Challenges in Face Recognition Biometrics. Sujeewa Alwis Cybula Ltd
|
|
- Baldric Black
- 7 years ago
- Views:
Transcription
1 Challenges in Face Recognition Biometrics Sujeewa Alwis Cybula Ltd
2 Background Techniques and issues Demo Questions
3 Why use face? Every one has got a fairly unique face Can be captured without user cooperation (passive)
4 Application Modes Verification Are you the same person you say you are? System captures a new biometric sample and the person submits an ID. Yes/no answer indicates authentication result. Identification Who are you? System captures a new biometric sample. It does a database search and presents the top n similar matches may need a human operator to make the final decision. Watch-list Are we looking for you System captures a new biometric sample. System triggers an alarm only if that person is in the database. Similar to identification - but uses an additional threshold to identify a hit.
5 Iris Advantages highly unique (five different patterns in even two identical twins) Stable after the first year of birth Disadvantages Need user cooperation Difficulties during enrolment The most successful technique is based on projecting Iris pattern onto a Gabor wavelet (Daugman, 1993). Gabor coefficients represent the biometric template - commercialised by Iridian technologies
6 Fingerprints Advantages Availability of large fingerprint databases Disadvantages Associated with crime control/investigation Need user cooperation Need to keep the capture surface clean and germ-free not suitable for high-throughput applications Represents minutiae points in a map Cross match technologies is one of the companies that sell fingerprint recognition systems
7 Gait recognition Palm print recognition Voice recognition
8 Combinations Face + Iris (Wang, 2003) Face + Ear (Chang, 2003) Face + Gait (Shakhnanorvich, 2002) Face + Palm print + Fingerprint (Ross, 2001) Face + Voice + Lip movement (Frischholz, 2000) Face + Voice (Kittler, 1997)
9 Face Representation 2D vs. 3D 2D Advantages Availability of large 2D image collections Capture devices are currently cheaper 3D Advantages Can deal with pose variations if the cameras can capture the full face Less sensitive to lighting variations Better accuracy during recognition (Experimental results from Notre Dame University, Chang et al. 2003)
10 Face Representation 2D vs. 3D (contd.) 2D Disadvantages Cannot handle pose variations Sensitive to lighting variations, shadows etc. 3D Disadvantages Cameras are still expensive Takes time to reconstruct models Unavailability of large collections of 3D data (UofY/ Cybula data set, U of Notre Dame data set)
11 Techniques Appearance based techniques Feature based Techniques Model based Techniques Eigen faces and Fisher faces Distances between landmark points such as eyes, nose and mouth. Graph matching techniques Active appearance/ shape models, Fitting morphable models
12 Eigen Analysis One of the most popular methods for face recognition The central argument is faces contain a lot of features some are common to all faces, some are highly discriminatory information. So they have to be mapped to different feature space that consists of discriminatory information a dimensionality reduction method is needed Eigen analysis provides a way to identify dimensions that indicate high variance - so we can use Eigen analysis to extract principal components
13 A simple example y = P x where y coordinates in the new space x coordinates in the previous space P projection matrix -a face
14 Eigen Faces projections of a face template along different principle components
15 Previous Work Using 2D images Sirovich and Kirby (1987), Turk and Pentland (1991) Using 3D images Heseltine, Pears and Austin (2003), Chang, Bowyer and Flynn (2003)
16 Linear Discriminant Analysis Subject A Subject B The aim is to minimise the within class separation and maximise between class separation. In other words, maximise the ratio between between class variance and within class variance Subject C Maximise (S B S -1 w ) Where S B between class scatter matrix S w within class scatter matrix
17 Previous Work Using 2D images Belhumeur, Hespanha and Kriegman (1997), Etemad and Chellappa (1996), Liu and Wiechsler (1998), Kittler (1999) Using 3D images Heseltine, Pears and Austin (2004)
18 Is LDA always better than PCA? PCA LDA D LDA D PCA Martinez and Kak (IEEE PAMI, 2001) Present experimental data to show that LDA does not always outperform PCA particularly when the number of samples in a class is small
19 Feature based matching techniques One of the earliest techniques is to use distance between landmarks such as eye, nose and mouth This technique may not be robust due to pose variations and it may be difficult to accurately identifying the required feature points
20 Cybula approach 3D graph matching A 3D mesh is used to identify a set of significant points we identify high curvature points on face profiles These points and the relationships between points are represented in a graph A graph matching framework called Relaxation by Elimination (RBE) developed at York is used.
