SlideShare a Scribd company logo
1 of 17
Download to read offline
USING BENFORD’S LAW TO DETECT JPEG
BIOMETRIC DATA TAMPERING
Supervisor: Prof. Anthony TS Ho
Co-Supervisor: Dr. Norman Poh
Aamo Iorliam
PhD Student
University of Surrey
 Introduction
 Motivation
 Inspiration of Research
 Benford’s Law Overview
 Block-DCT Coefficients, JPEG coefficients and Experiments
 Data Sets
 Benford’s Law and Separability
 Tamper Detection using Benford’s Law Features with SVM
 Results for Performance Evaluation
 Conclusion
Overview
 Digital tampering of images has recently increased [1].
Digital Image Forensic Techniques
 Passive detection methods are applied to biometric data for analysis in
our research
Introduction
Digital Image Forensic
Techniques
Passive (blind) detection
Active detection
[1] A. Iorliam, A.T.S. Ho, N. Poh, and Y.Q. Shi, “Do Biometric Images Follow Benford’s Law?”
2nd International Workshop on Biometrics and Forensics (IWBF2014), Malta, 27-28th March, pp. 1-6, 2014
Motivation
 To detect insider attackers/hackers digital tampering of biometric
data when they have illegal/legal access to this sensitive data
 Differentiate between artificially printed fingerprints, optically
sensor generated fingerprints and synthetically generated
fingerprints.
 Hence protecting the integrity of stored biometric data (e.g.
fingerprint images and face images)
Inspiration of Research
InspirationofResearch
JPEG is the most widely used image format
Digital tampering of stored biometric samples is
becoming an important security concern
Possibility of intentional or accidental use of
particular fingerprints instead of another
fingerprints
Use Benford’s law divergence metric to differentiate
between different types of fingerprints
Use Benford’s law features with SVM to assist in
detection of tampered biometric fingerprint images
and face images
Benford’s Law Overview
Shortcoming
Could not prove why this
theory and formula
worked
Benford’s Law was discovered by
Simon Newcomb in 1881
Benford’s Law Overview Cont.
Why Benford Succeeded?
Analysed 20,229 observations.
. including surface of 335 rivers,
the size of 3259 US population etc
Frank Benford (1938) [2]
[2] F. Benford, “The law of anomalous numbers,” Proc. of the American Philosophical Society,
vol.78, pp. 551-572, 1938.
Benford’s Conclusion & Its Application
 Multi digit numbers beginning with 1, 2 or 3 appear more frequently than multi
digit numbers beginning with 4, 5, 6, 7, 8, and 9
 Therefore, he published the frequency in “The Law of Anomalous Numbers” [2]
 Application:
 Accounting fraud detection- Mark Nigrini, 1996 [3]
 Legal Status- used in the United States
Election Data- 2009 Iranian elections
Images processing- Jolion in 2001 [4], and several others
[2] F. Benford, “The law of anomalous numbers,” Proc. of the American Philosophical Society,
vol.78, pp. 551-572, 1938.
[3] M. Nigrini, A taxpayer compliance application of benford’s Law,
Journal of the American Taxation Association, vol. 1, pp.72–91, 1996.
[4] J.M. Jolion, Images and benford’s law, Journal of Mathematical Imaging and Vision,
14(1), pp. 73–81, 2001.
What Exactly is Benford’s Law?
 The probability of any number “𝑥𝑥”
from 1 through 9 being the first digit is
expressed as [5]:
 Generalised Benford’s Law: An
extension of Benford’s law
N is a normalization factor, s and q are
model parameters [6].
Probability distribution of Benford’s law
[5] T.P. Hill, “A statistical derivation of the significant-digit law,” Statistical Science papers (10), pp. 354-363, 1996.
[6] D. Fu, Y. Q. Shi, and W. Su, “A generalized Benford’s Law for JPEG coefficients and its applications in image forensics,” Proc. SPIE 6506,
1L1-1L11, 2007.
Block-DCT Coefficients, JPEG
Coefficients and Experiments
Experiments
