-
Reversing the Irreversible: A Survey on Inverse Biometrics
Authors:
Marta Gomez-Barrero,
Javier Galbally
Abstract:
With the widespread use of biometric recognition, several issues related to the privacy and security provided by this technology have been recently raised and analysed. As a result, the early common belief among the biometrics community of templates irreversibility has been proven wrong. It is now an accepted fact that it is possible to reconstruct from an unprotected template a synthetic sample t…
▽ More
With the widespread use of biometric recognition, several issues related to the privacy and security provided by this technology have been recently raised and analysed. As a result, the early common belief among the biometrics community of templates irreversibility has been proven wrong. It is now an accepted fact that it is possible to reconstruct from an unprotected template a synthetic sample that matches the bona fide one. This reverse engineering process, commonly referred to as \textit{inverse biometrics}, constitutes a severe threat for biometric systems from two different angles: on the one hand, sensitive personal data (i.e., biometric data) can be derived from compromised unprotected templates; on the other hand, other powerful attacks can be launched building upon these reconstructed samples. Given its important implications, biometric stakeholders have produced over the last fifteen years numerous works analysing the different aspects related to inverse biometrics: development of reconstruction algorithms for different characteristics; proposal of methodologies to assess the vulnerabilities of biometric systems to the aforementioned algorithms; development of countermeasures to reduce the possible effects of attacks. The present article is an effort to condense all this information in one comprehensive review of: the problem itself, the evaluation of the problem, and the mitigation of the problem. The present article is an effort to condense all this information in one comprehensive review of: the problem itself, the evaluation of the problem, and the mitigation of the problem.
△ Less
Submitted 5 January, 2024;
originally announced January 2024.
-
General Framework to Evaluate Unlinkability in Biometric Template Protection Systems
Authors:
Marta Gomez-Barrero,
Javier Galbally,
Christian Rathgeb,
Christoph Busch
Abstract:
The wide deployment of biometric recognition systems in the last two decades has raised privacy concerns regarding the storage and use of biometric data. As a consequence, the ISO/IEC 24745 international standard on biometric information protection has established two main requirements for protecting biometric templates: irreversibility and unlinkability. Numerous efforts have been directed to the…
▽ More
The wide deployment of biometric recognition systems in the last two decades has raised privacy concerns regarding the storage and use of biometric data. As a consequence, the ISO/IEC 24745 international standard on biometric information protection has established two main requirements for protecting biometric templates: irreversibility and unlinkability. Numerous efforts have been directed to the development and analysis of irreversible templates. However, there is still no systematic quantitative manner to analyse the unlinkability of such templates. In this paper we address this shortcoming by proposing a new general framework for the evaluation of biometric templates' unlinkability. To illustrate the potential of the approach, it is applied to assess the unlinkability of four state-of-the-art techniques for biometric template protection: biometric salting, Bloom filters, Homomorphic Encryption and block re-mapping. For the last technique, the proposed framework is compared with other existing metrics to show its advantages.
△ Less
Submitted 8 November, 2023;
originally announced November 2023.
-
Introduction to Presentation Attack Detection in Fingerprint Biometrics
Authors:
Javier Galbally,
Julian Fierrez,
Raffaele Cappelli,
Gian Luca Marcialis
Abstract:
This chapter provides an introduction to Presentation Attack Detection (PAD) in fingerprint biometrics, also coined anti-spoofing, describes early developments in this field, and briefly summarizes recent trends and open issues.
This chapter provides an introduction to Presentation Attack Detection (PAD) in fingerprint biometrics, also coined anti-spoofing, describes early developments in this field, and briefly summarizes recent trends and open issues.
△ Less
Submitted 14 February, 2023;
originally announced April 2023.
-
Evaluation of direct attacks to fingerprint verification systems
Authors:
J. Galbally,
J. Fierrez,
F. Alonso-Fernandez,
M. Martinez-Diaz
Abstract:
The vulnerabilities of fingerprint-based recognition systems to direct attacks with and without the cooperation of the user are studied. Two different systems, one minutiae-based and one ridge feature-based, are evaluated on a database of real and fake fingerprints. Based on the fingerprint images quality and on the results achieved on different operational scenarios, we obtain a number of statist…
▽ More
The vulnerabilities of fingerprint-based recognition systems to direct attacks with and without the cooperation of the user are studied. Two different systems, one minutiae-based and one ridge feature-based, are evaluated on a database of real and fake fingerprints. Based on the fingerprint images quality and on the results achieved on different operational scenarios, we obtain a number of statistically significant observations regarding the robustness of the systems.
