Challenges in Face Recognition Biometrics. Sujeewa Alwis Cybula Ltd

Size: px
Start display at page:

Download "Challenges in Face Recognition Biometrics. Sujeewa Alwis Cybula Ltd"

Transcription

1 Challenges in Face Recognition Biometrics Sujeewa Alwis Cybula Ltd

2 Background Techniques and issues Demo Questions

3 Why use face? Every one has got a fairly unique face Can be captured without user cooperation (passive)

4 Application Modes Verification Are you the same person you say you are? System captures a new biometric sample and the person submits an ID. Yes/no answer indicates authentication result. Identification Who are you? System captures a new biometric sample. It does a database search and presents the top n similar matches may need a human operator to make the final decision. Watch-list Are we looking for you System captures a new biometric sample. System triggers an alarm only if that person is in the database. Similar to identification - but uses an additional threshold to identify a hit.

5 Iris Advantages highly unique (five different patterns in even two identical twins) Stable after the first year of birth Disadvantages Need user cooperation Difficulties during enrolment The most successful technique is based on projecting Iris pattern onto a Gabor wavelet (Daugman, 1993). Gabor coefficients represent the biometric template - commercialised by Iridian technologies

6 Fingerprints Advantages Availability of large fingerprint databases Disadvantages Associated with crime control/investigation Need user cooperation Need to keep the capture surface clean and germ-free not suitable for high-throughput applications Represents minutiae points in a map Cross match technologies is one of the companies that sell fingerprint recognition systems

7 Gait recognition Palm print recognition Voice recognition

8 Combinations Face + Iris (Wang, 2003) Face + Ear (Chang, 2003) Face + Gait (Shakhnanorvich, 2002) Face + Palm print + Fingerprint (Ross, 2001) Face + Voice + Lip movement (Frischholz, 2000) Face + Voice (Kittler, 1997)

9 Face Representation 2D vs. 3D 2D Advantages Availability of large 2D image collections Capture devices are currently cheaper 3D Advantages Can deal with pose variations if the cameras can capture the full face Less sensitive to lighting variations Better accuracy during recognition (Experimental results from Notre Dame University, Chang et al. 2003)

10 Face Representation 2D vs. 3D (contd.) 2D Disadvantages Cannot handle pose variations Sensitive to lighting variations, shadows etc. 3D Disadvantages Cameras are still expensive Takes time to reconstruct models Unavailability of large collections of 3D data (UofY/ Cybula data set, U of Notre Dame data set)

11 Techniques Appearance based techniques Feature based Techniques Model based Techniques Eigen faces and Fisher faces Distances between landmark points such as eyes, nose and mouth. Graph matching techniques Active appearance/ shape models, Fitting morphable models

12 Eigen Analysis One of the most popular methods for face recognition The central argument is faces contain a lot of features some are common to all faces, some are highly discriminatory information. So they have to be mapped to different feature space that consists of discriminatory information a dimensionality reduction method is needed Eigen analysis provides a way to identify dimensions that indicate high variance - so we can use Eigen analysis to extract principal components

13 A simple example y = P x where y coordinates in the new space x coordinates in the previous space P projection matrix -a face

14 Eigen Faces projections of a face template along different principle components

15 Previous Work Using 2D images Sirovich and Kirby (1987), Turk and Pentland (1991) Using 3D images Heseltine, Pears and Austin (2003), Chang, Bowyer and Flynn (2003)

16 Linear Discriminant Analysis Subject A Subject B The aim is to minimise the within class separation and maximise between class separation. In other words, maximise the ratio between between class variance and within class variance Subject C Maximise (S B S -1 w ) Where S B between class scatter matrix S w within class scatter matrix

17 Previous Work Using 2D images Belhumeur, Hespanha and Kriegman (1997), Etemad and Chellappa (1996), Liu and Wiechsler (1998), Kittler (1999) Using 3D images Heseltine, Pears and Austin (2004)

18 Is LDA always better than PCA? PCA LDA D LDA D PCA Martinez and Kak (IEEE PAMI, 2001) Present experimental data to show that LDA does not always outperform PCA particularly when the number of samples in a class is small

19 Feature based matching techniques One of the earliest techniques is to use distance between landmarks such as eye, nose and mouth This technique may not be robust due to pose variations and it may be difficult to accurately identifying the required feature points

20 Cybula approach 3D graph matching A 3D mesh is used to identify a set of significant points we identify high curvature points on face profiles These points and the relationships between points are represented in a graph A graph matching framework called Relaxation by Elimination (RBE) developed at York is used.

