Biometric
Bits -
Volume 2006-01 - Issue 03 - January 5, 2006
Please Refer to the Biometric Bits Copyright and Fair
Use Notice
Advances in Biometrics,
International Conference
ICB 2006, Hong
Kong,
China, January 5-7, 2006
This Special Issue of Biometric Bits is devoted
the
abstracts of papers that are being presented at the foregoing
conference. The General Table of Contents
provides links to the major
subject headings within the Item
Table Of Contents. Clicking on a
title within the Item Table of Contents will bring you to the abstract
for
that title. You can simply scroll through the Item Table of Contents or
go to the Abstract section and scroll through the Abstracts.
This issue is also available in PDF format, for ease of searching and
printing.
This collection of abstracts provides an ideal means to familiarize
yourself with the cutting edge of development and theory in biometrics
science and technology.
The organizers and presenters have done an outstanding job in
assembling these technical presentations. While there are some passing
mentions of privacy, none of the presentations appears to focus on
privacy, standards, interoperability, policy or ethics relating
to
identity management..
Henry J. Boitel, Editor
Biometric Bits - The Key to Identity Management Information
General
Table
of Contents
[Click on a Topic to Go to the Item Table of Contents
Related to that Topic]
Face Verification Contest 2006
Face
Fingerprint
Iris
Biometric Fusion and
Performance Evaluation
Speech and Signature
Gait and Keys
Others
Item
Table
of Contents
[Click on a Title to Go to the Abstract For That Title]
01.
Advances in Biometrics, International Conference,
ICB 2006, Hong
Kong,
China, January 5-7, 2006
David Zhang, Anil
K. Jain (Eds.):
02. Performance Characterisation of Face
Recognition Algorithms and
Their Sensitivity to Severe Illumination Changes.
Kieron Messer,
Josef
Kittler,
James
Short,
G.
Heusch,
Fabien
Cardinaux,
Sébastien
Marcel,
Yann
Rodriguez,
Shiguang
Shan,
Y.
Su,
Wen
Gao,
X.
Chen:
03. Assessment of Blurring and
Facial Expression
Effects on Facial Image
Recognition.
Mohamed Abdel-Mottaleb,
Mohammad
H. Mahoor:
===========================
04. Ambient Illumination Variation Removal by
Active Near-IR Imaging.
Xuan Zou,
Josef
Kittler,
Kieron
Messer:
===========================
05. Rapid 3D Face Data Acquisition Using a
Color-Coded Pattern and a
Stereo Camera System.
Byoungwoo Kim,
Sunjin
Yu,
Sangyoun
Lee,
Jaihie
Kim:
===========================
06, Face Recognition Issues in a Border Control
Environment.
Marijana Kosmerlj,
Tom
Fladsrud,
Erik
Hjelmås,
Einar
Snekkenes:
===========================
07. Face Recognition Using Ordinal Features.
ShengCai Liao,
Zhen
Lei,
XiangXin
Zhu,
Zhenan
Sun,
Stan
Z. Li,
Tieniu
Tan:
===========================
08. Specific Sensors for Face Recognition.
Walid Hizem,
Emine
Krichen,
Yang
Ni,
Bernadette
Dorizzi,
Sonia
Garcia-Salicetti:
===========================
09. Fusion of Infrared and Range Data:
Multi-modal Face Images.
Xin Chen,
Patrick
J. Flynn,
Kevin
W. Bowyer:
===========================
10. Recognize Color Face Images Using Complex
Eigenfaces.
Jian Yang,
David
Zhang,
Yong
Xu,
Jing-Yu
Yang:
===========================
11. Face Verification Based on Bagging RBF
Networks.
Yunhong Wang,
Yiding
Wang,
Anil
K. Jain,
Tieniu
Tan:
===========================
12. Improvement on Null Space LDA for Face
Recognition: A Symmetry
Consideration.
Wangmeng Zuo,
Kuanquan
Wang,
David
Zhang:
===========================
13. Automatic 3D Face Recognition Using
Discriminant Common Vectors.
Cheng Zhong,
Tieniu
Tan,
Chenghua
Xu,
Jiangwei
Li:
===========================
14. Face Recognition by Inverse Fisher
Discriminant Features.
Xiao-Sheng Zhuang,
Dao-Qing
Dai,
Pong
Chi Yuen:
===========================
15. 3D Face Recognition Based
on Facial Shape
Indexes with Dynamic
Programming.
Hwanjong Song,
Ukil
Yang,
Sangyoun
Lee,
Kwanghoon
Sohn:
===========================
16. Revealing the Secret of FaceHashing.
King Hong Cheung,
Adams
Wai-Kin Kong,
David
Zhang,
Mohamed
Kamel,
Jane
Toby You:
===========================
17. Person Authentication from Video of
Faces: A Behavioral and
Physiological Approach Using Pseudo Hierarchical Hidden Markov Models.
Manuele Bicego,
Enrico
Grosso,
Massimo
Tistarelli:
===========================
18. Cascade AdaBoost Classifiers with Stage
Optimization for Face
Detection.
Zongying Ou,
Xusheng
Tang,
Tieming
Su,
Pengfei
Zhao:
===========================
19. Facial Image Reconstruction by
SVDD-Based Pattern De-noising.
Jooyoung Park,
Daesung
Kang,
James
T. Kwok,
Sang-Woong
Lee,
Bon-Woo
Hwang,
Seong-Whan
Lee:
===========================
20. Pose Estimation Based on Gaussian Error
Models.
Xiujuan Chai,
Shiguang
Shan,
Laiyun
Qing,
Wen
Gao:
===========================
21. A Novel PCA-Based Bayes Classifier and Face
Analysis.
Zhong Jin,
Franck
Davoine,
Zhen
Lou,
Jingyu
Yang:
===========================
22. Highly Accurate and Fast Face Recognition
Using Near Infrared
Images.
Stan Z. Li,
Rufeng
Chu,
Meng
Ao,
Lun
Zhang,
Ran
He:
===========================
23. Background Robust Face Tracking Using
Active Contour Technique
Combined Active Appearance Model.
Jaewon Sung,
Daijin
Kim:
===========================
24. Ensemble LDA for Face
Recognition.
Hui Kong,
Xuchun
Li,
Jian-Gang
Wang,
Chandra
Kambhamettu:
===========================
25. Information Fusion for Local Gabor
Features Based Frontal Face
Verification.
Enrique Argones-Rúa,
Josef
Kittler,
José
Luis Alba-Castro,
Daniel
González-Jiménez:
===========================
26. Using Genetic Algorithms to Find
Person-Specific Gabor Feature
Detectors for Face Indexing and Recognition.
Sreekar Krishna,
John
Black,
Sethuraman
Panchanathan:
===========================
27. The Application of Extended Geodesic
Distance in Head Poses
Estimation.
Bingpeng Ma,
Fei
Yang,
Wen
Gao,
Baochang
Zhang:
===========================
28. Improved Parameters Estimating Scheme
for E-HMM with Application
to
Face Recognition.
Bindang Xue,
Wenfang
Xue,
Zhiguo
Jiang:
===========================
29. Component-Based Active Appearance Models for
Face Modelling.
Cuiping Zhang,
Fernand
S. Cohen:
===========================
30. Incorporating Image Quality in
Multi-algorithm Fingerprint
Verification.
Julian Fiérrez-Aguilar,
Yi
Chen,
Javier
Ortega-Garcia,
Anil
K. Jain:
===========================
31. A New Approach to Fake Finger Detection
Based on Skin
Distortion.
A. Antonelli,
Raffaele
Cappelli,
Dario
Maio,
Davide
Maltoni:
===========================
32. Model-Based Quality Estimation of
Fingerprint Images.
Sanghoon Lee,
Chulhan
Lee,
Jaihie
Kim:
===========================
33. A Statistical Evaluation Model for
Minutiae-Based Automatic
Fingerprint Verification Systems.
J. S. Chen,
Y.
S. Moon:
===========================
:
34. The Surround ImagerTM:
A
Multi-camera Touchless
Device to
Acquire 3D Rolled-Equivalent Fingerprints.
Geppy Parziale,
Eva
Diaz-Santana,
Rudolf
Hauke
===========================
35. Extraction of Stable Points from Fingerprint
Images Using Zone
Could-be-in Theorem.
Xuchu Wang,
Jianwei
Li,
Yanmin
Niu,
Weimin
Chen,
Wei
Wang:
===========================
36. Fingerprint Image Enhancement Based on a
Half Gabor Filter.
Wonchurl Jang,
Deoksoo
Park,
Dongjae
Lee,
Sung-Jae
Kim:
===========================
37. Fake Fingerprint Detection by Odor Analysis.
Denis Baldisserra,
Annalisa
Franco,
Dario
Maio,
Davide
Maltoni:
===========================
38. Ridge-Based Fingerprint Recognition.
Xiaohui Xie,
Fei
Su,
Anni
Cai:
===========================
39. Fingerprint Authentication Based on Matching
Scores with Other
Data.
Koji Sakata,
Takuji
Maeda,
Masahito
Matsushita,
Koichi
Sasakawa,
Hisashi
Tamaki:
===========================
40. Effective Fingerprint Classification by
Localized Models of
Support
Vector Machines.
Jun-Ki Min,
Jin-Hyuk
Hong,
Sung-Bae
Cho:
===========================
41. Fingerprint Ridge Distance Estimation:
Algorithms and the
Performance.
Xiaosi Zhan,
Zhaocai
Sun,
Yilong
Yin,
Yayun
Chu:
===========================
42. Enhancement of Low Quality Fingerprints
Based on Anisotropic
Filtering.
Xinjian Chen,
Jie
Tian,
Yangyang
Zhang,
Xin
Yang:
===========================
43. K-plet and Coupled BFS: A Graph Based
Fingerprint Representation
and
Matching Algorithm.
Sharat Chikkerur,
Alexander
N. Cartwright,
Venu
Govindaraju:
===========================
44. A Fingerprint Recognition Algorithm
Combining Phase-Based Image
Matching and Feature-Based Matching.
Koichi Ito,
Ayumi
Morita,
Takafumi
Aoki,
Hiroshi
Nakajima,
Koji
Kobayashi,
Tatsuo
Higuchi:
===========================
45. Fast and Robust Fingerprint Identification
Algorithm and Its
Application to Residential Access Controller.
Hiroshi Nakajima,
Koji
Kobayashi,
Makoto
Morikawa,
Atsushi
Katsumata,
Koichi
Ito,
Takafumi
Aoki,
Tatsuo
Higuchi:
===========================
46. Design of Algorithm Development Interface
for Fingerprint
Verification Algorithms.
Choonwoo Ryu,
Jihyun
Moon,
Bongku
Lee,
Hakil
Kim:
===========================
47. The Use of Fingerprint Contact Area for
Biometric
Identification.
Mark B. Edwards,
G.
E. Torrens,
T.
A. Bhamra:
===========================
48. Preprocessing of a Fingerprint Image
Captured with a Mobile
Camera.
Chulhan Lee,
Sanghoon
Lee,
Jaihie
Kim,
Sung-Jae
Kim:
===========================
===========================
49. A Phase-Based Iris Recognition
Algorithm.
Kazuyuki Miyazawa,
Koichi
Ito,
Takafumi
Aoki,
Koji
Kobayashi,
Hiroshi
Nakajima:
===========================
50. Graph Matching Iris Image Blocks with Local
Binary Pattern.
Zhenan Sun,
Tieniu
Tan,
Xianchao
Qiu:
===========================
51. Localized Iris Image Quality Using 2-D
Wavelets.
Yi Chen,
Sarat
C. Dass,
Anil
K. Jain:
===========================
52. Iris Authentication Using Privatized
Advanced Correlation
Filter.
Siew Chin Chong,
Andrew
Teoh Beng Jin,
David
Ngo Chek Ling:
===========================
53. Extracting and Combining Multimodal
Directional Iris Features.
Chul-Hyun Park,
Joon-Jae
Lee:
===========================
54. Fake Iris Detection by Using Purkinje Image.
Eui Chul Lee,
Kang
Ryoung Park,
Jaihie
Kim:
===========================
55. A Novel Method for Coarse Iris
Classification.
Li Yu,
Kuanquan
Wang,
David
Zhang:
===========================
56. Global Texture Analysis of Iris Images
for Ethnic
Classification.
Xianchao Qiu,
Zhenan
Sun,
Tieniu
Tan:
===========================
57. Modeling Intra-class Variation for
Nonideal Iris Recognition.
Xin Li:
===========================
58. A Model Based, Anatomy Based Method for
Synthesizing Iris
Images.
Jinyu Zuo,
Natalia
A. Schmid:
===========================
59. Study and Improvement of Iris Location
Algorithm.
Caitang Sun,
Chunguang
Zhou,
Yanchun
Liang,
Xiangdong
Liu:
===========================
60. Applications of Wavelet Packets
Decomposition in Iris
Recognition.
Junying Gan,
Yu
Liang:
===========================
61. Iris Image Real-Time Pre-estimation Using
Compound BP Neural
Network.
Xueyi Ye,
Peng
Yao,
Fei
Long,
Zhenquan
Zhuang:
===========================
62. Iris Recognition in Mobile Phone Based
on Adaptive Gabor Filter.
Dae Sik Jeong,
Hyun-Ae
Park,
Kang
Ryoung Park,
Jaihie
Kim:
===========================
63. Robust and Fast Assessment of Iris Image
Quality.
Zhuoshi Wei,
Tieniu
Tan,
Zhenan
Sun,
Jiali
Cui:
===========================
64. Efficient Iris Recognition Using Adaptive
Quotient Thresholding.
Peeranat Thoonsaengngam,
Kittipol
Horapong,
Somying
Thainimit,
Vutipong
Areekul:
===========================
65. A Novel Iris Segmentation Method for
Hand-Held Capture Device.
XiaoFu He,
Pengfei
Shi:
===========================
66. Iris Recognition with Support Vector
Machines.
Kaushik Roy,
Prabir
Bhattacharya:
===========================
===========================
67. Multi-level Fusion of Audio
and Visual Features for Speaker
Identification.
Zhiyong Wu,
Lianhong
Cai,
Helen
Meng:
===========================
68. Online Signature Verification with New Time
Series Kernels for
Support Vector Machines.
Christian Gruber,
Thiemo
Gruber,
Bernhard
Sick:
===========================
69. Generation of Replaceable Cryptographic Keys
from Dynamic
Handwritten Signatures.
Kuan W. Yip,
Alwyn
Goh,
David
Ngo Chek Ling,
Andrew
Teoh Beng Jin:
===========================
70. Online Signature Verification Based on
Global Feature of Writing
Forces.
ZhongCheng Wu,
Ping
Fang,
Fei
Shen:
===========================
71. Improving the Binding of Electronic Signatures
to the Signer by
Biometric Authentication.
Olaf Henniger,
Björn
Schneider,
Bruno
Struif,
Ulrich
Waldmann:
===========================
72. A Comparative Study of Feature and Score
Normalization for
Speaker
Verification.
Rong Zheng,
Shuwu
Zhang,
Bo
Xu:
===========================
73. Dynamic Bayesian Networks for
Audio-Visual Speaker Recognition.
Dongdong Li,
Yingchun
Yang,
Zhaohui
Wu:
===========================
Biometric
Fusion and Performance Evaluation - Return
to Top of Page
===========================
74. Identity Verification Through
Palm Vein and Crease Texture.
Kar-Ann Toh,
How-Lung
Eng,
Yuen-Siong
Choo,
Yoon-Leon
Cha,
Wei-Yun
Yau,
Kay-Soon
Low:
===========================
75. Multimodal Facial Gender and Ethnicity
Identification
Xiaoguang Lu,
Hong
Chen,
Anil
K. Jain:
===========================
76. Continuous Verification Using
Multimodal Biometrics.
Sheng Zhang,
Rajkumar
Janakiraman,
Terence
Sim,
Sandeep
Kumar:
===========================
77. Fusion of Face and Iris Features for
Multimodal Biometrics.
Ching-Han Chen,
Chia
Te Chu:
===========================
78. The Role of Statistical Models in Biometric
Authentication.
Sinjini Mitra,
Marios
Savvides,
Anthony
Brockwell:
===========================
79. Technology Evaluations on the TH-FACE
Recognition System
Congcong Li,
Guangda
Su,
Kai
Meng,
Jun
Zhou:
.
===========================
===========================
80. Study on Synthetic Face
Database
for Performance Evaluation.
Kazuhiko Sumi,
Chang
Liu,
Takashi
Matsuyama:
===========================
81. Gait Recognition Based on Fusion of
Multi-view Gait Sequences
Yuan Wang,
Shiqi
Yu,
Yunhong
Wang,
Tieniu
Tan:
.
===========================
82. A New Representation for Human Gait
Recognition: Motion
Silhouettes
Image (MSI).
Toby H. W. Lam,
Raymond
S. T. Lee:
===========================
83. Reconstruction of 3D Human Body Pose for
Gait Recognition.
Hee-Deok Yang,
Seong-Whan
Lee:
===========================
84. Artificial Rhythms and Cues for
Keystroke Dynamics Based
Authentication.
Sungzoon Cho,
Seongseob
Hwang:
===========================
85. Retraining a Novelty Detector with Impostor
Patterns for
Keystroke
Dynamics-Based Authentication.
Hyoungjoo Lee,
Sungzoon
Cho:
===========================
86. Biometric Access Control Through Numerical
Keyboards Based on
Keystroke Dynamics.
Ricardo N. Rodrigues,
Glauco
F. G. Yared,
Carlos
R. do N. Costa,
João
Baptista T. Yabu-uti,
Fábio
Violaro,
Lee
Luan Ling:
===========================
87. Keystroke Biometric System Using Wavelets.
Woojin Chang:
===========================
:
88. GA SVM Wrapper Ensemble for Keystroke
Dynamics Authentication.
.Ki-seok Sung,
Sungzoon
Cho
===========================
89. Enhancing Login Security Through the Use of
Keystroke Input
Dynamics.
Kenneth Revett,
Sérgio
Tenreiro de Magalhães,
Henrique
M. D. Santos:
===========================
===========================
90. A Study of Identical Twins' Palmprints for
Personal
Authentication.
Adams Wai-Kin Kong, David
Zhang, Guangming
Lu:
===========================
91.A Novel Hybrid Crypto-Biometric
Authentication Scheme for ATM
Based
Banking Applications.
Fengling Han, Jiankun
Hu, Xinhuo
Yu, Yong
Feng, Jie
Zhou:
===========================
92. An Uncorrelated Fisherface Approach for
Face and Palmprint
Recognition.
Xiao-Yuan Jing, Chen
Lu, David
Zhang:
===========================
93. Fast and Accurate Segmentation of Dental
X-Ray Records.
Xin Li, Ayman
Abaza, Diaa
Eldin M. Nassar, Hany
H. Ammar:
===========================
94. Acoustic Ear Recognition.
Ton H. M. Akkermans, Tom
A. M. Kevenaar, Daniel
W. E. Schobben:
===========================
95. Classification of Bluffing Behavior and
Affective Attitude from
Prefrontal Surface Encephalogram During On-Line Game.
Myung Hwan Yun, Joo
Hwan Lee, Hyoungjoo
Lee, Sungzoon
Cho:
===========================
96. A Novel Strategy for Designing Efficient
Multiple Classifier.
Rohit Singh, Sandeep
Samal, Tapobrata
Lahiri:
===========================
97. Hand Geometry Based Recognition with a MLP
Classifier.
Marcos Faúndez-Zanuy, Miguel
A. Ferrer-Ballester, Carlos
Travieso-González, Virginia
Espinosa-Duro:
===========================
98. A False Rejection Oriented Threat Model for
the Design of
Biometric
Authentication Systems.
Ileana Buhan, Asker
M. Bazen, Pieter
H. Hartel, Raymond
N. J. Veldhuis:
===========================
99. A Bimodal Palmprint Verification System.
Tai-Kia Tan, Cheng-Leong
Ng, Kar-Ann
Toh, How-Lung
Eng, Wei-Yun
Yau, Dipti
Srinivasan:
===========================
100. Feature-Level Fusion of Hand Biometrics
for Personal
Verification
Based on Kernel PCA.
Qiang Li, ZhengDing
Qiu, Dongmei
Sun:
===========================
101. Human Identification System Based on PCA
Using Geometric
Features of
Teeth.
Young-suk Shin, Myung-Su
Kim:
===========================
102. An Improved Super-Resolution with
Manifold Learning and
Histogram
Matching.
Tak Chan, Junping
Zhang:
===========================
103. Invertible Watermarking
Algorithm with
Detecting Locations of
Malicious Manipulation for Biometric Image Authentication.
Jaehyuck Lim, Hyobin
Lee, Sangyoun
Lee, Jaihie
Kim:
===========================
104. The Identification and Recognition Based
on Point for Blood
Vessel
of Ocular Fundus.
Zhiwen Xu, Xiaoxin
Guo, Xiaoying
Hu, Xu
Chen, Zhengxuan
Wang:
===========================
105. A Method for Footprint Range Image
Segmentation and
Description.
Yihong Ding, Xijian
Ping, Min
Hu, Tao
Zhang:
===========================
106. Human Ear Recognition from Face Profile
Images.
Mohamed Abdel-Mottaleb, Jindan
Zhou:
===========================
01. David Zhang, Anil
K. Jain (Eds.):
Advances in Biometrics, International Conference, ICB 2006, Hong Kong,
China, January 5-7, 2006, Proceedings.
Lecture
Notes in Computer Science 3832 Springer 2006, ISBN 3-540-31111-4 BibTeX
===========================
===========================
===========================
02. Kieron Messer, Josef
Kittler, James
Short, G.
Heusch, Fabien
Cardinaux, Sébastien
Marcel, Yann
Rodriguez, Shiguang
Shan, Y.
Su, Wen
Gao, X.
Chen:
Performance Characterisation of Face Recognition Algorithms and
Their Sensitivity to Severe Illumination Changes.
