14,949 research outputs found

    Setting a world record in 3D face recognition

    Get PDF
    Biometrics - recognition of persons based on how they look or behave, is the main subject of research at the Chair of Biometric Pattern Recognition (BPR) of the Services, Cyber Security and Safety Group (SCS) of the EEMCS Faculty at the University of Twente. Examples are finger print recognition, iris and face recognition. A relatively new field is 3D face recognition based on the shape of the face rather that its appearance. This paper presents a method for 3D face recognition developed at the Chair of Biometric Pattern Recognition (BPR) of the Services, Cyber Security and Safety Group (SCS) of the EEMCS Faculty at the University of Twente and published in 2011. The paper also shows that noteworthy performance gains can be obtained by optimisation of an existing method. The method is based on registration to an intrinsic coordinate system using the vertical symmetry plane of the head, the tip of the nose and the slope of the nose bridge. For feature extraction and classification multiple regional PCA-LDA-likelihood ratio based classifiers are fused using a fixed FAR voting strategy. We present solutions for correction of motion artifacts in 3D scans, improved registration and improved training of the used PCA-LDA classifier using automatic outlier removal. These result in a notable improvement of the recognition rates. The all vs all verification rate for the FRGC v2 dataset jumps to 99.3% and the identification rate for the all vs first to 99.4%. Both are to our knowledge the best results ever obtained for these benchmarks by a fairly large margin

    Face recognition performance analysis: Cohort classifiers

    Get PDF
    In this report we will describe how we researched the performance of traditional face recognition methods in combination with clustering.The idea is that the performance of a trained PCA/LDA classifier can be improved with a two-step approach. With the first step, faces are bundled into clusters. After that, a face recognition system is trained individually on each cluster. There are different methods for clustering, like using PCA and then using the Euclidean Distance to determine which faces are close. Or just use a face-recognition system to determine which faces are close. By using one of these approaches, one can create clusters easily. These clusters are called cohorts

    Human Face Recognition Using Discriminant Analysis

    Get PDF
    In the present research, a face recognition method is proposed based on the concept of linear discriminant analysis (LDA) method. The LDA requires input some of image models to analyze and discriminate them, the newly proposed idea is the use of a number of textural features instead of face image pixels to be input the LDA procedure. The employed textural features were ten, which are computed for each face image using the grey level co-occurrence matrix (GLCM) method. The proposed face recognition method consists of two phases: enrollment and recognition. The enrollment phase is responsible for collecting the features of each face image to be a comparable models stored in the database, while the recognition phase is responsible on comparing the extracted features of input unknown face with that stored in the database. The comparison results a number of percentage values, each refers to the similarity between the input unknown face with the models in the database. The recognition decision is then issued according to the comparison results. The results showed that the system performed the recognition test with a recognition percent of about 94%, whereas the validation test showed that the system performance was about 92%. Frequent practices showed that the behavior of the recognition is acceptable and it is enjoying with the ability to be improved.

    3D Face Recognition using Sparse Spherical Representations

    Get PDF
    This paper addresses the problem of 3D face recognition using spherical sparse representations. We first propose a fully automated registration process that permits to align the 3D face point clouds. These point clouds are then represented as signals on the 2D sphere, in order to take benefit of the geometry information. Simultaneous sparse approximations implement a dimensionality reduction process by subspace projection. Each face is typically represented by a few spherical basis functions that are able to capture the salient facial characteristics. The dimensionality reduction step preserves the discriminant facial information and eventually permits an effective matching in the reduced space, where it can further be combined with LDA for improved recognition performance. We evaluate the 3D face recognition algorithm on the FRGC v.1.0 data set, where it outperforms classical state-of-the-art solutions based on PCA or LDA on depth face images

    Face Verification without False Acceptance

    Get PDF
    Principal Components Analysis (PCA) and Linear Discriminant Analysis (LDA) are two popular approaches in face recognition and verification. The methods are classified under appearance-based approach and are considered to be highly-correlated. The last factor deems a fusion of both methods to be unfavorable. Nevertheless the authors will demonstrate a verification performance in which the fusion of both method produces an improved rate compared to individual performance. Tests are carried out on FERET (Facial Recognition Technology) database using a modified protocol. A major drawback in applying LDA is that it requires a large set of individual face images sample to extract the intra-class variations. In real life application data enrolment incurs costs such as human time and hardware setup. Tests are therefore conducted using virtual images and its performance and behaviour recorded as an option for multiple sample. The FERET database is chosen because it is widely used by researchers and published results are available for comparisons. Performance is presented as the rate of verification when false acceptance rate is zero, in other words, no impostors allowed. Initial results using fusion of two verification experts shows that a fusion of T-Zone LDA with Gabor LDA of whole face produces the best verification rate of 98.2% which is over 2% improvement compared with the best individual expert

    Retaining Expression on De-identified Faces

    Get PDF
    © Springer International Publishing AG 2017The extensive use of video surveillance along with advances in face recognition has ignited concerns about the privacy of the people identifiable in the recorded documents. A face de-identification algorithm, named k-Same, has been proposed by prior research and guarantees to thwart face recognition software. However, like many previous attempts in face de-identification, kSame fails to preserve the utility such as gender and expression of the original data. To overcome this, a new algorithm is proposed here to preserve data utility as well as protect privacy. In terms of utility preservation, this new algorithm is capable of preserving not only the category of the facial expression (e.g., happy or sad) but also the intensity of the expression. This new algorithm for face de-identification possesses a great potential especially with real-world images and videos as each facial expression in real life is a continuous motion consisting of images of the same expression with various degrees of intensity.Peer reviewe

    Toward Open-Set Face Recognition

    Full text link
    Much research has been conducted on both face identification and face verification, with greater focus on the latter. Research on face identification has mostly focused on using closed-set protocols, which assume that all probe images used in evaluation contain identities of subjects that are enrolled in the gallery. Real systems, however, where only a fraction of probe sample identities are enrolled in the gallery, cannot make this closed-set assumption. Instead, they must assume an open set of probe samples and be able to reject/ignore those that correspond to unknown identities. In this paper, we address the widespread misconception that thresholding verification-like scores is a good way to solve the open-set face identification problem, by formulating an open-set face identification protocol and evaluating different strategies for assessing similarity. Our open-set identification protocol is based on the canonical labeled faces in the wild (LFW) dataset. Additionally to the known identities, we introduce the concepts of known unknowns (known, but uninteresting persons) and unknown unknowns (people never seen before) to the biometric community. We compare three algorithms for assessing similarity in a deep feature space under an open-set protocol: thresholded verification-like scores, linear discriminant analysis (LDA) scores, and an extreme value machine (EVM) probabilities. Our findings suggest that thresholding EVM probabilities, which are open-set by design, outperforms thresholding verification-like scores.Comment: Accepted for Publication in CVPR 2017 Biometrics Worksho
    • …
    corecore