Unveiling Identity Through Anatomy: Person Verification Using Vision Transformers on Chest X-Rays Radiographs
Main Article Content
Abstract
Context: The prospective utilization of medical imaging data for reliable individual identification and authentication has garnered significant interest in both security and healthcare sectors. This importance is particularly amplified during disaster scenarios, where conventional means of human verification become ineffective. In these challenging conditions, Chest X-rays serve as an essential resource by capturing unique anatomical details of the rib cage, lungs, and heart features that persist as reliable verification even when the body is compromised. Objective: We propose the creation of an innovative verification system for image retrieval, specifically designed to enhance person verification using chest X-ray images. Method: The system integrates a deep learning paradigm, leveraging Triplet network architecture; while uniquely use cosine similarity as a metric to assess similarity and dissimilarity between image features. Such an approach enables a more nuanced and robust feature comparison, leading to improved retrieval accuracy and verification performance. Building upon this premise, we propose the creation of an innovative verification system for image retrieval. Notably, our framework employs a state-of-the-art Vision Transformer (ViT) as the backbone for the Triplet network. Results: The ViT backbone offers robust capabilities in extracting and contextualizing features, thereby enhancing the discriminative power of the triplet architecture and ensuring improved retrieval accuracy. This novel integration not only expands the existing toolkit for medical image analysis but also reinforces the reliability of identity verification systems. Conclusions: The dual use of geometric and angular similarity measures, coupled with the advanced feature extraction of the ViT, offers a precise and dependable solution, particularly in high-stakes scenarios such as emergencies and security-critical applications.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
Articles published in SyCom are open access and distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0).
How to Cite
References
[1] J. Morishita, Y. Ueda, “New solutions for automated image recognition and identification: challenges to radiologic technology and forensic pathology”. Radiological physics and technology, 14(2), 123-133, 2021.
[2] P. A. Thomas, K. Preetha Mathew, “A broad review on non-intrusive active user authentication in biometrics”, Journal of Ambient Intelligence and Humanized Computing, 14(1), 339-360, 2023.
[3] M. Sato, Y. Kondo, M. Okamoto, N. Takahashi, “Development of individual identification method using thoracic vertebral features as biometric fingerprints”. Scientific Reports, 12(1), 16274, 2022.
[4] K. Packhäuser, L. Folle, F. Thamm, A. Maier, “Generation of anonymous chest radiographs using latent diffusion models for training thoracic abnormality classification systems”. In 2023 IEEE 20th International Symposium on Biomedical Imaging (ISBI) (pp. 1-5). IEEE.
[5] R. Toge, J. Morishita, Y. Sasaki, K. Doi, “Computerized image-searching method for finding correct patients for misfiled chest radiographs in a PACS server by use of biological fingerprints”. Radiological physics and technology, 6, 437-443, 2013.
[6] J. Morishita, Y. Ueda, “New solutions for automated image recognition and identification: challenges to radiologic technology and forensic pathology”. Radiological physics and technology, 14(2), 123-133, 2021.
[7] A. Le-Phan, X. P. P. Nguyen, N. Ly-Tu, “Training Siamese Neural Network Using Triplet Loss with Augmented Facial Alignment Dataset”. In 2022 9th NAFOSTED Conference on Information and Computer Science (NICS) (pp. 281-286). IEEE.
[8] H. Wang, A. Singhal, P. Liu, “Tackling imbalanced data in cybersecurity with transfer learning: A case with ROP payload detection”. Cybersecurity 6, 2 (2023). https://doi.org/10.1186/s42400-022-00135-8.
[9] A. Bennour, C. Djeddi, A. Gattal, I. Siddiqi, T. Mekhaznia, “Handwriting based writer recognition using implicit shape codebook”. Forensic science international, 301, 91-100, 2019.
[10] A. Bennour, “Automatic handwriting analysis for writer identification and verification”. In Proceedings of the 7th International Conference on Software Engineering and New Technologies (pp. 1-7), 2018.
