Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Javier Galbally is active.

Publication


Featured researches published by Javier Galbally.


IEEE Transactions on Image Processing | 2014

Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition

Javier Galbally; Sébastien Marcel; Julian Fierrez

To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-of-the-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.


IEEE Transactions on Pattern Analysis and Machine Intelligence | 2010

The Multiscenario Multienvironment BioSecure Multimodal Database (BMDB)

Javier Ortega-Garcia; Julian Fierrez; Fernando Alonso-Fernandez; Javier Galbally; Manuel Freire; Joaquin Gonzalez-Rodriguez; Carmen García-Mateo; Jose-Luis Alba-Castro; Elisardo González-Agulla; Enrique Otero-Muras; Sonia Garcia-Salicetti; Lorene Allano; Bao Ly-Van; Bernadette Dorizzi; Josef Kittler; Thirimachos Bourlai; Norman Poh; Farzin Deravi; Ming Wah R. Ng; Michael C. Fairhurst; Jean Hennebert; Andrea Monika Humm; Massimo Tistarelli; Linda Brodo; Jonas Richiardi; Andrzej Drygajlo; Harald Ganster; Federico M. Sukno; Sri-Kaushik Pavani; Alejandro F. Frangi

A new multimodal biometric database designed and acquired within the framework of the European BioSecure Network of Excellence is presented. It is comprised of more than 600 individuals acquired simultaneously in three scenarios: 1 over the Internet, 2 in an office environment with desktop PC, and 3 in indoor/outdoor environments with mobile portable hardware. The three scenarios include a common part of audio/video data. Also, signature and fingerprint data have been acquired both with desktop PC and mobile portable hardware. Additionally, hand and iris data were acquired in the second scenario using desktop PC. Acquisition has been conducted by 11 European institutions. Additional features of the BioSecure Multimodal Database (BMDB) are: two acquisition sessions, several sensors in certain modalities, balanced gender and age distributions, multimodal realistic scenarios with simple and quick tasks per modality, cross-European diversity, availability of demographic data, and compatibility with other multimodal databases. The novel acquisition conditions of the BMDB allow us to perform new challenging research and evaluation of either monomodal or multimodal biometric systems, as in the recent BioSecure Multimodal Evaluation campaign. A description of this campaign including baseline results of individual modalities from the new database is also given. The database is expected to be available for research purposes through the BioSecure Association during 2008.


Future Generation Computer Systems | 2012

A high performance fingerprint liveness detection method based on quality related features

Javier Galbally; Fernando Alonso-Fernandez; Julian Fierrez; Javier Ortega-Garcia

A new software-based liveness detection approach using a novel fingerprint parameterization based on quality related features is proposed. The system is tested on a highly challenging database comprising over 10,500 real and fake images acquired with five sensors of different technologies and covering a wide range of direct attack scenarios in terms of materials and procedures followed to generate the gummy fingers. The proposed solution proves to be robust to the multi-scenario dataset, and presents an overall rate of 90% correctly classified samples. Furthermore, the liveness detection method presented has the added advantage over previously studied techniques of needing just one image from a finger to decide whether it is real or fake. This last characteristic provides the method with very valuable features as it makes it less intrusive, more user friendly, faster and reduces its implementation costs.


Pattern Analysis and Applications | 2010

BiosecurID: a multimodal biometric database

Julian Fierrez; Javier Galbally; Javier Ortega-Garcia; Manuel Freire; Fernando Alonso-Fernandez; Daniel Ramos; Doroteo Torre Toledano; Joaquin Gonzalez-Rodriguez; Juan A. Sigüenza; J. Garrido-Salas; E. Anguiano; Guillermo González-de-Rivera; R. Ribalda; Marcos Faundez-Zanuy; Juan Antonio Ortega; Valentín Cardeñoso-Payo; A. Viloria; Carlos Vivaracho; Q.-I. Moro; J. J. Igarza; J. Sanchez; I. Hernaez; C. Orrite-Uruñuela; F. Martinez-Contreras; J. J. Gracia-Roche

A new multimodal biometric database, acquired in the framework of the BiosecurID project, is presented together with the description of the acquisition setup and protocol. The database includes eight unimodal biometric traits, namely: speech, iris, face (still images, videos of talking faces), handwritten signature and handwritten text (on-line dynamic signals, off-line scanned images), fingerprints (acquired with two different sensors), hand (palmprint, contour-geometry) and keystroking. The database comprises 400 subjects and presents features such as: realistic acquisition scenario, balanced gender and population distributions, availability of information about particular demographic groups (age, gender, handedness), acquisition of replay attacks for speech and keystroking, skilled forgeries for signatures, and compatibility with other existing databases. All these characteristics make it very useful in research and development of unimodal and multimodal biometric systems.


