Client-Specific Anomaly Detection for Face Presentation Attack Detection

Total Page:16

File Type:pdf, Size:1020Kb

Client-Specific Anomaly Detection for Face Presentation Attack Detection ARTICLE IN PRESS JID: PR [m5G; October 29, 2020;4:10 ] Pattern Recognition xxx (xxxx) xxx Contents lists available at ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/patcog Client-specific anomaly detec tion for face presentation attack R detection ∗ Soroush Fatemifar a, , Shervin Rahimzadeh Arashloo b, Muhammad Awais a, Josef Kittler a a Centre for Vision, Speech and Signal Processing, University of Surrey, Guildford, UK b Department of Computer Engineering, Bilkent University, Ankara, Turkey a r t i c l e i n f o a b s t r a c t Article history: One-class anomaly detection approaches are particularly appealing for use in face presentation attack Received 13 December 2019 detection (PAD), especially in an unseen attack scenario, where the system is exposed to novel types of Revised 23 September 2020 attacks. This work builds upon an anomaly-based formulation of the problem and analyses the merits Accepted 7 October 2020 of deploying client-specific information for face spoofing detection. We propose training one-class client- Available online xxx specific classifiers (both generative and discriminative) using representations obtained from pre-trained Keywords: deep Convolutional Neural Networks (CNN). In order to incorporate client-specific information, a distinct Anomaly detection threshold is set for each client based on subject-specific score distributions, which is then used for de- Biometrics cision making at the test time. Through extensive experiments using different one-class systems, it is Client-specific information shown that the use of client-specific information in a one-class anomaly detection formulation (both in Deep convolutional neural networks model construction as well as decision boundary selection) improves the performance significantly. We Face spoofing detection also show that anomaly-based solutions have the capacity to perform as well or better than two-class approaches in the unseen attack scenarios. Moreover, it is shown that CNN features obtained from mod- els trained for face recognition appear to discard discriminative traits for spoofing detection and are less capable for PAD compared to the CNNs trained for a generic object recognition task. ©2020 Elsevier Ltd. All rights reserved. 1. Introduction owes to two factors: i) the design and deployment of more effec- tive representations which can better capture the differences be- Biometrics is concerned with the recognition or matching of in- tween real and fake biometrics traits, and ii) using more powerful dividuals based on one or more biometric traits, such as face im- two-class classifiers. age, fingerprint or voice [1] . Although biometrics systems have wit- The majority of the approaches to face spoofing detection pro- nessed an increase in their popularity in the past decades, their re- posed in the literature formulate the problem as a two-class pat- liability is seriously challenged by spoofing attacks where an unau- tern recognition problem. These approaches try to learn a suitable thorised subject tries to access the system by presenting fake bio- classifier to discriminate between the real-accesses and spoofing metric data. To protect a biometric system, any spoofing attacks attempts. Despite the huge advances made in this direction, the ex- need to be detected reliably. This requires the ability to distinguish isting face PAD methods do not reliably generalise to more realistic genuine biometric system accesses from spoofing accesses, which application scenarios of unseen presentation attacks [2] . They tend is again a pattern recognition problem. to deliver degraded performance, when the type of presentation In the case of face recognition systems, to which we confine attack cannot be anticipated and may take a completely new form. our discussion in this paper, spoofing attacks generally appear as The challenges of the common two-class formulation include [3] : print attacks, replay attacks and 3D masks. During the past cou- (a) Learning an effective decision boundary due to the multi-modal ple of years, a variety of different face Presentation Attack Detec- nature of spoofing attack data [2] (b) Difficulties in increasing the tion (PAD) approaches have been proposed, achieving impressive size of the training set, as the generation of attack data is quite de- performance on benchmarking datasets. The progress made mainly manding and the data is complex to collect [4] . At the same time, it cannot cover all possible unforeseen attacks. Moreover, an in- crease solely in the real-access data would result in a progressively R This work was supported in part by the EPSRC Programme Grant ( FACER2VM ) deteriorating training set imbalance [2] (c) A limited ability of the EP/N007743/1 and the EPSRC/dstl/MURI project EP/R018456/1. two-class systems to generalise to novel attack types [5] . Different ∗ Corresponding author. approaches have been proposed in the literature to counteract one E-mail address: [email protected] (S. Fatemifar). https://doi.org/10.1016/j.patcog.2020.107696 