Skip to main content

Showing 1–27 of 27 results for author: Teoh, A B J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.02403  [pdf, other

    cs.CV cs.AI

    Face Reconstruction Transfer Attack as Out-of-Distribution Generalization

    Authors: Yoon Gyo Jung, Jaewoo Park, Xingbo Dong, Ho** Park, Andrew Beng ** Teoh, Octavia Camps

    Abstract: Understanding the vulnerability of face recognition systems to malicious attacks is of critical importance. Previous works have focused on reconstructing face images that can penetrate a targeted verification system. Even in the white-box scenario, however, naively reconstructed images misrepresent the identity information, hence the attacks are easily neutralized once the face system is updated o… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

    Comments: Accepted to ECCV2024

  2. arXiv:2406.19672  [pdf, other

    cs.CV

    Beyond First-Order: A Multi-Scale Approach to Finger Knuckle Print Biometrics

    Authors: Chengrui Gao, Ziyuan Yang, Andrew Beng ** Teoh, Min Zhu

    Abstract: Recently, finger knuckle prints (FKPs) have gained attention due to their rich textural patterns, positioning them as a promising biometric for identity recognition. Prior FKP recognition methods predominantly leverage first-order feature descriptors, which capture intricate texture details but fail to account for structural information. Emerging research, however, indicates that second-order text… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

  3. arXiv:2403.02680  [pdf, other

    cs.CR

    A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data Storage

    Authors: Ziyuan Yang, Ming Kang, Andrew Beng ** Teoh, Chengrui Gao, Wen Chen, Bob Zhang, Yi Zhang

    Abstract: In recent years, palmprints have been widely used for individual verification. The rich privacy information in palmprint data necessitates its protection to ensure security and privacy without sacrificing system performance. Existing systems often use cancelable technologies to protect templates, but these technologies ignore the potential risk of data leakage. Upon breaching the system and gainin… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

  4. arXiv:2311.12049  [pdf, other

    cs.CV

    Energizing Federated Learning via Filter-Aware Attention

    Authors: Ziyuan Yang, Zerui Shao, Huijie Huangfu, Hui Yu, Andrew Beng ** Teoh, Xiaoxiao Li, Hongming Shan, Yi Zhang

    Abstract: Federated learning (FL) is a promising distributed paradigm, eliminating the need for data sharing but facing challenges from data heterogeneity. Personalized parameter generation through a hypernetwork proves effective, yet existing methods fail to personalize local model structures. This leads to redundant parameters struggling to adapt to diverse data distributions. To address these limitations… ▽ More

    Submitted 18 November, 2023; originally announced November 2023.

  5. arXiv:2311.11354  [pdf, other

    cs.CV

    Scale-aware competition network for palmprint recognition

    Authors: Chengrui Gao, Ziyuan Yang, Min Zhu, Andrew Beng ** Teoh

    Abstract: Palmprint biometrics garner heightened attention in palm-scanning payment and social security due to their distinctive attributes. However, prevailing methodologies singularly prioritize texture orientation, neglecting the significant texture scale dimension. We design an innovative network for concurrently extracting intra-scale and inter-scale features to redress this limitation. This paper prop… ▽ More

    Submitted 20 November, 2023; v1 submitted 19 November, 2023; originally announced November 2023.

  6. arXiv:2310.05316  [pdf, other

    cs.CV

    Understanding the Feature Norm for Out-of-Distribution Detection

    Authors: Jaewoo Park, Jacky Chen Long Chai, Jaeho Yoon, Andrew Beng ** Teoh

    Abstract: A neural network trained on a classification dataset often exhibits a higher vector norm of hidden layer features for in-distribution (ID) samples, while producing relatively lower norm values on unseen instances from out-of-distribution (OOD). Despite this intriguing phenomenon being utilized in many applications, the underlying cause has not been thoroughly investigated. In this study, we demyst… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

    Comments: Accepted to ICCV2023

  7. arXiv:2309.14888  [pdf, other

    cs.CV

    Nearest Neighbor Guidance for Out-of-Distribution Detection

    Authors: Jaewoo Park, Yoon Gyo Jung, Andrew Beng ** Teoh

    Abstract: Detecting out-of-distribution (OOD) samples are crucial for machine learning models deployed in open-world environments. Classifier-based scores are a standard approach for OOD detection due to their fine-grained detection capability. However, these scores often suffer from overconfidence issues, misclassifying OOD samples distant from the in-distribution region. To address this challenge, we prop… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: Accepted to ICCV2023

