A Face Antispoofing Database with Diverse Attacks
|
|
|
- Amos Franklin
- 10 years ago
- Views:
Transcription
1 A Face Antispoofing Database with Diverse Attacks Zhiwei Zhang 1, Junjie Yan 1, Sifei Liu 1, Zhen Lei 1,2, Dong Yi 1,2, Stan Z. Li 1,2 1 CBSR & NLPR, Institute of Automation, Chinese Academy of Sciences 2 China Research and Development Center for Internet of Thing {zwzhang,jjyan,sfliu,zlei,dyi,szli}@cbsr.ia.ac.cn Abstract Face antispoofing has now attracted intensive attention, aiming to assure the reliability of face biometrics. We notice that currently most of face anti-spoofing databases focus on data with little variations, which may limit the generalization performance of trained models since potential attacks in real world are probably more complex. In this paper we release a face anti-spoofing database which covers a diverse range of potential attack variations. Specifically, the database contains 50 genuine subjects, and fake faces are made from the high quality records of the genuine faces. Three imaging qualities are considered, namely the low quality, normal quality and high quality. Three fake face attacks are implemented, which include warped photo attack, cut photo attack and video attack. Therefore each subject contains 12 videos (3 genuine and 9 fake), and the final database contains 600 video clips. Test protocol is provided, which consists of 7 scenarios for a thorough evaluation from all possible aspects. A baseline algorithm is also given for comparison, which explores the high frequency information in the facial region to determine the liveness. We hope such a database can serve as an evaluation platform for future researches in the literature. 1. Introduction Although face recognition (FR) has achieved great success during the past decades, little effort has been made to assure its security and reliability in the real world applications. It is now increasingly aware that existing FR systems are susceptible to fake face attacks, through which unauthorized attackers try to access illegal authorities by exhibiting fake faces of an authorized client. Serious consequences may occur if these attacks succeed, yet unfortunately there still lack effective anti-spoofing techniques. Nowadays attackers can obtain a client s face images by using portable digital cameras or simply downloading from Stan Z. Li is the corresponding author the Internet, and fake faces can be easily produced, for example, printing photos or showing videos on a laptop. Fake faces like photos and video playbacks are not only easy to implement but also usually quite effective in spoofing a FR system [1], and has become the main concern 1 in the literature as shown in Section. 2. Actually in real world applications, FR systems may encounter various fake face attacks, and an excellent anti-spoofing algorithm should perform robust in unpredicted situations. However, as we review the recent development in Section. 2, we find that current researches only concentrate on fake face with little variations. For example, in NUAA database [2], only photo attacks are considered which are warped as attack; in Idiap database [3] photos are either fixed or hand-hold. A more complex case appears in [4] where the eye regions are cut off the photo so that attackers can hide behind and blink; however, the authors did not release the database and the data amount is relatively small (only 13 subjects involved). Another shortcoming in variation is the quality of attacks: in [5, 2, 6], algorithms extract the high frequency information (e.g. texture) to detect liveness. But as these high frequency information highly depends on the image quality, how will they perform on good quality and bad quality images? Do their algorithms generalize well? We can see that due to the lack of variational data, many questions remain unanswered. Therefore we cannot predict their performance in real world applications, because practical attacks are probably not limited to one single type as in previous researches. The above observation motivates us to release a comprehensive database to serve as an evaluation platform for the face anti-spoofing issue. The database consists of 50 subjects, and we carefully design 3 kinds of imaging qualities and three kinds of attacks, which yields 12 videos for a single subject. A test protocol including 7 scenarios is provided, which analyze the effect of different imaging qualities and attack types thoroughly. Compared with previous 1 Mask is also a good choice, but usually it s too expensive to produce client-like masks. So the massive usage of masks rarely appears in the literature.
2 databases, our database has a much wider coverage of data variation as shown in Section. 3. We further design a baseline algorithm to give a preliminary study. For fake faces, the reproduction process such as printing or displaying will inevitably degrades the quality of facial texture. So the high frequency information may be a strong proof of liveness. We use multiple DoG filters to extract the high frequency information and exclude the low frequency information and noise. Then a SVM classifier is trained on the filtered image, which outputs the final decision. The paper is organized as follows: in Section 2 we review the mainstream anti-spoofing algorithms and fake face data used in their works; in Section 3 we explain our database in details; in Section 4 we give the test protocol and the baseline approach, and in Section 5 we conclude this paper. 2. Literature Survey Basically there are two main categories of face antispoofing techniques, the facial motion detection category and facial texture analysis category. Facial motion detection techniques expect subjects to exhibit specific facial motion, the detection of which determines the liveness. Facial texture analysis techniques believe that fake faces probably lack some high frequency information during the reproduction process, and by analyzing and learning the facial texture information, genuine and fake faces can be classified properly. Here the term texture represents the high frequency details in face images, and without ambiguity, we treat texture equally with high frequency information. It is important to mention that multi-spectral [7, 8, 9] and multi-modality [10, 11] based anti-spoofing methods also perform quite well by exploring other liveness clues such as face images under nonvisible illuminations or voice information. However, as they all require extra hardware devices which may be absent in most of existing FR systems, their applications are limited. So in this paper we restrict our concern only on the unimodal face biometrics under visible illumination just as the NUAA [2] and Idiap [3] database do. Figure 1. Fake faces used in [4], left is warped photo attack, and the right is cut photo attack. The figure is reproduced from [4]. Despite their intent to anti-spoof fake faces, unfortunately no fake face data are released. Among the above works, [12] used warped photos as attack; [4] designed several fake faces, which include warped photo attack and cut photo attack. Cut photo attack means that certain parts of the photo are cut off so that attackers can hide behind and exhibit facial motion through the hole. Furthermore, the amount of fake faces used in their experiments are relatively small. Some fake face samples can be seen in Fig Facial Texture Analysis Category Methods of this category believe that during the reproduction process from the genuine face to fake ones, high frequency information will be lost. In [5] Fourier transform is utilized to extract the high frequency information, and the target face image is judged fake if its energy percentage of high frequency is lower than a certain threshold. In [2] the authors use DoG and LTV algorithms to extract high frequency information from the captured images, and the final model is learned by a complex bilinear sparse low rank logistic regression model. In [6] a more simple but also more powerful LBP+SVM method (named Micro-Texture Analysis, MTA) is proposed, and they achieve very amazing results both on the NUAA [2] and Idiap [3] database Facial Motion Detection Category Several kinds of facial motions can be utilized in this category, such as eye blinking, mouth movement, head rotation, etc. Eye blinking is perhaps the most widely used facial motion due to its naturalness and simplicity. In [4], optical flow is used to measure the blink motion. In [12, 13], authors explore the appearance features to learn an eye state classifier. The state variation represents the blink motion. Head rotation [14] and mouth movement [10] are similarly measured. [4] combines eye blinking and head rotation together. Figure 2. The first row is the warped photo attack in [2], and the second row is the fake faces in [3], photos either fixed or hand hold. Notice that very obvious print defects can be seen.
3 Similarly [20] also utilize micro-textures and SVM to detect liveness. In NUAA database, still images are captured from 15 subjects. Warped photos of three sizes (6.8cm 10.2, 8.9cm 12.7 and A4 size) are taken as attacks. Idiap database, which is used for the IJCB 11 anti-spoofing contest, contains 50 subjects. Each subject is captured twice in different environment, and corresponding photo attacks are implemented by either fixing or hand holding the photos. For each of the above cases, two sessions are recorded, yielding a total 400 videos. Some examples are shown in Fig The Collected database In this section, we will describe the collected face antispoofing database. We begin with the introduction of the imaging devices as well as the imaging quality, then we introduce how our genuine faces and fake faces data are collected. A statistical comparison with other databases is given at last, which shows our evident advantage in data collection Imaging Quality Imaging quality is an issue which hasn t been discussed before in face anti-spoofing. Generally speaking, the performance of an algorithm depends on the image quality to some extent. Furthermore, the requirement on imaging quality also determines the imaging devices to collect data. For the sake of simplicity, here we empirically define quality as the preservation of facial textures, by which we pay more attention to the perceptual feeling rather than strict quantitative measures. and width is 480 and 640. For the high quality videos, we use a high resolution Sony NEX-5 camera for recording, whose maximum resolution is up to We take one image with the maximum resolution for each subject as the material to make photos. For genuine face videos and video attacks, however, such a high resolution video is too heavy a burden for both saving and calculation. Therefore we only crop a image patch which contain faces to form the final videos. By doing so, we reduce the saving and calculation burden while maximizing the quality we can achieve. Some examples can be seen in Fig. 3, in which only the face parts are shown. A complete video set can be seen in Fig Genuine faces 50 subjects are collected to form the genuine faces. All subjects are captured in natural scenes with no artificial environment unification. During recording, subjects are required to exhibit blinking behavior rather than keeping still. We argue that facial motion is a crucial liveness clue for anti-spoofing, and it is necessary to provide them just like in a challenge-response strategy used in facial motion detection methods. The motion type of blink is chosen because it is more natural and user-friendly than other motion types such as head movement and mouth movement. A blink process can be seen in Fig. 4. Figure 4. A blink process. Figure 3. Videos of low, normal and high quality. Only face regions are shown. Zoom in the image, and more obvious difference can be seen. We use three different cameras to record the data of different qualities. The low quality video is captured by a longtime-used USB camera since long time usage will always degrade the imaging quality. The image height and width for low quality videos is 640 and 480. The normal quality video is captured by a newly bought USB camera which can keep the original imaging quality well. The image height 3.3. Fake faces Fake faces are the key ingredients in our database. Specifically, we design the following three kinds of fake face attacks. Warped photo attack. As mentioned above, we use a Sony NEX-5 camera to record a image and a video for every subject. We use this high resolution image to print the photos, and these photos are printed on the copper paper, which has much higher quality than normal A4 printing paper. In a warped photo attack, the attacker deliberately warps an intact photo, trying to simulate facial motion. Intact means there is no cut-off region in the photo, in contrast with the cut photo attack below. Our warped photo attacks are much similar with those in Fig. 2. Cut photo attack. The photos mentioned above are then used for the cut photo attacks. As we require subjects to ex-
4 4. Protocol and Baseline In this section we give the test protocol first. Then we introduce a simple algorithm to serve as the baseline. Finally we analyze the experimental results. Figure 5. Different fake face attacks: left, attacker hides behind the cut photo and blink;(2)middle, another intact photo is up-down moved behind the cut one;(3)right, is the video attack. hibit blink behavior, here the eye regions are cut off. An attacker hide behind and exhibit blinking through the holes as shown in Fig. 5. Another possible implementation is proposed in [4] that one intact photo is tightly placed behind the cut photo, and by moving the photo behind, blinking can be simulated. In this database both the two implementations exist. Video attack. In this case, the high resolution genuine videos are displayed using an ipad. Notice that limited by the ipad screen resolution, the original high resolution videos ( ) will be inevitably downsized by the device. One example can be seen in Fig Comparison with Previous Databases In Table. 1 we give a statistical comparison with previous NUAA and Idiap databases, which are the only available databases to face anti-spoofing researchers. NUAA database uses photos of different sizes as attacks as shown in Table. 1. In contrast, in Idiap and our database, only A4-sized photos are used to maximize the preservation of facial textures. Furthermore, we print photos on copper paper, which has even higher quality than common A4 printing paper. In Idiap database, intact photos are both fixed and hand hold as attacks. By comparison we can see that our database has an obvious advantage not only in data variation but also in the data amount. Fig. 6 shows a complete video set for a single individual. The whole database can be downloaded from Table 1. Comparison with previous databases NUAA[2] Idiap[3] Ours #Subject Data type Still image Video Video #Data Warped photo of size Intact photo 1.Warped photo Attack cm 1. Fixed 2.Cut photo cm 2. Hand Hold 3.Video playback 3. A4 size #Quality Test protocol Our database mainly considers the possible effect of imaging quality and various fake faces, therefore it is necessary to provide a thorough analysis by verifying algorithms under different scenarios. Specifically, we design a test protocol which consists of 7 scenarios, each of which involves only certain samples. Notations L,N,H represents the low quality, normal quality and high quality, see Fig. 6. Quality Test. The three imaging qualities are considered explicitly. Specifically, the samples used are: 1. Low quality test: only use {L1,L2,L3,L4}. 2. Normal quality test: only use {N1,N2,N3,N4}. 3. High quality test: only use {H1,H2,H3,H4}. Fake Face Test. Similarly, the three fake face types are considered explicitly. Samples used are: 4. Warped photo attack test: {L1,N1,H1,L2,N2,H2}. 5. Cut photo attack test: {L1,N1,H1,L3,N3,H3}. 6. Video attack test: {L1,N1,H1,L4,N4,H4}. Overall Test. In this case, all data are combined together to give a general and overall evaluation. 7. Overall test: all the videos are used. The whole database has been split into the training set (containing 20 subjects) and the testing set (containing 30 subjects) already. For each of the above 7 scenarios, the corresponding data are to be selected from the training and testing set for model training and accuracy testing. Similar with [3], Detection-Error Trade-off (DET) curves [19] are utilized to evaluate the anti-spoofing accuracy. From DET curves, the point where FAR equals FRR is located, and the corresponding value, which is called the Equal Error Rate (EER), should also be reported. For any evaluating algorithm, 7 DET curves and 7 EER results should be reported corresponding to the above 7 scenarios. Examples can be seen in the following section for the baseline algorithm. The DET plotting code can be downloaded from Baseline algorithm Fake face images can be viewed as the genuine face images post-processed by the reproduction process. It is known that the printing, imaging and displaying process can introduce distortions such as blur and aliasing [2, 18]. Then the captured fake face images should possess lower quality
5 L1 L2 L3 L4 H1 H2 H3 H4 N1 N2 N3 N4 Figure 6. One complete video set for a subject. The left top four images represent the low quality videos, the left bottom are the normal quality videos, and the right are the high quality videos. For each quality, from left to right are genuine, warped photo attack, cut photo attack and video attack. than the genuine faces. Based on this intuitive idea, here we construct a simple baseline algorithm. We use multiple Difference of Gaussian (DoG) filters to extract the high frequency information from the face images, which is treated as the liveness clue. As we have no prior knowledge about which frequency is most discriminative, we adopt multiple DoG filters to form a redundant feature set. The low frequency information and the noises can also be excluded by properly setting the Gaussian σ. Specifically, let σ 1 represents the inner Gaussian variance, and σ 2 the outer one. Then four DoG filters are considered here: σ 1 = 0.5, σ 2 = 1; σ 1 = 1, σ 2 = 1.5; σ 1 = 1.5, σ 2 = 2; and σ 1 = 1, σ 2 = 2. Then the concatenated filtered images are taken into SVM to train a final classifier. As in this database each data is a video sequence, we randomly select 30 faces from the videos to train the classifier. Then for test we also randomly select 30 faces and identify them either as genuine or as fake. The final label for the video are determined by averaging the 30 image scores. Moreover, the filtered images are down-sampled to reduce the feature dimension. The pipeline of the algorithm is shown in Fig. 7. Randomly Selected Frames DoG Down Figure 7. Baseline algorithm Experiment Results & Analysis Sampled In Fig. 8 we show seven DET curves for the above designed scenarios. Then in Table.2 the EER are given from the DET curves where FAR equals FRR. Firstly we examine the effect of image quality toward anti-spoofing accuracy. We can see from Table.2 that when captured in very high quality, the EER is worst. We believe SVM FRR (in %) DET curves Normal Quality Test Low Quality Test High Quality Test Warped Photo Test Cut Photo Test Video Test Overall Test FAR(in %) Figure 8. DET curves. Table 2. Equal Error Rate scenario EER that obvious textures can also be extracted from fake faces captured in high quality. In that case, the assumption that the quality of fake faces tend to be lower than that of the genuine faces will be weakened, making the classification more difficult. Then we investigate the different fake face types. From Table.2 we can see that the performance on cut photo attack is the best while the video attack is the worst. Cut photo attack is easy to conquer, probably because there exist sharp edges in similar eye regions, making the negative samples less variational. It is also reasonable that it is very difficult to anti-spoof video attacks, because videos can naturally exhibit a live face, especially when the quality can be guaranteed. More powerful anti-spoofing methods have to be designed in future. The EER for overall test is 0.17, which approximately falls between the best (0.06) and the worst (0.26) like a trade-off among different attack scenarios. This accuracy
6 is still unsatisfactory for real world applications, and there is much improvement to be achieved. From the above experiments we can see that both imaging quality and fake face types can significantly influent the anti-spoofing accuracy. The quality test shows that different imaging quality can affect the inter-class difference. While low and normal qualities achieve the same EER, high quality is much worse, implying that it may be not always good to pursue high quality in imaging. The fake face test shows that a successful attack should preserve the face appearance as much as possible. The existence of obvious cutting edge in cut photo attacks can help anti-spoofing, while in warped and video attacks there exist no such similar ingenuity evidence. And finally the overall test implies that building a universal anti-spoofing model which covers many factors is relatively harder than concentrating on some fewer factors. That why we release this database, because we believe in real world situations, all these cases may occur. By providing these data of large variation, we do hope our database can assist future research in the issue. 5. Conclusion In this paper we release a face anti-spoofing database with diverse attacks to serve as an evaluation platform in the literature. The database contains 50 genuine subjects, and the fake faces are produced from the high quality records of the genuine faces. Three imaging qualities and three kinds of fake face attacks are included. We also design a test protocol which consists of 7 scenarios to provide a thorough analysis of different factors which may affect the anti-spoofing accuracy. We further design a DoG+SVM algorithm to explore high frequency information to classify genuine and fake faces, which serves as the baseline algorithm. To our knowledge, this is the most comprehensive database to date in the literature. 6. Acknowledgement This work was supported by the Chinese National Natural Science Foundation Project # , # , # , # , National IoT R&D Project # , and European Union FP7 Project # (TABULA RASA and AuthenMetric R&D Funds. References [1] N.M. Duc and B.Q. Minh. Your face is not your password. Black Hat Conference, [4] K. Kollreider, H. Fronthaler and J. Bigun. Verifying Liveness by Multiple Experts in Face Biometrics. CVPR Workshop, [5] J. Li, Y. Wang, T. Tan and A.K.Jain. Live Face Detection Based on the Analysis of Fourier Spectra. SPIE Biometric Technology for Human Identification, [6] M. P. Jukka, Abdenour Hadid and Matti Pietikïnen. Face spoofing detection from single images using micro-texture analysis. IJCB, [7] I. Pavlidis and P. Symosek. The imaging issue in an automatic face/disguise detection system. In Computer Vision Beyond the Visible Spectrum: Methods and Applications, [8] Zhiwei Zhang, Dong Yi, Zhen Lei and Stan Z. Li. Face liveness detection by learning multispectral reflectance distributions. In Automatic Face and Gesture Recognition, [9] Y. Kim, J. Na, S. Yoon, and J. Yi. Masked fake face detection using radiance measurements, Journal of the Optical Society of America A, vol. 26, no. 4, [10] G. Chetty and M. Wagner. Liveness Verification in Audio-Video Speaker Authentication. In 10th Australian Int. Conference on Speech Science and Technology, December, [11] R. Frischholz, U. Dieckmann, BioID: A Multimodal Biometric Identification System, IEEE Computer,2000. [12] G. Pan, L. Sun, Z. Wu and S. Lao, Eyeblink-based Anti-Spoofing in Face Recognition from a GenericWebcamera, ICCV, [13] C. Xu, Y. Zheng and Z. Wang. Eye States Detection by Boosting Local Binary Pattern Histograms. ICIP, [14] K. Kollreider, H. Fronthaler and J. Bigun, Evaluating Liveness by Face Images and the Structure Tensor, Fourth IEEE Workshop on Automatic Identification Advanced Technologies, October, [15] P. Viola and M. J. Jones. Robust real-time face detection. In IJCV, [16] IJCB 11 Competition on counter measures to 2D facial spoofing attacks. [17] C. Chang and C. Lin, LIBSVM, [18] N. Joshi, R. Szeliski and D. J. Kriegman. PSF Estimation using Sharp Edge Prediction. CVPR, [19] A. Martin, G. Doddington, T. Kamm, M. Ordowski and M. Przybocki. The DET Curve in Assessment of Detection Task Performance. European Conference on Speech Communication and Technology, [20] J. Bai, T. Ng, X. Gao and Y. Shi. Is physics-based liveness detection truly possible with a single image? International Symposium on Circuits and Systems, [2] X. Tan, Y. Li, J. Liu and L. Jiang. Face Liveness Detection from A Single Image with Sparse Low Rank Bilinear Discriminative Model. ECCV, [3] A. Anjos and S. Marcel. Counter-Measures to Photo Attacks in Face Recognition: a public database and a baseline. IJCB 11.
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
Face Recognition in Low-resolution Images by Using Local Zernike Moments
Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie
Introduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University [email protected] CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
Spoofing Attempt Detection using Gaze Colocation
Spoofing Attempt Detection using Gaze Colocation Asad Ali, Farzin Deravi and Sanaul Hoque School of Engineering and Digital Arts University of Kent, Canterbury, Kent, CT2 7NT, United Kingdom E-mail: {aa623,
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Super-resolution Reconstruction Algorithm Based on Patch Similarity and Back-projection Modification
1862 JOURNAL OF SOFTWARE, VOL 9, NO 7, JULY 214 Super-resolution Reconstruction Algorithm Based on Patch Similarity and Back-projection Modification Wei-long Chen Digital Media College, Sichuan Normal
Mean-Shift Tracking with Random Sampling
1 Mean-Shift Tracking with Random Sampling Alex Po Leung, Shaogang Gong Department of Computer Science Queen Mary, University of London, London, E1 4NS Abstract In this work, boosting the efficiency of
An Active Head Tracking System for Distance Education and Videoconferencing Applications
An Active Head Tracking System for Distance Education and Videoconferencing Applications Sami Huttunen and Janne Heikkilä Machine Vision Group Infotech Oulu and Department of Electrical and Information
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
Open-Set Face Recognition-based Visitor Interface System
Open-Set Face Recognition-based Visitor Interface System Hazım K. Ekenel, Lorant Szasz-Toth, and Rainer Stiefelhagen Computer Science Department, Universität Karlsruhe (TH) Am Fasanengarten 5, Karlsruhe
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
Normalisation of 3D Face Data
Normalisation of 3D Face Data Chris McCool, George Mamic, Clinton Fookes and Sridha Sridharan Image and Video Research Laboratory Queensland University of Technology, 2 George Street, Brisbane, Australia,
CS231M Project Report - Automated Real-Time Face Tracking and Blending
CS231M Project Report - Automated Real-Time Face Tracking and Blending Steven Lee, [email protected] June 6, 2015 1 Introduction Summary statement: The goal of this project is to create an Android
The Visual Internet of Things System Based on Depth Camera
The Visual Internet of Things System Based on Depth Camera Xucong Zhang 1, Xiaoyun Wang and Yingmin Jia Abstract The Visual Internet of Things is an important part of information technology. It is proposed
HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall
Automatic Photo Quality Assessment Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Estimating i the photorealism of images: Distinguishing i i paintings from photographs h Florin
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
Subspace Analysis and Optimization for AAM Based Face Alignment
Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China [email protected] Stan Z. Li Microsoft
SoMA. Automated testing system of camera algorithms. Sofica Ltd
SoMA Automated testing system of camera algorithms Sofica Ltd February 2012 2 Table of Contents Automated Testing for Camera Algorithms 3 Camera Algorithms 3 Automated Test 4 Testing 6 API Testing 6 Functional
Under Real Spoofing Attacks
Security Evaluation of Biometric Authentication Systems Under Real Spoofing Attacks Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, and Fabio Roli Department of Electrical and Electronic
Server Load Prediction
Server Load Prediction Suthee Chaidaroon ([email protected]) Joon Yeong Kim ([email protected]) Jonghan Seo ([email protected]) Abstract Estimating server load average is one of the methods that
Tracking performance evaluation on PETS 2015 Challenge datasets
Tracking performance evaluation on PETS 2015 Challenge datasets Tahir Nawaz, Jonathan Boyle, Longzhen Li and James Ferryman Computational Vision Group, School of Systems Engineering University of Reading,
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
A Learning Based Method for Super-Resolution of Low Resolution Images
A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 [email protected] Abstract The main objective of this project is the study of a learning based method
ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS
ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS ImpostorMaps is a methodology developed by Auraya and available from Auraya resellers worldwide to configure,
Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to [email protected] The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference
Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference Jue Wang, Michael F. Cohen Department of Electrical Engineering, University of Washington Microsoft Research Abstract Providing the best
Face Model Fitting on Low Resolution Images
Face Model Fitting on Low Resolution Images Xiaoming Liu Peter H. Tu Frederick W. Wheeler Visualization and Computer Vision Lab General Electric Global Research Center Niskayuna, NY, 1239, USA {liux,tu,wheeler}@research.ge.com
A Prediction-Based Transcoding System for Video Conference in Cloud Computing
A Prediction-Based Transcoding System for Video Conference in Cloud Computing Yongquan Chen 1 Abstract. We design a transcoding system that can provide dynamic transcoding services for various types of
Support Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network
Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal
Efficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
ROBUST COLOR JOINT MULTI-FRAME DEMOSAICING AND SUPER- RESOLUTION ALGORITHM
ROBUST COLOR JOINT MULTI-FRAME DEMOSAICING AND SUPER- RESOLUTION ALGORITHM Theodor Heinze Hasso-Plattner-Institute for Software Systems Engineering Prof.-Dr.-Helmert-Str. 2-3, 14482 Potsdam, Germany [email protected]
Multi-Factor Biometrics: An Overview
Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems
Face Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park
Face Recognition: Some Challenges in Forensics Anil K. Jain, Brendan Klare, and Unsang Park Forensic Identification Apply A l science i tto analyze data for identification Traditionally: Latent FP, DNA,
False alarm in outdoor environments
Accepted 1.0 Savantic letter 1(6) False alarm in outdoor environments Accepted 1.0 Savantic letter 2(6) Table of contents Revision history 3 References 3 1 Introduction 4 2 Pre-processing 4 3 Detection,
PHYSIOLOGICALLY-BASED DETECTION OF COMPUTER GENERATED FACES IN VIDEO
PHYSIOLOGICALLY-BASED DETECTION OF COMPUTER GENERATED FACES IN VIDEO V. Conotter, E. Bodnari, G. Boato H. Farid Department of Information Engineering and Computer Science University of Trento, Trento (ITALY)
An Algorithm for Classification of Five Types of Defects on Bare Printed Circuit Board
IJCSES International Journal of Computer Sciences and Engineering Systems, Vol. 5, No. 3, July 2011 CSES International 2011 ISSN 0973-4406 An Algorithm for Classification of Five Types of Defects on Bare
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
Tracking in flussi video 3D. Ing. Samuele Salti
Seminari XXIII ciclo Tracking in flussi video 3D Ing. Tutors: Prof. Tullio Salmon Cinotti Prof. Luigi Di Stefano The Tracking problem Detection Object model, Track initiation, Track termination, Tracking
Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature
3rd International Conference on Multimedia Technology ICMT 2013) Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature Qian You, Xichang Wang, Huaying Zhang, Zhen Sun
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
Extracting a Good Quality Frontal Face Images from Low Resolution Video Sequences
Extracting a Good Quality Frontal Face Images from Low Resolution Video Sequences Pritam P. Patil 1, Prof. M.V. Phatak 2 1 ME.Comp, 2 Asst.Professor, MIT, Pune Abstract The face is one of the important
Low-resolution Character Recognition by Video-based Super-resolution
2009 10th International Conference on Document Analysis and Recognition Low-resolution Character Recognition by Video-based Super-resolution Ataru Ohkura 1, Daisuke Deguchi 1, Tomokazu Takahashi 2, Ichiro
AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM
Journal of Engineering Science and Technology EURECA 2014 Special Issue January (2015) 45-59 School of Engineering, Taylor s University AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM EU TSUN CHIN*, WEI
User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
The Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
High Level Describable Attributes for Predicting Aesthetics and Interestingness
High Level Describable Attributes for Predicting Aesthetics and Interestingness Sagnik Dhar Vicente Ordonez Tamara L Berg Stony Brook University Stony Brook, NY 11794, USA [email protected] Abstract
Video compression: Performance of available codec software
Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes
Environmental Remote Sensing GEOG 2021
Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class
Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data
Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data Jun Wang Department of Mechanical and Automation Engineering The Chinese University of Hong Kong Shatin, New Territories,
AUTOMATIC ATIC PCB DEFECT DETECTION USING IMAGE SUBTRACTION METHOD
AUTOMATIC ATIC PCB DEFECT DETECTION USING IMAGE SUBTRACTION METHOD 1 Sonal Kaushik, 2 Javed Ashraf 1 Research Scholar, 2 M.Tech Assistant Professor Deptt. of Electronics & Communication Engineering, Al-Falah
Assessment of Camera Phone Distortion and Implications for Watermarking
Assessment of Camera Phone Distortion and Implications for Watermarking Aparna Gurijala, Alastair Reed and Eric Evans Digimarc Corporation, 9405 SW Gemini Drive, Beaverton, OR 97008, USA 1. INTRODUCTION
Face detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
Blog Post Extraction Using Title Finding
Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School
Establishing the Uniqueness of the Human Voice for Security Applications
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.
Character Image Patterns as Big Data
22 International Conference on Frontiers in Handwriting Recognition Character Image Patterns as Big Data Seiichi Uchida, Ryosuke Ishida, Akira Yoshida, Wenjie Cai, Yaokai Feng Kyushu University, Fukuoka,
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
High Quality Image Magnification using Cross-Scale Self-Similarity
High Quality Image Magnification using Cross-Scale Self-Similarity André Gooßen 1, Arne Ehlers 1, Thomas Pralow 2, Rolf-Rainer Grigat 1 1 Vision Systems, Hamburg University of Technology, D-21079 Hamburg
Vision-based Real-time Driver Fatigue Detection System for Efficient Vehicle Control
Vision-based Real-time Driver Fatigue Detection System for Efficient Vehicle Control D.Jayanthi, M.Bommy Abstract In modern days, a large no of automobile accidents are caused due to driver fatigue. To
Domain Classification of Technical Terms Using the Web
Systems and Computers in Japan, Vol. 38, No. 14, 2007 Translated from Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J89-D, No. 11, November 2006, pp. 2470 2482 Domain Classification of Technical Terms Using
Efficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
Template-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
Neural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN
The effect of mismatched recording conditions on human and automatic speaker recognition in forensic applications
Forensic Science International 146S (2004) S95 S99 www.elsevier.com/locate/forsciint The effect of mismatched recording conditions on human and automatic speaker recognition in forensic applications A.
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
Detection of Collusion Behaviors in Online Reputation Systems
Detection of Collusion Behaviors in Online Reputation Systems Yuhong Liu, Yafei Yang, and Yan Lindsay Sun University of Rhode Island, Kingston, RI Email: {yuhong, yansun}@ele.uri.edu Qualcomm Incorporated,
Low-resolution Image Processing based on FPGA
Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,
The Big Data methodology in computer vision systems
The Big Data methodology in computer vision systems Popov S.B. Samara State Aerospace University, Image Processing Systems Institute, Russian Academy of Sciences Abstract. I consider the advantages of
A Lightweight and Effective Music Score Recognition on Mobile Phone
J Inf Process Syst, http://dx.doi.org/.3745/jips ISSN 1976-913X (Print) ISSN 92-5X (Electronic) A Lightweight and Effective Music Score Recognition on Mobile Phone Tam Nguyen* and Gueesang Lee** Abstract
FPGA Implementation of Human Behavior Analysis Using Facial Image
RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering
Whitepaper. Image stabilization improving camera usability
Whitepaper Image stabilization improving camera usability Table of contents 1. Introduction 3 2. Vibration Impact on Video Output 3 3. Image Stabilization Techniques 3 3.1 Optical Image Stabilization 3
Recognizing Cats and Dogs with Shape and Appearance based Models. Group Member: Chu Wang, Landu Jiang
Recognizing Cats and Dogs with Shape and Appearance based Models Group Member: Chu Wang, Landu Jiang Abstract Recognizing cats and dogs from images is a challenging competition raised by Kaggle platform
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
Poker Vision: Playing Cards and Chips Identification based on Image Processing
Poker Vision: Playing Cards and Chips Identification based on Image Processing Paulo Martins 1, Luís Paulo Reis 2, and Luís Teófilo 2 1 DEEC Electrical Engineering Department 2 LIACC Artificial Intelligence
Overview. 1. Introduction. 2. Parts of the Project. 3. Conclusion. Motivation. Methods used in the project Results and comparison
Institute of Integrated Sensor Systems Dept. of Electrical Engineering and Information Technology An Image Processing Application on QuickCog and Matlab Door-Key Recognition System Lei Yang Oct, 2009 Prof.
Virtual Mouse Using a Webcam
1. INTRODUCTION Virtual Mouse Using a Webcam Since the computer technology continues to grow up, the importance of human computer interaction is enormously increasing. Nowadays most of the mobile devices
TEXT-FILLED STACKED AREA GRAPHS Martin Kraus
Martin Kraus Text can add a significant amount of detail and value to an information visualization. In particular, it can integrate more of the data that a visualization is based on, and it can also integrate
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS Nitin Khanna and Edward J. Delp Video and Image Processing Laboratory School of Electrical and Computer Engineering Purdue University West Lafayette,
A Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,[email protected] *2
UNIVERSITY OF CENTRAL FLORIDA AT TRECVID 2003. Yun Zhai, Zeeshan Rasheed, Mubarak Shah
UNIVERSITY OF CENTRAL FLORIDA AT TRECVID 2003 Yun Zhai, Zeeshan Rasheed, Mubarak Shah Computer Vision Laboratory School of Computer Science University of Central Florida, Orlando, Florida ABSTRACT In this
Building an Advanced Invariant Real-Time Human Tracking System
UDC 004.41 Building an Advanced Invariant Real-Time Human Tracking System Fayez Idris 1, Mazen Abu_Zaher 2, Rashad J. Rasras 3, and Ibrahiem M. M. El Emary 4 1 School of Informatics and Computing, German-Jordanian
Online Credit Card Application and Identity Crime Detection
Online Credit Card Application and Identity Crime Detection Ramkumar.E & Mrs Kavitha.P School of Computing Science, Hindustan University, Chennai ABSTRACT The credit cards have found widespread usage due
BehavioSec participation in the DARPA AA Phase 2
BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper
Mouse Control using a Web Camera based on Colour Detection
Mouse Control using a Web Camera based on Colour Detection Abhik Banerjee 1, Abhirup Ghosh 2, Koustuvmoni Bharadwaj 3, Hemanta Saikia 4 1, 2, 3, 4 Department of Electronics & Communication Engineering,
Methodological Approaches to Evaluation of Information System Functionality Performances and Importance of Successfulness Factors Analysis
Gordana Platiša Neđo Balaban Methodological Approaches to Evaluation of Information System Functionality Performances and Importance of Successfulness Factors Analysis Article Info:, Vol. 4 (2009), No.
Detecting Credit Card Fraud
Case Study Detecting Credit Card Fraud Analysis of Behaviometrics in an online Payment environment Introduction BehavioSec have been conducting tests on Behaviometrics stemming from card payments within
