ForSe Overview Forensics and Security Laboratory (ForSe Lab) School of Computer Engineering Nanyang Technological University.

Slides:



Advertisements
Similar presentations
A Thermal Hand Vein Pattern Verification System Lingyu Wang & Graham Leedham Forensic and Security Lab, Nanyang Technological University, Singapore.
Advertisements

DR. GABRIELA CZANNER, 30 NOVEMBER 2011 STATISTICAL CONSULTANCY AT DEPARTMENT OF STATISTICS Web:
College of Polytechnics Jihlava Closing conference on ElBiK project Michal Vopálenský.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Biologically Inspired Computing, Nanoelectronic (Molecular Scale) Architectures Dr. Dan Hammerstrom Selected Publications.
The IGERT Program Preliminary Proposals June 2008 Carol Van Hartesveldt IGERT Program Director IGERT Program Director.
FaceFlow: Face Recognition System Dr. Ming Zhang, Associate Professor Department of Physics, Computer Science & Engineering College of Liberal Arts and.
NUFFIELD DEPARTMENT OF PRIMARY CARE HEALTH SCIENCES Applying for an MRC fellowship Dr James Sheppard Nuffield Department of Primary Care Health Sciences.
Development and Promotion of the Faculty Teams in the Schools / Departments of Computer Science of the Universities in China Professor Xu Xiaofei School.
College of Computer Sciences & Engineering Systems Engineering Center of Excellence IN MAINTENANCE Dr. Omar Al-Turki Dr. Salih Duffuaa.
1 6/8/2007 Prof. Victor O.K. Li Department of EEE The University of Hong Kong Information Engineering (InfoE) 訊息工程.
Hong Kong University of Science & Technology Research & Development Hong Kong University of Science & Technology 1 Junior Faculty Recruitment and Development.
Computer Vision UNR Dr. George Bebis
Azriel Rosenfeld Prepared by Ben Shneiderman. Azriel Rosenfeld ( )
Department of Information and Communication Traffic University of Zagreb Faculty of Transport and Traffic Sciences.
IEEE Macau Section. Prof. Rui Martins, Chairman R10 Annual Meeting in Adelaide, Australia – April 16 th and 17 th 2004 EEE Activities in Macao Birth,
ADRIAN DAVID CHEOK City University London College Building, Room A304J St John Street EC1V 4PB London, UK.
National Institute of Standards and Technology U.S. Department of Commerce TheTechnology Innovation Program (TIP) Standard Presentation of TIP Marc G.
29 Aug 2013 (Thu), Hanoi, Vietnam 2013 Springer SEA eBooks Seminar: Speaker Profiles.
1 IEEE Intelligent Transportation Systems (ITS) Council, International Collaboration to help People Travel Smarter Daniel J Dailey Ph.D. Past President.
Título do capítulo An international center of excellence in human resources, research and technology generation in the fields of Computer Science and Engineering.
Professor Juin J. Liu( 劉俊傑 ) Department of Electrical and Computer Engineering University of Central Florida Research Interests: Semiconductor device modeling.
Distinguished Talk Prof. Wai Ho Mow, Senior Member of IEEE Dept. of ECE, HKUST On January 26, 2011 National Taiwan University of Science and Technology.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
A National Coalition for Manufacturing Innovation Mission Statement and Strategic Plan Generated at Initial Planning Meeting June 2005.
Face Recognition System By Arthur. Introduction  A facial recognition system is a computer application for automatically identifying or verifying a person.
Overview & Highlights. About the Department 1975 – CS courses first taught in HKU 1982 – BSc(CompStud) first offered 1988 – CS Department Founded Academic.
Intelligent Large Scale Sensing Systems (ILS 3 ) initiative Initiative Status and Activities Kevin M. McNeill, PhD Research Assoc. Professor Director,
