Feng Liu

Feng Liu
Shenzhen University · College of Computer Science&Software Engineering

PhD

About

79
Publications
11,108
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,177
Citations

Publications

Publications (79)
Article
Biometric systems are vulnerable to presentation attacks (PAs) performed using various PA instruments (PAIs). Even though there are numerous PA detection (PAD) techniques based on both deep learning and hand-crafted features, the generalization of PAD for unknown PAI is still a challenging problem. In this work, we empirically prove that the initia...
Chapter
Fingerprints of Optical Coherence Tomography (OCT) imaging provide 3D volume data which have the nature property of multi-layered tissue structure. This paper, for the first time, attempts to extract minutiae for OCT-based fingerprint by making full use of the merits multi-layered structure of OCT imaging and powerful convolution al neural network...
Chapter
The robustness and generalization ability of Presentation Attack Detection (PAD) methods is critical to ensure the security of Face Recognition Systems (FRSs). However, in a real scenario, Presentation Attacks (PAs) are various and it is hard to predict the Presentation Attack Instrument (PAI) species that will be used by the attacker. Existing PAD...
Article
The accuracy of 2D face recognition (FR) has progressed significantly due to the availability of large-scale training data. However, the research of deep learning based 3D FR is still in the early stage. Most of available 3D FR generate 2D maps from 3D data and apply existing 2D CNNs to the generated 2D maps for feature extraction. We propose in th...
Preprint
The technology of optical coherence tomography (OCT) to fingerprint imaging opens up a new research potential for fingerprint recognition owing to its ability to capture depth information of the skin layers. Developing robust and high security Automated Fingerprint Recognition Systems (AFRSs) are possible if the depth information can be fully utili...
Chapter
By introducing the skip connection to bridge the semantic gap between encoder and decoder, U-shape architecture has been proven to be effective for recovering fine-grained details in dense prediction tasks. However, such a mechanism cannot be directly applied to reconstruction-based anomaly detection, since the skip connection might lead the model...
Preprint
Full-text available
Deep convolutional neural network (CNN) based models are vulnerable to the adversarial attacks. One of the possible reasons is that the embedding space of CNN based model is sparse, resulting in a large space for the generation of adversarial samples. In this study, we propose a method, denoted as Dynamic Feature Aggregation, to compress the embedd...
Article
Current high-resolution fingerprints are almost entirely represented by sweat pores, resulting in information loss and weak robustness. This is caused by dividing fingerprint representation into pore detection and pore representation. This paper proposes a novel high-resolution fingerprint representation method for recognition based on only one ful...
Article
Due to the diversity of attack materials, fingerprint recognition systems (AFRSs) are vulnerable to malicious attacks. It is thus important to propose effective fingerprint presentation attack detection (PAD) methods for the safety and reliability of AFRSs. However, current PAD methods often exhibit poor robustness under new attack types settings....
Article
Minutiae extraction plays an important role in automated fingerprint identification systems. There are many minutiae extraction methods proposed for various fingerprints (rolled/slap/latent) in the past decades. However, for fingerprints by optical coherence tomography (OCT) imaging which have the essential property of multi-layered tissue structur...
Preprint
The robustness and generalization ability of Presentation Attack Detection (PAD) methods is critical to ensure the security of Face Recognition Systems (FRSs). However, in the real scenario, Presentation Attacks (PAs) are various and hard to be collected. Existing PAD methods are highly dependent on the limited training set and cannot generalize we...
Preprint
Due to the diversity of attack materials, fingerprint recognition systems (AFRSs) are vulnerable to malicious attacks. It is of great importance to propose effective Fingerprint Presentation Attack Detection (PAD) methods for the safety and reliability of AFRSs. However, current PAD methods often have poor robustness under new attack materials or s...
Preprint
Generative Adversarial Networks (GANs) have been widely adopted in various fields. However, existing GANs generally are not able to preserve the manifold of data space, mainly due to the simple representation of discriminator for the real/generated data. To address such open challenges, this paper proposes Manifold-preserved GANs (MaF-GANs), which...
Conference Paper
Full-text available
The convolutional neural network (CNN) is vulnerable to degraded images with even very small variations (e.g. corrupted and adversarial samples). One of the possible reasons is that CNN pays more attention to the most dis-criminative regions, but ignores the auxiliary features when learning, leading to the lack of feature diversity for final judgme...
Preprint
Biometric systems are vulnerable to the Presentation Attacks (PA) performed using various Presentation Attack Instruments (PAIs). Even though there are numerous Presentation Attack Detection (PAD) techniques based on both deep learning and hand-crafted features, the generalization of PAD for unknown PAI is still a challenging problem. The common pr...
Chapter