 Investigate JPEG coefficients for optical sensor generated fingerprints images,
artificially printed latent fingerprint images and synthetic generated fingerprints
 To determine if they follow the generalised Benford’s law
 The divergence used to separate the different types of fingerprints is given as:
 Detect and localise tampered biometric regions with the help of MBFDF and
SVM [7]
Original
Image
8 X 8
Block-DCT Block-DCT
Coefficients
Quantization
JPEG
Coefficients
Entropy
Coding
JPEG
Bitstream
Block diagram of JPEG Compression
[7] X. H. Li, Y.Q. Zhao, M. Liao, F.Y. Shih, and Y.Q. Shi, Detection of Tampered region for JPEG images by using mode-based first digit features,
EURASIP Journal on Advances in Signal Processing 2012, 2012:190.
Data Sets
 80 grayscale fingerprint images from DB1, FVC2000
 80 grayscale synthetic fingerprint images from DB4, FVC2000 [8]
 48 Contact-less acquired latent fingerprints [9]
 Realistic tampering was performed on:
 10 face images from CASIA-FACEV5 [10]
 10 fingerprint images from DB1, FVC2000
[8] FVC2000 (2000), “Fingerprint verification competition databases,”
Available: http://bias.csr.unibo.it/fvc2000/databases.asp.
[9] Hildebrandt M, J. Sturm, J. Dittmann, and C. Vielhauer, “Creation of a
public corpus of contact-less acquired latent fingerprints without privacy
implications,” in Proc. CMS 2013, LNCS 8099, Magdeburg, Germany,
September 2013, 2013, pp. 204–206.
[10] CASIA-FACEV5 (2010), “ Biometric Ideal Test,” Available:
http://www.idealtest.org/dbDetailForUser.do?id=9
Benford’s law and Separability Results
Divergence for singly compressed optically captured, synthetically generated fingerprints and contact-less acquired latent fingerprints
a. optically captured fingerprint closely follow generalised Benford’s law at QF=100
b. synthetically generated fingerprints closely follow generalised Benford’s law at QF=100
c. contact-less acquired latent fingerprints follow generalised Benford’s law at QF=100 except at digit 1
Tamper Detection Using Benford’s law Features
 The fingerprint images for our experiment are as follows:
(a) (b) (c)
Fingerprint image: (a) JPEG compressed at QF=80, (b) JPEG compressed at QF=50, (c) center portion of (a) replaced with
center portion from (b).
(a) (b) (c)
Fingerprint image: (a) un-tampered; (b) un-tampered; (c) Tampered detection with the help of MBFDF and SVM
Tamper Detection Using Benford’s law Features
 The face images for our experiment are as follows:
(a) (b) (c)
Face image: (a) JPEG compressed at QF=100, (b) JPEG compressed at QF=100, (c) Eyes and nose of (a) replaced with eyes and
nose from (b).
(a) (b) (c) (d)
Face image: (a) tampered; (b) detected; (c) tampered; (d) detected.
Results for Performance Evaluation
 At the image level an EER of 0.00% was achieved.
 At the block-level an EER of 16.67% was achieved for the fingerprint images
and 1.5% for the face images.
0.10.2 0.5 1 2 5 10 20 40 60
0.1
0.2
0.5
1
2
5
10
20
40
60
FAR [%]
FRR[%]
DET
DET curve of the block-level tampering detection for: (a) 10 fingerprint images ; (b) 10 face images
(a) (b)
Conclusion
 The digital tampering of JPEG biometric databases is attracting much attention
from the research community and presents some real challenges in protecting
the authenticity of biometric databases for legal applications
 Digital tampering of biometric fingerprint images and face images was
performed using Photoshop
 Benford’s law divergence metric successfully separated three fingerprint
databases
 Benford’s law features and SVM were successfully used to detect and localise
tampering of fingerprint images and face images.
 This will assist in protecting the integrity of stored biometric data.
Thank you very much
For your attention
Questions and comments
are welcome

