-
Exploiting Multiple Representations: 3D Face Biometrics Fusion with Application to Surveillance
Authors:
Simone Maurizio La Cava,
Roberto Casula,
Sara Concas,
Giulia Orrù,
Ruben Tolosana,
Martin Drahansky,
Julian Fierrez,
Gian Luca Marcialis
Abstract:
3D face reconstruction (3DFR) algorithms are based on specific assumptions tailored to the limits and characteristics of the different application scenarios. In this study, we investigate how multiple state-of-the-art 3DFR algorithms can be used to generate a better representation of subjects, with the final goal of improving the performance of face recognition systems in challenging uncontrolled…
▽ More
3D face reconstruction (3DFR) algorithms are based on specific assumptions tailored to the limits and characteristics of the different application scenarios. In this study, we investigate how multiple state-of-the-art 3DFR algorithms can be used to generate a better representation of subjects, with the final goal of improving the performance of face recognition systems in challenging uncontrolled scenarios. We also explore how different parametric and non-parametric score-level fusion methods can exploit the unique strengths of multiple 3DFR algorithms to enhance biometric recognition robustness. With this goal, we propose a comprehensive analysis of several face recognition systems across diverse conditions, such as varying distances and camera setups, intra-dataset and cross-dataset, to assess the robustness of the proposed ensemble method. The results demonstrate that the distinct information provided by different 3DFR algorithms can alleviate the problem of generalizing over multiple application scenarios. In addition, the present study highlights the potential of advanced fusion strategies to enhance the reliability of 3DFR-based face recognition systems, providing the research community with key insights to exploit them in real-world applications effectively. Although the experiments are carried out in a specific face verification setup, our proposed fusion-based 3DFR methods may be applied to other tasks around face biometrics that are not strictly related to identity recognition.
△ Less
Submitted 26 April, 2025;
originally announced April 2025.
-
Fragile Watermarking for Image Certification Using Deep Steganographic Embedding
Authors:
Davide Ghiani,
Jefferson David Rodriguez Chivata,
Stefano Lilliu,
Simone Maurizio La Cava,
Marco Micheletto,
Giulia Orrù,
Federico Lama,
Gian Luca Marcialis
Abstract:
Modern identity verification systems increasingly rely on facial images embedded in biometric documents such as electronic passports. To ensure global interoperability and security, these images must comply with strict standards defined by the International Civil Aviation Organization (ICAO), which specify acquisition, quality, and format requirements. However, once issued, these images may underg…
▽ More
Modern identity verification systems increasingly rely on facial images embedded in biometric documents such as electronic passports. To ensure global interoperability and security, these images must comply with strict standards defined by the International Civil Aviation Organization (ICAO), which specify acquisition, quality, and format requirements. However, once issued, these images may undergo unintentional degradations (e.g., compression, resizing) or malicious manipulations (e.g., morphing) and deceive facial recognition systems. In this study, we explore fragile watermarking, based on deep steganographic embedding as a proactive mechanism to certify the authenticity of ICAO-compliant facial images. By embedding a hidden image within the official photo at the time of issuance, we establish an integrity marker that becomes sensitive to any post-issuance modification. We assess how a range of image manipulations affects the recovered hidden image and show that degradation artifacts can serve as robust forensic cues. Furthermore, we propose a classification framework that analyzes the revealed content to detect and categorize the type of manipulation applied. Our experiments demonstrate high detection accuracy, including cross-method scenarios with multiple deep steganography-based models. These findings support the viability of fragile watermarking via steganographic embedding as a valuable tool for biometric document integrity verification.
△ Less
Submitted 18 April, 2025;
originally announced April 2025.
-
Exploring 3D Face Reconstruction and Fusion Methods for Face Verification: A Case-Study in Video Surveillance
Authors:
Simone Maurizio La Cava,
Sara Concas,
Ruben Tolosana,
Roberto Casula,
Giulia Orrù,
Martin Drahansky,
Julian Fierrez,
Gian Luca Marcialis
Abstract:
3D face reconstruction (3DFR) algorithms are based on specific assumptions tailored to distinct application scenarios. These assumptions limit their use when acquisition conditions, such as the subject's distance from the camera or the camera's characteristics, are different than expected, as typically happens in video surveillance. Additionally, 3DFR algorithms follow various strategies to addres…
▽ More
3D face reconstruction (3DFR) algorithms are based on specific assumptions tailored to distinct application scenarios. These assumptions limit their use when acquisition conditions, such as the subject's distance from the camera or the camera's characteristics, are different than expected, as typically happens in video surveillance. Additionally, 3DFR algorithms follow various strategies to address the reconstruction of a 3D shape from 2D data, such as statistical model fitting, photometric stereo, or deep learning. In the present study, we explore the application of three 3DFR algorithms representative of the SOTA, employing each one as the template set generator for a face verification system. The scores provided by each system are combined by score-level fusion. We show that the complementarity induced by different 3DFR algorithms improves performance when tests are conducted at never-seen-before distances from the camera and camera characteristics (cross-distance and cross-camera settings), thus encouraging further investigations on multiple 3DFR-based approaches.