[11] D. Samai, A. Meraoumia, H. Bendjenna, L. Laimeche, “Oriented Local Binary Pattern (LBP θ): A new scheme for an efficient feature extraction technique”. In 2017 International Conference on Mathematics and Information Technology (ICMIT) (pp. 155-161). IEEE.
[12] A. Meraoumia, H. Bendjenna, M. Amroune, Y. Dris, “Towards a secure online E-voting protocol based on palmprint features”. In 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS) (pp. 1-6). IEEE.
[13] A. Meraoumia, S. Chitroub, A. Bouridane, “Fusion of multispectral palmprint images for automatic person identification”. In 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC) (pp. 1-6). IEEE.
[14] A. Bennour, M. Boudraa, I. Siddiqi, M. Al-Sarem, M. Al-Shaby, F. Ghabban, “A deep learning framework for historical manuscripts writer identification using data-driven features”. Multimedia Tools and Applications, 83, 80103 (2024). https://doi.org/10.1007/s11042-024-18856-y.
[15] G. I. Raho, M. S. Al-Ani, A. A. K. Al-Alosi, L. A. Mohammed, “Signature recognition using discrete fourier transform”. International Journal of Business and ICT, 1(1-2), 17-26, 2015.
[16] S. Agduk, ,E. Aydemir, “Classification of Handwritten Text Signatures by Person and Gender: A Comparative Study of Transfer Learning Methods”. Acta Informatica Pragensia, 11(3), 324-347. 2022. doi: 10.18267/j.aip.197
[17] F. Hazem, B. Akram, T. Mekhaznia, F. Ghabban, A. Alsaeedi, B. Goyal, “Beyond Traditional Biometrics: Harnessing Chest X-Ray Features for Robust Person Identification”. Acta Informatica Pragensia, 13(2), 234-250, 2024. doi: 10.18267/j.aip.238
[18] F. Hazem, B. Akram, T. Mekhaznia, M. Al-Sarem, P. K. Shukla, O. I. Khalaf, “X-Ray Insights: A Siamese with CNN and Spatial Attention Network for Innovative Person Identification”. In: Bennour, A., Bouridane, A., Almaadeed, S., Bouaziz, B., Edirisinghe, E. (eds) Intelligent Systems and Pattern Recognition. ISPR 2024. Communications in Computer and Information Science, vol 2305. Springer, Cham. https://doi.org/10.1007/978-3-031-82156-1_19
[19] F. Hazem., A. Bennour, N. A. Kurdi, S. Hammami, M. Al-Sarem, “Channel and Spatial Attention in Chest X-Ray Radiographs: Advancing Person Identification and Verification with Self-Residual Attention Network”. Diagnostics 2024, 14, 2655. https://doi.org/10.3390/diagnostics14232655
[20] F. Hazem, B. Akram, R. Sikder, S. Algburi, “X-ray insights: Innovative person identification through Siamese and Triplet networks”. In: IET Conference Proceedings CP870. Stevenage, UK: The Institution of Engineering and Technology, 2023. p. 40-49. https://doi.org/10.1049/icp.2024.0463
[21] K. Packhäuser, S. Gündel, N. Münster, C. Syben, V. Christlein, A. Maier, “Deep learning-based patient re-identification is able to exploit the biometric nature of medical chest X-ray data”. Sci. Rep. 2022, 12, 14851.
[22] Y. Ueda, J. Morishita, “Patient Identification Based on Deep Metric Learning for Preventing Human Errors in Follow-up X-Ray Examinations”. J. Digit. Imaging, 36, 1941–1953, 2023.
[23] X. Wang, Y. Peng, L. Lu, Z. Lu, M. Bagheri, R. M. Summers, “Chestx-ray: Hospital-scale chest x-ray database and benchmarks on weakly-supervised classification and localization of common thorax diseases. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 2097-2106), 2023.
[24] P. Rajpurkar, J. Irvin, K. Zhu, B. Yang, H. Mehta, T. Duan, A. Y. Ng, “Chexnet: Radiologist-level pneumonia detection on chest x-rays with deep learning”, 2017. arXiv preprint arXiv:1711.05225.