Introduction 1. Aims of these sessions Introduction to UoP processes Mutual support The "one hour" in the week… 2.
Working Groups Meeting in Malta on January 29, 2012 “Building Triple Helix Multi-Media Clusters and increasing cooperation between the partner regions.
1 IEEE women In Engineering (WIE) Towards Increasing Women EE Engineers in Region 10 Prepared & presented by: Dr. Tuptim Angkaew on behalf of Prof. M.
Online Kinect Handwritten Digit Recognition Based on Dynamic Time Warping and Support Vector Machine Journal of Information & Computational Science, 2015.
Fellowships Day at Imperial College Sarah Fox 3 rd July 2007.
A Presentation By Wayne Lawton Department of Mathematics National University of Singapore.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
CISE IAB Meeting Nov. 2, ABET 2006 Clean bill of health! Special thanks to:  CISE & CEN IAB  Bandyopadhaya, Bermudez, Newman.
HIGH IMPACT RESEARCH (HIR) UNIVERSITY OF MALAYA BIRTH OF THE HIR ERA.
Data and Applications Security Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham The University of Texas at Dallas April 25, 2006.
Distinguished Talk Dr. Jun Wang, IEEE Fellow Professor Dept. of Mechanical and Automation Engineering, The Chinese University of Hong Kong For further.
Biometric Technologies
A multidisciplinary graduate program in the Dietrich School dedicated to Applied Artificial Intelligence (AI) Program Goals Provide an outstanding interdisciplinary.
UIC College of Engineering Six Academic Departments with Graduate and Undergraduate Programs Bioengineering, Chemical Engineering, Civil & Materials Engineering,
Computer Vision UNR George Bebis Computer Vision Laboratory (CVL) Department of Computer Science and Engineering University of Nevada, Reno,
MAINE Jan 11-13, 2007Regional Chapter Chairs Congress, Las VegasDr. Ali Abedi Communications Society Maine Chapter Chair: Dr. Ali Abedi.
OMICS International welcomes submissions that are original and technically so as to serve both the developing world and developed countries in the best.
26 April 2017 Introduction to IEEE
OMICS International welcomes submissions that are original and technically so as to serve both the developing world and developed countries in the best.
Information Security Prof. David Zhang Department of Computing Hong Kong Polytechnic University Tel: PQ809
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
WLD: A Robust Local Image Descriptor Jie Chen, Shiguang Shan, Chu He, Guoying Zhao, Matti Pietikäinen, Xilin Chen, Wen Gao 报告人:蒲薇榄.
Item 4 - Intrusion Detection and Prevention Yuh-Jye Lee Dept. of Computer Science and Information Engineering National Taiwan University of Science and.
1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Under Guidance of Mr. A. S. Jalal Associate Professor Dept. of Computer Engineering and Applications GLA University, Mathura Presented by Dev Drume Agrawal.
E-Health Workshop on Remote Health using Technology (RHT) 2017
Association of Academic Health Centers
Faculty of Engineering at Shoubra
International Journal of Sensor Networks and Data Communications
ABSTRACT FACE RECOGNITION RESULTS
Seunghui Cha1, Wookhyun Kim1
Biometrics Authentication
Seminar Presentation on Biometrics
PhD Programme Computer Science, HKBU
PhD Programme Computer Science, HKBU
A SEMINAR REPORT ON BIOMETRICS
2019 Summer PhD Research Experience Programme Computer Science, HKBU
Makerere University, College of Humanities and Social Sciences and UNISA, College of Human Sciences January 2018 Title slide – option 2.
Jinchang Ren’s Brief Biography
Jiangbin Zheng’s Brief Biography
An Overview of the Post-Graduate Education and Training Program
Presentation transcript:

ForSe Overview Forensics and Security Laboratory (ForSe Lab) School of Computer Engineering Nanyang Technological University

2 Mission of ForSe Lab  To create a synergistic group dedicated to research in the application of computational techniques to biometrics, information security and forensic analysis.  To perform cutting edge research and train and develop talents to support Singapore’s efforts in the areas of Homeland Security and Infocomm Security.  To make use of strong research base to further enhance the research contributions from NTU to the international arena in the areas of forensic and security.

3 Vision of ForSe lab  To be one of the major research labs/centres for research and development in the areas of forensics, biometrics, and security technologies.  To be a strong research arm between academic and industry to support R&D activities in forensics and security for Singapore.

4 Facts and Figures  Established in late  6 active faculty members, 1 research assistant, 1 lab executive, 11 PhD students.  6 funded projects with total amount over S$500K.  Supports approximately Final Year Projects every academic year

5 Research Funding Award  InfoComm Research cluster, NTU  Institute for Infocomm Research (I2R) – Joint Collaboration Project with I2R  Three Academic Research Fund Tier 1, Ministry of Education, Singapore  MINDEF-NTU Joint R&D project

6 Active Members David Cho (Asst Prof) Director Maylor Leung (Assoc Prof) Vinod Prasad (Asst Prof) Adams Kong (Asst Prof) Sudha Natarajan (Asst Prof) Li Fang (Lecturer)

7 Our Knowledge/Expertise  Pattern Recognition  Machine Learning  Digital Signal Processing  Image Processing  Embedded System  Information Security  Software Engineering

8 Research Focused Areas

9 Key Contributions – Forensic Analysis  Hand Vein Pattern Analysis Hand Vein Pattern Analysis  Speaker Identification  Acoustic Voice Feature  Image Forgery Detection Image Forgery Detection  Skin and/or Hair Analysis Skin and/or Hair Analysis

10 Key Contributions – Biometrics Technology  Facial Thermal pattern analysis Facial Thermal pattern analysis  Palmprint recognition  Face recognition  Iris recognition  Ear recognition Ear recognition

11 Key Contributions – Security Engineering  An Embedded Camera System for Vision Based Surveillance  Hidden Weapon Detection Hidden Weapon Detection  Human behaviour and brain analysis  EEG Signal Analysis  Emotion Recognition Emotion Recognition

12 Future Plans in ForSe Lab  To extend and build more research activities with the research areas of the lab to attract external funding.  To focus our staffs to prepare and submit major research proposals to several funding agencies, such as, AcRF, A-Star, DSTA, DSO,…etc.  To collaborate with other major organizations, such as, I2R, Singapore Police Force, MHA and also some companies in security industry, …etc.  To continue our excellent tradition of publishing our new discoveries and theories in renowned journals, conferences,…etc.

13 Collaborators  International  Prof. Graham Leedham, Dean of School, University of New England, Australia  Prof. M. Kamel, IEEE Fellow, University of Waterloo, Canada  Dr. Noah Caft, MD, PhD, Assistant Professor, UCAL, USA  Prof. D. Zhang, IEEE Fellow, The Hong Kong Polytechnic University, HK  Prof. Tommy Chow, City University of Hong Kong  Local  Dr. Li Haizhou, Dr Guan Cuntai and Dr. Vladimir Pervouchine, Institute of Infocomm Research (I2R)  Dr. TAY Ming Kiong Michael, Director, Physical Evidence Division, Applied Sciences Group  Ms. LIM Chin Chin, Head, Criminalistics Laboratory, Centre for Forensic Science  Dr. LOH Tsee Foong, MD, Head and Senior Consultant, KK Women’s and Children’s Hospital  Dr. James Wong (Application Architect), PCS Security Pte Ltd

14 Recent Publication  L. Wang, G. Leedham and Siu-Yeung Cho, "Minutiae Feature Analysis for Infrared Hand Vein Pattern Biometrics", Pattern Recognition (JCR impact factor: 3.279), 41 (3), pp ,  Lingyu Wang, Graham Leedham and Siu-Yeung Cho, “A Physiological Vein Pattern Biometric System”, HKIE Transactions, vol. 15, iss. 4, Dec (shortlisted paper for The HKIE Outstanding Paper Award for Young Engineers/Researchers 2008).The HKIE Outstanding Paper Award for Young Engineers/Researchers 2008  L. Wang, G. Leedham and S.-Y. Cho, "Infrared imaging of hand vein patterns for biometric purposes", IET Computer Vision (JCR impact factor: 0.667), vol. 1, Iss. 3-4, pp , Dec  Siu-Yeung Cho, Lingyu Wang and Wen Jin Ong, “Thermal Imprint Feature Analysis for Face Recognition”, in IEEE International Symposium on Industrial Electronics 2009, July 2009, Seoul, Korea.  Haishan Zhong, Siu-Yeung (David) Cho, Vladimir Pervouchine, Graham Leedham, “Combining Novel Acoustic Features using SVM to Detect Speaker Changing Points”, BIOSIGNALS (1) 2008:  N.B. Puhan and N. Sudha, "A novel iris database indexing method using the iris color", Proceedings of the IEEE International Conference on Industrial Electronics and Applications, Singapore, June 2008.