△ Less
Submitted 14 December, 2022;
originally announced December 2022.
-
On the vulnerability of fingerprint verification systems to fake fingerprint attacks
Authors:
Javier Galbally,
Julian Fierrez-Aguilar,
Joaquin Rodriguez-Gonzalez,
Fernando Alonso-Fernandez,
Javier Ortega-Garcia,
Marino Tapiador
Abstract:
A new method to generate gummy fingers is presented. A medium-size fake fingerprint database is described and two different fingerprint verification systems are evaluated on it. Three different scenarios are considered in the experiments, namely: enrollment and test with real fingerprints, enrollment and test with fake fingerprints, and enrollment with real fingerprints and test with fake fingerpr…
▽ More
A new method to generate gummy fingers is presented. A medium-size fake fingerprint database is described and two different fingerprint verification systems are evaluated on it. Three different scenarios are considered in the experiments, namely: enrollment and test with real fingerprints, enrollment and test with fake fingerprints, and enrollment with real fingerprints and test with fake fingerprints. Results for an optical and a thermal sweeping sensors are given. Both systems are shown to be vulnerable to direct attacks.
△ Less
Submitted 11 July, 2022;
originally announced July 2022.
-
Fingerprint Liveness Detection Based on Quality Measures
Authors:
Javier Galbally,
Fernando Alonso-Fernandez,
Julian Fierrez,
Javier Ortega-Garcia
Abstract:
A new fingerprint parameterization for liveness detection based on quality measures is presented. The novel feature set is used in a complete liveness detection system and tested on the development set of the LivDET competition, comprising over 4,500 real and fake images acquired with three different optical sensors. The proposed solution proves to be robust to the multi-sensor scenario, and prese…
▽ More
A new fingerprint parameterization for liveness detection based on quality measures is presented. The novel feature set is used in a complete liveness detection system and tested on the development set of the LivDET competition, comprising over 4,500 real and fake images acquired with three different optical sensors. The proposed solution proves to be robust to the multi-sensor scenario, and presents an overall rate of 93% of correctly classified samples. Furthermore, the liveness detection method presented has the added advantage over previously studied techniques of needing just one image from a finger to decide whether it is real or fake.
△ Less
Submitted 11 July, 2022;
originally announced July 2022.
-
Introduction to Presentation Attack Detection in Iris Biometrics and Recent Advances
Authors:
Aythami Morales,
Julian Fierrez,
Javier Galbally,
Marta Gomez-Barrero
Abstract:
Iris recognition technology has attracted an increasing interest in the last decades in which we have witnessed a migration from research laboratories to real world applications. The deployment of this technology raises questions about the main vulnerabilities and security threats related to these systems. Among these threats presentation attacks stand out as some of the most relevant and studied.…
▽ More
Iris recognition technology has attracted an increasing interest in the last decades in which we have witnessed a migration from research laboratories to real world applications. The deployment of this technology raises questions about the main vulnerabilities and security threats related to these systems. Among these threats presentation attacks stand out as some of the most relevant and studied. Presentation attacks can be defined as presentation of human characteristics or artifacts directly to the capture device of a biometric system trying to interfere its normal operation. In the case of the iris, these attacks include the use of real irises as well as artifacts with different level of sophistication such as photographs or videos. This chapter introduces iris Presentation Attack Detection (PAD) methods that have been developed to reduce the risk posed by presentation attacks. First, we summarise the most popular types of attacks including the main challenges to address. Secondly, we present a taxonomy of Presentation Attack Detection methods as a brief introduction to this very active research area. Finally, we discuss the integration of these methods into Iris Recognition Systems according to the most important scenarios of practical application.
△ Less
Submitted 24 November, 2021;
originally announced November 2021.