1-11
Electronic Edition
(link) BibTe
Performance Characterisation of Face Recognition Algorithms and
Their
Sensitivity to Severe Illumination Changes
Kieron Messer1, Josef Kittler1, James Short1, G. Heusch2, Fabien
Cardinaux2, Sebastien Marcel2, Yann Rodriguez2, Shiguang Shan3, Y. Su3,
Wen Gao3 and X. Chen3
(1) University of Surrey, Guildford, Surrey,
GU2 7XH, UK
(2) Dalle Molle Institute for Perceptual
Artificial Intelligence,
CP 592, rue du Simplon 4, 1920 Martigny, Switzerland
(3) Institute of Computing Technology, Chinese
Academy of
Sciences, China
Abstract
This paper details the results of a face verification competition [2]
held in conjunction with the Second International Conference on
Biometric Authentication. The contest was held on the publically
available XM2VTS database [4] according to a defined protocol [15]. The
aim of the competition was to assess the advances made in face
recognition since 2003 and to measure the sensitivity of the tested
algorithms to severe changes in illumination conditions. In total, more
than 10 algorithms submitted by three groups were compared 1. The
results show that the relative performance of some algorithms is
dependent on training conditions (data, protocol) as well as
environmental changes.
1 This project was supported by EU Network of
Excellence Biosecure.
===========================
Face - Return to Top of
Page
===========================
03. Mohamed Abdel-Mottaleb, Mohammad
H. Mahoor:
Assessment of Blurring and Facial Expression Effects on Facial Image
Recognition.
12-18
Electronic Edition
(link) BibTeX
Assessment of Blurring and Facial Expression Effects on
Facial Image Recognition
Mohamed Abdel-Mottaleb1 Contact Information and Mohammad H. Mahoor1
Contact Information
(1) Department of ECE, University of Miami,
1251 Memorial Drive,
Coral Gables, FL 33146,
Abstract
In this paper we present methods for assessing the quality of facial
images, degraded by blurring and facial expressions, for recognition.
To assess the blurring effect, we measure the level of blurriness in
the facial images by statistical analysis in the Fourier domain. Based
on this analysis, a function is proposed to predict the performance of
face recognition on blurred images. To assess facial images with
expressions, we use Gaussian Mixture Models (GMMs) to represent images
that can be recognized with the Eigenface method, we refer to these
images as “Good Quality”, and images that cannot be recognized, we
refer to these images as “Poor Quality”. During testing, we classify a
given image into one of the two classes. We use the FERET and
Cohn-Kanade facial image databases to evaluate our algorithms for image
quality assessment. The experimental results demonstrate that the
prediction function for assessing the quality of blurred facial images
is successful. In addition, our experiments show that our approach for
assessing facial images with expressions is successful in predicting
whether an image has a good quality or poor quality for recognition.
Although the experiments in this paper are based on the Eigenface
technique, the assessment methods can be extended to other face
recognition algorithms.
Keywords: Face recognition, Image Quality Assessment, Facial
expressions, Blurring Effect, Gaussian Mixture Model.
This work is supported in part through an award from the NSF Center for
Identification Technology Research (CITeR).
Contact Information Mohamed Abdel-Mottaleb
Email: mottaleb@miami.edu
Contact Information Mohammad H. Mahoor
Email: mmahoor@umsis.miami.edu
===================================
04. Xuan Zou, Josef
Kittler, Kieron
Messer:
Ambient Illumination Variation Removal by Active Near-IR Imaging.
19-25
Electronic Edition
(link) BibTeX
Ambient Illumination Variation Removal by Active Near-IR Imaging
Xuan Zou1 Contact Information, Josef Kittler1 Contact Information and
Kieron Messer1 Contact Information
(1) Centre for Vision, Speech and Signal
Processing, University of
Surrey, United Kingdom
Abstract
We investigate an active illumination method to overcome the effect of
illumination variation in face recognition. Active Near-Infrared
(Near-IR) illumination projected by a Light Emitting Diode (LED) light
source is used to provide a constant illumination. The difference
between two face images captured when the LED light is on and off
respectively, is the image of a face under just the LED illumination,
and is independent of ambient illumination. In preliminary experiments
across different illuminations, across time, and their combinations,
significantly better results are achieved in both automatic and
semi-automatic face recognition experiments on LED illuminated faces
than on face images under ambient illuminations.
Contact Information Xuan Zou
Email: x.zou@surrey.ac.uk
Contact Information Josef Kittler
Email: j.kittler@surrey.ac.uk
Contact Information Kieron Messer
Email: k.messer@surrey.ac.uk
===================================
05. Byoungwoo Kim, Sunjin
Yu, Sangyoun
Lee, Jaihie
Kim:
Rapid 3D Face Data Acquisition Using a Color-Coded Pattern and a
Stereo Camera System.
26-32
Electronic Edition
(link) BibTeX
Rapid 3D Face Data Acquisition Using a Color-Coded Pattern and a Stereo
Camera System
Byoungwoo Kim1 Contact Information, Sunjin Yu1 Contact Information,
Sangyoun Lee1 Contact Information and Jaihie Kim1 Contact Information
(1) Biometrics Engineering Research Center,
Dept. of Electrical
and Electronics Engineering, Yonsei University, 134 Shinchon-dong,
Seodaemun-gu, Seoul 120-749, Korea
Abstract
This paper presents a rapid 3D face data acquisition method that uses a
color-coded pattern and a stereo camera system. The technique works by
projecting a color coded pattern on an object and capturing two images
with two cameras. The proposed color encoding strategy not only
increased the speed of feature matching but also increased the accuracy
of the process. We then solved the correspondence problem between the
two images by using epipolar constraint, disparity compensation based
searching range reduction, and hue correlation. The proposed method was
applied to 3D data acquisition and time efficiency was compared with
previous methods. The time efficiency of the suggested method was
improved by about 40% and reasonable accuracy was achieved.
Contact Information Byoungwoo Kim
Email: bwkim@yonsei.ac.kr
Contact Information Sunjin Yu
Email: biomerics@yonsei.ac.kr
Contact Information Sangyoun Lee
Email: syleee@yonsei.ac.kr
===================================
06. Marijana Kosmerlj, Tom
Fladsrud, Erik
Hjelmås, Einar
Snekkenes:
Face Recognition Issues in a Border Control Environment.
33-39
Electronic Edition
(link) BibTeX
Face Recognition Issues in a Border Control Environment
Marijana Kosmerlj1 Contact Information, Tom Fladsrud1 Contact
Information, Erik Hjelmås1 Contact Information and Einar
Snekkenes1
Contact Information
(1) NISlab, Department of Computer Science and
Media Technology,
Gjøvik University College, P. O. Box 191, N-2802 Gjøvik,
Norway
Abstract
Face recognition has greatly matured since the earliest forms, but
still improvements must be made before it can be applied in high
security or large scale applications. We conducted an experiment in
order to estimate percentage of Norwegian people having one or more
look-alikes in Norwegian population. The results indicate that the face
recognition technology may not be adequate for identity verification in
large scale applications. To survey the additional value of a human
supervisor, we conducted an experiment where we investigated whether a
human guard would detect false acceptances made by a computerized
system, and the role of hair in human recognition of faces. The study
showed that the human guard was able to detect almost 80% of the errors
made by the computerized system. More over, the study showed that the
ability of human guard to recognize a human face is a function of hair:
false acceptance rate was significantly higher for the images where the
hair was removed compared to where it was present.
Contact Information Marijana Kosmerlj
Email: marijana.kosmerlj@ergo.no
Contact Information Tom Fladsrud
Email: tom.fladsrud@edb.com
Contact Information Erik Hjelmås
Email: erikh@hig.no
Contact Information Einar Snekkenes
Email: einars@hig.no
===================================
07. ShengCai Liao, Zhen
Lei, XiangXin
Zhu, Zhenan
Sun, Stan
Z. Li, Tieniu
Tan:
Face Recognition Using Ordinal Features.
40-46
Electronic Edition
(link) BibTeX
Face Recognition Using Ordinal Features
ShengCai Liao1 Contact Information, Zhen Lei1 Contact Information,
XiangXin Zhu1 Contact Information, Zhenan Sun1 Contact Information,
Stan Z. Li1 Contact Information and Tieniu Tan1 Contact Information
(1) Center for Biometrics and Security
Research & National
Laboratory of Pattern Recognition, Institute of Automation, Chinese
Academy of Sciences, 95 Zhongguancun Donglu Beijing 100080, China
Abstract
In this paper, we present an ordinal feature based method for face
recognition. Ordinal features are used to represent faces. Hamming
distance of many local sub-windows is computed to evaluate differences
of two ordinal faces. AdaBoost learning is finally applied to select
most effective hamming distance based weak classifiers and build a
powerful classifier. Experiments demonstrate good results for face
recognition on the FERET database, and the power of learning ordinal
features for face recognition.
This work was supported by Chinese National 863 Projects 2004AA1Z2290
& 2004AA119050.
Contact Information ShengCai Liao
URL: http://www.cbsr.ia.ac.cn
Contact Information Zhen Lei
URL: http://www.cbsr.ia.ac.cn
Contact Information XiangXin Zhu
URL: http://www.cbsr.ia.ac.cn
Contact Information Zhenan Sun
URL: http://www.cbsr.ia.ac.cn
Contact Information Stan Z. Li
URL: http://www.cbsr.ia.ac.cn
Contact Information Tieniu Tan
URL: http://www.cbsr.ia.ac.cn
===================================
08. Walid Hizem, Emine
Krichen, Yang
Ni, Bernadette
Dorizzi, Sonia
Garcia-Salicetti:
Specific Sensors for Face Recognition.
47-54
Electronic Edition
(link) BibTeX
Specific Sensors for Face Recognition
Walid Hizem1 Contact Information, Emine Krichen1 Contact Information,
Yang Ni1 Contact Information, Bernadette Dorizzi1 Contact Information
and Sonia Garcia-Salicetti1 Contact Information
(1) Département Electronique et
Physique, Institut National des
Télécommunications, 9 Rue Charles Fourier, 91011 Evry,
France
Abstract
This paper describes an association of original hardware solutions
associated to adequate software software for human face recognition. A
differential CMOS imaging system [1] and a Synchronized flash camera
[2] have been developed to provide ambient light invariant images and
facilitate segmentation of the face from the background. This
invariance of face image demonstrated by our prototype camera systems
can result in a significant software/hardware simplification in such
biometrics applications especially on a mobile platform where the
computation power and memory capacity are both limited. In order to
evaluate our prototypes we have build a face database of 25 persons
with 4 different illumination conditions. These solutions with
appropriate cameras give a significant improvement in performance (on
the normal CCD cameras) using a simple correlation based algorithm
associated with an adequate preprocessing. Finally, we have obtained a
promising results using fusion between different sensors.
Contact Information Walid Hizem
Email: Walid.Hizem@int-evry.fr
Contact Information Emine Krichen
Email: Emine.Krichen@int-evry.fr
Contact Information Yang Ni
Email: Yang.Ni@int-evry.fr
Contact Information Bernadette Dorizzi
Email: Bernadette.Dorizzi@int-evry.fr
Contact Information Sonia Garcia-Salicetti
Email: Sonia.Salicetti@int-evry.fr
===================================
09. Xin Chen, Patrick
J. Flynn, Kevin
W. Bowyer:
Fusion of Infrared and Range Data: Multi-modal Face Images.
55-63
Electronic Edition
(link) BibTeX
Fusion of Infrared and Range Data: Multi-modal Face Images
Xin Chen1 Contact Information, Patrick J. Flynn1 Contact Information
and Kevin W. Bowyer1 Contact Information
(1) Dept. of Computer Science and Engineering,
University of Notre
Dame, Notre Dame, IN 46556, USA
Abstract
Infrared and range imagery are intriguing sensing modalities for face
recognition systems. They may offer better performance than other
modalities due to their robustness to environmental effects and
deliberate attempts to obscure identity. Furthermore, a combination of
these modalities may offer additional discrimination power. Toward this
end, we present a semi-automatic system that captures range and
infrared data of a human subject’s face, registers and integrates
multiple 3D views into one model, and applies the infrared measurements
as a registered texture map.
Contact Information Xin Chen
Email: xchen2@nd.edu
Contact Information Patrick J. Flynn
Email: flynn@nd.edu
Contact Information Kevin W. Bowyer
Email: kwb@nd.edu
===================================
10. Jian Yang, David
Zhang, Yong
Xu, Jing-Yu
Yang:
Recognize Color Face Images Using Complex Eigenfaces.
64-68
Electronic Edition
(link) BibTeX
Recognize Color Face Images Using Complex Eigenfaces
Jian Yang1 Contact Information, David Zhang1 Contact Information, Yong
Xu2 Contact Information and Jing-yu Yang3 Contact Information
(1) Department of Computing, Hong Kong
Polytechnic University,
Kowloon, Hong Kong
(2) Bio-Computing Research Center and Shenzhen
graduate school,
Harbin Institute of Technology, Shenzhen, China
(3) Department of Computer Science, Nanjing
University of Science
and Technology, Nanjing 210094, P.R. China
Abstract
A strategy of color image based human face representation is first
proposed. Then, based on this representation, complex Eigenfaces
technique is developed for facial feature extraction. Finally, we test
our idea using the AR face database. The experimental result
demonstrates that the proposed color image based complex Eigenfaces
method is more robust to illumination variations than the traditional
grayscale image based Eigenfaces.
Contact Information Jian Yang
Email: csjyang@comp.polyu.edu.hk
URL: http://www4.comp.polyu.edu.hk/~biometrics/
Contact Information David Zhang
Email: csdzhang@comp.polyu.edu.hk
URL: http://www4.comp.polyu.edu.hk/~biometrics/
Contact Information Yong Xu
Email: laterfall2@yahoo.com.cn
Contact Information Jing-yu Yang
Email: yangjy@public1.ptt.js.cn
===================================
11. Yunhong Wang, Yiding
Wang, Anil
K. Jain, Tieniu
Tan:
Face Verification Based on Bagging RBF Networks.
69-77
Electronic Edition
(link) BibTeX
Face Verification Based on Bagging RBF Networks
Yunhong Wang1 Contact Information, Yiding Wang2 Contact Information,
Anil K. Jain3 Contact Information and Tieniu Tan4 Contact Information
(1) School of Computer Science and
Engineering, Beihang
University, Beijing, 100083, China
(2) Graduate School, Chinese Academy of
Sciences, Beijing, 100049,
China
(3) Department of Computer Science &
Engineering, Michigan
State University, East Lansing, MI 48824,
(4) National Laboratory of Pattern
Recognition, Institute of
Automation, Chinese Academy of Sciences, P.O. Box 2728, Beijing 100080,
P.R. China
Abstract
Face verification is useful in a variety of applications. A face
verification system is vulnerable not only to variations in ambient
lighting, facial expression and facial pose, but also to the effect of
small sample size during the training phase. In this paper, we propose
an approach to face verification based on Radial Basis Function (RBF)
networks and bagging. The technique seeks to offset the effect of using
a small sample size during the training phase. The RBF networks are
trained using all available positive samples of a subject and a few
randomly selected negative samples. Bagging is then applied to the
outputs of these RBF-based classifiers. Theoretical analysis and
experimental results show the validity of the proposed approach.
Contact Information Yunhong Wang
Email: yhwang@buaa.edu.cn
Contact Information Yiding Wang
Email: ydwang@gscas.ac.cn
Contact Information Anil K. Jain
Email: jain@cse.msu.edu
Contact Information Tieniu Tan
Email: tnt@nlpr.ia.ac.cn
===================================
12. Wangmeng Zuo, Kuanquan
Wang, David
Zhang:
Improvement on Null Space LDA for Face Recognition: A Symmetry
Consideration.
78-84
Electronic Edition
(link) BibTeX
Improvement on Null Space LDA for Face Recognition: A Symmetry
Consideration
Wangmeng Zuo1, Kuanquan Wang1 and David Zhang2
(1) School of Computer Science and Technology,
Harbin Institute of
Technology, Harbin, 150001, China
(2) Biometrics Research Centre, Department of
Computing, The Hong
Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong
Abstract
The approximate bilateral symmetry of human face has been explored to
improve the recognition performance of some face recognition algorithms
such as Linear Discriminant Analysis (LDA) and Direct-LDA (D-LDA). In
this paper we summary the ways to generate virtual sample using facial
symmetry, and investigate the three strategies of using facial
symmetric information in the Null Space LDA (NLDA) framework. The
results of our experiments indicate that, the use of facial symmetric
information can further improve the recognition accuracy of
conventional NLDA.
===================================
13. Cheng Zhong, Tieniu
Tan, Chenghua
Xu, Jiangwei
Li:
Automatic 3D Face Recognition Using Discriminant Common Vectors.
85-91
Electronic Edition
(link) BibTeX
Automatic 3D Face Recognition Using Discriminant Common Vectors
Cheng Zhong1 Contact Information, Tieniu Tan1 Contact Information,
Chenghua Xu1 Contact Information and Jiangwei Li1 Contact Information
(1) National Laboratory of Pattern
Recognition, Institute of
Automation, Chinese Academy of Sciences, Beijing, 100080, P.R. China
Abstract
In this paper we propose a fully automatic scheme for 3D face
recognition. In our scheme, the original 3D data is automatically
converted into the normalized 3D data, then the discriminant common
vector (DCV) is introduced for 3D face recognition. We also compare DCV
with two common methods, i.e., principal component analysis (PCA) and
linear discriminant analysis (LDA). Our experiments are based on the
CASIA 3D Face Database, a challenging database with complex variations.
The experimental results show that DCV is superior to the other two
methods.
Contact Information Cheng Zhong
Email: czhong@nlpr.ia.ac.cn
Contact Information Tieniu Tan
Email: tnt@nlpr.ia.ac.cn
Contact Information Chenghua Xu
Email: chxu@nlpr.ia.ac.cn
Contact Information Jiangwei Li
Email: jwli@nlpr.ia.ac.cn
===================================
14. Xiao-Sheng Zhuang, Dao-Qing
Dai, Pong
Chi Yuen:
Face Recognition by Inverse Fisher Discriminant Features.
92-98
Electronic Edition
(link) BibTeX
Face Recognition by Inverse Fisher Discriminant Features
Xiao-Sheng Zhuang1, Dao-Qing Dai1 Contact Information and P.C. Yuen2
Contact Information
(1) Center for Computer Vision and Department
of Mathematics, Sun
Yat-Sen(Zhongshan)University, Guangzhou 510275, China
(2) Department of Computer Science, Hong Kong
Baptist University,
Hong Kong
Abstract
For face recognition task the PCA plus LDA technique is a famous
two-phrase framework to deal with high dimensional space and singular
cases. In this paper, we examine the theory of this framework: (1) LDA
can still fail even after PCA procedure. (2) Some small principal
components that might be essential for classification are thrown away
after PCA step. (3) The null space of the within-class scatter matrix
Sw contains discriminative information for classification. To eliminate
these deficiencies of the PCA plus LDA method we thus develop a new
framework by introducing an inverse Fisher criterion and adding a
constrain in PCA procedure so that the singularity phenomenon will not
occur. Experiment results suggest that this new approach works well.
Contact Information Dao-Qing Dai
Email: stsddq@mail.sysu.edu.cn
Contact Information P.C. Yuen
Email: pcyuen@comp.hkbu.edu.hk
===================================
15. Hwanjong Song, Ukil
Yang, Sangyoun
Lee, Kwanghoon
Sohn:
3D Face Recognition Based on Facial Shape Indexes with Dynamic
Programming.
99-105
Electronic Edition
(link) BibTeX
3D Face Recognition Based on Facial Shape Indexes with Dynamic
Programming
Hwanjong Song1 Contact Information, Ukil Yang1 Contact Information,
Sangyoun Lee1 Contact Information and Kwanghoon Sohn1 Contact
Information
(1) Biometrics Engineering Research Center,
Dept. of Electrical
& Electronic Eng., Yonsei University, 134 Shinchon-dong,
Seodaemun-gu, Seoul, 120-749, Korea
Abstract
This paper describes a 3D face recognition method using facial shape
indexes. Given an unknown range image, we extract invariant facial
features based on the facial geometry. We estimate the 3D head pose
using the proposed error compensated SVD method. For face recognition
method, we define and extract facial shape indexes based on facial
curvature characteristics and perform dynamic programming. Experimental
results show that the proposed method is capable of determining the
angle of faces accurately over a wide range of poses. In addition,
96.8% face recognition rate has been achieved based on the proposed
method with 300 individuals with seven different poses.
Contact Information Hwanjong Song
Email: ultrarex@diml.yonsei.ac.kr
Contact Information Ukil Yang
Email: starb612@diml.yonsei.ac.kr
Contact Information Sangyoun Lee
Email: syleee@yonsei.ac.kr
Contact Information Kwanghoon Sohn
Email: khsohn@yonsei.ac.kr
===================================
16. King Hong Cheung, Adams
Wai-Kin Kong, David
Zhang, Mohamed
Kamel, Jane
Toby You:
Revealing the Secret of FaceHashing.
106-112
Electronic Edition
(link) BibTeX
Revealing the Secret of FaceHashing
King-Hong Cheung1 Contact Information, Adams Kong1, 2 Contact
Information, David Zhang1 Contact Information, Mohamed Kamel2 Contact
Information and Jane You1 Contact Information
(1) Biometrics Research Centre, Department of
Computing, The Hong
Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong
(2) Pattern Analysis and Machine Intelligence
Lab, University of
Waterloo, 200 University Avenue West, Ontario, Canada
Abstract
Biometric authentication has attracted substantial attention over the
past few years. It has been reported recently that a new technique
called FaceHashing, which is proposed for personal authentication using
face images, has achieved perfect accuracy and zero equal error rates
(EER). In this paper, we are going to reveal that the secret of
FaceHashing in achieving zero EER is based on a false assumption. This
is done through simulating the claimants’ experiments. Thus, we would
like to alert the use of “safe” token.
