The 2022 International Joint Conference on Biometrics (IJCB 2022) combines two major biometrics conferences, the IEEE Biometrics Theory, Applications, and Systems (BTAS) conference and the International Conference on Biometrics (ICB). The blending of these two conferences in 2022 is through a special agreement between the IEEE Biometrics Council and the IAPR TC-4, and should present an exciting event for the entire worldwide biometrics research community. The conference will be organized in Abu Dhabi, United Arab Emirates (UAE).
** a valid PCR test issued in the U.A.E. is mandatory to enter the conference room **
Early rate (by September 15) | Regular (after September 15) | |
---|---|---|
In-person IEEE/IAPR Member | USD500 | USD600 |
In-person Non-member | USD600 | USD700 |
In-person IEEE/IAPR Student Member | USD300 | USD350 |
In-person Student Non-member | USD400 | USD450 |
Early rate (by September 15) | Regular (after September 15) | |
---|---|---|
Virtual IEEE/IAPR Member | USD100 | USD120 |
Virtual Non-member | USD120 | USD140 |
Virtual IEEE/IAPR Student Member | USD60 | USD70 |
Virtual Student Non-member | USD80 | USD90 |
H.E. Dr. Mohamed Al-Kuwaiti
Prof. Dr. Christoph Busch
Els J. Kindt
Bio
Dr. Al Kuwaiti has appointed into the Cabinet as the Head of the Cyber Security for the UAE Government since 2020. As the Head of the Cyber Security, his mandate includes being the Chairman of the UAE Cyber Security Council as well as Managing Director of the National Data Centre under the Supreme Council for National Security. As the Head of Cyber Security for the UAE Government by investiture, Dr. Al Kuwaiti has legal authority over all aspects pertaining securing the cyberspace for the entire Nation. Dr. Al Kuwaiti also sits on the Boards of the UAE Council for Digital Wellbeing, Telecommunications and Digital Government Regulatory Authority (TDRA), Federal Geographic Information Center and is on the Advisory Committees of the College of Information Technology under United Arab Emirates University (UAEU) and Emirates ICT Innovation Center (EBTIC) under Khalifa University. Additionally, he is an Adjunct Professor under the Homeland Security Program at Rabdan Academy and a visiting lecturer on Cyber Security at universities such as Khalifa University and National Defense College in Abu Dhabi. Prior to his current appointments, Dr. Al Kuwaiti was with the National Electronic Security Authority in various appointment and capacity since 2013 where he was most recently Executive Director of Government Operations managing National and International government relations. He had served as the Chief Technical Analyst at the Ministry of Interior where he had held other positions, such as Operations Director and CTO of the Counter Terrorism Center. Dr. Al Kuwaiti started his 20 year-long career as a Defense, Air, and Naval Military Attaché with the Embassy of The United Arab Emirates based in Washington, D.C. Dr. Al Kuwaiti has published numerous papers and keynoted at many conferences such as IEEE, RSA, Cyber Warfare Europe, Tele Strategies, ISS World MEA, IDEX, International Anti-Cyber Crimes Conference, Future War Summit etc., He is a highly sought after speaker internationally and have provided the main keynote address for more than 50 international, regional, and national cybersecurity events such as GITEX, GISEC and the World Government Summit, and had presented the UAE Cyber Security Framework at INTERPOL Global Cyberspace and Cybercrime Complex located in Singapore. Dr. Al Kuwaiti holds a Doctorate in Computer Engineering and Network Security from George Washington University in the U.S. and a master’s degree in Telecommunications and Computer Networks. He also holds a M.A. degree in International and Civil Security. Dr. Al Kuwaiti is an honorable member of Society of Engineers, IEEE Society, Golden Key National Honor Society and Computer Society. His research interests are detecting, monitoring and responding to cyber warfare, Network Forensics, Corporate Governance & Process, and national cyber policy.
Abstract
Widespread deployment of Automatic Border Control (ABC), along with electronic Machine Readable Travel Documents (eMRTD), has enabled a prominent use case of face biometrics in border control applications. The trust anchor are biometric passports. Many countries issue eMRTD passports on the basis of a printed face photo submitted by the applicant, a procedure which allows the possibility of the photo being either altered to beautify the subject’s appearance or morphed to conceal his/her identity. If an eMRTD passport is issued with a morphed facial image, two or more data subjects can then use it to pass a border control. This keynote will discuss the morphing attack problem and indicate solutions to detect such morphed facial images. Moreover the evaluation methodology to assess the detection accuracy of morphing attack detection algorithms will be discussed.