0031-3203/© 2020 Elsevier Ltd. All rights reserved. Please cite this article as: S. Fatemifar, S.R. Arashloo, M. Awais et al., Client-specific anomaly detection for face presentation attack detection, Pattern Recognition, https://doi.org/10.1016/j.patcog.2020.107696 ARTICLE IN PRESS JID: PR [m5G; October 29, 2020;4:10 ] S. Fatemifar, S.R. Arashloo, M. Awais et al. Pattern Recognition xxx (xxxx) xxx or more of these shortcomings with various degrees of success. To by a large margin. Motivated by the aforementioned observations, partly compensate for some of the aforementioned inadequacies, it will also be shown that both types of generative and discrim- among others, the work in Arashloo et al. [3] formulated the face inative anomaly-based approaches to face spoofing detection can PAD as an anomaly detection problem, where the real-access data benefit from client identity information to improve performance. was considered as normal and the attack-accesses were presumed Second, inspired by the recent success of deep neural networks to be anomalous observations deviating from normality. The desir- and in particular deep convolutional neural networks (CNNs) able properties of the one-class anomaly detection formulation in- [16,17] , the proposed one-class approaches are fed with represen- clude: (a) Insulation from the undesirable effects of the spoofing tations obtained from deep pre-trained CNN models. The models data diversity on the performance, as only normal data is used to employed are either pre-trained for the general object classification build the model [2] (b) Since only real-access data is required for purposes or specifically tuned for face recognition. In this respect, training, the training set can be extended more easily. a further contribution of the current study is a comparative eval- The capacity of one-class systems to detect previously unseen uation of the applicability of different deep CNN models designed novel attacks is measured in Arashloo et al. [3] using an extensive for recognition purposes to the problem of face spoofing detection evaluation on different datasets in a novel attack evaluation sce- based on the one-class face PAD formulation. One of these CNN nario. The work in Nikisins et al. [6] followed a similar one-class models is trained for face recognition and our aim is to establish face PAD approach using a Gaussian mixture model based anomaly whether the extracted features perform as well as features pro- detector, exhibiting good generalisation properties for novel types duced by deep networks trained for the task of general visual ob- of attacks. Motivated by these observations and the desirable prop- ject recognition. In the affirmative, one could use the same features erties of the one-class formulation in the face spoofing detec- for recognition and spoofing detection, which would be very inter- tion [7] , the current study also follows the one-class anomaly- esting from the point of view of practical significance as it would based approach with distinctive contributions outlined in the next simplify the design of face biometrics systems. Besides, to provide subsection. a better analysis and a greater insight regarding traditional feature extraction mechanism, we perform experiments using traditional 1.1. Contributions features to compare with CNNs. Third, we evaluate the performance of our proposed model An aspect of classifier design which has been unexplored on benchmarking anti-spoofing datasets including Replay-Attack in Arashloo et al. [3] , Nikisins et al. [6] is the use of client-specific [18] and Replay-Mobile [19] to allow fair comparisons with the information. Although in any spoofing detection system the rep- state of the art. The client-specific variant of the anomaly detec- resentations used are selected in a way that they capture the in- tion solution requires a new protocol for evaluation that we intro- trinsic differences between real-accesses and spoofing attempts, duce to set up the experiments on the new and more challenging such an approach does not rule out the possibility that the fea- face spoofing dataset, ROSE-Youtu [20] , covering a diverse variety tures used can be affected by the specific characteristics of each of illumination conditions, image acquisition devices, and spoofing client [8] . From this perspective, the majority of the work on face attacks. We made the code publicly available for the benefit of re- spoofing detection, including [3,6,9,10] , can be considered as client- search community. 1 independent approaches. A client-independent face PAD approach assumes that the relevant information comes from either a real- 2. Related work access or the attack class, whereas a client-specific method as- sumes that the constructed representations are additionally influ- Print attack detection methods assume that, in contrast with enced by the identities of the subjects. In [8] , it is shown that genuine accesses, spoofing data exhibits abnormalities that ren- the client identity information can be deployed to devise two- der the observations distinguishable from the authentic counter- class classifiers which can achieve better discrimination between parts.
