Watchlist Risk Assessment using Multiparametric Cost and Relative
Entropy
- URL: http://arxiv.org/abs/2007.11328v1
- Date: Wed, 22 Jul 2020 10:27:53 GMT
- Title: Watchlist Risk Assessment using Multiparametric Cost and Relative
Entropy
- Authors: K. Lai and S.N. Yanushkevich
- Abstract summary: We propose a multiparametric cost assessment and relative entropy measures as risk detectors.
We experimentally demonstrate the effects of mis-identification and impersonation under various watchlist screening scenarios and constraints.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: This paper addresses the facial biometric-enabled watchlist technology in
which risk detectors are mandatory mechanisms for early detection of threats,
as well as for avoiding offense to innocent travelers. We propose a
multiparametric cost assessment and relative entropy measures as risk
detectors. We experimentally demonstrate the effects of mis-identification and
impersonation under various watchlist screening scenarios and constraints. The
key contributions of this paper are the novel techniques for design and
analysis of the biometric-enabled watchlist and the supporting infrastructure,
as well as measuring the impersonation impact on e-border performance.
Related papers
- A Human-Centered Risk Evaluation of Biometric Systems Using Conjoint Analysis [0.6199770411242359]
This paper presents a novel human-centered risk evaluation framework using conjoint analysis to quantify the impact of risk factors, such as surveillance cameras, on attacker's motivation.
Our framework calculates risk values incorporating the False Acceptance Rate (FAR) and attack probability, allowing comprehensive comparisons across use cases.
arXiv Detail & Related papers (2024-09-17T14:18:21Z) - Principles of Designing Robust Remote Face Anti-Spoofing Systems [60.05766968805833]
This paper sheds light on the vulnerabilities of state-of-the-art face anti-spoofing methods against digital attacks.
It presents a comprehensive taxonomy of common threats encountered in face anti-spoofing systems.
arXiv Detail & Related papers (2024-06-06T02:05:35Z) - Reversing the Irreversible: A Survey on Inverse Biometrics [1.9933615728711718]
It is now an accepted fact that it is possible to reconstruct from an unprotected template a synthetic sample that matches the bona fide one.
This reverse engineering process constitutes a severe threat for biometric systems from two different angles.
Biometric stakeholders have produced over the last fifteen years numerous works analysing the different aspects related to inverse biometrics.
arXiv Detail & Related papers (2024-01-05T15:32:40Z) - AI-Based Energy Transportation Safety: Pipeline Radial Threat Estimation
Using Intelligent Sensing System [52.93806509364342]
This paper proposes a radial threat estimation method for energy pipelines based on distributed optical fiber sensing technology.
We introduce a continuous multi-view and multi-domain feature fusion methodology to extract comprehensive signal features.
We incorporate the concept of transfer learning through a pre-trained model, enhancing both recognition accuracy and training efficiency.
arXiv Detail & Related papers (2023-12-18T12:37:35Z) - Introduction to Presentation Attack Detection in Iris Biometrics and
Recent Advances [13.393219486444604]
Presentation attacks stand out as some of the most relevant and studied.
In the case of the iris, these attacks include the use of real irises as well as artifacts with different level of sophistication such as photographs or videos.
This chapter introduces iris Presentation Attack Detection (PAD) methods that have been developed to reduce the risk posed by presentation attacks.
arXiv Detail & Related papers (2021-11-24T12:43:06Z) - Asymmetric Modality Translation For Face Presentation Attack Detection [55.09300842243827]
Face presentation attack detection (PAD) is an essential measure to protect face recognition systems from being spoofed by malicious users.
We propose a novel framework based on asymmetric modality translation forPAD in bi-modality scenarios.
Our method achieves state-of-the-art performance under different evaluation protocols.
arXiv Detail & Related papers (2021-10-18T08:59:09Z) - Balancing detectability and performance of attacks on the control
channel of Markov Decision Processes [77.66954176188426]
We investigate the problem of designing optimal stealthy poisoning attacks on the control channel of Markov decision processes (MDPs)
This research is motivated by the recent interest of the research community for adversarial and poisoning attacks applied to MDPs, and reinforcement learning (RL) methods.
arXiv Detail & Related papers (2021-09-15T09:13:10Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Risk, Trust, and Bias: Causal Regulators of Biometric-Enabled Decision
Support [6.32220198667533]
Risk, trust, and bias (R-T-B) are emerging measures of performance of such systems.
This paper offers a complete taxonomy of the R-T-B causal performance regulators for the biometric-enabled DSS.
The proposed novel taxonomy links the R-T-B assessment to the causal inference mechanism for reasoning in decision making.
arXiv Detail & Related papers (2020-08-05T20:49:13Z) - Risk Assessment in the Face-based Watchlist Screening in e-Border [2.278720757613755]
Key task of watchlist technology is to mitigate effects of mis-identification and impersonation.
To address this problem, we developed a novel cost-based model of traveler risk assessment.
Results of this study are applicable to any biometric modality to be used in watchlist technology.
arXiv Detail & Related papers (2020-07-22T10:20:22Z) - SAMBA: Safe Model-Based & Active Reinforcement Learning [59.01424351231993]
SAMBA is a framework for safe reinforcement learning that combines aspects from probabilistic modelling, information theory, and statistics.
We evaluate our algorithm on a variety of safe dynamical system benchmarks involving both low and high-dimensional state representations.
We provide intuition as to the effectiveness of the framework by a detailed analysis of our active metrics and safety constraints.
arXiv Detail & Related papers (2020-06-12T10:40:46Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.