Facial Biometric Templates and Aging: Problems and Challenges for Artificial Intelligence
|
|
|
- Frank Goodman
- 9 years ago
- Views:
Transcription
1 Facial Biometric Templates and Aging: Problems and Challenges for Artificial Intelligence Andreas Lanitis Department of Multimedia and Graphic Arts, Cyprus University of Technology P.O Box 50329, Lemesos, 3066, Cyprus Abstract. The performance of face recognition and/or authentication systems is greatly affected by within-person variations encountered in human faces. Within person facial variations distort the appearance of faces leading to inconsistencies between facial features stored in templates and features derived from a face, of the corresponding subject, captured at a different instance. For this reason a considerable amount of effort has been devoted to the development of methods for eliminating within person-variations during face recognition/authentication. Among all types of within-person variations encountered, aging-related variations display unique characteristics that make the process of dealing with this type of variation a challenging task. In this paper we describe experiments that enable the quantification of the effects of aging on the performance of face recognition systems. We also review typical approaches that aim to eliminate the effects of aging in face recognition and outline future research directions for this area. 1 Introduction Researchers working in this field of face-based authentication aim to define biometric templates containing discriminatory features that are least affected by within-person types of variations in order to enable accurate identity verification [20]. Examples of within-person facial variations include variations due to different image acquisition conditions, different expressions, face orientation, occluding structures and aging. Researchers who compared the impact of within-person variations in different biometric templates [5, 9] conclude that facial templates display reduced permanence when compared to other widely used biometric modalities (i.e iris and fingerprints) hence it is highly important to develop methods for eliminating within-person variations in face recognition/authentication algorithms. Among all types of appearance variations, aging related facial variation displays unique AIAI-2009 Workshops Proceedings [142]
2 characteristics that require customized attempts for dealing with the problem. One solution to the problem of aging is the frequent update of facial templates through a data acquisition process [19]. However, template updates can be performed only if all subjects whose faces are stored in a database are regularly available and willing to provide up to date face images. During the recent years an increased research activity in the area of facial aging simulation is recorded [4, 6, 7, 8, 10, 12, 14, 15, 16, 17]. This interest is attributed to the potential of using age modeling techniques for a number of different applications that includes the prediction of the current appearance of missing persons [6], age estimation [4, 7], age-specific human computer interaction and the development of age invariant face authentication systems [10]. Research in facial aging is backed up by the existence of two publicly available face datasets [8, 15] dedicated for use in conjunction with studies related to face aging. This paper aims to formulate the challenges involved in developing age-invariant face templates. Along these lines we briefly describe the physiological mechanisms that cause age-related variations on human faces and discuss the difficulties involved in dealing with aging variation. We also present results of an experimental evaluation that aims to quantify the effect of aging on face recognition. Challenges associated with the problem of aging are presented and possible ways for dealing with this problem are suggested. The discussion of this issue takes the form of a short review of the topic where different approaches to the problem and possible directions for future research activities are outlined. 2 Face Aging Process The appearance of a human face is affected considerably by the aging process. Examples of aging effects on faces are shown in figure 1. Facial aging is mainly attributed to bone movement and growth, and skin related deformations. Aging related appearance variation due to bone growth usually takes place during childhood and puberty whereas skin related effects mainly appear in older subjects. Skin related effects are associated with the introduction of wrinkles caused by reduced skin elasticity and reduction of muscle strength [3, 12]. AIAI-2009 Workshops Proceedings [143]
3 Figure 1: Face images displaying aging variation. Each row shows images of the same individual (Images from the FG-NET Aging Database [8]). Dealing with aging variation is a challenging task because the aging process has the following unique characteristics: Control: Unlike other types of variation (i.e face orientation) the effects of aging cannot be controlled and/or reversed. This characteristic of aging variation implies that (1) it is not possible to rely on the cooperation of a subject for eliminating aging variation during face image capture and (2) the process of collecting training data suitable for studying the effects of aging requires long time intervals. Diversity of Aging Variation: Both the rate of aging and the type of age-related effects differ for different individuals. Typically diverse aging effects are encountered in subjects of different ethnic origins and different genders. External factors may also lead to diversities in the aging pattern adopted by different individuals. Such factors include health conditions, lifestyle, psychological conditions, climatic related factors and deliberate attempts to intervene with the aging process through the use of anti-aging products [3] or cosmetic surgeries. As a result common aging patterns cannot be applied successfully to all subjects. 