Watchlist Risk Assessment using Multiparametric Cost and Relative
Entropy
- URL: http://arxiv.org/abs/2007.11328v1
- Date: Wed, 22 Jul 2020 10:27:53 GMT
- Title: Watchlist Risk Assessment using Multiparametric Cost and Relative
Entropy
- Authors: K. Lai and S.N. Yanushkevich
- Abstract summary: We propose a multiparametric cost assessment and relative entropy measures as risk detectors.
We experimentally demonstrate the effects of mis-identification and impersonation under various watchlist screening scenarios and constraints.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: This paper addresses the facial biometric-enabled watchlist technology in
which risk detectors are mandatory mechanisms for early detection of threats,
as well as for avoiding offense to innocent travelers. We propose a
multiparametric cost assessment and relative entropy measures as risk
detectors. We experimentally demonstrate the effects of mis-identification and
impersonation under various watchlist screening scenarios and constraints. The
key contributions of this paper are the novel techniques for design and
analysis of the biometric-enabled watchlist and the supporting infrastructure,
as well as measuring the impersonation impact on e-border performance.
Related papers
- Accuracy Limits as a Barrier to Biometric System Security [0.8249694498830561]
The False Match Rate FMR is a key metric for assessing the accuracy and reliability of biometric systems.
This paper analyzes biometric systems based on their FMR, with two main contributions.
arXiv Detail & Related papers (2024-12-17T17:10:02Z) - A Human-Centered Risk Evaluation of Biometric Systems Using Conjoint Analysis [0.6199770411242359]
This paper presents a novel human-centered risk evaluation framework using conjoint analysis to quantify the impact of risk factors, such as surveillance cameras, on attacker's motivation.
Our framework calculates risk values incorporating the False Acceptance Rate (FAR) and attack probability, allowing comprehensive comparisons across use cases.
arXiv Detail & Related papers (2024-09-17T14:18:21Z) - EARBench: Towards Evaluating Physical Risk Awareness for Task Planning of Foundation Model-based Embodied AI Agents [53.717918131568936]
Embodied artificial intelligence (EAI) integrates advanced AI models into physical entities for real-world interaction.
Foundation models as the "brain" of EAI agents for high-level task planning have shown promising results.
However, the deployment of these agents in physical environments presents significant safety challenges.
This study introduces EARBench, a novel framework for automated physical risk assessment in EAI scenarios.
arXiv Detail & Related papers (2024-08-08T13:19:37Z) - Principles of Designing Robust Remote Face Anti-Spoofing Systems [60.05766968805833]
This paper sheds light on the vulnerabilities of state-of-the-art face anti-spoofing methods against digital attacks.
It presents a comprehensive taxonomy of common threats encountered in face anti-spoofing systems.
arXiv Detail & Related papers (2024-06-06T02:05:35Z) - Reversing the Irreversible: A Survey on Inverse Biometrics [1.9933615728711718]
It is now an accepted fact that it is possible to reconstruct from an unprotected template a synthetic sample that matches the bona fide one.
This reverse engineering process constitutes a severe threat for biometric systems from two different angles.
Biometric stakeholders have produced over the last fifteen years numerous works analysing the different aspects related to inverse biometrics.
arXiv Detail & Related papers (2024-01-05T15:32:40Z) - AI-Based Energy Transportation Safety: Pipeline Radial Threat Estimation
Using Intelligent Sensing System [52.93806509364342]
This paper proposes a radial threat estimation method for energy pipelines based on distributed optical fiber sensing technology.
We introduce a continuous multi-view and multi-domain feature fusion methodology to extract comprehensive signal features.
We incorporate the concept of transfer learning through a pre-trained model, enhancing both recognition accuracy and training efficiency.
arXiv Detail & Related papers (2023-12-18T12:37:35Z) - Asymmetric Modality Translation For Face Presentation Attack Detection [55.09300842243827]
Face presentation attack detection (PAD) is an essential measure to protect face recognition systems from being spoofed by malicious users.
We propose a novel framework based on asymmetric modality translation forPAD in bi-modality scenarios.
Our method achieves state-of-the-art performance under different evaluation protocols.
arXiv Detail & Related papers (2021-10-18T08:59:09Z) - Balancing detectability and performance of attacks on the control
channel of Markov Decision Processes [77.66954176188426]
We investigate the problem of designing optimal stealthy poisoning attacks on the control channel of Markov decision processes (MDPs)
This research is motivated by the recent interest of the research community for adversarial and poisoning attacks applied to MDPs, and reinforcement learning (RL) methods.
arXiv Detail & Related papers (2021-09-15T09:13:10Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Risk, Trust, and Bias: Causal Regulators of Biometric-Enabled Decision
Support [6.32220198667533]
Risk, trust, and bias (R-T-B) are emerging measures of performance of such systems.
This paper offers a complete taxonomy of the R-T-B causal performance regulators for the biometric-enabled DSS.
The proposed novel taxonomy links the R-T-B assessment to the causal inference mechanism for reasoning in decision making.
arXiv Detail & Related papers (2020-08-05T20:49:13Z) - Risk Assessment in the Face-based Watchlist Screening in e-Border [2.278720757613755]
Key task of watchlist technology is to mitigate effects of mis-identification and impersonation.
To address this problem, we developed a novel cost-based model of traveler risk assessment.
Results of this study are applicable to any biometric modality to be used in watchlist technology.
arXiv Detail & Related papers (2020-07-22T10:20:22Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.