A Mobile-based Face Verification System



Similar documents
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

Tracking Object Positions in Real-time Video using Genetic Programming

A Comparison of Photometric Normalisation Algorithms for Face Verification

ILLUMINATION NORMALIZATION BASED ON SIMPLIFIED LOCAL BINARY PATTERNS FOR A FACE VERIFICATION SYSTEM. Qian Tao, Raymond Veldhuis

Image Normalization for Illumination Compensation in Facial Images

Face Recognition in Low-resolution Images by Using Local Zernike Moments

ILLUMINATION NORMALIZATION METHODS

Networking Connecting to the Internet

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

A comparative study on face recognition techniques and neural network

Normalisation of 3D Face Data

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION

What is the Right Illumination Normalization for Face Recognition?

Comparative Analysis of various Illumination Normalization Techniques for Face Recognition

Capacity of an RCE-based Hamming Associative Memory for Human Face Recognition

Adaptive Face Recognition System from Myanmar NRC Card

Sketch to Photo Matching: A Feature-based Approach

Principal Gabor Filters for Face Recognition

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE.

A Learning Based Method for Super-Resolution of Low Resolution Images

Statistics in Face Recognition: Analyzing Probability Distributions of PCA, ICA and LDA Performance Results

Efficient Attendance Management: A Face Recognition Approach

Capacity Planning Guide

Towards usable authentication on mobile phones: An evaluation of speaker and face recognition on off-the-shelf handsets

Face Recognition Algorithms Surpass Humans Matching Faces over Changes in Illumination

Face Recognition at a Distance: Scenario Analysis and Applications

Canny Edge Detection

Communicating Agents Architecture with Applications in Multimodal Human Computer Interaction

Visual-based ID Verification by Signature Tracking

Illumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real- Time Applications

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals

ERserver. iseries. Backup, Recovery and Media Services (BRMS)

FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN SERVICE

Rocket Servergraph Professional Proactive Data Protection Management

Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.

How To Model The Effectiveness Of A Curriculum In Online Education Using Bayesian Networks

The Scientific Data Mining Process

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Implementation of Canny Edge Detector of color images on CELL/B.E. Architecture.

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network

Object Recognition and Template Matching

RiMONITOR. Monitoring Software. for RIEGL VZ-Line Laser Scanners. Ri Software. visit our website Preliminary Data Sheet

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD

CIS 4930/6930 Spring 2014 Introduction to Data Science /Data Intensive Computing. University of Florida, CISE Department Prof.

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS

PHOTOGRAMMETRIC TECHNIQUES FOR MEASUREMENTS IN WOODWORKING INDUSTRY

Circle Object Recognition Based on Monocular Vision for Home Security Robot

Agilent EEsof EDA.

FPGA Implementation of Human Behavior Analysis Using Facial Image

IBM WebSphere Application Server Introduction for Lotus

tive cre Service Definition learning systems CLMS Software as a Service Overview Information Assurance Backup / Restore and disaster recovery

SIGNATURE VERIFICATION

ERserver. iseries. Digital certificate management

Face Recognition For Remote Database Backup System

Certification Requirements for Teaching Assistants

CS231M Project Report - Automated Real-Time Face Tracking and Blending

Certification Requirements for Teaching Assistants

ROBUST CONTENT-BASED VIDEO WATERMARKING EXPLOITING MOTION ENTROPY MASKING EFFECT

Fast Matching of Binary Features

Inverted files and dynamic signature files for optimisation of Web directories

ESSENTIAL S&OP SOFTWARE REQUIREMENTS

Agilent EEsof EDA.

TIETS34 Seminar: Data Mining on Biometric identification

A New Approach For Estimating Software Effort Using RBFN Network

IBM Rapid Restore Ultra Version 4.0. User s Guide

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION

WebSphere Message Broker. Installation Guide. Version7Release0

ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA

Basler. Line Scan Cameras

SYMMETRIC EIGENFACES MILI I. SHAH

An Active Head Tracking System for Distance Education and Videoconferencing Applications

Achieving Compliance with the PCI Data Security Standard

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

Planning an Installation

Certificate of Cloud Security Knowledge (CCSK) v3 FAQ

The Visual Internet of Things System Based on Depth Camera

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Personal Identification Techniques Based on Operational Habit of Cellular Phone

Image Analytics on Big Data In Motion Implementation of Image Analytics CCL in Apache Kafka and Storm