More Related Content

What's hot

ITM Ph.D. IPET written test
ITM Ph.D. IPET written testITM Ph.D. IPET written test
ITM Ph.D. IPET written testcollegedocuments
 
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...journalBEEI
 
CANCER CELL DETECTION USING DIGITAL IMAGE PROCESSING
CANCER  CELL  DETECTION USING DIGITAL IMAGE PROCESSINGCANCER  CELL  DETECTION USING DIGITAL IMAGE PROCESSING
CANCER CELL DETECTION USING DIGITAL IMAGE PROCESSINGkajikho9
 
Defect detection and classification of printed circuit board using MATLAB
Defect detection and classification of printed circuit board using MATLABDefect detection and classification of printed circuit board using MATLAB
Defect detection and classification of printed circuit board using MATLABIRJET Journal
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...CSCJournals
 
A review on digital image processing paper
A review on digital image processing paperA review on digital image processing paper
A review on digital image processing paperCharlie716895
 
Lec14: Evaluation Framework for Medical Image Segmentation
Lec14: Evaluation Framework for Medical Image SegmentationLec14: Evaluation Framework for Medical Image Segmentation
Lec14: Evaluation Framework for Medical Image SegmentationUlaş Bağcı
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extractioniosrjce
 
Lec5: Pre-Processing Medical Images (III) (MRI Intensity Standardization)
Lec5: Pre-Processing Medical Images (III) (MRI Intensity Standardization)Lec5: Pre-Processing Medical Images (III) (MRI Intensity Standardization)
Lec5: Pre-Processing Medical Images (III) (MRI Intensity Standardization)Ulaş Bağcı
 
Biomedical image processing ppt
Biomedical image processing pptBiomedical image processing ppt
Biomedical image processing pptPriyanka Goswami
 
A supervised lung nodule classification method using patch based context anal...
A supervised lung nodule classification method using patch based context anal...A supervised lung nodule classification method using patch based context anal...
A supervised lung nodule classification method using patch based context anal...ASWATHY VG
 
Automatic detection of lung cancer in ct images
Automatic detection of lung cancer in ct imagesAutomatic detection of lung cancer in ct images
Automatic detection of lung cancer in ct imageseSAT Publishing House
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Lec13: Clustering Based Medical Image Segmentation Methods
Lec13: Clustering Based Medical Image Segmentation MethodsLec13: Clustering Based Medical Image Segmentation Methods
Lec13: Clustering Based Medical Image Segmentation MethodsUlaş Bağcı
 
IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...
IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...
IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...IRJET Journal
 
DIGITAL VIDEO SOURCE IDENTIFICATION BASED ON GREEN-CHANNEL PHOTO RESPONSE NON...
DIGITAL VIDEO SOURCE IDENTIFICATION BASED ON GREEN-CHANNEL PHOTO RESPONSE NON...DIGITAL VIDEO SOURCE IDENTIFICATION BASED ON GREEN-CHANNEL PHOTO RESPONSE NON...
DIGITAL VIDEO SOURCE IDENTIFICATION BASED ON GREEN-CHANNEL PHOTO RESPONSE NON...csandit
 
Insight toolkit을 이용한 삼차원 흉부 CT 영상분석 및 폐결절 검출 시스템
Insight toolkit을 이용한 삼차원 흉부 CT 영상분석 및 폐결절 검출 시스템Insight toolkit을 이용한 삼차원 흉부 CT 영상분석 및 폐결절 검출 시스템
Insight toolkit을 이용한 삼차원 흉부 CT 영상분석 및 폐결절 검출 시스템Wookjin Choi
 

What's hot (20)

ITM Ph.D. IPET written test
ITM Ph.D. IPET written testITM Ph.D. IPET written test
ITM Ph.D. IPET written test
 
Bio medical image processing
Bio medical image processingBio medical image processing
Bio medical image processing
 
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
 
P180203105108
P180203105108P180203105108
P180203105108
 
CANCER CELL DETECTION USING DIGITAL IMAGE PROCESSING
CANCER  CELL  DETECTION USING DIGITAL IMAGE PROCESSINGCANCER  CELL  DETECTION USING DIGITAL IMAGE PROCESSING
CANCER CELL DETECTION USING DIGITAL IMAGE PROCESSING
 
Defect detection and classification of printed circuit board using MATLAB
Defect detection and classification of printed circuit board using MATLABDefect detection and classification of printed circuit board using MATLAB
Defect detection and classification of printed circuit board using MATLAB
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
 
A review on digital image processing paper
A review on digital image processing paperA review on digital image processing paper
A review on digital image processing paper
 
Lec14: Evaluation Framework for Medical Image Segmentation
Lec14: Evaluation Framework for Medical Image SegmentationLec14: Evaluation Framework for Medical Image Segmentation
Lec14: Evaluation Framework for Medical Image Segmentation
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extraction
 
Lec5: Pre-Processing Medical Images (III) (MRI Intensity Standardization)
Lec5: Pre-Processing Medical Images (III) (MRI Intensity Standardization)Lec5: Pre-Processing Medical Images (III) (MRI Intensity Standardization)
Lec5: Pre-Processing Medical Images (III) (MRI Intensity Standardization)
 
Biomedical image processing ppt
Biomedical image processing pptBiomedical image processing ppt
Biomedical image processing ppt
 
A supervised lung nodule classification method using patch based context anal...
A supervised lung nodule classification method using patch based context anal...A supervised lung nodule classification method using patch based context anal...
A supervised lung nodule classification method using patch based context anal...
 
