniques. The presented techniques have also been analyzed with respect to various attacks and are found to be highly secure and robust.
-Learning-to-Localize-Image-Forgery-Using-End-to-End-Attention-Network
-Securing-biometric-user-template-using-modified-minutiae-attributes
The minutiae points information of a fingerprint is generally saved directly in the database as a template for the user. It has been deduced through numerous research works that the original fingerprint of a user can be obtained from the minutiae points information. As the databases are prone to various attacks, their security becomes a huge concern in fingerprint based authentication systems. Hereby, a novel technique has been introduced which is based on the modification of the minutiae attributes. The user template generated through the proposed technique is extremely secure and robust. The proposed technique achieved 1.63%, 1%, and 2.43% EER under stolen-key attack scenario for FVC2002 DB1, FVC2002 DB2, and FVC2002 DB3 fingerprint databases respectively. The proposed technique achieved 0% EER under different-key scenario. Highly encouraging results are obtained that show the viability and effectiveness of the proposed technique.
3-Dimensional-Secured-Fingerprint-Shell
The minutiae points information of a fingerprint is generally saved directly in the database as a template for the user. It has been deduced through numerous research works that the original fingerprint of a user can be obtained from the minutiae points information. As the databases are prone to various attacks, their security becomes a huge concern in fingerprint based authentication systems. Hereby, a novel technique has been introduced which is based on the modification of the minutiae attributes. The user template generated through the proposed technique is extremely secure and robust. The proposed technique achieved 1.63%, 1%, and 2.43% EER under stolen-key attack scenario for FVC2002 DB1, FVC2002 DB2, and FVC2002 DB3 fingerprint databases respectively. The proposed technique achieved 0% EER under different-key scenario. Highly encouraging results are obtained that show the viability and effectiveness of the proposed technique.
3D-Ear-Biometrics-Acquisition-and-Recognition
Ear is one of the recent biometric traits used to recognize the human. The ear can be considered as a robust biometric feature with cosmetics, age, and facial expressions, which is unlikely with the other biometrics features. The ear has a predictable background and moreover, the ear can be used an effective supplementary biometric trait with various other biometrics. Furthermore, the distinctiveness property of the ear is highly motivated for security related operations. In this paper, a method for 3D ear acquisition is presented, which is used in creating one of the largest 2D and 3D ear database (IIT Indore) and the recognition performance on the acquired data using a 3D descriptor. We have used Signature of histograms of orientations (SHOT) and Binary SHOT (B-SHOT) descriptor as a 3D feature descriptor and matched the query and repository images and obtain a rank one authentication rate of 97.13% and 97.12%, respectively.
A-non-invertible-transformation-based-technique-to-protect-a-fingerprint-template
Ear-recognition-in-3D-using-2D-curvilinear-features
This study presents a novel approach for human recognition using co-registered three-dimensional (3D) and 2D ear images. The proposed technique is based on local feature detection and description. The authors detect feature key-points in 2D ear images utilising curvilinear structure and map them to the 3D ear images. Considering a neighbourhood around each mapped key-point in 3D, a feature descriptor vector is computed. To match a probe 3D ear image with a gallery 3D ear image for recognition, first highly similar feature key-points of these images are used as correspondence points for an initial alignment. Afterwards, a fine iterative closest point matching is performed on entire data of the 3D ear images being matched. An extensive experimental analysis is performed to demonstrate the recognition performance of the proposed approach in the presence of noise and occlusions, and compared with the available state-of-the-art 3D ear recognition techniques. The recognition rate of the proposed technique is found to be 98.69% on the University of Notre Dame-Collection J2 dataset with an equal error rate of 1.53%.
Image-forgery-detection-using-deeplearning-by-recompressing-the-images
Optimized-Authentication-System-with-High-Security-and-Privacy
Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database as a user template. Existing research works have shown that from such insecure user templates, original fingerprints can be constructed. If the database gets compromised, the attacker may construct the fingerprint of a user, which is a serious security and privacy issue. Security of original fingerprints is therefore extremely important. Ali et al. have designed a system for secure fingerprint biometrics; however, their technique has various limitations and is not optimized. In this paper, first we have proposed a secure technique which is highly robust, optimized, and fast. Secondly, unlike most of the fingerprint biometrics apart from the minutiae point location and orientation, we have used the quality of minutiae points as well to construct an optimized template. Third, the template constructed is in 3D shell shape. We have rigorously evaluated the technique on nine different fingerprint databases. The obtained results from the experiments are highly promising and show the effectiveness of the technique.