A secure face tracking system

E-commerce Transaction Anomaly Classification

Face Illumination Normalization on Large and Small Scale Features

A General Framework for Tracking Objects in a Multi-Camera Environment

The Implementation of Face Security for Authentication Implemented on Mobile Phone

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set

Face Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park

Approximate String Membership Checking: A Multiple Filter, Optimization-Based Approach

Face Model Fitting on Low Resolution Images

Face detection is a process of localizing and extracting the face region from the

Subspace Analysis and Optimization for AAM Based Face Alignment

The Influence of EDM Parameters in Finishing Stage on Material Removal Rate of Hot Work Steel Using Artificial Neural Network

The assignment of chunk size according to the target data characteristics in deduplication backup system

Development of Attendance Management System using Biometrics.

Novelty Detection in image recognition using IRF Neural Networks properties

High Quality Image Magnification using Cross-Scale Self-Similarity

Multimodal Biometric Recognition Security System

Transcription:

A Mobile-based Face Verification System Zongying Ou, Tieming Su, Fan Ou, Jianxin Zhang, Dianting Liu CAD CG & Network Lab. Dalian Uniersity of Technology, China E-mail ouzyg@dlut.edu.cn Abstract Intelligent mobile phones equipped with camera are ery popular in human daily lies now. Face erification running on mobile phone proides not only a tool for protection of owner s authority but also an approach for erification from a distance. The combination of biometrics and telecommunication technologies possesses broad application potentials in information exchanges. Howeer, there are also some critical issues needed soling. Usually the processing power and memory size of a mobile phone system are limited, and the acquisition images are suffered from the illumination changes. Based on the inariant property of the ratio of illumination at a pixel to its surrounding neighbor illuminations, an illumination normalization technique was analyzed and adapted to the mobile system. A dedicated scheme composed with special waelets called Gab features was proposed for representation of human faces. The number of Gabor nodes was effectiely reduced by an optimization processing. A mobile based face erification system was deeloped and embedded in Lenoo ET980 mobile phone. The experiments testing on FERET fafb dataset show that the performance of this system is quite well. 1. Introduction Compared with traditional identification security technologies, biometrics proides more superior performances. Based on the statistics and estimation by Inter-national Biometric Group, the worldwide biometric market figures in 005 are about 1,540,000,000 USD, and will be growing up to 5,700,000,000 USD in 010 [1]. Face identification is the most conenient and userfriendly biometric technology. As an effectie and portable telecommunication tool, mobile phones equipped with cameras are getting popular in human daily lies; implementation of face erification on mobile phones not only lets mobile phone owners keep their ownership more security and safety, but also proides a simple way in establishing flexible identification tele-networks ia mobile communication, which do hae broad potentials in the growing market fields. Research work on face identification has been carried for many years and much progress has been made [-7]. Howeer, compared with the conentional fixed computer system, usually the processing power of the CPU and the capacity of the main memory in portable mobile systems are limited, and the illumination enironments are in uncontrolled conditions, which lead the deelopment of a practical mobile face erification system to be a challenge task. Recently, a mobile-based face erification system was deeloped by CAD CG & Network Lab, Dalian Uniersity of Technology. Much attention has been paid to upgrade the processing efficiency and the robustness against the illumination changes in erification processing. The experiments testing on FERET fafb dataset [8] and other dataset show that the system works well.. System Architecture and working flow The erification system contains two modules: Model training module and Verification module. The erification module will run on Window CE 5.0 platform, and takes the LENOVO ET980 intelligent mobile phone as hardware platform, which is equipped with CPU Intel XScale PX70,memory 18MB Flash/ 64 MB SDRAM and a 4 million pixel camera. Before putting erification module into implementation the erification model training module should run first to yield the model parameters for erification. The training module will run on a table computer since it inoles much digital calculation and machine learning processing. The working flow is as follows:

Model training Reprocessing Build erification model Parameter data Training dataset Feature Extraction (training) of erification model Verification User Registration Acquisition of Preprocessing register user s (Geometrical & Feature extraction Register data photos illumination) User Verification Acquisition of Preprocessing Verification erification (Geometrical & Feature extraction processing photo Illumination) Figure 1. Processing flow chart The geometrical preprocessing is clipping the detected face and aligning it to a normal scale and position specified with two eye s locations. The illumination preprocessing is to normalize the arieties of illumination in acquisition photos. This is a critical factor affecting the erification correctness, since working enironments for mobile phones are quite different. It has been shown that the differences of face images caused by arying illumination are more significant than the inherent differences between indiiduals [9]. Illumination normalization is a ery important processing in face erification. An acquisition image I(x,y) can be modeled as a product of the reflectance R and Illuminant effect L, the fundamental relation can be shown briefly as follows: I( xy, ) = Rxy (, )* Lxy (, ) (1) where (x,y) are pixel coordinates; I(x,y) is the Intensity of image at pixel (x,y); R(x,y) is the reflectance attribution of a face at pixel (x,y); L(x,y) is the illuminate effect at pixel (x,y). The reflectance attribution R(x,y) is the inherent feature of a human face, and the discriminating features for erification should be formed based on these attributions. It is an ill-posed problem to extract the exact R(x,y) from a gien image I(x,y) based on relation (1), since the illumination term is unknown. To sole this problem, some approximate assumptions had to be made. The intensity ratio between two pixels is: I( x1, y1) R( x1, y1) L( x1, y1) = () I( x, y) R( x, y) L( x, y) Compared with the reflectance changes rapidly across the contour of a face, usually the illumination changes smoothly and slowly. If these two pixels locate nearby and there is no shadow between them, the illumination at these pixel s positions can be assumed as approximately equal. Then the following simplified relation can be established: I(1, x y1) R(1, x y1) = (3) I( x, y) R( x, y) This relation means that ratio of reflectance can be calculated ia ratio of illuminations, which is approximately independent from illumination changes. The ratio of the intensity at a pixel to a specific synthetic intensity, which is the conolution result from the intensities of surrounding pixels, reflects the illumination reflectance feature at this pixel [10]. For calculation conenience we take the logarithmic ratio as normalized illumination, which is calculated as follows: I ( xy, ) = log( Ixy (, )-log( Gxy (, )* Ixy (, )) (4) where I ( x, y ) is the normalized illumination; * denotes a conolution operation; Gxy (, ) is a Gaussian surround function, assuming that the influence of a pixel depends on the distance to the center and decays as Gaussian function description.

Gxy (, ) = Kexp(( Δ x) + ( Δ y) )/ c) (5) where Δx, Δy are the distances to the center, K is an adjustable constant, adopted to Kexp(( Δ x) + ( Δ y) ) / c) = 1 (6) where c is a scale parameter, small c possesses stronger power in remedying uneen lightness; howeer, increasing c magnitude can get more smooth normalization output. Yale face database B [11] is used for ealuating the effect of illumination normalization, some typical results are shown in Figure. Figure. Illumination normalization results on Yale face database B 4. Discriminating Feature selection and Dimension Reduction where k max is the maximum frequency and f is the sp acing factor between kernels in the frequency domain. A 10X100 face image contains 1000 pixel intensity data. The intensity at a pixel is independent from others and is sensitiely affected by noise. The pixel intensity based face representation is not a good representation for erification, since it lacks of high leel intrinsic connection features. A waelets based representation call Gabor feature representation was proposed for face image processing and has been successfully applied in face identifications. Gabor filters are defined as follows: ψ u, ( x) = ( ku, / σ )exp( ku, x / σ ) (7) (exp( ik x) exp( σ / )) u, where u and define the orientation and scale, and the wae ector is defined as follows: k u, k = k exp( iφ ) (8) u, k / = k max f (9) φu = uπ / 8 (10) Figure 3. Arrangement diagram of 40 Gabor filters in frequency plane at a node In face recognition application, we use the Gabor filters with the following parameters: fie scales {0,..., 4} ; eight orientations u {0,..., 7} ; kmax = π /; f = ; σ = π, there are 5*8=40 Gabor filters at a node and shown as Figure 3. A 18X100 face image possesses 1800 pixels. If take eery pixel as one node, then the total number of

Garbor features will be 1800*40=51000, which is a huge number. In iew of the actie scope of a Gabor feature is a circle area coering its surrounding region, we can distribute the nodes sparsely. Further inestigations show that some regions like eyebrow, eye contour and nose do proide higher discriminating information, we can neglect some nodes and only select the important nodes with an optimization processing [1]. An eenly distribution configuration scheme of nodes was shown in Figure 4; based on this scheme an optimization configuration scheme composed of 56 nodes was shown in Figure 5. Figure 4. Gabor node configuration with eenly distribution (14 nodes) Figure 6. Face erification system embedded in Lenoo ET980 mobile phone Figure 5. Gabor node configuration with optimal distribution (56 nodes) 5. Implementation and Experiments A prototype mobile face erification system was deeloped running on Lenoo mobile phone ET980 shown as figure 6-7., the technical specifications are: CPU Intel XScale PX70 31MHz Memory 18MB Flash 64 MB SDRAM Camera 4 million pixels Screen Operating system 40X30 resolutions Microsoft Pocket PC 005 Phone Edition Figure 7. Working display of erification system