3 Effects of Aging on Face Recognition In this section we discuss the results of an experimental evaluation that aims to quantify the effects of aging on face recognition. As part of the experiment we use images from the FG-NET Aging Database [8] for training and testing face recognition systems in cases that we deal with significant aging variation. For the needs of our experiments we have used images from the FG-NET Aging database that contains 1002 images from 82 subjects. The database was divided in the following groups: Group A and Group B: Each group contains half of the images of each of the 82 subjects. The separation of images was done in such way so that both groups contain similar distribution of ages for each subject. On average for each subject the AIAI-2009 Workshops Proceedings [144]
4 age difference between samples in Groups A and B is 1.6 years, the minimum difference is 0 years and the maximum difference is 5 years. Group C and Group D: Each group contains half of the images of each of the 82 subjects. However in this case Groups C and D contain the samples of each subject corresponding to younger and older ages respectively. The separation between younger and older faces of each subject is done based on the mean age among all samples belonging to the subject in question. On average for each subject the age difference between samples in Groups C and D is 15 years, the minimum difference is 6 years and the maximum difference is 34 years. Figure 2 shows typical samples belonging to groups A,B,C and C for a one subject from the dataset. Figure 2: Samples from Groups A and B (1 st and 2 nd row) and Groups C and D (3 rd and 4 th row). Age distributions of samples in groups A and B are similar whereas age distributions of samples in groups C and D are distinctively different. Face templates used in the experiments correspond to different facial parts so that it is feasible to compare the effects of aging for different parts. In particular templates derived from the overall internal facial region, upper face and lower face are used in our experiments (see figure 3). For the needs of the experiments facial templates are constructed based on a low dimensional Active Appearance Modelbased representation [2] of the faces in the training and test sets. As part of the ex- AIAI-2009 Workshops Proceedings [145]
5 periments two classification methods are used the first method is based on a shortest Mahalanobis distance classifier and second is based on a Support Vector Machine Classifier. In both cases classifiers are trained using images from the train sets (sets A and C) and tested using sets B and D respectively. In our results (see table 1) we quote the reduction of the correct recognition rate when dealing with extreme aging variation (test set D) when compared to the case that we deal with reduced aging variation (test set B). Figure 3: Face templates used in our experiments Reduction in Recognition Performance (Percentage units) Shorter Distance Classifier Support Vector Machine Upper Face Lower Face 8 8 Internal Face Table 1: Reduction of correct recognition when dealing with extreme aging variation, compared to the case that we deal with reduced aging variation According to the results the following conclusions can be derived. On average the performance of face recognition drops by about 12% when dealing with faces with different age distributions than the ones in the training set. Therefore it is of utmost importance to deal with aging variation. The effects of aging have greater impact when using face templates that include the upper face region. When using templates based on the lower part of the face aging effects cause smaller decrease in the recognition performance. However, the regions affected more intensively by aging are at the same time the most discriminatory regions. The results of this preliminary experiment suggest that researchers, who work in the area of face recognition/verification, should run age invariance tests in order to assess the robustness of their approaches to aging variation. As part of this exercise along with the standard performance evaluation metrics that are usually quoted, the ability of an algorithm to deal with aging variation also needs to be specified. The framework used in the experiment described above could form the basis of developing standardized age-invariance test methodologies. AIAI-2009 Workshops Proceedings [146]
