20 research outputs found

    Face Verification without False Acceptance

    Get PDF
    Principal Components Analysis (PCA) and Linear Discriminant Analysis (LDA) are two popular approaches in face recognition and verification. The methods are classified under appearance-based approach and are considered to be highly-correlated. The last factor deems a fusion of both methods to be unfavorable. Nevertheless the authors will demonstrate a verification performance in which the fusion of both method produces an improved rate compared to individual performance. Tests are carried out on FERET (Facial Recognition Technology) database using a modified protocol. A major drawback in applying LDA is that it requires a large set of individual face images sample to extract the intra-class variations. In real life application data enrolment incurs costs such as human time and hardware setup. Tests are therefore conducted using virtual images and its performance and behaviour recorded as an option for multiple sample. The FERET database is chosen because it is widely used by researchers and published results are available for comparisons. Performance is presented as the rate of verification when false acceptance rate is zero, in other words, no impostors allowed. Initial results using fusion of two verification experts shows that a fusion of T-Zone LDA with Gabor LDA of whole face produces the best verification rate of 98.2% which is over 2% improvement compared with the best individual expert

    Improving Face Verification using Skin Color Information

    Get PDF
    The performance of face verification systems has steadily improved over the last few years, mainly focusing on models rather than on feature processing. State-of-the-art methods often use the gray-scale face image as input. In this paper, we propose to use an additional feature to the face image: the skin color. The new feature set is tested on a benchmark database, namely XM2VTS, using a simple discriminant artificial neural network. Results show that the skin color information improves significantly the performance

    An Investigation of F-ratio Client-Dependent Normalisation on Biometric Authentication Tasks

    Get PDF
    This study investigates a new \emph{client-dependent normalisation} to improve biometric authentication systems. There exists many client-de-pendent score normalisation techniques applied to speaker authentication, such as Z-Norm, D-Norm and T-Norm. Such normalisation is intended to adjust the variation across different client models. We propose ``F-ratio'' normalisation, or F-Norm, applied to face and speaker authentication systems. This normalisation requires only that \emph{as few as} two client-dependent accesses are available (the more the better). Different from previous normalisation techniques, F-Norm considers the client and impostor distributions \emph{simultaneously}. We show that F-ratio is a natural choice because it is directly associated to Equal Error Rate. It has the effect of centering the client and impostor distributions such that a global threshold can be easily found. Another difference is that F-Norm actually ``interpolates'' between client-independent and client-dependent information by introducing a mixture parameter. This parameter \emph{can be optimised} to maximise the class dispersion (the degree of separability between client and impostor distributions) while the aforementioned normalisation techniques cannot. unimodal experiments XM2VTS multimodal database show that such normalisation is advantageous over Z-Norm, client-dependent threshold normalisation or no normalisation

    A Novel Approach to Combining Client-Dependent and Confidence Information in Multimodal Biometric

    Get PDF
    The issues of fusion with client-dependent and confidence information have been well studied separately in biometric authentication. In this study, we propose to take advantage of both sources of information in a discriminative framework. Initially, each source of information is processed on a per expert basis (plus on a per client basis for the first information and on a per example basis for the second information). Then, both sources of information are combined using a second-level classifier, across different experts. Although the formulation of such two-step solution is not new, the novelty lies in the way the sources of prior knowledge are incorporated prior to fusion using the second-level classifier. Because these two sources of information are of very different nature, one often needs to devise special algorithms to combine both information sources. Our framework that we call ``Prior Knowledge Incorporation'' has the advantage of using the standard machine learning algorithms. Based on 10Ă—32=32010 \times 32=320 intramodal and multimodal fusion experiments carried out on the publicly available XM2VTS score-level fusion benchmark database, it is found that the generalisation performance of combining both information sources improves over using either or none of them, thus achieving a new state-of-the-art performance on this database

    The challenge of face recognition from digital point-and-shoot cameras

    Full text link
    Inexpensive “point-and-shoot ” camera technology has combined with social network technology to give the gen-eral population a motivation to use face recognition tech-nology. Users expect a lot; they want to snap pictures, shoot videos, upload, and have their friends, family and acquain-tances more-or-less automatically recognized. Despite the apparent simplicity of the problem, face recognition in this context is hard. Roughly speaking, failure rates in the 4 to 8 out of 10 range are common. In contrast, error rates drop to roughly 1 in 1,000 for well controlled imagery. To spur advancement in face and person recognition this pa-per introduces the Point-and-Shoot Face Recognition Chal-lenge (PaSC). The challenge includes 9,376 still images of 293 people balanced with respect to distance to the cam-era, alternative sensors, frontal versus not-frontal views, and varying location. There are also 2,802 videos for 265 people: a subset of the 293. Verification results are pre-sented for public baseline algorithms and a commercial al-gorithm for three cases: comparing still images to still im-ages, videos to videos, and still images to videos. 1

    A survey of face detection, extraction and recognition

    Get PDF
    The goal of this paper is to present a critical survey of existing literatures on human face recognition over the last 4-5 years. Interest and research activities in face recognition have increased significantly over the past few years, especially after the American airliner tragedy on September 11 in 2001. While this growth largely is driven by growing application demands, such as static matching of controlled photographs as in mug shots matching, credit card verification to surveillance video images, identification for law enforcement and authentication for banking and security system access, advances in signal analysis techniques, such as wavelets and neural networks, are also important catalysts. As the number of proposed techniques increases, survey and evaluation becomes important

    Regularized kernel discriminant analysis with a robust kernel for face recognition and verification

    Get PDF
    We propose a robust approach to discriminant kernel-based feature extraction for face recognition and verification. We show, for the first time, how to perform the eigen analysis of the within-class scatter matrix directly in the feature space. This eigen analysis provides the eigenspectrum of its range space and the corresponding eigenvectors as well as the eigenvectors spanning its null space. Based on our analysis, we propose a kernel discriminant analysis (KDA) which combines eigenspectrum regularization with a feature-level scheme (ER-KDA). Finally, we combine the proposed ER-KDA with a nonlinear robust kernel particularly suitable for face recognition/verification applications which require robustness against outliers caused by occlusions and illumination changes. We applied the proposed framework to several popular databases (Yale, AR, XM2VTS) and achieved state-of-the-art performance for most of our experiments
    corecore