A New Face Authentication System for Memory-Constrained Devices

Size: px
Start display at page:

Download "A New Face Authentication System for Memory-Constrained Devices"

Transcription

1 1214 IEEE ransactons on Consumer Electroncs, Vol. 49, o. 4, OVEMBER 2003 A ew Face Authentcaton ystem for Memory-Constraned Devces Kyunghee Lee and Hyeran Byun Abstract hough bometrcs to authentcate a person s a convenent tool, typcal authentcaton algorthms by usng bometrcs may not be executable on the memory-constraned devces such as smart cards. We present a soluton of a face authentcaton algorthm for the open ssue. Our achevement s two-fold. One s to present a face authentcaton algorthm wth low memory requrement, whch uses support vector machnes (VM) wth the feature set extracted by genetc algorthms (GA). he other contrbuton s to suggest a method to reduce further, f needed, the amount of memory requred n the authentcaton at the expense of verfcaton rate by changng a controllable system parameter for a feature set sze. Gven a pre-defned amount of memory, ths capablty s qute effectve to mount our algorthm on memory-constraned devces. Our expermental results show that the proposed method provdes good performance n terms of accuracy and memory requrement 1. Index erms Bometrcs, Face Authentcaton, Memory-Constraned Devces. I. IRODUCIO In recent years, there s an ncreasng trend of usng bometrcs nformaton, whch refers the human bologcal features used for user authentcaton, such as fngerprnt, rs, and face, to strengthen the securty measure of dfferent electronc/embedded systems, ncludng smart card systems [1]-[4]. Compared to the dgt Personal Identfcaton umber (PI), the crtcal data stored n the card can be protected more securely by usng the bometrc nformaton. Furthermore, cardholder s fngerprnt or rs pattern cannot be stolen or forgotten. mart cards can play an mportant role n bometrcs, too. For nstance, n an dentfcaton system, the bometrcs templates are often stored n a central database. Wth the central storage of a bometrcs, there s an open ssue of msuse of the same for purposes that the owner of the bometrcs may not be aware of. We can decentralze the database storage part nto mllons of smart cards and gve t to the owners. 1 hs work was supported n part by Bometrcs Engneerng Research Center (KOEF). Kyunghee Lee s wth the Department of Computer cence, Yonse Unversty, eoul, Korea. Also, he s currently workng for Bometrcs echnology Research eam, ERI, Daejeon, Korea (e-mal: unrom@etr.re.kr). Hyeran Byun s wth the Department of Computer cence, Yonse Unversty, eoul, Korea (e-mal: hrbyun@cs.yonse.ac.kr). Contrbuted Paper Manuscrpt receved June 12, /00 $ IEEE However, most of these systems have a common characterstc that the bometrcs authentcaton process s solely accomplshed out of the smart card processor [5]. For example, for fngerprnt-based smart card system, the card needs to nsecurely release the crtcal fngerprnt master template nformaton nto an external fngerprnt reader, whch performs the fngerprnt checkng. o hghlght the securty, the comparson of the fngerprnt sample and the master template needs to be performed by the n-card processor,.e., match-on-card [5], not the external reader. However, the memory sze and the processng power of the n-card processor s very lmted. hus, a lghtweght authentcaton algorthm that requres small memory and processng power needs to be developed. Among bologcal features, the face s one of the most acceptable bometrcs, because humans use t n ther vsual nteractons and acqurng face mages s non-ntrusve. However, t s dffcult to develop an automatc face recognton system, whle people can easly recognze famlar human faces. It s because face mages can vary consderably n terms of facal expressons, 3D orentaton, lghtng condtons, har styles, and so on. wo prmary approaches to face recognton are the holstc (or transform) approach and the analytc (or attrbute-based) approach [6]. In the holstc approach, the unverse of face mage doman s represented usng a set of orthonormal bass vectors. Currently, the most popular bass vectors are egenfaces [7]. Each egenface s derved from the covarance analyss of the face mage populaton. wo faces are consdered to be dentcal f they are suffcently close n the egenface feature space. A number of varants of such an approach exst. emplate matchngbased face recognton systems are also classfed nto ths approach. In the analytc approach, facal attrbutes lke nose, eyes, etc. are extracted from the face mage, and the nvarance of geometrc propertes among the face landmark features s used for recognzng features [8]. hs approach has characterstcs of hgh-speed and low-memory requrement, whle the selecton and extracton of features are dffcult. Many prevous works usng ths approach have been reported. For nstance, recognton accuracy of 90% could be acheved by usng geometrc features [8]. Hybrd approaches combnng both holstc and analytc have also been reported [6].

2 K. Lee and H. Byun: A ew Face Authentcaton ystem for Memory-Constraned Devces 1215 Recently, face detecton and recognton systems usng upport Vector Machne (VM) bnary classfers [9] have been proposed. For example, methods for face detecton [10], face pose dscrmnaton [11], and recognzng face mages [12]-[14] have been proposed usng VMs. Compared wth the standard PCA-based face authentcaton method, verfcaton system based on VM has shown to be sgnfcantly better by Phllps [14]. In ths paper, we present a memory-effcent face authentcaton algorthm that uses the features chosen by Genetc Algorthms (GAs) [15] as an nput vector to an VM and also provde ts mproved verson wth the property of adjustable memory requrement. he part of ths algorthm has been publshed n [16]. Our face authentcaton system uses only dscrmnatng features selected by GA, where the features are unque for each person and thus, the memory requrement can be decreased sgnfcantly. Also, f needed, the amount of memory requred n the authentcaton can be reduced further at the expense of verfcaton rate by changng a controllable system parameter for the feature set sze. he on-lne authentcaton tme can be decreased due to the optmal feature set, although the off-lne tranng tme s ncreased due to GAs. Furthermore, by usng a tunng data set n the computaton of the GAs evaluaton functon, the feature set whch s less dependent on llumnaton and expresson can be selected. he expermental results on the Yale face database [17] and the Cambrdge Olvett Research Lab (ORL) face database [18] show that our face authentcaton algorthm wth VM whose nput vectors consst of dscrmnatng features extracted by GA has much better performance than the algorthm wthout feature selecton process by GA, n terms of accuracy and memory requrement. Experment also shows that the number of the feature to be selected s controllable by a system parameter. Owng to those features, a smart card can encapsulate all the crtcal nformaton, ncludng the bometrcs data, and perform all the comparson securely nsde the card wthout any data leakng out. he outlne of the paper s as follows: background for VM, GA, and Prncpal Component Analyss (PCA) s gven n ecton 2. ecton 3 descrbes method to construct our face authentcaton system and ecton 4 explans the authentcaton procedure usng the face authentcaton system. In secton 5, we descrbe how to mplement our system on match-on-card. ecton 6 contans expermental results and analyss, and concludng remarks are made n ecton 7. II. BACKGROUD In ths secton we wll gve bref overvew of VM and GA. More detaled descrptons of VM and GA can be found n [9] and [15]. Also, PCA that s used as a feature lst s surveyed concsely. A. upport Vector Machnes (VM) upport Vector Machnes (VM) have been recently proposed by V. Vapnk and hs co-workers as an effectve and general purpose method of pattern recognton [9]. VM s a bnary classfcaton method that fnds the optmal lnear decson surface based on the concept of structural rsk mnmzaton. he decson surface s a weghted combnaton of elements of the tranng set. hese elements are called support vectors and characterze the boundary between the two classes. We start wth a labeled set of tranng samples ( x, y ), d where x R and y s the assocated label ( y { 1,1} ). Assumng lnearly separable data, the goal of maxmum margn classfcaton s to separate the two classes by a hyperplane such that the dstance to the support vectors s maxmzed. hs hyperplane s called the optmal separatng hyperplane (OH). he OH has the form: f ( x) = α y ( x x) + b, (1) = 1 where the coeffcents α and the b are the solutons of a quadratc programmng problem. α s non-zero for support vectors and s zero otherwse. For lnearly non-separable data, VMs can nonlnearly map the nput to a hgh dmensonal feature space denoted by F where a lnear hyperplane can be found. A hgh dmensonal mappng such as φ : R d a F, (2) s used to buld nonlnear support vector machnes. As both the objectve functon and the decson functon s expressed n terms of dot products of data vectors x, the potentally computatonally ntensve mappng φ ( ) dose not need to be explctly evaluated. A kernel functon, K ( x, x ), satsfyng Mercer s condton can be used as a substtute for ( φ( x) φ( x )) whch replaces ( x x ) [9]. he decson surface has the equaton: f ( x) = α yk( x, x) + b. (3) =1 he followng kernel functons are frequently used n VM: the polynomal kernels gven by K ) p ( x, x ) = ( x x + 1, (4)

3 1216 the RBFs kernels gven by 1 2 K ( x, x ) = exp x x 2, (5) 2σ and the tangent hyperbolc kernels gven by K ( x, x ) tanh( α x x + β ). (6) = In ths paper, we use a polynomal kernel functon of the 4th order to construct an VM. B. Genetc Algorthms (GA) Genetc Algorthm(GA)s are adaptve and robust computatonal procedures modeled on the mechancs of natural genetc systems[15]. GAs typcally mantan a constant-szed populaton of ndvduals that represent canddate solutons to the optmzaton problem beng solved. he ndvduals are typcally represented n-bt bnary vectors, and thus the resultng search space corresponds to an n- dmensonal boolean space. he goodness of each canddate soluton can be evaluated usng a ftness functon. Evolutonary algorthms, usng some form of ftness-dependent probablstc method, select ndvduals from the current populaton to produce ndvduals for the next generaton. Genetc operators are appled to the selected ndvduals to obtan new ndvduals that consttute the next generaton. Mutaton and crossover are two of the most common operators used wth genetc algorthms. Mutaton operator s appled to a sngle strng and generally changes a bt at random. Crossover, on the other hand, operates on two parent strngs to produce two offsprng. he process of ftness-dependent selecton and applcaton of genetc operators to generate successve generatons of ndvduals s repeated untl a satsfactory soluton s found. Recently, a GA-based representaton transformaton has been developed for a general classfcaton problem [19]. It can select and create approprate features n order to represent a problem sutably. C. Prncpal Component Analyss (PCA) PCA s a standard technque used to choose a dmensonalty reducng lnear projecton that maxmzes the scatter of all projected samples. he basc approach of the PCA s to compute the egenvectors of the covarance matrx, and approxmate the orgnal data by a lnear combnaton of the leadng egenvectors [7]. Let the tranng set of face mages be Γ, Γ, Γ,..., Γ, M where a face mage s by. he average face of the set s defned by IEEE ransactons on Consumer Electroncs, Vol. 49, o. 4, OVEMBER 2003 ranng Data unng Data Ψ = 1 VM Constructon VM Evaluaton M = Γ n 1 M Images Preprocessng Constructon of Feature Lst Instances GA Evoluton for Feature electon Evaluaton of Ftness Value toppng Crteron yes VM wth the Best Feature ubset Measurng the ze of of Feature ubset no Feature ubset ze Control Parameter GA Fg. 1. Constructon Procedure of the Proposed Face Authentcaton ystem n. (7) Each face dffers from the average face by the vector Φ = Γ Ψ. he vectors u k and scalars λ k are the egnvectors and egenvalues, respectvely, of the covarance matrx 1 M C = = Φ Φ = n n n AA, (8) 1 M where the matrx A = [ Φ 1Φ 2... Φ M ]. nce these egenvectors have the same dmenson as the orgnal mages and they are face-lke n appearance, they are referred to as Egenfaces. Gven the egenfaces, each face s represented as a vector of weghts. he weghts are obtaned by projectng the mage ( Γ ) nto the egenface components by a sngle nner product operaton, ω k = u k ( Γ Ψ) for k = 1,..., M, (9) where the M sgnfcant egenvectors are chosen wth the largest assocated egenvalues. he weghts form a vector Ω = [ ω ω,..., ω ] 1, 2 M, (10) whch descrbes the contrbuton of each egenface n representng the nput face mage. III. CORUCIO OF FACE AUHEICAIO YEM he block dagram of constructon of our face authentcaton system s shown n Fg. 1. Each step n the

4 K. Lee and H. Byun: A ew Face Authentcaton ystem for Memory-Constraned Devces 1217 dagram s descrbed n ths secton. Constructon of the face authentcaton system begns wth the preprocessng A. Preprocessng By normalzng the dstance between both eyes, a facal regon s cropped from an nput mage, whch s then normalzed nto a pxel mage so as to make the authentcaton system scale-nvarant. o fnd out eyes from an nput mage, any eye detecton algorthm may be used. If the axs connectng both eyes s on the skew, rotaton s appled to the mage. After then, hstogram equalzaton s appled to mnmze the effect of varatons n the mage brghtness and contrast. B. Constructon of Feature Lst Instances An element of a feature lst represents what the feature s, and a feature lst nstance ncludes values of elements of a feature lst. o avod duplcatng computaton n the GA step, the feature lst nstances to be used for the feature selecton are pre-computed. We suggest two knds of feature lsts: one s made up of average of ntensty values and that of edge values, and the other conssts of PCA projecton weghts. Besdes these feature lsts, varous feature lsts can be appled to the proposed system. 8 4 Feature Lst { f 1, f 2, f 3, f 4,...., f n, f n+1, f n+2,, f -1,f } Gene ze of Feature Lst () Fg. 3. Chromosome Representaton of Feature ubset C. electon of Dscrmnatng Features usng GA In our face verfcaton system, we employ GA to explore the space of all subsets of the gven feature lst. From now on, a subset of the gven feature lst s denoted by a feature subset. Durng the GA procedure, a preference s gven to feature subsets that acheve the best classfcaton performance and have small szes. Each of the selected feature subsets s then evaluated usng an VM. hs whole process s terated along evolutonary lnes untl the best feature subset s found. Fg. 3 shows that each chromosome s represented as a fxed-length bnary strng standng for some subset of the feature lst. Each bt of the chromosome represents whether the correspondng feature s selected or not. 1 n each bt means the correspondng feature s selected, whereas 0 means t s not selected. Durng the evoluton, the smple crossover operator and the eltst strategy are appled. 8 4 { f 1,..., f n,..., f 225,f 226,, f 225+n,.., f 450 } f 1 ~ f 225 : average of the ntensty values of 8*8 wndow f 226 ~f 450 : average of the edge values of 8*8 wndow Fg. 2. Feature Lst of Averages of Intensty and Edge Values D. Evaluaton of Chromosomes Usng VMs o evaluate a chromosome (equvalently, a feature subset), we construct an VM usng a polynomal kernel of the 4th order wth the selected feature subset nstances of a tranng data set as nput vectors. he ftness value of a chromosome s proportonal to the classfcaton performance of the VM for a tunng data set and s nversely proportonal to the sze of feature subsets. he ftness value s defned as Vself V other ftness = λ + ( 1 λ) (1 η) + η F( ), (11) self other he feature lst that conssts of averages of ntensty/edge values s computed from the mages of sze As Fg. 2 shows, each mage s scanned wth the wndow of sze 8 8 wth a 4-pxel overlap. Consequently, the number of scanned wndows s 225. A feature lst nstance for each mage s composed of values computed from the averages of the pxels wthn 225 wndows before and after applyng the obel edge operator [20]. he other feature lst s composed of the PCA projecton weghts. We defne the feature lst usng PCA as the weght vector Ω n (10) that s obtaned by projectng an mage nto the egenfaces correspondng to the M largest egenvalues. where s the total number of mages of subject hmself, self V s the number of mages of subject hmself verfed self correctly, s the total number of mages of others, and other V s the number of mages of others verfed correctly. λ other controls False Reject Rate(FRR) and False Acceptance Rate(FAR),.e., as λ ncreases, FRR decreases and FAR ncreases. he functon F ( ) s nversely proportonal to, whch s the sze of the feature subset. hus, F ( ) gves ftness more score when the chosen feature subset s smaller. ow, F ( ) s defned as followng:

5 1218 IEEE ransactons on Consumer Electroncs, Vol. 49, o. 4, OVEMBER / 4 F( ) = 1.0 /4 0.0 Best Feature ubset V, Weghts f / 4, (12) f / 4 < /2 f > /2 where s the sze of feature set. In (12), F ( ) = 1. 0 for / 4 gves all feature subsets whose szes are less than / 4 perfect scores(=1.0) not to dscrmnate them. By applyng the rule, we can score all feature subsets whose szes are less than / 4 by authentcaton rate wthout consderng the sze. hs s because havng a preference for a feature subset wth smaller sze among them results n subsequent degradaton of authentcaton rate. F ( ) = 0. 0 for > / 2 excludes feature subsets whose number of features are greater than half of, whch reduces the sze of feature subset used durng the constructon of the authentcaton system. In (11), η s the trade-off parameter between error rate and memory requrement. hat s, the larger η s, the less memory s requred because a small feature subset gets more score. Choce of small η means the preference for the small error rate rather than small memory usage. Images Preprocessng Preprocessng of Feature Extracton ubset Instance of VM VM Constructon Authentcaton usng usng VM Matched/on-Matched Fg. 4. Authentcaton Procedure Usng the Proposed Face Authentcaton ystem IV. AUHEICAIO PROCEDURE UIG OUR FACE AUHEICAIO YEM Usng the face authentcaton system establshed n secton 3, a real-tme face authentcaton procedure s provded n ths secton. he overall flow of the authentcaton procedure s shown n Fg. 4. A. Preprocessng and Extracton of Feature ubset Instance Frst, the same preprocessng algorthms as one n the system setup phase are appled durng ths phase. hen, feature subset nstance correspondng to the stored feature subset of an ndvdual to be authentcated, whch s chosen durng the authentcaton setup phase, s extracted from the mage to be authentcated. In ths paper, feature subset nstance s computed for the feature lsts composed of PCA projecton coeffcents, or for the 225 wndows of sze 8 8 wth a 4-pxel overlap generated by scannng a szed face mage, feature subset nstance s computed by calculatng average pxel ntenstes of those wndows and by computng averages of pxel ntenstes after obel edge operator s appled. B. Face Authentcaton usng VM An VM that s a face authentcaton system s constructed usng the stored support vectors and correspondng weghts of an ndvdual to be authentcated. he authentcaton s performed by gvng the constructed VM feature subset nstances and by observng the result. V. FACE AUHEICAIO YEM I MACH-O-CARD We descrbe how to apply our face authentcaton system to smart card whose processor performs matchng. Fg.5 depcts the enrollment and the authentcaton procedure n a match-oncard system. o enroll a user, an mage from a camera s preprocessed and a face authentcaton system s constructed usng our algorthms. he constructed face authentcaton system s stored nto the smart card, where the stored objects are composed of the support vectors, the weghted values and feature subset. hen, the system evolves usng the ftness value. After the evoluton, we obtan the VM n whch the nput vectors are the feature subset nstances correspondng to the most promnent chromosome. he feature subset s unque for each ndvdual, where the unqueness both n feature subset and n VM s obtaned from applcaton of an evolutonary algorthm to each ndvdual. ow, the VM acts as a face authentcaton system. o perform authentcaton on devces such as smart cards, the VM and the most promnent feature subsets are stored n the devces. Enrolled Face Image Input Face Image Enrollment Constructon of Face Preprocessng Authentcaton ystem Authentcaton Extracton of Preprocessng Feature Lst Instance Card Reader Feature ubset, VM Feature Lst Instance mart Card ORE VM, Feature ubset MACH Yes o Fg. 5. Authentcaton Procedure Usng the Proposed Face Authentcaton ystem

6 K. Lee and H. Byun: A ew Face Authentcaton ystem for Memory-Constraned Devces o authentcate a user, an mage to be authentcated s preprocessed n the same way as n the enrollment step. After the preprocessng, a feature lst nstance s extracted to be transported to the smart card. he smart card constructs an VM that s a face authentcator usng ts nternal nformaton such as the support vectors and the weghts. Among the feature lst nstance gven, only feature subset nstance correspondng to ndvdual feature subset stored n the card are extracted, and used as nput to the VM to authentcate a user. VI. y 1219 est data set: For each person, 5 mages of subject hmself and total 124 mages of 14 other persons were used for testng. Among these 124 mages, 44 mages are those of people whose mages do not appear n the tranng set nor n the tunng set. EXPERIMEAL REUL AD AALYI (a) Face Images from the Yale database (b) Face Images from the ORL database Fg. 6. ample mages from Yale and ORL databases o evaluate performance of our face authentcaton system, we make an experment on the very famous face databases such as Yale database and ORL database wth three knds of feature lsts. In ths secton, the expermental results are shown n varous aspects. A. Face Database We demonstrate our algorthm on both the Yale face database and the Cambrdge Olvett Research Lab (ORL) face database. he Yale face database [17] conssts of 11 mages per 15 people, one per dfferent facal expresson or confguraton: center-lght, w/glasses, happy, left-lght, w/no glasses, normal, rght-lght, sad, sleepy, surprsed, and wnk. he sze of mages s pxels. here are 40 persons n the ORL database [18] and 10 dfferent mages wth each person, ncludng varatons n pose, facal expresson (open or closed eyes, smlng or nonsmlng) and wth glasses or no-glasses, but there s lttle llumnaton varaton. he sze of mages s pxels. Fg. 6 shows sample mages of each database. Each database s categorzed nto the followng three data sets: a tranng data set that constructs the VM, a tunng data set that evaluates the VM and a test data set that estmates the performance of the fnal face verfcaton system after tranng. Yale database s categorzed as followng: y y ranng data set: For each person, 3 mages hmself and each 3 mages of 5 other persons for tranng. unng data set: For each person, 3 mages hmself and each 3 mages of 5 other persons for tunng. of subject were used of subject were used In the same way, three data sets for each person n the database are constructed, and then the proposed algorthm uses tranng data set and tunng data set to buld a face

7 1220 authentcaton system for each person. Evaluaton of the face authentcaton system s performed wth hs test data set. B. Feature Lst We perform experments for three knds of feature lsts. Each experment has the followng feature lst for each mage, where E p( Wk) denotes the average of gray ntensty values of the k-th wndow of an mage and E e( W k) represents average of edge values of the k-th wndow of an mage. ω M represents the PCA projecton weghts of an mage. Refer to (9) for the defnton of ω M Exp 1 : Feature lst for experment 1 { ω M M =1,...,50 } Exp 2 : Feature lst for experment 2 { E ( Wk), Ee( Wk) k = 1,...,225 } (13) p (14) Exp 3 : Feature lst for experment 3 { E ( Wk), Ee( Wk), k = 1,...,225, = 1,...,50 } p ω (15) M M o evaluate the effectveness of the proposed method, we consder two cases for each experment. One s only wth VM of whch nput vectors are composed of the feature lst nstances, and the other has GA feature selecton stage, where the nput vectors for VM consst of feature subset nstances chosen by GA. C. Expermental Results and Analyss able 1 and 2 compare performance of an VM-based face authentcaton algorthm havng GA feature selecton step wth one not havng GA step for (13), (14) and (15) on the very famous face databases such as Yale database and ORL database. Addtonally, performance of an VM-based face authentcaton s shown when pxel gray ntensty values of mage tself are a feature lst of the VM. Values n the tables are averages for every ndvduals n each database. In the experments ncludng GA feature selecton step, parameters related wth GA are pre-determned: the number of generatons=3000, λ = 0.45, η = As can be seen n Fg. 7 and Fg. 8, λ = 0.45, η = gve us the best FRR/FAR results. Refer to (11) for λ, η. able 1,2 shows that our face authentcaton algorthm has much less error rate than the algorthm that has only VM n all cases, even though only 24.0%-41.6% of the number of features (more exactly, the sze of the feature subset) are used. Especally, the face authentcaton algorthm that uses pxels gray ntensty tself as a IEEE ransactons on Consumer Electroncs, Vol. 49, o. 4, OVEMBER 2003 feature lst of the VM shows poor error rate compared to one wth GA feature selecton step n the experment 2, even though the former uses 4096(=64 64) features whch s about 20 tmes of the number of features that the latter uses. As a result, we can state that by usng dscrmnatng feature subset of an ndvdual that s extracted by our algorthm, the memory requrement as well as the overall error rate s substantally mproved. ow, we show effectveness of two controllable parameters by experments on Yale database. he frst one s λ, whch can control FRR and FAR,.e., as λ ncreases, FRR decreases but FAR ncreases. Fg. 7 shows the tradeoff between FRR and FAR whle changng λ. In the experment, let η = and the number of generatons =3000, where the feature lst (14) s used. As λ ncreases from 0.00 to 1.00, FRR decreases from 0.15 to 0.08 and FAR grows from 0.05 to hus, by choosng a proper λ, a system desgner can reflect user s requrement regardng FAR and FRR. he second one s η that can control memory requrement and error rate. Fg. 8 and 9 show the tradeoff between error rate and memory requrement whle changng η. In the experment, let λ =0.45 and the number of generatons=3000, where the feature lst (14) s used. Results are on Yale face database, too. As η ncreases from 0.00 to 0.90, FRR ncreases from 0.09 to 0.15 and FAR grows from 0.06 to Meanwhle, the sze of the selected feature subset decreases from 220 to 159 on the average. hus, by choosng a proper η, we can make our algorthm work n memory-constraned systems at the expense of verfcaton rate. ABLE 1 ERROR RAE OF VM OLY V. GA+VM O HE YALE FACE DAABAE Feature Lst Performance Exp. 1 (PCA) Exp. 2 (Avg. of Intensty & Edge) Exp. 3 (Avg. of Intensty & Edge, PCA) Pxel Intensty VM GA+VM VM GA+VM VM GA+VM VM FAR FRR o. of Features o. of Vs ABLE 2 ERROR RAE OF VM OLY V. GA+VM O HE ORL FACE DAABAE Feature Lst Performance Exp. 1 (PCA) Exp. 2 (Avg. of Intensty & Edge) Exp. 3 (Avg. of Intensty & Edge, PCA) Pxel Intensty VM GA+VM VM GA+VM VM GA+VM VM FAR FRR o. of Features o. of Vs

8 K. Lee and H. Byun: A ew Face Authentcaton ystem for Memory-Constraned Devces 1221 VII. COCLUIO mart card s a model of very secure storage, and bometrcs s the ultmate technology for authentcaton. he two can be combned n many applcatons to enhance both the securty and authentcaton. However, a careful desgn s requred to ntegrate the bometrcs nto the smart cards because the smart cards have very lmted memory. hs paper proposed a memory-effcent method of face authentcaton by ntegratng GA nto VM. Comparatve experments showed that our face authentcaton algorthm wth VM whose nput vectors consst of dscrmnatng features extracted by GA has much better performance than the algorthm wthout feature selecton process by GA has. Experments are performed on Yale face database and ORL face database for three carefully chosen feature lsts. Results showed that both FAR and FRR of our algorthm are lower than those of an VM-based face authentcaton algorthm wthout GA feature selecton step, even though our algorthm uses only 24.0%-41.6% of the number of features. Also, a method to reduce, f needed, the amount of memory requred n the authentcaton at the expense of authentcaton rate by changng a controllable system parameter s suggested. By adjustng the system parameter, we can reduce further the amount of memory requred by 35% for a feature lst usng average of ntenstes and that of edge values. herefore, the small memory requrement of the proposed method makes t applcable to ether large-scale face dentfcaton systems or memory-constraned smart card systems. It further enhances the securty ssues n adoptng the smart card nto many emergng applcatons, n contrast to the tradtonal PI verfcaton currently beng used. REFERECE [1] A. Jan, R. Bolle, and. Pankant, Bometrcs: Personal Identfcaton n etworked ocety, Kluwer Academc Publshers, [2] D. Zhang, Bometrc olutons For Authentcaton In An E-World, Kluwer Academc Publshers, [3] L. Jan, U. Halc, I. Hayash,. Lee, and. sutsu., Intellgent Bometrc echnques n Fngerprnt and Face Recognton, CRC Press, [4] A. oore, Hghly robust bometrcs smart card desgn, IEEE rans. on Consumer Electroncs, Vol.46, o.4, pp , [5]. Pan, Y. Gl, D. Moon, Y. Chung, and C. Park, A memory-effcent fngerprnt verfcaton algorthm usng a mult-resoluton accumulator array, ERI Journal, Vol. 25, o. 3, o be publshed, June [6] K. Lam and H. Yan, An analytc-to-holstc approach for face recognton based on a sngle frontal vew, IEEE ransactons on Pattern Analyss and Machne Intellgence, Vol. 29, o. 7, 1998, pp [7] M. urk and A. Pentland, Face recognton usng egenfaces, Proceedngs of IEEE Internatonal Conference on Computer Vson and Pattern Recognton, 1991, pp [8] R. Brunell and. Poggo, Face recognton: features versus templates, IEEE ransactons on Pattern Analyss and Machne Intellgence, Vol. 15, o. 10, 1993, pp [9] V. Vapnk, tatstcal Learnng heory, John Wley & ons, ew York, [10] E. Osuna, R. Feund, and F. Gros, ranng support vector machnes: an applcaton to face detecton, Proceedngs of IEEE Internatonal Conference on Computer Vson and Pattern Recognton, 1997, pp J. Huang, X. hao, and H. Wechsler, Face pose dscrmnaton usng support vector machnes, Proceedngs of Internatonal Conference on Pattern Recognton, 1998, pp [11] G. Guo,. Z. L, and K. L. Chan, upport vector machnes for face recognton, Image and Vson Computng 19, 2001, pp [12] K. Jonsson, J. Matas, J. Kttler, and Y. L, Learnng support vectors for face verfcaton and recognton, Proceedngs of Internatonal Conference on Automatc Face and Gesture Recognton, 2000, pp [13] P. Phllps, upport vector machnes appled to face recognton, Advances n eural Informaton Processng ystems 11, MI Press, 1999, pp [14] D. Goldberg, Genetc Algorthms n earch, Optmzaton, and Machne Learnng, Addson-Wesley, 1989 [15] K. Lee, Y. Chung, and H. Byun, Face recognton usng support vector machnes wth the feature set extracted by genetc algorthms, Proceedngs of Audo- and Vdeo-Based Bometrc Person Authentcaton, 2001, pp [16] Yale Face Database, [17] ORL Face Database, [18] H. Lu and H. Motoda, Feature Extracton, Constructon and electon: A Data Mnng Perspectve, Kluwer Academc Publshers, 2001 [19] R. Gonzalez, and R. Woods, Dgtal Image Processng, Addson Wesley Longman, 1992.

9 1222 IEEE ransactons on Consumer Electroncs, Vol. 49, o. 4, OVEMBER 2003 Kyunghee Lee receved the B.. and M.. degrees n computer scence from Yonse Unversty, Korea, n 1993 and 1998, respectvely. he s currently pursung Ph.D. degree at Yonse Unversty. he had been a researcher of the LG oft Company from 1993 to he s currently a senor member of engneerng staff of the Electroncs and elecommuncatons Research Insttute, Daejeon, Korea. Her research nterests nclude bometrcs, especally face recognton, pattern recognton, and mage processng. Hyeran Byun receved the B.. and M.. degrees n Mathematcs from Yonse Unversty, Korea. he receved her Ph.D. degree n Computer cence from Purdue Unversty, West Lafayette, Indana. he was a assstant professor n Hallym unversty, Chooncheon, Korea from nce 1995, she has been an assocate professor of Computer cence at Yonse Unversty, Korea. Her research nterests are multmeda, computer vson, mage and vdeo processng, artfcal ntellgence and pattern recognton.

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Face Recognition University at Buffalo CSE666 Lecture Slides Resources: Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural

More information

Recognizing Faces. Outline

Recognizing Faces. Outline Recognzng Faces Drk Colbry Outlne Introducton and Motvaton Defnng a feature vector Prncpal Component Analyss Lnear Dscrmnate Analyss !"" #$""% http://www.nfotech.oulu.f/annual/2004 + &'()*) '+)* 2 ! &

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

Face Recognition Based on SVM and 2DPCA

Face Recognition Based on SVM and 2DPCA Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification Introducton to Artfcal Intellgence V22.0472-001 Fall 2009 Lecture 24: Nearest-Neghbors & Support Vector Machnes Rob Fergus Dept of Computer Scence, Courant Insttute, NYU Sldes from Danel Yeung, John DeNero

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Human Face Recognition Using Generalized. Kernel Fisher Discriminant

Human Face Recognition Using Generalized. Kernel Fisher Discriminant Human Face Recognton Usng Generalzed Kernel Fsher Dscrmnant ng-yu Sun,2 De-Shuang Huang Ln Guo. Insttute of Intellgent Machnes, Chnese Academy of Scences, P.O.ox 30, Hefe, Anhu, Chna. 2. Department of

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

A Genetic Programming-PCA Hybrid Face Recognition Algorithm

A Genetic Programming-PCA Hybrid Face Recognition Algorithm Journal of Sgnal and Informaton Processng, 20, 2, 70-74 do:0.4236/jsp.20.23022 Publshed Onlne August 20 (http://www.scrp.org/journal/jsp) A Genetc Programmng-PCA Hybrd Face Recognton Algorthm Behzad Bozorgtabar,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Classification of Face Images Based on Gender using Dimensionality Reduction Techniques and SVM

Classification of Face Images Based on Gender using Dimensionality Reduction Techniques and SVM Classfcaton of Face Images Based on Gender usng Dmensonalty Reducton Technques and SVM Fahm Mannan 260 266 294 School of Computer Scence McGll Unversty Abstract Ths report presents gender classfcaton based

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS

EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS P.G. Demdov Yaroslavl State Unversty Anatoly Ntn, Vladmr Khryashchev, Olga Stepanova, Igor Kostern EYE CENTER LOCALIZATION ON A FACIAL IMAGE BASED ON MULTI-BLOCK LOCAL BINARY PATTERNS Yaroslavl, 2015 Eye

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Two-Dimensional Supervised Discriminant Projection Method For Feature Extraction

Two-Dimensional Supervised Discriminant Projection Method For Feature Extraction Appl. Math. Inf. c. 6 No. pp. 8-85 (0) Appled Mathematcs & Informaton cences An Internatonal Journal @ 0 NP Natural cences Publshng Cor. wo-dmensonal upervsed Dscrmnant Proecton Method For Feature Extracton

More information

Discriminative Dictionary Learning with Pairwise Constraints

Discriminative Dictionary Learning with Pairwise Constraints Dscrmnatve Dctonary Learnng wth Parwse Constrants Humn Guo Zhuoln Jang LARRY S. DAVIS UNIVERSITY OF MARYLAND Nov. 6 th, Outlne Introducton/motvaton Dctonary Learnng Dscrmnatve Dctonary Learnng wth Parwse

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Classification / Regression Support Vector Machines

Classification / Regression Support Vector Machines Classfcaton / Regresson Support Vector Machnes Jeff Howbert Introducton to Machne Learnng Wnter 04 Topcs SVM classfers for lnearly separable classes SVM classfers for non-lnearly separable classes SVM

More information

Machine Learning. Support Vector Machines. (contains material adapted from talks by Constantin F. Aliferis & Ioannis Tsamardinos, and Martin Law)

Machine Learning. Support Vector Machines. (contains material adapted from talks by Constantin F. Aliferis & Ioannis Tsamardinos, and Martin Law) Machne Learnng Support Vector Machnes (contans materal adapted from talks by Constantn F. Alfers & Ioanns Tsamardnos, and Martn Law) Bryan Pardo, Machne Learnng: EECS 349 Fall 2014 Support Vector Machnes

More information

PCA Based Gait Segmentation

PCA Based Gait Segmentation Honggu L, Cupng Sh & Xngguo L PCA Based Gat Segmentaton PCA Based Gat Segmentaton Honggu L, Cupng Sh, and Xngguo L 2 Electronc Department, Physcs College, Yangzhou Unversty, 225002 Yangzhou, Chna 2 Department

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

PERFORMANCE EVALUATION FOR SCENE MATCHING ALGORITHMS BY SVM

PERFORMANCE EVALUATION FOR SCENE MATCHING ALGORITHMS BY SVM PERFORMACE EVALUAIO FOR SCEE MACHIG ALGORIHMS BY SVM Zhaohu Yang a, b, *, Yngyng Chen a, Shaomng Zhang a a he Research Center of Remote Sensng and Geomatc, ongj Unversty, Shangha 200092, Chna - yzhac@63.com

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

An Efficient Illumination Normalization Method with Fuzzy LDA Feature Extractor for Face Recognition

An Efficient Illumination Normalization Method with Fuzzy LDA Feature Extractor for Face Recognition www.mer.com Vol.2, Issue.1, pp-060-065 ISS: 2249-6645 An Effcent Illumnaton ormalzaton Meod w Fuzzy LDA Feature Extractor for Face Recognton Behzad Bozorgtabar 1, Hamed Azam 2 (Department of Electrcal

More information

Histogram-Enhanced Principal Component Analysis for Face Recognition

Histogram-Enhanced Principal Component Analysis for Face Recognition Hstogram-Enhanced Prncpal Component Analyss for Face ecognton Ana-ara Sevcenco and Wu-Sheng Lu Dept. of Electrcal and Computer Engneerng Unversty of Vctora sevcenco@engr.uvc.ca, wslu@ece.uvc.ca Abstract

More information

On Modeling Variations For Face Authentication

On Modeling Variations For Face Authentication On Modelng Varatons For Face Authentcaton Xaomng Lu Tsuhan Chen B.V.K. Vjaya Kumar Department of Electrcal and Computer Engneerng, Carnege Mellon Unversty Abstract In ths paper, we present a scheme for

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

Modular PCA Face Recognition Based on Weighted Average

Modular PCA Face Recognition Based on Weighted Average odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Face Recognition by Fusing Binary Edge Feature and Second-order Mutual Information

Face Recognition by Fusing Binary Edge Feature and Second-order Mutual Information Face Recognton by Fusng Bnary Edge Feature and Second-order Mutual Informaton Jatao Song, Bejng Chen, We Wang, Xaobo Ren School of Electronc and Informaton Engneerng, Nngbo Unversty of Technology Nngbo,

More information

A Computer Vision System for Automated Container Code Recognition

A Computer Vision System for Automated Container Code Recognition A Computer Vson System for Automated Contaner Code Recognton Hsn-Chen Chen, Chh-Ka Chen, Fu-Yu Hsu, Yu-San Ln, Yu-Te Wu, Yung-Nen Sun * Abstract Contaner code examnaton s an essental step n the contaner

More information

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 5) Maxmum Varance Combned wth Adaptve Genetc Algorthm for Infrared Image Segmentaton Huxuan Fu College of Automaton Harbn

More information

Palmprint Feature Extraction Using 2-D Gabor Filters

Palmprint Feature Extraction Using 2-D Gabor Filters Palmprnt Feature Extracton Usng 2-D Gabor Flters Wa Kn Kong Davd Zhang and Wenxn L Bometrcs Research Centre Department of Computng The Hong Kong Polytechnc Unversty Kowloon Hong Kong Correspondng author:

More information

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,

More information

RECOGNITION AND AGE PREDICTION WITH DIGITAL IMAGES OF MISSING CHILDREN

RECOGNITION AND AGE PREDICTION WITH DIGITAL IMAGES OF MISSING CHILDREN RECOGNIION AND AGE PREDICION WIH DIGIAL IMAGES OF MISSING CHILDREN A Wrtng Project Presented to he Faculty of the Department of Computer Scence San Jose State Unversty In Partal Fulfllment of the Requrements

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Gender Classification using Interlaced Derivative Patterns

Gender Classification using Interlaced Derivative Patterns Gender Classfcaton usng Interlaced Dervatve Patterns Author Shobernejad, Ameneh, Gao, Yongsheng Publshed 2 Conference Ttle Proceedngs of the 2th Internatonal Conference on Pattern Recognton (ICPR 2) DOI

More information

Image Alignment CSC 767

Image Alignment CSC 767 Image Algnment CSC 767 Image algnment Image from http://graphcs.cs.cmu.edu/courses/15-463/2010_fall/ Image algnment: Applcatons Panorama sttchng Image algnment: Applcatons Recognton of object nstances

More information

Face Recognition Method Based on Within-class Clustering SVM

Face Recognition Method Based on Within-class Clustering SVM Face Recognton Method Based on Wthn-class Clusterng SVM Yan Wu, Xao Yao and Yng Xa Department of Computer Scence and Engneerng Tong Unversty Shangha, Chna Abstract - A face recognton method based on Wthn-class

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Feature Selection for Target Detection in SAR Images

Feature Selection for Target Detection in SAR Images Feature Selecton for Detecton n SAR Images Br Bhanu, Yngqang Ln and Shqn Wang Center for Research n Intellgent Systems Unversty of Calforna, Rversde, CA 95, USA Abstract A genetc algorthm (GA) approach

More information

Multiclass Object Recognition based on Texture Linear Genetic Programming

Multiclass Object Recognition based on Texture Linear Genetic Programming Multclass Object Recognton based on Texture Lnear Genetc Programmng Gustavo Olague 1, Eva Romero 1 Leonardo Trujllo 1, and Br Bhanu 2 1 CICESE, Km. 107 carretera Tjuana-Ensenada, Mexco, olague@ccese.mx,

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Competitive Sparse Representation Classification for Face Recognition

Competitive Sparse Representation Classification for Face Recognition Vol. 6, No. 8, 05 Compettve Sparse Representaton Classfcaton for Face Recognton Yng Lu Chongqng Key Laboratory of Computatonal Intellgence Chongqng Unversty of Posts and elecommuncatons Chongqng, Chna

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Kernel Collaborative Representation Classification Based on Adaptive Dictionary Learning

Kernel Collaborative Representation Classification Based on Adaptive Dictionary Learning Internatonal Journal of Intellgent Informaton Systems 2018; 7(2): 15-22 http://www.scencepublshnggroup.com/j/js do: 10.11648/j.js.20180702.11 ISSN: 2328-7675 (Prnt); ISSN: 2328-7683 (Onlne) Kernel Collaboratve

More information

A Background Subtraction for a Vision-based User Interface *

A Background Subtraction for a Vision-based User Interface * A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton

More information

On Supporting Identification in a Hand-Based Biometric Framework

On Supporting Identification in a Hand-Based Biometric Framework On Supportng Identfcaton n a Hand-Based Bometrc Framework Pe-Fang Guo 1, Prabr Bhattacharya 2, and Nawwaf Kharma 1 1 Electrcal & Computer Engneerng, Concorda Unversty, 1455 de Masonneuve Blvd., Montreal,

More information

Integrated Expression-Invariant Face Recognition with Constrained Optical Flow

Integrated Expression-Invariant Face Recognition with Constrained Optical Flow Integrated Expresson-Invarant Face Recognton wth Constraned Optcal Flow Chao-Kue Hseh, Shang-Hong La 2, and Yung-Chang Chen Department of Electrcal Engneerng, Natonal Tsng Hua Unversty, Tawan 2 Department

More information

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET 1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School

More information

Combination of Local Multiple Patterns and Exponential Discriminant Analysis for Facial Recognition

Combination of Local Multiple Patterns and Exponential Discriminant Analysis for Facial Recognition Sensors & ransducers 203 by IFSA http://.sensorsportal.com Combnaton of Local Multple Patterns and Exponental Dscrmnant Analyss for Facal Recognton, 2 Lfang Zhou, 2 Bn Fang, 3 Wesheng L, 3 Ldou Wang College

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

LECTURE : MANIFOLD LEARNING

LECTURE : MANIFOLD LEARNING LECTURE : MANIFOLD LEARNING Rta Osadchy Some sldes are due to L.Saul, V. C. Raykar, N. Verma Topcs PCA MDS IsoMap LLE EgenMaps Done! Dmensonalty Reducton Data representaton Inputs are real-valued vectors

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

An Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem

An Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem An Effcent Genetc Algorthm wth Fuzzy c-means Clusterng for Travelng Salesman Problem Jong-Won Yoon and Sung-Bae Cho Dept. of Computer Scence Yonse Unversty Seoul, Korea jwyoon@sclab.yonse.ac.r, sbcho@cs.yonse.ac.r

More information

Learning a Class-Specific Dictionary for Facial Expression Recognition

Learning a Class-Specific Dictionary for Facial Expression Recognition BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 4 Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-0067 Learnng a Class-Specfc Dctonary for

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Discriminative classifiers for object classification. Last time

Discriminative classifiers for object classification. Last time Dscrmnatve classfers for object classfcaton Thursday, Nov 12 Krsten Grauman UT Austn Last tme Supervsed classfcaton Loss and rsk, kbayes rule Skn color detecton example Sldng ndo detecton Classfers, boostng

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Vol. 5, No. 3 March 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. Journal of Emergng Trends n Computng and Informaton Scences 009-03 CIS Journal. All rghts reserved. http://www.csjournal.org Unhealthy Detecton n Lvestock Texture Images usng Subsampled Contourlet Transform

More information

CLASSIFICATION OF ULTRASONIC SIGNALS

CLASSIFICATION OF ULTRASONIC SIGNALS The 8 th Internatonal Conference of the Slovenan Socety for Non-Destructve Testng»Applcaton of Contemporary Non-Destructve Testng n Engneerng«September -3, 5, Portorož, Slovena, pp. 7-33 CLASSIFICATION

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and

More information

Accounting for the Use of Different Length Scale Factors in x, y and z Directions

Accounting for the Use of Different Length Scale Factors in x, y and z Directions 1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,

More information

Feature Extractions for Iris Recognition

Feature Extractions for Iris Recognition Feature Extractons for Irs Recognton Jnwook Go, Jan Jang, Yllbyung Lee, and Chulhee Lee Department of Electrcal and Electronc Engneerng, Yonse Unversty 134 Shnchon-Dong, Seodaemoon-Gu, Seoul, KOREA Emal:

More information

Invariant Shape Object Recognition Using B-Spline, Cardinal Spline, and Genetic Algorithm

Invariant Shape Object Recognition Using B-Spline, Cardinal Spline, and Genetic Algorithm Proceedngs of the 5th WSEAS Int. Conf. on Sgnal Processng, Robotcs and Automaton, Madrd, Span, February 5-7, 6 (pp4-45) Invarant Shape Obect Recognton Usng B-Splne, Cardnal Splne, and Genetc Algorthm PISIT

More information

Using Neural Networks and Support Vector Machines in Data Mining

Using Neural Networks and Support Vector Machines in Data Mining Usng eural etworks and Support Vector Machnes n Data Mnng RICHARD A. WASIOWSKI Computer Scence Department Calforna State Unversty Domnguez Hlls Carson, CA 90747 USA Abstract: - Multvarate data analyss

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Fast Feature Value Searching for Face Detection

Fast Feature Value Searching for Face Detection Vol., No. 2 Computer and Informaton Scence Fast Feature Value Searchng for Face Detecton Yunyang Yan Department of Computer Engneerng Huayn Insttute of Technology Hua an 22300, Chna E-mal: areyyyke@63.com

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Classifier Swarms for Human Detection in Infrared Imagery

Classifier Swarms for Human Detection in Infrared Imagery Classfer Swarms for Human Detecton n Infrared Imagery Yur Owechko, Swarup Medasan, and Narayan Srnvasa HRL Laboratores, LLC 3011 Malbu Canyon Road, Malbu, CA 90265 {owechko, smedasan, nsrnvasa}@hrl.com

More information

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 48 CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 3.1 INTRODUCTION The raw mcroarray data s bascally an mage wth dfferent colors ndcatng hybrdzaton (Xue

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

Learning-based License Plate Detection on Edge Features

Learning-based License Plate Detection on Edge Features Learnng-based Lcense Plate Detecton on Edge Features Wng Teng Ho, Woo Hen Yap, Yong Haur Tay Computer Vson and Intellgent Systems (CVIS) Group Unverst Tunku Abdul Rahman, Malaysa wngteng_h@yahoo.com, woohen@yahoo.com,

More information