BioSecure Signature Evaluation Campaign (ESRA 2011): Evaluating Systems on Quality-based categories of Skilled Forgeries

Size: px
Start display at page:

Download "BioSecure Signature Evaluation Campaign (ESRA 2011): Evaluating Systems on Quality-based categories of Skilled Forgeries"

Transcription

1 BioSecure Signature Evaluation Campaign (ESRA 2011): Evaluating Systems on Quality-based categories of Skilled Forgeries N. Houmani 1, S. Garcia-Salicetti 1, B. Dorizzi 1, J. Montalvão 2, J. C. Canuto 2, M. V. Andrade 3, Y. Qiao 4, X.Wang 4, T. Scheidat 5, A. Makrushin 6, D. Muramatsu 7, J. Putz-Leszczynska 8, M. Kudelski 8, M. Faundez-Zanuy 9, J. M. Pascual-Gaspar 10, V. Cardeñoso-Payo 10, C. Vivaracho-Pascual 10, E. Argones Rúa 11, J. L. Alba-Castro 11, A. Kholmatov 12, B. Yanikoglu 12 1 Institut TELECOM; TELECOM SudParis; Dept EPH, Evry, France 2 Universidade Federal de Sergipe, Brazil 3 TECNED Tecnologias Educacionais, Brazil 4 Shenzhen Institutes of Advanced Technology, China 5 Brandenburg University of Applied Sciences, Germany 6 Otto-von-Guericke University of Magdeburg, Germany 7 Seikei University, Japan 8 Warsaw University of Technology / Biometrics and Machine Learning Group, Poland 9 Escola Universitaria Politecnica de Mataro, Spain 10 Universidad de Valladolid, Spain 11 University of Vigo, Spain 12 Sabanci University, Turkey Abstract In this paper, we present the main results of the BioSecure Signature Evaluation Campaign (ESRA 2011). The objective of ESRA 2011 is to evaluate through two different tasks the resistance of different online signature systems to skilled forgeries categorized automatically according to their quality. Task 1 aims at studying with only coordinate time functions the influence of acquisition conditions (digitizing tablet vs. PDA) on systems performance. The two BioSecure Data Sets DS2 and DS3 make this possible, since they contain data from the same 382 people, acquired respectively on a digitizer and on a PDA. Task 2 then aims at assessing the contribution of the five time functions available on a digitizer (coordinates, pressure, pen inclination) on systems resistance to different qualities of skilled forgeries. Results of the 13 systems involved in this competition are reported and analyzed for both tasks in this paper. We observe that the best system in terms of performance on forgeries of bad quality is not necessarily the most resistant to an increased quality of skilled forgeries. Also, we note that mobile conditions are still threatening independently of the quality of forgeries. Finally, when adding pen inclination time functions to pressure and coordinates, we find that the gap between systems in terms of performance is wider than when only pen coordinates and pressure are considered. 1. Introduction In the online signature verification field, four international signature competitions have already been conducted in the last ten years, for comparing different systems on the same databases and with the same evaluation protocols: SVC 2004 [1], BMEC 2007 [2], ICDAR 2009 [3] and BSEC 2009 [4]. In all such competitions, online signature verification systems were evaluated on databases containing different types of forgeries: random forgeries [1,2,3,4], skilled forgeries [1,2,3,4], and synthetic forgeries [2]. In this competition, we focus on skilled forgeries in order to assess the influence of their quality on state-of-the-art systems performance. Indeed, skilled forgery quality can greatly vary depending on: - the ability of an impostor to stick to the genuine signature; - the difficulty for the impostor in reproducing a target signature; - the nature of the information available to the impostor about the target signature (dynamic or static information). The originality of this competition (ESRA 2011) [5] is to refine verification systems performance assessment by considering attacks of different quality levels. Such levels gather skilled forgery samples of different qualities, by means of a Hierarchical Clustering procedure [6] applied on a quantified forgery quality measure proposed by the organizers for online signatures [26]. Such quality measure actually exploits the Personal Entropy measure [7] /11/$ IEEE

2 associated to the target writer. The principle of the forgery quality measure is to quantify to what extent the local estimated probability density functions (PdFs) of a forgery sample stick to the target local PdFs (those of the target writer). To this end, we compute the dissimilarity measure between the target Personal Entropy and the Entropy of the forgery sample estimated with the target model [26]. This competition is carried out on the two largest existing databases containing the same persons, namely on BioSecure Signature Corpus DS2 and DS3 [8,9], respectively acquired on a digitizing tablet and a Personal Digital Assistant (PDA). Such two corpuses allow involving two different protocols for skilled forgeries acquisition. The main objective of BioSecure Signature Evaluation Campaign ESRA 2011 is to provide to the scientific community a new benchmarking methodology for performance assessment, through an increased quality of attacks. ESRA 2011 was divided into two tasks with the following challenges: - The first challenge is to evaluate the impact of mobile acquisition conditions and particularly of the skilled forgery acquisition protocol on systems performance, considering only coordinate time functions; - The second challenge is to study the impact of different time functions among coordinates, pen pressure and pen inclination, on the resistance of systems to attacks. This paper is organized as follows: Section 2 describes the retrieval of skilled forgery categories based on their quality. Section 3 describes the datasets used in this competition. Section 4 details the two tasks of the competition and the corresponding test protocols. Section 5 presents some statistics on the retrieved skilled forgery categories. In Section 6, the participants are described. Experiments are analyzed in Section 7 and Section 8 offers a brief conclusion. 2. Skilled forgery quality categories Signature verification systems submitted to this competition are evaluated on two categories of skilled forgeries, namely of bad quality and of good quality generated following a given signature representation. Indeed, for each person, we cluster his/her skilled forgeries into two categories by applying a Hierarchical Clustering [6] on forgery quality values associated to his/her skilled forgeries. Then, performance evaluation of different verification systems is carried out on the two retrieved forgery quality categories. Figure 1 displays examples of target signatures and of skilled forgeries of good quality and bad quality, when the forgery quality measure is computed on a coordinate-based representation of signatures. As the forgery quality measure is computed on a given feature representation of signatures, it can quantify to what extent a forgery sample gets close to the target signature in terms of different descriptions of a signature. Therefore, for each person, the labeling of skilled forgeries into good and bad quality will change according to the chosen representation of signatures. Figure1: Examples of target signatures and their associated skilled forgeries of (a) good and (b) bad quality. 3. Databases Two datasets containing the same writers were used in this competition [8,9]: DS2 and DS3. DS2 dataset contains two sessions, acquired on a fixed platform (digitizer) two weeks apart, each containing 15 genuine signatures per writer. For skilled forgeries, at each session, a donor is asked to imitate 5 times the shape of the signature of two other people after several minutes of practice. DS3 subset is acquired on the mobile platform PDA HP ipaq hx2790. This dataset contains two sessions, acquired 4-5 weeks apart. Each writer has, per session, 15 genuine signatures and 10 skilled forgeries of mixed type, namely static and dynamic at the same time, thanks to a particular acquisition interface displayed on the PDA touch screen. The impostor could visualize on the PDA touch screen the writing sequence of the target signature and then in a second step, directly sign on the resulting image of the stylus trajectory. Such two steps of the forgery acquisition protocol allowed the impostor to stick simultaneously to the shape and the dynamics of the target signature. For this competition, two development datasets of 50 people from respectively BioSecure DS2 and DS3 were distributed to the participants [5]. Note that the 50 people are the same in the two development datasets. Such datasets are called in the following DS2-50 and DS3-50. The two test datasets of this competition, from BioSecure DS2 and DS3, contain signatures of the same 382 writers. Such two test datasets were kept sequestered by the organizers [5] and are called in the following and DS