Bio
Christoph Busch is member of the Norwegian University of Science and Technology (NTNU), Norway. He holds a joint appointment with Hochschule Darmstadt (HDA), Germany. Further he lectures Biometric Systems at Denmark’s DTU since 2007. On behalf of the German BSI he has been the coordinator for the project series BioIS, BioFace, BioFinger, BioKeyS Pilot-DB, KBEinweg and NFIQ2.0. He was/is partner of the EU projects 3D-Face, FIDELITY, TURBINE, SOTAMD, RESPECT, TReSPsS, iMARS and others. He is also principal investigator in the German National Research Center for Applied Cybersecurity (ATHENE) and is co-founder of the European Association for Biometrics (EAB). Christoph co-authored more than 600 technical papers and has been a speaker at international conferences. He is member of the editorial board of the IET journal on Biometrics and formerly of the IEEE TIFS journal. Furthermore he chairs the TeleTrusT biometrics working group as well as the German standardization body on Biometrics and is convenor of WG3 in ISO/IEC JTC1 SC37.
Abstract
Biometric data is collected for a wide variety of purposes and needs in our societies. In some scenario’s, they promise more security, in other instances, more convenience. The process is however highly technical, is subject to standards, and therefore also remains difficult to grasp by the larger public and the regulator. This key note will provide an overview from mainly a European law perspective of regulatory approaches for biometric data collection and use, relevant for industry, by governments, and in social networks. The question will be raised what lessons are to be learned from the legislation enacted over the last two decades for the future regulation of artificial intelligence and data markets. In this regard, the note will also comment on some recent selected proposals of the new European Digital Agenda (2020-2030). Finally, attention will also be given to the use of this special category of data in research for training and development.
Bio
Els J. Kindt is a post-doc legal researcher and associate professor with respectively the Centre for IT and IP Law (CITIP) of KU Leuven, Belgium and eLaw of Universiteit Leiden, the Netherlands. She is widely recognized as a specialist on legal aspects of biometric technologies (see also Privacy and Data Protection Issues of Biometric Applications. A Comparative Legal Analysis,at Springer) and is and has been the principal legal investigator and advisor in several national and European research projects focusing on biometrics for security, border control and identity management (including e.g., BioSec, Turbine, Fidelity, FastPass, Eksistenz, Beat, and currently iMars, Prima, TresPass and SALT). She is and has also been regularly teaching on legal aspects of IT, including European Privacy and Data Protection law and Electronic contracts law, at KU Leuven, Brussels, the Cybersecurity Academy in Den Hague, and for Unidistance, Switzerland. She is member of several editorial boards of legal journals, including EDPL and of many scientific committees, including the annual CPDP conference and is regularly invited as an expert, including by the European Commission, the Fundamental Rights Agency; the European Law Forum and the Belgian government. In 2019, she set up the Biometric Law Lab at KU Leuven, CiTiP, consisting currently of 7 legal researchers in biometrics.
