51
|
Gupta MK, Viejo CG, Fuentes S, Torrico DD, Saturno PC, Gras SL, Dunshea FR, Cottrell JJ. Digital technologies to assess yoghurt quality traits and consumers acceptability. JOURNAL OF THE SCIENCE OF FOOD AND AGRICULTURE 2022; 102:5642-5652. [PMID: 35368112 PMCID: PMC9544762 DOI: 10.1002/jsfa.11911] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/09/2021] [Revised: 03/10/2022] [Accepted: 04/03/2022] [Indexed: 06/14/2023]
Abstract
BACKGROUND Sensory biometrics provide advantages for consumer tasting by quantifying physiological changes and the emotional response from participants, removing variability associated with self-reported responses. The present study aimed to measure consumers' emotional and physiological responses towards different commercial yoghurts, including dairy and plant-based yoghurts. The physiochemical properties of these products were also measured and linked with consumer responses. RESULTS Six samples (Control, Coconut, Soy, Berry, Cookies and Drinkable) were evaluated for overall liking by n = 62 consumers using a nine-point hedonic scale. Videos from participants were recorded using the Bio-Sensory application during tasting to assess emotions and heart rate. Physicochemical parameters Brix, pH, density, color (L, a and b), firmness and near-infrared (NIR) spectroscopy were also measured. Principal component analysis and a correlation matrix were used to assess relationships between the measured parameters. Heart rate was positively related to firmness, yaw head movement and overall liking, which were further associated with the Cookies sample. Two machine learning regression models were developed using (i) NIR absorbance values as inputs to predict the physicochemical parameters (Model 1) and (ii) the outputs from Model 1 as inputs to predict consumers overall liking (Model 2). Both models presented very high accuracy (Model 1: R = 0.98; Model 2: R = 0.99). CONCLUSION The presented methods were shown to be highly accurate and reliable with respect to their potential use by the industry to assess yoghurt quality traits and acceptability. © 2022 The Authors. Journal of The Science of Food and Agriculture published by John Wiley & Sons Ltd on behalf of Society of Chemical Industry.
Collapse
|
52
|
Konings D, Alam F, Faulkner N, de Jong C. Identity and Gender Recognition Using a Capacitive Sensing Floor and Neural Networks. SENSORS (BASEL, SWITZERLAND) 2022; 22:7206. [PMID: 36236306 PMCID: PMC9571660 DOI: 10.3390/s22197206] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/09/2022] [Revised: 09/01/2022] [Accepted: 09/20/2022] [Indexed: 06/16/2023]
Abstract
In recent publications, capacitive sensing floors have been shown to be able to localize individuals in an unobtrusive manner. This paper demonstrates that it might be possible to utilize the walking characteristics extracted from a capacitive floor to recognize subject and gender. Several neural network-based machine learning techniques are developed for recognizing the gender and identity of a target. These algorithms were trained and validated using a dataset constructed from the information captured from 23 subjects while walking, alone, on the sensing floor. A deep neural network comprising a Bi-directional Long Short-Term Memory (BLSTM) provided the most accurate identity performance, classifying individuals with an accuracy of 98.12% on the test data. On the other hand, a Convolutional Neural Network (CNN) was the most accurate for gender recognition, attaining an accuracy of 93.3%. The neural network-based algorithms are benchmarked against Support Vector Machine (SVM), which is a classifier used in many reported works for floor-based recognition tasks. The majority of the neural networks outperform SVM across all accuracy metrics.
Collapse
|
53
|
Lee J, Oh J, Kwon D, Kim M, Yu S, Jho NS, Park Y. PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices. SENSORS (BASEL, SWITZERLAND) 2022; 22:7075. [PMID: 36146423 PMCID: PMC9506519 DOI: 10.3390/s22187075] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/16/2022] [Revised: 09/14/2022] [Accepted: 09/16/2022] [Indexed: 06/16/2023]
Abstract
In IoT-based environments, smart services can be provided to users under various environments, such as smart homes, smart factories, smart cities, smart transportation, and healthcare, by utilizing sensing devices. Nevertheless, a series of security problems may arise because of the nature of the wireless channel in the Wireless Sensor Network (WSN) for utilizing IoT services. Authentication and key agreements are essential elements for providing secure services in WSNs. Accordingly, two-factor and three-factor-based authentication protocol research is being actively conducted. However, IoT service users can be vulnerable to ID/password pair guessing attacks by setting easy-to-remember identities and passwords. In addition, sensors and sensing devices deployed in IoT environments are vulnerable to capture attacks. To address this issue, in this paper, we analyze the protocols of Chunka et al., Amintoosi et al., and Hajian et al. and describe their security vulnerabilities. Moreover, this paper introduces PUF and honey list techniques with three-factor authentication to design protocols resistant to ID/password pair guessing, brute-force, and capture attacks. Accordingly, we introduce PUFTAP-IoT, which can provide secure services in the IoT environment. To prove the security of PUFTAP-IoT, we perform formal analyses through Burrows Abadi Needham (BAN) logic, Real-Or-Random (ROR) model, and scyther simulation tools. In addition, we demonstrate the efficiency of the protocol compared with other authentication protocols in terms of security, computational cost, and communication cost, showing that it can provide secure services in IoT environments.
