Face authentication for low-power mobile devices
|
|
- Bertha Harrison
- 6 years ago
- Views:
Transcription
1 Face authentication for low-power mobile devices Jean-Luc Nagel, CSEM SA, Microelectronics Division, Neuchâtel, Switzerland Patrick Stadelmann, University of Neuchâtel, IMT, Neuchâtel, Switzerland Conference on Biometrical Feature Identification and Analysis, Goettingen, Germany, 6-8 September 2007
2 Agenda Biometrics on mobile devices Motivation / selection of face authentication Challenges of mobile solutions Standard vs. custom hardware solutions for face authentication (camera + processing hardware) Proposed solutions towards mobile face authentication Elastic graph matching (EGM) algorithm A hardware platform for EGM Perspectives and conclusions Copyright 2007 CSEM Face authentication on mobile devices jln Page 1
3 Motivation (1) Beyond the Cell Phone: Mobile Communicators Convergence of PDAs and mobile phones (Smart Phones, Ultra-personal computers) Extended connectivity: IrDA, Bluetooth, GPRS, wireless LAN (802.11b), USB, Ethernet Protection of data stored on communicators Confidential business files (technical, managerial) Sensitive personal files (e.g. contacts + medical records) Banking transaction records Access to remote data / services Tele-maintenance, tele-surveillance Access to sensitive remove data Pay-per-use content M(obile)-business (e.g. weather forecasting, sports, timetables, etc.) Copyright 2007 CSEM Face authentication on mobile devices jln Page 2
4 Motivation (2) Security levels in 3G devices Communication security and data integrity: data encryption User account protection: code exchange Terminal access protection: PIN code Terminal access protection by PIN code is insufficient, because of: Limited security level Easiness to guess or steal PIN codes Limited user-friendliness Time needed to introduce PIN (keystrokes) Difficulty to remember numerous different codes users often do not even utilize PIN on mobile phones Security + user friendliness can be improved by complementing transferable knowledge (PIN codes) with info on user-being (physiological / behavioral traits) Copyright 2007 CSEM Face authentication on mobile devices jln Page 3
5 Motivation (3) Modalities most suitable for mobile terminals: Voice: Face: Fingerprint: (low-cost) microphone already exists on devices, but robustness to noisy environments is difficult Digital camera already exists on almost all mobile devices requires additional dedicated sensor. Face authentication seems a good choice for medium security applications (e.g. consumer devices) Improved robustness could be achieved using multi-modality (e.g. face + fingerprint) Copyright 2007 CSEM Face authentication on mobile devices jln Page 4
6 Motivation (4) Why entirely on the mobile device? (vs. local acquisition and verification on a remote server) Device turned on Authentication Access Advantages template store locally (no central big-brother database) accessible even if no network connection is available Drawbacks higher computational power is necessary attempts at hacking the biometric templates may be undetected Copyright 2007 CSEM Face authentication on mobile devices jln Page 5
7 Challenges Background variation : mostly a face detection problem Scaling view-angle, distance from camera (user holding the camera) Illumination variation (user authentifying himself in different lighting conditions): variations of the perceived intensity light position w.r.t. the geometry of the object; multiple light sources; non-linear effects (e.g. cast and attached shadows, highlights, saturation) variations of the illuminant spectrum Power consumption (energy consumption) Copyright 2007 CSEM Face authentication on mobile devices jln Page 6
8 Standard vs. custom hardware solution Custom Standard Image sensor Robustness to illumination variation; high dynamic range Examples: IR sensor, vision sensors Low-cost Possible reuse for other tasks Processing hardware Higher performance; lower-power consumption; low-cost (if volume is important) Examples: dedicated ASICs Customizable DSPs Examples: icyflex & macgic cores Better development tools Example: CMOS image sensor Examples: high-end DSPs Copyright 2007 CSEM Face authentication on mobile devices jln Page 7
9 Examples of non conventional image/vision sensors CSEM ViSe vision sensor auto-exposure principle : integration time measurement at the pixel level on-chip analogue computation of magnitude and direction of image contrasts. CSEM SwissRanger 3D image sensor time of flight measurement infra-red illumination Copyright 2007 CSEM Face authentication on mobile devices jln Page 8
10 Handling illumination variation on standard sensors Classical approaches: Predict the variability of the features build a statistical model of illumination variation (i.e. stats on the set of images of an object under all pose and illumination) reconstructionist (i.e. similar to image rendering in Computer Graphics) Derive new less sensitive features (i.e. near invariant) Performance of statistical methods is dependent on the quality of training set Reconstructionist approaches perform better than illumination insensitive features, but their computational complexity is not affordable on mobile devices (e.g. Blanz&Vetter several minutes on a 2 GHz PC) derivation of less sensitive features is sufficient for mobile low-power applications and is achievable on these devices. Copyright 2007 CSEM Face authentication on mobile devices jln Page 9