Automatic detection of lung cancer in ct images
Automatic detection of lung cancer in ct imagesAutomatic detection of lung cancer in ct images
Automatic detection of lung cancer in ct images
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Lec13: Clustering Based Medical Image Segmentation Methods
Lec13: Clustering Based Medical Image Segmentation MethodsLec13: Clustering Based Medical Image Segmentation Methods
Lec13: Clustering Based Medical Image Segmentation Methods
 
IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...
IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...
IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...
 
DIGITAL VIDEO SOURCE IDENTIFICATION BASED ON GREEN-CHANNEL PHOTO RESPONSE NON...
DIGITAL VIDEO SOURCE IDENTIFICATION BASED ON GREEN-CHANNEL PHOTO RESPONSE NON...DIGITAL VIDEO SOURCE IDENTIFICATION BASED ON GREEN-CHANNEL PHOTO RESPONSE NON...
DIGITAL VIDEO SOURCE IDENTIFICATION BASED ON GREEN-CHANNEL PHOTO RESPONSE NON...
 
Insight toolkit을 이용한 삼차원 흉부 CT 영상분석 및 폐결절 검출 시스템
Insight toolkit을 이용한 삼차원 흉부 CT 영상분석 및 폐결절 검출 시스템Insight toolkit을 이용한 삼차원 흉부 CT 영상분석 및 폐결절 검출 시스템
Insight toolkit을 이용한 삼차원 흉부 CT 영상분석 및 폐결절 검출 시스템
 

Similar to DAY1_ELIZABETHWINDSOR_1130_USINGBENFORDSLAW

Improvement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition ProcessImprovement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition Processijbbjournal
 
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESSIMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESSADEIJ Journal
 
researchconclavenitish-220715141929-be03069b (1).pptx
researchconclavenitish-220715141929-be03069b (1).pptxresearchconclavenitish-220715141929-be03069b (1).pptx
researchconclavenitish-220715141929-be03069b (1).pptxNiharikaDubey17
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour FeaturesIRJET Journal
 
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...sipij
 
CS201.Lect02.ComputerVision and its function.ppt
CS201.Lect02.ComputerVision and its function.pptCS201.Lect02.ComputerVision and its function.ppt
CS201.Lect02.ComputerVision and its function.pptrajmannapronoy
 
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGMULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGsipij
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
Multimodal Biometrics Recognition from Facial Video via Deep Learning
Multimodal Biometrics Recognition from Facial Video via Deep Learning Multimodal Biometrics Recognition from Facial Video via Deep Learning
Multimodal Biometrics Recognition from Facial Video via Deep Learning cscpconf
 
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGMULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGcsandit
 
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...CSCJournals
 
Real-time face detection in digital video-based on Viola-Jones supported by c...
Real-time face detection in digital video-based on Viola-Jones supported by c...Real-time face detection in digital video-based on Viola-Jones supported by c...
Real-time face detection in digital video-based on Viola-Jones supported by c...IJECEIAES
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...CSCJournals
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionNEERAJ BAGHEL
 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detectionijitjournal
 

Similar to DAY1_ELIZABETHWINDSOR_1130_USINGBENFORDSLAW (20)

Image Forgery Detection
Image Forgery DetectionImage Forgery Detection
Image Forgery Detection
 
Improvement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition ProcessImprovement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition Process
 
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESSIMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
 
researchconclavenitish-220715141929-be03069b (1).pptx
researchconclavenitish-220715141929-be03069b (1).pptxresearchconclavenitish-220715141929-be03069b (1).pptx
researchconclavenitish-220715141929-be03069b (1).pptx
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour Features
 
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
 
winter project
winter projectwinter project
winter project
 
CS201.Lect02.ComputerVision and its function.ppt
CS201.Lect02.ComputerVision and its function.pptCS201.Lect02.ComputerVision and its function.ppt
CS201.Lect02.ComputerVision and its function.ppt
 