Polynomial-Vault-A-secure-and-robust-fingerprint-based-authentication
Fingerprint matching is one of the extensively used tools to authenticate users. It has been accepted by governments of various countries to authenticate their citizens. The common practice in a fingerprint based system is to store minutiae points of fingerprints as the user template. The minutiae points information can be accessed through an attack by an adversary and the original fingerprint of users can be obtained using this information. Unlike passwords, a compromised fingerprint is irreparable and there is a necessity to protect user data. In this paper, a technique called Polynomial Vault is proposed to secure fingerprint information. The fingerprint features and a unique user key-set are used to generate a secure template for a user by using a non-invertible transformation. This obtained template is used to authenticate the user. In case a user template is compromised, the proposed technique provides a way to construct a new template by changing the user key-set values. To demonstrate the efficiency and the robustness of the proposed technique, a thorough experimental analysis is being conducted using IIT Kanpur, FVC2004 (DB1 and DB2), FVC2002 (DB1, DB2, DB3, and DB4), and FVC2000 (DB1 and DB2) databases.
sadaf-ali's Repositories
sadaf-ali/Image-forgery-detection-using-deeplearning-by-recompressing-the-images
sadaf-ali/-Learning-to-Localize-Image-Forgery-Using-End-to-End-Attention-Network
sadaf-ali/-A-few-techniques-for-fingerprint-template-protection
The role of authentication systems has turned out to be exceptionally vital in the present automated world. Conventional authentication systems rely on ID cards and secret information. While these procedures are extremely prominent, they have a few constraints and hindrances, for example, the watchword of a client can effortlessly be overlooked, stolen or speculated and the ID cards can be lost, stolen, shared or harmed. These shortcomings can be overcome by the use of authentication systems based on biometrics. Biometrics deals with recognizing a user based on his/her physiological or behavioral characteristics. By applying sensors, both physiological (such as fingerprint, iris, face, ear etc.) as well as behavioral (such as signature, handwriting, voice, etc.) characteristics can be captured from the user. These characteristics are relatively unique, permanent and difficult to forge and share. Also, a user does not need to worry about forgetting them or making any special effort to carry them along. Among various biometric traits (features), fingerprint is the most widely used trait for user authentication. The use of fingerprint is becoming popular day by day and many countries are currently using it as a prime tool for the authentication of their citizens.Fingerprints provide several advantages; however, there are many issues related to privacy and security in fingerprint-based authentication systems. The authentication systems relying on fingerprint usually use minutiae points information and store it directly as a user template in the database. It has been proven from various studies that from the information of minutiae points, the original fingerprint can be reconstructed. Databases are prone to get attacked by an adversary, and in the case of fingerprint-based authentication system, if the fingerprint features (minutiae points) of a human being are compromised (through an attack by the adversary), then they cannot be replaced or revoked. As fingerprint can be generated using the information of its minutiae points, it is essential to ensure the security of the fingerprint data in biometric systems. Primarily, the work presented in the thesis addresses the security issues related to fingerprint based user templates. It proposes various efficient techniques for the computation of a secure fingerprint based user template. The user template generated using the proposed techniques show good resistance against various attacks and no information about the original fingerprint features can be obtained (revealed) from the user template generated by these techniques. The user template computed by these techniques fulfills the essential requirements such as revocability, diversity, security, and performance of a secure and robust template. Outcomes of the experimental analysis conducted on FVC2002 DB1, FVC2002 DB2, and FVC2002 DB3 fingerprint databases show highly encouraging performance and exhibit the viability of the proposed techniques. The presented techniques have also been analyzed with respect to various attacks and are found to be highly secure and robust.
sadaf-ali/Ear-recognition-in-3D-using-2D-curvilinear-features
This study presents a novel approach for human recognition using co-registered three-dimensional (3D) and 2D ear images. The proposed technique is based on local feature detection and description. The authors detect feature key-points in 2D ear images utilising curvilinear structure and map them to the 3D ear images. Considering a neighbourhood around each mapped key-point in 3D, a feature descriptor vector is computed. To match a probe 3D ear image with a gallery 3D ear image for recognition, first highly similar feature key-points of these images are used as correspondence points for an initial alignment. Afterwards, a fine iterative closest point matching is performed on entire data of the 3D ear images being matched. An extensive experimental analysis is performed to demonstrate the recognition performance of the proposed approach in the presence of noise and occlusions, and compared with the available state-of-the-art 3D ear recognition techniques. The recognition rate of the proposed technique is found to be 98.69% on the University of Notre Dame-Collection J2 dataset with an equal error rate of 1.53%.