  8. arXiv:2308.00451  [pdf, other

    cs.CV

    Physics-Driven Spectrum-Consistent Federated Learning for Palmprint Verification

    Authors: Ziyuan Yang, Andrew Beng ** Teoh, Bob Zhang, Lu Leng, Yi Zhang

    Abstract: Palmprint as biometrics has gained increasing attention recently due to its discriminative ability and robustness. However, existing methods mainly improve palmprint verification within one spectrum, which is challenging to verify across different spectrums. Additionally, in distributed server-client-based deployment, palmprint verification systems predominantly necessitate clients to transmit pri… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

  9. arXiv:2304.10066  [pdf, other

    cs.CV

    Recognizability Embedding Enhancement for Very Low-Resolution Face Recognition and Quality Estimation

    Authors: Jacky Chen Long Chai, Tiong-Sik Ng, Cheng-Yaw Low, Jaewoo Park, Andrew Beng ** Teoh

    Abstract: Very low-resolution face recognition (VLRFR) poses unique challenges, such as tiny regions of interest and poor resolution due to extreme standoff distance or wide viewing angle of the acquisition devices. In this paper, we study principled approaches to elevate the recognizability of a face in the embedding space instead of the visual quality. We first formulate a robust learning-based face recog… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

    Comments: Accepted to CVPR23

  10. Open-Set Face Identification on Few-Shot Gallery by Fine-Tuning

    Authors: Ho** Park, Jaewoo Park, Andrew Beng ** Teoh

    Abstract: In this paper, we focus on addressing the open-set face identification problem on a few-shot gallery by fine-tuning. The problem assumes a realistic scenario for face identification, where only a small number of face images is given for enrollment and any unknown identity must be rejected during identification. We observe that face recognition models pretrained on a large dataset and naively fine-… ▽ More

    Submitted 5 January, 2023; originally announced January 2023.

    Journal ref: 2022 26th International Conference on Pattern Recognition (ICPR), 2022, pp. 1026-1032

  11. arXiv:2210.00294  [pdf, other

    cs.LG cs.CV

    Gait-based Age Group Classification with Adaptive Graph Neural Network

    Authors: Timilehin B. Aderinola, Tee Connie, Thian Song Ong, Andrew Beng ** Teoh, Michael Kah Ong Goh

    Abstract: Deep learning techniques have recently been utilized for model-free age-associated gait feature extraction. However, acquiring model-free gait demands accurate pre-processing such as background subtraction, which is non-trivial in unconstrained environments. On the other hand, model-based gait can be obtained without background subtraction and is less affected by covariates. For model-based gait-b… ▽ More

    Submitted 1 October, 2022; originally announced October 2022.

  12. Understanding Open-Set Recognition by Jacobian Norm and Inter-Class Separation

    Authors: Jaewoo Park, Ho** Park, Eunju Jeong, Andrew Beng ** Teoh

    Abstract: The findings on open-set recognition (OSR) show that models trained on classification datasets are capable of detecting unknown classes not encountered during the training process. Specifically, after training, the learned representations of known classes dissociate from the representations of the unknown class, facilitating OSR. In this paper, we investigate this emergent phenomenon by examining… ▽ More

    Submitted 29 September, 2023; v1 submitted 23 September, 2022; originally announced September 2022.

    Comments: Accepted to Pattern Recognition

  13. Deep Fidelity in DNN Watermarking: A Study of Backdoor Watermarking for Classification Models

    Authors: Guang Hua, Andrew Beng ** Teoh

    Abstract: Backdoor watermarking is a promising paradigm to protect the copyright of deep neural network (DNN) models. In the existing works on this subject, researchers have intensively focused on watermarking robustness, while the concept of fidelity, which is concerned with the preservation of the model's original functionality, has received less attention. In this paper, focusing on deep image classifica… ▽ More

    Submitted 31 October, 2023; v1 submitted 31 July, 2022; originally announced August 2022.

    Comments: Published in Pattern Recognition

    Journal ref: Pattern Recognition, Vol. 144, Dec. 2023

  14. arXiv:2206.04295  [pdf, other

    cs.CV

    Reconstruct Face from Features Using GAN Generator as a Distribution Constraint

    Authors: Xingbo Dong, Zhihui Miao, Lan Ma, Jiajun Shen, Zhe **, Zhenhua Guo, Andrew Beng ** Teoh

    Abstract: Face recognition based on the deep convolutional neural networks (CNN) shows superior accuracy performance attributed to the high discriminative features extracted. Yet, the security and privacy of the extracted features from deep learning models (deep features) have been often overlooked. This paper proposes the reconstruction of face images from deep features without accessing the CNN network co… ▽ More

    Submitted 9 June, 2022; originally announced June 2022.