Facial expression recognition (FER) is still a challenging problem if face images are contaminated by occlusions, which lead to not only noisy features but also loss of discriminative features. To address the issue, this paper proposes a novel adversarial disentangled features learning (ADFL) method for recognizing expressions on occluded face imag...
Article
The vulnerability of automated fingerprint recognition systems (AFRSs) to presentation attacks (PAs) promotes the vigorous development of PA detection (PAD) technology. However, PAD methods have been limited by information loss and poor generalization ability, resulting in new PA materials and fingerprint sensors. This article thus proposes a globa...
Preprint
Full-text available
The vanilla convolutional neural network (CNN) is vulnerable to images with small variations (e.g. corrupted and adversarial samples). One of the possible reasons is that CNN pays more attention to the most discriminative regions, but ignores the auxiliary features, leading to the lack of feature diversity. In our method , we propose to dynamically...
Article
Automated Fingerprint Recognition Systems (AFRSs) have been threatened by Presentation Attack (PA) since its existence. It is thus desirable to develop effective presentation attack detection (PAD) methods. However, the unpredictable PAs make PAD be a challenging problem. This paper proposes a novel One-Class PAD (OCPAD) method for Optical Coherenc...
Article
As 2D and 3D data present different views of the same face, the features extracted from them can be both complementary and redundant. In this paper, we present a novel and efficient orthogonalization-guided feature fusion network, namely OGF $^2$ Net, to fuse the features extracted from 2D and 3D faces for facial expression recognition. While 2D t...
Article
As a popular living fingerprint feature, sweat pore has been adopted to build robust high resolution automated fingerprint recognition systems (AFRSs). Pore matching is an important step in high resolution fingerprint recognition. This paper proposes a novel pore matching method with high recognition accuracy. The method mainly solves the pore repr...
Chapter
Human fingers are 3D objects. More information will be provided if three dimensional (3D) fingerprints are available compared with two dimensional (2D) fingerprints. Thus, this chapter firstly collected 3D finger point cloud data by Structured-light Illumination method. Additional features from 3D fingerprint images are then studied and extracted....
Chapter
Sweat pores on fingerprints have proven to be discriminative features and have recently been successfully employed in automatic fingerprint recognition systems (AFRS). It is crucial to extract pores precisely to achieve high recognition accuracy. In this chapter two extraction methods will be given. The first method is based on a dynamic anisotropi...
Chapter
This chapter addresses the problem of feature-based 3D reconstruction model for close-range objects. Since it is almost impossible to find pixel-to-pixel correspondences from 2D images by algorithms when the object is imaged on a close range, the selection of feature correspondences, as well as the number and distribution of them, play important ro...
Chapter
High resolution fingerprint images have been increasingly used in fingerprint recognition. They can provide more fine features (e.g. pores) than standard fingerprint images, which are expected to be helpful for improving the recognition accuracy. It is therefore demanded to investigate whether or not existing quality assessment methods are suitable...
Chapter
This chapter shows an application of pores in the alignment of high resolution partial fingerprints, which is a crucial step in partial fingerprint recognition. Previously developed fingerprint alignment methods, including minutia-based and non-minutia feature based ones, are unsuitable for partial fingerprints because small fingerprint fragments o...
Chapter
High-resolution automated fingerprint recognition systems (AFRS) offer higher security because they are able to make use of level 3 features, such as pores, that are not available in lower-resolution (<500 dpi) images. One of the main parameters affecting the quality of a digital fingerprint image and issues such as cost, interoperability, and perf...
Chapter
This chapter concludes the book. We first highlight again the motivation of compiling such a book on the topic of advanced fingerprint recognition technology, in particular 3D fingerprints and high resolution fingerprints. We then briefly summarize the content of each chapter in the main body of this book. Finally, we discuss the remaining challeng...
Chapter
Traditional fingerprints are captured in touch-based way, which results in partial or degraded images. Replacement of touch-based fingerprints by touchless ones can promote the development of touchless 3D AFRSs with high security and accuracy. This chapter reviewed technologies involved 3D AFRSs, including 3D fingerprint generation, 3D fingerprint...
Chapter
Touchless-based fingerprint recognition technology is thought to be an alternative to touch-based systems to solve problems of hygienic, latent fingerprints, and maintenance. However, there are few studies about touchless fingerprint recognition systems due to the lack of a large database and the intrinsic drawback of low ridge-valley contrast of t...
Chapter
Extended fingerprint features such as pores, dots and incipient ridges have attracted increasing attention from researchers and engineers working on automatic fingerprint recognition systems. A variety of methods have been proposed to combine these features with the traditional minutiae features. This chapter comparatively analyses the parallel and...
Chapter