21 Elastic Bunch Graph Matching But we are not the only people who have applied graph matching to faces! Wiskott, Fellous, Kruger and Malsburg (1999) have used graph matching for 2D face recognition. Each landmark point (eyes, mouth et.) is represented by a stack of wavelet responses. They become the nodes of the graph. Distances are represented in edges. Graph for a new image can be fitted by scaling, rotating and translating a standard model graph. Dissimilarity measure is a straight-forward comparison between graphs
22 Model based recognition Active appearance models (Cootes, Edwards and Taylor, 2001) A statistical appearance model is constructed by combining a shape model and a texture model. Shape model is constructed by identifying the positions of landmark points Texture model represent gray level intensities. Model parameters are identified by applying Eigen analysis. Recognition is an iterative process in which model parameters are adjusted to obtain the best match
23 3D morphable model (Blanz and Vetter, 2003) A set of laser scanned 3D image models (100 males and 100 females) are used to construct the morphable 3D model. Shape is represented by 3D co-ordinates while texture is represented by colour. Model parameters are calculated by applying Eigen analysis. 3D model is deformed to obtain the best fit between its 2D projection and the new 2D image. New model parameters are used to describe the new image. So this could be seen as 2D to 3D mapping Optimisation process involves finding out optimum values for model parameters as well as scene parameters (pose, focal length of the camera, light intensity, colour and direction)
24 One remaining issue how to keep the data collections updated? Face is changed when people become older and it could depend on both internal and external factors Lanitis, Taylor and Cootes (2002) have extended their work on active appearance model to predict the age of an unseen subject and then to simulate/ eliminate age effects Using training data, they build up a weighted person specific aging function to predict an age of a person using appearance as well as external factors such as lifestyle Age simulation can be done by changing the model parameters.
25 Evaluation False acceptance rate (FAR) number of times a wrong person is accepted False rejection rate (FRR) - number of times the correct person is rejected Equal error rates the value that FAR and FRR becomes equal Time to verify Time to capture/ enrol
26 Benchmark Assessments FRVT has been replaced by the Grand Challenge Experiment led by NIST First round was finished in this month the second round results submission is due next year
27
28
29
30
31
32
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany L-1 Identity Solutions AG All rights reserved Outline Face
More informationAdaptive Face Recognition System from Myanmar NRC Card
Adaptive Face Recognition System from Myanmar NRC Card Ei Phyo Wai University of Computer Studies, Yangon, Myanmar Myint Myint Sein University of Computer Studies, Yangon, Myanmar ABSTRACT Biometrics is
More informationInternational Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
More informationMay 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.