Contact Information King-Hong Cheung
Email: cskhc@comp.polyu.edu.hk
Contact Information Adams Kong
Email: cswkkong@comp.polyu.edu.hk
Contact Information David Zhang
Email: csdzhang@comp.polyu.edu.hk
Contact Information Mohamed Kamel
Email: mkamel@uwaterloo.ca
Contact Information Jane You
Email: csyjia@comp.polyu.edu.hk
===================================
17. Manuele Bicego, Enrico
Grosso, Massimo
Tistarelli:
Person Authentication from Video of Faces: A Behavioral and
Physiological Approach Using Pseudo Hierarchical Hidden Markov Models.
113-120
Electronic Edition
(link) BibTeX
Person Authentication from Video of Faces: A Behavioral and
Physiological Approach Using Pseudo Hierarchical Hidden Markov Models
Manuele Bicego1, Enrico Grosso1 and Massimo Tistarelli2
(1) DEIR - University of Sassari, via Torre
Tonda 34 - 07100
Sassari, Italy
(2) DAP - University of Sassari, piazza Duomo
6 - 07041 Alghero
(SS), Italy
Abstract
In this paper a novel approach to identity verification, based on the
analysis of face video streams, is proposed, which makes use of both
physiological and behavioral features. While physical features are
obtained from the subject’s face appearance, behavioral features are
obtained by asking the subject to vocalize a given sentence. The
recorded video sequence is modelled using a Pseudo-Hierarchical Hidden
Markov Model, a new type of HMM in which the emission probability of
each state is represented by another HMM. The number of states are
automatically determined from the data by unsupervised clustering of
expressions of faces in the video. Preliminary results on real image
data show the feasibility of the proposed approach.
===================================
18. Zongying Ou, Xusheng
Tang, Tieming
Su, Pengfei
Zhao:
Cascade AdaBoost Classifiers with Stage Optimization for Face
Detection.
121-128
Electronic Edition
(link) BibTeX
Cascade AdaBoost Classifiers with Stage Optimization for Face Detection
Zongying Ou1 Contact Information, Xusheng Tang1, Tieming Su1 and
Pengfei Zhao1
(1) Key Laboratory for Precision and
Non-traditional Machining
Technology, of Ministry of Education, Dalian University of Technology,
Dalian 116024, P.R. China
Abstract
In this paper, we propose a novel feature optimization method to build
a cascade Adaboost face detector for real-time applications, such as
teleconferencing, user interfaces, and security access control.
AdaBoost algorithm selects a set of weak classifiers and combines them
into a final strong classifier. However, conventional AdaBoost is a
sequential forward search procedure using the greedy selection
strategy, the weights of weak classifiers may not be optimized. To
address this issue, we proposed a novel Genetic Algorithm post
optimization procedure for a given boosted classifier, which yields
better generalization performance.
Contact Information Zongying Ou
Email: ouzyg@dlut.edu.cn
===================================
19. Jooyoung Park, Daesung
Kang, James
T. Kwok, Sang-Woong
Lee, Bon-Woo
Hwang, Seong-Whan
Lee:
Facial Image Reconstruction by SVDD-Based Pattern De-noising.
129-135
Electronic Edition
(link) BibTeX
Facial Image Reconstruction by SVDD-Based Pattern De-noising
Jooyoung Park1, Daesung Kang1, James T. Kwok2, Sang-Woong Lee3, Bon-Woo
Hwang3 and Seong-Whan Lee3
(1) Department of Control and Instrumentation
Engineering, Korea
University, Jochiwon, Chungnam, 339-700, Korea
(2) Department of Computer Science, Hong Kong
University of
Science and Technology, Clear Water Bay, Hong Kong
(3) Department of Computer Science and
Engineering, Korea
University, Anam-dong, Seongbuk-ku, Seoul 136-713, Korea
Abstract
The SVDD (support vector data description) is one of the most
well-known one-class support vector learning methods, in which one
tries the strategy of utilizing balls defined on the feature space in
order to distinguish a set of normal data from all other possible
abnormal objects. In this paper, we consider the problem of
reconstructing facial images from the partially damaged ones, and
propose to use the SVDD-based de-noising for the reconstruction. In the
proposed method, we deal with the shape and texture information
separately. We first solve the SVDD problem for the data belonging to
the given prototype facial images, and model the data region for the
normal faces as the ball resulting from the SVDD problem. Next, for
each damaged input facial image, we project its feature vector onto the
decision boundary of the SVDD ball so that it can be tailored enough to
belong to the normal region. Finally, we obtain the image of the
reconstructed face by obtaining the pre-image of the projection, and
then further processing with its shape and texture information. The
applicability of the proposed method is illustrated via some
experiments dealing with damaged facial images.
===================================
20. Xiujuan Chai, Shiguang
Shan, Laiyun
Qing, Wen
Gao:
Pose Estimation Based on Gaussian Error Models.
136-143
Electronic Edition
(link) BibTeX
Pose Estimation Based on Gaussian Error Models
Xiujuan Chai1 Contact Information, Shiguang Shan2 Contact Information,
Laiyun Qing2 Contact Information and Wen Gao1, 2 Contact Information
(1) School of Computer Science and Technology,
Harbin Institute of
Technology, 150001 Harbin, China
(2) ICT-ISVISION Joint R&D Lab for Face
Recognition, ICT, CAS,
100080 Beijing, China
Abstract
In this paper, a new method is presented to estimate the 3D pose of
facial image based on statistical Gaussian error models. The basic idea
is that the pose angle can be computed by the orthogonal projection
computation if the specific 3D shape vector of the given person is
known. In our algorithm, Gaussian probability density function is used
to model the distributions of the 3D shape vector as well as the errors
between the orthogonal projection computation and the weak perspective
projection. By using the prior knowledge of the errors distribution,
the most likely 3D shape vector can be referred by the labeled 2D
landmarks in the given facial image according to the maximum posterior
probability theory. Refining the error term, thus the pose parameters
can be estimated by the transformed orthogonal projection formula.
Experimental results on real images are presented to give the objective
evaluation.
===================================
21. Zhong Jin, Franck
Davoine, Zhen
Lou, Jingyu
Yang:
A Novel PCA-Based Bayes Classifier and Face Analysis.
144-150
Electronic Edition
(link) BibTeX
A Novel PCA-Based Bayes Classifier and Face Analysis
Zhong Jin1, 2 Contact Information, Franck Davoine3 Contact Information,
Zhen Lou2 and Jingyu Yang2 Contact Information
(1) Centre de Visió per Computador,
Universitat Autònoma de
Barcelona, Barcelona, Spain
(2) Department of Computer Science, Nanjing
University of Science
and Technology, Nanjing, People’s Republic of China
(3) HEUDIASYC - CNRS Mixed Research Unit,
Compiègne University of
Technology, 60205 Compiègne cedex, France
Abstract
The classical Bayes classifier plays an important role in the field of
pattern recognition. Usually, it is not easy to use a Bayes classifier
for pattern recognition problems in high dimensional spaces. This paper
proposes a novel PCA-based Bayes classifier for pattern recognition
problems in high dimensional spaces. Experiments for face analysis have
been performed on CMU facial expression image database. It is shown
that the PCA-based Bayes classifier can perform much better than the
minimum distance classifier. And, with the PCA-based Bayes classifier,
we can obtain a better understanding of data.
Contact Information Zhong Jin
Email: zhong.jin@cvc.uab.es
Contact Information Franck Davoine
Email: franck.davoine@hds.utc.fr
Contact Information Jingyu Yang
Email: jyyang@mail.njust.edu.cn
===================================
22. Stan Z. Li, Rufeng
Chu, Meng
Ao, Lun
Zhang, Ran
He:
Highly Accurate and Fast Face Recognition Using Near Infrared
Images.
151-158
Electronic Edition
(link) BibTeX
Highly Accurate and Fast Face Recognition Using Near Infrared Images
Stan Z. Li1 Contact Information, RuFeng Chu1 Contact Information, Meng
Ao1 Contact Information, Lun Zhang1 Contact Information and Ran He1
Contact Information
(1) Center for Biometrics and Security
Research & National
Laboratory of Pattern Recognition, Institute of Automation, Chinese
Academy of Sciences, 95 Zhongguancun Donglu Beijing 100080, China
Abstract
In this paper, we present a highly accurate, realtime face recognition
system for cooperative user applications. The novelties are: (1) a
novel design of camera hardware, and (2) a learning based procedure for
effective face and eye detection and recognition with the resulting
imagery. The hardware minimizes environmental lighting and delivers
face images with frontal lighting. This avoids many problems in
subsequent face processing to a great extent. The face detection and
recognition algorithms are based on a local feature representation.
Statistical learning is applied to learn most effective features and
classifiers for building face detection and recognition engines. The
novel imaging system and the detection and recognition engines are
integrated into a powerful face recognition system. Evaluated in
real-world user scenario, a condition that is harder than a technology
evaluation such as Face Recognition Vendor Tests (FRVT), the system has
demonstrated excellent accuracy, speed and usability.
This work was supported by Chinese National 863 Projects 2004AA1Z2290
& 2004AA119050.
See: http://research.microsoft.com/iccv2005/demo/StanLi/IR-Face-Demo.pdf
Contact Information Stan Z. Li
URL: http://www.cbsr.ia.ac.cn
Contact Information RuFeng Chu
URL: http://www.cbsr.ia.ac.cn
Contact Information Meng Ao
URL: http://www.cbsr.ia.ac.cn
Contact Information Lun Zhang
URL: http://www.cbsr.ia.ac.cn
Contact Information Ran He
URL: http://www.cbsr.ia.ac.cn
===================================
23. Jaewon Sung, Daijin
Kim:
Background Robust Face Tracking Using Active Contour Technique
Combined Active Appearance Model.
159-165
Electronic Edition
(link) BibTeX
Background Robust Face Tracking Using Active Contour Technique Combined
Active Appearance Model
Jaewon Sung1 Contact Information and Daijin Kim1 Contact Information
(1) Biometrics Engineering Research Center
(BERC), Pohang
University of Science and Technology,
Abstract
This paper proposes a two stage AAM fitting algorithm that is robust to
the cluttered background and a large motion. The proposed AAM fitting
algorithm consists of two alternative procedures: the active contour
fitting to find the contour sample that best fits the face image and
then the active appearance model fitting over the best selected
contour. Experimental results show that the proposed active contour
based AAM provides better accuracy and convergence characteristics in
terms of RMS error and convergence rate, respectively, than the
existing robust AAM.
This work was supported by the Korea Science and Engineering Foundation
(KOSEF) through the Biometrics Engineering Research Center (BERC) at
Yonsei University.
Contact Information Jaewon Sung
Email: jwsung@postech.ac.kr
Contact Information Daijin Kim
Email: dkim@postech.ac.kr
===================================
24. Hui Kong, Xuchun
Li, Jian-Gang
Wang, Chandra
Kambhamettu:
Ensemble LDA for Face Recognition.
166-172
Electronic Edition
(link) BibTeX
Ensemble LDA for Face Recognition
Hui Kong1, Xuchun Li1, Jian-Gang Wang2 and Chandra Kambhamettu3
(1) School of Electrical and Electronic
Engineering, Nanyang
Technological University, 50 Nanyang Ave.,639798, Singapore
(2) Institute for Infocomm Research, 21 Heng
Mui Keng
Terrace,119613, Singapore
(3) Department of Computer and Information
Science, University of
Delaware,Newark, DE 19716-2712,
Abstract
Linear Discriminant Analysis (LDA) is a popular feature extraction
technique for face image recognition and retrieval. However, It often
suffers from the small sample size problem when dealing with the high
dimensional face data. Two-step LDA (PCA+LDA) [1][2][3] is a class of
conventional approaches to address this problem. But in many cases,
these LDA classifiers are overfitted to the training set and discard
some useful discriminative information. In this paper, by analyzing the
overfitting problem for the two-step LDA approach, a framework of
Ensemble Linear Discriminant Analysis (EnLDA) is proposed for face
recognition with small number of training samples. In EnLDA, a
Boosting-LDA (B-LDA) and a Random Sub-feature LDA (RS-LDA) schemes are
incorporated together to construct the total weak-LDA classifier
ensemble. By combining these weak-LDA classifiers using majority voting
method, recognition accuracy can be significantly improved. Extensive
experiments on two public face databases verify the superiority of the
proposed EnLDA over the state-of-the-art algorithms in recognition
accuracy.
===================================
25. Enrique Argones-Rúa, Josef
Kittler, José
Luis Alba-Castro, Daniel
González-Jiménez:
Information Fusion for Local Gabor Features Based Frontal Face
Verification.
173-181
Electronic Edition
(link) BibTeX
Information Fusion for Local Gabor Features Based Frontal Face
Verification
Enrique Argones Rúa1, Josef Kittler2, Jose Luis Alba Castro1 and
Daniel
González Jiménez1
(1) Signal Theory Group, Signal Theory and
Communications Dep.,
University of Vigo, 36310, Spain
(2) Centre for Vision, Speech and Signal
Processing, University of
Surrey, Guildford GU2 7XH, UK
Abstract
We address the problem of fusion in a facial component approach to face
verification. In our study the facial components are local image
windows defined on a regular grid covering the face image. Gabor jets
computed in each window provide face representation. A fusion
architecture is proposed to combine the face verification evidence
conveyed by each facial component. A novel modification of the linear
discriminant analysis method is presented that improves fusion
performance as well as providing a basis for feature selection. The
potential of the method is demonstrated in experiments on the XM2VTS
data base. The references of this article are secured to subscribers.
===================================
26. Sreekar Krishna, John
Black, Sethuraman
Panchanathan:
Using Genetic Algorithms to Find Person-Specific Gabor Feature
Detectors for Face Indexing and Recognition.
182-191
Electronic Edition
(link) BibTeX
Using Genetic Algorithms to Find Person-Specific Gabor Feature
Detectors for Face Indexing and Recognition
Sreekar Krishna1 Contact Information, John Black1 and Sethuraman
Panchanathan1
(1) Center for Cognitive Ubiquitous Computing
(CUbiC), Arizona
State University, Tempe AZ- 85281,
Abstract
In this paper, we propose a novel methodology for face recognition,
using person-specific Gabor wavelet representations of the human face.
For each person in a face database a genetic algorithm selects a set of
Gabor features (each feature consisting of a particular Gabor wavelet
and a corresponding (x, y) face location) that extract facial features
that are unique to that person. This set of Gabor features can then be
applied to any normalized face image, to determine the presence or
absence of those characteristic facial features. Because a unique set
of Gabor features is used for each person in the database, this method
effectively employs multiple feature spaces to recognize faces, unlike
other face recognition algorithms in which all of the face images are
mapped into a single feature space. Face recognition is then
accomplished by a sequence of face verification steps, in which the
query face image is mapped into the feature space of each person in the
database, and compared to the cluster of points in that space that
represents that person. The space in which the query face image most
closely matches the cluster is used to identify the query face image.
To evaluate the performance of this method, it is compared to the most
widely used subspace method for face recognition: Principle Component
Analysis (PCA). For the set of 30 people used in this experiment, the
face recognition rate of the proposed method is shown to be
substantially higher than PCA.
Contact Information Sreekar Krishna
Email: Sreekar.Krishna@asu.edu
===================================
27. Bingpeng Ma, Fei
Yang, Wen
Gao, Baochang
Zhang:
The Application of Extended Geodesic Distance in Head Poses
Estimation.
192-198
Electronic Edition
(link) BibTeX
The Application of Extended Geodesic Distance in Head Poses Estimation
Bingpeng Ma1, 3, Fei Yang1, 3, Wen Gao1, 2, 3 and Baochang Zhang2
(1) Institute of Computing Technology, Chinese
Academy of
Sciences, Beijing 100080, China
(2) Department of Computer Science and
Engineering, Harbin
Institute of Technology, Harbin, 150001, China
(3) Graduate School of the Chinese Academy of
Sciences, Beijing
100039, China
Abstract
This paper we proposes an extended geodesic distance for head pose
estimation. In ISOMAP, two approaches are applied for neighborhood
construction, called k-neighbor and ε-neighbor. For the k-neighbor, the
number of the neighbors is a const k. For the other one, all the
distances between the neighbors is less than ε. Either the k-neighbor
or the ε-neighbor neglects the difference of each point. This paper
proposes an new method called the kc-neighbor, in which the neighbors
are defined based on c time distance of the k nearest neighbor, which
can avoid the neighborhood graph unconnected and improve the accuracy
in computing neighbors. In this paper, SVM rather than MDS is applied
to classify head poses after the geodesic distances are computed. The
experiments show the effectiveness of the proposed method.
===================================
28. Bindang Xue, Wenfang
Xue, Zhiguo
Jiang:
Improved Parameters Estimating Scheme for E-HMM with Application to
Face Recognition.
199-205
Electronic Edition
(link) BibTeX
Improved Parameters Estimating Scheme for E-HMM with Application to
Face Recognition
Bindang Xue1 Contact Information, Wenfang Xue2 Contact Information and
Zhiguo Jiang1 Contact Information
(1) Image processing center, Beihang
University, Beijng 100083,
China
(2) Institute of Automation, Chinese Academy
of Sciences, 100088,
Beijing, China
Abstract
This paper presents a new scheme to initialize and re-estimate Embedded
Hidden Markov Models(E-HMM) parameters for face recognition. Firstly,
the current samples were assumed to be a subset of the whole training
samples, after the training process, the E-HMM parameters and the
necessary temporary parameters in the parameter re-estimating process
were saved for the possible retraining use. When new training samples
were added to the training samples, the saved E-HMM parameters were
chosen as the initial model parameter. Then the E-HMM was retrained
based on the new samples and the new temporary parameters were
obtained. Finally, these temporary parameters were combined with saved
temporary parameters to form the final E-HMM parameters for
representing one person face. Experiments on ORL databases show the
improved method is effective.
===================================
29. Cuiping Zhang, Fernand
S. Cohen:
Component-Based Active Appearance Models for Face Modelling.
206-212
Electronic Edition
(link) BibTeX
Component-Based Active Appearance Models for Face Modelling
Cuiping Zhang1 Contact Information and Fernand S. Cohen1 Contact
Information
(1) Eletrical and Computer Engineering
Department, Drexel
University, Philadelphia PA 19104, USA
Abstract
The Active Appearance Model (AAM) is a powerful tool for modelling a
class of objects such as faces. However, it is common to see a far from
optimal local alignment when attempting to model a face that is quite
different from training faces. In this paper, we present a novel
component-based AAM algorithm. By modelling three components inside the
face area, then combining them with a global AAM, face alignment
achieves both local as well as global optimality. We also utilize local
projection models to locate face contour points. Compared to the
original AAM, our experiment shows that this new algorithm is more
accurate in shape localization as the decoupling allows more
flexibility. Its insensitivity to different face background patterns is
also clearly manifested.
Contact Information Cuiping Zhang
Email: zcp@cbis.ece.drexel.edu
Contact Information Fernand S. Cohen
Email: fscohen@cbis.ece.drexel.edu
===================================
Fingerprint
30. Julian Fiérrez-Aguilar,
Yi
Chen, Javier
Ortega-Garcia, Anil
K. Jain:
Incorporating Image Quality in Multi-algorithm Fingerprint
Verification.
213-220
Electronic Edition
(link) BibTeX
Incorporating Image Quality in Multi-algorithm Fingerprint Verification
Julian Fierrez-Aguilar1 Contact Information, Yi Chen2 Contact
Information, Javier Ortega-Garcia1 Contact Information and Anil K.Jain2
Contact Information
(1) ATVS, Escuela Politecnica Superior,
Universidad Autonoma de
Madrid, Avda. Francisco Tomas y Valiente, 11 Campus de Cantoblanco
28049 Madrid, Spain
(2) Department of Computer Science and
Engineering, Michigan State
University, East Lansing, MI 48823, USA
Abstract
The effect of image quality on the performance of fingerprint
verification is studied. In particular, we investigate the performance
of two fingerprint matchers based on minutiae and ridge information as
well as their score-level combination under varying fingerprint image
quality. The ridge-based system is found to be more robust to image
quality degradation than the minutiae-based system. We exploit this
fact by introducing an adaptive score fusion scheme based on automatic
quality estimation in the spatial frequency domain. The proposed scheme
leads to enhanced performance over a wide range of fingerprint image
quality.
Contact Information Julian Fierrez-Aguilar
Email: julian.fierrez@uam.es
Contact Information Yi Chen
Email: chenyi1@cse.msu.edu
Contact Information Javier Ortega-Garcia
Email: javier.ortega@uam.es
Contact Information Anil K.Jain
Email: jain@cse.msu.edu
===================================
31. A. Antonelli, Raffaele
Cappelli, Dario
Maio, Davide
Maltoni:
A New Approach to Fake Finger Detection Based on Skin Distortion.
221-228
Electronic Edition
(link) BibTeX
A New Approach to Fake Finger Detection Based on Skin Distortion ,
A. Antonelli1 Contact Information, R. Cappelli1 Contact Information,
Dario Maio1 Contact Information and Davide Maltoni1 Contact Information
(1) Biometric System Laboratory - DEIS,
University of Bologna, via
Sacchi 3, 47023 Cesena, Italy
Abstract
This work introduces a new approach for discriminating real fingers
from fakes, based on the analysis of human skin elasticity. The user is
required to move the finger once it touches the scanner surface, thus
deliberately producing skin distortion. A multi-stage feature-
extraction technique captures and processes the significant information
from a sequence of frames acquired during the finger movement; this
information is encoded as a sequence of DistortionCodes and further
analyzed to determine the nature of the finger. The experimentation
carried out on a database of real and fake fingers shows that the
performance of the new approach is very promising.
This work was partially supported by European Commission (BioSec - FP6
IST-2002-001766).
Patent pending(IT #BO2005A000399).