Collapse
|
54
|
Alotaibi A, Hussain M, AboAlSamh H, Abdul W, Bebis G. Cross-Sensor Fingerprint Enhancement Using Adversarial Learning and Edge Loss. SENSORS (BASEL, SWITZERLAND) 2022; 22:6973. [PMID: 36146321 PMCID: PMC9504094 DOI: 10.3390/s22186973] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/02/2022] [Revised: 09/04/2022] [Accepted: 09/06/2022] [Indexed: 06/16/2023]
Abstract
A fingerprint sensor interoperability problem, or a cross-sensor matching problem, occurs when one type of sensor is used for enrolment and a different type for matching. Fingerprints captured for the same person using various sensor technologies have various types of noises and artifacts. This problem motivated us to develop an algorithm that can enhance fingerprints captured using different types of sensors and touch technologies. Inspired by the success of deep learning in various computer vision tasks, we formulate this problem as an image-to-image transformation designed using a deep encoder-decoder model. It is trained using two learning frameworks, i.e., conventional learning and adversarial learning based on a conditional Generative Adversarial Network (cGAN) framework. Since different types of edges form the ridge patterns in fingerprints, we employed edge loss to train the model for effective fingerprint enhancement. The designed method was evaluated on fingerprints from two benchmark cross-sensor fingerprint datasets, i.e., MOLF and FingerPass. To assess the quality of enhanced fingerprints, we employed two standard metrics commonly used: NBIS Fingerprint Image Quality (NFIQ) and Structural Similarity Index Metric (SSIM). In addition, we proposed a metric named Fingerprint Quality Enhancement Index (FQEI) for comprehensive evaluation of fingerprint enhancement algorithms. Effective fingerprint quality enhancement results were achieved regardless of the sensor type used, where this issue was not investigated in the related literature before. The results indicate that the proposed method outperforms the state-of-the-art methods.
Collapse
|
55
|
Stergiadis C, Kostaridou VD, Veloudis S, Kazis D, Klados MA. A Personalized User Authentication System Based on EEG Signals. SENSORS (BASEL, SWITZERLAND) 2022; 22:6929. [PMID: 36146276 PMCID: PMC9503240 DOI: 10.3390/s22186929] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/14/2022] [Revised: 09/05/2022] [Accepted: 09/06/2022] [Indexed: 06/16/2023]
Abstract
Conventional biometrics have been employed in high-security user-authentication systems for over 20 years now. However, some of these modalities face low-security issues in common practice. Brainwave-based user authentication has emerged as a promising alternative method, as it overcomes some of these drawbacks and allows for continuous user authentication. In the present study, we address the problem of individual user variability, by proposing a data-driven Electroencephalography (EEG)-based authentication method. We introduce machine learning techniques, in order to reveal the optimal classification algorithm that best fits the data of each individual user, in a fast and efficient manner. A set of 15 power spectral features (delta, theta, lower alpha, higher alpha, and alpha) is extracted from three EEG channels. The results show that our approach can reliably grant or deny access to the user (mean accuracy of 95.6%), while at the same time poses a viable option for real-time applications, as the total time of the training procedure was kept under one minute.
Collapse
|
56
|
Wang X, Shi Y, Zheng K, Zhang Y, Hong W, Cao S. User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes. SENSORS (BASEL, SWITZERLAND) 2022; 22:6627. [PMID: 36081085 PMCID: PMC9460698 DOI: 10.3390/s22176627] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/28/2022] [Revised: 08/21/2022] [Accepted: 08/31/2022] [Indexed: 06/15/2023]
Abstract
In order to improve user authentication accuracy based on keystroke dynamics and mouse dynamics in hybrid scenes and to consider the user operation changes in different scenes that aggravate user status changes and make it difficult to simulate user behaviors, we present a user authentication method entitled SIURUA. SIURUA uses scene-irrelated features and user-related features for user identification. First, features are extracted based on keystroke data and mouse movement data. Next, scene-irrelated features that have a low correlation with scenes are obtained. Finally, scene-irrelated features are fused with user-related features to ensure the integrity of the features. Experimental results show that the proposed method has the advantage of improving user authentication accuracy in hybrid scenes, with an accuracy of 84% obtained in the experiment.
Collapse
|
57
|
Kang EB. Biometric imaginaries: Formatting voice, body, identity to data. SOCIAL STUDIES OF SCIENCE 2022; 52:581-602. [PMID: 35257610 DOI: 10.1177/03063127221079599] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
Abstract
This article examines the sociotechnical imaginary within which contemporary biometric listening or VIA (voice identification and analysis) technologies are being developed. Starting from an examination of a key article on Voiceprint identification written in the 1940s, I interrogate the conceptual link between voice, body, and identity, which was central to these early attempts at technologizing voice identification. By surveying patents that delineate systems for voice identification, collection methods for voice data, and voice analysis, I find that the VIA industry is dependent on the conceptual affixion of voice to identity based on a reduction of voice that sees it as a fixed, extractable, and measurable 'sound object' located within the body. This informs the thinking of developers in the VIA industry, resulting in a reframing of the technological shortcomings of voice identification under the rubric of big data. Ultimately, this reframing rationalizes the implementation of audio surveillance systems into existing telecommunications infrastructures through which voice data is acquired on a massive scale.