-
Introduction to Presentation Attack Detection in Face Biometrics and Recent Advances
Authors:
Javier Hernandez-Ortega,
Julian Fierrez,
Aythami Morales,
Javier Galbally
Abstract:
The main scope of this chapter is to serve as an introduction to face presentation attack detection, including key resources and advances in the field in the last few years. The next pages present the different presentation attacks that a face recognition system can confront, in which an attacker presents to the sensor, mainly a camera, a Presentation Attack Instrument (PAI), that is generally a p…
▽ More
The main scope of this chapter is to serve as an introduction to face presentation attack detection, including key resources and advances in the field in the last few years. The next pages present the different presentation attacks that a face recognition system can confront, in which an attacker presents to the sensor, mainly a camera, a Presentation Attack Instrument (PAI), that is generally a photograph, a video, or a mask, to try to impersonate a genuine user. First, we make an introduction of the current status of face recognition, its level of deployment, and its challenges. In addition, we present the vulnerabilities and the possible attacks that a face recognition system may be exposed to, showing that way the high importance of presentation attack detection methods. We review different types of presentation attack methods, from simpler to more complex ones, and in which cases they could be effective. Then, we summarize the most popular presentation attack detection methods to deal with these attacks. Finally, we introduce public datasets used by the research community for exploring vulnerabilities of face biometrics to presentation attacks and developing effective countermeasures against known PAIs.
△ Less
Submitted 26 November, 2021; v1 submitted 23 November, 2021;
originally announced November 2021.
-
The Multiscenario Multienvironment BioSecure Multimodal Database (BMDB)
Authors:
Javier Ortega-Garcia,
Julian Fierrez,
Fernando Alonso-Fernandez,
Javier Galbally,
Manuel R Freire,
Joaquin Gonzalez-Rodriguez,
Carmen Garcia-Mateo,
Jose-Luis Alba-Castro,
Elisardo Gonzalez-Agulla,
Enrique Otero-Muras,
Sonia Garcia-Salicetti,
Lorene Allano,
Bao Ly-Van,
Bernadette Dorizzi,
Josef Kittler,
Thirimachos Bourlai,
Norman Poh,
Farzin Deravi,
Ming NR Ng,
Michael Fairhurst,
Jean Hennebert,
Andreas Humm,
Massimo Tistarelli,
Linda Brodo,
Jonas Richiardi
, et al. (7 additional authors not shown)
Abstract:
A new multimodal biometric database designed and acquired within the framework of the European BioSecure Network of Excellence is presented. It is comprised of more than 600 individuals acquired simultaneously in three scenarios: 1) over the Internet, 2) in an office environment with desktop PC, and 3) in indoor/outdoor environments with mobile portable hardware. The three scenarios include a comm…
▽ More
A new multimodal biometric database designed and acquired within the framework of the European BioSecure Network of Excellence is presented. It is comprised of more than 600 individuals acquired simultaneously in three scenarios: 1) over the Internet, 2) in an office environment with desktop PC, and 3) in indoor/outdoor environments with mobile portable hardware. The three scenarios include a common part of audio/video data. Also, signature and fingerprint data have been acquired both with desktop PC and mobile portable hardware. Additionally, hand and iris data were acquired in the second scenario using desktop PC. Acquisition has been conducted by 11 European institutions. Additional features of the BioSecure Multimodal Database (BMDB) are: two acquisition sessions, several sensors in certain modalities, balanced gender and age distributions, multimodal realistic scenarios with simple and quick tasks per modality, cross-European diversity, availability of demographic data, and compatibility with other multimodal databases. The novel acquisition conditions of the BMDB allow us to perform new challenging research and evaluation of either monomodal or multimodal biometric systems, as in the recent BioSecure Multimodal Evaluation campaign. A description of this campaign including baseline results of individual modalities from the new database is also given. The database is expected to be available for research purposes through the BioSecure Association during 2008
△ Less
Submitted 17 November, 2021;
originally announced November 2021.