The system was built based on the following techniques: normalization illumination by the ratio of intensity at a pixel to intensities of local surrounding pixels; extraction discriminating Gabor feature with optimized 56 node scheme configuration; classifying with linear discriminant analysis (LDA) algorithm; all the floating point calculations are implemented by integer calculation. For comparison, the public FERET fafb dataset was used for testing. The testing results are: ERR (Equal False Accept Rate and 1.51% False Reject Rate) FAR100 (False Accept Rate at False.1% Reject Rate equal to 1%) Far1000 (False Accept Rate at False 6.91% Reject Rate equal to 0.1%) Processing time < 1 second 6. Summary Mobile phones with embedded cameras are popular telecommunication tools. Face erification technology embedded on mobile phone not only proides a tool for protecting the owner s authority.but also proides conenient approaches for implementation of teleerification which is ery important in authorized human contact. Compared with fixed computer system, mobile phones are usually equipped with weaker performance processor and smaller memory while works on arieties of uncontrolled enironments. Illumination normali-zeation and simplifying the processing of extracting features and classifying yet still keeping high precision are two key issues in deeloping practical mobile based erification system. Using the ratio of the intensity at a pixel to the intensities of its surrounding pixels as normalized Illumination can represent the intrinsic reflectance of face, which keeps approximately inariant while illumination changes. Optimization of the configuration of Gabor nodes can reduce the calculation of Gabor feature significantly. A mobile based erification system deeloped by CAD CG & Network Lab of Dalian Uniersity of Technology has been implemented on Lenoo E980 mobile phone, the testing results show that the ERR (Equal Error Rate) is about % on pubic FERET fafb dataset while the processing time takes less than 1 second, the performance is quite well. Acknowledgements The research work presented in this paper was supported by research fund DUT-SIA006. References [1]http://www.biometricgroup.com/reports/public/market_re port.html. [] W. Zhao, R. Chellappa, A. Rosenfeld, P.J. Phillips, Face Recognition: A Literature Surey, ACM Computing Sureys, 003, pp. 399-458. [3] M. Turk and A. Pentland, Eigenface for recognition, Journal of Cognitie Neuoscience, 1991(3):71-86. [4] P. Belhumeur, J. Hespanha, and D. Kriegman, Eigenfaces s. Fisherfaces: Recognition using class specific linear projection, IEEE Transactions on Pattern Analysis and Machine Intelligence, 1997, 19(7):711-70. [5] C.J. Liu, and H. Wechsler, Enhanced Fisher Linear Discriminant Models for Face Recognition, In: Proceedings of International Conference Pattern Recognition, Austria, Brisbane, 1998. [6] L. Wiskott, J.M. Fellous, N. Kruger, et al., Face recognition by elastic bunch graph matching, IEEE Transaction on Pattern Analysis and Machine Intelligence, 1997,19(7):775-779. [7] P.J. Phillips, W.T. Scruggs, A.J. O'Toole, P.J. Flynn, K.W. Bowyer, C.L. Schott, and M. Sharpe, FRVT 006 and ICE 006 Large-Scale Results, Technical report, National Institute of Standards and Technology, NISTIR 7408, March 007. http://iris.nist.go/ice. [8] http://www.nist.go/humanid/colorferet/home.html [9]Y. Adini, Y. Moses, and S, Ullman, Face Recognition: The problem of compensating for changes in Illumination direction, IEEE Transaction on Pattern Analysis and Machine Intelligence, 1997, 19(7), pp. 71-73. [10] D.J. Johson,Z. Rahman, and G.A. Woodell, Properties and performance of a center/surround retinix, IEEE Transaction on Image Processing, 1997(6), pp. 451-46. [11] A.S. Georghiades, and P.N. Belhumeur, and D.J. Kriegman, From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose, IEEE Transaction on Pattern Analysis and Machine Intelligence, 001, 3(6), pp.643-660. [1] F. Ou, C. Liu, Y. Li, Z. Ou, Ealuation and seletion of discriminating Gabor features for face recognition, Proceedings of 007 IEEE Workshop on Automatic Identification Adanced Technologies, 007, pp. 93-98.