More informationExpression Invariant 3D Face Recognition with a Morphable Model
Expression Invariant 3D Face Recognition with a Morphable Model Brian Amberg brian.amberg@unibas.ch Reinhard Knothe reinhard.knothe@unibas.ch Thomas Vetter thomas.vetter@unibas.ch Abstract We present an
More informationVisual-based ID Verification by Signature Tracking
Visual-based ID Verification by Signature Tracking Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu Outline Biometric ID Visual Signature Acquisition
More informationLOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
More informationA Mobile-based Face Verification System
A Mobile-based Face Verification System Zongying Ou, Tieming Su, Fan Ou, Jianxin Zhang, Dianting Liu CAD CG & Network Lab. Dalian Uniersity of Technology, China E-mail ouzyg@dlut.edu.cn Abstract Intelligent
More informationIllumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real- Time Applications
Illumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real- Time Applications Shireesha Chintalapati #1, M. V. Raghunadh *2 Department of E and CE NIT Warangal, Andhra
More informationFACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationEfficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
More informationFace Model Fitting on Low Resolution Images
Face Model Fitting on Low Resolution Images Xiaoming Liu Peter H. Tu Frederick W. Wheeler Visualization and Computer Vision Lab General Electric Global Research Center Niskayuna, NY, 1239, USA {liux,tu,wheeler}@research.ge.com
More informationStatistics in Face Recognition: Analyzing Probability Distributions of PCA, ICA and LDA Performance Results
Statistics in Face Recognition: Analyzing Probability Distributions of PCA, ICA and LDA Performance Results Kresimir Delac 1, Mislav Grgic 2 and Sonja Grgic 2 1 Croatian Telecom, Savska 32, Zagreb, Croatia,
More information3D Facial Image Comparison using Landmarks
3D Facial Image Comparison using Landmarks A study to the discriminating value of the characteristics of 3D facial landmarks and their automated detection. Alize Scheenstra Master thesis: INF/SCR-04-54
More informationNormalisation of 3D Face Data
Normalisation of 3D Face Data Chris McCool, George Mamic, Clinton Fookes and Sridha Sridharan Image and Video Research Laboratory Queensland University of Technology, 2 George Street, Brisbane, Australia,
More informationMultimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
More informationMathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
More informationA Comparison of Photometric Normalisation Algorithms for Face Verification
A Comparison of Photometric Normalisation Algorithms for Face Verification James Short, Josef Kittler and Kieron Messer Centre for Vision, Speech and Signal Processing University of Surrey Guildford, Surrey,
More informationTIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi Course Description Content
More informationFacial Biometric Templates and Aging: Problems and Challenges for Artificial Intelligence
Facial Biometric Templates and Aging: Problems and Challenges for Artificial Intelligence Andreas Lanitis Department of Multimedia and Graphic Arts, Cyprus University of Technology P.O Box 50329, Lemesos,
More informationA Various Biometric application for authentication and identification
A Various Biometric application for authentication and identification 1 Karuna Soni, 2 Umesh Kumar, 3 Priya Dosodia, Government Mahila Engineering College, Ajmer, India Abstract: In today s environment,
More informationSYMMETRIC EIGENFACES MILI I. SHAH
SYMMETRIC EIGENFACES MILI I. SHAH Abstract. Over the years, mathematicians and computer scientists have produced an extensive body of work in the area of facial analysis. Several facial analysis algorithms
More informationA comparative study on face recognition techniques and neural network
A comparative study on face recognition techniques and neural network 1. Abstract Meftah Ur Rahman Department of Computer Science George Mason University mrahma12@masonlive.gmu.edu In modern times, face
More informationA Fully Automatic Approach for Human Recognition from Profile Images Using 2D and 3D Ear Data
A Fully Automatic Approach for Human Recognition from Profile Images Using 2D and 3D Ear Data S. M. S. Islam, M. Bennamoun, A. S. Mian and R. Davies School of Computer Science and Software Engineering,
More informationBiometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
More informationFace Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park
Face Recognition: Some Challenges in Forensics Anil K. Jain, Brendan Klare, and Unsang Park Forensic Identification Apply A l science i tto analyze data for identification Traditionally: Latent FP, DNA,
More information3M Cogent, Inc. White Paper. Facial Recognition. Biometric Technology. a 3M Company
3M Cogent, Inc. White Paper Facial Recognition Biometric Technology a 3M Company Automated Facial Recognition: Turning Promise Into Reality Once the province of fiction, automated facial recognition has
More informationECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
More informationBiometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
More informationClassification of Fingerprints. Sarat C. Dass Department of Statistics & Probability
Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller
More informationFace detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
More informationA Scheme of Human Face Recognition in Complex Environments
A Scheme of Human Face Recognition in Complex Environments WEI CUI A thesis submitted to Auckland University of Technology in partial fulfilment of the requirements for the degree of Master of Computer
More informationSubspace Analysis and Optimization for AAM Based Face Alignment
Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China zhaoming1999@zju.edu.cn Stan Z. Li Microsoft
More informationDevelopment of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
More informationBiometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
More informationObject Recognition and Template Matching
Object Recognition and Template Matching Template Matching A template is a small image (sub-image) The goal is to find occurrences of this template in a larger image That is, you want to find matches of
More informationMethod of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
More informationAccess control: adaptation and real time implantation of a face recognition method.