Collapse
|
58
|
Wang M, Yin X, Zhu Y, Hu J. Representation Learning and Pattern Recognition in Cognitive Biometrics: A Survey. SENSORS (BASEL, SWITZERLAND) 2022; 22:5111. [PMID: 35890799 PMCID: PMC9320620 DOI: 10.3390/s22145111] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/17/2022] [Revised: 07/01/2022] [Accepted: 07/05/2022] [Indexed: 01/27/2023]
Abstract
Cognitive biometrics is an emerging branch of biometric technology. Recent research has demonstrated great potential for using cognitive biometrics in versatile applications, including biometric recognition and cognitive and emotional state recognition. There is a major need to summarize the latest developments in this field. Existing surveys have mainly focused on a small subset of cognitive biometric modalities, such as EEG and ECG. This article provides a comprehensive review of cognitive biometrics, covering all the major biosignal modalities and applications. A taxonomy is designed to structure the corresponding knowledge and guide the survey from signal acquisition and pre-processing to representation learning and pattern recognition. We provide a unified view of the methodological advances in these four aspects across various biosignals and applications, facilitating interdisciplinary research and knowledge transfer across fields. Furthermore, this article discusses open research directions in cognitive biometrics and proposes future prospects for developing reliable and secure cognitive biometric systems.
Collapse
|
59
|
Ryu J, Torres EB. Motor Signatures in Digitized Cognitive and Memory Tests Enhances Characterization of Parkinson's Disease. SENSORS (BASEL, SWITZERLAND) 2022; 22:4434. [PMID: 35746215 PMCID: PMC9231034 DOI: 10.3390/s22124434] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 04/24/2022] [Revised: 06/08/2022] [Accepted: 06/09/2022] [Indexed: 06/15/2023]
Abstract
Although interest in using wearable sensors to characterize movement disorders is growing, there is a lack of methodology for developing clinically interpretable biomarkers. Such digital biomarkers would provide a more objective diagnosis, capturing finer degrees of motor deficits, while retaining the information of traditional clinical tests. We aim at digitizing traditional tests of cognitive and memory performance to derive motor biometrics of pen-strokes and voice, thereby complementing clinical tests with objective criteria, while enhancing the overall characterization of Parkinson's disease (PD). 35 participants including patients with PD, healthy young and age-matched controls performed a series of drawing and memory tasks, while their pen movement and voice were digitized. We examined the moment-to-moment variability of time series reflecting the pen speed and voice amplitude. The stochastic signatures of the fluctuations in pen drawing speed and voice amplitude of patients with PD show a higher signal-to-noise ratio compared to those of neurotypical controls. It appears that contact motions of the pen strokes on a tablet evoke sensory feedback for more immediate and predictable control in PD, while voice amplitude loses its neurotypical richness. We offer new standardized data types and analytics to discover the hidden motor aspects within the cognitive and memory clinical assays.
Collapse
|
60
|
Pedersen H, Diaz LJ, Clemmensen KKB, Jensen MM, Jørgensen ME, Finlayson G, Quist JS, Vistisen D, Færch K. Predicting Food Intake from Food Reward and Biometric Responses to Food Cues in Adults with Normal Weight Using Machine Learning. J Nutr 2022; 152:1574-1581. [PMID: 35325189 DOI: 10.1093/jn/nxac053] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/18/2021] [Revised: 12/21/2021] [Accepted: 03/03/2022] [Indexed: 11/12/2022] Open
Abstract
BACKGROUND Eating behaviors are determined by a complex interplay between behavioral and physiologic signaling occurring before, during, and after eating. OBJECTIVES The aim was to explore how selected behavioral and physiologic variables separately and grouped together predicted intake of 8 different foods. METHODS One hundred adults with normal weight performed a food preference task combined with biometric measurements (the Steno Biometric Food Preference Task) in the fasting state. The task measured food reward as well as biometric (eye tracking, electrodermal activity, and facial expressions) responses to images of foods varying in fat content and taste. Energy intake from an ad libitum buffet of the same 8 foods as assessed in the preference task was subsequently assessed. A mixed-effects random forest approach was applied to explore how individual and combined measures of food reward and biometric responses predicted energy intake of the 8 single foods. The performance of the different prediction models was compared with the predictions from a linear model including only an intercept (naïve model) using bootstrap cross-validation. RESULTS Participants had a median [IQR] intake of 369 kJ [126-472 kJ] per food. Combined or separate measures of food reward or biometric responses did not predict energy intake better than the naïve model. CONCLUSIONS We did not find that the reward or biometric responses to food cues assessed in a clinical setting were useful in predicting energy intake of single foods. However, this study provides a framework in the field of behavioral nutrition for applying machine learning with a focus on individual predictions. This is necessary on the road toward personalized nutrition and provides great potential for handling complex data with multiple variables.This trial was registered at clinicaltrials.gov as NCT03986619.