△ Less
Submitted 16 September, 2024;
originally announced September 2024.
-
SDFR: Synthetic Data for Face Recognition Competition
Authors:
Hatef Otroshi Shahreza,
Christophe Ecabert,
Anjith George,
Alexander Unnervik,
Sébastien Marcel,
Nicolò Di Domenico,
Guido Borghi,
Davide Maltoni,
Fadi Boutros,
Julia Vogel,
Naser Damer,
Ángela Sánchez-Pérez,
EnriqueMas-Candela,
Jorge Calvo-Zaragoza,
Bernardo Biesseck,
Pedro Vidal,
Roger Granada,
David Menotti,
Ivan DeAndres-Tame,
Simone Maurizio La Cava,
Sara Concas,
Pietro Melzi,
Ruben Tolosana,
Ruben Vera-Rodriguez,
Gianpaolo Perelli
, et al. (3 additional authors not shown)
Abstract:
Large-scale face recognition datasets are collected by crawling the Internet and without individuals' consent, raising legal, ethical, and privacy concerns. With the recent advances in generative models, recently several works proposed generating synthetic face recognition datasets to mitigate concerns in web-crawled face recognition datasets. This paper presents the summary of the Synthetic Data…
▽ More
Large-scale face recognition datasets are collected by crawling the Internet and without individuals' consent, raising legal, ethical, and privacy concerns. With the recent advances in generative models, recently several works proposed generating synthetic face recognition datasets to mitigate concerns in web-crawled face recognition datasets. This paper presents the summary of the Synthetic Data for Face Recognition (SDFR) Competition held in conjunction with the 18th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2024) and established to investigate the use of synthetic data for training face recognition models. The SDFR competition was split into two tasks, allowing participants to train face recognition systems using new synthetic datasets and/or existing ones. In the first task, the face recognition backbone was fixed and the dataset size was limited, while the second task provided almost complete freedom on the model backbone, the dataset, and the training pipeline. The submitted models were trained on existing and also new synthetic datasets and used clever methods to improve training with synthetic data. The submissions were evaluated and ranked on a diverse set of seven benchmarking datasets. The paper gives an overview of the submitted face recognition models and reports achieved performance compared to baseline models trained on real and synthetic datasets. Furthermore, the evaluation of submissions is extended to bias assessment across different demography groups. Lastly, an outlook on the current state of the research in training face recognition models using synthetic data is presented, and existing problems as well as potential future directions are also discussed.
△ Less
Submitted 9 April, 2024; v1 submitted 6 April, 2024;
originally announced April 2024.
-
LivDet2023 -- Fingerprint Liveness Detection Competition: Advancing Generalization
Authors:
Marco Micheletto,
Roberto Casula,
Giulia Orrù,
Simone Carta,
Sara Concas,
Simone Maurizio La Cava,
Julian Fierrez,
Gian Luca Marcialis
Abstract:
The International Fingerprint Liveness Detection Competition (LivDet) is a biennial event that invites academic and industry participants to prove their advancements in Fingerprint Presentation Attack Detection (PAD). This edition, LivDet2023, proposed two challenges, Liveness Detection in Action and Fingerprint Representation, to evaluate the efficacy of PAD embedded in verification systems and t…
▽ More
The International Fingerprint Liveness Detection Competition (LivDet) is a biennial event that invites academic and industry participants to prove their advancements in Fingerprint Presentation Attack Detection (PAD). This edition, LivDet2023, proposed two challenges, Liveness Detection in Action and Fingerprint Representation, to evaluate the efficacy of PAD embedded in verification systems and the effectiveness and compactness of feature sets. A third, hidden challenge is the inclusion of two subsets in the training set whose sensor information is unknown, testing participants ability to generalize their models. Only bona fide fingerprint samples were provided to participants, and the competition reports and assesses the performance of their algorithms suffering from this limitation in data availability.