Access control: adaptation and real time implantation of a face recognition method. J. Mitéran, J.P. Zimmer, F. Yang, M. Paindavoine. Laboratory Le2i, University of Burgundy, Aile des Sciences de l'ingénieur,
More informationPASSIVE DRIVER GAZE TRACKING WITH ACTIVE APPEARANCE MODELS
PASSIVE DRIVER GAZE TRACKING WITH ACTIVE APPEARANCE MODELS Takahiro Ishikawa Research Laboratories, DENSO CORPORATION Nisshin, Aichi, Japan Tel: +81 (561) 75-1616, Fax: +81 (561) 75-1193 Email: tishika@rlab.denso.co.jp
More information3D Face Modeling. Vuong Le. IFP group, Beckman Institute University of Illinois ECE417 Spring 2013
3D Face Modeling Vuong Le IFP group, Beckman Institute University of Illinois ECE417 Spring 2013 Contents Motivation 3D facial geometry modeling 3D facial geometry acquisition 3D facial deformation modeling
More informationA secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
More informationEfficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
More informationPrincipal Gabor Filters for Face Recognition
Principal Gabor Filters for Face Recognition Vitomir Štruc, Rok Gajšek and Nikola Pavešić Abstract Gabor filters have proven themselves to be a powerful tool for facial feature extraction. An abundance
More informationIndex Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.
Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram,
More informationAssignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
More informationHigh Resolution Fingerprint Matching Using Level 3 Features
High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count
More informationFace Recognition A tutorial. Filareti Tsalakanidou Informatics & Telematics Institute
Face Recognition A tutorial Filareti Tsalakanidou Informatics & Telematics Institute Face recognition problem Given a still image or video of a scene, identify or verify one or more persons in this scene
More informationClassifying Manipulation Primitives from Visual Data
Classifying Manipulation Primitives from Visual Data Sandy Huang and Dylan Hadfield-Menell Abstract One approach to learning from demonstrations in robotics is to make use of a classifier to predict if
More informationBiometrics Technology and Standards Overview
Biometrics Technology and Standards Overview Biometrics General term used alternatively to describe a characteristic or a process As a Characteristic it is a measurable biological (anatomical and physiological)
More informationPalmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap
Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic
More informationCreation of an Unlimited Database of Virtual Bone. Validation and Exploitation for Orthopedic Devices
Creation of an Unlimited Database of Virtual Bone Population using Mesh Morphing: Validation and Exploitation for Orthopedic Devices Najah Hraiech 1, Christelle Boichon 1, Michel Rochette 1, 2 Thierry
More informationOnline Learning in Biometrics: A Case Study in Face Classifier Update
Online Learning in Biometrics: A Case Study in Face Classifier Update Richa Singh, Mayank Vatsa, Arun Ross, and Afzel Noore Abstract In large scale applications, hundreds of new subjects may be regularly
More informationExcursion Report. Applications of Image Processing Winter semester 08/09. Lecturer: Robert Sablating, Univ.-Prof. Tutor : Markus Diem
Excursion Report Applications of Image Processing Winter semester 08/09 Lecturer: Robert Sablating, Univ.-Prof. Tutor : Markus Diem Contents AIP - Excursion Introduction Baggage handling at Vienna airport
More informationCapacity of an RCE-based Hamming Associative Memory for Human Face Recognition
Capacity of an RCE-based Hamming Associative Memory for Human Face Recognition Paul Watta Department of Electrical & Computer Engineering University of Michigan-Dearborn Dearborn, MI 48128 watta@umich.edu
More information3D Model-Based Face Recognition in Video
The 2 nd International Conference on Biometrics, eoul, Korea, 2007 3D Model-Based Face Recognition in Video Unsang Park and Anil K. Jain Department of Computer cience and Engineering Michigan tate University
More informationInformation Fusion in Low-Resolution Iris Videos using Principal Components Transform
Information Fusion in Low-Resolution Iris Videos using Principal Components Transform Raghavender Jillela, Arun Ross West Virginia University {Raghavender.Jillela, Arun.Ross}@mail.wvu.edu Patrick J. Flynn
More informationSignature Verification Why xyzmo offers the leading solution.
