3 research outputs found

    A Pruning Approach Improving Face Identification Systems

    Get PDF
    International audienceWe propose, in this paper, a new biometric identification approach which aims to improve recognition performances in identification systems. We aim to split the identity database into well separated partitions in order to simplify the identification task. In this paper we develop a face identification system and we use the reference algorithms of eigenfaces and fisherfaces in order to extract different features describing each identity. These features, which describe faces, are generally optimized to establish the required identity in a classical identification process. In this work, we develop a novel criterion to extract features used to partition the identity database. We develop database partitioning with clustering methods which split the gallery by bringing together identities which have similar features and separating dissimilar features in different bins. Pruning the most dissimilar bins from the query identity features allows us to improve the identification performances. We report results from the XM2VTS database

    Biometric Systems

    Get PDF
    Biometric authentication has been widely used for access control and security systems over the past few years. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics. In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time includes state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications
    corecore