Collapse
|
61
|
The livestock farming digital transformation: implementation of new and emerging technologies using artificial intelligence. Anim Health Res Rev 2022; 23:59-71. [PMID: 35676797 DOI: 10.1017/s1466252321000177] [Citation(s) in RCA: 11] [Impact Index Per Article: 5.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
Abstract
Livestock welfare assessment helps monitor animal health status to maintain productivity, identify injuries and stress, and avoid deterioration. It has also become an important marketing strategy since it increases consumer pressure for a more humane transformation in animal treatment. Common visual welfare practices by professionals and veterinarians may be subjective and cost-prohibitive, requiring trained personnel. Recent advances in remote sensing, computer vision, and artificial intelligence (AI) have helped developing new and emerging technologies for livestock biometrics to extract key physiological parameters associated with animal welfare. This review discusses the livestock farming digital transformation by describing (i) biometric techniques for health and welfare assessment, (ii) livestock identification for traceability and (iii) machine and deep learning application in livestock to address complex problems. This review also includes a critical assessment of these topics and research done so far, proposing future steps for the deployment of AI models in commercial farms. Most studies focused on model development without applications or deployment for the industry. Furthermore, reported biometric methods, accuracy, and machine learning approaches presented some inconsistencies that hinder validation. Therefore, it is required to develop more efficient, non-contact and reliable methods based on AI to assess livestock health, welfare, and productivity.
Collapse
|
62
|
Identity Recognition in Sanitary Facilities Using Invisible Electrocardiography. SENSORS 2022; 22:s22114201. [PMID: 35684820 PMCID: PMC9185406 DOI: 10.3390/s22114201] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/21/2022] [Revised: 05/25/2022] [Accepted: 05/26/2022] [Indexed: 11/30/2022]
Abstract
This article proposes a new method of identity recognition in sanitary facilities based on electrocardiography (ECG) signals. Our team previously proposed a novel approach of invisible ECG at the thighs using polymeric electrodes, leading to the creation of a proof-of-concept system integrated into a toilet seat. In this work, a biometrics pipeline was devised, which tested four different classifiers, varying the population from 2 to 17 subjects and simulating a residential environment. However, for this approach to be industrially viable, further optimization is required, particularly regarding electrode materials that are compatible with industrial processes. As such, we also explore the use of a conductive silicone material as electrodes, aiming at the industrial-scale production of a toilet seat capable of recording ECG data, without the need for body-worn devices. A desirable aspect when using such a system is matching the recorded data with the monitored user, ideally using a minimal sensor set, further reinforcing the relevance of user identification through ECG signals collected at the thighs. Our approach was evaluated against a reference device for a population of 17 healthy and pathological individuals, covering a wide age range (24–70 years). With the silicone composite, we were able to acquire signals in 100% of the sessions, with a mean heart rate deviation between a reference system and our experimental device of 2.82 ± 1.99 beats per minute (BPM). In terms of ECG waveform morphology, the best cases showed a Pearson correlation coefficient of 0.91 ± 0.06. For biometric detection, the best classifier was the Binary Convolutional Neural Network (BCNN), with an accuracy of 100% for a population of up to four individuals.
Collapse
|
63
|
Jeong KJ, Gwak J, Wang C, Kim YM, Tran VT, Lee J. Chirality of Fingerprints: Pattern- and Curvature-Induced Emerging Chiroptical Properties of Elastomeric Grating Meta-Skin. ACS NANO 2022; 16:6103-6110. [PMID: 35404576 DOI: 10.1021/acsnano.1c11597] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
Abstract
Fingerprint-inspired elastomeric grating meta-skin (EGMS) is herein fabricated to investigate the chirality of fingerprints. The EGMS is made by a facile nanoimprinting method with a diffraction grating as a template using polydimethylsiloxane, followed by gold deposition. The chirality of the surface is caused by symmetry breaking, induced by the pattern (P) and curvature (T). Furthermore, the chiroptical properties of EGMS are reconfigurable through the control of the skew angle (θ), which is the angle between P and T. The chiroptical properties of a fingerprint are also shown and interpreted in this perspective. On the basis of the results, we suggest the strategy to impart chirality on the surface, which is reconfigurable by controlling P and T. It will be a useful method to produce chirality in membranes, thin films, metasurfaces, and 2D nanomaterials, as well as advance biometric recognition.
Collapse
|
64
|
Self-Supervised Learning Framework toward State-of-the-Art Iris Image Segmentation. SENSORS 2022; 22:s22062133. [PMID: 35336305 PMCID: PMC8951447 DOI: 10.3390/s22062133] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/06/2021] [Revised: 03/02/2022] [Accepted: 03/04/2022] [Indexed: 02/04/2023]
Abstract
Iris segmentation plays a pivotal role in the iris recognition system. The deep learning technique developed in recent years has gradually been applied to iris recognition techniques. As we all know, applying deep learning techniques requires a large number of data sets with high-quality manual labels. The larger the amount of data, the better the algorithm performs. In this paper, we propose a self-supervised framework utilizing the pix2pix conditional adversarial network for generating unlimited diversified iris images. Then, the generated iris images are used to train the iris segmentation network to achieve state-of-the-art performance. We also propose an algorithm to generate iris masks based on 11 tunable parameters, which can be generated randomly. Such a framework can generate an unlimited amount of photo-realistic training data for down-stream tasks. Experimental results demonstrate that the proposed framework achieved promising results in all commonly used metrics. The proposed framework can be easily generalized to any object segmentation task with a simple fine-tuning of the mask generation algorithm.