Contact Information A. Antonelli
Email: athos@csr.unibo.it
Contact Information R. Cappelli
Email: cappelli@csr.unibo.it
Contact Information Dario Maio
Email: maio@csr.unibo.it
Contact Information Davide Maltoni
Email: maltoni@csr.unibo.it
===================================
32. Sanghoon Lee, Chulhan
Lee, Jaihie
Kim:
Model-Based Quality Estimation of Fingerprint Images.
229-235
Electronic Edition
(link) BibTeX
A New Approach to Fake Finger Detection Based on Skin Distortion ,
A. Antonelli1 Contact Information, R. Cappelli1 Contact Information,
Dario Maio1 Contact Information and Davide Maltoni1 Contact Information
(1) Biometric System Laboratory - DEIS,
University of Bologna, via
Sacchi 3, 47023 Cesena, Italy
Abstract
This work introduces a new approach for discriminating real fingers
from fakes, based on the analysis of human skin elasticity. The user is
required to move the finger once it touches the scanner surface, thus
deliberately producing skin distortion. A multi-stage feature-
extraction technique captures and processes the significant information
from a sequence of frames acquired during the finger movement; this
information is encoded as a sequence of DistortionCodes and further
analyzed to determine the nature of the finger. The experimentation
carried out on a database of real and fake fingers shows that the
performance of the new approach is very promising.
This work was partially supported by European Commission (BioSec - FP6
IST-2002-001766).
Patent pending(IT #BO2005A000399).
Contact Information A. Antonelli
Email: athos@csr.unibo.it
Contact Information R. Cappelli
Email: cappelli@csr.unibo.it
Contact Information Dario Maio
Email: maio@csr.unibo.it
Contact Information Davide Maltoni
Email: maltoni@csr.unibo.it
===================================
33. J. S. Chen, Y.
S. Moon:
A Statistical Evaluation Model for Minutiae-Based Automatic
Fingerprint Verification Systems.
236-243
Electronic Edition
(link) BibTeX
A Statistical Evaluation Model for Minutiae-Based Automatic Fingerprint
Verification Systems
J.S. Chen1 Contact Information and Y.S. Moon1 Contact Information
(1) Department of Computer Science and
Engineering, The Chinese
University of Hong Kong, Shatin, N. T., Hong Kong
Abstract
Evaluation of the reliability of an Automatic Fingerprint Verification
System (AFVS) is usually performed by applying it to a fingerprint
database to get the verification accuracy. However, such an evaluation
process might be quite time consuming especially for big fingerprint
databases. This may prolong the developing cycles of AFVSs and thus
increase the cost. Also, comparison of the reliability of different
AFVSs may be unfair if different fingerprint databases are used. In
this paper, we propose a solution to solve these problems by creating
an AFVS evaluation model which can be used for verification accuracy
prediction and fair reliability comparison. Experimental results show
that our model can predict the performance of a real AFVS pretty
satisfactorily.
Contact Information J.S. Chen
Email: jschen@cse.cuhk.edu.hk
Contact Information Y.S. Moon
Email: ysmoon@cse.cuhk.edu.hk
===================================
34. Geppy Parziale, Eva
Diaz-Santana, Rudolf
Hauke:
The Surround ImagerTM: A Multi-camera Touchless Device to
Acquire 3D Rolled-Equivalent Fingerprints.
244-250
Electronic Edition
(link) BibTeX
The Surround ImagerTM: A Multi-camera Touchless Device to Acquire 3D
Rolled-Equivalent Fingerprints
Geppy Parziale1 Contact Information, Eva Diaz-Santana1 Contact
Information and Rudolf Hauke1 Contact Information
(1) TBS North America Inc. 12801, Worldgate
Drive, Herndon, VA
20170, USA
Abstract
The Surround ImagerTM, an innovative multi-camera touchless device able
to capture rolled-equivalent fingerprints, is here presented for the
first time. Due to the lack of contact between the elastic skin of the
finger and any rigid surface, the acquired images present no
deformation. The multi-camera system acquires different finger views
that are combined together to provide a 3D representation of the
fingerprint. This new representation leads to a new definition of
minutiae bringing new challenges in the field of fingerprint
recognition.
Contact Information Geppy Parziale
Email: geppy.parziale@tbsinc.com
Contact Information Eva Diaz-Santana
Email: eva.diaz-santana@tbsinc.com
Contact Information Rudolf Hauke
Email: rudolf.hauke@tbsinc.com
===================================
35. Xuchu Wang, Jianwei
Li, Yanmin
Niu, Weimin
Chen, Wei
Wang:
Extraction of Stable Points from Fingerprint Images Using Zone
Could-be-in Theorem.
251-257
Electronic Edition
(link) BibTeX
Extraction of Stable Points from Fingerprint Images Using Zone
Could-be-in Theorem
Xuchu Wang1 Contact Information, Jianwei Li1 Contact Information,
Yanmin Niu2, Weimin Chen1 and Wei Wang1
(1) Key Lab on Opto-Electronic Technique of
State Education
Ministry, Chongqing University, 400044, Chongqing, P.R. China
(2) College of Physics and Information
Techniques, Chongqing
Normal University, 400047, Chongqing, P.R.China
Abstract
This paper presents a novel zone Could-be-in theorem, and applies it to
interpret and extract singular points (cores and deltas) and estimate
directions of cores in a fingerprint image. Where singular points are
regarded as stable points (attracting points and rejecting points just
according to their clockwise or anticlockwise rotation), and pattern
zones are stable zones. Experimental results validate the theorem. The
corresponding algorithm is compared with popular Poincaré index
algorithm under two new indices: reliability index (RI) and accuracy
cost (AC) in FVC2004 datasets. The proposed algorithm are higher 36.49%
in average RI, less 2.47 in average AC, and the advantage is more
remarkable with the decrease of block size.
Contact Information Xuchu Wang
Email: Seadrift@sina.com
Contact Information Jianwei Li
Email: jwli@cqu.edu.cn
===================================
36. Wonchurl Jang, Deoksoo
Park, Dongjae
Lee, Sung-jae
Kim:
Fingerprint Image Enhancement Based on a Half Gabor Filter.
258-264
Electronic Edition
(link) BibTeX
Fingerprint Image Enhancement Based on a Half Gabor Filter
Wonchurl Jang1 Contact Information, Deoksoo Park1 Contact Information,
Dongjae Lee1 Contact Information and Sung-jae Kim1 Contact Information
(1) Samsung Electronics, SoC R&D Center,
Korea
Abstract
The performance of a fingerprint recognition system relies on the
quality of the input fingerprint images. Several researches have been
studied on the enhancement of fingerprint images for fingerprint
recognition. The representative enhancement is the adaptive filtering
method based on Gabor filter (GF). However, this method is
computationally expensive due to the large mask size of GF. In this
paper, we propose a half Gabor filter (HGF), which is suitable for fast
implementation in spatial domain. The HGF is a modified filter which
preserves the frequency property of a GF and reduces the mask size of
the GF. Compared with the GF, the HGF not only reduces the processing
time approximately by 41% but also enhances the fingerprint image which
is as reliable as the GF.
Keywords: Gabor Filter, Gabor Enhancement, Fingerprint Image
Enhancement, Adaptive Filter.
Contact Information Wonchurl Jang
Email: wc7.jang@samsung.com
Contact Information Deoksoo Park
Email: deoksoo.park@samsung.com
Contact Information Dongjae Lee
Email: djae.lee@samsung.com
Contact Information Sung-jae Kim
Email: sungjae.kim@samsung.com
===================================
37. Denis Baldisserra, Annalisa
Franco, Dario
Maio, Davide
Maltoni:
Fake Fingerprint Detection by Odor Analysis.
265-272
Electronic Edition
(link) BibTeX
Fake Fingerprint Detection by Odor Analysis ,
Denis Baldisserra1 Contact Information, Annalisa Franco1 Contact
Information, Dario Maio1 Contact Information and Davide Maltoni1
Contact Information
(1) DEIS, Università di Bologna, Viale
Risorgimento 2, 40136
Bologna, Italy
Abstract
This work proposes a novel approach to secure fingerprint scanners
against the presentation of fake fingerprints. An odor sensor
(electronic nose) is used to sample the odor signal and an ad-hoc
algorithm allows to discriminate the finger skin odor from that of
other materials such as latex, silicone or gelatin, usually employed to
forge fake fingerprints. The experimental results confirm the
effectiveness of the proposed approach.
This work was partially supported by European Commission (BioSec - FP6
IST-2002-001766).
Patent Pending (IT #BO2005A000398).
Contact Information Denis Baldisserra
Email: baldisse@csr.unibo.it
Contact Information Annalisa Franco
Email: franco@csr.unibo.it
Contact Information Dario Maio
Email: maio@csr.unibo.it
Contact Information Davide Maltoni
Email: maltoni@csr.unibo.it
===================================
38. Xiaohui Xie, Fei
Su, Anni
Cai:
Ridge-Based Fingerprint Recognition.
273-279
Electronic Edition
(link) BibTeX
Ridge-Based Fingerprint Recognition
Xiaohui Xie1, Fei Su1 and Anni Cai1
(1) ,
Abstract
A new fingerprint matching method is proposed in this paper, with which
two fingerprint skeleton images are matched directly. In this method,
an associate table is introduced to describe the relation of a ridge
with its neighbor ridges, so the whole ridge pattern can be easily
handed. In addition, two unique similarity measures, one for ridge
curves, another for ridge patterns, are defined with the elastic
distortion taken into account. Experiment results on several databases
demonstrate the effectiveness and robustness of the proposed method.
Keywords: fingerprint recognition, point-pattern matching, ridge
sampling, ridge matching.
===================================
39. Koji Sakata, Takuji
Maeda, Masahito
Matsushita, Koichi
Sasakawa, Hisashi
Tamaki:
Fingerprint Authentication Based on Matching Scores with Other Data.
280-286
Electronic Edition
(link) BibTeX
Fingerprint Authentication Based on Matching Scores with Other Data
Koji Sakata1, Takuji Maeda1, Masahito Matsushita1, Koichi Sasakawa1 and
Hisashi Tamaki2
(1) Advanced Technology R&D Center,
Mitsubishi Electric
Corporation, 8-1-1, Tsukaguchi-Honmachi, Amagasaki, Hyogo, 881-8661,
Japan
(2) Faculty of Engineering, Kobe University,
1-1, Rokkodai, Nada,
Kobe, Hyogo, 657-8501, Japan
Abstract
A method of person authentication based on matching scores with the
fingerprint data of others is proposed. Fingerprint data of others is
prepared in advance as a set of representative data. Input fingerprint
data is verified against the representative data, and the person
belonging to the fingerprint is confirmed from the set of matching
scores. The set of scores can be thought of as a feature vector, and is
compared with the feature vector already enrolled. In this paper, the
mechanism of the proposed method, the person authentication system
using this method are described, and its advantage. Moreover, the
simple criterion and selection method of the representative data are
discussed. The basic performance when general techniques are used for
the classifier is FNMR-3.6% at FMR-0.1%.
===================================
40. Jun-Ki Min, Jin-Hyuk
Hong, Sung-Bae
Cho:
Effective Fingerprint Classification by Localized Models of Support
Vector Machines.
287-293
Electronic Edition
(link) BibTeX
Effective Fingerprint Classification by Localized Models of Support
Vector Machines
Jun-Ki Min1 Contact Information, Jin-Hyuk Hong1 Contact Information and
Sung-Bae Cho1 Contact Information
(1) Department of Computer Science, Yonsei
University, Biometrics
Engineering Research Center, 134 Shinchon-dong, Sudaemoon-ku, Seoul
120-749, Korea
Abstract
Fingerprint classification is useful as a preliminary step of the
matching process and is performed in order to reduce searching time.
Various classifiers like support vector machines (SVMs) have been used
to fingerprint classification. Since the SVM which achieves high
accuracy in pattern classification is a binary classifier, we propose a
classifier-fusion method, multiple decision templates (MuDTs). The
proposed method extracts several clusters of different characteristics
from each class of fingerprints and constructs localized classification
models in order to overcome restrictions to ambiguous fingerprints.
Experimental results show the feasibility and validity of the proposed
method.
Contact Information Jun-Ki Min
Email: loomlike@sclab.yonsei.ac.kr
Contact Information Jin-Hyuk Hong
Email: hjinh@sclab.yonsei.ac.kr
Contact Information Sung-Bae Cho
Email: sbcho@cs.yonsei.ac.kr
===================================
41. Xiaosi Zhan, Zhaocai
Sun, Yilong
Yin, Yayun
Chu:
Fingerprint Ridge Distance Estimation: Algorithms and the
Performance.
294-301
Electronic Edition
(link) BibTeX
Fingerprint Ridge Distance Estimation: Algorithms and the Performance
Xiaosi Zhan1 Contact Information, Zhaocai Sun2 Contact Information,
Yilong Yin2 Contact Information and Yayun Chu1 Contact Information
(1) Computer Department, Fuyan Normal College,
236032, Fuyang,
China
(2) School of Computer Science &
Technology, Shandong
University, 250100, Jinan, China
Abstract
Ridge distance is one important attribute of the fingerprint image and
it also is one important parameter in the fingerprint enhancement. It
is important for improving the AFIS’s performance to estimate the ridge
distance correctly. The paper discusses the representative fingerprint
ridge distance estimation algorithms and the performance of these
algorithms. The most common fingerprint ridge distance estimation
algorithm is based on block-level and estimates the ridge distance by
calculating the number of cycle pattern in the block fingerprint image.
The traditional Fourier transform spectral analysis method has been
also applied to estimate the fingerprint ridge distance. The next kind
of method is based on the statistical window. Another novel fingerprint
ridge distance estimation method is based on the region-level which
regards the region with the consistent orientation as the statistical
region. One new method obtains the fingerprint ridge distance from the
continuous Fourier spectrum. After discussing the dominant algorithm
thought, the paper analyzes the performance of each algorithm.
Supported by the National Natural Science Foundation of China under
Grant No. 06403010, Shandong Province Science Foundation of China under
Grant No.Z2004G05 and Anhui Province Education Department Science
Foundation of China under Grant No.2005KJ089.
Contact Information Xiaosi Zhan
Email: xiaoszhan@263.net
Contact Information Zhaocai Sun
Email: sunnykiller@126.com
Contact Information Yilong Yin
Email: ylyin@sdu.edu.cn
Contact Information Yayun Chu
Email: chuyayun.fync@163.com
===================================
42. Xinjian Chen, Jie
Tian, Yangyang
Zhang, Xin
Yang:
Enhancement of Low Quality Fingerprints Based on Anisotropic
Filtering.
302-308
Electronic Edition
(link) BibTeX
Enhancement of Low Quality Fingerprints Based on Anisotropic Filtering
Xinjian Chen1 Contact Information, Jie Tian1 Contact Information,
Yangyang Zhang1 Contact Information and Xin Yang1 Contact Information
(1) Center for Biometrics and Security
Research, Key Laboratory of
Complex Systems and Intelligence Science, Institute of Automation,
Chinese Academy of Sciences, Graduate School of the Chinese Academy of
Science, P.O. Box 2728, Beijing 100080, China
Abstract
The enhancement of the low quality fingerprint is a difficult and
challenge task. This paper proposes an efficient algorithm based on
anisotropic filtering to enhance the low quality fingerprint. In our
algorithm, an orientation filed estimation with feedback method was
proposed to compute the accurate fingerprint orientation. The
gradient-based approach was firstly used to compute the coarse
orientation. Then the reliability of orientation was computed from the
gradient image. If the reliability of the estimated orientation is less
than pre-specified threshold, the orientation will be corrected by the
mixed orientation model. And an anisotropic filtering was used to
enhance the fingerprint, with the advantages of its efficient ridge
enhancement and its robustness against noise in the fingerprint image.
The proposed algorithm has been evaluated on the databases of
Fingerprint verification competition (FVC2004). Experimental results
confirm that the proposed algorithm is effective and robust for the
enhancement of the low quality fingerprint.
This paper is supported by the Project of National Science Fund for
Distinguished Young Scholars of China under Grant No. 60225008, the Key
Project of National Natural Science Foundation of China under Grant No.
60332010, the Project for Young Scientists’ Fund of National Natural
Science Foundation of China under Grant No.60303022, and the Project of
Natural Science Foundation of Beijing under Grant No.4052026.
Contact Information Xinjian Chen
URL: http://www.fingerpass.net
Contact Information Jie Tian
Email: tian@doctor.com
URL: http://www.fingerpass.net
Contact Information Yangyang Zhang
URL: http://www.fingerpass.net
Contact Information Xin Yang
URL: http://www.fingerpass.net
===================================
43. Sharat Chikkerur, Alexander
N. Cartwright, Venu
Govindaraju:
K-plet and Coupled BFS: A Graph Based Fingerprint Representation and
Matching Algorithm.
309-315
Electronic Edition
(link) BibTeX
K-plet and Coupled BFS: A Graph Based Fingerprint Representation and
Matching Algorithm
Sharat Chikkerur1 Contact Information, Alexander N. Cartwright1 Contact
Information and Venu Govindaraju1 Contact Information
(1) Center for Unified Biometrics and Sensors,
University at
Buffalo, NY, USA
Abstract
In this paper, we present a new fingerprint matching algorithm based on
graph matching principles. We define a new representation called K-plet
to encode the local neighborhood of each minutiae. We also present CBFS
(Coupled BFS), a new dual graph traversal algorithm for consolidating
all the local neighborhood matches and analyze its computational
complexity. The proposed algorithm is robust to non-linear distortion.
Ambiguities in minutiae pairings are solved by employing a dynamic
programming based optimization approach. We present an experimental
evaluation of the proposed approach and showed that it exceeds the
performance of the NIST BOZORTH3 [3] matching algorithm.
Contact Information Sharat Chikkerur
Email: ssc5@buffalo.edu
Contact Information Alexander N. Cartwright
Email: anc@buffalo.edu
Contact Information Venu Govindaraju
Email: govind@buffalo.edu
===================================
44. Koichi Ito, Ayumi
Morita, Takafumi
Aoki, Hiroshi
Nakajima, Koji
Kobayashi, Tatsuo
Higuchi:
A Fingerprint Recognition Algorithm Combining Phase-Based Image
Matching and Feature-Based Matching.
316-325
Electronic Edition
(link) BibTeX
A Fingerprint Recognition Algorithm Combining Phase-Based Image
Matching and Feature-Based Matching
Koichi Ito1 Contact Information, Ayumi Morita1, Takafumi Aoki1, Hiroshi
Nakajima2, Koji Kobayashi2 and Tatsuo Higuchi3
(1) Graduate School of Information Sciences,
Tohoku University,
Sendai 980–8579, Japan
(2) Yamatake Corporation, Isehara 259–1195,
Japan
(3) Faculty of Engineering, Tohoku Institute
of Technology, Sendai
982–8577, Japan
Abstract
This paper proposes an efficient fingerprint recognition algorithm
combining phase-based image matching and feature-based matching. The
use of Fourier phase information of fingerprint images makes possible
to achieve robust recognition for weakly impressed, low-quality
fingerprint images. Experimental evaluations using two different types
of fingerprint image databases demonstrate efficient recognition
performance of the proposed algorithm compared with a typical
minutiae-based algorithm and the conventional phase-based algorithm.
Contact Information Koichi Ito
Email: ito@aoki.ecei.tohoku.ac.jp
===================================
45. Hiroshi Nakajima, Koji
Kobayashi, Makoto
Morikawa, Atsushi
Katsumata, Koichi
Ito, Takafumi
Aoki, Tatsuo
Higuchi:
Fast and Robust Fingerprint Identification Algorithm and Its
Application to Residential Access Controller.
326-333
Electronic Edition
(link) BibTeX
Fast and Robust Fingerprint Identification Algorithm and Its
Application to Residential Access Controller
Hiroshi Nakajima1, Koji Kobayashi2, Makoto Morikawa3, Atsushi
Katsumata3, Koichi Ito4, Takafumi Aoki4 and Tatsuo Higuchi5
(1) Building Systems Company, Yamatake
Corporation, 54 Suzukawa,
Isehara, Kanagawa 259-1195, Japan
(2) Building Systems Company, Yamatake
Corporation, 2-15-1 Kounan,
Minato, Tokyo 108-6030, Japan
(3) Research and Development Center, Yamatake
Corporation, 1-12-2
Kawana, Fujisawa, Kanagawa 251-8522, Japan
(4) Graduate School of Information Science,
Tohoku University, 6-6
Aoba, Aramaki, Aoba, Sendai, Miyagi 980-8579, Japan
(5) Faculty of Engineering, Tohoku Institute
of Technology, 35-1
Kasumi, Yagiyama, Taihaku, Sendai, Miyagi 982-8577, Japan
Abstract
A novel fingerprint recognition algorithm suitable for poor quality
fingerprint is proposed, and implementation considerations to realize
fingerprint recognition access controllers for residential applications
are discussed. It is shown that optimizing spatial sampling interval of
fingerprint image has equivalent effect of optimizing high limit
frequency of low-pass filter in the process of phase based correlation.
The processing time is 83% shorter for the former than the latter. An
ASIC has been designed, and it is shown that fingerprint matching based
access controller for residential applications can be successfully
realized.
===================================
46. Choonwoo Ryu, Jihyun
Moon, Bongku
Lee, Hakil
Kim:
Design of Algorithm Development Interface for Fingerprint
Verification Algorithms.