Recommended publications
  • Puck.Js Realvnc and Raspberry Pi Research Skills
    The RingTHE JOURNAL OF T HE CAMBRIDGE COMPU T ER LAB RING Issue XLIV— January 2017 Who’s who 6 Puck.js 2 Another Kickstarter success for Hall of Fame news 8 Espruino Computer Laboratory news 11 RealVNC and Raspberry Pi 5 A shared passion Research Skills 9 Programming matter www.cl.cam.ac.uk/ring 2 HALL OF FAME PROFILE Puck.js Gordon Williams started the Espruino project in 2012. Puck.js is the third successful Espruino Kickstarter and, since Christmas, over 20,000 devices have been shipped worldwide. First it was Espruino, the first Java Script microcontroller. Then came However there are many other uses for beacons such as coarse Espruino Pico which allows you to control electronics quickly and positioning (of a user relative to beacons, or of beacons relative to easily with a tiny USB stick that runs JavaScript. Gordon Williams’s receivers). Their low price (sometimes less than $5 each, including latest Kickstarter project is Puck.js, an open source JavaScript micro- case and battery), makes them extremely attractive. controller that you can program wirelessly. TR: Puck.js is a Bluetooth low energy (BLE) beacon. What is special about it? TR: Can you explain what Bluetooth LE is, and why it’s interesting? GW: Puck.js can be a BLE beacon, but it’s a lot more than that. It GW: Bluetooth LE (Bluetooth Low Energy or Bluetooth Smart) is contains a button, temperature and light sensors, a magnetometer, IR a 2.4Ghz radio standard originally created by Nokia. Unlike normal transmitter, and a full Bluetooth LE implementation (both a master Bluetooth it’s designed for low power and cost rather than high band- and slave) along with the Espruino JavaScript interpreter (software width.
    [Show full text]
  • A Multimodal Biometric Test Bed for Quality-Dependent, Cost-Sensitive and Client-Specific Score-Level Fusion Algorithms
    ARTICLE IN PRESS Pattern Recognition 43 (2010) 1094–1105 Contents lists available at ScienceDirect Pattern Recognition journal homepage: www.elsevier.de/locate/pr A multimodal biometric test bed for quality-dependent, cost-sensitive and client-specific score-level fusion algorithms Norman Poh a,Ã, Thirimachos Bourlai b, Josef Kittler a a CVSSP, FEPS, University of Surrey, Guildford, Surrey, GU2 7XH, UK b Biometric Center, West Virginia University, Morgantown, WV 26506-6109, USA article info abstract Article history: This paper presents a test bed, called the Biosecure DS2 score-and-quality database, for evaluating, Received 11 October 2008 comparing and benchmarking score-level fusion algorithms for multimodal biometric authentication. It Received in revised form is designed to benchmark quality-dependent, client-specific, cost-sensitive fusion algorithms. A quality- 3 September 2009 dependent fusion algorithm is one which attempts to devise a fusion strategy that is dependent on the Accepted 8 September 2009 biometric sample quality. A client-specific fusion algorithm, on the other hand, exploits the specific score characteristics of each enrolled user in order to customize the fusion strategy. Finally, a cost- Keywords: sensitive fusion algorithm attempts to select a subset of biometric modalities/systems (at a specified Multimodal biometric authentication cost) in order to obtain the maximal generalization performance. To the best of our knowledge, the Benchmark BioSecure DS2 data set is the first one designed to benchmark the above three aspects of fusion Database algorithms. This paper contains some baseline experimental results for evaluating the above three types Fusion of fusion scenarios. & 2009 Elsevier Ltd. All rights reserved.