21 Elastic Bunch Graph Matching But we are not the only people who have applied graph matching to faces! Wiskott, Fellous, Kruger and Malsburg (1999) have used graph matching for 2D face recognition. Each landmark point (eyes, mouth et.) is represented by a stack of wavelet responses. They become the nodes of the graph. Distances are represented in edges. Graph for a new image can be fitted by scaling, rotating and translating a standard model graph. Dissimilarity measure is a straight-forward comparison between graphs

22 Model based recognition Active appearance models (Cootes, Edwards and Taylor, 2001) A statistical appearance model is constructed by combining a shape model and a texture model. Shape model is constructed by identifying the positions of landmark points Texture model represent gray level intensities. Model parameters are identified by applying Eigen analysis. Recognition is an iterative process in which model parameters are adjusted to obtain the best match

23 3D morphable model (Blanz and Vetter, 2003) A set of laser scanned 3D image models (100 males and 100 females) are used to construct the morphable 3D model. Shape is represented by 3D co-ordinates while texture is represented by colour. Model parameters are calculated by applying Eigen analysis. 3D model is deformed to obtain the best fit between its 2D projection and the new 2D image. New model parameters are used to describe the new image. So this could be seen as 2D to 3D mapping Optimisation process involves finding out optimum values for model parameters as well as scene parameters (pose, focal length of the camera, light intensity, colour and direction)

24 One remaining issue how to keep the data collections updated? Face is changed when people become older and it could depend on both internal and external factors Lanitis, Taylor and Cootes (2002) have extended their work on active appearance model to predict the age of an unseen subject and then to simulate/ eliminate age effects Using training data, they build up a weighted person specific aging function to predict an age of a person using appearance as well as external factors such as lifestyle Age simulation can be done by changing the model parameters.

25 Evaluation False acceptance rate (FAR) number of times a wrong person is accepted False rejection rate (FRR) - number of times the correct person is rejected Equal error rates the value that FAR and FRR becomes equal Time to verify Time to capture/ enrol

26 Benchmark Assessments FRVT has been replaced by the Grand Challenge Experiment led by NIST First round was finished in this month the second round results submission is due next year

27

28

29

30

31

32

Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany

Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany L-1 Identity Solutions AG All rights reserved Outline Face

More information

Adaptive Face Recognition System from Myanmar NRC Card

Adaptive Face Recognition System from Myanmar NRC Card Adaptive Face Recognition System from Myanmar NRC Card Ei Phyo Wai University of Computer Studies, Yangon, Myanmar Myint Myint Sein University of Computer Studies, Yangon, Myanmar ABSTRACT Biometrics is

More information

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014 Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College

More information

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.

More information

Expression Invariant 3D Face Recognition with a Morphable Model

Expression Invariant 3D Face Recognition with a Morphable Model Expression Invariant 3D Face Recognition with a Morphable Model Brian Amberg brian.amberg@unibas.ch Reinhard Knothe reinhard.knothe@unibas.ch Thomas Vetter thomas.vetter@unibas.ch Abstract We present an

More information

Visual-based ID Verification by Signature Tracking

Visual-based ID Verification by Signature Tracking Visual-based ID Verification by Signature Tracking Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu Outline Biometric ID Visual Signature Acquisition

More information

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA

More information

A Mobile-based Face Verification System

A Mobile-based Face Verification System A Mobile-based Face Verification System Zongying Ou, Tieming Su, Fan Ou, Jianxin Zhang, Dianting Liu CAD CG & Network Lab. Dalian Uniersity of Technology, China E-mail ouzyg@dlut.edu.cn Abstract Intelligent

More information

Illumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real- Time Applications

Illumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real- Time Applications Illumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real- Time Applications Shireesha Chintalapati #1, M. V. Raghunadh *2 Department of E and CE NIT Warangal, Andhra

More information

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Efficient Attendance Management: A Face Recognition Approach

Efficient Attendance Management: A Face Recognition Approach Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely

More information

Face Model Fitting on Low Resolution Images

Face Model Fitting on Low Resolution Images Face Model Fitting on Low Resolution Images Xiaoming Liu Peter H. Tu Frederick W. Wheeler Visualization and Computer Vision Lab General Electric Global Research Center Niskayuna, NY, 1239, USA {liux,tu,wheeler}@research.ge.com

More information

Statistics in Face Recognition: Analyzing Probability Distributions of PCA, ICA and LDA Performance Results

Statistics in Face Recognition: Analyzing Probability Distributions of PCA, ICA and LDA Performance Results Statistics in Face Recognition: Analyzing Probability Distributions of PCA, ICA and LDA Performance Results Kresimir Delac 1, Mislav Grgic 2 and Sonja Grgic 2 1 Croatian Telecom, Savska 32, Zagreb, Croatia,

More information

3D Facial Image Comparison using Landmarks

3D Facial Image Comparison using Landmarks 3D Facial Image Comparison using Landmarks A study to the discriminating value of the characteristics of 3D facial landmarks and their automated detection. Alize Scheenstra Master thesis: INF/SCR-04-54

More information

Normalisation of 3D Face Data

Normalisation of 3D Face Data Normalisation of 3D Face Data Chris McCool, George Mamic, Clinton Fookes and Sridha Sridharan Image and Video Research Laboratory Queensland University of Technology, 2 George Street, Brisbane, Australia,

More information

Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

A Comparison of Photometric Normalisation Algorithms for Face Verification

A Comparison of Photometric Normalisation Algorithms for Face Verification A Comparison of Photometric Normalisation Algorithms for Face Verification James Short, Josef Kittler and Kieron Messer Centre for Vision, Speech and Signal Processing University of Surrey Guildford, Surrey,

More information

TIETS34 Seminar: Data Mining on Biometric identification

TIETS34 Seminar: Data Mining on Biometric identification TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi Course Description Content

More information

Facial Biometric Templates and Aging: Problems and Challenges for Artificial Intelligence

Facial Biometric Templates and Aging: Problems and Challenges for Artificial Intelligence Facial Biometric Templates and Aging: Problems and Challenges for Artificial Intelligence Andreas Lanitis Department of Multimedia and Graphic Arts, Cyprus University of Technology P.O Box 50329, Lemesos,

More information

A Various Biometric application for authentication and identification

A Various Biometric application for authentication and identification A Various Biometric application for authentication and identification 1 Karuna Soni, 2 Umesh Kumar, 3 Priya Dosodia, Government Mahila Engineering College, Ajmer, India Abstract: In today s environment,

More information

SYMMETRIC EIGENFACES MILI I. SHAH

SYMMETRIC EIGENFACES MILI I. SHAH SYMMETRIC EIGENFACES MILI I. SHAH Abstract. Over the years, mathematicians and computer scientists have produced an extensive body of work in the area of facial analysis. Several facial analysis algorithms

More information

A comparative study on face recognition techniques and neural network

A comparative study on face recognition techniques and neural network A comparative study on face recognition techniques and neural network 1. Abstract Meftah Ur Rahman Department of Computer Science George Mason University mrahma12@masonlive.gmu.edu In modern times, face

More information

A Fully Automatic Approach for Human Recognition from Profile Images Using 2D and 3D Ear Data

A Fully Automatic Approach for Human Recognition from Profile Images Using 2D and 3D Ear Data A Fully Automatic Approach for Human Recognition from Profile Images Using 2D and 3D Ear Data S. M. S. Islam, M. Bennamoun, A. S. Mian and R. Davies School of Computer Science and Software Engineering,

More information

Biometric Authentication using Online Signature

Biometric Authentication using Online Signature University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication

More information

Face Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park

Face Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park Face Recognition: Some Challenges in Forensics Anil K. Jain, Brendan Klare, and Unsang Park Forensic Identification Apply A l science i tto analyze data for identification Traditionally: Latent FP, DNA,

More information

3M Cogent, Inc. White Paper. Facial Recognition. Biometric Technology. a 3M Company

3M Cogent, Inc. White Paper. Facial Recognition. Biometric Technology. a 3M Company 3M Cogent, Inc. White Paper Facial Recognition Biometric Technology a 3M Company Automated Facial Recognition: Turning Promise Into Reality Once the province of fiction, automated facial recognition has

More information

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification

More information

Biometric Authentication using Online Signatures

Biometric Authentication using Online Signatures Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,

More information

Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability

Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller

More information

Face detection is a process of localizing and extracting the face region from the

Face detection is a process of localizing and extracting the face region from the Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.

More information

A Scheme of Human Face Recognition in Complex Environments

A Scheme of Human Face Recognition in Complex Environments A Scheme of Human Face Recognition in Complex Environments WEI CUI A thesis submitted to Auckland University of Technology in partial fulfilment of the requirements for the degree of Master of Computer

More information

Subspace Analysis and Optimization for AAM Based Face Alignment

Subspace Analysis and Optimization for AAM Based Face Alignment Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China zhaoming1999@zju.edu.cn Stan Z. Li Microsoft

More information

Development of Attendance Management System using Biometrics.

Development of Attendance Management System using Biometrics. Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.

More information

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Biometrics in Physical Access Control Issues, Status and Trends White Paper Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry

More information

Object Recognition and Template Matching

Object Recognition and Template Matching Object Recognition and Template Matching Template Matching A template is a small image (sub-image) The goal is to find occurrences of this template in a larger image That is, you want to find matches of

More information

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the

More information

Access control: adaptation and real time implantation of a face recognition method.

Access control: adaptation and real time implantation of a face recognition method. Access control: adaptation and real time implantation of a face recognition method. J. Mitéran, J.P. Zimmer, F. Yang, M. Paindavoine. Laboratory Le2i, University of Burgundy, Aile des Sciences de l'ingénieur,

More information

PASSIVE DRIVER GAZE TRACKING WITH ACTIVE APPEARANCE MODELS

PASSIVE DRIVER GAZE TRACKING WITH ACTIVE APPEARANCE MODELS PASSIVE DRIVER GAZE TRACKING WITH ACTIVE APPEARANCE MODELS Takahiro Ishikawa Research Laboratories, DENSO CORPORATION Nisshin, Aichi, Japan Tel: +81 (561) 75-1616, Fax: +81 (561) 75-1193 Email: tishika@rlab.denso.co.jp

More information

3D Face Modeling. Vuong Le. IFP group, Beckman Institute University of Illinois ECE417 Spring 2013

3D Face Modeling. Vuong Le. IFP group, Beckman Institute University of Illinois ECE417 Spring 2013 3D Face Modeling Vuong Le IFP group, Beckman Institute University of Illinois ECE417 Spring 2013 Contents Motivation 3D facial geometry modeling 3D facial geometry acquisition 3D facial deformation modeling

More information

A secure face tracking system

A secure face tracking system International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking

More information

Efficient on-line Signature Verification System

Efficient on-line Signature Verification System International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information

More information

Principal Gabor Filters for Face Recognition

Principal Gabor Filters for Face Recognition Principal Gabor Filters for Face Recognition Vitomir Štruc, Rok Gajšek and Nikola Pavešić Abstract Gabor filters have proven themselves to be a powerful tool for facial feature extraction. An abundance

More information

Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.

Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control. Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram,

More information

Assignment 1 Biometric authentication

Assignment 1 Biometric authentication Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4

More information

High Resolution Fingerprint Matching Using Level 3 Features

High Resolution Fingerprint Matching Using Level 3 Features High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count

More information

Face Recognition A tutorial. Filareti Tsalakanidou Informatics & Telematics Institute

Face Recognition A tutorial. Filareti Tsalakanidou Informatics & Telematics Institute Face Recognition A tutorial Filareti Tsalakanidou Informatics & Telematics Institute Face recognition problem Given a still image or video of a scene, identify or verify one or more persons in this scene

More information

Classifying Manipulation Primitives from Visual Data

Classifying Manipulation Primitives from Visual Data Classifying Manipulation Primitives from Visual Data Sandy Huang and Dylan Hadfield-Menell Abstract One approach to learning from demonstrations in robotics is to make use of a classifier to predict if

More information

Biometrics Technology and Standards Overview

Biometrics Technology and Standards Overview Biometrics Technology and Standards Overview Biometrics General term used alternatively to describe a characteristic or a process As a Characteristic it is a measurable biological (anatomical and physiological)

More information

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic

More information

Creation of an Unlimited Database of Virtual Bone. Validation and Exploitation for Orthopedic Devices

Creation of an Unlimited Database of Virtual Bone. Validation and Exploitation for Orthopedic Devices Creation of an Unlimited Database of Virtual Bone Population using Mesh Morphing: Validation and Exploitation for Orthopedic Devices Najah Hraiech 1, Christelle Boichon 1, Michel Rochette 1, 2 Thierry

More information

Online Learning in Biometrics: A Case Study in Face Classifier Update

Online Learning in Biometrics: A Case Study in Face Classifier Update Online Learning in Biometrics: A Case Study in Face Classifier Update Richa Singh, Mayank Vatsa, Arun Ross, and Afzel Noore Abstract In large scale applications, hundreds of new subjects may be regularly

More information

Excursion Report. Applications of Image Processing Winter semester 08/09. Lecturer: Robert Sablating, Univ.-Prof. Tutor : Markus Diem

Excursion Report. Applications of Image Processing Winter semester 08/09. Lecturer: Robert Sablating, Univ.-Prof. Tutor : Markus Diem Excursion Report Applications of Image Processing Winter semester 08/09 Lecturer: Robert Sablating, Univ.-Prof. Tutor : Markus Diem Contents AIP - Excursion Introduction Baggage handling at Vienna airport

More information

Capacity of an RCE-based Hamming Associative Memory for Human Face Recognition

Capacity of an RCE-based Hamming Associative Memory for Human Face Recognition Capacity of an RCE-based Hamming Associative Memory for Human Face Recognition Paul Watta Department of Electrical & Computer Engineering University of Michigan-Dearborn Dearborn, MI 48128 watta@umich.edu

More information

3D Model-Based Face Recognition in Video

3D Model-Based Face Recognition in Video The 2 nd International Conference on Biometrics, eoul, Korea, 2007 3D Model-Based Face Recognition in Video Unsang Park and Anil K. Jain Department of Computer cience and Engineering Michigan tate University

More information

Information Fusion in Low-Resolution Iris Videos using Principal Components Transform

Information Fusion in Low-Resolution Iris Videos using Principal Components Transform Information Fusion in Low-Resolution Iris Videos using Principal Components Transform Raghavender Jillela, Arun Ross West Virginia University {Raghavender.Jillela, Arun.Ross}@mail.wvu.edu Patrick J. Flynn

More information

Signature Verification Why xyzmo offers the leading solution.

Signature Verification Why xyzmo offers the leading solution. Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all

More information

Multi-Factor Biometrics: An Overview

Multi-Factor Biometrics: An Overview Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems

More information

Sketch to Photo Matching: A Feature-based Approach

Sketch to Photo Matching: A Feature-based Approach Sketch to Photo Matching: A Feature-based Approach Brendan Klare a and Anil K Jain a,b a Department of Computer Science and Engineering Michigan State University East Lansing, MI, U.S.A b Department of

More information

The Implementation of Face Security for Authentication Implemented on Mobile Phone

The Implementation of Face Security for Authentication Implemented on Mobile Phone The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

Haar Features Based Face Detection and Recognition for Advanced Classroom and Corporate Attendance

Haar Features Based Face Detection and Recognition for Advanced Classroom and Corporate Attendance Haar Features Based Face Detection and Recognition for Advanced Classroom and Corporate Attendance Tiwari Priti Anilkumar 1, Kalyani Jha 2, Karishma P Uchil 3, Naveen H 4 U.G. Student, Dept. of ECE, M

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network

More information

Framework for Biometric Enabled Unified Core Banking

Framework for Biometric Enabled Unified Core Banking Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty

More information

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger. According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic

More information

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic

More information

Learning Enhanced 3D Models for Vehicle Tracking

Learning Enhanced 3D Models for Vehicle Tracking Learning Enhanced 3D Models for Vehicle Tracking J.M. Ferryman, A. D. Worrall and S. J. Maybank Computational Vision Group, Department of Computer Science The University of Reading RG6 6AY, UK J.M.Ferryman@reading.ac.uk

More information

Biometric Evaluation on the Cloud: A Case Study with HumanID Gait Challenge

Biometric Evaluation on the Cloud: A Case Study with HumanID Gait Challenge 2013 Biometric Consortium Conference Sep17-19, 2013, Tampa, Florida, USA Biometric Evaluation on the Cloud: A Case Study with HumanID Gait Challenge Ravi Panchumarthy, Ravi Subramanian, and Sudeep Sarkar

More information

Reconstructing 3D Pose and Motion from a Single Camera View

Reconstructing 3D Pose and Motion from a Single Camera View Reconstructing 3D Pose and Motion from a Single Camera View R Bowden, T A Mitchell and M Sarhadi Brunel University, Uxbridge Middlesex UB8 3PH richard.bowden@brunel.ac.uk Abstract This paper presents a

More information

Feature Selection vs. Extraction

Feature Selection vs. Extraction Feature Selection In many applications, we often encounter a very large number of potential features that can be used Which subset of features should be used for the best classification? Need for a small

More information

Back to Elements - Tetrahedra vs. Hexahedra

Back to Elements - Tetrahedra vs. Hexahedra Back to Elements - Tetrahedra vs. Hexahedra Erke Wang, Thomas Nelson, Rainer Rauch CAD-FEM GmbH, Munich, Germany Abstract This paper presents some analytical results and some test results for different

More information

Image Segmentation and Registration

Image Segmentation and Registration Image Segmentation and Registration Dr. Christine Tanner (tanner@vision.ee.ethz.ch) Computer Vision Laboratory, ETH Zürich Dr. Verena Kaynig, Machine Learning Laboratory, ETH Zürich Outline Segmentation

More information

Understanding The Face Image Format Standards

Understanding The Face Image Format Standards Understanding The Face Image Format Standards Paul Griffin, Ph.D. Chief Technology Officer Identix April 2005 Topics The Face Image Standard The Record Format Frontal Face Images Face Images and Compression

More information

Accessing the bank account without card and password in ATM using biometric technology

Accessing the bank account without card and password in ATM using biometric technology Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal [1] and Lavesh Agarwal [2] Teerthankar Mahaveer University Email: miniagarwal21@gmail.com [1], lavesh_1071985@yahoo.com

More information

Face Recognition For Remote Database Backup System

Face Recognition For Remote Database Backup System Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM

More information

University of Ljubljana. The PhD face recognition toolbox

University of Ljubljana. The PhD face recognition toolbox University of Ljubljana Faculty of Electrotechnical Engineering Vitomir Štruc The PhD face recognition toolbox Toolbox description and user manual Ljubljana, 2012 Thanks I would like to thank Alpineon

More information

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 111-115 MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT A. Jaya Lakshmi 1, I. Ramesh Babu 2,

More information

ILLUMINATION NORMALIZATION BASED ON SIMPLIFIED LOCAL BINARY PATTERNS FOR A FACE VERIFICATION SYSTEM. Qian Tao, Raymond Veldhuis

ILLUMINATION NORMALIZATION BASED ON SIMPLIFIED LOCAL BINARY PATTERNS FOR A FACE VERIFICATION SYSTEM. Qian Tao, Raymond Veldhuis ILLUMINATION NORMALIZATION BASED ON SIMPLIFIED LOCAL BINARY PATTERNS FOR A FACE VERIFICATION SYSTEM Qian Tao, Raymond Veldhuis Signals and Systems Group, Faculty of EEMCS University of Twente, the Netherlands

More information

Template-based Eye and Mouth Detection for 3D Video Conferencing

Template-based Eye and Mouth Detection for 3D Video Conferencing Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer

More information

A Simple Feature Extraction Technique of a Pattern By Hopfield Network

A Simple Feature Extraction Technique of a Pattern By Hopfield Network A Simple Feature Extraction Technique of a Pattern By Hopfield Network A.Nag!, S. Biswas *, D. Sarkar *, P.P. Sarkar *, B. Gupta **! Academy of Technology, Hoogly - 722 *USIC, University of Kalyani, Kalyani

More information

Chapter ML:XI (continued)

Chapter ML:XI (continued) Chapter ML:XI (continued) XI. Cluster Analysis Data Mining Overview Cluster Analysis Basics Hierarchical Cluster Analysis Iterative Cluster Analysis Density-Based Cluster Analysis Cluster Evaluation Constrained

More information

Fingerprint Based Biometric Attendance System

Fingerprint Based Biometric Attendance System Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id awaghmare194@gmail.com kazmiali786@gmail.com Contact Numbers 8097031667 9167689265

More information

Object class recognition using unsupervised scale-invariant learning

Object class recognition using unsupervised scale-invariant learning Object class recognition using unsupervised scale-invariant learning Rob Fergus Pietro Perona Andrew Zisserman Oxford University California Institute of Technology Goal Recognition of object categories

More information

Guidelines concerning Fingerprint Transmission

Guidelines concerning Fingerprint Transmission Guidelines concerning Fingerprint Transmission INTERPOL OS/FTD/IDFP 2012 INTERPOL For official use only P a g e 1 GUIDELINES FOR FINGERPRINTS TRANSMISSION Purpose of this guideline This document has been

More information

Morphable Models for Training a Component-based Face Recognition System

Morphable Models for Training a Component-based Face Recognition System Morphable Models for Training a Component-based Face Recognition System Bernd Heisele Honda Research Institute USA, Inc. Boston, MA bheisele@honda-ri.com Volker Blanz Max-Planck-Institute for Computer

More information

SWGFAST. Defining Level Three Detail

SWGFAST. Defining Level Three Detail SWGFAST Defining Level Three Detail ANSI / NIST Workshop Data Format for the Interchange of Fingerprint, Facial, & Scar Mark & Tattoo (SMT) Information April 26-28,2005 28,2005 Defining Level Three Detail

More information

3D Scanner using Line Laser. 1. Introduction. 2. Theory

3D Scanner using Line Laser. 1. Introduction. 2. Theory . Introduction 3D Scanner using Line Laser Di Lu Electrical, Computer, and Systems Engineering Rensselaer Polytechnic Institute The goal of 3D reconstruction is to recover the 3D properties of a geometric

More information

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents

More information

MEASURES OF VARIATION

MEASURES OF VARIATION NORMAL DISTRIBTIONS MEASURES OF VARIATION In statistics, it is important to measure the spread of data. A simple way to measure spread is to find the range. But statisticians want to know if the data are

More information

Table of Contents. 10 Drawing Portraits: Fundamentals. Introduction and how this book is organized 13

Table of Contents. 10 Drawing Portraits: Fundamentals. Introduction and how this book is organized 13 10 Drawing Portraits: Fundamentals Table of Contents Introduction and how this book is organized 13 Section One: 15 Drawing fundamentals for the new artist. 15 Some introductory words for the newbie artist

More information

Evaluation of wavelet based linear subspace techniques for face recognition

Evaluation of wavelet based linear subspace techniques for face recognition Hima Deepthi Vankayalapati Evaluation of wavelet based linear subspace techniques for face recognition Masterarbeit zur Erlangung des akademischen Grades Diplom Ingenieurin Studium Information Technology

More information

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric

More information

SIGNATURE VERIFICATION

SIGNATURE VERIFICATION SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University

More information

Voice Authentication for ATM Security

Voice Authentication for ATM Security Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India rahulrsharma999@gmail.com Abstract: Voice authentication system captures the

More information

NFC & Biometrics. Christophe Rosenberger

NFC & Biometrics. Christophe Rosenberger NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,

More information

Quo vadis Face Recognition? Ralph Gross Jianbo Shi Jeff Cohn CMU-RI-TR-01-17. June 2001

Quo vadis Face Recognition? Ralph Gross Jianbo Shi Jeff Cohn CMU-RI-TR-01-17. June 2001 Quo vadis Face Recognition? Ralph Gross Jianbo Shi Jeff Cohn CMU-RI-TR-01-17 June 2001 Robotics Institute Carnegie Mellon University Pittsburgh, Pennsylvania 15213 c Carnegie Mellon University Abstract

More information

ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS

ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS ImpostorMaps is a methodology developed by Auraya and available from Auraya resellers worldwide to configure,

More information