334-340
Electronic Edition
(link) BibTeX
Design of Algorithm Development Interface for Fingerprint Verification
Algorithms
Choonwoo Ryu1 Contact Information, Jihyun Moon1 Contact Information,
Bongku Lee1 Contact Information and Hakil Kim1 Contact Information
(1) Biometrics Engineering Research Center
(BERC), School of
Information and Communication Engineering, INHA Unversity, Incheon,
Korea
Abstract
This paper proposes a programming interface in order to standardize
low-level functional modules that are commonly employed in
minutiae-based fingerprint verification algorithms. The interface,
called FpADI, defines the protocols, data structures and operational
mechanism of the functions. The purpose of designing FpADI is to
develop a minutiae-based fingerprint verification algorithm
cooperatively and to evaluate the algorithm efficiently. In a
preliminary experiment, fingerprint feature extraction algorithms are
implemented using FpADI and an application program, called FpAnalyzer,
is developed in order to evaluate the performance of the implemented
algorithms by visualizing the information in the FpADI data structures.
Contact Information Choonwoo Ryu
Email: cwryu@vision.inha.ac.kr
Contact Information Jihyun Moon
Email: jhmoon@vision.inha.ac.kr
Contact Information Bongku Lee
Email: bklee@vision.inha.ac.kr
Contact Information Hakil Kim
Email: hikim@vision.inha.ac.kr
===================================
47. Mark B. Edwards, G.
E. Torrens, T.
A. Bhamra:
The Use of Fingerprint Contact Area for Biometric Identification.
341-347
Electronic Edition
(link) BibTeX
The Use of Fingerprint Contact Area for Biometric Identification
M.B. Edwards1 Contact Information, G.E. Torrens1 and T.A. Bhamra1
(1) Extremities Performance Research Group,
Department of Design
and Technology, Loughborough University, Loughborough, LE11 3TU, UK
Abstract
This paper details the potential use of finger contact area measurement
in combination with existing fingerprint comparison technology for the
verification of user identity. Research highlighted includes
relationships between finger contact area, pressure applied and other
physical characteristics.. With the development of small scale
fingerprint readers it is starting to be possible to incorporate these
into a wide range of technologies. Analysis of finger pressure and
contact area can enhance fingerprint based biometric security systems.
The fingertip comprises a range of biological materials which give it
complex mechanical properties. These properties govern the way in which
a fingertip deforms under load. Anthropometric measurements were taken
from 11 males and 5 females along with fingerprint area measurements.
Strong correlations were found between fingerprint area and many other
measurements, including hand length. Notably there were more strong
correlations for the female group than for the male. This pilot study
indicates the feasibility of fingerprint area analysis for biometric
identification. This work is part of a long term program of human
physical characterization.
Contact Information M.B. Edwards
Email: m.b.edwards@lboro.ac.uk
===================================
48. Chulhan Lee, Sanghoon
Lee, Jaihie
Kim, Sung-Jae
Kim:
Preprocessing of a Fingerprint Image Captured with a Mobile Camera.
348-355
Electronic Edition
(link) BibTeX
Preprocessing of a Fingerprint Image Captured with a Mobile
Camera
Chulhan Lee1 Contact Information, Sanghoon Lee1, Jaihie Kim1 and
Sung-Jae Kim2
(1) Biometrics Engineering Research Center,
Department of
Electrical and Electronic Engineering, Yonsei University, Seoul, Korea
(2) Multimedia Lab., SOC R&D center,
Samsung Electronics Co.,
Ltd, Gyeonggi-Do, Korea
Abstract
A preprocessing algorithm of a fingerprint image captured with a mobile
camera is proposed. Fingerprint images from a mobile camera are
different from images from conventional or touch-based sensors such as
optical, capacitive, and thermal sensors. For example, images from a
mobile camera are colored and the backgrounds or non-finger regions can
be very erratic depending on how the image captures time and place.
Also, the contrast between the ridges and valleys of images from a
mobile camera is lower than that of images from touch-based sensors.
Because of these differences between the input images, a new and
modified fingerprint preprocessing algorithm is required for
fingerprint recognition when using images captured with a mobile camera.
Contact Information Chulhan Lee
Email: devices@yonsei.ac.kr
===================================
Iris
===================================
49. Kazuyuki Miyazawa, Koichi
Ito, Takafumi
Aoki, Koji
Kobayashi, Hiroshi
Nakajima:
A Phase-Based Iris Recognition Algorithm.
356-365
Electronic Edition
(link) BibTeX
A Phase-Based Iris Recognition Algorithm
Kazuyuki Miyazawa1 Contact Information, Koichi Ito1, Takafumi Aoki1,
Koji Kobayashi2 and Hiroshi Nakajima2
(1) Graduate School of Information Sciences,
Tohoku University,
Sendai 980–8579, Japan
(2) Yamatake Corporation, Isehara 259–1195,
Japan
Abstract
This paper presents an efficient algorithm for iris recognition using
phase-based image matching. The use of phase components in
two-dimensional discrete Fourier transforms of iris images makes
possible to achieve highly robust iris recognition with a simple
matching algorithm. Experimental evaluation using the CASIA iris image
database (ver. 1.0 and ver. 2.0) clearly demonstrates an efficient
performance of the proposed algorithm.
Contact Information Kazuyuki Miyazawa
Email: miyazawa@aoki.ecei.tohoku.ac.jp
===================================
50. Zhenan Sun, Tieniu
Tan, Xianchao
Qiu:
Graph Matching Iris Image Blocks with Local Binary Pattern.
366-372
Electronic Edition
(link) BibTeX
Graph Matching Iris Image Blocks with Local Binary Pattern
Zhenan Sun1 Contact Information, Tieniu Tan1 Contact Information and
Xianchao Qiu1 Contact Information
(1) Center for Biometrics and Security
Research, National
Laboratory of Pattern Recognition, Institute of Automation, Chinese
Academy of Sciences, P.O. Box 2728, Beijing, 100080, P.R. China
Abstract
Iris-based personal identification has attracted much attention in
recent years. Almost all the state-of-the-art iris recognition
algorithms are based on statistical classifier and local image
features, which are noise sensitive and hardly to deliver perfect
recognition performance. In this paper, we propose a novel iris
recognition method, using the histogram of local binary pattern for
global iris texture representation and graph matching for structural
classification. The objective of our idea is to complement the
state-of-the-art methods with orthogonal features and classifier. In
the texture-rich iris image database UPOL, our method achieves higher
discriminability than state-of-the-art approaches. But our algorithm
does not perform well in the CASIA database whose images are less
textured. Then the value of our work is demonstrated by providing
complementary information to the state-of-the-art iris recognition
systems. After simple fusion with our method, the equal error rate of
Daugman’s algorithm could be halved.
Contact Information Zhenan Sun
Email: znsun@nlpr.ia.ac.cn
Contact Information Tieniu Tan
Email: tnt@nlpr.ia.ac.cn
Contact Information Xianchao Qiu
Email: xcqiu@nlpr.ia.ac.cn
===================================
51. Yi Chen, Sarat
C. Dass, Anil
K. Jain:
Localized Iris Image Quality Using 2-D Wavelets.
373-381
Electronic Edition
(link) BibTeX
Localized Iris Image Quality Using 2-D Wavelets
Yi Chen1 Contact Information, Sarat C. Dass1 Contact Information and
Anil K. Jain1 Contact Information
(1) Michigan State University, East Lansing,
MI, 48823,
Abstract
The performance of an iris recognition system can be undermined by poor
quality images and result in high false reject rates (FRR) and failure
to enroll (FTE) rates. In this paper, a wavelet-based quality measure
for iris images is proposed. The merit of the this approach lies in its
ability to deliver good spatial adaptivity and determine local quality
measures for different regions of an iris image. Our experiments
demonstrate that the proposed quality index can reliably predict the
matching performance of an iris recognition system. By incorporating
local quality measures in the matching algorithm, we also observe a
relative matching performance improvement of about 20% and 10% at the
equal error rate (EER), respectively, on the CASIA and WVU iris
databases.
Contact Information Yi Chen
Email: chenyi1@cse.msu.edu
Contact Information Sarat C. Dass
Email: sdass@stt.msu.edu
Contact Information Anil K. Jain
Email: jain@cse.msu.edu
===================================
52. Siew Chin Chong, Andrew
Teoh Beng Jin, David
Ngo Chek Ling:
Iris Authentication Using Privatized Advanced Correlation Filter.
382-388
Electronic Edition
(link) BibTeX
Iris Authentication Using Privatized Advanced Correlation Filter
Siew Chin Chong1 Contact Information, Andrew Beng Jin Teoh1 Contact
Information and David Chek Ling Ngo1 Contact Information
(1) Faculty of Information Science and
Technology (FIST),
Multimedia University, Jalan Ayer Keroh Lama, Bukit Beruang, Melaka
75450, Malaysia
Abstract
This paper proposes a private biometrics formulation which is based on
the concealment of random kernel and the iris images to synthesize a
minimum average correlation energy (MACE) filter for iris
authentication. Specifically, we multiply training images with the
user-specific random kernel in frequency domain before biometric filter
is created. The objective of the proposed method is to provide private
biometrics realization in iris authentication in which biometric
template can be reissued once it was compromised. Meanwhile, the
proposed method is able to decrease the computational load, due to the
filter size reduction. It also improves the authentication rate
significantly compare to the advance correlation based approach [5][6]
and comparable to the Daugmant’s Iris Code [1].
Contact Information Siew Chin Chong
Email: chong.siew.chin@mmu.edu.my
Contact Information Andrew Beng Jin Teoh
Email: bjteoh@mmu.edu.my
Contact Information David Chek Ling Ngo
Email: david.ngo@mmu.edu.my
===================================
53. Chul-Hyun Park, Joon-Jae
Lee:
Extracting and Combining Multimodal Directional Iris Features.
389-396
Electronic Edition
(link) BibTeX
Extracting and Combining Multimodal Directional Iris Features
Chul-Hyun Park1 Contact Information and Joon-Jae Lee2 Contact
Information
(1) School of Electrical and Computer
Engineering, Purdue
University, West Lafayette, Indiana 47907-2035, USA
(2) Dept. of Computer and Information
Engineering, Dongseo
University, Busan, Korea
Abstract
In this paper, we deal with extracting and combining multimodal iris
features for person verification. In multibiometric approaches, finding
reasonably disjoint features and effective combining methods are
crucial. The proposed method considers the directional characteristics
of iris patterns as critical features, and first decomposes an iris
image into several directional subbands using a directional filter bank
(DFB), then generates two kinds of feature vectors from the directional
subbands. One is the binarized output features of the directional
subbands on multiple scales and the other is the blockwise directional
energy features. The former is relatively robust to changes in
illumination or image contrast because it uses the directional zero
crossing information of the directional subbands, whereas the latter
provides another form of rich directional information though it is a
bit sensitive to contrast change. Matching is performed separately
between the same kind of feature vectors and the final decision is made
by combining the matching scores based on the accuracy of each method.
Experimental results show that the two kinds of feature vectors used in
this paper are reasonably complementary and the combining method is
effective.
Contact Information Chul-Hyun Park
Email: park95@purdue.edu
Contact Information Joon-Jae Lee
Email: jjlee@dongseo.ac.kr
===================================
54. Eui Chul Lee, Kang
Ryoung Park, Jaihie
Kim:
Fake Iris Detection by Using Purkinje Image.
397-403
Electronic Edition
(link) BibTeX
Fake Iris Detection by Using Purkinje Image
Eui Chul Lee1 Contact Information, Kang Ryoung Park2 Contact
Information and Jaihie Kim3 Contact Information
(1) Dept. of Computer Science, Sangmyung
University, 7
Hongji-dong, Jongro-Ku, Seoul, Biometrics Engineering Research Center
(BERC), Republic of Korea
(2) Division of Media Technology, Sangmyung
University, 7
Hongji-dong, Jongro-Ku, Seoul, Biometrics Engineering Research Center
(BERC), Republic of Korea
(3) Department of Electrical and Electronic
Engineering, Yonsei
University, Biometrics Engineering Research Center (BERC), Seoul,
Republic of Korea
Abstract
Fake iris detection is to detect and defeat a fake (forgery) iris image
input. To solve the problems of previous researches on fake iris
detection, we propose the new method of detecting fake iris attack
based on the Purkinje image. Especially, we calculated the theoretical
positions and distances between the Purkinje images based on the human
eye model and the performance of fake detection algorithm could be much
enhanced by such information. Experimental results showed that the FAR
(False Acceptance Rate for accepting fake iris as live one) was 0.33%
and FRR(False Rejection Rate of rejecting live iris as fake one) was
0.33%.
Contact Information Eui Chul Lee
Email: oryong@smu.ac.kr
Contact Information Kang Ryoung Park
Email: parkgr@smu.ac.kr
Contact Information Jaihie Kim
Email: jhkim@yonsei.ac.kr
===================================
55. Li Yu, Kuanquan
Wang, David
Zhang:
A Novel Method for Coarse Iris Classification.
404-410
Electronic Edition
(link) BibTeX
A Novel Method for Coarse Iris Classification
Li Yu1 Contact Information, Kuanquan Wang1 Contact Information and
David Zhang2 Contact Information
(1) Department of Computer Science and
Technology, Harbin
Institute of Technology, Harbin, 150001, China
(2) Department of computing, The Hong Kong
Polytechnic University,
Hung Hom, Kowloon, Hong Kong
Abstract
This paper proposes a novel method for the automatic coarse
classification of iris images using a box-counting method to estimate
the fractal dimensions of the iris. First, the iris image is segmented
into sixteen blocks, eight belonging to an upper group and eight to a
lower group. We then calculate the fractal dimension value of these
image blocks and take the mean value of the fractal dimension as the
upper and the lower group fractal dimensions. Finally all the iris
images are classified into four categories in accordance with the upper
and the lower group fractal dimensions. This classification method has
been tested and evaluated on 872 iris cases and the accuracy is 94.61%.
When we allow for the border effect, the double threshold algorithm is
98.28% accurate.
Contact Information Li Yu
Email: lyu@hit.edu.cn
Contact Information Kuanquan Wang
Email: wangkq@hit.edu.cn
Contact Information David Zhang
Email: csdzhang@comp.polyu.edu.hk
===================================
56. Xianchao Qiu, Zhenan
Sun, Tieniu
Tan:
Global Texture Analysis of Iris Images for Ethnic Classification.
411-418
Electronic Edition
(link) BibTeX
Global Texture Analysis of Iris Images for Ethnic Classification
Xianchao Qiu1 Contact Information, Zhenan Sun1 Contact Information and
Tieniu Tan1 Contact Information
(1) Center for Biometrics and Security
Research, National
Laboratory of Pattern Recognition, Institute of Automation, Chinese
Academy of Sciences, P.O. Box 2728, Beijing, 100080, P.R. China
Abstract
Iris pattern is commonly regarded as a kind of phenotypic feature
without relation to the genes. In this paper, we propose a novel ethnic
classification method based on the global texture information of iris
images. So we would argue that iris texture is race related, and its
genetic information is illustrated in coarse scale texture features,
rather than preserved in the minute local features of state-of-the-art
iris recognition algorithms. In our scheme, a bank of multichannel 2D
Gabor filters is used to capture the global texture information and
AdaBoost is used to learn a discriminant classification principle from
the pool of the candidate feature set. Finally iris images are grouped
into two race categories, Asian and non-Asian. Based on the proposed
method, we get an encouraging correct classification rate (CCR) of
85.95% on a mixed database containing 3982 iris samples in our
experiments.
Contact Information Xianchao Qiu
Email: xcqiu@nlpr.ia.ac.cn
Contact Information Zhenan Sun
Email: znsun@nlpr.ia.ac.cn
Contact Information Tieniu Tan
Email: tnt@nlpr.ia.ac.cn
===================================
57. Xin Li:
Modeling Intra-class Variation for Nonideal Iris Recognition.
419-427
Electronic Edition
(link) BibTeX
Modeling Intra-class Variation for Nonideal Iris Recognition
Xin Li1
(1) Lane Dept. of Computer Science and
Electrical Engineering,
West Virginia University, Morgantown WV 26506-6109,
Abstract
Intra-class variation is fundamental to the FNMR performance of iris
recognition systems. In this paper, we perform a systematic study of
modeling intra-class variation for nonideal iris images captured under
less-controlled environments. We present global geometric calibration
techniques for compensating distortion associated with off-angle
acquisition and local geometric calibration techniques for compensating
distortion due to inaccurate segmentation or pupil dilation. Geometric
calibration facilitates both the localization and recognition of iris
and more importantly, it offers a new approach of trading FNMR with
FMR. We use experimental results to demonstrate the effectiveness of
the proposed calibration techniques on both ideal and non-ideal iris
databases.
This work was partially supported by NSF Center for Identification
Technology Research.
===================================
58. Jinyu Zuo, Natalia
A. Schmid:
A Model Based, Anatomy Based Method for Synthesizing Iris Images.
428-435
Electronic Edition
(link) BibTeX
A Model Based, Anatomy Based Method for Synthesizing Iris Images
Jinyu Zuo1 Contact Information and Natalia A. Schmid1 Contact
Information
(1) Lane Department of Computer Science and
Electrical
Engineering, West Virginia University, Morgantown, WV 26506, USA
Abstract
Popularity of iris biometric grew considerably over the past 2-3 years.
It resulted in development of a large number of new iris encoding and
processing algorithms. Since there are no publicly available large
scale and even medium size databases, neither of the algorithms has
undergone extensive testing. With the lack of data, two major solutions
to the problem of algorithm testing are possible: (i) physically
collecting a large number of iris images or (ii) synthetically
generating a large scale database of iris images. In this work, we
describe a model based/anatomy based method to synthesize iris images
and evaluate the performance of synthetic irises by using a traditional
Gabor filter based system and by comparing local independent components
extracted from synthetic iris images with those from real iris images.
The issue of security and privacy is another argument in favor of
generation of synthetic data.
Contact Information Jinyu Zuo
Email: jinyuz@csee.wvu.edu
Contact Information Natalia A. Schmid
Email: natalias@csee.wvu.edu
===================================
59. Caitang Sun, Chunguang
Zhou, Yanchun
Liang, Xiangdong
Liu:
Study and Improvement of Iris Location Algorithm.
436-442
Electronic Edition
(link) BibTeX
Study and Improvement of Iris Location Algorithm
Caitang Sun1, Chunguang Zhou1 Contact Information, Yanchun Liang1 and
Xiangdong Liu1
(1) College of Computer Science and
Technology, Jilin University,
Changchun, 130012, China
Abstract
Iris location is a crucial step in iris recognition. Taking into
consideration the fact that interior of the pupil, there would have
some lighter spots because of reflection, this paper improves the
commonly used coarse location method. It utilizes the gray scale
histogram of the iris graphics, first computes the binary threshold,
averaging the center of chords to coarsely estimate the center and
radius of the pupil, and then finely locates it using the algorithm of
circle detection in the binary graphic. This method could reduce the
error of locating within the pupil. After that, this paper combines
Canny edge detector and Hough voting mechanism to locate the outer
boundary. Finally, a statistical method is exploited to exclude eyelash
and eyelid areas. Experiments have shown the applicability and
efficiency of this algorithm.
Keywords: Iris Location, Circle Detection, Canny Edge Detection, Hough
Voting Mechanism.
Contact Information Chunguang Zhou
Email: cgzhou@jlu.edu.cn
===================================
60. Junying Gan, Yu
Liang:
Applications of Wavelet Packets Decomposition in Iris Recognition.
443-449
Electronic Edition
(link) BibTeX
Applications of Wavelet Packets Decomposition in Iris Recognition
Junying Gan1 Contact Information and Yu Liang1
(1) School of information, Wuyi University,
Jiangmen, Guangdong,
529020, P.R.C.
Abstract
The method of Wavelet Packets Decomposition (WPD) originating from
wavelet transform is more accurate in signal analysis, with the
predominance of analyzing high-frequency information. Combined with the
trait of WPD, an algorithm for iris recognition is presented in this
paper. Firstly, iris image is divided into several windows, and WPD is
done to them. At the same time, some of the subband images from each
window are selected, which contain most information of iris image.
Secondly, the farther feature extraction and compression are applied to
these subband images by way of Singular Value Decomposition (SVD), and
iris recognition features are obtained. Finally, Weighted Euclidean
Distance (WED) classifier is utilized in recognition. Experimental
results on CASIA (Chinese Academy of Sciences, Institute of Automation)
iris image database show the method is valid in iris recognition.
Contact Information Junying Gan
Email: jygan@wyu.cn
===================================
61. Xueyi Ye, Peng
Yao, Fei
Long, Zhenquan
Zhuang:
Iris Image Real-Time Pre-estimation Using Compound BP Neural
Network.
450-456
Electronic Edition
(link) BibTeX
Iris Image Real-Time Pre-estimation Using Compound BP Neural Network
Xueyi Ye1 Contact Information, Peng Yao1, Fei Long1 and Zhenquan Zhuang1
(1) Department of Electronic Science and
Technology, University of
Science and Technology of China, HeFei 230026, P.R. China
Abstract
A practical iris identification application system faces different
types of bad iris images resulted from many reasons. Because previous
image quality evaluation methods estimate an iris image whether bad or
else by the resolution and the definition of the iris part, they just
can deal with few types among them. For saving the time occupied by the
localization in images real-time estimation, improving friendly
interaction of an iris identification system, decreasing the
localization failure on account of importing the bad-image, this paper
proposes a method of real-time pre-estimation using the compound BP
neural network. Multiple independent BP neural networks are used to
extract both the overall contour feature and the local of an iris image
and to calculate the pre-estimation output by different training
weights. The experimental result is shown that the method can detects
most types of the bad-image with comparatively low error rate and the
pre-estimation network has fairly large throughput. It should satisfy
the pre-estimation requirement of a real-time iris identification
system.
Contact Information Xueyi Ye
Email: xueyi_ye@ustc.edu
===================================
62. Dae Sik Jeong, Hyun-Ae
Park, Kang
Ryoung Park, Jaihie
Kim:
Iris Recognition in Mobile Phone Based on Adaptive Gabor Filter.