N010226872
N010226872N010226872
N010226872
 
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGMULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Multimodal Biometrics Recognition from Facial Video via Deep Learning
Multimodal Biometrics Recognition from Facial Video via Deep Learning Multimodal Biometrics Recognition from Facial Video via Deep Learning
Multimodal Biometrics Recognition from Facial Video via Deep Learning
 
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGMULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNING
 
G0333946
G0333946G0333946
G0333946
 
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
 
Real-time face detection in digital video-based on Viola-Jones supported by c...
Real-time face detection in digital video-based on Viola-Jones supported by c...Real-time face detection in digital video-based on Viola-Jones supported by c...
Real-time face detection in digital video-based on Viola-Jones supported by c...
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detection
 

DAY1_ELIZABETHWINDSOR_1130_USINGBENFORDSLAW

  • 1. USING BENFORD’S LAW TO DETECT JPEG BIOMETRIC DATA TAMPERING Supervisor: Prof. Anthony TS Ho Co-Supervisor: Dr. Norman Poh Aamo Iorliam PhD Student University of Surrey
  • 2.  Introduction  Motivation  Inspiration of Research  Benford’s Law Overview  Block-DCT Coefficients, JPEG coefficients and Experiments  Data Sets  Benford’s Law and Separability  Tamper Detection using Benford’s Law Features with SVM  Results for Performance Evaluation  Conclusion Overview
  • 3.  Digital tampering of images has recently increased [1]. Digital Image Forensic Techniques  Passive detection methods are applied to biometric data for analysis in our research Introduction Digital Image Forensic Techniques Passive (blind) detection Active detection [1] A. Iorliam, A.T.S. Ho, N. Poh, and Y.Q. Shi, “Do Biometric Images Follow Benford’s Law?” 2nd International Workshop on Biometrics and Forensics (IWBF2014), Malta, 27-28th March, pp. 1-6, 2014
  • 4. Motivation  To detect insider attackers/hackers digital tampering of biometric data when they have illegal/legal access to this sensitive data  Differentiate between artificially printed fingerprints, optically sensor generated fingerprints and synthetically generated fingerprints.  Hence protecting the integrity of stored biometric data (e.g. fingerprint images and face images)
  • 5. Inspiration of Research InspirationofResearch JPEG is the most widely used image format Digital tampering of stored biometric samples is becoming an important security concern Possibility of intentional or accidental use of particular fingerprints instead of another fingerprints Use Benford’s law divergence metric to differentiate between different types of fingerprints Use Benford’s law features with SVM to assist in detection of tampered biometric fingerprint images and face images
  • 6. Benford’s Law Overview Shortcoming Could not prove why this theory and formula worked Benford’s Law was discovered by Simon Newcomb in 1881
  • 7. Benford’s Law Overview Cont. Why Benford Succeeded? Analysed 20,229 observations. . including surface of 335 rivers, the size of 3259 US population etc Frank Benford (1938) [2] [2] F. Benford, “The law of anomalous numbers,” Proc. of the American Philosophical Society, vol.78, pp. 551-572, 1938.
  • 8. Benford’s Conclusion & Its Application  Multi digit numbers beginning with 1, 2 or 3 appear more frequently than multi digit numbers beginning with 4, 5, 6, 7, 8, and 9  Therefore, he published the frequency in “The Law of Anomalous Numbers” [2]  Application:  Accounting fraud detection- Mark Nigrini, 1996 [3]  Legal Status- used in the United States Election Data- 2009 Iranian elections Images processing- Jolion in 2001 [4], and several others [2] F. Benford, “The law of anomalous numbers,” Proc. of the American Philosophical Society, vol.78, pp. 551-572, 1938. [3] M. Nigrini, A taxpayer compliance application of benford’s Law, Journal of the American Taxation Association, vol. 1, pp.72–91, 1996. [4] J.M. Jolion, Images and benford’s law, Journal of Mathematical Imaging and Vision, 14(1), pp. 73–81, 2001.