-
BiosecurID: a multimodal biometric database
Authors:
Julian Fierrez,
Javier Galbally,
Javier Ortega-Garcia,
Manuel R Freire,
Fernando Alonso-Fernandez,
Daniel Ramos,
Doroteo Torre Toledano,
Joaquin Gonzalez-Rodriguez,
Juan A Siguenza,
Javier Garrido-Salas,
E Anguiano,
Guillermo Gonzalez-de-Rivera,
Ricardo Ribalda,
Marcos Faundez-Zanuy,
JA Ortega,
Valentín Cardeñoso-Payo,
A Viloria,
Carlos E Vivaracho,
Q Isaac Moro,
Juan J Igarza,
J Sanchez,
Inmaculada Hernaez,
Carlos Orrite-Urunuela,
Francisco Martinez-Contreras,
Juan José Gracia-Roche
Abstract:
A new multimodal biometric database, acquired in the framework of the BiosecurID project, is presented together with the description of the acquisition setup and protocol. The database includes eight unimodal biometric traits, namely: speech, iris, face (still images, videos of talking faces), handwritten signature and handwritten text (on-line dynamic signals, off-line scanned images), fingerprin…
▽ More
A new multimodal biometric database, acquired in the framework of the BiosecurID project, is presented together with the description of the acquisition setup and protocol. The database includes eight unimodal biometric traits, namely: speech, iris, face (still images, videos of talking faces), handwritten signature and handwritten text (on-line dynamic signals, off-line scanned images), fingerprints (acquired with two different sensors), hand (palmprint, contour-geometry) and keystroking. The database comprises 400 subjects and presents features such as: realistic acquisition scenario, balanced gender and population distributions, availability of information about particular demographic groups (age, gender, handedness), acquisition of replay attacks for speech and keystroking, skilled forgeries for signatures, and compatibility with other existing databases. All these characteristics make it very useful in research and development of unimodal and multimodal biometric systems.
△ Less
Submitted 2 November, 2021;
originally announced November 2021.
-
A high performance fingerprint liveness detection method based on quality related features
Authors:
Javier Galbally,
Fernando Alonso-Fernandez,
Julian Fierrez,
Javier Ortega-Garcia
Abstract:
A new software-based liveness detection approach using a novel fingerprint parameterization based on quality related features is proposed. The system is tested on a highly challenging database comprising over 10,500 real and fake images acquired with five sensors of different technologies and covering a wide range of direct attack scenarios in terms of materials and procedures followed to generate…
▽ More
A new software-based liveness detection approach using a novel fingerprint parameterization based on quality related features is proposed. The system is tested on a highly challenging database comprising over 10,500 real and fake images acquired with five sensors of different technologies and covering a wide range of direct attack scenarios in terms of materials and procedures followed to generate the gummy fingers. The proposed solution proves to be robust to the multi-scenario dataset, and presents an overall rate of 90% correctly classified samples. Furthermore, the liveness detection method presented has the added advantage over previously studied techniques of needing just one image from a finger to decide whether it is real or fake. This last characteristic provides the method with very valuable features as it makes it less intrusive, more user friendly, faster and reduces its implementation costs.
△ Less
Submitted 2 November, 2021;
originally announced November 2021.
-
Direct attacks using fake images in iris verification
Authors:
Virginia Ruiz-Albacete,
Pedro Tome-Gonzalez,
Fernando Alonso-Fernandez,
Javier Galbally,
Julian Fierrez,
Javier Ortega-Garcia
Abstract:
In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris of the BioSec baseline database. Iris images are printed using a commercial printer and then, presented at the iris sensor. We use for our experiments a publicly available iris recognition system, which some modifications to impro…
▽ More
In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris of the BioSec baseline database. Iris images are printed using a commercial printer and then, presented at the iris sensor. We use for our experiments a publicly available iris recognition system, which some modifications to improve the iris segmentation step. Based on results achieved on different operational scenarios, we show that the system is vulnerable to direct attacks, pointing out the importance of having countermeasures against this type of fraudulent actions.
△ Less
Submitted 30 October, 2021;
originally announced November 2021.