sadaf-ali/Optimized-Authentication-System-with-High-Security-and-Privacy
Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database as a user template. Existing research works have shown that from such insecure user templates, original fingerprints can be constructed. If the database gets compromised, the attacker may construct the fingerprint of a user, which is a serious security and privacy issue. Security of original fingerprints is therefore extremely important. Ali et al. have designed a system for secure fingerprint biometrics; however, their technique has various limitations and is not optimized. In this paper, first we have proposed a secure technique which is highly robust, optimized, and fast. Secondly, unlike most of the fingerprint biometrics apart from the minutiae point location and orientation, we have used the quality of minutiae points as well to construct an optimized template. Third, the template constructed is in 3D shell shape. We have rigorously evaluated the technique on nine different fingerprint databases. The obtained results from the experiments are highly promising and show the effectiveness of the technique.
sadaf-ali/Polynomial-Vault-A-secure-and-robust-fingerprint-based-authentication
Fingerprint matching is one of the extensively used tools to authenticate users. It has been accepted by governments of various countries to authenticate their citizens. The common practice in a fingerprint based system is to store minutiae points of fingerprints as the user template. The minutiae points information can be accessed through an attack by an adversary and the original fingerprint of users can be obtained using this information. Unlike passwords, a compromised fingerprint is irreparable and there is a necessity to protect user data. In this paper, a technique called Polynomial Vault is proposed to secure fingerprint information. The fingerprint features and a unique user key-set are used to generate a secure template for a user by using a non-invertible transformation. This obtained template is used to authenticate the user. In case a user template is compromised, the proposed technique provides a way to construct a new template by changing the user key-set values. To demonstrate the efficiency and the robustness of the proposed technique, a thorough experimental analysis is being conducted using IIT Kanpur, FVC2004 (DB1 and DB2), FVC2002 (DB1, DB2, DB3, and DB4), and FVC2000 (DB1 and DB2) databases.
sadaf-ali/-Securing-biometric-user-template-using-modified-minutiae-attributes
The minutiae points information of a fingerprint is generally saved directly in the database as a template for the user. It has been deduced through numerous research works that the original fingerprint of a user can be obtained from the minutiae points information. As the databases are prone to various attacks, their security becomes a huge concern in fingerprint based authentication systems. Hereby, a novel technique has been introduced which is based on the modification of the minutiae attributes. The user template generated through the proposed technique is extremely secure and robust. The proposed technique achieved 1.63%, 1%, and 2.43% EER under stolen-key attack scenario for FVC2002 DB1, FVC2002 DB2, and FVC2002 DB3 fingerprint databases respectively. The proposed technique achieved 0% EER under different-key scenario. Highly encouraging results are obtained that show the viability and effectiveness of the proposed technique.
sadaf-ali/3-Dimensional-Secured-Fingerprint-Shell
The minutiae points information of a fingerprint is generally saved directly in the database as a template for the user. It has been deduced through numerous research works that the original fingerprint of a user can be obtained from the minutiae points information. As the databases are prone to various attacks, their security becomes a huge concern in fingerprint based authentication systems. Hereby, a novel technique has been introduced which is based on the modification of the minutiae attributes. The user template generated through the proposed technique is extremely secure and robust. The proposed technique achieved 1.63%, 1%, and 2.43% EER under stolen-key attack scenario for FVC2002 DB1, FVC2002 DB2, and FVC2002 DB3 fingerprint databases respectively. The proposed technique achieved 0% EER under different-key scenario. Highly encouraging results are obtained that show the viability and effectiveness of the proposed technique.
sadaf-ali/3D-Ear-Biometrics-Acquisition-and-Recognition
Ear is one of the recent biometric traits used to recognize the human. The ear can be considered as a robust biometric feature with cosmetics, age, and facial expressions, which is unlikely with the other biometrics features. The ear has a predictable background and moreover, the ear can be used an effective supplementary biometric trait with various other biometrics. Furthermore, the distinctiveness property of the ear is highly motivated for security related operations. In this paper, a method for 3D ear acquisition is presented, which is used in creating one of the largest 2D and 3D ear database (IIT Indore) and the recognition performance on the acquired data using a 3D descriptor. We have used Signature of histograms of orientations (SHOT) and Binary SHOT (B-SHOT) descriptor as a 3D feature descriptor and matched the query and repository images and obtain a rank one authentication rate of 97.13% and 97.12%, respectively.