  • 9. What Exactly is Benford’s Law?  The probability of any number “𝑥𝑥” from 1 through 9 being the first digit is expressed as [5]:  Generalised Benford’s Law: An extension of Benford’s law N is a normalization factor, s and q are model parameters [6]. Probability distribution of Benford’s law [5] T.P. Hill, “A statistical derivation of the significant-digit law,” Statistical Science papers (10), pp. 354-363, 1996. [6] D. Fu, Y. Q. Shi, and W. Su, “A generalized Benford’s Law for JPEG coefficients and its applications in image forensics,” Proc. SPIE 6506, 1L1-1L11, 2007.
  • 10. Block-DCT Coefficients, JPEG Coefficients and Experiments Experiments  Investigate JPEG coefficients for optical sensor generated fingerprints images, artificially printed latent fingerprint images and synthetic generated fingerprints  To determine if they follow the generalised Benford’s law  The divergence used to separate the different types of fingerprints is given as:  Detect and localise tampered biometric regions with the help of MBFDF and SVM [7] Original Image 8 X 8 Block-DCT Block-DCT Coefficients Quantization JPEG Coefficients Entropy Coding JPEG Bitstream Block diagram of JPEG Compression [7] X. H. Li, Y.Q. Zhao, M. Liao, F.Y. Shih, and Y.Q. Shi, Detection of Tampered region for JPEG images by using mode-based first digit features, EURASIP Journal on Advances in Signal Processing 2012, 2012:190.
  • 11. Data Sets  80 grayscale fingerprint images from DB1, FVC2000  80 grayscale synthetic fingerprint images from DB4, FVC2000 [8]  48 Contact-less acquired latent fingerprints [9]  Realistic tampering was performed on:  10 face images from CASIA-FACEV5 [10]  10 fingerprint images from DB1, FVC2000 [8] FVC2000 (2000), “Fingerprint verification competition databases,” Available: http://bias.csr.unibo.it/fvc2000/databases.asp. [9] Hildebrandt M, J. Sturm, J. Dittmann, and C. Vielhauer, “Creation of a public corpus of contact-less acquired latent fingerprints without privacy implications,” in Proc. CMS 2013, LNCS 8099, Magdeburg, Germany, September 2013, 2013, pp. 204–206. [10] CASIA-FACEV5 (2010), “ Biometric Ideal Test,” Available: http://www.idealtest.org/dbDetailForUser.do?id=9
  • 12. Benford’s law and Separability Results Divergence for singly compressed optically captured, synthetically generated fingerprints and contact-less acquired latent fingerprints a. optically captured fingerprint closely follow generalised Benford’s law at QF=100 b. synthetically generated fingerprints closely follow generalised Benford’s law at QF=100 c. contact-less acquired latent fingerprints follow generalised Benford’s law at QF=100 except at digit 1
  • 13. Tamper Detection Using Benford’s law Features  The fingerprint images for our experiment are as follows: (a) (b) (c) Fingerprint image: (a) JPEG compressed at QF=80, (b) JPEG compressed at QF=50, (c) center portion of (a) replaced with center portion from (b). (a) (b) (c) Fingerprint image: (a) un-tampered; (b) un-tampered; (c) Tampered detection with the help of MBFDF and SVM
  • 14. Tamper Detection Using Benford’s law Features  The face images for our experiment are as follows: (a) (b) (c) Face image: (a) JPEG compressed at QF=100, (b) JPEG compressed at QF=100, (c) Eyes and nose of (a) replaced with eyes and nose from (b). (a) (b) (c) (d) Face image: (a) tampered; (b) detected; (c) tampered; (d) detected.
  • 15. Results for Performance Evaluation  At the image level an EER of 0.00% was achieved.  At the block-level an EER of 16.67% was achieved for the fingerprint images and 1.5% for the face images. 0.10.2 0.5 1 2 5 10 20 40 60 0.1 0.2 0.5 1 2 5 10 20 40 60 FAR [%] FRR[%] DET DET curve of the block-level tampering detection for: (a) 10 fingerprint images ; (b) 10 face images (a) (b)
  • 16. Conclusion  The digital tampering of JPEG biometric databases is attracting much attention from the research community and presents some real challenges in protecting the authenticity of biometric databases for legal applications  Digital tampering of biometric fingerprint images and face images was performed using Photoshop  Benford’s law divergence metric successfully separated three fingerprint databases  Benford’s law features and SVM were successfully used to detect and localise tampering of fingerprint images and face images.  This will assist in protecting the integrity of stored biometric data.
  • 17. Thank you very much For your attention Questions and comments are welcome