The overlapping effect and fusion protocols of data augmentation techniques in iris PAD
-
Published:2021-11-26
Issue:1
Volume:33
Page:
-
ISSN:0932-8092
-
Container-title:Machine Vision and Applications
-
language:en
-
Short-container-title:Machine Vision and Applications
Author:
Fang MeilingORCID, Damer Naser, Boutros Fadi, Kirchbuchner Florian, Kuijper Arjan
Abstract
AbstractIris Presentation Attack Detection (PAD) algorithms address the vulnerability of iris recognition systems to presentation attacks. With the great success of deep learning methods in various computer vision fields, neural network-based iris PAD algorithms emerged. However, most PAD networks suffer from overfitting due to insufficient iris data variability. Therefore, we explore the impact of various data augmentation techniques on performance and the generalizability of iris PAD. We apply several data augmentation methods to generate variability, such as shift, rotation, and brightness. We provide in-depth analyses of the overlapping effect of these methods on performance. In addition to these widely used augmentation techniques, we also propose an augmentation selection protocol based on the assumption that various augmentation techniques contribute differently to the PAD performance. Moreover, two fusion methods are performed for more comparisons: the strategy-level and the score-level combination. We demonstrate experiments on two fine-tuned models and one trained from the scratch network and perform on the datasets in the Iris-LivDet-2017 competition designed for generalizability evaluation. Our experimental results show that augmentation methods improve iris PAD performance in many cases. Our least overlap-based augmentation selection protocol achieves the lower error rates for two networks. Besides, the shift augmentation strategy also exceeds state-of-the-art (SoTA) algorithms on the Clarkson and IIITD-WVU datasets.
Funder
Bundesministerium für Bildung und Forschung Hessisches Ministerium für Wissenschaft und Kunst
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference42 articles.
1. Baird, H.S.: Document image defect models and their uses. In: In: 2nd International Conference Document Analysis and Recognition, pp. 62–67. IEEE Computer Society, Tsukuba City, Japan (1993) 2. Bakshi, S., Mehrotra, H., Majhi, B.: Postmatch pruning of SIFT pairs for iris recognition. Int. J. Biom. 5(2), 160–180 (2013). https://doi.org/10.1504/IJBM.2013.052965 3. Barpanda, S.S., Sa, P.K., Marques, O., Majhi, B., Bakshi, S.: Iris recognition with tunable filter bank based feature. Multim. Tools Appl. 77(6), 7637–7674 (2018). https://doi.org/10.1007/s11042-017-4668-z 4. Boutros, F., Damer, N., Raja, K.B., Ramachandra, R., Kirchbuchner, F., Kuijper, A.: Iris and periocular biometrics for head mounted displays: Segmentation, recognition, and synthetic data generation. Image Vis. Comput. 104, 104007 (2020) 5. Boutros, F., Damer, N., Raja, K.B., Ramachandra, R., Kirchbuchner, F., Kuijper, A.: In: IJCB, (ed.) On benchmarking iris recognition within a head-mounted display for AR/VR applications, pp. 1–10. IEEE (2020)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|