457-463
Electronic Edition
(link) BibTeX
Iris Recognition in Mobile Phone Based on Adaptive Gabor Filter
Dae Sik Jeong1 Contact Information, Hyun-Ae Park1 Contact Information,
Kang Ryoung Park2 Contact Information and Jaihie Kim3 Contact
Information
(1) Department of Computer Science, Sangmyung
University, 7
Hongji-Dong, Jongro-ku, Seoul,Biometrics Engineering Research Center
(BERC), Republic of Korea
(2) Division of Media Technology, Sangmyung
University,
Hongji-Dong, Jongro-ku, Seoul, Biometrics Engineering Research Center
(BERC), Republic of Korea
(3) Biometrics Engineering Research Center
(BERC), Department of
Electrical and Electronic Engineering, Yonsei University, Seoul,
Republic of Korea
Abstract
As the security of personal information is becoming more important in
mobile phones, we apply iris recognition technology to mobile device.
Different from conventional iris recognition system used for access
control, user puts the mobile phone by hands in this case. So, optical
and motion blurring happens, frequently. In addition, most users have
tendencies to use the mobile phone in outdoor and sunlight (which
includes much amount of IR(Infra-Red) light) may have much effect on
the input iris image in spite of the visible light cut filter attached
in front of iris camera lens. To overcome such problems, we propose a
new method of extracting the accurate iris code based on AGF (Adaptive
Gabor Filter). The kernel size, frequency and amplitude of Gabor filter
are determined by the amount of blurring and sunlight in input image,
adaptively. Experimental results show that the EER by our propose
method is 0.14 %.
Contact Information Dae Sik Jeong
Email: jungsoft97@smu.ac.kr
Contact Information Hyun-Ae Park
Email: whitebbb@smu.ac.kr
Contact Information Kang Ryoung Park
Email: parkgr@smu.ac.kr
Contact Information Jaihie Kim
Email: jhkim@yonsei.ac.kr
===================================
63. Zhuoshi Wei, Tieniu
Tan, Zhenan
Sun, Jiali
Cui:
Robust and Fast Assessment of Iris Image Quality.
464-471
Electronic Edition
(link) BibTeX
Robust and Fast Assessment of Iris Image Quality
Zhuoshi Wei1 Contact Information, Tieniu Tan1 Contact Information,
Zhenan Sun1 Contact Information and Jiali Cui1 Contact Information
(1) National Laboratory of Pattern
Recognition, Institute of
Automation, Chinese Academy of Sciences, P.O. Box 2728, Beijing,
100080, P.R. China
Abstract
Iris recognition is one of the most reliable methods for personal
identification. However, not all the iris images obtained from the
device are of high quality and suitable for recognition. In this paper,
a novel approach for iris image quality assessment is proposed to
select clear images in the image sequence. The proposed algorithm uses
three distinctive features to distinguish three kinds of poor quality
images, i.e. defocus, motion blur and occlusion. Experimental results
demonstrate the effectiveness of the algorithm. Clear iris images
selected by our method are essential to subsequent iris recognition.
Contact Information Zhuoshi Wei
Email: zswei@nlpr.ia.ac.cn
Contact Information Tieniu Tan
Email: tnt@nlpr.ia.ac.cn
Contact Information Zhenan Sun
Email: znsun@nlpr.ia.ac.cn
Contact Information Jiali Cui
Email: jlcui@nlpr.ia.ac.cn
==================================
64. Peeranat Thoonsaengngam, Kittipol
Horapong, Somying
Thainimit, Vutipong
Areekul:
Efficient Iris Recognition Using Adaptive Quotient Thresholding.
472-478
Electronic Edition
(link) BibTeX
Efficient Iris Recognition Using Adaptive Quotient Thresholding
Peeranat Thoonsaengngam1 Contact Information, Kittipol Horapong1
Contact Information, Somying Thainimit1 Contact Information and
Vutipong Areekul1 Contact Information
(1) Kasetsart Signal and Image Processing
Laboratory (KSIP lab),
Department of Electrical Engineering, Faculty of Engineering, Kasetsart
University, Bangkok, 10900, Thailand
Abstract
This paper presents an intensity-based iris recognition system. The
system exploits local intensity changes of the visible iris textures
such as crypts and naevi. The textures are extracted using local
histogram equalization and the proposed ‘quotient thresholding’
technique. The quotient thresholding partitions iris images in a
database such that a ratio between foreground and background of each
image is retained. By fixing this ratio, variations of illumination
across iris images are compensated, resulting in informative and
distinctive blob-like iris textures. An agreement of the two extracted
textures is measured by finding spatial correspondences between the
textures. The proposed system yields the 0.22 %EER and 100%CRR. The
experimental results indicate encouraging and effective iris
recognition system, especially when it is used in identification mode.
The system is very robust to changes in decision ratio.
Contact Information Peeranat Thoonsaengngam
Email: g4765155@ku.ac.th
Contact Information Kittipol Horapong
Email: g4565244@ku.ac.th
Contact Information Somying Thainimit
Email: fengsyt@ku.ac.th
Contact Information Vutipong Areekul
Email: fengvpa@ku.ac.th
===================================
65. XiaoFu He, Pengfei
Shi:
A Novel Iris Segmentation Method for Hand-Held Capture Device.
479-485
Electronic Edition
(link) BibTeX
A Novel Iris Segmentation Method for Hand-Held Capture Device
XiaoFu He1 Contact Information and PengFei Shi1 Contact Information
(1) Institute of Image Processing and Pattern
Recognition,
Shanghai Jiao Tong University, Shanghai 200030, China
Abstract
In this paper, a new iris segmentation method for Hand-held capture
device is proposed. First, the pupil is binarized using the intensity
threshold, then use morphologic method to denoise the eyelashes and
eyelids noise. The geometrical method is used to calculate the
coordinates of the pupil. Second, the outer (or limbus) boundary is
localized using the shrunk image with the Hough transform and modified
Canny edge detector in order to reduce computational cost. Third, the
eyelids which are constrained to be within the outer boundary are
estimated using the polynomial fitting method. The segmentation method
was implemented and tested on iris database set which is captured by
hand-held optical sensor device. Experimental results show that the
proposed algorithm can separate the iris from the surrounding noises
with good speed and accuracy.
Contact Information XiaoFu He
Email: xfhe@sjtu.edu.cn
Contact Information PengFei Shi
Email: pfshi@sjtu.edu.cn
===================================
66. Kaushik Roy, Prabir
Bhattacharya:
Iris Recognition with Support Vector Machines.
486-492
Electronic Edition
(link) BibTeX
Iris Recognition with Support Vector Machines
Kaushik Roy1 Contact Information and Prabir Bhattacharya1 Contact
Information
(1) Concordia Institute for Information System
Engineering,
Concordia University, Montreal, Quebec, H3G 1M8, Canada
Abstract
We propose an iris recognition system for the identification of persons
using support vector machines. Canny’s edge detection and the Hough
transform are used to find the iris/pupil boundary and a simple
thresholding method is employed for eyelash detection. The Gabor
wavelet technique is deployed in order to extract the deterministic
features in the transformed iris of a person in the form of template.
The extracted iris features are fed into a support vector machine (SVM)
for classification. Our results indicate that the performance of SVM as
a classifier is far better than the performance of a classifier based
on the artificial neural network.
Contact Information Kaushik Roy
Email: kaush_ro@ciise.concordia.ca
Contact Information Prabir Bhattacharya
Email: prabir@ciise.concordia.ca
===================================
Speech and Signature
67. Zhiyong Wu, Lianhong
Cai, Helen
Meng:
Multi-level Fusion of Audio and Visual Features for Speaker
Identification.
493-499
Electronic Edition
(link) BibTeX
Multi-level Fusion of Audio and Visual Features for Speaker
Identification
Zhiyong Wu1, 2 Contact Information, Lianhong Cai1 Contact Information
and Helen Meng2 Contact Information
(1) Department of Computer Science and
Technology, Tsinghua
University, Beijing, 100084, China
(2) Department of Systems Engineering and
Engineering Management,
The Chinese University of Hong Kong, Shatin, N.T., Hong Kong SAR, China
Abstract
This paper explores the fusion of audio and visual evidences through a
multi-level hybrid fusion architecture based on dynamic Bayesian
network (DBN), which combines model level and decision level fusion to
achieve higher performance. In model level fusion, a new audio-visual
correlative model (AVCM) based on DBN is proposed, which describes both
the inter-correlations and loose timing synchronicity between the audio
and video streams. The experiments on the CMU database and our own
homegrown database both demonstrate that the methods can improve the
accuracies of audio-visual bimodal speaker identification at all levels
of acoustic signal-to-noise-ratios (SNR) from 0dB to 30dB with varying
acoustic conditions.
Contact Information Zhiyong Wu
Email: john.zy.wu@gmail.com
Contact Information Lianhong Cai
Email: clh-dcs@tsinghua.edu.cn
Contact Information Helen Meng
Email: hmmeng@se.cuhk.edu.hk
===================================
68. .Christian Gruber, Thiemo
Gruber, Bernhard
Sick:
Online Signature Verification with New Time Series Kernels for
Support Vector Machines.
500-508
Electronic Edition
(link) BibTeX
Online Signature Verification with New Time Series Kernels for Support
Vector Machines
Christian Gruber1 Contact Information, Thiemo Gruber1 Contact
Information and Bernhard Sick1 Contact Information
(1) University of Passau, Institute of
Computer Architectures,
Abstract
In this paper, two new methods for online signature verification are
proposed. The methods adopt the idea of the longest common subsequences
(LCSS) algorithm to a kernel function for Support Vector Machines
(SVM). The two kernels LCSS-global and LCSS-local offer the possibility
to classify time series of different lengths with SVM. The similarity
of two time series is determined very accurately since outliers are
ignored. Consequently, LCSS-global and LCSS-local are more robust than
algorithms based on dynamic time alignment such as Dynamic Time Warping
(DTW). The new methods are compared to other kernel-based methods
(DTW-kernel, Fisher-kernel, Gauss-kernel). Our experiments show that
SVM with LCSS-local and LCSS-global authenticate persons very reliably.
Contact Information Christian Gruber
Email: gruberc@fmi.uni-passau.de
Contact Information Thiemo Gruber
Email: grubert@fmi.uni-passau.de
Contact Information Bernhard Sick
Email: sick@fmi.uni-passau.de
===================================
69.Kuan W. Yip, Alwyn
Goh, David
Ngo Chek Ling, Andrew
Teoh Beng Jin:
Generation of Replaceable Cryptographic Keys from Dynamic
Handwritten Signatures.
509-515
Electronic Edition
(link) BibTeX
Generation of Replaceable Cryptographic Keys from Dynamic Handwritten
Signatures
W.K. Yip1, 2 Contact Information, A. Goh2 Contact Information, David
Chek Ling Ngo1, 2 Contact Information and Andrew Beng Jin Teoh1, 2
Contact Information
(1) Faculty of Information Science and
Technology (FIST),
Multimedia University, Jalan Ayer Keroh Lama, Bukit Beruang 75450,
Melaka, Malaysia
(2) Corentix Technologies Sdn Bhd, B-S-06,
Kelana Jaya, Petaling
Jaya, 47301 Selangor, Malaysia
Abstract
In this paper, we present a method for generating cryptographic keys
that can be replaced if the keys are compromised and without requiring
a template signature to be stored. The replaceability of keys is
accomplished using iterative inner product of Goh-Ngo [1] Biohash
method, which has the effect of re-projecting the biometric into
another subspace defined by user token. We also utilized a modified
Chang et al [2] Multi-state Discretization (MSD) method to translate
the inner products into binary bit-strings. Our experiments indicate
encouraging result especially for skilled and random forgery whereby
the equal error rates are <6.7% and ~0% respectively, indicating
that the keys generated are sufficiently distinguishable from impostor
keys.
Contact Information W.K. Yip
Email: yip.wai.kuan04@mmu.edu.my
Contact Information A. Goh
Email: alwyn@corentix.com
Contact Information David Chek Ling Ngo
Email: david.ngo@mmu.edu.my
Contact Information Andrew Beng Jin Teoh
Email: bjteoh@mmu.edu.my
===================================
70. ZhongCheng Wu, Ping
Fang, Fei
Shen:
Online Signature Verification Based on Global Feature of Writing
Forces.
516-522
Electronic Edition
(link) BibTeX
Online Signature Verification Based on Global Feature of Writing Forces
ZhongCheng Wu1 Contact Information, Ping Fang1, 2 Contact Information
and Fei Shen1, 2 Contact Information
(1) Institute of Intelligent Machine, Chinese
Academy of Science,
Hefei, Anhui Province, 230031, China
(2) Department of Automation, University of
Science &
Technology of China Hefei, Anhui Province, 230026, China
Abstract
Writing forces are important dynamics of online signatures and it is
harder to be imitated by forgers than signature shapes. An improved DTW
(Dynamic Time Warping) algorithm is put forward to verify online
signatures based on writing forces. Compared to the general DTW
algorithm, this one deals with the varying consistency of signature
point, signing duration and the different weights of writing forces in
different direction. The iterative experiment is introduced to decide
weights for writing forces in different direction and the
classification threshold. A signature database is constructed with
F_Tablet and the experiments results are present in the end.
The work was funded by the Natural Science Foundation of China with
grant No. 60375027, No. 60475005.
Contact Information ZhongCheng Wu
Email: zcwu@iim.ac.cn
Contact Information Ping Fang
Email: pingfang@ustc.edu
Contact Information Fei Shen
Email: shenfei@iim.ac.cn
===================================
71.Olaf Henniger, Björn
Schneider, Bruno
Struif, Ulrich
Waldmann:
Improving the Binding of Electronic Signatures to the Signer by
Biometric Authentication.
523-530
Electronic Edition
(link) BibTeX
Improving the Binding of Electronic Signatures to the Signer by
Biometric Authentication
Olaf Henniger1 Contact Information, Björn Schneider1, Bruno
Struif1
Contact Information and Ulrich Waldmann1 Contact Information
(1) Fraunhofer Institute for Secure
Information Technology,
Rheinstr 75, 64295 Darmstadt, Germany
Abstract
Due to the fact that the biometric characteristics of a person are
bound to that person, biometric methods deployed for signer
authentication have the potential of improving the binding of
electronic signatures to persons. If there is evi dence that a
biometric method was used for signer authentication, and if the level
of security of this method is suffi ciently high, then the receiver of
a signed docu ment can trust that the signature creation was indeed
initiated by the legitimate holder of the private signature key. To
achieve this goal, an approach to provide evidence of the use of
biometric signer authentication has been developed. The approach has
been implemented in a prototype electronic signature creation system
with fingerprint verification.
Contact Information Olaf Henniger
Email: henniger@sit.fraunhofer.de
Contact Information Bruno Struif
Email: struif@sit.fraunhofer.de
Contact Information Ulrich Waldmann
Email: waldmann@sit.fraunhofer.de
===================================
72.Rong Zheng, Shuwu
Zhang, Bo
Xu:
A Comparative Study of Feature and Score Normalization for Speaker
Verification.
531-538
Electronic Edition
(link) BibTeX
A Comparative Study of Feature and Score Normalization for Speaker
Verification
Rong Zheng1 Contact Information, Shuwu Zhang1 Contact Information and
Bo Xu1 Contact Information
(1) Institute of Automation, Chinese Academy
of Sciences, Beijing,
China
Abstract
In speaker verification, it is necessary to reduce the influence of
different environmental conditions. In this paper, two stages of
normalization techniques, feature normalization and score
normalization, are examined for decreasing the mismatch between
training and testing acoustic conditions. At the first stage, cepstral
mean and variance normalization (CMVN) is modified to normalize the
cepstral coefficients with the similar segmental parameter statistics.
Next, due to score variability between verification trials,
Test-dependent zero-score normalization (TZnorm) and Zero-dependent
test-score normalization (ZTnorm) are comparatively presented to
transform the output scores entirely and make the speaker-independent
decision threshold more robust under adverse conditions. Experiments on
NIST2002 SRE corpus show that the normalizations with CMVN in feature
stage and ZTnorm in score stage achieved 20.3% relative reduction of
EER and 18.1% relative reduction of the minimal DCF compared to the
baseline system using CMN and zero normalization.
Contact Information Rong Zheng
Email: rzheng@hitic.ia.ac.cn
Contact Information Shuwu Zhang
Email: swzhang@hitic.ia.ac.cn
Contact Information Bo Xu
Email: xubo@hitic.ia.ac.cn
===================================
73.Dongdong Li, Yingchun
Yang, Zhaohui
Wu:
Dynamic Bayesian Networks for Audio-Visual Speaker Recognition.
539-545
Electronic Edition
(link) BibTeX
Dynamic Bayesian Networks for Audio-Visual Speaker Recognition
Dongdong Li1 Contact Information, Yingchun Yang1 Contact Information
and Zhaohui Wu1 Contact Information
(1) Department of Computer Science and
Technology, Zhejiang
University, Hangzhou 310027, P.R. China
Abstract
Audio-Visual speaker recognition promises higher performance than any
single modal biometric systems. This paper further improves the novel
approach based on Dynamic Bayesian Networks (DBNs) to bimodal speaker
recognition. In the present paper, we investigate five different
topologies of feature-level fusion framework using DBNs. We demonstrate
that the performance of multimodal systems can be further improved by
modeling the correlation of between the speech features and the face
features appropriately. The experiment conducted on a multi-modal
database of 54 users indicates promising results, with an absolute
improvement of about 7.44% in the best case and 3.13% in the worst case
compared with single modal speaker recognition system.
Contact Information Dongdong Li
Email: lidd@cs.zju.edu.cn
Contact Information Yingchun Yang
Email: yyc@cs.zju.edu.cn
Contact Information Zhaohui Wu
Email: wzh@cs.zju.edu.cn
===================================
Biometric Fusion and Performance Evaluation
===================================
74. Kar-Ann Toh, How-Lung
Eng, Yuen-Siong
Choo, Yoon-Leon
Cha, Wei-Yun
Yau, Kay-Soon
Low:
Identity Verification Through Palm Vein and Crease Texture.
546-553
Electronic Edition
(link) BibTeX
Identity Verification Through Palm Vein and Crease Texture
Kar-Ann Toh1 Contact Information, How-Lung Eng1 Contact Information,
Yuen-Siong Choo2, Yoon-Leon Cha2, Wei-Yun Yau1 Contact Information and
Kay-Soon Low2 Contact Information
(1) Institute for Infocomm Research, 21 Heng
Mui Keng Terrace,
119613, Singapore
(2) School of Electrical & Electronic
Engineering, Nanyang
Technological University, Singapore
Abstract
In this paper, an identity verification framework which combines
pattern information from the palm-vein and the palm-crease texture is
proposed. Main feature of this system is the use of a low cost
Near-Infra-Red (NIR) camera instead of the more expensive infra-red
thermal camera for palm image capture. Our preliminary experiments show
that useful information from palm-vein and palm-crease texture can be
effectively extracted for identity verification using a simple setup to
contain the camera.
Keywords:Biometrics, Multimodal Biometrics, Palm-vein Recognition,
Palm-print Recognition and Pattern Classification.
Contact Information Kar-Ann Toh
Email: katoh@ieee.org
Contact Information How-Lung Eng
Email: hleng@i2r.a-star.edu.sg
Contact Information Wei-Yun Yau
Email: wyyau@i2r.a-star.edu.sg
Contact Information Kay-Soon Low
Email: ekslow@ntu.edu.sg
===================================
75. Xiaoguang Lu, Hong
Chen, Anil
K. Jain:
Multimodal Facial Gender and Ethnicity Identification.
554-561
Electronic Edition
(link) BibTeX
Multimodal Facial Gender and Ethnicity Identification
Xiaoguang Lu1 Contact Information, Hong Chen1 Contact Information and
Anil K. Jain1 Contact Information
(1) Michigan State University, East Lansing,
MI 48824,
Abstract
Human faces provide demographic information, such as gender and
ethnicity. Different modalities of human faces, e.g., range and
intensity, provide different cues for gender and ethnicity
identifications. In this paper we exploit the range information of
human faces for ethnicity identification using a support vector
machine. An integration scheme is also proposed for ethnicity and
gender identifications by combining the registered range and intensity
images. The experiments are conducted on a database containing 1240
facial scans of 376 subjects. It is demonstrated that the range
modality provides competitive discriminative power on ethnicity and
gender identifications to the intensity modality. For both gender and
ethnicity identifications, the proposed integration scheme outperforms
each individual modality.
Contact Information Xiaoguang Lu
Email: Lvxiaogu@cse.msu.edu
Contact Information Hong Chen
Email: chenhon2@cse.msu.edu
Contact Information Anil K. Jain
Email: jain@cse.msu.edu
===================================
76. Sheng Zhang, Rajkumar
Janakiraman, Terence
Sim, Sandeep
Kumar:
Continuous Verification Using Multimodal Biometrics.
562-570
Electronic Edition
(link) BibTeX
Continuous Verification Using Multimodal Biometrics
Sheng Zhang1 Contact Information, Rajkumar Janakiraman1 Contact
Information, Terence Sim1 Contact Information and Sandeep Kumar1
Contact Information
(1) School of Computing, National University
of Singapore, 3
Science Drive 2, 117543, Singapore
Abstract
In this paper we describe a system that continually verifies the
presence/participation of a logged-in user. This is done by integrating
multimodal passive biometrics in a Bayesian framework that combines
both temporal and modality information holistically, rather than
sequentially. This allows our system to output the probability that the
user is still present even when there is no observation.
Our implementation of the continuous verification system is distributed
and extensible, so it is easy to plug in additional asynchronous
modalities, even when they are remotely generated. Based on real data
resulting from our implementation, we find the results to be promising.
This work was funded by the National University of Singapore, project
no. R-252-146-112.
Contact Information Sheng Zhang
Email: zhangshe@comp.nus.edu.sg
Contact Information Rajkumar Janakiraman
Email: janakira@comp.nus.edu.sg
Contact Information Terence Sim
Email: tsim@comp.nus.edu.sg
Contact Information Sandeep Kumar
Email: skumar@comp.nus.edu.sg
===================================
77. Ching-Han Chen, Chia
Te Chu:
Fusion of Face and Iris Features for Multimodal Biometrics.