6 4 Discussion We presented an overview where we outlined how aging affects human faces and we presented experimental results that demonstrate that face aging can affect dramatically the performance of face recognition systems. In order to deal with this problem we need to use techniques capable of simulating/eliminating aging effects on biometric facial templates. Aging simulation can be performed based on data driven approaches or methods based on modeling physiological mechanisms that cause the process of aging. Data Driven Approaches: Data driven approaches rely on the analysis of aging datasets so that aging patterns are defined and used as the basis for simulating aging effects on previously unseen face templates. This method requires suitable datasets that contain face images of the same individual at different ages. Ideally such samples should be normalized so that only aging variation is observed among the samples. Data driven age modeling approaches described in the literature include the use of machine learning algorithms for defining aging patterns [4, 6, 15, 17] which can later be applied to novel faces in an attempt to simulate age effects. A different approach to the problem involves the use of statistical modeling for establishing the distributions of faces belonging to different age groups enabling in that way the application of aging effects by forcing a face to move closer to a target age distribution [8, 16]. From a different perspective data driven approaches can be used for the definition of age invariant facial representations. For example Ling et al [10] suggest that a face representation based on differences in gradient orientation displays increased tolerance to aging variation. These findings were verified in a scenario involving face verification experiments in the cases that the age between faces in a pair differ by up to 10 years. Modeling Physiological Aging Mechanisms: This approach involves the use of complex mathematical models of physiological mechanisms that can be used for simulating aging effects on human faces and/or face templates. The process of defining such models requires deep understanding of the physical nature of the process of aging so that this process can be artificially reproduced. Thompson [18] was among the first researchers who proposed the use of mathematical models for modeling the growth of biological organisms. Based on this proposition several researchers attempted to derive functions that can be used for simulating the process of aging on 2D or 3D face outlines [11, 13]. Ideally physiological models of aging should take into account different aspects of personal characteristics in order to be able to produce aging simulations customized for different individuals. As an alternative to the two categories of approaches mentioned above, it is possible to adopt combined data-driven and model-based approaches. In this respect the parameters of physiological models of aging are optimized through a machinelearning process that operates on suitable aging datasets [1, 14]. AIAI-2009 Workshops Proceedings [147]
7 5 Conclusions The aging process causes significant alterations on faces affecting in that way the long term performance of face authentication systems. The solution to this problem is to develop smart systems that will be able to modify biometric facial templates in an attempt to simulate aging effects ensuring in that way that face templates are always consistent with the current facial appearance of a subject. This task is extremely difficult because aging in combination with external factors that influence the process of aging, cause compounded effects that are difficult to predict and model. For this reason modeling aging variation requires state of the art Artificial Intelligence techniques that will be able to deal with this highly demanding problem. Issues that need to be addressed in order to address the problem include the establishment of accurate person specific aging patterns that take into account the possible effect of external factors and the definition of facial representations that include discriminatory but at the same time age invariant features. References [1] L.Boissieux, G. Kiss, N. Magnenat-Thalmann and P. Kalra. Simulation of Skin Aging and Wrinkles with Cosmetics Insight. Computer Animation and Simulation, pp.15-27, [2] T.F.Cootes, G.J. Edwards and C.J. Taylor. Active Appearance Models. IEEE Transactions of Pattern Analysis and Machine Intelligence, 23, pp , [3] N. Dayan (ed), Skin Aging Handbook: Market Perspectives, Pharmacology, Formulation, and Evaluation Techniques, Andrew William Press, [4] X. Geng, ZH. Zhou and K. Smith-Miles. Automatic Age Estimation Based on Facial Aging Patterns. IEEE Transactions of Pattern Analysis and Machine Intelligence, 29(12), , [5] A. Jain A, A. Ross and S. Prabhakar. An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, 14(1), [6] A. Lanitis, C.J. Taylor and T.F. Cootes, Toward Automatic Simulation Of Aging Effects on Face Images. IEEE Transactions of Pattern Analysis and Machine Intelligence, Vol 24, no 4, pp , [7] A. Lanitis, C. Draganova and C. Christodoulou. Comparing Different Classifiers for Automatic Age Estimation. IEEE Transactions On Systems Man and Cybernetics, Part B, 34(1), pp , [8] A. Lanitis. Comparative Evaluation of Automatic Age Progression Methodologies. EURASIP Journal on Advances in Signal Processing, Article ID , [9] S. Latifi and N. Solayappan. A Survey of Unimodal Biometric Methods, Security and Management, pp 57-63, AIAI-2009 Workshops Proceedings [148]