10-10-2022 09:00 am
9:00 AM – 10:00 PM | TUTORIAL 1
Biometric Template Protection for Face Recognition Systems: A behind-the-scenes look at the Motivation, Methods, and Metrics (In -Person)
TUTOR: Vedrana Krivokuca Hahn
10:00 AM – 10:30 AM | COFFEE BREAK
12:00 PM – 1:30 PM | LUNCH BREAK
1:30 PM – 4:00 PM | TUTORIAL 2
Person Re-Identification: Synthetic Data and Model Generalization (In -Person)
TUTORS: Shengcai Liao, Yanan Wang, Cuicui Kang
4:00 PM -- 4:30 PM | COFFEE BREAK
4:30 PM – 8:00 PM | TUTORIAL 3
Human-Machine Pairing to Improve Biometric Recognition and Presentation Attack Detection (Virtual)
TUTORS: Aidan Boyd, Daniel H. Moreira, Adam Czajka, Kevin Bowyer
11-10-2022 09:00 am
11-10-2022 09:30 am
9:30 AM – 9:45 AM
Exploiting temporal information to prevent the transferability of adversarial examples against deep fake detectors
Lin, Dongdong; Tondi, Benedetta; Li, Bin; Barni, Mauro
9:45 AM – 10:00 AM
On the (Limited) Generalization of MasterFace Attacks and Its Relation to the Capacity of Face Representations
Terhörst, Philipp; Bierbaum, Florian; Huber, Marco; Damer, Naser; Kirchbuchner, Florian; Raja, Kiran; Kuijper, Arjan
10:00 AM -- 10:15 AM
Improved Presentation Attack Detection Using Image Decomposition
Mishra, Shlok Kumar; Sengupta, Kuntal; Chu, Wen-Sheng; Horowitz-Gelb, Max; Bouaziz, Sofien; Jacobs, David
10:15 AM – 10:45 AM
COFFEE BREAK
11-10-2022 10:45 am
10:45 AM – 11:00 AM
Oculomotoric Biometric Identification under the Influence of Alcohol and Fatigue
Makowski, Silvia; Prasse, Paul; Jäger, Lena A.; Scheffer, Tobias
11:00 AM – 11:15 AM
Contrastive Domain Adaptation: A Self-Supervised Learning Framework for sEMG-Based Gesture Recognition
Lai, Zhiping; Kang, Xiaoyang; Wang, Hongbo; Zhang, Xueze; Zhang, Weiqi; Wang, Fuhao
11:15 AM – 11:30 AM
Lightweight Periocular Recognition through Low-bit Quantization
Kolf, Jan Niklas; Boutros, Fadi; Kirchbuchner, Florian; Damer, Naser
11-10-2022 11:30 am
11:30 AM – 12:30 PM
KEYNOTE 1: Face Image Morphing
SPEAKER: Prof. Dr. Christoph Busch
12:30 PM – 2:00 PM
LUNCH BREAK
2:00 PM – 3:00 PM
Poster Session 1
11-10-2022 03:00 pm
3:00 PM – 4:00 PM
KEYNOTE 2: Biometric data : A recap of regulatory approaches and some hints for the future
SPEAKER: Els J. Kindt
4:00 PM -- 4:30 PM
COFFEE BREAK
11-10-2022 04:30 pm
4:30 PM – 4:45 PM
SketchCLIP: Text-based Attribute Manipulation for Face Sketch Synthesis
Dong, Mengdi; Peng, Chunlei; Liu, Decheng; ZHENG, YU; Wang, Nannan; Gao, Xinbo
4:45 PM – 5:00 PM
Face Super-Resolution with Progressive Embedding of Multi-scale Face Priors
Zhang, Chenggong; Liu, Zhilei
5:00 PM – 5:15 PM
Self-Attention Generative Distribution Adversarial Network for Few- and Zero-Shot Face Anti-Spoofing
Nguyen, Son Minh; Tran, Linh Duy; Le, Duc; Arai, Masayuki
5:15 PM – 5:30 PM
Pose Attention-Guided Profile-to-Frontal Face Recognition
Mostofa, Moktari; Ebrahimi Saadabadi, Mohammad Saeed; Rahimi Malakshan, Sahar; Nasrabadi, Nasser
6:30 PM – 8:30 PM
WELCOM RECEPTION
12-10-2022 09:00 am
9:00 AM – 9:15 AM
Direct Regression of Distortion Field from a Single Fingerprint Image
Guan, Xiongjun; Duan, Yongjie; Feng, Jianjiang; Zhou, Jie
9:15 AM – 9:30 AM