3 4.1. Task 1 4. Tasks and evaluation protocol Participants submitted two systems for this task: one tuned on DS2-50 and the other on DS3-50, considering in both cases only pen coordinates for representing signatures. Meanwhile, other features could be extracted from pen coordinates, as speed, acceleration etc. Indeed, the objective of this task was to assess the impact on the performance of both submitted systems, according to the quality of skilled forgeries. This quality depends greatly on the forgery acquisition protocol, which is different on the fixed platform and the mobile one, and is particularly efficient on the mobile platform since the forger can imitate very thoroughly the dynamics of the target signature and its shape as well Task 2 Participants submitted only one system optimized on DS2-50, considering the 5 time functions available on a digitizer (pen coordinates, pen pressure and pen inclination) for representing signatures. Participants could consider only pen coordinates and pressure or all time functions, and they submitted their best system. The objective of this task is to test each system on the appropriate categorization of skilled forgeries, namely that depending on the chosen representation of signatures of each participant. For this reason, in this task, there will be 2 groups of participant systems: those tested on skilled forgery categories built considering pen coordinates and pressure, and those tested on skilled forgery categories built considering all time functions Methodology for performance evaluation For both tasks, the evaluation protocol is the following: for each enrolled person, 5 genuine signatures of Session 1 are chosen randomly for the reference set; tests are carried out on the remaining 10 genuine signatures of Session 1, on 10 skilled forgeries of Session 1 and on 10 skilled forgeries of Session 2. Note that we did not use genuine signatures of Session 2 as we do not want to deal with time variability issue. In order to have enough forgery samples to perform a categorization according to forgery quality, we needed to mix forgeries of both sessions. Then, for each writer, his/her 20 skilled forgeries were labeled as being of bad quality and good quality, by Hierarchical Clustering [6] on the 20 forgery quality values of such skilled forgeries. For performance assessment, we plot DET (Detection Error Tradeoff) curves [10]. The Equal Error Rate (EER) functioning point is also explicitly reported. For Task 2, we also analyze the relative degradation of the FAR as a function of the decision threshold for the best systems, when switching from bad quality to good quality forgeries. It is noteworthy that for all experiments we used a parametric function [27] in order to compute a marginal error (confidence interval) on FAR (t) and FRR (t) for a value of the decision threshold t corresponding to the EER. We found that for all experiments the confidence interval is lower than Statistics on skilled forgery categories In this section, the resulting distribution of skilled forgeries into each quality category is analyzed according to: - which session the forgery sample belongs; - the time functions used for signature representation. For both DS2 and DS3, the quality of skilled forgeries belonging to the two sessions is measured with regard to the target signatures of Session 1. We notice on Tables 1 and 2 that the number of skilled forgeries of bad quality and good quality is similar for forgeries of both sessions. This means that the quality of skilled forgeries of Session 2 is not degraded comparatively to those of Session 1 with regard to the target signatures of Session 1. For this reason, in order to have enough skilled forgeries to perform a categorization according to their quality, and to be able to assess performance reliably, we mix the skilled forgeries of both sessions. Table 1: Distribution of skilled forgeries of bad quality of DS2 and DS3 on the two sessions Bad DS3-382 quality (x,y) (x,y) (x,y,p) (x,y,p,az,alt) Session Session Table 2: Distribution of skilled forgeries of good quality of DS2 and DS3 on the two sessions Good DS3-382 quality (x,y) (x,y) (x,y,p) (x,y,p,az,alt) Session Session Note that only a simple categorization into good and bad quality forgeries seems reasonable given the few number of forgery samples (20 per person). Indeed, if more samples had been available, we could have refined the forgery categorization. Table 3 shows the distribution of skilled forgeries into bad and good quality depending on the time functions considered for describing signatures. 3

4 Note in Table 3 that when dynamic features (pen pressure, pen inclination) are progressively added to the signature representation, the number of skilled forgeries of good quality decreases on. This reflects the easiness for a forger to imitate only the spatial aspect of a target signature compared to forging also the dynamics. Also, note that it is more difficult for the forger to imitate simultaneously different dynamic descriptors of the target signature. Indeed, when pen inclination angles are added to pressure in signatures description, forgery quality drops significantly: almost 60% of good quality samples (1917 forgery samples) switch to the bad quality category. Table 3: Distribution of skilled forgeries of good and bad quality on and DS3-382 depending on the signatures description 7. Experimental results 7.1. Results of Task 1 on and DS Performance on with pen coordinates Experimental results on displayed in Figure 2 and Table 4 show that when confronted to the two quality forgery categories, all systems give better performance on bad quality forgeries than on good quality ones, as expected. Indeed, at the Equal Error Rate (EER) functioning point, systems performance get degraded at least by 2.45% ( VIGO system ) when tested on skilled forgeries of good quality. Such relative degradation can even exceed 20% (see Table 4) at the EER for some systems (Ref, BUAS, SU, SKU). Skilled DS3-382 forgeries (x,y) (x,y) (x,y,p) (x,y,p,az,alt) Good quality Bad quality When comparing the number of good quality forgeries for DS2 and DS3, by of course considering only pen coordinates (DS3 was acquired on a PDA), we observe that DS3 contains more forgery samples of good quality than DS2. This can be explained by the forgery acquisition protocol of DS3, better suited to capturing the dynamics of the target writer. Indeed, the impostor visualized on the PDA touch screen, before forging the target signature, the writing sequence of the target signature and then signed directly on the resulting image of the stylus trajectory (see Section 4). From this analysis on the resulting forgery categories, we conclude that the forgery quality measure used for labeling skilled forgery samples behaves well by giving coherent results. In the following, we confront the resulting forgery categories to the performance criterion. 6. Participants Eleven (11) teams (from academia and industry) showed their interest in participating to this competition. All teams participated to both tasks and some teams submitted two systems for one task. The teams are from 7 different countries (Brazil, China, Germany, Japan, Poland, Spain, and Turkey). Thirteen (13) systems were evaluated together with the BioSecure Reference System of Telecom SudParis [22]. Table 9 gives the characteristics of the submitted systems in terms of the type of features extracted, the nature of the used classifier, and the computation of the final score. (a) (b) Figure 2: DET-Curves on with skilled forgeries of (a) bad quality and (b) good quality. More precisely, on skilled forgeries of bad quality, we observe that the best performance is obtained with the Reference system (EER of 2.73%), closely followed by VIGO system (EER of 2.78%). This is not surprising since the latter system is also based on Hidden Markov Models and performs the fusion of Likelihood and Viterbi 4

5 scores, as the Reference System [21,22]. Nevertheless, although VIGO system gives the best results at low values of FAR, it gets degraded significantly in terms of FRR for higher values of FAR, in comparison to the Reference system. Such two systems are then closely followed by a DTW-based system exploiting fusion also, namely the SKU system (EER of 2.93%). Table 4: EER values (in %) of systems on considering skilled forgeries of bad and good quality and their relative degradation (in %) when switching from bad to good quality forgeries. Task 1 on bad quality good quality Relative degradation BUAS CNED MGU Ref SIAT SKU SU UFS UFS VDU VDU-EUPMt VIGO WUT Now on skilled forgeries of good quality, we clearly observe on Figure 2.b and Table 4 that the best performance is given by VIGO system (EER of 2.85%). This system thus seems more resistant than others to challenging forgeries of : at the EER its relative performance is 30% better than the Reference System that follows. On the other hand, the least robust systems to good quality attacks are based on global distance-based approaches (MGU, BUAS). In between, we find DTW-based approaches, kernel approaches and vector quantization approaches as well (ordered from best to worst as UFS2, SIAT, WUT, VDU, SU, UFS1, CNED, VDU-EUPMt) Performance on DS3-382 with pen coordinates Results, displayed in Figure 3 and Table 5, show that also on DS3-382, as expected, all systems give better performance on bad quality skilled forgeries than on good quality ones. The relative degradation at the EER (see Table 5) between the two quality categories is in between 2.48% and 30.07%. But on DS3 the tendency reverts compared to DS2: HMM-based approaches follow DTW-based ones. Indeed, on DS3, the SU system, based on DTW approach, is the best system in terms of performance on both forgery quality categories. This could be explained by the fact that such HMM-based approaches exploit a so-called Viterbi score which relies on the difference in the average length of each portion between the test signature and the reference set, portions retrieved when running the Viterbi algorithm with the target HMM [22]. This Viterbi score thus detects when a forgery is too far away in terms of signature length from the target signature; but as in DS3 dataset, the forgery acquisition protocol is quite efficient, the factor length is not anymore discriminant towards forgeries, and the Viterbi score actually may move closer forgeries to target signatures. (a) (b) Figure 3: DET-Curves on DS3-382 with skilled forgeries of (a) bad quality and (b) good quality. Besides, the intra-class variability of writers increases when acquiring signatures on a mobile platform, as previously shown by the organizers through the concept of Personal Entropy [11]. Indeed, Personal Entropy [7], a measure of the degree of disorder (chaos) in the reference set of a writer, increases when switching from a fixed platform to a mobile one. This phenomenon affects the stability of segmentation in the target signature class, and thus degrades the characterization of the target class by the Viterbi score. For these reasons, DTW-based approaches are more efficient in mobile acquisition conditions than the two score fusion-based systems relying on HMMs. 5