Collapse
|
65
|
Sodhro AH, Sennersten C, Ahmad A. Towards Cognitive Authentication for Smart Healthcare Applications. SENSORS (BASEL, SWITZERLAND) 2022; 22:2101. [PMID: 35336276 PMCID: PMC8949031 DOI: 10.3390/s22062101] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/13/2022] [Revised: 03/02/2022] [Accepted: 03/04/2022] [Indexed: 12/14/2022]
Abstract
Secure and reliable sensing plays the key role for cognitive tracking i.e., activity identification and cognitive monitoring of every individual. Over the last years there has been an increasing interest from both academia and industry in cognitive authentication also known as biometric recognition. These are an effect of individuals' biological and physiological traits. Among various traditional biometric and physiological features, we include cognitive/brainwaves via electroencephalogram (EEG) which function as a unique performance indicator due to its reliable, flexible, and unique trait resulting in why it is hard for an un-authorized entity(ies) to breach the boundaries by stealing or mimicking them. Conventional security and privacy techniques in the medical domain are not the potential candidates to simultaneously provide both security and energy efficiency. Therefore, state-of-the art biometrics methods (i.e., machine learning, deep learning, etc.) their applications with novel solutions are investigated and recommended. The experimental setup considers EEG data analysis and interpretation of BCI. The key purpose of this setup is to reduce the number of electrodes and hence the computational power of the Random Forest (RF) classifier while testing EEG data. The performance of the random forest classifier was based on EEG datasets for 20 subjects. We found that the total number of occurred events revealed 96.1% precision in terms of chosen events.
Collapse
|
66
|
Saguy M, Almog J, Cohn D, Champod C. Proactive forensic science in biometrics: Novel materials for fingerprint spoofing. J Forensic Sci 2022; 67:534-542. [PMID: 34617603 PMCID: PMC9293316 DOI: 10.1111/1556-4029.14908] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/10/2021] [Revised: 09/18/2021] [Accepted: 09/23/2021] [Indexed: 12/04/2022]
Abstract
Motivated by the need to prepare for the next generation of fingerprint spoofing, we applied the "proactive forensic science" strategy to the biometric field. The working concept, already successful in a few fields, aimed at adopting the sophisticated criminals' way of thinking, predicting their next move so that the crime-fighting authorities can be one step ahead of them and take preventive measures, against biometric spoofing in this instance. This strategy involved the design, production, and characterization of innovative polymeric materials that could possibly serve in advanced fingerprint spoofs. Special attention was given to materials capable of fooling fingerprint readers equipped with spoof-detecting abilities, known as "Presentation Attack Detection" (PAD) systems and often referred to as liveness detection. A series of direct cast fake fingerprints was produced from known commercially available spoofing materials, and was functionally tested to compare their performance with that of spoofs produced from the new polymers. The novel materials thus prepared were hydrogels based on polyethylene glycols (PEGs) that were chain-extended. They showed good performance in deceiving security systems, considerably better than that of spoofs produced from commercial materials, and are, therefore, good spoofing candidates that law-enforcement authorities should be aware of.
Collapse
|
67
|
Boutros F, Damer N, Raja K, Kirchbuchner F, Kuijper A. Template-Driven Knowledge Distillation for Compact and Accurate Periocular Biometrics Deep-Learning Models. SENSORS (BASEL, SWITZERLAND) 2022; 22:1921. [PMID: 35271074 PMCID: PMC8914924 DOI: 10.3390/s22051921] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/26/2022] [Revised: 02/22/2022] [Accepted: 02/25/2022] [Indexed: 02/01/2023]
Abstract
This work addresses the challenge of building an accurate and generalizable periocular recognition model with a small number of learnable parameters. Deeper (larger) models are typically more capable of learning complex information. For this reason, knowledge distillation (kd) was previously proposed to carry this knowledge from a large model (teacher) into a small model (student). Conventional KD optimizes the student output to be similar to the teacher output (commonly classification output). In biometrics, comparison (verification) and storage operations are conducted on biometric templates, extracted from pre-classification layers. In this work, we propose a novel template-driven KD approach that optimizes the distillation process so that the student model learns to produce templates similar to those produced by the teacher model. We demonstrate our approach on intra- and cross-device periocular verification. Our results demonstrate the superiority of our proposed approach over a network trained without KD and networks trained with conventional (vanilla) KD. For example, the targeted small model achieved an equal error rate (EER) value of 22.2% on cross-device verification without KD. The same model achieved an EER of 21.9% with the conventional KD, and only 14.7% EER when using our proposed template-driven KD.
Collapse
|
68
|
Harris EJ, Khoo IH, Demircan E. A Survey of Human Gait-Based Artificial Intelligence Applications. Front Robot AI 2022; 8:749274. [PMID: 35047564 PMCID: PMC8762057 DOI: 10.3389/frobt.2021.749274] [Citation(s) in RCA: 17] [Impact Index Per Article: 8.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/29/2021] [Accepted: 11/01/2021] [Indexed: 12/17/2022] Open
Abstract
We performed an electronic database search of published works from 2012 to mid-2021 that focus on human gait studies and apply machine learning techniques. We identified six key applications of machine learning using gait data: 1) Gait analysis where analyzing techniques and certain biomechanical analysis factors are improved by utilizing artificial intelligence algorithms, 2) Health and Wellness, with applications in gait monitoring for abnormal gait detection, recognition of human activities, fall detection and sports performance, 3) Human Pose Tracking using one-person or multi-person tracking and localization systems such as OpenPose, Simultaneous Localization and Mapping (SLAM), etc., 4) Gait-based biometrics with applications in person identification, authentication, and re-identification as well as gender and age recognition 5) “Smart gait” applications ranging from smart socks, shoes, and other wearables to smart homes and smart retail stores that incorporate continuous monitoring and control systems and 6) Animation that reconstructs human motion utilizing gait data, simulation and machine learning techniques. Our goal is to provide a single broad-based survey of the applications of machine learning technology in gait analysis and identify future areas of potential study and growth. We discuss the machine learning techniques that have been used with a focus on the tasks they perform, the problems they attempt to solve, and the trade-offs they navigate.
Collapse
|
69
|
"The Circle" Predicts Extent of Fusion for Surgical Correction of Cervical Spinal Kyphotic Deformities: Proof of Concept. World Neurosurg 2021; 159:e497-e503. [PMID: 34958989 DOI: 10.1016/j.wneu.2021.12.073] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/11/2021] [Revised: 12/19/2021] [Accepted: 12/20/2021] [Indexed: 11/21/2022]
Abstract
BACKGROUND Correction of kyphotic deformities of the spine is a common problem faced by spine surgeons. Unfortunately, there are no clear published guidelines available regarding the extent of spinal fusion required to achieve and maintain lasting deformity correction. OBJECTIVE The authors aim to share a set of novel radiographic parameter ("the Circle") that can be used as a guideline for determining the extent of fusion required in surgical correction of spinal kyphotic deformity. METHODS A Google forms survey was distributed amongst spine surgeons and trainees to evaluate differences in recommend extent of posterior-approach fusions for cervical spinal kyphotic deformities before and after introduction to "the Circle". Extent of fusion before and after use of "the Circle" were qualitatively and quantitatively analyzed. Data was anonymized and stored in a secure database. RESULTS Twenty-seven neurosurgical attendings (n=14), residents (n=9) and fellows (n=3) responded to the survey. Variance between predicted upper and lower instrumented vertebrae, and length of construct, was statistically significantly decreased after application of "the Circle" in almost all cases. Respondents rated the ease of use of "the Circle" an average of 4.2/5 (5 = the most ease). The majority of participants (92/6%; n=25/27) stated that they would or would likely use "the Circle" as a radiographic tool in the surgical planning for correction of cervical spinal kyphotic deformities in the future. CONCLUSION "The Circle" is a novel radiographic parameter that may be used to educate and guide surgical plans and extent of fusion when aiming to correct spinal kyphotic deformities.
Collapse
|
70
|
Jaafa NK, Mokaya B, Savai SM, Yeung A, Siika AM, Were M. Implementation of Fingerprint Technology for Unique Patient Matching and Identification at an HIV Care and Treatment Facility in Western Kenya: Cross-sectional Study. J Med Internet Res 2021; 23:e28958. [PMID: 34941557 PMCID: PMC8734934 DOI: 10.2196/28958] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/19/2021] [Revised: 06/16/2021] [Accepted: 10/03/2021] [Indexed: 11/20/2022] Open
Abstract
Background Unique patient identification remains a challenge in many health care settings in low- and middle-income countries (LMICs). Without national-level unique identifiers for whole populations, countries rely on demographic-based approaches that have proven suboptimal. Affordable biometrics-based approaches, implemented with consideration of contextual ethical, legal, and social implications, have the potential to address this challenge and improve patient safety and reporting accuracy. However, limited studies exist to evaluate the actual performance of biometric approaches and perceptions of these systems in LMICs. Objective The aim of this study is to evaluate the performance and acceptability of fingerprint technology for unique patient matching and identification in the LMIC setting of Kenya. Methods In this cross-sectional study conducted at an HIV care and treatment facility in Western Kenya, an open source fingerprint application was integrated within an implementation of the Open Medical Record System, an open source electronic medical record system (EMRS) that is nationally endorsed and deployed for HIV care in Kenya and in more than 40 other countries; hence, it has potential to translate the findings across multiple countries. Participants aged >18 years were conveniently sampled and enrolled into the study. Participants’ left thumbprints were captured and later used to retrieve and match records. The technology’s performance was evaluated using standard measures: sensitivity, false acceptance rate, false rejection rate, and failure to enroll rate. The Wald test was used to compare the accuracy of the technology with the probabilistic patient-matching technique of the EMRS. Time to retrieval and matching of records were compared using the independent samples 2-tailed t test. A survey was administered to evaluate patient acceptance and satisfaction with use of the technology. Results In all, 300 participants were enrolled; their mean age was 36.3 (SD 12.2) years, and 58% (174/300) were women. The relevant values for the technology’s performance were sensitivity 89.3%, false acceptance rate 0%, false rejection rate 11%, and failure to enroll rate 2.3%. The technology’s mean record retrieval speed was 3.2 (SD 1.1) seconds versus 9.5 (SD 1.9) seconds with demographic-based record retrieval in the EMRS (P<.001). The survey results revealed that 96.3% (289/300) of the participants were comfortable with the technology and 90.3% (271/300) were willing to use it. Participants who had previously used fingerprint biometric systems for identification were estimated to have more than thrice increased odds of accepting the technology (odds ratio 3.57, 95% CI 1.0-11.92). Conclusions Fingerprint technology performed very well in identifying adult patients in an LMIC setting. Patients reported a high level of satisfaction and acceptance. Serious considerations need to be given to the use of fingerprint technology for patient identification in LMICs, but this has to be done with strong consideration of ethical, legal, and social implications as well as security issues.
