26 research outputs found

    Stacking-based Deep Neural Network: Deep Analytic Network on Convolutional Spectral Histogram Features

    Full text link
    Stacking-based deep neural network (S-DNN), in general, denotes a deep neural network (DNN) resemblance in terms of its very deep, feedforward network architecture. The typical S-DNN aggregates a variable number of individually learnable modules in series to assemble a DNN-alike alternative to the targeted object recognition tasks. This work likewise devises an S-DNN instantiation, dubbed deep analytic network (DAN), on top of the spectral histogram (SH) features. The DAN learning principle relies on ridge regression, and some key DNN constituents, specifically, rectified linear unit, fine-tuning, and normalization. The DAN aptitude is scrutinized on three repositories of varying domains, including FERET (faces), MNIST (handwritten digits), and CIFAR10 (natural objects). The empirical results unveil that DAN escalates the SH baseline performance over a sufficiently deep layer.Comment: 5 page

    Stacking-Based Deep Neural Network: Deep Analytic Network for Pattern Classification

    Full text link
    Stacking-based deep neural network (S-DNN) is aggregated with pluralities of basic learning modules, one after another, to synthesize a deep neural network (DNN) alternative for pattern classification. Contrary to the DNNs trained end to end by backpropagation (BP), each S-DNN layer, i.e., a self-learnable module, is to be trained decisively and independently without BP intervention. In this paper, a ridge regression-based S-DNN, dubbed deep analytic network (DAN), along with its kernelization (K-DAN), are devised for multilayer feature re-learning from the pre-extracted baseline features and the structured features. Our theoretical formulation demonstrates that DAN/K-DAN re-learn by perturbing the intra/inter-class variations, apart from diminishing the prediction errors. We scrutinize the DAN/K-DAN performance for pattern classification on datasets of varying domains - faces, handwritten digits, generic objects, to name a few. Unlike the typical BP-optimized DNNs to be trained from gigantic datasets by GPU, we disclose that DAN/K-DAN are trainable using only CPU even for small-scale training sets. Our experimental results disclose that DAN/K-DAN outperform the present S-DNNs and also the BP-trained DNNs, including multiplayer perceptron, deep belief network, etc., without data augmentation applied.Comment: 14 pages, 7 figures, 11 table

    Periocular in the Wild Embedding Learning with Cross-Modal Consistent Knowledge Distillation

    Full text link
    Periocular biometric, or peripheral area of ocular, is a collaborative alternative to face, especially if a face is occluded or masked. In practice, sole periocular biometric captures least salient facial features, thereby suffering from intra-class compactness and inter-class dispersion issues particularly in the wild environment. To address these problems, we transfer useful information from face to support periocular modality by means of knowledge distillation (KD) for embedding learning. However, applying typical KD techniques to heterogeneous modalities directly is suboptimal. We put forward in this paper a deep face-to-periocular distillation networks, coined as cross-modal consistent knowledge distillation (CM-CKD) henceforward. The three key ingredients of CM-CKD are (1) shared-weight networks, (2) consistent batch normalization, and (3) a bidirectional consistency distillation for face and periocular through an effectual CKD loss. To be more specific, we leverage face modality for periocular embedding learning, but only periocular images are targeted for identification or verification tasks. Extensive experiments on six constrained and unconstrained periocular datasets disclose that the CM-CKD-learned periocular embeddings extend identification and verification performance by 50% in terms of relative performance gain computed based upon face and periocular baselines. The experiments also reveal that the CM-CKD-learned periocular features enjoy better subject-wise cluster separation, thereby refining the overall accuracy performance.Comment: 30 page

    Offline Handwritten Signature Watermark for Digital Document Authentication

    No full text
    This thesis introduces a novel biometric watermarking technique using offline handwritten signature, namely, signature image, as the watermark. Traditionally, the host image is embedded using originator\'s name, graphical logo and serial number which can easily be forged. Biometric watermarking, which synergistically integrates biometrics and the digital watermarking technology, is therefore proposed to replace the traditional digital watermarking techniques. The primary advantage of the offline handwritten is that it is a type of biometric behavioral attribute possessing unique means to identify an individually unambiguously