6 Concerning the ranking, the 5 best systems on both bad and good quality forgery categories are the same: they are based either on DTW or on Gaussian Kernels (ranked from best to worst as: SU, VDU, UFS1, SKU, UFS2). On the other hand, the worst systems on both bad and good quality forgery categories on DS3 are the same as those on DS2, ranked from best to worst as MGU, BUAS (global distance approaches) and VDU-EUPMt (Vector Quantization). one hand, for low values of the FAR, WUT system gets degraded with regard to other systems. On the other hand, for high values of the FAR, it is SIAT system that gets degraded compared to the other systems. The best systems are both kernel-based: CNED system and UFS1 system. Table 5: EER values (in %) of systems on DS3-382 considering skilled forgeries of bad and good quality and their relative degradation (in %) when switching from bad to good quality forgeries. Task 1 on DS3-382 bad quality good quality Relative degradation BUAS CNED MGU Ref SIAT SKU SU UFS UFS VDU VDU-EUPMt VIGO WUT Now when comparing the results between DS2 (Table 4) and DS3 (Table 5), we observe a clear degradation of EER values on DS3 (roughly by a factor 2), and that on both quality categories of skilled forgeries, even if the systems have been tuned on each database. This indicates that mobile conditions are still threatening for verification systems Results of Task 2 on In this task, performance analysis is carried out on two different forgery categorizations: when coordinates and pressure are used in signature representation; when pressure and pen inclination are both considered additionally to coordinates for signatures representation. In each case, we analyze performance of the systems exploiting the corresponding signature representation. Note that the test database varies in function of the set of time functions considered Performance with pen coordinates and pressure In this task, 4 systems exploited pen coordinates and pressure: WUT, SIAT, CNED and UFS systems. In Figure 4, we note that DTW-based systems (WUT and SIAT) do not behave well for low or high values of FAR: indeed, on (a) (b) Figure 4: DET-Curves on with (x,y,p) on skilled forgeries of (a) bad quality and (b) good quality Table 6: EER values (in %) of systems on on forgeries of bad and good quality with (x,y,p) and their relative degradation (in %) when switching from bad to good quality forgeries Task 2 on bad quality good quality Relative degradation CNED SIAT UFS WUT In order to analyze the robustness of the best systems to good quality forgeries, we display in Figure 5 the relative degradation of the FAR when switching from bad to good quality skilled forgeries. We notice that CNED system is more robust to skilled forgeries of good quality than UFS1 system, since for most values of the decision threshold, its relative degradation is lower than 50%. 6

7 As in Task 1 on DS2, the least performing systems are MGU system and BUAS system, both based on global distance approaches. Also, as in Task 1 on DS2, the score fusion-based VIGO system relying on HMMs gives the best results on both quality categories of skilled forgeries (see also Table 7 for the EER functioning point). Such system is then followed by the DTW-based SKU system. The robustness of such two systems to good quality skilled forgeries differs as shown in Figure 7: note that although VIGO system is the best in absolute terms, its relative degradation (see Figure 7(a)) in the most critical region (low values of the FAR), is more important than that of SKU system that follows (see Figure 7(b)). Figure 5: Relative degradation of the FAR as a function of the decision threshold of (a) CNED system and (b) UFS1 system, when switching from bad to good quality skilled forgeries Performance with pen coordinates, pressure and pen inclination In this task, 6 systems exploited all time functions: BUAS, MGU, SKU, VIGO, Ref, VDU-EUPMt systems. When considering all time functions available on the digitizer, we notice on Figure 6 that the gap between systems in terms of performance is widened. (a) (b) (a) (b) Figure 6: DET-Curves on with (x,y,p,az,alt) on skilled forgeries of (a) bad quality and (b) good quality,. Table 7: EER values (in %) of systems on on forgeries of bad and good quality with (x,y,p,az,alt) and their relative degradation when switching from bad to good quality forgeries. Task 2 on bad quality good quality Relative degradation BUAS MGU Ref SKU VDU-EUPMt VIGO (c) Figure 7: Relative degradation of the FAR as a function of the decision threshold of (a) VIGO system, (b) SKU system and (c) Reference system, when switching from bad to good quality skilled forgeries. 7

8 Finally, note in Figure 6(b) that Reference system gets substantially degraded on good quality forgeries with regard to the two above mentioned systems. Figure 7(c) then confirms this result, showing a relative degradation of Reference system, higher than 400% for most values of the decision threshold. 8. Conclusion In this paper, we presented the most recent online signature competition, namely ESRA 2011, held in conjunction with the international Joint Conference on Biometrics (IJCB 2011). This competition was focused on the evaluation of online signature systems on skilled forgeries of different quality levels available on the two BioSecure Data Sets DS2 and DS3 containing the same 382 persons, acquired respectively on a fixed platform and a mobile one. In this competition two different tasks were defined: Task 1 evaluates the impact of mobile acquisition conditions and particularly of the skilled forgery acquisition protocol on systems performance, considering only coordinate time functions; Task 2 assesses the impact of different time functions among coordinates, pen pressure and pen inclination, on the resistance of systems to different qualities of attacks. 12 participant systems from 11 teams from academia and industry are involved in this competition. The results show that the best system in terms of absolute performance is not necessarily the most resistant to an increased quality in skilled forgeries. In Task 1, we first noted a global degradation of performance on DS3 compared to DS2; secondly, we noted that the ranking of systems in terms of performance is not the same on DS2 and DS3: indeed, Vigo system is the winner on DS2, and SU system is the winner on DS3. In Task 2, forgery categories differ according to the time functions used for representing signatures. We noted that when introducing pen inclination time functions additionally to pressure and coordinates, the gap between systems in terms of performance is wide. In this case, the winning system ( Vigo system ) outperforms significantly the others even in terms of resistance to attacks of increased quality. Acknowledgments We would like to thank the BioSecure Association for putting at our disposal the BioSecure DS2 and DS3 Signature Datasets and its support to this evaluation. References [1] D.Y. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto, and G. Rigoll, "SVC2004: First International Signature Verification Competition", Int. Conference on Biometric Authentication (ICBA), Springer LNCS Vol. 3072, pp.16-22, China, [2] [3] V.L. Blankers, C.E. van den Heuvel, K.Y. Franke, and L.G. Vuurpij, "The ICDAR 2009 Signature Verification Competition", Proc. of the 10 th Int. Conference on Document Analysis and Recognition, [4] [5] [6] A. K. Jain, M. N. Murty, and P. J. Flynn, "Data clustering data: A Review", ACM Computing Surveys, Vol. 31, N 3, pp , [7] S. Garcia-Salicetti, N. Houmani, and B. Dorizzi, "A Novel Criterion for Writer Enrolment based on a Time-Normalized Signature Sample Entropy Measure", EURASIP Journal on Advances in Signal Processing, Vol. 2009, Article ID , 12 pages, doi /2009/964746, [8] [9] J. Ortega-Garcia, J. Fierrez, F. Alonso-Fernandez, J. Galbally, M.R. Freire, J. Gonzalez-Rodriguez, C. Garcia-Mateo, J.L Alba-Castro, E. Gonzalez-Agulla, E. Otero-Muras, S. Garcia-Salicetti, L. Allano, B. Ly-Van, B. Dorizzi, J. Kittler, T. Bourlai, N. Poh, F. Deravi, M.N.R Ng, M. Fairhurst, J. Hennebert, A. Humm, M. Tistarelli, L. Brodo, J. Richiardi, A. Drygajlo, H. Ganster, F.M. Sukno, S.K. Pavani, A. Frangi, L. Akarun, and A. Savran, "The Multiscenario Multienvironment BioSecure Multimodal Database (BMDB)", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.32, Issue 6, June [10] A. Martin, G. Doddington, T. Kamm, M. Ordowski, and M. Przybocki, "The det curve in assessment of detection task performance", Proc. of EUROSPEECH 97, Vol. 4, pp , Rhodes, Greece, [11] S. Garcia-Salicetti, N. Houmani, and B. Dorizzi, "A Client-entropy Measure for On-line Signatures", IEEE Biometrics Symposium (BSYM), pp , Tampa, USA, Septembre [12] R.E. Schapire and Y. Singer, "Improved boosting algorithms using confidence-rated predictions", Machine Learning 37(3), pp , [13] D. Muramatsu and T. Matsumoto, "Online Signature Verification Algorithm with a User-Specific Global- Parameter Fusion Model," Proc. of IEEE Int. Conference on Systems, Man, and Cybernetics, pp , [14] J. Putz-Leszczyńska and M. Kudelski, "Hidden Signature for DTW Signature Verification in Authorizing Payment Transactions", Journal of Telecommunications and Information Technology (JTIT), Vol. 4, [15] J. Putz-Leszczyńska, M. Chochowski, L. Stasiak, R. Wardziński, A. Pacut, "Two-stage classifier for off-line signature verification", in the 13 th Biennial Conference of the International Graphonomics Society, Melbourne, Australia, pp , Nov