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
More informationMulti-Factor Biometrics: An Overview
Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems
More informationSketch to Photo Matching: A Feature-based Approach
Sketch to Photo Matching: A Feature-based Approach Brendan Klare a and Anil K Jain a,b a Department of Computer Science and Engineering Michigan State University East Lansing, MI, U.S.A b Department of
More informationThe Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
More informationDigital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
More informationHaar Features Based Face Detection and Recognition for Advanced Classroom and Corporate Attendance
Haar Features Based Face Detection and Recognition for Advanced Classroom and Corporate Attendance Tiwari Priti Anilkumar 1, Kalyani Jha 2, Karishma P Uchil 3, Naveen H 4 U.G. Student, Dept. of ECE, M
More informationVolume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationPhysical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
More informationFramework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
More informationThe Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
More informationThis method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
More informationModelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
More informationLearning Enhanced 3D Models for Vehicle Tracking
Learning Enhanced 3D Models for Vehicle Tracking J.M. Ferryman, A. D. Worrall and S. J. Maybank Computational Vision Group, Department of Computer Science The University of Reading RG6 6AY, UK J.M.Ferryman@reading.ac.uk
More informationBiometric Evaluation on the Cloud: A Case Study with HumanID Gait Challenge
2013 Biometric Consortium Conference Sep17-19, 2013, Tampa, Florida, USA Biometric Evaluation on the Cloud: A Case Study with HumanID Gait Challenge Ravi Panchumarthy, Ravi Subramanian, and Sudeep Sarkar
More informationReconstructing 3D Pose and Motion from a Single Camera View
Reconstructing 3D Pose and Motion from a Single Camera View R Bowden, T A Mitchell and M Sarhadi Brunel University, Uxbridge Middlesex UB8 3PH richard.bowden@brunel.ac.uk Abstract This paper presents a
More informationFeature Selection vs. Extraction
Feature Selection In many applications, we often encounter a very large number of potential features that can be used Which subset of features should be used for the best classification? Need for a small
More informationBack to Elements - Tetrahedra vs. Hexahedra
Back to Elements - Tetrahedra vs. Hexahedra Erke Wang, Thomas Nelson, Rainer Rauch CAD-FEM GmbH, Munich, Germany Abstract This paper presents some analytical results and some test results for different
More informationImage Segmentation and Registration
Image Segmentation and Registration Dr. Christine Tanner (tanner@vision.ee.ethz.ch) Computer Vision Laboratory, ETH Zürich Dr. Verena Kaynig, Machine Learning Laboratory, ETH Zürich Outline Segmentation
More informationUnderstanding The Face Image Format Standards
Understanding The Face Image Format Standards Paul Griffin, Ph.D. Chief Technology Officer Identix April 2005 Topics The Face Image Standard The Record Format Frontal Face Images Face Images and Compression
More informationAccessing the bank account without card and password in ATM using biometric technology
Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal [1] and Lavesh Agarwal [2] Teerthankar Mahaveer University Email: miniagarwal21@gmail.com [1], lavesh_1071985@yahoo.com
More informationFace Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
More informationUniversity of Ljubljana. The PhD face recognition toolbox
University of Ljubljana Faculty of Electrotechnical Engineering Vitomir Štruc The PhD face recognition toolbox Toolbox description and user manual Ljubljana, 2012 Thanks I would like to thank Alpineon
More informationMULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 111-115 MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT A. Jaya Lakshmi 1, I. Ramesh Babu 2,
More informationILLUMINATION NORMALIZATION BASED ON SIMPLIFIED LOCAL BINARY PATTERNS FOR A FACE VERIFICATION SYSTEM. Qian Tao, Raymond Veldhuis