  15. arXiv:2205.14575  [pdf, other

    cs.CV cs.AI cs.LG

    3D-C2FT: Coarse-to-fine Transformer for Multi-view 3D Reconstruction

    Authors: Leslie Ching Ow Tiong, Dick Sigmund, Andrew Beng ** Teoh

    Abstract: Recently, the transformer model has been successfully employed for the multi-view 3D reconstruction problem. However, challenges remain on designing an attention mechanism to explore the multiview features and exploit their relations for reinforcing the encoding-decoding modules. This paper proposes a new model, namely 3D coarse-to-fine transformer (3D-C2FT), by introducing a novel coarse-to-fine(… ▽ More

    Submitted 17 January, 2023; v1 submitted 29 May, 2022; originally announced May 2022.

    Comments: Accepted by Asian Conference on Computer Vision (ACCV) 2022

  16. arXiv:2203.04042  [pdf, other

    eess.IV cs.CV

    Abandoning the Bayer-Filter to See in the Dark

    Authors: Xingbo Dong, Wanyan Xu, Zhihui Miao, Lan Ma, Chao Zhang, Jiewen Yang, Zhe **, Andrew Beng ** Teoh, Jiajun Shen

    Abstract: Low-light image enhancement - a pervasive but challenging problem, plays a central role in enhancing the visibility of an image captured in a poor illumination environment. Due to the fact that not all photons can pass the Bayer-Filter on the sensor of the color camera, in this work, we first present a De-Bayer-Filter simulator based on deep neural networks to generate a monochrome raw image from… ▽ More

    Submitted 22 March, 2022; v1 submitted 8 March, 2022; originally announced March 2022.

  17. Periocular Embedding Learning with Consistent Knowledge Distillation from Face

    Authors: Yoon Gyo Jung, Jaewoo Park, Cheng Yaw Low, Jacky Chen Long Chai, Leslie Ching Ow Tiong, Andrew Beng ** Teoh

    Abstract: Periocular biometric, the peripheral area of the ocular, is a collaborative alternative to the face, especially when the face is occluded or masked. However, in practice, sole periocular biometric capture the least salient facial features, thereby lacking discriminative information, particularly in wild environments. To address these problems, we transfer discriminatory information from the face t… ▽ More

    Submitted 28 January, 2024; v1 submitted 12 December, 2020; originally announced December 2020.

    Comments: Accepted to Neurocomputing

  18. arXiv:2006.13051  [pdf, other

    cs.CR

    Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack

    Authors: Hanrui Wang, Xingbo Dong, Zhe **, Andrew Beng ** Teoh, Massimo Tistarelli

    Abstract: In cancellable biometrics (CB) schemes, template security is achieved by applying, mainly non-linear, transformations to the biometric template. The transformation is designed to preserve the template distance/similarity in the transformed domain. Despite its effectiveness, the security issues attributed to similarity preservation property of CB are underestimated. Dong et al. [BTAS'19], exploited… ▽ More

    Submitted 17 June, 2021; v1 submitted 23 June, 2020; originally announced June 2020.

  19. Discriminative Multi-level Reconstruction under Compact Latent Space for One-Class Novelty Detection

    Authors: Jaewoo Park, Yoon Gyo Jung, Andrew Beng ** Teoh

    Abstract: In one-class novelty detection, a model learns solely on the in-class data to single out out-class instances. Autoencoder (AE) variants aim to compactly model the in-class data to reconstruct it exclusively, thus differentiating the in-class from out-class by the reconstruction error. However, compact modeling in an improper way might collapse the latent representations of the in-class data and th… ▽ More

    Submitted 17 February, 2021; v1 submitted 3 March, 2020; originally announced March 2020.

    Comments: Accepted to ICPR 2020 Oral (acceptance rate 4.4%)

  20. arXiv:1910.07770  [pdf, other

    cs.CV

    On the Risk of Cancelable Biometrics

    Authors: Xingbo Dong, Jaewoo Park, Zhe **, Andrew Beng ** Teoh, Massimo Tistarelli, KokSheik Wong

    Abstract: Cancelable biometrics (CB) employs an irreversible transformation to convert the biometric features into transformed templates while preserving the relative distance between two templates for security and privacy protection. However, distance preservation invites unexpected security issues such as pre-image attacks, which are often neglected.This paper presents a generalized pre-image attack metho… ▽ More

    Submitted 29 September, 2022; v1 submitted 17 October, 2019; originally announced October 2019.

  21. arXiv:1902.06383  [pdf, other

    cs.CV cs.LG eess.IV

    Periocular Recognition in the Wild with Orthogonal Combination of Local Binary Coded Pattern in Dual-stream Convolutional Neural Network

    Authors: Leslie Ching Ow Tiong, Andrew Beng ** Teoh, Yunli Lee

    Abstract: In spite of the advancements made in the periocular recognition, the dataset and periocular recognition in the wild remains a challenge. In this paper, we propose a multilayer fusion approach by means of a pair of shared parameters (dual-stream) convolutional neural network where each network accepts RGB data and a novel colour-based texture descriptor, namely Orthogonal Combination-Local Binary C… ▽ More

    Submitted 19 March, 2019; v1 submitted 17 February, 2019; originally announced February 2019.