9 [16] A. Juels and M. Wattenberg, "A Fuzzy Commitment Scheme", in Proc. of the ACM Conference on Computer and Communications Security, pp , [17] Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data", in SIAM J. Comput. 38(1), pp , [18] C. Vielhauer and R. Steinmetz, "Handwriting: Feature Correlation Analysis for Biometric Hashes", In: Bourlard, H., Pitas, I., Lam, K., Wang, Y. (Eds.), EURASIP Journal on Applied Signal Processing, Special Issue on Biometric Signal Processing, Hindawi Publishing Corporation, Sylvania, OH, USA, [19] C. Vielhauer, "Biometric User Authentication for IT Security: From Fundamentals to Handwriting", Springer, New York, [20] A. Makrushin, T. Scheidat, and C. Vielauer, "Handwriting Biometrics: Feature Selection based Improvements in Authentication and Hash Generation Accuracy", in C. Vielhauer et al. (Eds.): BioID 2011, LNCS 6583, pp , doi / _4, [21] E. Argones Rua, D. Pérez-Pinar Lopez, and J. L. Alba Castro, "Ergodic hmm-ubm system for on-line signature verification", In Proc. of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication, BioID MultiComm'09, pp , Berlin, Heidelberg, Springer-Verlag. [22] B. Ly Van, S. Garcia-Salicetti, and B. Dorizzi, "On using the viterbi path along with HMM likelihood information for online signature verification", in IEEE Trans. Systems, Man, and Cybernetics, Part B: Cybernetics, 37(5), pp , [23] A. Kholmatov and B.A. Yanikoglu, "Identity authentication using improved online signature verification method", Pattern Recognition Letters 26(15), pp , [24] B.A. Yanikoglu and A. Kholmatov, "Online Signature Verification Using Fourier Descriptors", EURASIP Journal on Advances in Signal Processing, Vol. 2009, Article ID , 13 pages, doi: /2009/260516, [25] J. M. Pascual-Gaspar, M. Faundez-Zanuy and C. Vivaracho "fast online signaturerecognition based on VQ with time modelling", Engineering Applications of Artificial Intelligence, vol 24 (2011) , March [26] N.Houmani, S. Garcia-Salicetti and B. Dorizzi, "On Measuring Forgery Quality of On-line Signatures", submitted to Pattern Recognition on June 29 th 2010, revised on July 1 st, [27] R. M. Bolle, N. K. Ratha, and S. Pankanti, "Error analysis of pattern recognition systems - the subsets bootstrap", Computer Vision and Image Understanding, 93(1), pp. 1-33,

10 Table 9: Description of the systems classifier System System description SU Sabanci University, Turkey - Pen coordinates and number of extra points in DTW alignment - Score computation: average DTW distance between the test and the 5 reference signatures with user-based normalization taking into account the mean of reference set signatures to the rest and the variation [23,24]. DTW distance Other distances HMM Vector Quantization Isotropic Gaussian Kernels WUT Warsaw University of Technology / Biometrics and Machine Learning Group, Poland SIAT Shenzhen Institutes of Advanced Technology, China VDU Universidad de Valladolid, Spain SKU Seikei University, Japan MGU Otto-von-Guericke University of Magdeburg, Germany BUAS Brandenburg University of Applied Sciences, Germany VIGO University of Vigo, Spain Ref Telecom SudParis, France VDU- EUPMt Escola Universitaria Politecnica de Mataro and Universidad de Valladolid, Spain UFS 1 Universidade Federal de Sergipe, Brazil UFS 2 Universidade Federal de Sergipe, Brazil CNED TECNED Tecnologias Educacionais, Brazil - Universidade Federal de Sergipe, Brazil - Time derivative of coordinates, pressure and signature length. - Global and local classifiers [14,15]. - Employment of an abstract representation of a person s signatures estimated from the available enrollment signatures. - Speed along x and y directions, pressure. - Score computation: normalized distance. - Local features: y coordinate, pressure and time derivative of pen coordinates (dx,dy). - Average DTW distance between the test and the 5 reference signatures. - Mean vector computed on the reference signatures considering as local features: the 5 time functions, pen direction and velocity. - Score based on a fusion model generated by combining many perceptrons, relying on the reference set, using Adaboost algorithm [12,13] features extracted from the 5 time functions - Feature selection: sequential forward search algorithm (SFS) - Score based on a Hamming distance [16,17] features extracted from the 5 time functions - Biometric Hash algorithm - Score based on a Canberra distance [18,19,20] - 11 local features extracted from the 5 time functions. - Weighted sum of 2 scores: likelihood score of a HMM-Universal Background Model, and Viterbi score of a user specific HMM [21,22] local features extracted from the 5 time functions - Score: fusion of likelihood score and segmentation score generated by Viterbi algorithm [22] local Features derived from coordinates, pressure and time stamps. - Vector quantization [25]. - 7 local features derived from coordinates and pressure - dispersion optimized by a cross validation strategy - Likelihood score. - 5 local features derived from coordinates and pressure - Only k nearest neighboring Gaussian Kernels. - Likelihood score. - 4 local features derived from coordinates and pressure - Only k nearest neighboring Gaussian Kernels. - Likelihood score. 10

Non intrusive multi-biometrics on a mobile device: a comparison of fusion techniques

Non intrusive multi-biometrics on a mobile device: a comparison of fusion techniques Non intrusive multi-biometrics on a mobile device: a comparison of fusion techniques Lorene Allano 1*1, Andrew C. Morris 2, Harin Sellahewa 3, Sonia Garcia-Salicetti 1, Jacques Koreman 2, Sabah Jassim

More information

Class-Discriminative Weighted Distortion Measure for VQ-Based Speaker Identification

Class-Discriminative Weighted Distortion Measure for VQ-Based Speaker Identification Class-Discriminative Weighted Distortion Measure for VQ-Based Speaker Identification Tomi Kinnunen and Ismo Kärkkäinen University of Joensuu, Department of Computer Science, P.O. Box 111, 80101 JOENSUU,

More information

QuickStroke: An Incremental On-line Chinese Handwriting Recognition System

QuickStroke: An Incremental On-line Chinese Handwriting Recognition System QuickStroke: An Incremental On-line Chinese Handwriting Recognition System Nada P. Matić John C. Platt Λ Tony Wang y Synaptics, Inc. 2381 Bering Drive San Jose, CA 95131, USA Abstract This paper presents

More information

Speech Emotion Recognition Using Support Vector Machine

Speech Emotion Recognition Using Support Vector Machine Speech Emotion Recognition Using Support Vector Machine Yixiong Pan, Peipei Shen and Liping Shen Department of Computer Technology Shanghai JiaoTong University, Shanghai, China panyixiong@sjtu.edu.cn,

More information

An Online Handwriting Recognition System For Turkish

An Online Handwriting Recognition System For Turkish An Online Handwriting Recognition System For Turkish Esra Vural, Hakan Erdogan, Kemal Oflazer, Berrin Yanikoglu Sabanci University, Tuzla, Istanbul, Turkey 34956 ABSTRACT Despite recent developments in

More information

Word Segmentation of Off-line Handwritten Documents

Word Segmentation of Off-line Handwritten Documents Word Segmentation of Off-line Handwritten Documents Chen Huang and Sargur N. Srihari {chuang5, srihari}@cedar.buffalo.edu Center of Excellence for Document Analysis and Recognition (CEDAR), Department

More information

IN a biometric identification system, it is often the case that

IN a biometric identification system, it is often the case that 220 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 32, NO. 2, FEBRUARY 2010 The Biometric Menagerie Neil Yager and Ted Dunstone, Member, IEEE Abstract It is commonly accepted that

More information

AUTOMATIC DETECTION OF PROLONGED FRICATIVE PHONEMES WITH THE HIDDEN MARKOV MODELS APPROACH 1. INTRODUCTION

AUTOMATIC DETECTION OF PROLONGED FRICATIVE PHONEMES WITH THE HIDDEN MARKOV MODELS APPROACH 1. INTRODUCTION JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 11/2007, ISSN 1642-6037 Marek WIŚNIEWSKI *, Wiesława KUNISZYK-JÓŹKOWIAK *, Elżbieta SMOŁKA *, Waldemar SUSZYŃSKI * HMM, recognition, speech, disorders