ILLUMINATION NORMALIZATION BASED ON SIMPLIFIED LOCAL BINARY PATTERNS FOR A FACE VERIFICATION SYSTEM Qian Tao, Raymond Veldhuis Signals and Systems Group, Faculty of EEMCS University of Twente, the Netherlands
More informationTemplate-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
More informationA Simple Feature Extraction Technique of a Pattern By Hopfield Network
A Simple Feature Extraction Technique of a Pattern By Hopfield Network A.Nag!, S. Biswas *, D. Sarkar *, P.P. Sarkar *, B. Gupta **! Academy of Technology, Hoogly - 722 *USIC, University of Kalyani, Kalyani
More informationChapter ML:XI (continued)
Chapter ML:XI (continued) XI. Cluster Analysis Data Mining Overview Cluster Analysis Basics Hierarchical Cluster Analysis Iterative Cluster Analysis Density-Based Cluster Analysis Cluster Evaluation Constrained
More informationFingerprint Based Biometric Attendance System
Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id awaghmare194@gmail.com kazmiali786@gmail.com Contact Numbers 8097031667 9167689265
More informationObject class recognition using unsupervised scale-invariant learning
Object class recognition using unsupervised scale-invariant learning Rob Fergus Pietro Perona Andrew Zisserman Oxford University California Institute of Technology Goal Recognition of object categories
More informationGuidelines concerning Fingerprint Transmission
Guidelines concerning Fingerprint Transmission INTERPOL OS/FTD/IDFP 2012 INTERPOL For official use only P a g e 1 GUIDELINES FOR FINGERPRINTS TRANSMISSION Purpose of this guideline This document has been
More informationMorphable Models for Training a Component-based Face Recognition System
Morphable Models for Training a Component-based Face Recognition System Bernd Heisele Honda Research Institute USA, Inc. Boston, MA bheisele@honda-ri.com Volker Blanz Max-Planck-Institute for Computer
More informationSWGFAST. Defining Level Three Detail
SWGFAST Defining Level Three Detail ANSI / NIST Workshop Data Format for the Interchange of Fingerprint, Facial, & Scar Mark & Tattoo (SMT) Information April 26-28,2005 28,2005 Defining Level Three Detail
More information3D Scanner using Line Laser. 1. Introduction. 2. Theory
. Introduction 3D Scanner using Line Laser Di Lu Electrical, Computer, and Systems Engineering Rensselaer Polytechnic Institute The goal of 3D reconstruction is to recover the 3D properties of a geometric
More informationBEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
More informationMEASURES OF VARIATION
NORMAL DISTRIBTIONS MEASURES OF VARIATION In statistics, it is important to measure the spread of data. A simple way to measure spread is to find the range. But statisticians want to know if the data are
More informationTable of Contents. 10 Drawing Portraits: Fundamentals. Introduction and how this book is organized 13
10 Drawing Portraits: Fundamentals Table of Contents Introduction and how this book is organized 13 Section One: 15 Drawing fundamentals for the new artist. 15 Some introductory words for the newbie artist
More informationEvaluation of wavelet based linear subspace techniques for face recognition
Hima Deepthi Vankayalapati Evaluation of wavelet based linear subspace techniques for face recognition Masterarbeit zur Erlangung des akademischen Grades Diplom Ingenieurin Studium Information Technology
More informationKEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
More informationSIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
More informationVoice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India rahulrsharma999@gmail.com Abstract: Voice authentication system captures the
More informationNFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
More informationQuo vadis Face Recognition? Ralph Gross Jianbo Shi Jeff Cohn CMU-RI-TR-01-17. June 2001
Quo vadis Face Recognition? Ralph Gross Jianbo Shi Jeff Cohn CMU-RI-TR-01-17 June 2001 Robotics Institute Carnegie Mellon University Pittsburgh, Pennsylvania 15213 c Carnegie Mellon University Abstract
More informationARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS
ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS ImpostorMaps is a methodology developed by Auraya and available from Auraya resellers worldwide to configure,
More information