Minutiae-awarely Learning Fingerprint Representation for Fingerprint Indexing
Wu, Song; Liu, Bing; Wang, Zheng; Jia, Zexi; Feng, Jufu
9:30 AM – 9:45 AM
One-Shot Sensor and Material Translator : A Bilinear Decomposer for Fingerprint Presentation Attack Generalization
Lekshmy, Gowri; Namboodiri, Anoop
9:45 AM – 10:00 AM
Row-sparsity Binary Feature Learning for Open-set Palmprint Recognition
Li, Shuyi; Ma, Ruijun; Zhou, Jianhang; Zhang, Bob
10:00 AM -- 10:30 AM
COFFEE BREAK
12-10-2022 10:30 am
12-10-2022 11:30 am
11:30 AM – 12:30 PM
Poster Session 2
12:30 PM – 2:00 PM
LUNCH BREAK
2:00 PM – 3:00 PM
Poster Session 3
12-10-2022 03:00 pm
3:00 PM – 3:15 PM
MSFL-Net: Multi-Semantic Feature Learning Network for Occluded Person Re-Identification
Huang, Guangyu; Zhang, Xiaokang; Yan, Yan; Chen, Si; Zhu, Wentao; Wang, Hanzi
3:15 PM – 3:30 PM
Contrastive Domain Adaptation: A Self-Supervised Learning Framework for sEMG-BasedGesture Recognition
Lai, Zhiping; Kang, Xiaoyang; Wang, Hongbo; Zhang, Xueze; Zhang, Weiqi; Wang, Fuhao
3:30 PM – 3:45 PM
GaitMSTP: Multi-Granularity Spatio-Temporal Pyramid for Gait Recognition Under Complex Covariation Conditions
Huang, Binyuan; Zhou, Chengju; Xu, Chi; Pan, Jiahui
3:45 PM – 4:00 PM
Temporal Feature Alignment in Contrastive Self-Supervised Learning for Human Activity Recognition
Khaertdinov, Bulat; Asteriadis, Stylianos
4:00 PM – 4:30 PM
COFFEE BREAK
12-10-2022 04:30 pm
4:30 PM – 4:45 PM
HEFT: Homomorphically Encrypted Fusion of Biometric Templates
Sperling, Luke; Ratha, Nalini; Ross, Arun; Boddeti, Vishnu
4:45 PM -- 5:00 PM
Multiplication-Free Biometric Recognition for Faster Processing under Encryption
Bassit, Amina; Hahn, Florian; Veldhuis, Raymond; Peter, Andreas
5:00 PM – 5:15 PM
iCTGAN-An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems
Mo, Jun H; Kumar, Rajesh
6:30 PM – 8:30 PM
BANQUET AND AWARD CEREMONY
13-10-2022 09:00 am
9:00 AM – 9:15 AM
DFGC 2022: The Second DeepFake Game Competition
Peng, Bo; Xiang, Wei; Jiang, Yue; Wang, Wei; Dong, Jing; Sun, Zhenan; Lei, Zhen; Lyu, Siwei
9:15 AM – 9:30 AM
HID 2022: The 3rd International Competition on Human Identification at a Distance
Yu, Shiqi; Huang, Yongzhen; Wang, Liang; Makihara, Yasushi; Wang, Shengjin; Ahad, Md Atiqur Rahman; NIXON, MARK S
9:30 AM – 9:45 AM
IJCB 2022 Mobile Behavioral Biometrics Competition (MobileB2C)
Stragapede, Giuseppe; Vera-Rodriguez, Ruben; Tolosana, Ruben; Morales, Aythami; Fierrez, Julian; Ortega-Garcia, Javier
9:45 AM – 10:00 AM
SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data
Huber, Marco; Boutros, Fadi; Luu, Anh Thi; Raja, Kiran; Ramachandra, Raghavendra; Damer, Naser; C. Neto, Pedro; Gonçalves, Tiago FS; Sequeira, Ana F.; S. Cardoso, Jaime; Tremoço, João; Lourenço, Miguel; Serra, Sergio; Cermeño, Eduardo; Ivanovska, Marija; Batagelj, Borut; Kronovšek, Andrej; Peer, Peter; Struc, Vitomir
10:00 AM – 10:15 AM
OCFR 2022: Competition on Occluded Face Recognition From Synthetically Generated Structure-Aware Occlusions
C. Neto, Pedro; Boutros, Fadi; Ribeiro Pinto, João; Damer, Naser; Sequeira, Ana F.; S. Cardoso, Jaime; bengherabi, messaoud; BOUSNAT, ABDERAOUF; BOUCHETA, Sana; Hebbadj, Nesrine; Ekrem Erakin , Mustafa; Demir, Ugur ; EKENEL, HAZIM KEMAL; Vidal, Pedro B; Menotti, David