Collapse
|
71
|
Study on the Viability of Canine Nose Pattern as a Unique Biometric Marker. Animals (Basel) 2021; 11:ani11123372. [PMID: 34944149 PMCID: PMC8697952 DOI: 10.3390/ani11123372] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/24/2021] [Revised: 11/18/2021] [Accepted: 11/22/2021] [Indexed: 12/04/2022] Open
Abstract
Simple Summary This paper shows that the canine nose pattern, which is an interlocking pattern of beads and grooves on a dog’s nose, is unique to each individual dog. For this purpose, the nose images of 60 dogs were collected at three separate times, each roughly three to four months apart. This longitudinal cohort study was designed to ensure the diversity of data, wherein dogs of diverse age, gender, and breed are well represented in the dataset. In this study, the nose patterns of these dogs were examined visually and by a biometric algorithm to determine the uniqueness of the canine nose pattern. It was found that the canine nose pattern remains invariant through the passage of time during the observation period; and that the canine nose pattern is indeed unique to each dog. Our finding confirms and enhances the claims of earlier works by others that the canine nose pattern is unique to each animal and serves as a unique biometric marker. For further study, this dataset was augmented by adding to it the nose images of 10 beagle dogs taken once every month in a ten-month period to create an enlarged dataset of 278 images of 70 dogs of 19 breeds. The study with this enlarged dataset also leads to the same conclusion. Abstract The uniqueness of the canine nose pattern was studied. A total of 180 nose images of 60 dogs of diverse age, gender, and breed were collected. The canine nose patterns in these images were examined visually and by a biometric algorithm. It was found that the canine nose pattern remains invariant regardless of when the image is taken; and that the canine nose pattern is indeed unique to each dog. The same study was also performed on an enlarged dataset of 278 nose images of 70 dogs of 19 breeds. The study of the enlarged dataset also leads to the same conclusion. The result of this paper confirms and enhances the claims of earlier works by others that the canine nose pattern is indeed unique to each animal and serves as a unique biometric marker.
Collapse
|
72
|
Presentation Attack Detection on Limited-Resource Devices Using Deep Neural Classifiers Trained on Consistent Spectrogram Fragments. SENSORS 2021; 21:s21227728. [PMID: 34833803 PMCID: PMC8624699 DOI: 10.3390/s21227728] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/16/2021] [Revised: 11/15/2021] [Accepted: 11/17/2021] [Indexed: 11/22/2022]
Abstract
The presented paper is concerned with detection of presentation attacks against unsupervised remote biometric speaker verification, using a well-known challenge–response scheme. We propose a novel approach to convolutional phoneme classifier training, which ensures high phoneme recognition accuracy even for significantly simplified network architectures, thus enabling efficient utterance verification on resource-limited hardware, such as mobile phones or embedded devices. We consider Deep Convolutional Neural Networks operating on windows of speech Mel-Spectrograms as a means for phoneme recognition, and we show that one can boost the performance of highly simplified neural architectures by modifying the principle underlying training set construction. Instead of generating training examples by slicing spectrograms using a sliding window, as it is commonly done, we propose to maximize the consistency of phoneme-related spectrogram structures that are to be learned, by choosing only spectrogram chunks from the central regions of phoneme articulation intervals. This approach enables better utilization of the limited capacity of the considered simplified networks, as it significantly reduces a within-class data scatter. We show that neural architectures comprising as few as dozens of thousands parameters can successfully—with accuracy of up to 76%, solve the 39-phoneme recognition task (we use the English language TIMIT database for experimental verification of the method). We also show that ensembling of simple classifiers, using a basic bagging method, boosts the recognition accuracy by another 2–3%, offering Phoneme Error Rates at the level of 23%, which approaches the accuracy of the state-of-the-art deep neural architectures that are one to two orders of magnitude more complex than the proposed solution. This, in turn, enables executing reliable presentation attack detection, based on just few-syllable long challenges on highly resource-limited computing hardware.