    [Show full text]
  • Weighing International Academic Awards
    1896 1920 1987 2006 Weighing International Academic Awards Center for World-Class Universities Shanghai Jiao Tong University Shanghai, China January 20, 2015 Outline Introduction Methodology Results Introduction Backgrounds • Awards are prevalent in all societies and at all times as societal symbols of recognition. Even in the rational academic world, there is an elaborate and extensive system of awards. (Frey, 2006) • Numerous academic awards have been established to provide incentives and motivation for new academic work and to reward for past excellent academic accomplishment to individuals. Introduction Backgrounds • Academic awards, especially prestigious international academic awards, have played important roles in seeking excellence by assessing and ranking academic institutions, such as Shanghai Ranking, U.S. National Research Council (NRC)’s Assessment of Research-Doctorate Programs. • However, little is known about the reputations of academic awards. Introduction Research purposes • To establish a comprehensive and balanced list of international academic awards. • To weigh their relative reputations in relation to one another. Introduction International academic awards • Awards are granted to individuals who have made highly recognized academic contribution. • Awards are granted without restrictions on nationality, and generally regardless of race, gender, age, religion, ethnicity, disability, language, or political affiliation. • Awards included can generally be regarded as research awards. Some types of awards not included
    [Show full text]
  • Opinion Opinion
    OPINION OPINION OPINION ENGINEERING SKILLS Building a world that is fairer, more just, and will help us better meet the Sustainable Development Goals is TO BETTER MEET something that we need a diverse engineering workforce to take on board SOCIETY’S NEEDS example, is more likely to have the desired such as the apparently uncontroversial engineers who are increasingly setting the result. Tackling the climate emergency, specification of a ducting material in a new agendas for a different and more sustainable accessible healthcare and the environment building, a decision usually made without way of living, as well as reimagining a world are big motivations for young people, any knowledge or reference to how this that pays equal attention to economic, especially when the challenge is to increase choice of material might negatively and social and environmental impact to create diversity and attract students from groups disproportionately affect those who bear the solutions with social value, and who are able that are under-represented in engineering. brunt of toxic chemical production. to communicate these ideas effectively. So, it’s to our advantage to present Many of us are becoming more aware Engineering and technology courses From climate change to the COVID-19 pandemic, the UK – and indeed the world – is engineering as a ‘caring’ or ‘social good’ of how the outcomes of our engineering require more industrial input, more dealing with some of the most complex challenges it has ever faced. Engineers have profession, one directly associated with endeavours have implications for social knowledge of social science, and real solving problems and making people’s lives justice.
    [Show full text]
  • The Edition a Review of 2016 Contents It Is That Combination of Fun, Friendliness and Purpose That Makes St Ed’S Such a the Update Special Place
    The Edition A Review of 2016 Contents It is that combination of fun, friendliness and purpose that makes St Ed’s such a The Update special place. From the Master 2 From the Dean 4 From the Senior Tutor 5 From the Bursar 6 From the Development Office 7 Students News Academic Success 11 From the CR 12 Research Students’ Conference 14 Sports News 16 From the Master Fellows From the Von Hügel Institute 19 “A torrent” is probably the best way Fellows News 22 to describe the onset of the new New Fellows 24 academic year at St Ed’s. Nothing really prepares you for 1 October. Alumni On that day, over 260 new students Alumni News 29 – more than half the student body – Alumni Events 34 arrive from over 74 countries to start their studies at Cambridge. In a hectic two weeks we have to brief them, house them, badge them, photograph From the Faraday Institue 37 them, matriculate them, organise their A tribute to Sue Lowdell 38 supervisions, and get them off to lectures. The tutorial office, the CR and the College staff are at the forefront of coping with this deluge, but the energy that the new students bring washes through the entire College and invigorates everyone. It is a thrilling start to every year. As the floodwaters calm, more familiar features of the College re-emerge: the routines of tea trolley, hall, chapel, supervisions, graduation ceremonies, council, and governing body reassert themselves and remind us that there is an underlying order. One person who has played a signal role in establishing this order is Sue Lowdell, who worked in the Master’s office for 14 years.