571-580
Electronic Edition
(link) BibTeX
Biometric Fusion and Performance Evaluation
Fusion of Face and Iris Features for Multimodal Biometrics
Ching-Han Chen1 Contact Information and Chia Te Chu1 Contact Information
(1) Institute of Electrical Engineering,
I-Shou University, 1,
Section 1, Hsueh-Cheng Rd., Ta-Hsu Hsiang, Kaohsiung County, Taiwan
840, R.O.C.
Abstract
The recognition accuracy of a single biometric authentication system is
often much reduced due to the environment, user mode and physiological
defects. In this paper, we combine face and iris features for
developing a multimode biometric approach, which is able to diminish
the drawback of single biometric approach as well as to improve the
performance of authentication system. We combine a face database ORL
and iris database CASIA to construct a multimodal biometric
experimental database with which we validate the proposed approach and
evaluate the multimodal biometrics performance. The experimental
results reveal the multimodal biometrics verification is much more
reliable and precise than single biometric approach.
Keywords: Multimodal biometrics, face, iris, wavelet probabilistic
neural network.
Contact Information Ching-Han Chen
Email: pierre@isu.edu.tw
Contact Information Chia Te Chu
Email: cld123@giga.net.tw
===================================
78. Sinjini Mitra, Marios
Savvides, Anthony
Brockwell:
The Role of Statistical Models in Biometric Authentication.
581-588
Electronic Edition
(link) BibTeX
The Role of Statistical Models in Biometric Authentication
Sinjini Mitra1 Contact Information, Marios Savvides2 Contact
Information and Anthony Brockwell1 Contact Information
(1) Department of Statistics, Carnegie Mellon
University,
Pittsburgh, PA 15213,
(2) Electrical and Computer Engineering
Department, Carnegie
Mellon University, Pittsburgh, PA 15213,
Abstract
The current paper demonstrates the role of statistical models in
authentication tasks – both in system development and in performance
evaluation. We first introduce a model-based face authentication system
based on the Fourier domain phase using Gaussian Mixture Models (GMM)
which yields verification error rates as low as 0.3% on a face database
of 65 individuals with extreme illumination variations. We then present
a statistical framework for predicting authentication error rates for
future populations in a rigorous way. This is in contrast to most
evaluation protocols used today that are based on observational studies
and valid only for the databases at hand. Applications establish that
our model-based approach has better predictive performance than an
existing state-of-the-art authentication technique.
Contact Information Sinjini Mitra
Email: smitra@stat.cmu.edu
Contact Information Marios Savvides
Email: msavvid@cs.cmu.edu
Contact Information Anthony Brockwell
Email: abrock@stat.cmu.edu
===================================
79. Congcong Li, Guangda
Su, Kai
Meng, Jun
Zhou:
Technology Evaluations on the TH-FACE Recognition System.
589-597
Electronic Edition
(link) BibTeX
Technology Evaluations on the TH-FACE Recognition System
Congcong Li1 Contact Information, Guangda Su1, Kai Meng1 and Jun Zhou1
(1) The State Key Laboratory of Intelligent
Technology and System,
Electronic Engineering Department, Tsinghua University, Beijing 100084,
China
Abstract
For biometric person authentication, evaluations on a biometric system
are very essential parts of the entire process. This paper presents the
technology evaluations on the TH-FACE recognition system. The main
objectives of the evaluations are to 1) test the performance of the
TH-FACE recognition system objectively; 2) provide a method to design
and organize a database for evaluations; 3) identify the advantage and
weakness for the TH-FACE recognition system. Particular description of
the test database used in the evaluations is given in this paper. The
database contains different subsets which are sorted by different
poses, illuminations, ages, accessory, etc. Results and analysis on the
entire performances of the TH-FACE recognition system would be also
presented.
Contact Information Congcong Li
Email: lcc@mails.tsinghua.edu.cn
===================================
Gait and Keys
80. Kazuhiko Sumi, Chang
Liu, Takashi
Matsuyama:
Study on Synthetic Face Database for Performance Evaluation.
598-604
Electronic Edition
(link) BibTeX
Study on Synthetic Face Database for Performance Evaluation
Kazuhiko Sumi1 Contact Information, Chang Liu1 Contact Information and
Takashi Matsuyama1 Contact Information
(1) Graduate School of Informatics, Kyoto
University, Kyoto
606–8501, Japan
Abstract
We have analyzed the vulnerability and threat of the biometric
evaluation database and proposed the method to generate a synthetic
database from a real database. Our method is characterized by finding
nearest neighbor triples or pairs in the feature space of biometric
samples, and by crossing over those triples and pairs to generate
synthetic samples. The advantages of our method is that we can keep the
statistical distribution of the original database, thus, the evaluation
result is expected to be the same as original real database. The
proposed database, which does not have privacy problem, can be
circulated freely among biometric vendors and testers. We have
implemented this idea on a face image database using active appearance
model. The synthesized image database has the same distance
distribution with the original database, which suggests it will deriver
the same accuracy with the original one.
Contact Information Kazuhiko Sumi
Email: sumi@vision.kueee.kyoto-u.ac.jp
URL: http://vision.kuee.kyoto-u.ac.jp/
Contact Information Chang Liu
URL: http://vision.kuee.kyoto-u.ac.jp/
Contact Information Takashi Matsuyama
URL: http://vision.kuee.kyoto-u.ac.jp/
===================================
81. Yuan Wang, Shiqi
Yu, Yunhong
Wang, Tieniu
Tan:
Gait Recognition Based on Fusion of Multi-view Gait Sequences.
605-611
Electronic Edition
(link) BibTeX
Gait Recognition Based on Fusion of Multi-view Gait Sequences
Yuan Wang1 Contact Information, Shiqi Yu1 Contact Information, Yunhong
Wang2 Contact Information and Tieniu Tan1 Contact Information
(1) National Laboratory of Pattern
Recognition, Institute of
Automation, Chinese Academy of Sciences, P.O. Box 2728, Beijing 100080,
China
(2) School of Computer Science and
Engineering, Beihang
University,
Abstract
In recent years, many gait recognition algorithms have been developed,
but most of them depend on a specific view angle. In this paper,we
present a new gait recognition scheme based on multi-view gait sequence
fusion. An experimental comparison of the fusion of gait sequences at
different views is reported. Our experiments show the fusion of gait
sequences at different views can consistently achieve better results.
The Dempster-Shafer fusion method is found to give a great improvement.
On the other hand, we also find that fusion of gait sequences with an
angle difference greater than or equal to 90° can achieve better
improvement than fusion of those with an acute angle difference.
Contact Information Yuan Wang
Email: ywang@nlpr.ia.ac.cn
Contact Information Shiqi Yu
Email: sqyu@nlpr.ia.ac.cn
Contact Information Yunhong Wang
Email: wangyh@nlpr.ia.ac.cn
Contact Information Tieniu Tan
Email: tnt@nlpr.ia.ac.cn
===================================
82. Toby H. W. Lam, Raymond
S. T. Lee:
A New Representation for Human Gait Recognition: Motion Silhouettes
Image (MSI).
612-618
Electronic Edition
(link) BibTeX
A New Representation for Human Gait Recognition: Motion Silhouettes
Image (MSI)
Toby H.W. Lam1 Contact Information and Raymond S.T. Lee1 Contact
Information
(1) Department of Computing, The Hong Kong
Polytechnic University,
Hung Hom, Kowloon, Hong Kong
Abstract
Recently, gait recognition for human identification has received
substantial attention from biometrics researchers. Compared with other
biometrics, it is more difficult to disguise. In addition, gait can be
captured in a distance by using low-resolution capturing devices. In
this paper, we proposed a new representation for human gait recognition
which is called Motion Silhouettes Image (MSI). MSI is a grey-level
image which embeds the critical spatio-temporal information.
Experiments showed that MSI has a high discriminative power for gait
recognition. The recognition rate is around 87% in SOTON dataset by
using MSI for recognition. The recognition rate is quite promising. In
addition, MSI can also reduce the storage size of the dataset. After
using MSI, the storage size of SOTON has reduced to 4.2MB.
Contact Information Toby H.W. Lam
Email: cshwlam@comp.polyu.edu.hk
Contact Information Raymond S.T. Lee
Email: csstlee@comp.polyu.edu.hk
===================================
83. Hee-Deok Yang, Seong-Whan
Lee:
Reconstruction of 3D Human Body Pose for Gait Recognition.
619-625
Electronic Edition
(link) BibTeX
Gait and Keystroke
Reconstruction of 3D Human Body Pose for Gait Recognition
Hee-Deok Yang1 Contact Information and Seong-Whan Lee1 Contact
Information
(1) Department of Computer Science and
Engineering, Korea
University, Anam-dong, Seongbuk-gu, Seoul 136-713, Korea
Abstract
In this paper, we propose a novel method to reconstruct 3D human body
pose for gait recognition from monocular image sequences based on
top-down learning. Human body pose is represented by a linear
combination of prototypes of 2D silhouette images and their
corresponding 3D body models in terms of the position of a
predetermined set of joints. With a 2D silhouette image, we can
estimate optimal coefficients for a linear combination of prototypes of
the 2D silhouette images by solving least square minimization. The 3D
body model of the input silhouette image is obtained by applying the
estimated coefficients to the corresponding 3D body model of
prototypes. In the learning stage, the proposed method is
hierarchically constructed by classifying the training data into
several clusters recursively. Also, in the reconstructing stage, the
proposed method hierarchically reconstructs 3D human body pose with a
silhouette image. The experimental results show that our method can be
efficient and effective to reconstruct 3D human body pose for gait
recognition.
Contact Information Hee-Deok Yang
Email: hdyang@image.korea.ac.kr
Contact Information Seong-Whan Lee
Email: swlee@image.korea.ac.kr
===================================
84. Sungzoon Cho, Seongseob
Hwang:
Artificial Rhythms and Cues for Keystroke Dynamics Based
Authentication.
626-632
Electronic Edition
(link) BibTeX
Gait and Keystroke
Artificial Rhythms and Cues for Keystroke Dynamics Based Authentication
Sungzoon Cho1 Contact Information and Seongseob Hwang1 Contact
Information
(1) Department of Industrial Engineering,
Seoul National
University, San 56-1, Shillim-dong, Kwanak-gu, Seoul 151-744, Korea
Abstract
Biometrics based user authentication involves collecting user’s
patterns and then using them to determine if a new pattern is similar
enough. The quality of the user’s patterns is as important as the
quality of the classifier. But, the issue has been ignored in the
literature since the popular biometrics are mostly trait based such as
finger prints and iris so that its pattern quality depends on the
quality of the input device involved. However, the quality of the
user’s patterns of behavior based biometric such as keystroke dynamics
can be improved artificially by increasing the peculiarity of the
typing style. In this paper, we propose several ways to improve the
quality. But, first we define the quality of patterns in terms of two
factors: uniqueness and consistency. Finally, the results of a
preliminary experiment are presented that support the utility of the
proposed methods.
Contact Information Sungzoon Cho
Email: zoon@snu.ac.kr
URL: http://dmlab.snu.ac.kr
Contact Information Seongseob Hwang
Email: hss9414@snu.ac.kr
URL: http://dmlab.snu.ac.kr
===================================
85. Hyoungjoo Lee, Sungzoon
Cho:
Retraining a Novelty Detector with Impostor Patterns for Keystroke
Dynamics-Based Authentication.
633-639
Electronic Edition
(link) BibTeX
Gait and Keystroke
Retraining a Novelty Detector with Impostor Patterns for Keystroke
Dynamics-Based Authentication
Hyoung-joo Lee1 Contact Information and Sungzoon Cho1 Contact
Information
(1) Department of Industrial Engineering,
Seoul National
University, San 56-1, Shillim-dong, Kwanak-gu, 151-744, Seoul, Korea
Abstract
In keystroke dynamics-based authentication, novelty detection methods
have been used since only the valid user’s patterns are available when
a classifier is built. After a while, however, impostors’ keystroke
patterns become also available from failed login attempts. We propose
to retrain the novelty detector with the impostor patterns to enhance
the performance. In this paper the support vector data description
(SVDD) and the one-class learning vector quantization (1-LVQ) are
retrained with the impostor patterns. Experiments on 21 keystroke
pattern datasets show that the performance improves after retraining
and that the one-class learning vector quantization outperforms other
widely used novelty detectors.
Contact Information Hyoung-joo Lee
Email: impatton@snu.ac.kr
Contact Information Sungzoon Cho
Email: zoon@snu.ac.kr
===================================
86. Ricardo N. Rodrigues, Glauco
F. G. Yared, Carlos
R. do N. Costa, João
Baptista T. Yabu-uti, Fábio
Violaro, Lee
Luan Ling:
Biometric Access Control Through Numerical Keyboards Based on
Keystroke Dynamics.
640-646
Electronic Edition
(link) BibTeX
Gait and Keystroke
Biometric Access Control Through Numerical Keyboards Based on Keystroke
Dynamics
Ricardo N. Rodrigues1 Contact Information, Glauco F.G. Yared1 Contact
Information, Carlos R. do N. Costa1 Contact Information, João
B.T.
Yabu-Uti1 Contact Information, Fábio Violaro1 Contact
Information and
Lee Luan Ling1 Contact Information
(1) Laboratory of Pattern Recognition and
Computer Networks,
Department of Communications, School of Electrical and Computer
Engineering, State University of Campinas, Albert Einstein Av., 400, PO
Box 6101, Postal Code 13083-852, Campinas, SP, Brazil
Abstract
This paper presents a new approach for biometric authentication based
on keystroke dynamics through numerical keyboards. The input signal is
generated in real time when the user enters with target string. Five
features were extracted from this input signal (ASCII key code and four
keystroke latencies) and four experiments using samples for genuine and
impostor users were performed using two pattern classification
technics. The best results were achieved by the HMM (EER=3.6%). This
new approach brings security improvements to the process of user
authentication, as well as it allows to include biometric
authentication in mobile devices, such as cell phones.
Contact Information Ricardo N. Rodrigues
Email: ricardonagel@gmail.com
Contact Information Glauco F.G. Yared
Email: glauco@decom.fee.unicamp.br
Contact Information Carlos R. do N. Costa
Email: ccosta@decom.fee.unicamp.br
Contact Information João B.T. Yabu-Uti
Email: yabuuti@decom.fee.unicamp.br
Contact Information Fábio Violaro
Email: fabio@decom.fee.unicamp.br
Contact Information Lee Luan Ling
Email: lee@decom.fee.unicamp.br
===================================
87. Woojin Chang:
Keystroke Biometric System Using Wavelets.
647-653
Electronic Edition
(link) BibTeX
Gait and Keystroke
Keystroke Biometric System Using Wavelets
Woojin Chang1 Contact Information
(1) Department of Industrial Engineering,
Seoul National
University, San 56-1, Sillim-dong, Gwanak-gu, Seoul 151-742, Korea
Abstract
We developed the keystroke biometric system (KBS) using the statistical
features of the discrete wavelet transformed keystroke pattern in the
frequency domain in addition to those of the original keystroke pattern
in the time domain. Only 20 keystroke patterns of user’s password
typing, where the length of password is no more than 10, are used for
building a KBS. The features in the time domain and those in the
frequency domain are separately scored by the rules that we developed,
and arbitrary given keystroke patterns are classified on the basis of
total scores. The results show that our KBS is competitive in
comparison with others due to its cheap computational cost, cheap
usability cost, and the practically acceptable classification accuracy.
Keywords: Keystroke Dynamics, Keystroke Biometric System, Key- stroke
Authentication, Discrete Wavelet Transform.
Contact Information Woojin Chang
Email: changw@snu.ac.kr
===================================
88. Ki-seok Sung, Sungzoon
Cho:
GA SVM Wrapper Ensemble for Keystroke Dynamics Authentication.
654-660
Electronic Edition
(link) BibTeX
Gait and Keystroke
GA SVM Wrapper Ensemble for Keystroke Dynamics Authentication
Ki-seok Sung1 Contact Information and Sungzoon Cho1 Contact Information
(1) Department of Industrial Engineering,
Seoul National
University, San 56-1, Shillim-dong, Kwanak-gu, Seoul 151-744, Korea
Abstract
User authentication based on keystroke dynamics is concerned with
accepting or rejecting someone based on the way the person types. A
timing vector is composed of the keystroke duration times interleaved
with the keystroke interval times. Which times or features to use in a
classifier is a classic feature selection problem. Genetic algorithm
based wrapper approach does not only solve the problem, but also
provides a population of “fit” classifiers which can be used in
ensemble. In this paper, we propose to add uniqueness term in the
fitness function of genetic algorithm. Preliminary experiments show
that the proposed approach performed better than two phase ensemble
selection approach and prediction based diversity term approach.
Contact Information Ki-seok Sung
Email: zoro81@snu.ac.kr
URL: http://dmlab.snu.ac.kr
Contact Information Sungzoon Cho
Email: zoon@snu.ac.kr
URL: http://dmlab.snu.ac.kr
===================================
89. Kenneth
Revett, Sérgio
Tenreiro de Magalhães, Henrique
M. D. Santos:
Enhancing Login Security Through the Use of Keystroke Input
Dynamics.
661-667
Electronic Edition
(link)
BibTeX
Gait and Keystroke
Enhancing Login Security Through the Use of Keystroke Input Dynamics
Kenneth Revett1 Contact Information, Sérgio Tenreiro de
Magalhães2
Contact Information and Henrique M.D. Santos2 Contact Information
(1) University of Westminster, Harrow School
of Computer Science,
London, HA1 3TP, UK
(2) Universidade do Minho, Department of
Information Systems,
Campus de Azurem, 4800-058 Guimaraes, Portugal
Abstract
Security is a critical component of most computer systems – especially
those used in E-commerce activities over the Internet. Global access to
information makes security a critical design issue in these systems.
Deployment of sophisticated hardware based authentication systems is
prohibitive in all but the most sensitive installations. What is
required is a reliable, hardware independent and efficient security
system. In this paper, we propose an extension to a keystroke dynamics
based security system. We provide evidence that completely software
based systems based on keystroke input dynamics can be as effective as
expensive and cumbersome hardware based systems. Our system is
behavioral based that captures the typing patterns of a user and uses
that information, in addition to standard login/password security to
provide a system that is user-friendly and very effective at detecting
imposters.
Contact Information Kenneth Revett
Email: revettk@westminster.ac.uk
Contact Information Sérgio Tenreiro de
Magalhães
Email: psmagalhaes@dsi.uminho.pt
Contact Information Henrique M.D. Santos
Email: hsantos@dsi.uminho.pt
===================================
Others
===================================
90. Adams Wai-Kin Kong, David
Zhang, Guangming
Lu:
A Study of Identical Twins' Palmprints for Personal Authentication.
668-674
Electronic Edition
(link) BibTeX
Others
A Study of Identical Twins’ Palmprints for Personal Authentication
Adams Kong1, 2 Contact Information, David Zhang2 Contact Information
and Guangming Lu3 Contact Information
(1) Pattern Analysis and Machine Intelligence
Lab, University of
Waterloo, 200 University Avenue West, Waterloo, Ontario N2L 3G1, Canada
(2) Biometric Research Centre, Department of
Computing, The Hong
Kong Polytechnic University, Kowloon, Hong Kong
(3) Biocomputing Research Lab, School of
Computer Science and
Engineering, Harbin Institute of Technology, Harbin, China
Abstract
Biometric recognition based on human characteristics for personal
identification has attracted great attention. The performance of
biometric systems highly depends on the distinctive information in the
biometrics. However, identical twins having the closest genetics-based
relationship are expected to have maximum similarity between their
biometrics. Classifying identical twins is a challenging problem for
some automatic biometric systems. In this paper, we summarize the
exiting experimental results about identical twins’ biometrics
including face, iris, fingerprint and voice. Then, we systemically
examine identical twins’ palmprints. The experimental results show that
we can employ low-resolution palmprint images to distinguish identical
twins.
Contact Information Adams Kong
Email: adamskong@ieee.org
Contact Information David Zhang
Email: csdzhang@comp.polyu.edu.hk
Contact Information Guangming Lu
Email: csglu@comp.polyu.edu.hk
===================================
91. Fengling Han, Jiankun
Hu, Xinhuo
Yu, Yong
Feng, Jie
Zhou:
A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based
Banking Applications.
675-681
Electronic Edition
(link) BibTeX
Others
A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based
Banking Applications
Fengling Han1 Contact Information, Jiankun Hu1 Contact Information,
Xinhuo Yu2 Contact Information, Yong Feng2 Contact Information and Jie
Zhou3 Contact Information
(1) School of Computer Science and Information
Technology, Royal
Melbourne Institute of Technology, Melbourne VIC 3001, Australia
(2) School of Electrical and Computer
Engineering, Royal Melbourne
Institute of Technology, Melbourne VIC 3001, Australia
(3) Department of Automation, Tsinghua
University, Beijing 100084,
China
Abstract
This paper studies the smartcard based fingerprint
encrytion/auth-entication scheme for ATM banking systems. In this
scheme, the system authenticates each user by both his/her possession
(smartcard) and biometrics (fingerprint). A smartcard is used for the
first layer of authentication. Based on the successful pass of the
first layer authentication, a subsequent process of the biometric
fingerprint authentication proceeds. The proposed scheme is fast and
secure. Computer simulations and statistical analyze are presented.
Contact Information Fengling Han
Email: fengling@cs.rmit.edu.au
Contact Information Jiankun Hu
Email: jiankun@cs.rmit.edu.au
Contact Information Xinhuo Yu
Email: x.yu@ems.rmit.edu.au
Contact Information Yong Feng
Email: feng.yong@ems.rmit.edu.au
Contact Information Jie Zhou
Email: jzhou@tsinghua.edu.cn
===================================
92. Xiao-Yuan Jing, Chen
Lu, David
Zhang:
An Uncorrelated Fisherface Approach for Face and Palmprint
Recognition.