10:15 AM – 10:45 AM
COFFEE BREAK
13-10-2022 10:45 am
10:45 AM – 11:00 AM
Master Face Attacks on Face Recognition Systems
Nguyen, Huy Hong; Marcel, Sebastien; Yamagishi, Junichi; Echizen, Isao
11:00 AM – 11:15 AM
Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries
Bassit, Amina; Hahn, Florian; Peeters, Joep; Kevenaar, Tom; Veldhuis, Raymond; Peter, Andreas
11:15 AM – 11:30 AM
HERS: Homomorphically Encrypted Representation Search
Engelsma, Joshua J; Jain, Anil; Boddeti, Vishnu
11:30 AM – 11:45 AM
On Distinctiveness and Symmetry in Ear Biometrics
Meng, Di; NIXON, MARK S; Mahmoodi, Sasan
11:45 AM – 12:00 PM
Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks
Tapia, Juan E; gonzalez, sebastian; Busch, Christoph
12:00 PM – 1:30 PM
LUNCH BREAK
13-10-2022 01:30 pm
13:30 PM - 15:45 PM
15:45 PM - 16:15 PM | Coffee Break
13-10-2022 01:30 pm
1:30 PM – 1:45 PM
Presentation Attack Detection in Iris Recognition through Convolution Block Attention Module
Bennabhaktula, Venkat Sai Swarup; Sadhya, Debanjan; Patel, Vinal; De, Kanjar
1:45 PM – 2:00 PM
PatchSwap: Boosting the Generalizability of Face Presentation Attack Detection by Identity-aware Patch Swapping
Fang, Meiling; Ali, Hamza; Kuijper, Arjan; Damer, Naser
2:00 PM – 2:15 PM
In-group and Out-group Performance Bias in Facial Retouching Detection
Bharati, Aparna; Vatsa, Mayank ; Singh, Richa; Bowyer, Kevin
2:15 PM – 2:30 PM
DeePhy: On Deepfake Phylogeny
Narayan, Kartik; Agarwal, Harsh; Thakral, Kartik; Mittal, Surbhi; Vatsa, Mayank ; Singh, Richa
2:30 PM – 2:45 PM
A Dataless FaceSwap Detection Approach Using Synthetic Images.
Jain, Anubhav; Memon, Nasir; Togelius, Julian
2:45 PM – 3:00 PM
Collaborative Feature Learning for Fine-grained Facial Forgery Detection and Segmentation
Guan, Weinan; Wang, Wei; Dong, Jing; Peng, Bo; Tan, Tieniu
3:00 PM – 3:15 PM
Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance
Singh, Jag Mohan; Ramachandra, Raghavendra
3:15 PM – 3:30 PM
TrueFace: a Dataset for the Detection of Synthetic Face Images from Social Networks
Boato, Giulia; Pasquini, Cecilia; Stefani, Antonio Luigi; Verde, Sebastiano; Miorandi, Daniele
3:30 PM – 3:45 PM
Identical Twins Face Morph Database Generation
O'Haire, Kelsey; Soleymani, Sobhan; Chaudhary, Baaria A; Dawson, Jeremy M; Nasrabadi, Nasser
3:45 PM -- 4:15 PM
COFFEE BREAK
13-10-2022 04:15 pm
4:15 PM – 4:30 PM
Is Synthetic Dataset Reliable for Benchmarking Generalizable Person Re-Identification?
Kang, Cuicui
4:30 PM – 4:45 PM
BiOcularGAN: Bimodal Synthesis and Annotation of Ocular Images
Tomašević, Darian; Peer, Peter; Struc, Vitomir
4:45 AM – 5:00 AM
Haven't I Seen You Before? Assessing Identity Leakage in Synthetic Irises
Tinsley, Patrick; Flynn, Patrick; Czajka, Adam
5:00 PM – 5:15 PM
Kinematic Synthesis for 3D Signatures
Diaz, Moises; Ferrer, Miguel A; Carmona, Cristina; Quintana, Jose Juan; Morales, Aythami; Fierrez, Julian; Plamondon, Rejean
5:15 PM – 5:30 PM
Modelling Frequent Imperfections of Contactless Fingerprints
Lorenz, Siri; Priesnitz, Jannis; Rathgeb, Christian; Busch, Christoph