    [Show full text]
  • Pearson Codes Arxiv:1509.00291V2 [Cs.IT] 29 Sep 2015
    Pearson Codes Jos H. Weber∗ Kees A. Schouhamer Imminky and Simon R. Blackburnz February 26, 2018 Abstract The Pearson distance has been advocated for improving the error performance of noisy channels with unknown gain and off- set. The Pearson distance can only fruitfully be used for sets of q-ary codewords, called Pearson codes, that satisfy specific prop- erties. We will analyze constructions and properties of optimal Pearson codes. We will compare the redundancy of optimal Pear- son codes with the redundancy of prior art T -constrained codes, which consist of q-ary sequences in which T pre-determined refer- ence symbols appear at least once. In particular, it will be shown that for q ≤ 3 the 2-constrained codes are optimal Pearson codes, while for q ≥ 4 these codes are not optimal. Key words: flash memory, digital optical recording, Non- Volatile Memory, NVM, Pearson distance. arXiv:1509.00291v2 [cs.IT] 29 Sep 2015 ∗Jos H. Weber is with Delft University of Technology, Delft, The Netherlands. E-mail: [email protected]. yKees A. Schouhamer Immink is with Turing Machines Inc, Willemskade 15b-d, 3016 DK Rotterdam, The Netherlands. E-mail: [email protected]. zSimon R. Blackburn is with the Department of Mathematics, Royal Holloway University of London, Egham, Surrey TW20 0EX, United Kingdom. E-mail: [email protected] 1 1 Introduction In non-volatile memories, such as floating gate memories, the data is represented by stored charge, which can leak away from the floating gate. This leakage may result in a shift of the offset or threshold voltage of the memory cell.
    [Show full text]
  • A User-Specific and Selective Multimodal Biometric Fusion Strategy by Ranking Subjects
    Pattern Recognition 46 (2013) 3341–3357 Contents lists available at SciVerse ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/pr A user-specific and selective multimodal biometric fusion strategy by ranking subjects Norman Poh a,n, Arun Ross b, Weifeng Lee c, Josef Kittler d a Department of Computing, University of Surrey GU2 7XH, UK b West Virginia University, Morgantown, WV 26506, USA c Shenzhen Key Lab. of Information Sci&Tech/Shenzhen Engineering Lab. of IS&DRM, Department of Electronic Engineering/Graduate School at Shenzhen, Tsinghua University, China d Centre for Vision, Speech and Signal Processing (CVSSP), FEPS, University of Surrey GU2 7XH, UK article info abstract Article history: The recognition performance of a biometric system varies significantly from one enrolled user to another. Received 5 October 2012 As a result, there is a need to tailor the system to each user. This study investigates a relatively new fusion Received in revised form strategy that is both user-specific and selective. By user-specific, we understand that each user in a 28 February 2013 biometric system has a different set of fusion parameters that have been tuned specifically to a given Accepted 22 March 2013 enrolled user. By selective, we mean that only a subset of modalities may be chosen for fusion. The Available online 6 April 2013 rationale for this is that if one biometric modality is sufficiently good to recognize a user, fusion by Keywords: multimodal biometrics would not be necessary, we advance the state of the art in
    [Show full text]