Collapse
|
73
|
Evaluation of a Fast Test Based on Biometric Signals to Assess Mental Fatigue at the Workplace-A Pilot Study. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2021; 18:ijerph182211891. [PMID: 34831645 PMCID: PMC8621458 DOI: 10.3390/ijerph182211891] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/05/2021] [Revised: 10/19/2021] [Accepted: 11/02/2021] [Indexed: 01/29/2023]
Abstract
Non-pathological mental fatigue is a recurring, but undesirable condition among people in the fields of office work, industry, and education. This type of mental fatigue can often lead to negative outcomes, such as performance reduction and cognitive impairment in education; loss of focus and burnout syndrome in office work; and accidents leading to injuries or death in the transportation and manufacturing industries. Reliable mental fatigue assessment tools are promising in the improvement of performance, mental health and safety of students and workers, and at the same time, in the reduction of risks, accidents and the associated economic loss (e.g., medical fees and equipment reparations). The analysis of biometric (brain, cardiac, skin conductance) signals has proven to be effective in discerning different stages of mental fatigue; however, many of the reported studies in the literature involve the use of long fatigue-inducing tests and subject-specific models in their methodologies. Recent trends in the modeling of mental fatigue suggest the usage of non subject-specific (general) classifiers and a time reduction of calibration procedures and experimental setups. In this study, the evaluation of a fast and short-calibration mental fatigue assessment tool based on biometric signals and inter-subject modeling, using multiple linear regression, is presented. The proposed tool does not require fatigue-inducing tests, which allows fast setup and implementation. Electroencephalography, photopletismography, electrodermal activity, and skin temperature from 17 subjects were recorded, using an OpenBCI helmet and an Empatica E4 wristband. Correlations to self-reported mental fatigue levels (using the fatigue assessment scale) were calculated to find the best mental fatigue predictors. Three-class mental fatigue models were evaluated, and the best model obtained an accuracy of 88% using three features, β/θ (C3), and the α/θ (O2 and C3) ratios, from one minute of electroencephalography measurements. The results from this pilot study show the feasibility and potential of short-calibration procedures and inter-subject classifiers in mental fatigue modeling, and will contribute to the use of wearable devices for the development of tools oriented to the well-being of workers and students, and also in daily living activities.
Collapse
|
74
|
ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions. SENSORS 2021; 21:s21216966. [PMID: 34770273 PMCID: PMC8587891 DOI: 10.3390/s21216966] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/17/2021] [Revised: 10/15/2021] [Accepted: 10/16/2021] [Indexed: 11/24/2022]
Abstract
The development and use of wearable devices require high levels of security and have sparked interest in biometric authentication research. Among the available approaches, electrocardiogram (ECG) technology is attracting attention because of its strengths in spoofing. However, morphological changes of ECG, which are affected by physical and psychological factors, can make authentication difficult. In this paper, we propose authentication using non-linear normalization of ECG beats that is robust to changes in ECG waveforms according to heart rate fluctuations in various daily activities. We performed a non-linear normalization method through the analysis of ECG alongside heart rate, evaluating similarities and authenticating the performance of our new method compared to existing methods. Compared with beats before normalization, the average similarity of the proposed method increased 23.7% in the resting state and 43% in the non-resting state. After learning in the resting state, authentication performance reached 99.05% accuracy for the resting state and 88.14% for the non-resting state. The proposed method can be applicable to an ECG-based authentication system under various physiological conditions.
Collapse
|
75
|
Zheng Y, Wang D, Li X, Wang Z, Zhou Q, Fu L, Yin Y, Creech D. Biometric Identification of Taxodium spp. and Their Hybrid Progenies by Electrochemical Fingerprints. BIOSENSORS 2021; 11:403. [PMID: 34677359 PMCID: PMC8534068 DOI: 10.3390/bios11100403] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/10/2021] [Revised: 10/04/2021] [Accepted: 10/15/2021] [Indexed: 12/19/2022]
Abstract
The use of electrochemical fingerprints for plant identification is an emerging application in biosensors. In this work, Taxodium ascendens, T. distichum, T. mucronatum, and 18 of their hybrid progenies were collected for this purpose. This is the first attempt to use electrochemical fingerprinting for the identification of plant hybrid progeny. Electrochemical fingerprinting in the leaves of Taxodium spp. was recorded under two conditions. The results showed that the electrochemical fingerprints of each species and progeny possessed very suitable reproducibility. These electrochemical fingerprints represent the electrochemical behavior of electrochemically active substances in leaf tissues under specific conditions. Since these species and progenies are very closely related to each other, it is challenging to identify them directly using a particular electrochemical fingerprinting. Therefore, electrochemical fingerprints measured under different conditions were used to perform pattern recognition. We can identify different species and progenies by locating the features in different pattern maps. We also performed a phylogenetic study with data from electrochemical fingerprinting. The results proved that the electrochemical classification results and the relationship between them are closely related.
Collapse
|