2015
Authors
Kandaswamy, C; Silva, LM; Cardoso, JS;
Publication
PATTERN RECOGNITION AND IMAGE ANALYSIS (IBPRIA 2015)
Abstract
Deep Transfer Learning (DTL) emerged as a new paradigm in machine learning in which a deep model is trained on a source task and the knowledge acquired is then totally or partially transferred to help in solving a target task. Even though DTL offers a greater flexibility in extracting high-level features and enabling feature transference from a source to a target task, the DTL solution might get stuck at local minima leading to performance degradation-negative transference-, similar to what happens in the classical machine learning approach. In this paper, we propose the Source-Target-Source (STS) methodology to reduce the impact of negative transference, by iteratively switching between source and target tasks in the training process. The results show the effectiveness of such approach.
2015
Authors
Paredes, R; Cardoso, JS; Pardo, XM;
Publication
IbPRIA
Abstract
2015
Authors
Sequeira, AF; Cardoso, JS;
Publication
SENSORS
Abstract
Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.
2015
Authors
Paredes, R; Cardoso, JS; Pardo, XM;
Publication
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Abstract
2015
Authors
Bifet, A; May, M; Zadrozny, B; Gavaldà, R; Pedreschi, D; Bonchi, F; Cardoso, JS; Spiliopoulou, M;
Publication
ECML/PKDD (3)
Abstract
2015
Authors
Micó, L; Sanches, JM; Cardoso, JS;
Publication
Neurocomputing
Abstract
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.