  • School of Chemical Engineering and Analytical Sciences Catalytic Research Prof
    Faculty of Sciences and Engineering Faculty of Engineering and Physical Sciences School of Chemical Engineering and Analytical Sciences Catalytic Research Prof. Chris Hardacre School of Chemical Engineering and Analytical Science [email protected] Chris Hardacre is Head of the School of Chemical Engineering and Analytical Science and Professor of Chemical Engineering, with research interests in heterogeneous catalysis, in-situ method development and ionic liquids. He has 350+ publications with an H-index of 65 and over 15,000 citations. He is a Member of the Royal Irish Academy, Fellow of the Institute of Chemical Engineering and Fellow of Royal Society of Chemistry. He has a number of awards including the inaugural Andrew Medal for catalysis and has won ~£28M research grant over the past 20 years. We are a world-leading research group working on heterogeneous catalysis and ionic liquids. We have developed a number of state-of-the-art techniques for in- situ monitoring of the systems studied and have strong links with industry. We target applications in energy, bulk, fine and pharmaceutical chemical synthesis as well as environmental protection: •Non-thermal plasma catalysis. ACS Catal., 2015, 5 956; 2014, 4, 666; •Neutron and X-ray scattering studies of catalysts and ionic liquids, Chem. Sci., 2013, 4, 3484; 2013, 4, 1270; 2011, 2, 1594; •Activating gold catalysts. ACS Catal., 2012, 2, 552; Angew. Chem. Int. Ed., 2011, 50, 8912; JACS, 2009, 131, 6973; •Electrochemical reduction of CO2. Angew. Chem. Int. Ed., 2015, 54, 14164.(Hot
    [Show full text]
  • Ingenia 86 March Text Pages Aw.Indd
    INGENIA CONTENTS SOCIETY UP FRONT LESSONS FROM THE FIELD 22 EDITORIAL 3 Engineers discuss the impact that working in other The future has begun countries has had on their career paths and outlooks. Scott Steedman CBE FREng Abigail Beall IN BRIEF 4 SUSTAINABILITY LED lighting creators win 2021 Queen Elizabeth Prize 27 for Engineering LIFE AFTER LANDFILLS Movie-inspired drones help Network Rail Around 45% of UK waste is recycled. The waste that can’t Third of UK spinouts from four universities be recycled or reused goes to landfill, where it is starting to Education resources for remote learning contribute to the circular economy. Get involved in engineering Dominic Joyeux HOW I GOT HERE 8 SOCIETY Felicity Milton, mechanical engineer and Senior Manager, ALL HANDS TO THE PUMPS 32 Strategy and Innovation at adidas, talks about the future The UK’s engineering industry collaborated to rapidly of trainers. create over 13,000 ventilators for the NHS in just 12 weeks. OPINION 10 Michael Kenward OBE Engineering skills to better meet society’s needs Dawn Bonfield MBE and Professor Bashir Al-Hashimi CBE FREng PROFILE Facing engineering’s ultimate challenge 38 Dr Luisa Freitas dos Santos FREng is Vice President, FEATURES R&D Global Clinical Supply Chain, at GSK. Throughout the COVID-19 pandemic she has maintained a steady INNOVATION supply of medicines while pursuing new therapies. THE MAYFLOWER SAILS AGAIN 12 Michael Kenward OBE A fully autonomous vessel is sailing from Plymouth to the US, gathering data about plastic pollution, global warming and INNOVATION WATCH 43 marine life. From food waste to fashion Neil Cumins Chip[s] Board is creating biodegradable plastic from potato waste.