△ Less
Submitted 27 September, 2023;
originally announced September 2023.
-
3D Face Reconstruction: the Road to Forensics
Authors:
Simone Maurizio La Cava,
Giulia Orrù,
Martin Drahansky,
Gian Luca Marcialis,
Fabio Roli
Abstract:
3D face reconstruction algorithms from images and videos are applied to many fields, from plastic surgery to the entertainment sector, thanks to their advantageous features. However, when looking at forensic applications, 3D face reconstruction must observe strict requirements that still make its possible role in bringing evidence to a lawsuit unclear. An extensive investigation of the constraints…
▽ More
3D face reconstruction algorithms from images and videos are applied to many fields, from plastic surgery to the entertainment sector, thanks to their advantageous features. However, when looking at forensic applications, 3D face reconstruction must observe strict requirements that still make its possible role in bringing evidence to a lawsuit unclear. An extensive investigation of the constraints, potential, and limits of its application in forensics is still missing. Shedding some light on this matter is the goal of the present survey, which starts by clarifying the relation between forensic applications and biometrics, with a focus on face recognition. Therefore, it provides an analysis of the achievements of 3D face reconstruction algorithms from surveillance videos and mugshot images and discusses the current obstacles that separate 3D face reconstruction from an active role in forensic applications. Finally, it examines the underlying data sets, with their advantages and limitations, while proposing alternatives that could substitute or complement them.
△ Less
Submitted 20 September, 2023;
originally announced September 2023.
-
3D Face Reconstruction for Forensic Recognition -- A Survey
Authors:
Simone Maurizio La Cava,
Giulia Orrù,
Tomáš Goldmann,
Martin Drahansky,
Gian Luca Marcialis
Abstract:
3D face reconstruction algorithms from images and videos are applied to many fields, from plastic surgery to the entertainment sector, thanks to their advantageous features. However, when looking at forensic applications, 3D face reconstruction must observe strict requirements that still make unclear its possible role in bringing evidence to a lawsuit. Shedding some light on this matter is the goa…
▽ More
3D face reconstruction algorithms from images and videos are applied to many fields, from plastic surgery to the entertainment sector, thanks to their advantageous features. However, when looking at forensic applications, 3D face reconstruction must observe strict requirements that still make unclear its possible role in bringing evidence to a lawsuit. Shedding some light on this matter is the goal of the present survey, where we start by clarifying the relation between forensic applications and biometrics. To our knowledge, no previous work adopted this relation to make the point on the state of the art. Therefore, we analyzed the achievements of 3D face reconstruction algorithms from surveillance videos and mugshot images and discussed the current obstacles that separate 3D face reconstruction from an active role in forensic applications.
△ Less
Submitted 3 February, 2023;
originally announced March 2023.
-
On the variability of functional connectivity and network measures in source-reconstructed EEG time-series
Authors:
Matteo Fraschini,
Simone Maurizio La Cava,
Luca Didaci,
Luigi Barberini
Abstract:
The idea to estimate the statistical interdependence among (interacting) brain regions has motivated numerous researchers to investigate how the resulting connectivity patterns and networks may organize themselves under any conceivable scenario. Even though this idea is not at initial stages, its practical application is still far to be widespread. One concurrent cause may be related to the prolif…
▽ More
The idea to estimate the statistical interdependence among (interacting) brain regions has motivated numerous researchers to investigate how the resulting connectivity patterns and networks may organize themselves under any conceivable scenario. Even though this idea is not at initial stages, its practical application is still far to be widespread. One concurrent cause may be related to the proliferation of different approaches that aim to catch the underlying correlation among the (interacting) units. This issue has probably contributed to hinder the comparison among different studies. Not only all these approaches go under the same name (functional connectivity), but they have been often tested and validated using different methods, therefore, making it difficult to understand to what extent they are similar or not. In this study, we aim to compare a set of different approaches commonly used to estimate the functional connectivity on a public EEG dataset representing a possible realistic scenario. As expected, our results show that source-level EEG connectivity estimates and the derived network measures, even though pointing to the same direction, may display substantial dependency on the (often arbitrary) choice of the selected connectivity metric and thresholding approach. In our opinion, the observed variability reflects ambiguity and concern that should always be discussed when reporting findings based on any connectivity metric.
△ Less
Submitted 24 November, 2020; v1 submitted 10 July, 2020;
originally announced July 2020.