More information

A Case Study: News Classification Based on Term Frequency

A Case Study: News Classification Based on Term Frequency A Case Study: News Classification Based on Term Frequency Petr Kroha Faculty of Computer Science University of Technology 09107 Chemnitz Germany kroha@informatik.tu-chemnitz.de Ricardo Baeza-Yates Center

More information

Python Machine Learning

Python Machine Learning Python Machine Learning Unlock deeper insights into machine learning with this vital guide to cuttingedge predictive analytics Sebastian Raschka [ PUBLISHING 1 open source I community experience distilled

More information

Learning Methods in Multilingual Speech Recognition

Learning Methods in Multilingual Speech Recognition Learning Methods in Multilingual Speech Recognition Hui Lin Department of Electrical Engineering University of Washington Seattle, WA 98125 linhui@u.washington.edu Li Deng, Jasha Droppo, Dong Yu, and Alex

More information

Reducing Features to Improve Bug Prediction

Reducing Features to Improve Bug Prediction Reducing Features to Improve Bug Prediction Shivkumar Shivaji, E. James Whitehead, Jr., Ram Akella University of California Santa Cruz {shiv,ejw,ram}@soe.ucsc.edu Sunghun Kim Hong Kong University of Science

More information

Learning Methods for Fuzzy Systems

Learning Methods for Fuzzy Systems Learning Methods for Fuzzy Systems Rudolf Kruse and Andreas Nürnberger Department of Computer Science, University of Magdeburg Universitätsplatz, D-396 Magdeburg, Germany Phone : +49.39.67.876, Fax : +49.39.67.8

More information

A Case-Based Approach To Imitation Learning in Robotic Agents

A Case-Based Approach To Imitation Learning in Robotic Agents A Case-Based Approach To Imitation Learning in Robotic Agents Tesca Fitzgerald, Ashok Goel School of Interactive Computing Georgia Institute of Technology, Atlanta, GA 30332, USA {tesca.fitzgerald,goel}@cc.gatech.edu

More information

Welcome to. ECML/PKDD 2004 Community meeting

Welcome to. ECML/PKDD 2004 Community meeting Welcome to ECML/PKDD 2004 Community meeting A brief report from the program chairs Jean-Francois Boulicaut, INSA-Lyon, France Floriana Esposito, University of Bari, Italy Fosca Giannotti, ISTI-CNR, Pisa,

More information

The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X

The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, 2013 10.12753/2066-026X-13-154 DATA MINING SOLUTIONS FOR DETERMINING STUDENT'S PROFILE Adela BÂRA,

More information

Learning From the Past with Experiment Databases

Learning From the Past with Experiment Databases Learning From the Past with Experiment Databases Joaquin Vanschoren 1, Bernhard Pfahringer 2, and Geoff Holmes 2 1 Computer Science Dept., K.U.Leuven, Leuven, Belgium 2 Computer Science Dept., University

More information

OCR for Arabic using SIFT Descriptors With Online Failure Prediction

OCR for Arabic using SIFT Descriptors With Online Failure Prediction OCR for Arabic using SIFT Descriptors With Online Failure Prediction Andrey Stolyarenko, Nachum Dershowitz The Blavatnik School of Computer Science Tel Aviv University Tel Aviv, Israel Email: stloyare@tau.ac.il,

More information

The Good Judgment Project: A large scale test of different methods of combining expert predictions

The Good Judgment Project: A large scale test of different methods of combining expert predictions The Good Judgment Project: A large scale test of different methods of combining expert predictions Lyle Ungar, Barb Mellors, Jon Baron, Phil Tetlock, Jaime Ramos, Sam Swift The University of Pennsylvania

More information

Switchboard Language Model Improvement with Conversational Data from Gigaword

Switchboard Language Model Improvement with Conversational Data from Gigaword Katholieke Universiteit Leuven Faculty of Engineering Master in Artificial Intelligence (MAI) Speech and Language Technology (SLT) Switchboard Language Model Improvement with Conversational Data from Gigaword

More information

CS Machine Learning

CS Machine Learning CS 478 - Machine Learning Projects Data Representation Basic testing and evaluation schemes CS 478 Data and Testing 1 Programming Issues l Program in any platform you want l Realize that you will be doing

More information

Human Emotion Recognition From Speech

Human Emotion Recognition From Speech RESEARCH ARTICLE OPEN ACCESS Human Emotion Recognition From Speech Miss. Aparna P. Wanare*, Prof. Shankar N. Dandare *(Department of Electronics & Telecommunication Engineering, Sant Gadge Baba Amravati

More information

Australian Journal of Basic and Applied Sciences

Australian Journal of Basic and Applied Sciences AENSI Journals Australian Journal of Basic and Applied Sciences ISSN:1991-8178 Journal home page: www.ajbasweb.com Feature Selection Technique Using Principal Component Analysis For Improving Fuzzy C-Mean

More information

Rule Learning With Negation: Issues Regarding Effectiveness

Rule Learning With Negation: Issues Regarding Effectiveness Rule Learning With Negation: Issues Regarding Effectiveness S. Chua, F. Coenen, G. Malcolm University of Liverpool Department of Computer Science, Ashton Building, Ashton Street, L69 3BX Liverpool, United

More information

Lecture 1: Machine Learning Basics

Lecture 1: Machine Learning Basics 1/69 Lecture 1: Machine Learning Basics Ali Harakeh University of Waterloo WAVE Lab ali.harakeh@uwaterloo.ca May 1, 2017 2/69 Overview 1 Learning Algorithms 2 Capacity, Overfitting, and Underfitting 3

More information

A Comparison of DHMM and DTW for Isolated Digits Recognition System of Arabic Language

A Comparison of DHMM and DTW for Isolated Digits Recognition System of Arabic Language A Comparison of DHMM and DTW for Isolated Digits Recognition System of Arabic Language Z.HACHKAR 1,3, A. FARCHI 2, B.MOUNIR 1, J. EL ABBADI 3 1 Ecole Supérieure de Technologie, Safi, Morocco. zhachkar2000@yahoo.fr.

More information

A study of speaker adaptation for DNN-based speech synthesis

A study of speaker adaptation for DNN-based speech synthesis A study of speaker adaptation for DNN-based speech synthesis Zhizheng Wu, Pawel Swietojanski, Christophe Veaux, Steve Renals, Simon King The Centre for Speech Technology Research (CSTR) University of Edinburgh,

More information

Eli Yamamoto, Satoshi Nakamura, Kiyohiro Shikano. Graduate School of Information Science, Nara Institute of Science & Technology

Eli Yamamoto, Satoshi Nakamura, Kiyohiro Shikano. Graduate School of Information Science, Nara Institute of Science & Technology ISCA Archive SUBJECTIVE EVALUATION FOR HMM-BASED SPEECH-TO-LIP MOVEMENT SYNTHESIS Eli Yamamoto, Satoshi Nakamura, Kiyohiro Shikano Graduate School of Information Science, Nara Institute of Science & Technology

More information

Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming

Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming Data Mining VI 205 Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming C. Romero, S. Ventura, C. Hervás & P. González Universidad de Córdoba, Campus Universitario de

More information

DOMAIN MISMATCH COMPENSATION FOR SPEAKER RECOGNITION USING A LIBRARY OF WHITENERS. Elliot Singer and Douglas Reynolds

DOMAIN MISMATCH COMPENSATION FOR SPEAKER RECOGNITION USING A LIBRARY OF WHITENERS. Elliot Singer and Douglas Reynolds DOMAIN MISMATCH COMPENSATION FOR SPEAKER RECOGNITION USING A LIBRARY OF WHITENERS Elliot Singer and Douglas Reynolds Massachusetts Institute of Technology Lincoln Laboratory {es,dar}@ll.mit.edu ABSTRACT

More information

ADVANCES IN DEEP NEURAL NETWORK APPROACHES TO SPEAKER RECOGNITION

ADVANCES IN DEEP NEURAL NETWORK APPROACHES TO SPEAKER RECOGNITION ADVANCES IN DEEP NEURAL NETWORK APPROACHES TO SPEAKER RECOGNITION Mitchell McLaren 1, Yun Lei 1, Luciana Ferrer 2 1 Speech Technology and Research Laboratory, SRI International, California, USA 2 Departamento

More information

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1 Notes on The Sciences of the Artificial Adapted from a shorter document written for course 17-652 (Deciding What to Design) 1 Ali Almossawi December 29, 2005 1 Introduction The Sciences of the Artificial