    [Show full text]
  • Edinburgh Research Explorer
    Edinburgh Research Explorer Standardization of the Ohm as a Unit of Electrical Resistance, 1861-1867 Citation for published version: Grant, P & Thompson, J 2019, 'Standardization of the Ohm as a Unit of Electrical Resistance, 1861-1867', Proceedings of the IEEE, vol. 107, no. 11, pp. 1-22. https://doi.org/10.1109/JPROC.2019.2945495 Digital Object Identifier (DOI): 10.1109/JPROC.2019.2945495 Link: Link to publication record in Edinburgh Research Explorer Document Version: Peer reviewed version Published In: Proceedings of the IEEE General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The University of Edinburgh has made every reasonable effort to ensure that Edinburgh Research Explorer content complies with UK legislation. If you believe that the public display of this file breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 02. Jan. 2020 Standardization of the Ohm as a Unit of Electrical Resistance, 1861-1867 Peter M. Grant†Ѱ LFIEE and John S. Thompson† FIEEE † School of Engineering, University of Edinburgh, Edinburgh, EH9 3FG Ѱ Trustee of James Clerk Maxwell Foundation, 14 India Street, Edinburgh, EH3 6EZ Abstract This discusses the historical developments that led to the standardisation of the Ohm. Following developments in early electrical telegraphy systems, particularly those involving undersea cable international communication, the British Association (BA) set up a committee in 1861 to propose electrical units of resistance, which were ultimately based on the metric system.
    [Show full text]
  • Standardization of the Ohm As a Unit of Electrical Resistance
    Edinburgh Research Explorer Standardization of the Ohm as a Unit of Electrical Resistance, 1861-1867 Citation for published version: Grant, P & Thompson, J 2019, 'Standardization of the Ohm as a Unit of Electrical Resistance, 1861-1867', Proceedings of the IEEE, vol. 107, no. 11, pp. 1-22. https://doi.org/10.1109/JPROC.2019.2945495 Digital Object Identifier (DOI): 10.1109/JPROC.2019.2945495 Link: Link to publication record in Edinburgh Research Explorer Document Version: Peer reviewed version Published In: Proceedings of the IEEE General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The University of Edinburgh has made every reasonable effort to ensure that Edinburgh Research Explorer content complies with UK legislation. If you believe that the public display of this file breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 08. Oct. 2021 Standardization of the Ohm as a Unit of Electrical Resistance, 1861-1867 Peter M. Grant†Ѱ LFIEE and John S. Thompson† FIEEE † School of Engineering, University of Edinburgh, Edinburgh, EH9 3FG Ѱ Trustee of James Clerk Maxwell Foundation, 14 India Street, Edinburgh, EH3 6EZ Abstract This discusses the historical developments that led to the standardisation of the Ohm. Following developments in early electrical telegraphy systems, particularly those involving undersea cable international communication, the British Association (BA) set up a committee in 1861 to propose electrical units of resistance, which were ultimately based on the metric system.
    [Show full text]
  • Heriot-Watt University
    HERIOT-WATT UNIVERSITY LAUREATION P ROFESSOR S IR J OHN V INCENT M C C ANNY CBE, FRS, FRE NG B Y P ROFESSOR S TEVE M CLA U GHLIN • T U ES DAY 18 J U NE 2019 Chancellor, I have the honour to present for the Honorary Degree of Doctor of Engineering, Professor Sir John Vincent McCanny. Heriot-Watt is world famous for its research in Digital Signal Processing, the application of mathematics to manipulate signals that underpins all modern communication and entertainment devices. John is known for his research on advanced silicon processor architectures for digital signal and video processing and cryptography and is internationally recognised for his contributions to innovation, research translation and entrepreneurship. I would also like to welcome his wife Maureen and daughter Kathryn to the ceremony today. John received a BSc from the University of Manchester in 1973, a PhD in Physics from the University of Ulster in 1978, and a DSc in Electrical and Electronics Engineering from Queens University in Belfast. John recently retired and is now the Regius Professor Emeritus in Electronics and Computer Engineering at Queens University Belfast. John has made major contributions to both academic life and the technology industry. His contributions have been recognised by winning medals from learned societies and institutions in both the UK and Ireland. He is recognised as a leader by his peers in the Institute of Electrical and Electronic Engineers (IEEE), the Irish Academy of Engineering, the Institution of Engineering and Technology (IET), the Institute of Physics and Engineers Ireland. He has received from the Royal Academy of Engineering the Silver Medal, the IET Faraday Medal, the Royal Irish Academy’s Cunningham Medal and the Irish Academy of Engineering’s Parson Medal.
    [Show full text]