IEEE Access | 2014

Biometric Antispoofing Methods: A Survey in Face Recognition

Javier Galbally; Sébastien Marcel; Julian Fierrez

In recent decades, we have witnessed the evolution of biometric technology from the first pioneering works in face and voice recognition to the current state of development wherein a wide spectrum of highly accurate systems may be found, ranging from largely deployed modalities, such as fingerprint, face, or iris, to more marginal ones, such as signature or hand. This path of technological evolution has naturally led to a critical issue that has only started to be addressed recently: the resistance of this rapidly emerging technology to external attacks and, in particular, to spoofing. Spoofing, referred to by the term presentation attack in current standards, is a purely biometric vulnerability that is not shared with other IT security solutions. It refers to the ability to fool a biometric system into recognizing an illegitimate user as a genuine one by means of presenting a synthetic forged version of the original biometric trait to the sensor. The entire biometric community, including researchers, developers, standardizing bodies, and vendors, has thrown itself into the challenging task of proposing and developing efficient protection methods against this threat. The goal of this paper is to provide a comprehensive overview on the work that has been carried out over the last decade in the emerging field of antispoofing, with special attention to the mature and largely deployed face modality. The work covers theories, methodologies, state-of-the-art techniques, and evaluation databases and also aims at providing an outlook into the future of this very active field of research.


international conference on biometrics | 2012

Iris liveness detection based on quality related features

Javier Galbally; Jaime Ortiz-Lopez; Julian Fierrez; Javier Ortega-Garcia

A new liveness detection scheme for iris based on quality related measures is presented. The novel anti-spoofing technique is tested on a database comprising over 1,600 real and fake (high quality printed images) iris samples proving to have a very high potential as an effective protection scheme against direct attacks. Furthermore, the liveness detection method presented has the added advantage over previously studied techniques of needing just one iris image (the same used for verification) to decide whether it comes from a real or fake eye.


Biometrics and Identity Management | 2008

Direct Attacks Using Fake Images in Iris Verification

Virginia Ruiz-Albacete; Pedro Tome-Gonzalez; Fernando Alonso-Fernandez; Javier Galbally; Julian Fierrez; Javier Ortega-Garcia

In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris of the BioSec baseline database. Iris images are printed using a commercial printer and then, presented at the iris sensor. We use for our experiments a publicly available iris recognition system, which some modifications to improve the iris segmentation step. Based on results achieved on different operational scenarios, we show that the system is vulnerable to direct attacks, pointing out the importance of having countermeasures against this type of fraudulent actions.


Pattern Recognition Letters | 2014

Recent developments in the study of rapid human movements with the kinematic theory: Applications to handwriting and signature synthesis

Réjean Plamondon; Christian O'Reilly; Javier Galbally; Abdullah Almaksour; íric Anquetil

Human movement modeling can be of great interest for the design of pattern recognition systems relying on the understanding of the fine motor control (such as on-line handwriting recognition or signature verification) as well as for the development of intelligent systems involving in a way or another the processing of human movements. In this paper, we briefly list the different models that have been proposed in order to characterize the handwriting process and focus on a representation involving a vectorial summation of lognormal functions: the Sigma-lognormal model. Then, from a practical perspective, we describe a new stroke extraction algorithm suitable for the reverse engineering of handwriting signals. In the following section it is shown how the resulting representation can be used to study the writer and signer variability. We then report on two joint projects dealing with the automatic generation of synthetic specimens for the creation of large databases. The first application concerns the automatic generation of totally synthetic signature specimens for the training and evaluation of verification performances of automatic signature recognition systems. The second application deals with the synthesis of handwritten gestures for speeding up the learning process in customizable on-line recognition systems to be integrated in electronic pen pads.


Pattern Recognition | 2010

On the vulnerability of face verification systems to hill-climbing attacks

Javier Galbally; Chris McCool; Julian Fierrez; Sébastien Marcel; Javier Ortega-Garcia

In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking technique uses the scores provided by the matcher to adapt a global distribution computed from an independent set of users, to the local specificities of the client being attacked. The proposed attack is evaluated on an eigenface-based and a parts-based face verification system using the XM2VTS database. Experimental results demonstrate that the hill-climbing algorithm is very efficient and is able to bypass over 85% of the attacked accounts (for both face recognition systems). The security flaws of the analyzed systems are pointed out and possible countermeasures to avoid them are also proposed.


international conference on biometrics | 2013

The 2nd competition on counter measures to 2D face spoofing attacks

Ivana Chingovska; Jimei Yang; Zhen Lei; Dong Yi; Stan Z. Li; O. Kahm; C. Glaser; Naser Damer; Arjan Kuijper; Alexander Nouak; Jukka Komulainen; Tiago de Freitas Pereira; S. Gupta; S. Khandelwal; S. Bansal; A. Rai; T. Krishna; D. Goyal; Muhammad-Adeel Waris; Honglei Zhang; Iftikhar Ahmad; Serkan Kiranyaz; Moncef Gabbouj; Roberto Tronci; Maurizio Pili; Nicola Sirena; Fabio Roli; Javier Galbally; J. Ficrrcz; Allan da Silva Pinto

As a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, has achieved great progress in the recent years. Still, new threats arrive inform of better, more realistic and more sophisticated spoofing attacks. The objective of the 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is to challenge researchers to create counter measures effectively detecting a variety of attacks. The submitted propositions are evaluated on the Replay-Attack database and the achieved results are presented in this paper.

Collaboration


Dive into the Javier Galbally's collaboration.

Top Co-Authors

Avatar

Julian Fierrez

Autonomous University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Javier Ortega-Garcia

Autonomous University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Marta Gomez-Barrero

Darmstadt University of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar

Marcos Martinez-Diaz

Autonomous University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Aythami Morales

Autonomous University of Madrid

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Réjean Plamondon

École Polytechnique de Montréal

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Christian Rathgeb

Darmstadt University of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar

Christoph Busch

Norwegian University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge