A New Face Authentication System for Memory-Constrained Devices
|
|
- Elizabeth Chandler
- 5 years ago
- Views:
Transcription
1 1214 IEEE ransactons on Consumer Electroncs, Vol. 49, o. 4, OVEMBER 2003 A ew Face Authentcaton ystem for Memory-Constraned Devces Kyunghee Lee and Hyeran Byun Abstract hough bometrcs to authentcate a person s a convenent tool, typcal authentcaton algorthms by usng bometrcs may not be executable on the memory-constraned devces such as smart cards. We present a soluton of a face authentcaton algorthm for the open ssue. Our achevement s two-fold. One s to present a face authentcaton algorthm wth low memory requrement, whch uses support vector machnes (VM) wth the feature set extracted by genetc algorthms (GA). he other contrbuton s to suggest a method to reduce further, f needed, the amount of memory requred n the authentcaton at the expense of verfcaton rate by changng a controllable system parameter for a feature set sze. Gven a pre-defned amount of memory, ths capablty s qute effectve to mount our algorthm on memory-constraned devces. Our expermental results show that the proposed method provdes good performance n terms of accuracy and memory requrement 1. Index erms Bometrcs, Face Authentcaton, Memory-Constraned Devces. I. IRODUCIO In recent years, there s an ncreasng trend of usng bometrcs nformaton, whch refers the human bologcal features used for user authentcaton, such as fngerprnt, rs, and face, to strengthen the securty measure of dfferent electronc/embedded systems, ncludng smart card systems [1]-[4]. Compared to the dgt Personal Identfcaton umber (PI), the crtcal data stored n the card can be protected more securely by usng the bometrc nformaton. Furthermore, cardholder s fngerprnt or rs pattern cannot be stolen or forgotten. mart cards can play an mportant role n bometrcs, too. For nstance, n an dentfcaton system, the bometrcs templates are often stored n a central database. Wth the central storage of a bometrcs, there s an open ssue of msuse of the same for purposes that the owner of the bometrcs may not be aware of. We can decentralze the database storage part nto mllons of smart cards and gve t to the owners. 1 hs work was supported n part by Bometrcs Engneerng Research Center (KOEF). Kyunghee Lee s wth the Department of Computer cence, Yonse Unversty, eoul, Korea. Also, he s currently workng for Bometrcs echnology Research eam, ERI, Daejeon, Korea (e-mal: unrom@etr.re.kr). Hyeran Byun s wth the Department of Computer cence, Yonse Unversty, eoul, Korea (e-mal: hrbyun@cs.yonse.ac.kr). Contrbuted Paper Manuscrpt receved June 12, /00 $ IEEE However, most of these systems have a common characterstc that the bometrcs authentcaton process s solely accomplshed out of the smart card processor [5]. For example, for fngerprnt-based smart card system, the card needs to nsecurely release the crtcal fngerprnt master template nformaton nto an external fngerprnt reader, whch performs the fngerprnt checkng. o hghlght the securty, the comparson of the fngerprnt sample and the master template needs to be performed by the n-card processor,.e., match-on-card [5], not the external reader. However, the memory sze and the processng power of the n-card processor s very lmted. hus, a lghtweght authentcaton algorthm that requres small memory and processng power needs to be developed. Among bologcal features, the face s one of the most acceptable bometrcs, because humans use t n ther vsual nteractons and acqurng face mages s non-ntrusve. However, t s dffcult to develop an automatc face recognton system, whle people can easly recognze famlar human faces. It s because face mages can vary consderably n terms of facal expressons, 3D orentaton, lghtng condtons, har styles, and so on. wo prmary approaches to face recognton are the holstc (or transform) approach and the analytc (or attrbute-based) approach [6]. In the holstc approach, the unverse of face mage doman s represented usng a set of orthonormal bass vectors. Currently, the most popular bass vectors are egenfaces [7]. Each egenface s derved from the covarance analyss of the face mage populaton. wo faces are consdered to be dentcal f they are suffcently close n the egenface feature space. A number of varants of such an approach exst. emplate matchngbased face recognton systems are also classfed nto ths approach. In the analytc approach, facal attrbutes lke nose, eyes, etc. are extracted from the face mage, and the nvarance of geometrc propertes among the face landmark features s used for recognzng features [8]. hs approach has characterstcs of hgh-speed and low-memory requrement, whle the selecton and extracton of features are dffcult. Many prevous works usng ths approach have been reported. For nstance, recognton accuracy of 90% could be acheved by usng geometrc features [8]. Hybrd approaches combnng both holstc and analytc have also been reported [6].
2 K. Lee and H. Byun: A ew Face Authentcaton ystem for Memory-Constraned Devces 1215 Recently, face detecton and recognton systems usng upport Vector Machne (VM) bnary classfers [9] have been proposed. For example, methods for face detecton [10], face pose dscrmnaton [11], and recognzng face mages [12]-[14] have been proposed usng VMs. Compared wth the standard PCA-based face authentcaton method, verfcaton system based on VM has shown to be sgnfcantly better by Phllps [14]. In ths paper, we present a memory-effcent face authentcaton algorthm that uses the features chosen by Genetc Algorthms (GAs) [15] as an nput vector to an VM and also provde ts mproved verson wth the property of adjustable memory requrement. he part of ths algorthm has been publshed n [16]. Our face authentcaton system uses only dscrmnatng features selected by GA, where the features are unque for each person and thus, the memory requrement can be decreased sgnfcantly. Also, f needed, the amount of memory requred n the authentcaton can be reduced further at the expense of verfcaton rate by changng a controllable system parameter for the feature set sze. he on-lne authentcaton tme can be decreased due to the optmal feature set, although the off-lne tranng tme s ncreased due to GAs. Furthermore, by usng a tunng data set n the computaton of the GAs evaluaton functon, the feature set whch s less dependent on llumnaton and expresson can be selected. he expermental results on the Yale face database [17] and the Cambrdge Olvett Research Lab (ORL) face database [18] show that our face authentcaton algorthm wth VM whose nput vectors consst of dscrmnatng features extracted by GA has much better performance than the algorthm wthout feature selecton process by GA, n terms of accuracy and memory requrement. Experment also shows that the number of the feature to be selected s controllable by a system parameter. Owng to those features, a smart card can encapsulate all the crtcal nformaton, ncludng the bometrcs data, and perform all the comparson securely nsde the card wthout any data leakng out. he outlne of the paper s as follows: background for VM, GA, and Prncpal Component Analyss (PCA) s gven n ecton 2. ecton 3 descrbes method to construct our face authentcaton system and ecton 4 explans the authentcaton procedure usng the face authentcaton system. In secton 5, we descrbe how to mplement our system on match-on-card. ecton 6 contans expermental results and analyss, and concludng remarks are made n ecton 7. II. BACKGROUD In ths secton we wll gve bref overvew of VM and GA. More detaled descrptons of VM and GA can be found n [9] and [15]. Also, PCA that s used as a feature lst s surveyed concsely. A. upport Vector Machnes (VM) upport Vector Machnes (VM) have been recently proposed by V. Vapnk and hs co-workers as an effectve and general purpose method of pattern recognton [9]. VM s a bnary classfcaton method that fnds the optmal lnear decson surface based on the concept of structural rsk mnmzaton. he decson surface s a weghted combnaton of elements of the tranng set. hese elements are called support vectors and characterze the boundary between the two classes. We start wth a labeled set of tranng samples ( x, y ), d where x R and y s the assocated label ( y { 1,1} ). Assumng lnearly separable data, the goal of maxmum margn classfcaton s to separate the two classes by a hyperplane such that the dstance to the support vectors s maxmzed. hs hyperplane s called the optmal separatng hyperplane (OH). he OH has the form: f ( x) = α y ( x x) + b, (1) = 1 where the coeffcents α and the b are the solutons of a quadratc programmng problem. α s non-zero for support vectors and s zero otherwse. For lnearly non-separable data, VMs can nonlnearly map the nput to a hgh dmensonal feature space denoted by F where a lnear hyperplane can be found. A hgh dmensonal mappng such as φ : R d a F, (2) s used to buld nonlnear support vector machnes. As both the objectve functon and the decson functon s expressed n terms of dot products of data vectors x, the potentally computatonally ntensve mappng φ ( ) dose not need to be explctly evaluated. A kernel functon, K ( x, x ), satsfyng Mercer s condton can be used as a substtute for ( φ( x) φ( x )) whch replaces ( x x ) [9]. he decson surface has the equaton: f ( x) = α yk( x, x) + b. (3) =1 he followng kernel functons are frequently used n VM: the polynomal kernels gven by K ) p ( x, x ) = ( x x + 1, (4)
3 1216 the RBFs kernels gven by 1 2 K ( x, x ) = exp x x 2, (5) 2σ and the tangent hyperbolc kernels gven by K ( x, x ) tanh( α x x + β ). (6) = In ths paper, we use a polynomal kernel functon of the 4th order to construct an VM. B. Genetc Algorthms (GA) Genetc Algorthm(GA)s are adaptve and robust computatonal procedures modeled on the mechancs of natural genetc systems[15]. GAs typcally mantan a constant-szed populaton of ndvduals that represent canddate solutons to the optmzaton problem beng solved. he ndvduals are typcally represented n-bt bnary vectors, and thus the resultng search space corresponds to an n- dmensonal boolean space. he goodness of each canddate soluton can be evaluated usng a ftness functon. Evolutonary algorthms, usng some form of ftness-dependent probablstc method, select ndvduals from the current populaton to produce ndvduals for the next generaton. Genetc operators are appled to the selected ndvduals to obtan new ndvduals that consttute the next generaton. Mutaton and crossover are two of the most common operators used wth genetc algorthms. Mutaton operator s appled to a sngle strng and generally changes a bt at random. Crossover, on the other hand, operates on two parent strngs to produce two offsprng. he process of ftness-dependent selecton and applcaton of genetc operators to generate successve generatons of ndvduals s repeated untl a satsfactory soluton s found. Recently, a GA-based representaton transformaton has been developed for a general classfcaton problem [19]. It can select and create approprate features n order to represent a problem sutably. C. Prncpal Component Analyss (PCA) PCA s a standard technque used to choose a dmensonalty reducng lnear projecton that maxmzes the scatter of all projected samples. he basc approach of the PCA s to compute the egenvectors of the covarance matrx, and approxmate the orgnal data by a lnear combnaton of the leadng egenvectors [7]. Let the tranng set of face mages be Γ, Γ, Γ,..., Γ, M where a face mage s by. he average face of the set s defned by IEEE ransactons on Consumer Electroncs, Vol. 49, o. 4, OVEMBER 2003 ranng Data unng Data Ψ = 1 VM Constructon VM Evaluaton M = Γ n 1 M Images Preprocessng Constructon of Feature Lst Instances GA Evoluton for Feature electon Evaluaton of Ftness Value toppng Crteron yes VM wth the Best Feature ubset Measurng the ze of of Feature ubset no Feature ubset ze Control Parameter GA Fg. 1. Constructon Procedure of the Proposed Face Authentcaton ystem n. (7) Each face dffers from the average face by the vector Φ = Γ Ψ. he vectors u k and scalars λ k are the egnvectors and egenvalues, respectvely, of the covarance matrx 1 M C = = Φ Φ = n n n AA, (8) 1 M where the matrx A = [ Φ 1Φ 2... Φ M ]. nce these egenvectors have the same dmenson as the orgnal mages and they are face-lke n appearance, they are referred to as Egenfaces. Gven the egenfaces, each face s represented as a vector of weghts. he weghts are obtaned by projectng the mage ( Γ ) nto the egenface components by a sngle nner product operaton, ω k = u k ( Γ Ψ) for k = 1,..., M, (9) where the M sgnfcant egenvectors are chosen wth the largest assocated egenvalues. he weghts form a vector Ω = [ ω ω,..., ω ] 1, 2 M, (10) whch descrbes the contrbuton of each egenface n representng the nput face mage. III. CORUCIO OF FACE AUHEICAIO YEM he block dagram of constructon of our face authentcaton system s shown n Fg. 1. Each step n the
4 K. Lee and H. Byun: A ew Face Authentcaton ystem for Memory-Constraned Devces 1217 dagram s descrbed n ths secton. Constructon of the face authentcaton system begns wth the preprocessng A. Preprocessng By normalzng the dstance between both eyes, a facal regon s cropped from an nput mage, whch s then normalzed nto a pxel mage so as to make the authentcaton system scale-nvarant. o fnd out eyes from an nput mage, any eye detecton algorthm may be used. If the axs connectng both eyes s on the skew, rotaton s appled to the mage. After then, hstogram equalzaton s appled to mnmze the effect of varatons n the mage brghtness and contrast. B. Constructon of Feature Lst Instances An element of a feature lst represents what the feature s, and a feature lst nstance ncludes values of elements of a feature lst. o avod duplcatng computaton n the GA step, the feature lst nstances to be used for the feature selecton are pre-computed. We suggest two knds of feature lsts: one s made up of average of ntensty values and that of edge values, and the other conssts of PCA projecton weghts. Besdes these feature lsts, varous feature lsts can be appled to the proposed system. 8 4 Feature Lst { f 1, f 2, f 3, f 4,...., f n, f n+1, f n+2,, f -1,f } Gene ze of Feature Lst () Fg. 3. Chromosome Representaton of Feature ubset C. electon of Dscrmnatng Features usng GA In our face verfcaton system, we employ GA to explore the space of all subsets of the gven feature lst. From now on, a subset of the gven feature lst s denoted by a feature subset. Durng the GA procedure, a preference s gven to feature subsets that acheve the best classfcaton performance and have small szes. Each of the selected feature subsets s then evaluated usng an VM. hs whole process s terated along evolutonary lnes untl the best feature subset s found. Fg. 3 shows that each chromosome s represented as a fxed-length bnary strng standng for some subset of the feature lst. Each bt of the chromosome represents whether the correspondng feature s selected or not. 1 n each bt means the correspondng feature s selected, whereas 0 means t s not selected. Durng the evoluton, the smple crossover operator and the eltst strategy are appled. 8 4 { f 1,..., f n,..., f 225,f 226,, f 225+n,.., f 450 } f 1 ~ f 225 : average of the ntensty values of 8*8 wndow f 226 ~f 450 : average of the edge values of 8*8 wndow Fg. 2. Feature Lst of Averages of Intensty and Edge Values D. Evaluaton of Chromosomes Usng VMs o evaluate a chromosome (equvalently, a feature subset), we construct an VM usng a polynomal kernel of the 4th order wth the selected feature subset nstances of a tranng data set as nput vectors. he ftness value of a chromosome s proportonal to the classfcaton performance of the VM for a tunng data set and s nversely proportonal to the sze of feature subsets. he ftness value s defned as Vself V other ftness = λ + ( 1 λ) (1 η) + η F( ), (11) self other he feature lst that conssts of averages of ntensty/edge values s computed from the mages of sze As Fg. 2 shows, each mage s scanned wth the wndow of sze 8 8 wth a 4-pxel overlap. Consequently, the number of scanned wndows s 225. A feature lst nstance for each mage s composed of values computed from the averages of the pxels wthn 225 wndows before and after applyng the obel edge operator [20]. he other feature lst s composed of the PCA projecton weghts. We defne the feature lst usng PCA as the weght vector Ω n (10) that s obtaned by projectng an mage nto the egenfaces correspondng to the M largest egenvalues. where s the total number of mages of subject hmself, self V s the number of mages of subject hmself verfed self correctly, s the total number of mages of others, and other V s the number of mages of others verfed correctly. λ other controls False Reject Rate(FRR) and False Acceptance Rate(FAR),.e., as λ ncreases, FRR decreases and FAR ncreases. he functon F ( ) s nversely proportonal to, whch s the sze of the feature subset. hus, F ( ) gves ftness more score when the chosen feature subset s smaller. ow, F ( ) s defned as followng:
5 1218 IEEE ransactons on Consumer Electroncs, Vol. 49, o. 4, OVEMBER / 4 F( ) = 1.0 /4 0.0 Best Feature ubset V, Weghts f / 4, (12) f / 4 < /2 f > /2 where s the sze of feature set. In (12), F ( ) = 1. 0 for / 4 gves all feature subsets whose szes are less than / 4 perfect scores(=1.0) not to dscrmnate them. By applyng the rule, we can score all feature subsets whose szes are less than / 4 by authentcaton rate wthout consderng the sze. hs s because havng a preference for a feature subset wth smaller sze among them results n subsequent degradaton of authentcaton rate. F ( ) = 0. 0 for > / 2 excludes feature subsets whose number of features are greater than half of, whch reduces the sze of feature subset used durng the constructon of the authentcaton system. In (11), η s the trade-off parameter between error rate and memory requrement. hat s, the larger η s, the less memory s requred because a small feature subset gets more score. Choce of small η means the preference for the small error rate rather than small memory usage. Images Preprocessng Preprocessng of Feature Extracton ubset Instance of VM VM Constructon Authentcaton usng usng VM Matched/on-Matched Fg. 4. Authentcaton Procedure Usng the Proposed Face Authentcaton ystem IV. AUHEICAIO PROCEDURE UIG OUR FACE AUHEICAIO YEM Usng the face authentcaton system establshed n secton 3, a real-tme face authentcaton procedure s provded n ths secton. he overall flow of the authentcaton procedure s shown n Fg. 4. A. Preprocessng and Extracton of Feature ubset Instance Frst, the same preprocessng algorthms as one n the system setup phase are appled durng ths phase. hen, feature subset nstance correspondng to the stored feature subset of an ndvdual to be authentcated, whch s chosen durng the authentcaton setup phase, s extracted from the mage to be authentcated. In ths paper, feature subset nstance s computed for the feature lsts composed of PCA projecton coeffcents, or for the 225 wndows of sze 8 8 wth a 4-pxel overlap generated by scannng a szed face mage, feature subset nstance s computed by calculatng average pxel ntenstes of those wndows and by computng averages of pxel ntenstes after obel edge operator s appled. B. Face Authentcaton usng VM An VM that s a face authentcaton system s constructed usng the stored support vectors and correspondng weghts of an ndvdual to be authentcated. he authentcaton s performed by gvng the constructed VM feature subset nstances and by observng the result. V. FACE AUHEICAIO YEM I MACH-O-CARD We descrbe how to apply our face authentcaton system to smart card whose processor performs matchng. Fg.5 depcts the enrollment and the authentcaton procedure n a match-oncard system. o enroll a user, an mage from a camera s preprocessed and a face authentcaton system s constructed usng our algorthms. he constructed face authentcaton system s stored nto the smart card, where the stored objects are composed of the support vectors, the weghted values and feature subset. hen, the system evolves usng the ftness value. After the evoluton, we obtan the VM n whch the nput vectors are the feature subset nstances correspondng to the most promnent chromosome. he feature subset s unque for each ndvdual, where the unqueness both n feature subset and n VM s obtaned from applcaton of an evolutonary algorthm to each ndvdual. ow, the VM acts as a face authentcaton system. o perform authentcaton on devces such as smart cards, the VM and the most promnent feature subsets are stored n the devces. Enrolled Face Image Input Face Image Enrollment Constructon of Face Preprocessng Authentcaton ystem Authentcaton Extracton of Preprocessng Feature Lst Instance Card Reader Feature ubset, VM Feature Lst Instance mart Card ORE VM, Feature ubset MACH Yes o Fg. 5. Authentcaton Procedure Usng the Proposed Face Authentcaton ystem
6 K. Lee and H. Byun: A ew Face Authentcaton ystem for Memory-Constraned Devces o authentcate a user, an mage to be authentcated s preprocessed n the same way as n the enrollment step. After the preprocessng, a feature lst nstance s extracted to be transported to the smart card. he smart card constructs an VM that s a face authentcator usng ts nternal nformaton such as the support vectors and the weghts. Among the feature lst nstance gven, only feature subset nstance correspondng to ndvdual feature subset stored n the card are extracted, and used as nput to the VM to authentcate a user. VI. y 1219 est data set: For each person, 5 mages of subject hmself and total 124 mages of 14 other persons were used for testng. Among these 124 mages, 44 mages are those of people whose mages do not appear n the tranng set nor n the tunng set. EXPERIMEAL REUL AD AALYI (a) Face Images from the Yale database (b) Face Images from the ORL database Fg. 6. ample mages from Yale and ORL databases o evaluate performance of our face authentcaton system, we make an experment on the very famous face databases such as Yale database and ORL database wth three knds of feature lsts. In ths secton, the expermental results are shown n varous aspects. A. Face Database We demonstrate our algorthm on both the Yale face database and the Cambrdge Olvett Research Lab (ORL) face database. he Yale face database [17] conssts of 11 mages per 15 people, one per dfferent facal expresson or confguraton: center-lght, w/glasses, happy, left-lght, w/no glasses, normal, rght-lght, sad, sleepy, surprsed, and wnk. he sze of mages s pxels. here are 40 persons n the ORL database [18] and 10 dfferent mages wth each person, ncludng varatons n pose, facal expresson (open or closed eyes, smlng or nonsmlng) and wth glasses or no-glasses, but there s lttle llumnaton varaton. he sze of mages s pxels. Fg. 6 shows sample mages of each database. Each database s categorzed nto the followng three data sets: a tranng data set that constructs the VM, a tunng data set that evaluates the VM and a test data set that estmates the performance of the fnal face verfcaton system after tranng. Yale database s categorzed as followng: y y ranng data set: For each person, 3 mages hmself and each 3 mages of 5 other persons for tranng. unng data set: For each person, 3 mages hmself and each 3 mages of 5 other persons for tunng. of subject were used of subject were used In the same way, three data sets for each person n the database are constructed, and then the proposed algorthm uses tranng data set and tunng data set to buld a face
7 1220 authentcaton system for each person. Evaluaton of the face authentcaton system s performed wth hs test data set. B. Feature Lst We perform experments for three knds of feature lsts. Each experment has the followng feature lst for each mage, where E p( Wk) denotes the average of gray ntensty values of the k-th wndow of an mage and E e( W k) represents average of edge values of the k-th wndow of an mage. ω M represents the PCA projecton weghts of an mage. Refer to (9) for the defnton of ω M Exp 1 : Feature lst for experment 1 { ω M M =1,...,50 } Exp 2 : Feature lst for experment 2 { E ( Wk), Ee( Wk) k = 1,...,225 } (13) p (14) Exp 3 : Feature lst for experment 3 { E ( Wk), Ee( Wk), k = 1,...,225, = 1,...,50 } p ω (15) M M o evaluate the effectveness of the proposed method, we consder two cases for each experment. One s only wth VM of whch nput vectors are composed of the feature lst nstances, and the other has GA feature selecton stage, where the nput vectors for VM consst of feature subset nstances chosen by GA. C. Expermental Results and Analyss able 1 and 2 compare performance of an VM-based face authentcaton algorthm havng GA feature selecton step wth one not havng GA step for (13), (14) and (15) on the very famous face databases such as Yale database and ORL database. Addtonally, performance of an VM-based face authentcaton s shown when pxel gray ntensty values of mage tself are a feature lst of the VM. Values n the tables are averages for every ndvduals n each database. In the experments ncludng GA feature selecton step, parameters related wth GA are pre-determned: the number of generatons=3000, λ = 0.45, η = As can be seen n Fg. 7 and Fg. 8, λ = 0.45, η = gve us the best FRR/FAR results. Refer to (11) for λ, η. able 1,2 shows that our face authentcaton algorthm has much less error rate than the algorthm that has only VM n all cases, even though only 24.0%-41.6% of the number of features (more exactly, the sze of the feature subset) are used. Especally, the face authentcaton algorthm that uses pxels gray ntensty tself as a IEEE ransactons on Consumer Electroncs, Vol. 49, o. 4, OVEMBER 2003 feature lst of the VM shows poor error rate compared to one wth GA feature selecton step n the experment 2, even though the former uses 4096(=64 64) features whch s about 20 tmes of the number of features that the latter uses. As a result, we can state that by usng dscrmnatng feature subset of an ndvdual that s extracted by our algorthm, the memory requrement as well as the overall error rate s substantally mproved. ow, we show effectveness of two controllable parameters by experments on Yale database. he frst one s λ, whch can control FRR and FAR,.e., as λ ncreases, FRR decreases but FAR ncreases. Fg. 7 shows the tradeoff between FRR and FAR whle changng λ. In the experment, let η = and the number of generatons =3000, where the feature lst (14) s used. As λ ncreases from 0.00 to 1.00, FRR decreases from 0.15 to 0.08 and FAR grows from 0.05 to hus, by choosng a proper λ, a system desgner can reflect user s requrement regardng FAR and FRR. he second one s η that can control memory requrement and error rate. Fg. 8 and 9 show the tradeoff between error rate and memory requrement whle changng η. In the experment, let λ =0.45 and the number of generatons=3000, where the feature lst (14) s used. Results are on Yale face database, too. As η ncreases from 0.00 to 0.90, FRR ncreases from 0.09 to 0.15 and FAR grows from 0.06 to Meanwhle, the sze of the selected feature subset decreases from 220 to 159 on the average. hus, by choosng a proper η, we can make our algorthm work n memory-constraned systems at the expense of verfcaton rate. ABLE 1 ERROR RAE OF VM OLY V. GA+VM O HE YALE FACE DAABAE Feature Lst Performance Exp. 1 (PCA) Exp. 2 (Avg. of Intensty & Edge) Exp. 3 (Avg. of Intensty & Edge, PCA) Pxel Intensty VM GA+VM VM GA+VM VM GA+VM VM FAR FRR o. of Features o. of Vs ABLE 2 ERROR RAE OF VM OLY V. GA+VM O HE ORL FACE DAABAE Feature Lst Performance Exp. 1 (PCA) Exp. 2 (Avg. of Intensty & Edge) Exp. 3 (Avg. of Intensty & Edge, PCA) Pxel Intensty VM GA+VM VM GA+VM VM GA+VM VM FAR FRR o. of Features o. of Vs
8 K. Lee and H. Byun: A ew Face Authentcaton ystem for Memory-Constraned Devces 1221 VII. COCLUIO mart card s a model of very secure storage, and bometrcs s the ultmate technology for authentcaton. he two can be combned n many applcatons to enhance both the securty and authentcaton. However, a careful desgn s requred to ntegrate the bometrcs nto the smart cards because the smart cards have very lmted memory. hs paper proposed a memory-effcent method of face authentcaton by ntegratng GA nto VM. Comparatve experments showed that our face authentcaton algorthm wth VM whose nput vectors consst of dscrmnatng features extracted by GA has much better performance than the algorthm wthout feature selecton process by GA has. Experments are performed on Yale face database and ORL face database for three carefully chosen feature lsts. Results showed that both FAR and FRR of our algorthm are lower than those of an VM-based face authentcaton algorthm wthout GA feature selecton step, even though our algorthm uses only 24.0%-41.6% of the number of features. Also, a method to reduce, f needed, the amount of memory requred n the authentcaton at the expense of authentcaton rate by changng a controllable system parameter s suggested. By adjustng the system parameter, we can reduce further the amount of memory requred by 35% for a feature lst usng average of ntenstes and that of edge values. herefore, the small memory requrement of the proposed method makes t applcable to ether large-scale face dentfcaton systems or memory-constraned smart card systems. It further enhances the securty ssues n adoptng the smart card nto many emergng applcatons, n contrast to the tradtonal PI verfcaton currently beng used. REFERECE [1] A. Jan, R. Bolle, and. Pankant, Bometrcs: Personal Identfcaton n etworked ocety, Kluwer Academc Publshers, [2] D. Zhang, Bometrc olutons For Authentcaton In An E-World, Kluwer Academc Publshers, [3] L. Jan, U. Halc, I. Hayash,. Lee, and. sutsu., Intellgent Bometrc echnques n Fngerprnt and Face Recognton, CRC Press, [4] A. oore, Hghly robust bometrcs smart card desgn, IEEE rans. on Consumer Electroncs, Vol.46, o.4, pp , [5]. Pan, Y. Gl, D. Moon, Y. Chung, and C. Park, A memory-effcent fngerprnt verfcaton algorthm usng a mult-resoluton accumulator array, ERI Journal, Vol. 25, o. 3, o be publshed, June [6] K. Lam and H. Yan, An analytc-to-holstc approach for face recognton based on a sngle frontal vew, IEEE ransactons on Pattern Analyss and Machne Intellgence, Vol. 29, o. 7, 1998, pp [7] M. urk and A. Pentland, Face recognton usng egenfaces, Proceedngs of IEEE Internatonal Conference on Computer Vson and Pattern Recognton, 1991, pp [8] R. Brunell and. Poggo, Face recognton: features versus templates, IEEE ransactons on Pattern Analyss and Machne Intellgence, Vol. 15, o. 10, 1993, pp [9] V. Vapnk, tatstcal Learnng heory, John Wley & ons, ew York, [10] E. Osuna, R. Feund, and F. Gros, ranng support vector machnes: an applcaton to face detecton, Proceedngs of IEEE Internatonal Conference on Computer Vson and Pattern Recognton, 1997, pp J. Huang, X. hao, and H. Wechsler, Face pose dscrmnaton usng support vector machnes, Proceedngs of Internatonal Conference on Pattern Recognton, 1998, pp [11] G. Guo,. Z. L, and K. L. Chan, upport vector machnes for face recognton, Image and Vson Computng 19, 2001, pp [12] K. Jonsson, J. Matas, J. Kttler, and Y. L, Learnng support vectors for face verfcaton and recognton, Proceedngs of Internatonal Conference on Automatc Face and Gesture Recognton, 2000, pp [13] P. Phllps, upport vector machnes appled to face recognton, Advances n eural Informaton Processng ystems 11, MI Press, 1999, pp [14] D. Goldberg, Genetc Algorthms n earch, Optmzaton, and Machne Learnng, Addson-Wesley, 1989 [15] K. Lee, Y. Chung, and H. Byun, Face recognton usng support vector machnes wth the feature set extracted by genetc algorthms, Proceedngs of Audo- and Vdeo-Based Bometrc Person Authentcaton, 2001, pp [16] Yale Face Database, [17] ORL Face Database, [18] H. Lu and H. Motoda, Feature Extracton, Constructon and electon: A Data Mnng Perspectve, Kluwer Academc Publshers, 2001 [19] R. Gonzalez, and R. Woods, Dgtal Image Processng, Addson Wesley Longman, 1992.
9 1222 IEEE ransactons on Consumer Electroncs, Vol. 49, o. 4, OVEMBER 2003 Kyunghee Lee receved the B.. and M.. degrees n computer scence from Yonse Unversty, Korea, n 1993 and 1998, respectvely. he s currently pursung Ph.D. degree at Yonse Unversty. he had been a researcher of the LG oft Company from 1993 to he s currently a senor member of engneerng staff of the Electroncs and elecommuncatons Research Insttute, Daejeon, Korea. Her research nterests nclude bometrcs, especally face recognton, pattern recognton, and mage processng. Hyeran Byun receved the B.. and M.. degrees n Mathematcs from Yonse Unversty, Korea. he receved her Ph.D. degree n Computer cence from Purdue Unversty, West Lafayette, Indana. he was a assstant professor n Hallym unversty, Chooncheon, Korea from nce 1995, she has been an assocate professor of Computer cence at Yonse Unversty, Korea. Her research nterests are multmeda, computer vson, mage and vdeo processng, artfcal ntellgence and pattern recognton.
Face Recognition University at Buffalo CSE666 Lecture Slides Resources:
Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural
More informationRecognizing Faces. Outline
Recognzng Faces Drk Colbry Outlne Introducton and Motvaton Defnng a feature vector Prncpal Component Analyss Lnear Dscrmnate Analyss !"" #$""% http://www.nfotech.oulu.f/annual/2004 + &'()*) '+)* 2 ! &
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationOutline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1
4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:
More informationFace Recognition Based on SVM and 2DPCA
Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More information12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification
Introducton to Artfcal Intellgence V22.0472-001 Fall 2009 Lecture 24: Nearest-Neghbors & Support Vector Machnes Rob Fergus Dept of Computer Scence, Courant Insttute, NYU Sldes from Danel Yeung, John DeNero
More informationSupport Vector Machines
Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationDetection of an Object by using Principal Component Analysis
Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More informationHuman Face Recognition Using Generalized. Kernel Fisher Discriminant
Human Face Recognton Usng Generalzed Kernel Fsher Dscrmnant ng-yu Sun,2 De-Shuang Huang Ln Guo. Insttute of Intellgent Machnes, Chnese Academy of Scences, P.O.ox 30, Hefe, Anhu, Chna. 2. Department of
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationA Genetic Programming-PCA Hybrid Face Recognition Algorithm
Journal of Sgnal and Informaton Processng, 20, 2, 70-74 do:0.4236/jsp.20.23022 Publshed Onlne August 20 (http://www.scrp.org/journal/jsp) A Genetc Programmng-PCA Hybrd Face Recognton Algorthm Behzad Bozorgtabar,
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationClassification of Face Images Based on Gender using Dimensionality Reduction Techniques and SVM
Classfcaton of Face Images Based on Gender usng Dmensonalty Reducton Technques and SVM Fahm Mannan 260 266 294 School of Computer Scence McGll Unversty Abstract Ths report presents gender classfcaton based
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationEYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS
P.G. Demdov Yaroslavl State Unversty Anatoly Ntn, Vladmr Khryashchev, Olga Stepanova, Igor Kostern EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS Yaroslavl, 2015 Eye
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationEdge Detection in Noisy Images Using the Support Vector Machines
Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona
More informationTwo-Dimensional Supervised Discriminant Projection Method For Feature Extraction
Appl. Math. Inf. c. 6 No. pp. 8-85 (0) Appled Mathematcs & Informaton cences An Internatonal Journal @ 0 NP Natural cences Publshng Cor. wo-dmensonal upervsed Dscrmnant Proecton Method For Feature Extracton
More informationDiscriminative Dictionary Learning with Pairwise Constraints
Dscrmnatve Dctonary Learnng wth Parwse Constrants Humn Guo Zhuoln Jang LARRY S. DAVIS UNIVERSITY OF MARYLAND Nov. 6 th, Outlne Introducton/motvaton Dctonary Learnng Dscrmnatve Dctonary Learnng wth Parwse
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationClassification / Regression Support Vector Machines
Classfcaton / Regresson Support Vector Machnes Jeff Howbert Introducton to Machne Learnng Wnter 04 Topcs SVM classfers for lnearly separable classes SVM classfers for non-lnearly separable classes SVM
More informationMachine Learning. Support Vector Machines. (contains material adapted from talks by Constantin F. Aliferis & Ioannis Tsamardinos, and Martin Law)
Machne Learnng Support Vector Machnes (contans materal adapted from talks by Constantn F. Alfers & Ioanns Tsamardnos, and Martn Law) Bryan Pardo, Machne Learnng: EECS 349 Fall 2014 Support Vector Machnes
More informationPCA Based Gait Segmentation
Honggu L, Cupng Sh & Xngguo L PCA Based Gat Segmentaton PCA Based Gat Segmentaton Honggu L, Cupng Sh, and Xngguo L 2 Electronc Department, Physcs College, Yangzhou Unversty, 225002 Yangzhou, Chna 2 Department
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationPERFORMANCE EVALUATION FOR SCENE MATCHING ALGORITHMS BY SVM
PERFORMACE EVALUAIO FOR SCEE MACHIG ALGORIHMS BY SVM Zhaohu Yang a, b, *, Yngyng Chen a, Shaomng Zhang a a he Research Center of Remote Sensng and Geomatc, ongj Unversty, Shangha 200092, Chna - yzhac@63.com
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationAn Efficient Illumination Normalization Method with Fuzzy LDA Feature Extractor for Face Recognition
www.mer.com Vol.2, Issue.1, pp-060-065 ISS: 2249-6645 An Effcent Illumnaton ormalzaton Meod w Fuzzy LDA Feature Extractor for Face Recognton Behzad Bozorgtabar 1, Hamed Azam 2 (Department of Electrcal
More informationHistogram-Enhanced Principal Component Analysis for Face Recognition
Hstogram-Enhanced Prncpal Component Analyss for Face ecognton Ana-ara Sevcenco and Wu-Sheng Lu Dept. of Electrcal and Computer Engneerng Unversty of Vctora sevcenco@engr.uvc.ca, wslu@ece.uvc.ca Abstract
More informationOn Modeling Variations For Face Authentication
On Modelng Varatons For Face Authentcaton Xaomng Lu Tsuhan Chen B.V.K. Vjaya Kumar Department of Electrcal and Computer Engneerng, Carnege Mellon Unversty Abstract In ths paper, we present a scheme for
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationA Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines
A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationSmoothing Spline ANOVA for variable screening
Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory
More information2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements
Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.
More informationModular PCA Face Recognition Based on Weighted Average
odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationFace Recognition by Fusing Binary Edge Feature and Second-order Mutual Information
Face Recognton by Fusng Bnary Edge Feature and Second-order Mutual Informaton Jatao Song, Bejng Chen, We Wang, Xaobo Ren School of Electronc and Informaton Engneerng, Nngbo Unversty of Technology Nngbo,
More informationA Computer Vision System for Automated Container Code Recognition
A Computer Vson System for Automated Contaner Code Recognton Hsn-Chen Chen, Chh-Ka Chen, Fu-Yu Hsu, Yu-San Ln, Yu-Te Wu, Yung-Nen Sun * Abstract Contaner code examnaton s an essental step n the contaner
More informationMaximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation
Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 5) Maxmum Varance Combned wth Adaptve Genetc Algorthm for Infrared Image Segmentaton Huxuan Fu College of Automaton Harbn
More informationPalmprint Feature Extraction Using 2-D Gabor Filters
Palmprnt Feature Extracton Usng 2-D Gabor Flters Wa Kn Kong Davd Zhang and Wenxn L Bometrcs Research Centre Department of Computng The Hong Kong Polytechnc Unversty Kowloon Hong Kong Correspondng author:
More informationNovel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition
Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,
More informationRECOGNITION AND AGE PREDICTION WITH DIGITAL IMAGES OF MISSING CHILDREN
RECOGNIION AND AGE PREDICION WIH DIGIAL IMAGES OF MISSING CHILDREN A Wrtng Project Presented to he Faculty of the Department of Computer Scence San Jose State Unversty In Partal Fulfllment of the Requrements
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationGender Classification using Interlaced Derivative Patterns
Gender Classfcaton usng Interlaced Dervatve Patterns Author Shobernejad, Ameneh, Gao, Yongsheng Publshed 2 Conference Ttle Proceedngs of the 2th Internatonal Conference on Pattern Recognton (ICPR 2) DOI
More informationImage Alignment CSC 767
Image Algnment CSC 767 Image algnment Image from http://graphcs.cs.cmu.edu/courses/15-463/2010_fall/ Image algnment: Applcatons Panorama sttchng Image algnment: Applcatons Recognton of object nstances
More informationFace Recognition Method Based on Within-class Clustering SVM
Face Recognton Method Based on Wthn-class Clusterng SVM Yan Wu, Xao Yao and Yng Xa Department of Computer Scence and Engneerng Tong Unversty Shangha, Chna Abstract - A face recognton method based on Wthn-class
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationFeature Selection for Target Detection in SAR Images
Feature Selecton for Detecton n SAR Images Br Bhanu, Yngqang Ln and Shqn Wang Center for Research n Intellgent Systems Unversty of Calforna, Rversde, CA 95, USA Abstract A genetc algorthm (GA) approach
More informationMulticlass Object Recognition based on Texture Linear Genetic Programming
Multclass Object Recognton based on Texture Lnear Genetc Programmng Gustavo Olague 1, Eva Romero 1 Leonardo Trujllo 1, and Br Bhanu 2 1 CICESE, Km. 107 carretera Tjuana-Ensenada, Mexco, olague@ccese.mx,
More informationRange images. Range image registration. Examples of sampling patterns. Range images and range surfaces
Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples
More informationLocal Quaternary Patterns and Feature Local Quaternary Patterns
Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationCompetitive Sparse Representation Classification for Face Recognition
Vol. 6, No. 8, 05 Compettve Sparse Representaton Classfcaton for Face Recognton Yng Lu Chongqng Key Laboratory of Computatonal Intellgence Chongqng Unversty of Posts and elecommuncatons Chongqng, Chna
More informationResearch and Application of Fingerprint Recognition Based on MATLAB
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department
More informationKernel Collaborative Representation Classification Based on Adaptive Dictionary Learning
Internatonal Journal of Intellgent Informaton Systems 2018; 7(2): 15-22 http://www.scencepublshnggroup.com/j/js do: 10.11648/j.js.20180702.11 ISSN: 2328-7675 (Prnt); ISSN: 2328-7683 (Onlne) Kernel Collaboratve
More informationA Background Subtraction for a Vision-based User Interface *
A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton
More informationOn Supporting Identification in a Hand-Based Biometric Framework
On Supportng Identfcaton n a Hand-Based Bometrc Framework Pe-Fang Guo 1, Prabr Bhattacharya 2, and Nawwaf Kharma 1 1 Electrcal & Computer Engneerng, Concorda Unversty, 1455 de Masonneuve Blvd., Montreal,