    Comments: Accepted in International Conference On Biometrics 2019

  22. arXiv:1811.11489  [pdf

    cs.CV

    Fixed-length Bit-string Representation of Fingerprint by Normalized Local Structures

    Authors: Jun Beom Kho, Andrew B. J. Teoh, Wonjune Lee, Jaihie Kim

    Abstract: In this paper, we propose a method to represent a fingerprint image by an ordered, fixed-length bit-string providing improved accuracy performance, faster matching time and compressibility. First, we devise a novel minutia-based local structure modeled by a mixture of 2D elliptical Gaussian functions in the pixel space. Each local structure is mapped to the Euclidean space by normalizing the local… ▽ More

    Submitted 28 November, 2018; originally announced November 2018.

    Comments: 16 pages, 15 figures, 10 tables

  23. arXiv:1809.11045  [pdf

    cs.CV

    A Symmetric Keyring Encryption Scheme for Biometric Cryptosystems

    Authors: Yen-Lung Lai, Jung-Yeon Hwang, Zhe **, Soohyong Kim, Sangrae Cho, Andrew Beng ** Teoh

    Abstract: In this paper, we propose a novel biometric cryptosystem for vectorial biometrics named symmetric keyring encryption (SKE) inspired by Rivest's keyring model (2016). Unlike conventional biometric secret-binding primitives, such as fuzzy commitment and fuzzy vault, the proposed scheme reframes the biometric secret-binding problem as a fuzzy symmetric encryption problem with a notion called resilien… ▽ More

    Submitted 28 September, 2018; originally announced September 2018.

    Comments: 15 pages, 5 figures, 5 tables

  24. Ranking Based Locality Sensitive Hashing Enabled Cancelable Biometrics: Index-of-Max Hashing

    Authors: Zhe **, Yen-Lung Lai, Jung-Yeon Hwang, Soohyung Kim, Andrew Beng ** Teoh

    Abstract: In this paper, we propose a ranking based locality sensitive hashing inspired two-factor cancelable biometrics, dubbed "Index-of-Max" (IoM) hashing for biometric template protection. With externally generated random parameters, IoM hashing transforms a real-valued biometric feature vector into discrete index (max ranked) hashed code. We demonstrate two realizations from IoM hashing notion, namely… ▽ More

    Submitted 17 September, 2017; v1 submitted 15 March, 2017; originally announced March 2017.

    Comments: 15 pages, 8 figures, 6 tables

  25. arXiv:1607.06902  [pdf

    cs.CV cs.CR

    Rank Correlation Measure: A Representational Transformation for Biometric Template Protection

    Authors: Zhe **, Yen-Lung Lai, Andrew Beng ** Teoh

    Abstract: Despite a variety of theoretical-sound techniques have been proposed for biometric template protection, there is rarely practical solution that guarantees non-invertibility, cancellability, non-linkability and performance simultaneously. In this paper, a ranking-based representational transformation is proposed for fingerprint templates. The proposed method transforms a real-valued feature vector… ▽ More

    Submitted 23 July, 2016; originally announced July 2016.

    Comments: 6 pages, 5 figures, 2 tables, 1 algorithm

  26. Multi-Fold Gabor, PCA and ICA Filter Convolution Descriptor for Face Recognition

    Authors: Cheng Yaw Low, Andrew Beng ** Teoh, Cong Jie Ng

    Abstract: This paper devises a new means of filter diversification, dubbed multi-fold filter convolution (M-FFC), for face recognition. On the assumption that M-FFC receives single-scale Gabor filters of varying orientations as input, these filters are self-cross convolved by M-fold to instantiate a filter offspring set. The M-FFC flexibility also permits cross convolution amongst Gabor filters and other fi… ▽ More

    Submitted 19 October, 2017; v1 submitted 24 April, 2016; originally announced April 2016.

    Comments: 14 pages, 10 figures, 10 tables

  27. DCTNet : A Simple Learning-free Approach for Face Recognition

    Authors: Cong Jie Ng, Andrew Beng ** Teoh

    Abstract: PCANet was proposed as a lightweight deep learning network that mainly leverages Principal Component Analysis (PCA) to learn multistage filter banks followed by binarization and block-wise histograming. PCANet was shown worked surprisingly well in various image classification tasks. However, PCANet is data-dependence hence inflexible. In this paper, we proposed a data-independence network, dubbed… ▽ More

    Submitted 29 September, 2015; v1 submitted 8 July, 2015; originally announced July 2015.

    Comments: APSIPA ASC 2015