8 [10] H. Ling, S. Soatto, N. Ramanathan, D.W. Jacobs. A Study of Face Recognition as People Age. IEEE 11th International Conference on Computer Vision, pp 1-8, [11] L.S. Mark and J.T.Todd. The Perception of Growth in Three Dimensions. Perception and Psychophysics Vol 33, No. 2, pp , [12] E.Patterson, S. Sethuram, M. Albert, K. Ricanek, M. King. Aspects of Age Variation in Facial Morphology Affecting Biometrics. IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp 1-6, [13] J.B. Pittenger and R.E Shaw. Aging Faces as Viscal-Elastic Events: Implications for a Theory of Nonrigid Shape Perception. Journal of Experimental Psychology: Human Perception and Performance 1(4), pp , [14] N. Ramanathan and R. Chellappa. Modeling Age Progression in Young Faces. Proceedings of the IEEE Conference of Computer Vision and Pattern Recognition, [15] K. Ricanek and T. Tesafaye. MORPH A Longitudinal Image Database of Normal Adult Age-Progression. Procs. of the 7th IEEE International Conference on Automatic Face and Gesture Recognition, [16] C.M. Scandrett (née Hill), C.J. Solomon and S.J. Gibson. A person-specific, rigorous aging model of the human face. Pattern Recognition Letters, Vol 27, no 15, pp , [17] J. Suo, F. Min, S. Zhu, S. Shan, and X. Chen. A Multi-Resolution Dynamic Model for Face Aging Simulation. IEEE Conference on Computer Vision and Pattern Recognition, pp 1 8, [18] D.W. Thompson, On Growth and Form, Cambridge University Press, [19] U. Uludag, A. Ross and A.Jain. Biometric template selection and update: a case study in Fingerprints, Pattern Recognition 31(7), pp , [20] W. Zhao, R. Chellappa, A. Rosenfeld, and P.J. Phillips, Face recognition: A literature survey, ACM Computing Surveys, pp , AIAI-2009 Workshops Proceedings [149]
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany L-1 Identity Solutions AG All rights reserved Outline Face
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Simultaneous Gamma Correction and Registration in the Frequency Domain
Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong [email protected] William Bishop [email protected] Department of Electrical and Computer Engineering University
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Face Recognition in Low-resolution Images by Using Local Zernike Moments
Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie
Face Model Fitting on Low Resolution Images
Face Model Fitting on Low Resolution Images Xiaoming Liu Peter H. Tu Frederick W. Wheeler Visualization and Computer Vision Lab General Electric Global Research Center Niskayuna, NY, 1239, USA {liux,tu,wheeler}@research.ge.com
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
Template-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
Development of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
TIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland [email protected] Course Description Content
Introduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University [email protected] CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Performance Evaluation of Biometric Template Update
Performance Evaluation of Biometric Template Update Romain Giot and Christophe Rosenberger Université de Caen, UMR 6072 GREYC ENSICAEN, UMR 6072 GREYC CNRS, UMR 6072 GREYC Email: [email protected]
RUN-LENGTH ENCODING FOR VOLUMETRIC TEXTURE
RUN-LENGTH ENCODING FOR VOLUMETRIC TEXTURE Dong-Hui Xu, Arati S. Kurani, Jacob D. Furst, Daniela S. Raicu Intelligent Multimedia Processing Laboratory, School of Computer Science, Telecommunications, and
User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok
Automatic Detection of PCB Defects
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning
Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning By: Shan Suthaharan Suthaharan, S. (2014). Big data classification: Problems and challenges in network
Efficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
Palmprint Classification
Palmprint Classification Li Fang*, Maylor K.H. Leung, Tejas Shikhare, Victor Chan, Kean Fatt Choon School of Computer Engineering, Nanyang Technological University, Singapore 639798 E-mail: [email protected]
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - [email protected]
Efficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
SYMMETRIC EIGENFACES MILI I. SHAH
SYMMETRIC EIGENFACES MILI I. SHAH Abstract. Over the years, mathematicians and computer scientists have produced an extensive body of work in the area of facial analysis. Several facial analysis algorithms
Face Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
KNOWLEDGE-BASED IN MEDICAL DECISION SUPPORT SYSTEM BASED ON SUBJECTIVE INTELLIGENCE
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 22/2013, ISSN 1642-6037 medical diagnosis, ontology, subjective intelligence, reasoning, fuzzy rules Hamido FUJITA 1 KNOWLEDGE-BASED IN MEDICAL DECISION
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Subspace Analysis and Optimization for AAM Based Face Alignment
Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China [email protected] Stan Z. Li Microsoft
Open-Set Face Recognition-based Visitor Interface System
Open-Set Face Recognition-based Visitor Interface System Hazım K. Ekenel, Lorant Szasz-Toth, and Rainer Stiefelhagen Computer Science Department, Universität Karlsruhe (TH) Am Fasanengarten 5, Karlsruhe
Fingerprint s Core Point Detection using Gradient Field Mask
Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]
Classifying Manipulation Primitives from Visual Data
Classifying Manipulation Primitives from Visual Data Sandy Huang and Dylan Hadfield-Menell Abstract One approach to learning from demonstrations in robotics is to make use of a classifier to predict if
A Simple Feature Extraction Technique of a Pattern By Hopfield Network
A Simple Feature Extraction Technique of a Pattern By Hopfield Network A.Nag!, S. Biswas *, D. Sarkar *, P.P. Sarkar *, B. Gupta **! Academy of Technology, Hoogly - 722 *USIC, University of Kalyani, Kalyani
Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition
IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Adaptive sequence of Key Pose Detection for Human Action Recognition 1 T. Sindhu
Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.
Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram,
Virtual Fitting by Single-shot Body Shape Estimation
Virtual Fitting by Single-shot Body Shape Estimation Masahiro Sekine* 1 Kaoru Sugita 1 Frank Perbet 2 Björn Stenger 2 Masashi Nishiyama 1 1 Corporate Research & Development Center, Toshiba Corporation,
Facial Comparison and FBI Identification Training
Facial Comparison and FBI Identification Training Module 1: Introduction to the FBI Face Training Program This work product is solely the product of the FBI. It was created for educational purposes only.
HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
Robust Outlier Detection Technique in Data Mining: A Univariate Approach
Robust Outlier Detection Technique in Data Mining: A Univariate Approach Singh Vijendra and Pathak Shivani Faculty of Engineering and Technology Mody Institute of Technology and Science Lakshmangarh, Sikar,
Establishing the Uniqueness of the Human Voice for Security Applications
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.
Face Recognition Application for Automatic Teller Machines (ATM)
2012 International Conference on Information and Knowledge Management (ICIKM 2012) IPCSIT vol.45 (2012) (2012) IACSIT Press, Singapore Face Recognition Application for Automatic Teller Machines (ATM) Hossein
Use of Human Big Data to Help Improve Productivity in Service Businesses
Hitachi Review Vol. 6 (216), No. 2 847 Featured Articles Use of Human Big Data to Help Improve Productivity in Service Businesses Satomi Tsuji Hisanaga Omori Kenji Samejima Kazuo Yano, Dr. Eng. OVERVIEW:
A Various Biometric application for authentication and identification
A Various Biometric application for authentication and identification 1 Karuna Soni, 2 Umesh Kumar, 3 Priya Dosodia, Government Mahila Engineering College, Ajmer, India Abstract: In today s environment,
Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 269 Class Project Report
Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 69 Class Project Report Junhua Mao and Lunbo Xu University of California, Los Angeles [email protected] and lunbo
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith
Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability
Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller
Novelty Detection in image recognition using IRF Neural Networks properties
Novelty Detection in image recognition using IRF Neural Networks properties Philippe Smagghe, Jean-Luc Buessler, Jean-Philippe Urban Université de Haute-Alsace MIPS 4, rue des Frères Lumière, 68093 Mulhouse,
Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company
Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company Overview Published standards In-development ISO/IEC standards Scope and status 2 Published
Automatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
What is the Right Illumination Normalization for Face Recognition?
What is the Right Illumination Normalization for Face Recognition? Aishat Mahmoud Dan-ali Department of Computer Science and Engineering The American University in Cairo AUC Avenue, P.O. Box 74, New Cairo
Categorical Data Visualization and Clustering Using Subjective Factors
Categorical Data Visualization and Clustering Using Subjective Factors Chia-Hui Chang and Zhi-Kai Ding Department of Computer Science and Information Engineering, National Central University, Chung-Li,
High Resolution Fingerprint Matching Using Level 3 Features
High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count
Hybrid Lossless Compression Method For Binary Images
M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford
Adaptive Face Recognition System from Myanmar NRC Card
Adaptive Face Recognition System from Myanmar NRC Card Ei Phyo Wai University of Computer Studies, Yangon, Myanmar Myint Myint Sein University of Computer Studies, Yangon, Myanmar ABSTRACT Biometrics is
Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to [email protected] The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
Multi-Factor Biometrics: An Overview
Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems
A Comparative Study on ATM Security with Multimodal Biometric System
A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. [email protected] C.Naga Raju Associate Professor
15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
Multi-modal Human-Computer Interaction. Attila Fazekas. [email protected]
Multi-modal Human-Computer Interaction Attila Fazekas [email protected] Szeged, 04 July 2006 Debrecen Big Church Multi-modal Human-Computer Interaction - 2 University of Debrecen Main Building
Visual-based ID Verification by Signature Tracking
Visual-based ID Verification by Signature Tracking Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu Outline Biometric ID Visual Signature Acquisition
FPGA Implementation of Human Behavior Analysis Using Facial Image
RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Graphical Representation of Multivariate Data
Graphical Representation of Multivariate Data One difficulty with multivariate data is their visualization, in particular when p > 3. At the very least, we can construct pairwise scatter plots of variables.