15 Thank you!

16 Hand-vein pattern analysis  A vein pattern refers to the vast network of blood vessels underneath the skin of a certain part of a person’s body  Images captured in an air-conditioned office environment (20-25°C and <50% humidity) FIR Image of Back of hand imaged in a normal office environment – major veins are clearly visible NIR images of the palms of two hands NIR images of the back of the hand (left) and the wrist (right)

17 Hand-vein pattern analysis  We have proposed a system that recognizes the human hand vein pattern images acquired by both far and near-infrared camera, which consists of five individual stages Image Acquisition Vein Pattern Segmentation Skeletonization Shape Match Decision RawImagesFinerImages Database VeinPattern Template Image Enhancement & ROI Selection Data Collection Vein Pattern Extraction

18 Results Skeleton and Minutiae Points of the Vein Pattern Error Rate Curves for Minutiae Recognition Using the Modified Hausdorff Distance (EER=7.5% when the threshold is set to 25) Return

19 Image Forgery Detection  With the advent of low-cost and high-resolution digital cameras, and sophisticated photo editing software, digital images can be easily manipulated and altered.  create forgeries, which are indistinguishable by naked eye (a) Real image; (b) Forged version; (c) Duplicated regions Return

20 Skin Analysis Skin marking systemData collection system Return

21 Principles of Thermal Facial Patterns for Biometrics  The convective heat transfer from the flow of warm arterial blood in superficial vessels is at a temperature gradient against the cooler surrounding tissue  Creating a characteristic thermal imprint on our face  This thermal pattern provides an alternative feature sets in addition to those visible features for face recognition P. Buddharaju,et. al, “Physiology-Based face Recognition in the Thermal Infrared Spectrum”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.29 no.4, pp , April 2007.

22 Database  Data Collection  Thermal face images can be formed by capturing the temperature profile by the NEC TH9100SL thermal camera  Grayscale images with a resolution of 320x240 are used.  Database provided by Equinox Corporation.  Frontal thermal face dataset  300 images from 30 different subjects (10 images for each subjects).

23 Face Segmentation (b) Edge detection with small objects removed (c) Centre portion of the image is flood filled (d) Difference Image (f) Contrast adjusted (a) Image after enhancement (e) Mask is multiplied with the image

24 Extracting Thermal Minutiae Points  Use morphological top-hat operation to obtain the critical edge map  Then extract the minutiae points by the cross numbering concept. (a) Thermal face region(b) Critical edge map (c) Minutiae points

25 Matching the Aligned TMPs  Using the same MHD measurement  Achieved 6.7% EER Return

26 Ear Recognition  Rationale:  Earmarks can be used as a biometric, but a computerized system for earmarks identification does not existed.  The structure of the ear does not change radically over time, especially after the first four months of birth.

27 Ear Recognition  Current work:  Build a ear profile database of 38 individuals (will be extended the number later)  Implement an automatic ear detection, localization and recognition system  A 11% Equal-Error-Rate is achieved. Return

28 Concealed Weapon Detection  Objective: to find out the feasibility of software based image processing techniques in detecting concealed weapons with infrared (IR) thermal imager without violating the privacy of the people involved. Visible image IR image Fused IR image NEC Thermo Tracer

29 Concealed Weapon Detection  On-going works:  Fuzzy clustering of IR images  Advanced image registration methods  Intelligent and decision based image fusion  Robust shape matching  Collaborating with EEE staffs to work with IR and MMW image sensing Return

30 Human behaviour and brain analysis – Emotion Recognition Potential applications: Lie detection for forensics Crime investigation Understanding Criminal Psychology Typical real-time facial expression system Return