Abstract-Classical iris biometric systems assume ideal environmental conditions and cooperative users for image acquisition. When conditions are less ideal or users are uncooperative or unaware of their biometrics being taken the image acquisition quality suffers. This makes it harder for iris localization and segmentation algorithms to properly segment the acquired image into iris and non-iris parts. Segmentation is a critical part in iris recognition systems, since errors in this initial stage are propagated to subsequent processing stages. Therefore, the performance of iris segmentation algorithms is paramount to the performance of the overall system. In order to properly evaluate and develop iris segmentation algorithm, especially under difficult conditions like off angle and significant occlusions or bad lighting, it is beneficial to directly assess the segmentation algorithm. Currently, when evaluating the performance of iris segmentation algorithms this is mostly done by utilizing the recognition rate, and consequently the overall performance of the biometric system. In order to streamline the development and assessment of iris segmentation algorithms with the dependence on the whole biometric system we have generated a iris segmentation ground truth database. We will show a method for evaluating iris segmentation performance base on this ground truth database and give examples of how to identify problematic cases in order to further analyse the segmentation algorithms.
a b s t r a c tVisual security metrics are deterministic measures with the (claimed) ability to assess whether an encryption method for visual data does achieve its defined goal. These metrics are usually developed together with a particular encryption method in order to provide an evaluation of said method based on its visual output. However, visual security metrics themselves are rarely evaluated and the claim to perform as a visual security metric is not tied to the specific encryption method for which they were developed. In this paper, we introduce a methodology for assessing the performance of security metrics based on common media encryption scenarios. We systematically evaluate visual security metrics proposed in the literature, along with conventional image metrics which are frequently used for the same task. We show that they are generally not suitable to perform their claimed task.
This paper investigates the potential of fusion at normalisation/segmentation level prior to feature extraction. While there are several biometric fusion methods at data/feature level, score level and rank/decision level combining raw biometric signals, scores, or ranks/decisions, this type of fusion is still in its infancy. However, the increasing demand to allow for more relaxed and less invasive recording conditions, especially for onthe-move iris recognition, suggests to further investigate fusion at this very low level. This paper focuses on the approach of multi-segmentation fusion for iris biometric systems investigating the benefit of combining the segmentation result of multiple normalisation algorithms, using four methods from two different public iris toolkits (USIT, OSIRIS) on the public CASIA and IITD iris datasets. Evaluations based on recognition accuracy and ground truth segmentation data indicate high sensitivity with regards to the type of errors made by segmentation algorithms.
We propose a selective encryption scheme for HEVC which allows for transparent encryption in a wide range of quantization parameters. Our approach focusses on the AC coefficient signs, since they can be altered directly in the bit stream without entropy reencoding. This allows for fast encryption and decryption while retaining full formatcompliance and length-preservation. Furthermore, we show our approach's applicability for a number of use cases by evaluating the quality degradation and robustness against attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.