Intelligent Flexible Automation
Intelligent Flexible Automation David Peters Chief Executive Officer Universal Robotics February 20-22, 2013 Orlando World Marriott Center Orlando, Florida USA Trends in AI and Computing Power Convergence
PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS
PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS Ram P. Krish 1, Julian Fierrez 1, Daniel Ramos 1, Javier Ortega-Garcia 1, Josef Bigun 2 1 Biometric Recognition
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
An Order-Invariant Time Series Distance Measure [Position on Recent Developments in Time Series Analysis]
An Order-Invariant Time Series Distance Measure [Position on Recent Developments in Time Series Analysis] Stephan Spiegel and Sahin Albayrak DAI-Lab, Technische Universität Berlin, Ernst-Reuter-Platz 7,
Abstract. 1. Introduction. 1.1. Methodology
Fingerprint Recognition System Performance in the Maritime Environment Hourieh Fakourfar 1, Serge Belongie 2* 1 Department of Electrical and Computer Engineering, and 2 Department of Computer Science and
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Signature Verification Why xyzmo offers the leading solution.
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
Support Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
A FUZZY LOGIC APPROACH FOR SALES FORECASTING
A FUZZY LOGIC APPROACH FOR SALES FORECASTING ABSTRACT Sales forecasting proved to be very important in marketing where managers need to learn from historical data. Many methods have become available for
The Development of a Pressure-based Typing Biometrics User Authentication System
The Development of a Pressure-based Typing Biometrics User Authentication System Chen Change Loy Adv. Informatics Research Group MIMOS Berhad by Assoc. Prof. Dr. Chee Peng Lim Associate Professor Sch.
The Scheduled MRM Algorithm Enables Intelligent Use of Retention Time During Multiple Reaction Monitoring
The Scheduled MRM Algorithm Enables Intelligent Use of Retention Time During Multiple Reaction Monitoring Delivering up to 2500 MRM Transitions per LC Run Christie Hunter 1, Brigitte Simons 2 1 AB SCIEX,
Monitoring of Complex Industrial Processes based on Self-Organizing Maps and Watershed Transformations
Monitoring of Complex Industrial Processes based on Self-Organizing Maps and Watershed Transformations Christian W. Frey 2012 Monitoring of Complex Industrial Processes based on Self-Organizing Maps and
Keywords Input Images, Damage face images, Face recognition system, etc...
Volume 5, Issue 4, 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Research - Face Recognition
Signature verification using Kolmogorov-Smirnov. statistic
Signature verification using Kolmogorov-Smirnov statistic Harish Srinivasan, Sargur N.Srihari and Matthew J Beal University at Buffalo, the State University of New York, Buffalo USA {srihari,hs32}@cedar.buffalo.edu,[email protected]
JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
Computer Science Information Sheet for entry in 2016. What is Computer Science?
Computer Science Information Sheet for entry in 2016 What is Computer Science? Computer Science is about understanding computer systems and networks at a deep level. Computers and the programs they run
A MOBILE SERVICE ORIENTED MULTIPLE OBJECT TRACKING AUGMENTED REALITY ARCHITECTURE FOR EDUCATION AND LEARNING EXPERIENCES
A MOBILE SERVICE ORIENTED MULTIPLE OBJECT TRACKING AUGMENTED REALITY ARCHITECTURE FOR EDUCATION AND LEARNING EXPERIENCES Sasithorn Rattanarungrot, Martin White and Paul Newbury University of Sussex ABSTRACT
Image Classification for Dogs and Cats
Image Classification for Dogs and Cats Bang Liu, Yan Liu Department of Electrical and Computer Engineering {bang3,yan10}@ualberta.ca Kai Zhou Department of Computing Science [email protected] Abstract
A comparative study on face recognition techniques and neural network
A comparative study on face recognition techniques and neural network 1. Abstract Meftah Ur Rahman Department of Computer Science George Mason University [email protected] In modern times, face
Problems With Programmable self-assembly in a thousand-robot swarm
Problems With Programmable self-assembly in a thousand-robot swarm Affiliations: Department of Computer Science, COMSATS Institute of IT, Islamabad, Pakistan Author: Muaz A. Niazi* ǂ *Correspondence to:
ARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM
ARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM Ms. Radhika D. Rathi 1, Assistant Prof. Ashish Mulajkar 2, Assistant Prof. S. S. Badhe 3 1 Student, E&TCDepartment, Dr.D.Y.Patil School of
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
A GENERAL TAXONOMY FOR VISUALIZATION OF PREDICTIVE SOCIAL MEDIA ANALYTICS
A GENERAL TAXONOMY FOR VISUALIZATION OF PREDICTIVE SOCIAL MEDIA ANALYTICS Stacey Franklin Jones, D.Sc. ProTech Global Solutions Annapolis, MD Abstract The use of Social Media as a resource to characterize