Fingerprint matching is an important and essential step in automated fingerprint recognition systems (AFRSs). The noise and distortion of captured fingerprints and the inaccurate of extracted features make fingerprint matching a very difficult problem. With the advent of high resolution fingerprint imaging techniques and the increasing demand for h...
Chapter
This chapter provides an overview of Part II with focus on the background and development of fingerprint recognition using high resolution images. We first discuss the significance of high resolution fingerprint recognition in the context of fingerprint recognition history, and then introduce fingerprint features, particularly the features availabl...
Article
Traditional fingerprint recognition systems are vulnerable to attacks, such as the use of artificial fingerprints, and poor performance will be achieved if the captured surface fingerprints are of low-quality. Developing high-security and robust fingerprint recognition systems is of increasing concern in modern society. The introduction of optical...
Preprint
With the development of presentation attacks, Automated Fingerprint Recognition Systems(AFRSs) are vulnerable to presentation attack. Thus, numerous methods of presentation attack detection(PAD) have been proposed to ensure the normal utilization of AFRS. However, the demand of large-scale presentation attack images and the low-level generalization...
Article
Optical Coherence Tomography (OCT) is a high resolution imaging technology probing the internal structure of multilayered tissues. Since it provides subsurface fingerprint information which is identical to the surface texture but unaffected by any surface defects, OCT-based fingerprints open up a new domain for establishing robust and high security...
Book
Fingerprints are among the most widely used biometric modalities and have been successfully applied in various scenarios. For example, in forensics, fingerprints serve as important legal evidence; and in civilian applications, fingerprints are used for access and attendance control as well as other identity services. Thanks to advances in three-dim...
Chapter
Facial expression recognition (FER) using 2D images has been rapidly developed in the past decade. However, existing 2D-based FER methods seldom consider the impact of identity factors, and do not utilize shape features which have been proven to be effective complement to texture features. Built upon latest 3D face reconstruction methods, this pape...
Chapter
Optical Coherence Tomography (OCT) is a high resolution imaging technology, which provides a 3D representation of the fingertip skin. This paper for the first time investigates gender classification using those 3D fingerprints. Different with current fingerprint gender classification methods, the raw multiple longitudinal(X-Z) fingertip images of o...
Article
Full-text available
Face recognition using depth data has attracted increasing attention from both academia and industry in the past five years. Previous works show a huge performance gap between high-quality and low-quality depth data. Due to the lack of databases and reasonable evaluations on data quality, very few researchers have focused on boosting depth-based fa...
Article
Traditional commercial automated fingerprint recognition systems (AFRSs) are vulnerable to fake attacks by the use of artificial fingerprints, due to its limitation on resolution and the difficulty of obtaining depth information. Developing new systems with strong anti-spoofing ability are of increasing concern in the current digital age. Inspired...
Article
High-resolution fingerprint recognition has been a hot topic for many years. Compared with a traditional fingerprint image, a high-resolution fingerprint image can provide more features, such as pores and ridge contours. Introducing these features into fingerprint comparison and recognition can improve the recognition accuracy and reduce the risk o...
Chapter
Sweat pores have been proved to be discriminative and successfully used for automatic fingerprint recognition. It is crucial to extract pores precisely to achieve high recognition accuracy. To extract pores accurately and robustly, we propose a novel coarse-to-fine detection method based on convolutional neural networks (CNN) and logical operation....
Article
This letter proposes an ensemble neural network (Ensem-NN) for skeleton-based action recognition. The Ensem-NN is introduced based on the idea of ensemble learning, “two heads are better than one”. According to the property of skeleton sequences, we design one-dimensional (1D) convolution neural network (CNN) with residual structure as Base-Net. Fr...
Article
Cascaded regression has been recently applied to reconstruct 3D faces from single 2D images directly in shape space, and has achieved state-of-the-art performance. We investigate thoroughly such cascaded regression based 3D face reconstruction approaches from four perspectives that are not well been studied: (1) the impact of the number of 2D landm...
Conference Paper
In automatic fingerprint identification systems, it is crucial to segment the fingerprint images. Inspired by the superiority of convolutional neural networks for various classification and regression tasks, we approach fingerprint segmentation as a binary classification problem and propose a convolutional neural network based method for fingerprin...
Conference Paper
Fingerprint image quality assessment is a very important task as the performance of automatic fingerprint identification systems relies heavily on the quality of fingerprint images. Existing methods have made many efforts to find out more appropriate solutions, but most of them operate either on full regions of a fingerprint image, or on local area...
Conference Paper
The huge number of sweat pores in fingerprint images results in low efficiency of direct pore (DP) matching methods. To overcome this drawback, this paper proposes a feature guided fingerprint pore matching method. It selects “distinctive” pores around the minutiae and singular points from fingerprint images which extremely reduced the number of po...
Conference Paper
This paper proposes a new method to extract pores on high resolution fingerprints. The basic idea of this method is to binarize the fingerprint images based on multi-scale morphological transformation, and then extract pores by different strategies. The closed pores are extracted by the size of connected regions, and the open pores are detected usi...
Conference Paper
As one of the most important soft biometrics, gender has substantial applications in various areas such as demography and human-computer interaction. Successful gender estimation of face images taken under real-world also contributes to improving the face identification results in the wild. However, most existing gender classification methods estim...
Article
Full-text available
Human fingers are 3D objects. More information will be provided if three dimensional (3D) fingerprints are available compared with two dimensional (2D) fingerprints. Thus, this paper firstly collected 3D finger point cloud data by Structured-light Illumination method. Additional features from 3D fingerprint images are then studied and extracted. Th...
Article
It is of urgency to effectively identify differentially expressed genes from RNA-Seq data. In this paper, we proposed a novel method, joint-L2,1-norm-constraint-based semi-supervised feature extraction (L21SFE), to analyze RNA-Seq data. Our scheme was shown as follows. Firstly, we constructed a graph Laplacian matrix and refined it by using the lab...
Article
Classification based on image sets has recently attracted increasing interests in computer vision and pattern recognition community. It finds numerous applications in real-life scenarios, such as classification from surveillance videos, multi-view camera networks, and personal albums. Image set based face classification highly depends on the consis...
Article
Breast cancer is one of the most common malignant tumors among female. How to effectively discriminate the category of the cancers using the key features/factors is very important in the diagnosis and prediction. In this paper, Jointly Sparse Discriminant Analysis (JSDA) is proposed to explore the key factors in breast cancer and extract the key fe...
Article
Image feature is a significant factor for the success of robust face recognition. Recently sparse representation based classifier (SRC) has been widely applied to robust face recognition by using sparse representation residuals to tolerate disturbed image features (e.g., occluded pixels). In order to deal with more complicated image variations, rob...
Conference Paper
This paper addresses the problem of feature-based 3D reconstruction model for close-range objects. Since it is almost impossible to find pixel-to-pixel correspondences from 2D images by algorithms when the object is imaged on a close range, the selection of feature correspondences, as well as the number and distribution of them, play important role...
Conference Paper
The sparse representation based classifier (SRC) has been successfully applied to robust face recognition (FR) with various variations. To achieve much stronger robustness to facial occlusion, recently regularized robust coding (RRC) was proposed by designing a new robust representation residual term. Although RRC has achieved the leading performan...
Article
Full-text available
Touchless-based fingerprint recognition technology is thought to be an alternative to touch-based systems to solve problems of hygienic, latent fingerprints, and maintenance. However, there are few studies about touchless fingerprint recognition systems due to the lack of a large database and the intrinsic drawback of low ridge-valley contrast of t...
Article
Full-text available
Touchless fingerprint capture devices have the advantage over traditional touch-based approaches of being hygienic and preventing distortions resulting from the contact of fingers. Single-view acquisition systems bring in problems, such as scene difference and a limited effective area. This paper thus presents a touchless multiview fingerprint capt...
Article
Fingerprint matching is an important and essential step in automated fingerprint recognition systems (AFRSs). The noise and distortion of captured fingerprints and the inaccurate of extracted features make fingerprint matching a very difficult problem. With the advent of high-resolution fingerprint imaging techniques and the increasing demand for h...
Conference Paper
High resolution fingerprint images have been increasingly used in fingerprint recognition. They can provide more fine features (e.g. pores) than standard fingerprint images to improve the recognition accuracy. It is however still an open issue whether or not existing quality assessment methods are suitable for high resolution fingerprint images. Th...
Conference Paper
Full-text available
Extended fingerprint features such as pores, dots and incipient ridges have been increasingly attracting attention from researchers and engineers working on automatic fingerprint recognition systems. A variety of methods have been proposed to combine these features with the traditional minutiae features. This paper comparatively analyses the parall...
Conference Paper
In this paper, we propose a watermarking algorithm for digital image based on DCT and SVD. The algorithm can satisfy the transparence and robustness of the watermarking system very well. The experiment based on this algorithm demonstrates that the watermarking is robust to the common signal processing techniques including JEPG compressing,noise, lo...

Network

Cited By