682-687
Electronic Edition
(link) BibTeX
Others
An Uncorrelated Fisherface Approach for Face and Palmprint Recognition
Xiao-Yuan Jing1 Contact Information, Chen Lu1 Contact Information and
David Zhang2 Contact Information
(1) Shenzhen Graduate School of Harbin,
Institute of Technology,
Shenzhen 518055, China
(2) Dept. of Computing, Hong Kong Polytechnic
University, Kowloon,
Hong Kong
Abstract
The Fisherface method is a most representative method of the linear
discrimination analysis (LDA) technique. However, there persist in the
Fisherface method at least two areas of weakness. The first weakness is
that it cannot make the achieved discrimination vectors completely
satisfy the statistical uncorrelation while costing a minimum of
computing time. The second weakness is that not all the discrimination
vectors are useful in pattern classification. In this paper, we propose
an uncorrelated Fisherface approach (UFA) to improve the Fisherface
method in these two areas. Experimental results on different image
databases demonstrate that UFA outperforms the Fisherface method and
the uncorrelated optimal discrimination vectors (UODV) method.
Contact Information Xiao-Yuan Jing
Email: jingxy_2000@yahoo.com
Contact Information Chen Lu
Email: cssandylu@hitsz.edu.cn
Contact Information David Zhang
Email: csdzhang@comp.polyu.edu.hk
===================================
93. Xin Li, Ayman
Abaza, Diaa
Eldin M. Nassar, Hany
H. Ammar:
Fast and Accurate Segmentation of Dental X-Ray Records.
688-696
Electronic Edition
(link) BibTeX
Others
Fast and Accurate Segmentation of Dental X-Ray Records
Xin Li1 Contact Information, Ayman Abaza1 Contact Information, Diaa
Eldin Nassar1 Contact Information and Hany Ammar1 Contact Information
(1) Lane Dept. of Computer Science and
Electrical Engineering,
West Virginia University, Morgantown, WV 26506-6109,
Abstract
Identification of deceased individuals based on dental characteristics
is receiving increased attention. Dental radiographic films of an
individual are usually composed into a digital image record. In order
to achieve high level of automation in postmortem identification, it is
necessary to decompose dental image records into their constituent
radiographic films, which are in turn segmented to localize dental
regions of interest. In this paper we offer an automatic hierarchical
treatment to the problem of cropping dental image records into films.
Our approach is heavily based on concepts of mathematical morphology
and shape analysis. Among the many challenges we face are non-standard
assortments of films into records, variability in record digitization
as well as randomness of record background both in intensity and
texture. We show by experimental evidence that our approach achieves
high accuracy and timeliness.
Contact Information Xin Li
Email: xinl@csee.wvu.edu
Contact Information Ayman Abaza
Email: ayabaza@csee.wvu.edu
Contact Information Diaa Eldin Nassar
Email: dmnassar@csee.wvu.edu
Contact Information Hany Ammar
Email: ammar@csee.wvu.edu
===================================
94. Ton H. M. Akkermans, Tom
A. M. Kevenaar, Daniel
W. E. Schobben:
Acoustic Ear Recognition.
697-705
Electronic Edition
(link) BibTeX
Others
Acoustic Ear Recognition
Ton H.M. Akkermans1 Contact Information, Tom A.M. Kevenaar1 Contact
Information and Daniel W.E. Schobben1 Contact Information
(1) Philips Research, Prof. Holstlaan 4, 5656
AA Eindhoven, The
Netherlands
Abstract
We investigate how the acoustic properties of the pinna – i.e. the
outer flap of the ear- and the ear canal can be used as a biometric.
The acoustic properties can be measured relatively easy with an
inexpensive sensor and feature vectors can be derived with little
effort. Classification results for three platforms are given
(headphone, earphone, mobile phone) using noise as an input signal.
Furthermore, preliminary results are given for the mobile phone
platform where we use music as an input signal. We achieve equal error
rates in the order of 1%-5%, depending on the platform that is used to
do the measurement.
Contact Information Ton H.M. Akkermans
Email: ton.h.akkermans@philips.com
Contact Information Tom A.M. Kevenaar
Email: tom.kevenaar@philips.com
Contact Information Daniel W.E. Schobben
Email: daniel.schobben@philips.com
===================================
95. Myung Hwan Yun, Joo
Hwan Lee, Hyoungjoo
Lee, Sungzoon
Cho:
Classification of Bluffing Behavior and Affective Attitude from
Prefrontal Surface Encephalogram During On-Line Game.
706-712
Electronic Edition
(link) BibTeX
Others
Classification of Bluffing Behavior and Affective Attitude from
Prefrontal Surface Encephalogram During On-Line Game
Myung Hwan Yun1 Contact Information, Joo Hwan Lee1 Contact Information,
Hyoung-joo Lee1 Contact Information and Sungzoon Cho1 Contact
Information
(1) Department of Industrial Engineering,
Seoul National
University, Seoul, 151-742, South Korea
Abstract
The purpose of this research was to detect the pattern of player’s
emotional change during on-line game. By defining data processing
technique and analysis method for bio-physiological activity and
player’s bluffing behavior, the classification of affective attitudes
during on-line game was attempted. Bluffing behavior displayed during
the game was classified into two dimensions of emotional axis based on
prefrontal surface electroencephalographic data. Classified bluffing
attitudes were: (1) pleasantness/unpleasantness; and (2)
honesty/bluffing. A multilayer-perception neural network was used to
classify the player state into four attitude categories. Resulting
classifier showed moderate performance with 67.03%
pleasantness/unpleasantness classification, and 77.51% for
honesty/bluffing. The classifier model developed in this study was
integrated to on-line game as a form of ‘emoticon’ which displays
facial expression of opposing player’s emotional state.
Contact Information Myung Hwan Yun
Email: mhy@snu.ac.kr
Contact Information Joo Hwan Lee
Email: leejh337@snu.ac.kr
Contact Information Hyoung-joo Lee
Email: impatton@snu.ac.kr
Contact Information Sungzoon Cho
Email: zoon@snu.ac.kr
===================================
96. Rohit Singh, Sandeep
Samal, Tapobrata
Lahiri:
A Novel Strategy for Designing Efficient Multiple Classifier.
713-720
Electronic Edition
(link) BibTeX
Others
A Novel Strategy for Designing Efficient Multiple Classifier
Rohit Singh1 Contact Information, Sandeep Samal2 Contact Information
and Tapobrata Lahiri3 Contact Information
(1) Wipro Technologies, K-312, 5th Block,
Koramangala, Bangalore -
560095, India
(2) Tata Consultancy Services,
Bangalore,
(3) Indian Institute of Information
Technology, Allahabad -
211012, India
Abstract
In this paper we have shown that systematic incorporation of decision
from various classifiers following a simple decision decomposition
rule, gives better decision in comparison to the existing multiple
classifier systems. In our method each classifier were graded according
to their effectiveness of providing more accurate results. This
approach first utilizes the best classifier. If this classifier
classifies the test sample into more than one class or fails to
classify the test data then the feature next to the best is summoned to
finish up the remaining part of the classification. The continuation of
this process, along with the judicious selection of classifiers, yields
better efficiency in identifying a single class for the test data. The
results obtained after the experiments on a set of fingerprint images
shows the effectiveness of our proposed classifier.
Contact Information Rohit Singh
Email: rohit.singh@wipro.com
Contact Information Sandeep Samal
Email: sandeep.sam@tcs.com
Contact Information Tapobrata Lahiri
Email: tlahiri@iiita.ac.in
===================================
97 Marcos Faúndez-Zanuy, Miguel
A. Ferrer-Ballester, Carlos
Travieso-González, Virginia
Espinosa-Duro:
Hand Geometry Based Recognition with a MLP Classifier.
721-727
Electronic Edition
(link) BibTeX
Others
Hand Geometry Based Recognition with a MLP Classifier
Marcos Faundez-Zanuy1 Contact Information, Miguel A. Ferrer-Ballester2
Contact Information, Carlos M. Travieso-González2 Contact
Information
and Virginia Espinosa-Duro1 Contact Information
(1) Escola Universitària
Politècnica de Mataró (UPC), Barcelona,
Spain
(2) Dpto. de Señales y Comunicaciones,
Universidad de Las Palmas
de Gran Canaria, Campus de Tafira, E-35017, Las Palmas de Gran Canaria,
Spain
Abstract
This paper presents a biometric recognition system based on hand
geometry. We describe a database specially collected for research
purposes, which consists of 50 people and 10 different acquisitions of
the right hand. This database can be freely downloaded. In addition, we
describe a feature extraction procedure and we obtain experimental
results using different classification strategies based on Multi Layer
Perceptrons (MLP). We have evaluated identification rates and Detection
Cost Function (DCF) values for verification applications. Experimental
results reveal up to 100% identification and 0% DCF.
Contact Information Marcos Faundez-Zanuy
Email: faundez@eupmt.es
URL: http://www.eupmt.es/veu
Contact Information Miguel A. Ferrer-Ballester
Email: mferrer@dsc.ulpgc.es
URL: http://www.gpds.ulpgc.es
Contact Information Carlos M.
Travieso-González
Email: ctravieso@dsc.ulpgc.es
URL: http://www.gpds.ulpgc.es
Contact Information Virginia Espinosa-Duro
Email: espinosa@eupmt.es
URL: http://www.eupmt.es/veu
===================================
Ileana Buhan, Asker
M. Bazen, Pieter
H. Hartel, Raymond
N. J. Veldhuis:
98. A False Rejection Oriented
Threat Model for
the Design of Biometric Authentication Systems.
728-736
Electronic Edition
(link) BibTeX
Others
A False Rejection Oriented Threat Model for the Design of Biometric
Authentication Systems
Ileana Buhan1, Asker Bazen1, Pieter Hartel1 and Raymond Veldhuis1
(1) University of Twente, Faculty of
Electrical Engineering, PO
217, 7500AE Enschede, The Netherlands
Abstract
For applications like Terrorist Watch Lists and Smart Guns, a false
rejection is more critical than a false acceptance. In this paper a new
threat model focusing on false rejections is presented, and the
“standard” architecture of a biometric system is extended by adding
components like crypto, audit logging, power, and environment to
increase the analytic power of the threat model. Our threat model gives
new insight into false rejection attacks, emphasizing the role of an
external attacker. The threat model is intended to be used during the
design of a system.
===================================
99. Tai-Kia Tan, Cheng-Leong
Ng, Kar-Ann
Toh, How-Lung
Eng, Wei-Yun
Yau, Dipti
Srinivasan:
A Bimodal Palmprint Verification System.
737-743
Electronic Edition
(link) BibTeX
Others
A Bimodal Palmprint Verification System
Tai-Kia Tan1, Cheng-Leong Ng1, Kar-Ann Toh2 Contact Information,
How-Lung Eng2 Contact Information, Wei-Yun Yau2 Contact Information and
Dipti Srinivasan1 Contact Information
(1) Dept. of Electrical & Computer
Engineering, National
University of Singapore, 117576, Singapore
(2) Institute for Infocomm Research, 21 Heng
Mui Keng Terrace,
119613, Singapore
Abstract
Hand-based biometrics such as fingerprint and palmprint had been widely
accepted because of their convenience and ease in usage without
intruding much to one’s privacy such as face. The aim of this work is
to develop a new point-based algorithm for palmprint feature extraction
and perform reliable verification based on the extracted features. This
point-based recognition system is next used as part of a bimodal
palmprint recognition system combining with a DCT-based (Discrete
Cosine Transform) algorithm for identity verification. The performance
of the integrated system is evaluated using physical palmprint images.
Keywords: Biometrics, Palmprint Recognition, Multimodal Biometrics, and
Identity Verification.
Contact Information Kar-Ann Toh
Email: katoh@ieee.org
Contact Information How-Lung Eng
Email: hleng@i2r.a-star.edu.sg
Contact Information Wei-Yun Yau
Email: wyyau@i2r.a-star.edu.sg
Contact Information Dipti Srinivasan
Email: dipti@nus.edu.sg
===================================
100. Qiang Li, ZhengDing
Qiu, Dongmei
Sun:
Feature-Level Fusion of Hand Biometrics for Personal Verification
Based on Kernel PCA.
744-750
Electronic Edition
(link) BibTeX
Others
Feature-Level Fusion of Hand Biometrics for Personal Verification Based
on Kernel PCA
Qiang Li1 Contact Information, Zhengding Qiu1 and Dongmei Sun1
(1) Institute of Information Science, Beijing
Jiaotong University,
Beijing 100044, P.R. China
Abstract
This paper presents a novel method of feature-level fusion (FLF) based
on kernel principle component analyze (KPCA). The proposed method is
applied to fusion of hand biometrics include palmprint, hand shape and
knuckleprint, and we name the new feature as “handmetric”. For
different kind of samples, polynomial kernel is employed to generate
the kernel matrixes that indicate the relationship among them. While
fusing these kernel matrixes by fusion operators and extracting
principle components, the handmetric feature space is established and
nonlinear feature-level fusion projection could be implemented. The
experimental results testify that the method is efficient for feature
fusion, and could keep more identity information for verification.
Contact Information Qiang Li
Email: liqianglq@126.com
===================================
101. Young-suk Shin, Myung-Su
Kim:
Human Identification System Based on PCA Using Geometric Features of
Teeth.
751-755
Electronic Edition
(link) BibTeX
Others
Human Identification System Based on PCA Using Geometric Features of
Teeth
Young-Suk Shin1 Contact Information and Myung-Su Kim2 Contact
Information
(1) Department of Information Communication
Engineering, Chosun
University, #375 Seosuk-dong, Dong-gu, Gwangju, 501-759, South Korea
(2) College of Dentistry, Chosun University,
#375 Seosuk-dong,
Dong-gu, Gwangju, 501-759, South Korea
Abstract
We present a new human identification system based on PCA using
geometric features of teeth such as the size and shape of the jaws,
size of the teeth and teeth structure. In this paper we try to set
forth the foundations of a biometric system for information encrypting
of living people using dental features. To create a biometric matching
system, a template based on principal component analysis(PCA) is
created from dental data collected the plaster figures of teeth which
were done at dental hospital, department of oral medicine. Templates of
dental images based on PCA representation include the 100 principle
components as the features for individual identification. The PCA basis
vectors reflects well the features for individual identification in the
whole of teeth and the part of teeth. The classification for human
identification is generated based on the distance between the whole of
teeth and the part of teeth with the nearest neighbor(NN) algorithm.
The identification performance in 300 dental image is 97% for the part
of teeth missed the right-molar and back teeth, 98.3% for the part of
teeth missed the front teeth and 96.6% for the part of teeth missed the
left-molar and back-teeth.
Contact Information Young-Suk Shin
Email: ysshin@chosun.ac.kr
Contact Information Myung-Su Kim
Email: msakim@chosun.ac.kr
===================================
102. Tak Chan, Junping
Zhang:
An Improved Super-Resolution with Manifold Learning and Histogram
Matching.
756-762
Electronic Edition
(link) BibTeX
Others
An Improved Super-Resolution with Manifold Learning and Histogram
Matching
Tak Ming Chan1 Contact Information and Junping Zhang1, 2 Contact
Information
(1) Shanghai Key Laboratory of Intelligent
Information Processing,
Department of Computer Science and Engineering, Fudan University,
200433, China
(2) The Key Laboratory of Complex Systems and
Intelligence
Science, Institute of Automation, Chinese Academy of Sciences, Beijing,
100080, China
Abstract
Biometric Person Authentication such as face, fingerprint, palmprint
and signature depends on the quality of image processing. When it needs
to be done under a low-resolution image, the accuracy will be impaired.
So how to recover the lost information from downsampled images is
important for both authentication and preprocessing. Based on
Super-Resolution through Neighbor Embedding algorithm and histogram
matching, we propose an improved super-resolution approach to choose
more reasonable training images. First, the training image are selected
by histogram matching. Second, neighbor embedding algorithm is employed
to recover the high-resolution image. Experiments in several images
show that our improved super-resolution approach is promising for
potential applications such as low-resolution mobile phone or CCTV
(Closed Circuit Television) image person authentication.
Contact Information Tak Ming Chan
Email: 0272366@fudan.edu.cn
Contact Information Junping Zhang
Email: jpzhang@fudan.edu.cn
===================================
103. Jaehyuck Lim, Hyobin
Lee, Sangyoun
Lee, Jaihie
Kim:
Invertible Watermarking Algorithm with Detecting Locations of
Malicious Manipulation for Biometric Image Authentication.
763-769
Electronic Edition
(link) BibTeX
Others
Invertible Watermarking Algorithm with Detecting Locations of Malicious
Manipulation for Biometric Image Authentication
Jaehyuck Lim2 Contact Information, Hyobin Lee1 Contact Information,
Sangyoun Lee2 Contact Information and Jaihie Kim2 Contact Information
(1) Biometric Engineering Research Center
(BERC), Graduate Program
in Biometrics,
(2) Department of Electrical and Electronic
Engineering, Yonsei
University, 134, Shinchon-dong, Seodaemon-ku, Seoul, 120-749, Korea
Abstract
In this paper, we present a new method for authentication of biometric
images. Our method uses an invertible watermark that can also detect
malicious manipulations simultaneously. While virtually all
watermarking schemes introduce a small amount of non-invertible
distortion in original biometric images, our new method is invertible
in the sense that, if the data is deemed authentic, distortion due to
authentication can be removed if it becomes necessary to obtain the
original biometric image. This technique provides cryptographic
strength when verifying image integrity because the probability of
making an undetectable modification to the image can be directly
related to a secure cryptographic element, such as a hash function.
Also, if the biometric image is manipulated, the positions of
intentional manipulation can be clearly identified.
Contact Information Jaehyuck Lim
Email: jhlim@yonsei.ac.kr
Contact Information Hyobin Lee
Email: leehb00@yonsei.ac.kr
Contact Information Sangyoun Lee
Email: syleee@yonsei.ac.kr
Contact Information Jaihie Kim
Email: jhkim@yonsei.ac.kr
===================================
104. Zhiwen Xu, Xiaoxin
Guo, Xiaoying
Hu, Xu
Chen, Zhengxuan
Wang:
The Identification and Recognition Based on Point for Blood Vessel
of Ocular Fundus.
770-776
Electronic Edition
(link) BibTeX
Others
The Identification and Recognition Based on Point for Blood Vessel of
Ocular Fundus
Zhiwen Xu1 Contact Information, Xiaoxin Guo1, Xiaoying Hu2, Xu Chen1
and Zhengxuan Wang1
(1) Open Symbol Computation and Knowledge
Engineering Laboratory
of State Education Department, College of Computer Science and
Technology,
(2) The First Clinical Hospital, Jilin
University, Changchun City,
130012, Jilin Province, China
Abstract
Today, iris recognition, fingerprint recognition, face recognition,
voice recognition and other biometric technology are experiencing rapid
development. This paper addresses a new biometric technology–the
identification and recognition based on point of blood vessel skeleton
for ocular fundus. The image for green gray scale of ocular fundus is
utilized. The cross point of skeleton shape of blood vessel for ocular
fundus using contrast-limited adaptive histogram equalization is
extracted at first. After filtering treatment and extracting shape,
shape curve of blood vessels is obtained. The cross point of shape for
curve matching is later carried out by means of cross point matching.
The recognition based on shape for blood vessel of ocular fundus has
been demonstrated in this paper to possess high Identification and
recognition rate, low rejection recognition rate as well as good
universality, exclusiveness and stability. With more and more progress
made in extracting technology, the recognition for blood vessel of
optic fundus is to become an effective biometric technology.
Contact Information Zhiwen Xu
Email: xuzhiwen@public.cc.jl.cn
===================================
105. Yihong Ding, Xijian
Ping, Min
Hu, Tao
Zhang:
A Method for Footprint Range Image Segmentation and Description.
777-785
Electronic Edition
(link) BibTeX
Others
A Method for Footprint Range Image Segmentation and Description
Yihong Ding1 Contact Information, Xijian Ping1, Min Hu1 and Tao Zhang1
(1) Zhengzhou Information Science and
Technology Institute,
Zhengzhou, Henan, 450002, China
Abstract
In this paper, we firstly present a novel footprint range image
segmentation method using the principal curvatures and the principal
directions. Utilizing the principal curvatures information, we detect
the peak areas as the seeds, and apply region growing to locate the
edges of each patch. We apply the edge detection technology to the
region growth rules, so the boundary localization is precise. To obtain
more stable edge information, a multi-scale fusion approach is proposed
to integrate the segmentation results calculated at different fitting
sizes. After the segmentation, according to the shape characteristics
of footprint, we use superquadric and saddle models to describe shape
features of each patch. The experiments results on footprint range
images show that the segmented patches and the descriptions represent
footprint biometric information effectively and set a reliable basis
for the further recognition.
Contact Information Yihong Ding
Email: dingyihong@126.com
===================================
106. Mohamed Abdel-Mottaleb, Jindan
Zhou:
Human Ear Recognition from Face Profile Images.
786-792
Electronic Edition
(link) BibTeX
Others
Human Ear Recognition from Face Profile Images
Mohamed Abdel-Mottaleb1 and Jindan Zhou1
(1) Department of Electrical & Computer
Engineering,
University of Miami, 1251 Memorial Dr., Coral Gables, FL 33146,
Abstract
In this paper, we present a novel system for ear identification from
profile images of the face. The system has two steps. In the first
step, the ear is automatically detected from the profile image of the
face. In the second step, the ear image is transformed to a force
field, then feature points are extracted and the best match is found
from a database. We propose a method based on differential geometry to
extract ear feature points. We use a transformation of the ear image to
make it suitable for extracting the feature points using differential
geometry. During recognition, the feature points obtained from a query
image are aligned and compared with those in the database using
Hausdorff distance. The experimental results show that our method is
effective
===================================
END