More information

Calibration of Confidence Measures in Speech Recognition

Calibration of Confidence Measures in Speech Recognition Submitted to IEEE Trans on Audio, Speech, and Language, July 2010 1 Calibration of Confidence Measures in Speech Recognition Dong Yu, Senior Member, IEEE, Jinyu Li, Member, IEEE, Li Deng, Fellow, IEEE

More information

Modeling function word errors in DNN-HMM based LVCSR systems

Modeling function word errors in DNN-HMM based LVCSR systems Modeling function word errors in DNN-HMM based LVCSR systems Melvin Jose Johnson Premkumar, Ankur Bapna and Sree Avinash Parchuri Department of Computer Science Department of Electrical Engineering Stanford

More information

Spoofing and countermeasures for automatic speaker verification

Spoofing and countermeasures for automatic speaker verification INTERSPEECH 2013 Spoofing and countermeasures for automatic speaker verification Nicholas Evans 1, Tomi Kinnunen 2 and Junichi Yamagishi 3,4 1 EURECOM, Sophia Antipolis, France 2 University of Eastern

More information

Speech Recognition at ICSI: Broadcast News and beyond

Speech Recognition at ICSI: Broadcast News and beyond Speech Recognition at ICSI: Broadcast News and beyond Dan Ellis International Computer Science Institute, Berkeley CA Outline 1 2 3 The DARPA Broadcast News task Aspects of ICSI

More information

Problems of the Arabic OCR: New Attitudes

Problems of the Arabic OCR: New Attitudes Problems of the Arabic OCR: New Attitudes Prof. O.Redkin, Dr. O.Bernikova Department of Asian and African Studies, St. Petersburg State University, St Petersburg, Russia Abstract - This paper reviews existing

More information

Malicious User Suppression for Cooperative Spectrum Sensing in Cognitive Radio Networks using Dixon s Outlier Detection Method

Malicious User Suppression for Cooperative Spectrum Sensing in Cognitive Radio Networks using Dixon s Outlier Detection Method Malicious User Suppression for Cooperative Spectrum Sensing in Cognitive Radio Networks using Dixon s Outlier Detection Method Sanket S. Kalamkar and Adrish Banerjee Department of Electrical Engineering

More information

INPE São José dos Campos

INPE São José dos Campos INPE-5479 PRE/1778 MONLINEAR ASPECTS OF DATA INTEGRATION FOR LAND COVER CLASSIFICATION IN A NEDRAL NETWORK ENVIRONNENT Maria Suelena S. Barros Valter Rodrigues INPE São José dos Campos 1993 SECRETARIA

More information

Semi-Supervised GMM and DNN Acoustic Model Training with Multi-system Combination and Confidence Re-calibration

Semi-Supervised GMM and DNN Acoustic Model Training with Multi-system Combination and Confidence Re-calibration INTERSPEECH 2013 Semi-Supervised GMM and DNN Acoustic Model Training with Multi-system Combination and Confidence Re-calibration Yan Huang, Dong Yu, Yifan Gong, and Chaojun Liu Microsoft Corporation, One

More information

Knowledge Transfer in Deep Convolutional Neural Nets

Knowledge Transfer in Deep Convolutional Neural Nets Knowledge Transfer in Deep Convolutional Neural Nets Steven Gutstein, Olac Fuentes and Eric Freudenthal Computer Science Department University of Texas at El Paso El Paso, Texas, 79968, U.S.A. Abstract

More information

BAUM-WELCH TRAINING FOR SEGMENT-BASED SPEECH RECOGNITION. Han Shu, I. Lee Hetherington, and James Glass

BAUM-WELCH TRAINING FOR SEGMENT-BASED SPEECH RECOGNITION. Han Shu, I. Lee Hetherington, and James Glass BAUM-WELCH TRAINING FOR SEGMENT-BASED SPEECH RECOGNITION Han Shu, I. Lee Hetherington, and James Glass Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cambridge,

More information

Evolutive Neural Net Fuzzy Filtering: Basic Description

Evolutive Neural Net Fuzzy Filtering: Basic Description Journal of Intelligent Learning Systems and Applications, 2010, 2: 12-18 doi:10.4236/jilsa.2010.21002 Published Online February 2010 (http://www.scirp.org/journal/jilsa) Evolutive Neural Net Fuzzy Filtering:

More information

The University of Amsterdam s Concept Detection System at ImageCLEF 2011

The University of Amsterdam s Concept Detection System at ImageCLEF 2011 The University of Amsterdam s Concept Detection System at ImageCLEF 2011 Koen E. A. van de Sande and Cees G. M. Snoek Intelligent Systems Lab Amsterdam, University of Amsterdam Software available from:

More information

A New Perspective on Combining GMM and DNN Frameworks for Speaker Adaptation

A New Perspective on Combining GMM and DNN Frameworks for Speaker Adaptation A New Perspective on Combining GMM and DNN Frameworks for Speaker Adaptation SLSP-2016 October 11-12 Natalia Tomashenko 1,2,3 natalia.tomashenko@univ-lemans.fr Yuri Khokhlov 3 khokhlov@speechpro.com Yannick

More information

Support Vector Machines for Speaker and Language Recognition

Support Vector Machines for Speaker and Language Recognition Support Vector Machines for Speaker and Language Recognition W. M. Campbell, J. P. Campbell, D. A. Reynolds, E. Singer, P. A. Torres-Carrasquillo MIT Lincoln Laboratory, 244 Wood Street, Lexington, MA

More information

IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 17, NO. 3, MARCH

IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 17, NO. 3, MARCH IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 17, NO. 3, MARCH 2009 423 Adaptive Multimodal Fusion by Uncertainty Compensation With Application to Audiovisual Speech Recognition George

More information

A Coding System for Dynamic Topic Analysis: A Computer-Mediated Discourse Analysis Technique

A Coding System for Dynamic Topic Analysis: A Computer-Mediated Discourse Analysis Technique A Coding System for Dynamic Topic Analysis: A Computer-Mediated Discourse Analysis Technique Hiromi Ishizaki 1, Susan C. Herring 2, Yasuhiro Takishima 1 1 KDDI R&D Laboratories, Inc. 2 Indiana University

More information

Why Did My Detector Do That?!

Why Did My Detector Do That?! Why Did My Detector Do That?! Predicting Keystroke-Dynamics Error Rates Kevin Killourhy and Roy Maxion Dependable Systems Laboratory Computer Science Department Carnegie Mellon University 5000 Forbes Ave,

More information

Linking Task: Identifying authors and book titles in verbose queries

Linking Task: Identifying authors and book titles in verbose queries Linking Task: Identifying authors and book titles in verbose queries Anaïs Ollagnier, Sébastien Fournier, and Patrice Bellot Aix-Marseille University, CNRS, ENSAM, University of Toulon, LSIS UMR 7296,

More information

Modeling function word errors in DNN-HMM based LVCSR systems

Modeling function word errors in DNN-HMM based LVCSR systems Modeling function word errors in DNN-HMM based LVCSR systems Melvin Jose Johnson Premkumar, Ankur Bapna and Sree Avinash Parchuri Department of Computer Science Department of Electrical Engineering Stanford

More information

The NICT/ATR speech synthesis system for the Blizzard Challenge 2008

The NICT/ATR speech synthesis system for the Blizzard Challenge 2008 The NICT/ATR speech synthesis system for the Blizzard Challenge 2008 Ranniery Maia 1,2, Jinfu Ni 1,2, Shinsuke Sakai 1,2, Tomoki Toda 1,3, Keiichi Tokuda 1,4 Tohru Shimizu 1,2, Satoshi Nakamura 1,2 1 National

More information

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining Dave Donnellan, School of Computer Applications Dublin City University Dublin 9 Ireland daviddonnellan@eircom.net Claus Pahl

More information

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining Dave Donnellan, School of Computer Applications Dublin City University Dublin 9 Ireland daviddonnellan@eircom.net Claus Pahl

More information

Detecting Wikipedia Vandalism using Machine Learning Notebook for PAN at CLEF 2011

Detecting Wikipedia Vandalism using Machine Learning Notebook for PAN at CLEF 2011 Detecting Wikipedia Vandalism using Machine Learning Notebook for PAN at CLEF 2011 Cristian-Alexandru Drăgușanu, Marina Cufliuc, Adrian Iftene UAIC: Faculty of Computer Science, Alexandru Ioan Cuza University,

More information

THE WEB 2.0 AS A PLATFORM FOR THE ACQUISITION OF SKILLS, IMPROVE ACADEMIC PERFORMANCE AND DESIGNER CAREER PROMOTION IN THE UNIVERSITY

THE WEB 2.0 AS A PLATFORM FOR THE ACQUISITION OF SKILLS, IMPROVE ACADEMIC PERFORMANCE AND DESIGNER CAREER PROMOTION IN THE UNIVERSITY THE WEB 2.0 AS A PLATFORM FOR THE ACQUISITION OF SKILLS, IMPROVE ACADEMIC PERFORMANCE AND DESIGNER CAREER PROMOTION IN THE UNIVERSITY F. Felip Miralles, S. Martín Martín, Mª L. García Martínez, J.L. Navarro

More information

UMass at TDT Similarity functions 1. BASIC SYSTEM Detection algorithms. set globally and apply to all clusters.