sadaf-ali/A-non-invertible-transformation-based-technique-to-protect-a-fingerprint-template
sadaf-ali/Adaptation-of-Pair-Polar-Structures-for-a-Secure-and-Alignment-free-Template
sadaf-ali/B3D-EAR
sadaf-ali/Enhanced-Fingerprint-Shell
The proposed technique transforms a fingerprint template by using a pair of keys defined uniquely for every individual. If the transformed template is compromised, user has an option to generate a new template using a new pair of keys. The proposed technique has been evaluated on IIT Kanpur fingerprint database.
sadaf-ali/Fingerprint-Shell-Construction-with-Prominent-Minutiae-Points
Fingerprint based authentication is one of the most extensively used authentication technique. Biometric systems relying on fingerprint usually directly uses minutiae points information of a fingerprint and store it as a user template. There are many recent works which show that original fingerprint of a user can be generated from the data of minutiae points. In case of traditional authentication systems based on password there is a liberty to change the password, however biometric data of a user cannot be changed as it is permanently associated with the human body. If any information related to biometric features of a user is stolen or compromised, then in that case we cannot change the compromised information. Therefore, it is essential to make sure that the biometric data is secure. Our motive is to generate a biometric template that will fulfill the necessities of performance, security, revocability and diversity. Moujahdi et al. proposed a technique called Fingerprint shell as a secure representation of fingerprint data using a user key. In this technique, a spiral curve is generated as a secured user template by using the distances between singular point and minutiae points. In this paper, we have proposed a technique in which we have included the quality of minutiae points for the construction of spiral curve. We have used a pair of unique user keys and utilized the information provided by minutiae points to generate a non-invertible user template. In case of compromising of user template by adversary, user has the liberty to generate new template by using different user keys, the new template and the compromised one are non-linkable. We tested our technique on FVC2002 DB1, FVC2002 DB2 and IIT Kanpur fingerprint databases using FVC protocol. Experimental results obtained are encouraging and demonstrate the viability of our technique.
sadaf-ali/Fingerprint-Shell-with-impregnable-features
Authentication based on utilization of fingerprint has become highly popular. Generally, minutiae points information obtained from the fingerprints is stored into the database. Various research works depict that by utilizing minutiae points information, original fingerprints reconstruction is possible. Adversary can obtain the user template through an attack on the database. If minutiae template of a user is compromised, then the adversary can construct original fingerprint of the user. In order to avoid this, it is essential to secure the fingerprint information. To achieve this, a technique called 3-Dimensional Secured Fingerprint Shell has been presented by Ali and Prakash, in this technique they generate a 3-dimensional spiral curve, however, ridge counts between singular and minutiae points are not secure in this technique. In the proposed technique we construct an extremely secure and efficient template for a user, by securing all features of the fingerprint used for template generation. The proposed technique is robust against the effects of rotation as well as translation and meets the essential requirements of an efficient authentication system. We evaluated the proposed technique by utilizing FVC2000, FVC2002, FVC2004, and IIT Kanpur fingerprint databases. The results obtained for the proposed technique are highly encouraging, that shows its robustness.
sadaf-ali/Geometric-statistics-based-descriptor-for-3D-ear-recognition
Several feature keypoint detection and description techniques have been proposed in the literature for 3D shape recognition. These techniques work well in discriminating different classes of shapes; however, they fail when used for comparing highly similar objects such as 3D ear or face in biometric applications. In this paper, we propose an efficient feature keypoint detection and description technique using geometric statistics for representation and matching of highly similar 3D objects and demonstrate its effectiveness in 3D ear-based biometric recognition. To compute the descriptor, we first extract feature keypoints from the 3D data by making use of surface variations followed by defining a descriptor vector for each keypoint. The descriptor vector is generated using three components. To compute the first component, concentric spheres that divide the space around a keypoint into annular regions are considered. Points falling in the annular regions are projected onto a plane perpendicular to the oriented normal of the keypoint. Lower-order moments of the 2D histogram of the spatial distribution of these projected points for each annular region are computed and used to define the first component of the descriptor vector. Next, component of the descriptor vector is computed using histograms of the inner products of the normals of the keypoint and its neighbours. The third component of the descriptor vector encodes the signed distances of the neighbours of the keypoint from the projection plane. Before concatenating individual components of the descriptor vector, the values are normalized to a common scale. Experiments on University of Notre Dame public database-Collection J2 (UND-J2) have achieved a rank-1 and rank-2 identification rates of 98.60% and 100%, respectively, with an equal error rate of 1.50%. Comparative results show the superiority of the proposed descriptor in recognizing highly similar objects like human ear.