-
SVC-onGoing: Signature Verification Competition
Authors:
Ruben Tolosana,
Ruben Vera-Rodriguez,
Carlos Gonzalez-Garcia,
Julian Fierrez,
Aythami Morales,
Javier Ortega-Garcia,
Juan Carlos Ruiz-Garcia,
Sergio Romero-Tapiador,
Santiago Rengifo,
Miguel Caruana,
Jiajia Jiang,
Songxuan Lai,
Lianwen Jin,
Yecheng Zhu,
Javier Galbally,
Moises Diaz,
Miguel Angel Ferrer,
Marta Gomez-Barrero,
Ilya Hodashinsky,
Konstantin Sarin,
Artem Slezkin,
Marina Bardamova,
Mikhail Svetlakov,
Mohammad Saleem,
Cintia Lia Szucs
, et al. (7 additional authors not shown)
Abstract:
This article presents SVC-onGoing, an on-going competition for on-line signature verification where researchers can easily benchmark their systems against the state of the art in an open common platform using large-scale public databases, such as DeepSignDB and SVC2021_EvalDB, and standard experimental protocols. SVC-onGoing is based on the ICDAR 2021 Competition on On-Line Signature Verification…
▽ More
This article presents SVC-onGoing, an on-going competition for on-line signature verification where researchers can easily benchmark their systems against the state of the art in an open common platform using large-scale public databases, such as DeepSignDB and SVC2021_EvalDB, and standard experimental protocols. SVC-onGoing is based on the ICDAR 2021 Competition on On-Line Signature Verification (SVC 2021), which has been extended to allow participants anytime. The goal of SVC-onGoing is to evaluate the limits of on-line signature verification systems on popular scenarios (office/mobile) and writing inputs (stylus/finger) through large-scale public databases. Three different tasks are considered in the competition, simulating realistic scenarios as both random and skilled forgeries are simultaneously considered on each task. The results obtained in SVC-onGoing prove the high potential of deep learning methods in comparison with traditional methods. In particular, the best signature verification system has obtained Equal Error Rate (EER) values of 3.33% (Task 1), 7.41% (Task 2), and 6.04% (Task 3). Future studies in the field should be oriented to improve the performance of signature verification systems on the challenging mobile scenarios of SVC-onGoing in which several mobile devices and the finger are used during the signature acquisition.
△ Less
Submitted 22 February, 2022; v1 submitted 13 August, 2021;
originally announced August 2021.
-
ICDAR 2021 Competition on On-Line Signature Verification
Authors:
Ruben Tolosana,
Ruben Vera-Rodriguez,
Carlos Gonzalez-Garcia,
Julian Fierrez,
Santiago Rengifo,
Aythami Morales,
Javier Ortega-Garcia,
Juan Carlos Ruiz-Garcia,
Sergio Romero-Tapiador,
Jiajia Jiang,
Songxuan Lai,
Lianwen Jin,
Yecheng Zhu,
Javier Galbally,
Moises Diaz,
Miguel Angel Ferrer,
Marta Gomez-Barrero,
Ilya Hodashinsky,
Konstantin Sarin,
Artem Slezkin,
Marina Bardamova,
Mikhail Svetlakov,
Mohammad Saleem,
Cintia Lia Szücs,
Bence Kovari
, et al. (6 additional authors not shown)
Abstract:
This paper describes the experimental framework and results of the ICDAR 2021 Competition on On-Line Signature Verification (SVC 2021). The goal of SVC 2021 is to evaluate the limits of on-line signature verification systems on popular scenarios (office/mobile) and writing inputs (stylus/finger) through large-scale public databases. Three different tasks are considered in the competition, simulati…
▽ More
This paper describes the experimental framework and results of the ICDAR 2021 Competition on On-Line Signature Verification (SVC 2021). The goal of SVC 2021 is to evaluate the limits of on-line signature verification systems on popular scenarios (office/mobile) and writing inputs (stylus/finger) through large-scale public databases. Three different tasks are considered in the competition, simulating realistic scenarios as both random and skilled forgeries are simultaneously considered on each task. The results obtained in SVC 2021 prove the high potential of deep learning methods. In particular, the best on-line signature verification system of SVC 2021 obtained Equal Error Rate (EER) values of 3.33% (Task 1), 7.41% (Task 2), and 6.04% (Task 3).
SVC 2021 will be established as an on-going competition, where researchers can easily benchmark their systems against the state of the art in an open common platform using large-scale public databases such as DeepSignDB and SVC2021_EvalDB, and standard experimental protocols.
△ Less
Submitted 1 June, 2021;
originally announced June 2021.
-
Face Image Quality Assessment: A Literature Survey
Authors:
Torsten Schlett,
Christian Rathgeb,
Olaf Henniger,
Javier Galbally,
Julian Fierrez,
Christoph Busch
Abstract:
The performance of face analysis and recognition systems depends on the quality of the acquired face data, which is influenced by numerous factors. Automatically assessing the quality of face data in terms of biometric utility can thus be useful to detect low-quality data and make decisions accordingly. This survey provides an overview of the face image quality assessment literature, which predomi…
▽ More
The performance of face analysis and recognition systems depends on the quality of the acquired face data, which is influenced by numerous factors. Automatically assessing the quality of face data in terms of biometric utility can thus be useful to detect low-quality data and make decisions accordingly. This survey provides an overview of the face image quality assessment literature, which predominantly focuses on visible wavelength face image input. A trend towards deep learning based methods is observed, including notable conceptual differences among the recent approaches, such as the integration of quality assessment into face recognition models. Besides image selection, face image quality assessment can also be used in a variety of other application scenarios, which are discussed herein. Open issues and challenges are pointed out, i.a. highlighting the importance of comparability for algorithm evaluations, and the challenge for future work to create deep learning approaches that are interpretable in addition to providing accurate utility predictions.