More informationIntegrated Expression-Invariant Face Recognition with Constrained Optical Flow
Integrated Expresson-Invarant Face Recognton wth Constraned Optcal Flow Chao-Kue Hseh, Shang-Hong La 2, and Yung-Chang Chen Department of Electrcal Engneerng, Natonal Tsng Hua Unversty, Tawan 2 Department
More informationBOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET
1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School
More informationCombination of Local Multiple Patterns and Exponential Discriminant Analysis for Facial Recognition
Sensors & ransducers 203 by IFSA http://.sensorsportal.com Combnaton of Local Multple Patterns and Exponental Dscrmnant Analyss for Facal Recognton, 2 Lfang Zhou, 2 Bn Fang, 3 Wesheng L, 3 Ldou Wang College
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationHybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationLECTURE : MANIFOLD LEARNING
LECTURE : MANIFOLD LEARNING Rta Osadchy Some sldes are due to L.Saul, V. C. Raykar, N. Verma Topcs PCA MDS IsoMap LLE EgenMaps Done! Dmensonalty Reducton Data representaton Inputs are real-valued vectors
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationA fast algorithm for color image segmentation
Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au
More informationAn Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem
An Effcent Genetc Algorthm wth Fuzzy c-means Clusterng for Travelng Salesman Problem Jong-Won Yoon and Sung-Bae Cho Dept. of Computer Scence Yonse Unversty Seoul, Korea jwyoon@sclab.yonse.ac.r, sbcho@cs.yonse.ac.r
More informationLearning a Class-Specific Dictionary for Facial Expression Recognition
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 4 Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-0067 Learnng a Class-Specfc Dctonary for
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationOutline. Type of Machine Learning. Examples of Application. Unsupervised Learning
Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton
More informationDiscriminative classifiers for object classification. Last time
Dscrmnatve classfers for object classfcaton Thursday, Nov 12 Krsten Grauman UT Austn Last tme Supervsed classfcaton Loss and rsk, kbayes rule Skn color detecton example Sldng ndo detecton Classfers, boostng
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationVol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.
Journal of Emergng Trends n Computng and Informaton Scences 009-03 CIS Journal. All rghts reserved. http://www.csjournal.org Unhealthy Detecton n Lvestock Texture Images usng Subsampled Contourlet Transform
More informationCLASSIFICATION OF ULTRASONIC SIGNALS
The 8 th Internatonal Conference of the Slovenan Socety for Non-Destructve Testng»Applcaton of Contemporary Non-Destructve Testng n Engneerng«September -3, 5, Portorož, Slovena, pp. 7-33 CLASSIFICATION
More informationLobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide
Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.
More informationImage Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline
mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and
More informationAccounting for the Use of Different Length Scale Factors in x, y and z Directions
1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,
More informationFeature Extractions for Iris Recognition
Feature Extractons for Irs Recognton Jnwook Go, Jan Jang, Yllbyung Lee, and Chulhee Lee Department of Electrcal and Electronc Engneerng, Yonse Unversty 134 Shnchon-Dong, Seodaemoon-Gu, Seoul, KOREA Emal:
More informationInvariant Shape Object Recognition Using B-Spline, Cardinal Spline, and Genetic Algorithm
Proceedngs of the 5th WSEAS Int. Conf. on Sgnal Processng, Robotcs and Automaton, Madrd, Span, February 5-7, 6 (pp4-45) Invarant Shape Obect Recognton Usng B-Splne, Cardnal Splne, and Genetc Algorthm PISIT
More informationUsing Neural Networks and Support Vector Machines in Data Mining
Usng eural etworks and Support Vector Machnes n Data Mnng RICHARD A. WASIOWSKI Computer Scence Department Calforna State Unversty Domnguez Hlls Carson, CA 90747 USA Abstract: - Multvarate data analyss
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationFast Feature Value Searching for Face Detection
Vol., No. 2 Computer and Informaton Scence Fast Feature Value Searchng for Face Detecton Yunyang Yan Department of Computer Engneerng Huayn Insttute of Technology Hua an 22300, Chna E-mal: areyyyke@63.com
More informationA Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures
A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School
More informationClassifier Swarms for Human Detection in Infrared Imagery
Classfer Swarms for Human Detecton n Infrared Imagery Yur Owechko, Swarup Medasan, and Narayan Srnvasa HRL Laboratores, LLC 3011 Malbu Canyon Road, Malbu, CA 90265 {owechko, smedasan, nsrnvasa}@hrl.com
More informationCHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION
48 CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 3.1 INTRODUCTION The raw mcroarray data s bascally an mage wth dfferent colors ndcatng hybrdzaton (Xue
More informationCorner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity
Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent
More informationLearning-based License Plate Detection on Edge Features
Learnng-based Lcense Plate Detecton on Edge Features Wng Teng Ho, Woo Hen Yap, Yong Haur Tay Computer Vson and Intellgent Systems (CVIS) Group Unverst Tunku Abdul Rahman, Malaysa wngteng_h@yahoo.com, woohen@yahoo.com,
More information