    Solutions to the Diophantine Equation x2 + 16 ∙ 7b = y2r

    No full text
    We present a method of determining integral solutions to the equation x2 + 16 ∙ 7b = y2r, where x, y, b, r ∈ ℤ+. We observe that the results can be classified into several categories. Under each category, a general formula is obtained using the geometric progression method. We then provide the bound for the number of non-negative integral solutions associated with each b. Lastly, the general formula for each of the categories is obtained and presented to determine the respective values of x and yr. We also highlight two special cases where different formulae are needed to represent their integral solutions. © Copyright Yow. This article is distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use and redistribution provided that the original author and source are credited.11Nscopu

    An Implicit Identity-Extended Data Augmentation for Low-Resolution Face Representation Learning

    No full text
    Low-resolution (LR) face recognition (LRFR) tackles tiny face images detected from real-world surveillance camera footage, which are unconstrained and generally poor in quality. Owing to the absence of a million-scale labeled LR face dataset, identity-invariant data augmentation (DA) transformations such as flipping, rotation, rescaling, etc., are applied to inflate the effective training examples with respect to the source identities for representation learning. Unfortunately, the identity-invariant property incurs additional intra-class disparity that impairs generalization performance. In this paper, we put forward a new means of DA strategy, termed identity-extended DA, that satisfies both affinity and diversity requirements essential to DA. We instantiate an implicit identity-extended augmentation network, or simply IDEA-Net, to realize the proposed identity-extended DA for LRFR. More specifically, training an IDEA-Net instance augments the small-scale LR (query) face dataset with identity-extended (auxiliary) face examples implicitly in the representation space. We also introduce a calibrator to regulate the disordered representation space by refining the intra-class compactness and the inter-class separation. This diminishes the distribution shift between the original and the augmented examples (affinity) and increases the learning complexity (diversity). We substantiate that IDEA-Net renders a high affinity and diversity representation space. On the other hand, our experimental results on three real-world LR face datasets demonstrate that IDEA-Nets outperform the baselines and other counterparts trained without leveraging the identity-extended examples for LRFR.11Nsciescopu

    Fusion of LSB and DWT biometric watermarking for offline handwritten signature

    No full text
    Biometric watermarking refers to the incorporation of biometrics in watermarking technology. In this paper, we present a novel biometric watermarking scheme to embed handwritten signature invisibly in the host as a notice of legitimate ownership. We propose to adaptively fuse Least Significant Bit (LSB) and Discrete Wavelet Transform (DWT)-based approaches into a unison framework, which to be known as LSB-DWT scheme. The performance of LSB-DWT scheme is validated against simulated frequency and geometric attacks, specifically JPG compression, low pass filtering, median filtering, noise addition, scaling, rotation and cropping through visual inspection, Peak Signal to Noise Ratio (PSNR) and watermark distortion rate. Experiment results prove that LSB-DWT scheme is sufficiently robust even in the presence of deliberate distortions

    Fusion of LSB and DWT biometric watermarking using offline handwritten signature for copyright protection

    No full text
    Biometric watermarking was introduced as the synergistic integration of biometrics and digital watermarking technology. This paper proposes a novel biometric watermarking technique, which embeds offline handwritten signature in host image for copyright protection. We propose to combine the conventional LSB-based and DWT-based watermarking techniques into a unison framework, which is known as LSB-DWT in this paper. The proposed LSB-DWT technique is evaluated against various simulated security attacks, i.e. JPEG compression, Gaussian low-pass filtering, median filtering, Gaussian noise, scaling, rotation and cropping. The experimental results demonstrate that the proposed LSB-DWT technique exhibits remarkable watermark imperceptibility and watermark robustness

    Support Vector Machines (SVM)-based biometric watermarking for offline handwritten signature

    No full text
    Biometric watermarking refers to the incorporation of biometrics and watermarking technology. In this paper, we present a novel biometric watermarking scheme to embed handwritten signature in the host as a notice of legitimate ownership. The core of the proposed method is the synergistic integration of a statistical classifier, i.e. the Support Vector Machine, with biometric watermarking to precisely extract the signature code from the host. We abbreviate the proposed method as SVM-BW. The performance of SVM-BW is validated against simulated frequency and geometric attacks, which include JPG compression, low pass filtering, median filtering, noise addition, scaling, rotation and cropping. Experiment results reveal that SVM-BW is able to endure severe degradation on the host fidelity. Furthermore, SVM-BW shows remarkable robustness even if the host is deliberately distorted
    corecore