UMass at TDT Similarity functions 1. BASIC SYSTEM Detection algorithms. set globally and apply to all clusters. UMass at TDT James Allan, Victor Lavrenko, David Frey, and Vikas Khandelwal Center for Intelligent Information Retrieval Department of Computer Science University of Massachusetts Amherst, MA 3 We spent

More information

Learning Structural Correspondences Across Different Linguistic Domains with Synchronous Neural Language Models

Learning Structural Correspondences Across Different Linguistic Domains with Synchronous Neural Language Models Learning Structural Correspondences Across Different Linguistic Domains with Synchronous Neural Language Models Stephan Gouws and GJ van Rooyen MIH Medialab, Stellenbosch University SOUTH AFRICA {stephan,gvrooyen}@ml.sun.ac.za

More information

Design Of An Automatic Speaker Recognition System Using MFCC, Vector Quantization And LBG Algorithm

Design Of An Automatic Speaker Recognition System Using MFCC, Vector Quantization And LBG Algorithm Design Of An Automatic Speaker Recognition System Using MFCC, Vector Quantization And LBG Algorithm Prof. Ch.Srinivasa Kumar Prof. and Head of department. Electronics and communication Nalanda Institute

More information

SARDNET: A Self-Organizing Feature Map for Sequences

SARDNET: A Self-Organizing Feature Map for Sequences SARDNET: A Self-Organizing Feature Map for Sequences Daniel L. James and Risto Miikkulainen Department of Computer Sciences The University of Texas at Austin Austin, TX 78712 dljames,risto~cs.utexas.edu

More information

Automatic Speaker Recognition: Modelling, Feature Extraction and Effects of Clinical Environment

Automatic Speaker Recognition: Modelling, Feature Extraction and Effects of Clinical Environment Automatic Speaker Recognition: Modelling, Feature Extraction and Effects of Clinical Environment A thesis submitted in fulfillment of the requirements for the degree of Doctor of Philosophy Sheeraz Memon

More information

Lip reading: Japanese vowel recognition by tracking temporal changes of lip shape

Lip reading: Japanese vowel recognition by tracking temporal changes of lip shape Lip reading: Japanese vowel recognition by tracking temporal changes of lip shape Koshi Odagiri 1, and Yoichi Muraoka 1 1 Graduate School of Fundamental/Computer Science and Engineering, Waseda University,

More information

Probabilistic Latent Semantic Analysis

Probabilistic Latent Semantic Analysis Probabilistic Latent Semantic Analysis Thomas Hofmann Presentation by Ioannis Pavlopoulos & Andreas Damianou for the course of Data Mining & Exploration 1 Outline Latent Semantic Analysis o Need o Overview

More information

Phonetic- and Speaker-Discriminant Features for Speaker Recognition. Research Project

Phonetic- and Speaker-Discriminant Features for Speaker Recognition. Research Project Phonetic- and Speaker-Discriminant Features for Speaker Recognition by Lara Stoll Research Project Submitted to the Department of Electrical Engineering and Computer Sciences, University of California

More information

A Reinforcement Learning Variant for Control Scheduling

A Reinforcement Learning Variant for Control Scheduling A Reinforcement Learning Variant for Control Scheduling Aloke Guha Honeywell Sensor and System Development Center 3660 Technology Drive Minneapolis MN 55417 Abstract We present an algorithm based on reinforcement

More information

WE GAVE A LAWYER BASIC MATH SKILLS, AND YOU WON T BELIEVE WHAT HAPPENED NEXT

WE GAVE A LAWYER BASIC MATH SKILLS, AND YOU WON T BELIEVE WHAT HAPPENED NEXT WE GAVE A LAWYER BASIC MATH SKILLS, AND YOU WON T BELIEVE WHAT HAPPENED NEXT PRACTICAL APPLICATIONS OF RANDOM SAMPLING IN ediscovery By Matthew Verga, J.D. INTRODUCTION Anyone who spends ample time working

More information

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur Module 12 Machine Learning 12.1 Instructional Objective The students should understand the concept of learning systems Students should learn about different aspects of a learning system Students should

More information

Analysis of Emotion Recognition System through Speech Signal Using KNN & GMM Classifier

Analysis of Emotion Recognition System through Speech Signal Using KNN & GMM Classifier IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 2, Ver.1 (Mar - Apr.2015), PP 55-61 www.iosrjournals.org Analysis of Emotion

More information

Robust Speech Recognition using DNN-HMM Acoustic Model Combining Noise-aware training with Spectral Subtraction

Robust Speech Recognition using DNN-HMM Acoustic Model Combining Noise-aware training with Spectral Subtraction INTERSPEECH 2015 Robust Speech Recognition using DNN-HMM Acoustic Model Combining Noise-aware training with Spectral Subtraction Akihiro Abe, Kazumasa Yamamoto, Seiichi Nakagawa Department of Computer

More information

School Size and the Quality of Teaching and Learning

School Size and the Quality of Teaching and Learning School Size and the Quality of Teaching and Learning An Analysis of Relationships between School Size and Assessments of Factors Related to the Quality of Teaching and Learning in Primary Schools Undertaken

More information

Data Integration through Clustering and Finding Statistical Relations - Validation of Approach

Data Integration through Clustering and Finding Statistical Relations - Validation of Approach Data Integration through Clustering and Finding Statistical Relations - Validation of Approach Marek Jaszuk, Teresa Mroczek, and Barbara Fryc University of Information Technology and Management, ul. Sucharskiego

More information

GROUP COMPOSITION IN THE NAVIGATION SIMULATOR A PILOT STUDY Magnus Boström (Kalmar Maritime Academy, Sweden)

GROUP COMPOSITION IN THE NAVIGATION SIMULATOR A PILOT STUDY Magnus Boström (Kalmar Maritime Academy, Sweden) GROUP COMPOSITION IN THE NAVIGATION SIMULATOR A PILOT STUDY Magnus Boström (Kalmar Maritime Academy, Sweden) magnus.bostrom@lnu.se ABSTRACT: At Kalmar Maritime Academy (KMA) the first-year students at

More information

Seminar - Organic Computing

Seminar - Organic Computing Seminar - Organic Computing Self-Organisation of OC-Systems Markus Franke 25.01.2006 Typeset by FoilTEX Timetable 1. Overview 2. Characteristics of SO-Systems 3. Concern with Nature 4. Design-Concepts

More information

International Journal of Computational Intelligence and Informatics, Vol. 1 : No. 4, January - March 2012

International Journal of Computational Intelligence and Informatics, Vol. 1 : No. 4, January - March 2012 Text-independent Mono and Cross-lingual Speaker Identification with the Constraint of Limited Data Nagaraja B G and H S Jayanna Department of Information Science and Engineering Siddaganga Institute of

More information

On the Combined Behavior of Autonomous Resource Management Agents

On the Combined Behavior of Autonomous Resource Management Agents On the Combined Behavior of Autonomous Resource Management Agents Siri Fagernes 1 and Alva L. Couch 2 1 Faculty of Engineering Oslo University College Oslo, Norway siri.fagernes@iu.hio.no 2 Computer Science

More information

Bootstrapping Personal Gesture Shortcuts with the Wisdom of the Crowd and Handwriting Recognition

Bootstrapping Personal Gesture Shortcuts with the Wisdom of the Crowd and Handwriting Recognition Bootstrapping Personal Gesture Shortcuts with the Wisdom of the Crowd and Handwriting Recognition Tom Y. Ouyang * MIT CSAIL ouyang@csail.mit.edu Yang Li Google Research yangli@acm.org ABSTRACT Personal

More information

Experiments with SMS Translation and Stochastic Gradient Descent in Spanish Text Author Profiling

Experiments with SMS Translation and Stochastic Gradient Descent in Spanish Text Author Profiling Experiments with SMS Translation and Stochastic Gradient Descent in Spanish Text Author Profiling Notebook for PAN at CLEF 2013 Andrés Alfonso Caurcel Díaz 1 and José María Gómez Hidalgo 2 1 Universidad