sadaf-ali/Image-Forgery-Localization-using-Image-Patches-and-Deep-Learning
sadaf-ali/luxem
sadaf-ali/Multi-resolution-Local-Descriptor-for-3D-Ear-Recognition
sadaf-ali/practice
sadaf-ali/RHEMAT
sadaf-ali/Robust-biometric-authentication-system-with-a-secure-user-template
Biometric feature based human authentication systems provide various advantages over the classical authentication systems. Out of numerous biometric features in a human body, the fingerprint is the most commonly used biometric feature for the authentication of a person. Typically, the fingerprint-based systems rely on minutiae points information and use it directly as a user template. Several studies have shown that the use of minutiae points directly as a user template is unreliable as it may lead to the reconstruction of the original fingerprint. As databases are vulnerable to attacks, it is important to secure fingerprint information. In this paper, we propose a technique in which a strong 3-dimensional template is created from the fingerprint of a user. From the minutiae points of the fingerprint, minutiae triplets are computed, through which a secured user template is generated. The user template developed using the proposed technique is found to be robust and shows good revocability, diversity, security, and performance. The experimental results obtained on various fingerprint databases are extremely encouraging and demonstrate the effectiveness of the proposed technique.
sadaf-ali/Robust-technique-for-fingerprint-template-protection
Fingerprint authentication systems generally save data extracted from fingerprint as minutiae template in the database. However, it is often found that databases can be attacked and compromised by the adversary. So if minutiae points of a user are leaked, the fingerprint can be generated from them. The fingerprint cannot be changed as the finger is a part of the human body. Hence, securing information extracted from the fingerprint is required. In this study, the authors propose a highly secure technique that uses location information of the minutia points to construct a highly secured template for a user. For every minutia point, secured modified location is generated by using information of its neighbouring minutiae and a key-set. They have achieved 2, 1, and 3.1% equal error rate values for FVC2002 DB1, DB2, and DB3 fingerprint databases, respectively, under the same key scenario. Analysis done for several attacks shows that the proposed technique is very robust and secure. The experimental results are extremely encouraging and they demonstrate the efficiency of the proposed technique.
sadaf-ali/Secure-Multimodal-Access-with-2D-and-3D-Ears
This chapter introduces a multimodal technique that uses 2D and 3D ear images for secure access. The technique uses 2D-modality to identify keypoints and 3D-modality to describe keypoints. Upon detection and mapping of keypoints into 3D, a feature descriptor vector is computed around each mapped keypoint in 3D. We perform a two-stage, coarse and fine alignment to fit the 3D ear image of the probe to the 3D ear image of the gallery. The probe and gallery image keypoints are compared using feature vectors, where very similar keypoints are used as coarse alignment correspondence points. Once the ear pairs are matched fairly closely, the entire data is finely aligned to compute the matching score. A detailed systematic analysis using a large ear database has been carried out to show the efficiency of the technique proposed.
sadaf-ali/Toe-Prints-An-Application-Study-for-Biometric-Verification-in-Adults
Biometric recognition systems provide an easy way to verify an individual's identity through physiological and behavioral biometric traits, due to the persistence of these traits. The physiological traits are extensively utilized to secure the applications of numerous fields. Among these, toe print is one of the physiological traits that has been discussed and evaluated for the children; however, it has not been addressed in the past as this can also be utilized to verify the identity of an adult, especially for a person with different abilities. In this paper, we have come up with a feasibility study of toe prints while comparing them with the impression of a person's different fingers in terms of the overall performance of a biometric verification system. To accomplish this task, the toe print database is collected from different persons of age varying from 17 years to 64 years, which is the first database of its kind and is made available in public domain. Fingerprint impressions are also collected along with the toe print to compare the reliability of the toe print with respect to performance using a standard fingerprint verification tool. Verifinger trial version has been utilized by considering the two standard fingerprint verification protocols viz. 1-vs-1 and FVC to assess the performance of the toe print verification system in terms of the equal error rate (EER). The toe print verification system attains 0.04% and 0.01% EER values for 1-vs-1 and FVC protocol, respectively, which clearly depicts the feasibility of toe print as a potential biometric trait.