△ Less
Submitted 25 October, 2021; v1 submitted 2 September, 2020;
originally announced September 2020.
-
Biometric Quality: Review and Application to Face Recognition with FaceQnet
Authors:
Javier Hernandez-Ortega,
Javier Galbally,
Julian Fierrez,
Laurent Beslay
Abstract:
"The output of a computerised system can only be as accurate as the information entered into it." This rather trivial statement is the basis behind one of the driving concepts in biometric recognition: biometric quality. Quality is nowadays widely regarded as the number one factor responsible for the good or bad performance of automated biometric systems. It refers to the ability of a biometric sa…
▽ More
"The output of a computerised system can only be as accurate as the information entered into it." This rather trivial statement is the basis behind one of the driving concepts in biometric recognition: biometric quality. Quality is nowadays widely regarded as the number one factor responsible for the good or bad performance of automated biometric systems. It refers to the ability of a biometric sample to be used for recognition purposes and produce consistent, accurate, and reliable results. Such a subjective term is objectively estimated by the so-called biometric quality metrics. These algorithms play nowadays a pivotal role in the correct functioning of systems, providing feedback to the users and working as invaluable audit tools. In spite of their unanimously accepted relevance, some of the most used and deployed biometric characteristics are lacking behind in the development of these methods. This is the case of face recognition. After a gentle introduction to the general topic of biometric quality and a review of past efforts in face quality metrics, in the present work, we address the need for better face quality metrics by developing FaceQnet. FaceQnet is a novel open-source face quality assessment tool, inspired and powered by deep learning technology, which assigns a scalar quality measure to facial images, as prediction of their recognition accuracy. Two versions of FaceQnet have been thoroughly evaluated both in this work and also independently by NIST, showing the soundness of the approach and its competitiveness with respect to current state-of-the-art metrics. Even though our work is presented here particularly in the framework of face biometrics, the proposed methodology for building a fully automated quality metric can be very useful and easily adapted to other artificial intelligence tasks.
△ Less
Submitted 28 February, 2021; v1 submitted 5 June, 2020;
originally announced June 2020.
-
FaceQnet: Quality Assessment for Face Recognition based on Deep Learning
Authors:
Javier Hernandez-Ortega,
Javier Galbally,
Julian Fierrez,
Rudolf Haraksim,
Laurent Beslay
Abstract:
In this paper we develop a Quality Assessment approach for face recognition based on deep learning. The method consists of a Convolutional Neural Network, FaceQnet, that is used to predict the suitability of a specific input image for face recognition purposes. The training of FaceQnet is done using the VGGFace2 database. We employ the BioLab-ICAO framework for labeling the VGGFace2 images with qu…
▽ More
In this paper we develop a Quality Assessment approach for face recognition based on deep learning. The method consists of a Convolutional Neural Network, FaceQnet, that is used to predict the suitability of a specific input image for face recognition purposes. The training of FaceQnet is done using the VGGFace2 database. We employ the BioLab-ICAO framework for labeling the VGGFace2 images with quality information related to their ICAO compliance level. The groundtruth quality labels are obtained using FaceNet to generate comparison scores. We employ the groundtruth data to fine-tune a ResNet-based CNN, making it capable of returning a numerical quality measure for each input image. Finally, we verify if the FaceQnet scores are suitable to predict the expected performance when employing a specific image for face recognition with a COTS face recognition system. Several conclusions can be drawn from this work, most notably: 1) we managed to employ an existing ICAO compliance framework and a pretrained CNN to automatically label data with quality information, 2) we trained FaceQnet for quality estimation by fine-tuning a pre-trained face recognition network (ResNet-50), and 3) we have shown that the predictions from FaceQnet are highly correlated with the face recognition accuracy of a state-of-the-art commercial system not used during development. FaceQnet is publicly available in GitHub.
△ Less
Submitted 4 April, 2019; v1 submitted 2 April, 2019;
originally announced April 2019.