More information

A new Dataset of Telephone-Based Human-Human Call-Center Interaction with Emotional Evaluation

A new Dataset of Telephone-Based Human-Human Call-Center Interaction with Emotional Evaluation A new Dataset of Telephone-Based Human-Human Call-Center Interaction with Emotional Evaluation Ingo Siegert 1, Kerstin Ohnemus 2 1 Cognitive Systems Group, Institute for Information Technology and Communications

More information

Introduction to Causal Inference. Problem Set 1. Required Problems

Introduction to Causal Inference. Problem Set 1. Required Problems Introduction to Causal Inference Problem Set 1 Professor: Teppei Yamamoto Due Friday, July 15 (at beginning of class) Only the required problems are due on the above date. The optional problems will not

More information

Data Fusion Models in WSNs: Comparison and Analysis

Data Fusion Models in WSNs: Comparison and Analysis Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) Data Fusion s in WSNs: Comparison and Analysis Marwah M Almasri, and Khaled M Elleithy, Senior Member,

More information

Infrared Paper Dryer Control Scheme

Infrared Paper Dryer Control Scheme Infrared Paper Dryer Control Scheme INITIAL PROJECT SUMMARY 10/03/2005 DISTRIBUTED MEGAWATTS Carl Lee Blake Peck Rob Schaerer Jay Hudkins 1. Project Overview 1.1 Stake Holders Potlatch Corporation, Idaho

More information

THE PENNSYLVANIA STATE UNIVERSITY SCHREYER HONORS COLLEGE DEPARTMENT OF MATHEMATICS ASSESSING THE EFFECTIVENESS OF MULTIPLE CHOICE MATH TESTS

THE PENNSYLVANIA STATE UNIVERSITY SCHREYER HONORS COLLEGE DEPARTMENT OF MATHEMATICS ASSESSING THE EFFECTIVENESS OF MULTIPLE CHOICE MATH TESTS THE PENNSYLVANIA STATE UNIVERSITY SCHREYER HONORS COLLEGE DEPARTMENT OF MATHEMATICS ASSESSING THE EFFECTIVENESS OF MULTIPLE CHOICE MATH TESTS ELIZABETH ANNE SOMERS Spring 2011 A thesis submitted in partial

More information

Feature-oriented vs. Needs-oriented Product Access for Non-Expert Online Shoppers

Feature-oriented vs. Needs-oriented Product Access for Non-Expert Online Shoppers Feature-oriented vs. Needs-oriented Product Access for Non-Expert Online Shoppers Daniel Felix 1, Christoph Niederberger 1, Patrick Steiger 2 & Markus Stolze 3 1 ETH Zurich, Technoparkstrasse 1, CH-8005

More information

Improvements to the Pruning Behavior of DNN Acoustic Models

Improvements to the Pruning Behavior of DNN Acoustic Models Improvements to the Pruning Behavior of DNN Acoustic Models Matthias Paulik Apple Inc., Infinite Loop, Cupertino, CA 954 mpaulik@apple.com Abstract This paper examines two strategies that positively influence

More information

Generative models and adversarial training

Generative models and adversarial training Day 4 Lecture 1 Generative models and adversarial training Kevin McGuinness kevin.mcguinness@dcu.ie Research Fellow Insight Centre for Data Analytics Dublin City University What is a generative model?

More information

Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for

Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for Learning Optimal Dialogue Strategies: A Case Study of a Spoken Dialogue Agent for Email Marilyn A. Walker Jeanne C. Fromer Shrikanth Narayanan walker@research.att.com jeannie@ai.mit.edu shri@research.att.com

More information

Artificial Neural Networks written examination

Artificial Neural Networks written examination 1 (8) Institutionen för informationsteknologi Olle Gällmo Universitetsadjunkt Adress: Lägerhyddsvägen 2 Box 337 751 05 Uppsala Artificial Neural Networks written examination Monday, May 15, 2006 9 00-14

More information

Lecture Notes in Artificial Intelligence 4343

Lecture Notes in Artificial Intelligence 4343 Lecture Notes in Artificial Intelligence 4343 Edited by J. G. Carbonell and J. Siekmann Subseries of Lecture Notes in Computer Science Christian Müller (Ed.) Speaker Classification I Fundamentals, Features,

More information

On-Line Data Analytics

On-Line Data Analytics International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] On-Line Data Analytics Yugandhar Vemulapalli #, Devarapalli Raghu *, Raja Jacob

More information

Rule Learning with Negation: Issues Regarding Effectiveness

Rule Learning with Negation: Issues Regarding Effectiveness Rule Learning with Negation: Issues Regarding Effectiveness Stephanie Chua, Frans Coenen, and Grant Malcolm University of Liverpool Department of Computer Science, Ashton Building, Ashton Street, L69 3BX

More information

University of Groningen. Systemen, planning, netwerken Bosman, Aart

University of Groningen. Systemen, planning, netwerken Bosman, Aart University of Groningen Systemen, planning, netwerken Bosman, Aart IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document

More information

A Comparison of Two Text Representations for Sentiment Analysis

A Comparison of Two Text Representations for Sentiment Analysis 010 International Conference on Computer Application and System Modeling (ICCASM 010) A Comparison of Two Text Representations for Sentiment Analysis Jianxiong Wang School of Computer Science & Educational

More information

Conversation Starters: Using Spatial Context to Initiate Dialogue in First Person Perspective Games

Conversation Starters: Using Spatial Context to Initiate Dialogue in First Person Perspective Games Conversation Starters: Using Spatial Context to Initiate Dialogue in First Person Perspective Games David B. Christian, Mark O. Riedl and R. Michael Young Liquid Narrative Group Computer Science Department

More information

have to be modeled) or isolated words. Output of the system is a grapheme-tophoneme conversion system which takes as its input the spelling of words,

have to be modeled) or isolated words. Output of the system is a grapheme-tophoneme conversion system which takes as its input the spelling of words, A Language-Independent, Data-Oriented Architecture for Grapheme-to-Phoneme Conversion Walter Daelemans and Antal van den Bosch Proceedings ESCA-IEEE speech synthesis conference, New York, September 1994

More information

Probability and Statistics Curriculum Pacing Guide

Probability and Statistics Curriculum Pacing Guide Unit 1 Terms PS.SPMJ.3 PS.SPMJ.5 Plan and conduct a survey to answer a statistical question. Recognize how the plan addresses sampling technique, randomization, measurement of experimental error and methods

More information

Language Acquisition Fall 2010/Winter Lexical Categories. Afra Alishahi, Heiner Drenhaus

Language Acquisition Fall 2010/Winter Lexical Categories. Afra Alishahi, Heiner Drenhaus Language Acquisition Fall 2010/Winter 2011 Lexical Categories Afra Alishahi, Heiner Drenhaus Computational Linguistics and Phonetics Saarland University Children s Sensitivity to Lexical Categories Look,

More information

A Comparison of Standard and Interval Association Rules

A Comparison of Standard and Interval Association Rules A Comparison of Standard and Association Rules Choh Man Teng cmteng@ai.uwf.edu Institute for Human and Machine Cognition University of West Florida 4 South Alcaniz Street, Pensacola FL 325, USA Abstract

More information

What s in a Step? Toward General, Abstract Representations of Tutoring System Log Data

What s in a Step? Toward General, Abstract Representations of Tutoring System Log Data What s in a Step? Toward General, Abstract Representations of Tutoring System Log Data Kurt VanLehn 1, Kenneth R. Koedinger 2, Alida Skogsholm 2, Adaeze Nwaigwe 2, Robert G.M. Hausmann 1, Anders Weinstein

More information

Comparison of EM and Two-Step Cluster Method for Mixed Data: An Application

Comparison of EM and Two-Step Cluster Method for Mixed Data: An Application International Journal of Medical Science and Clinical Inventions 4(3): 2768-2773, 2017 DOI:10.18535/ijmsci/ v4i3.8 ICV 2015: 52.82 e-issn: 2348-991X, p-issn: 2454-9576 2017, IJMSCI Research Article Comparison

More information

Course Outline. Course Grading. Where to go for help. Academic Integrity. EE-589 Introduction to Neural Networks NN 1 EE

Course Outline. Course Grading. Where to go for help. Academic Integrity. EE-589 Introduction to Neural Networks NN 1 EE EE-589 Introduction to Neural Assistant Prof. Dr. Turgay IBRIKCI Room # 305 (322) 338 6868 / 139 Wensdays 9:00-12:00 Course Outline The course is divided in two parts: theory and practice. 1. Theory covers

More information