11 Illumination with standard image sensors Normalized mathematical morphology as a simple solution, which is not dependent on face detection results! SE (level 1, 2, 3,, 9) 9 eroded images 9 dilated images E 1 D 1 E 2 D 2 E 3 D 3 E 9 D 9 ( x, y) J ( x, y) J 9 J 8 J J 1 n 19 7 n J 10 J 11 J 12 J 19 J1( x, y) J19( x, y) J ' J ( x, y) Copyright 2007 CSEM Face authentication on mobile devices jln Page 10
12 Normalized mathematical morphology Advantages of normalized MM: Cast shadows produce local effects Attached shadows have a larger extension; feature distance is smaller in normalized morphology than in baseline morphology D 8 Standard mathematical morphology (SE of 17x 17 pixels) E 8 J 2 J 18 Normalized mathematical morphology Copyright 2007 CSEM Face authentication on mobile devices jln Page 11
13 Handling deformations Two approaches 1. Add a pre-processing stage to recover a shape free image (e.g. face warping) 2. Embed the shape matching in the algorithm Pre-processing stage depends on precise face localization (or even facial features localization) Precise detection is affected by deformations! Use the second solution Elastic graph matching is a good candidate Ok if features are near invariant to rotation and translation Copyright 2007 CSEM Face authentication on mobile devices jln Page 12
14 Elastic graph matching (EGM) Originally published by Lades et al. in 1993 In EGM, a face is holistically represented by labelled graphs local information: features associated to a node global information: topography of the graph; penalization of elastic deformations A correspondence is searched between features extracted from a reference graph and from a test graph (Euclidean feature distance minimization), which allows (but penalizes) elastic deformations M F M MxMxF? Copyright 2007 CSEM Face authentication on mobile devices jln Page 13
15 EGM improvements (1) New metrics (invariant to rotation and scaling) as compared to Lades et al. and Kotropoulos et al. Graph size variations a (a, a ) x y Copyright 2007 CSEM Face authentication on mobile devices jln Page 14
16 EGM improvements (2) Occlusion / cast shadows Out of 64 graph node distances, keep only the 32 smallest node feature distances and reject the others from the total graph distance Copyright 2007 CSEM Face authentication on mobile devices jln Page 15
17 EGM results : AVBPA 2003 Lausanne configuration II Automatic registration Copyright 2007 CSEM Face authentication on mobile devices jln Page 16
18 MEGM results : darkened XM2VTS ICBA 2006 Copyright 2007 CSEM Face authentication on mobile devices jln Page 17
19 MEGM results : Yale B database Classification Manual registration subset 1 subset 2 subset 3 subset 4 Method Id. error rate (%) vs. illuminant change Subset 2 Subset 3 Subset 4 Cones-attached (statistical) [Georghiades et al.] Cones-cast (statistical + reconstruc.) [Georghiades et al.] MEGM Copyright 2007 CSEM Face authentication on mobile devices jln Page 18
20 A hardware platform for EGM Two coprocessors (for mathematical morphology + graph matching) Programming tools (assembler, cycle-accurate simulator) Parallel processing improved power consumption compared to standard DSP Image sensor can be embedded in the same system-on-chip (SoC) when using CMOS technology Master processor can be used for other tasks Copyright 2007 CSEM Face authentication on mobile devices jln Page 19
21 FPGA demonstrator FPGA + SRAM VGACAM 146x146 pixels (out of 256x256) Ethernet Level shifter FPGA: Altera APEX-20K600 Logical elements (49 %) Ethernut Ethernet Positive slack (clock period : 100 ns) Face authentication 33.1 ns (ca 33%) 1.6 sec (~0.8 for computation) Copyright 2007 CSEM Face authentication on mobile devices jln Page 20
22 SoC power and area estimation results UMC 0.18 mm technology Power 10 MHz, 1.8 V. A power saving of ca. 3 times can be achieved at 1.0 V (same frequency) total power lower than 40 mw Other state-of-art mobile algorithms Pun et al.(spie 2005) PCA based. 5 sec for a complete authentication Running on an Intel XScale 400 MHz processor Power consumption: not given ( ~ 1 W) Power [mw] Power w/o. Power w. RAM RAM EGM copro 3 9 MM copro 1 3 Embedded SRAM (512 Ko) Micro-controller Image sensor IO pads 5 5 Total Area [mm2] w/o. RAM w. RAM EGM copro MM copro Copyright 2007 CSEM Face authentication on mobile devices jln Page 21
23 Conclusion Clear requirements for a low-cost easy-to-use solution for biometrics verification on mobile devices; Face verification can fit this requirement, but environment variations are challenging in mobile environments, especially lighting variation (indoor/outdoor use, multiple light sources, etc.); Custom cameras can improve the robustness of the solution but are too expensive; standard cameras are affordable in mobile solutions; Dedicated hardware coprocessor can fit the stringent power consumption issues; cost can be maintained low if embedded in a SoC with large volume productions (typical of mobile applications); A platform prototype based on elastic graph matching was demonstrated to correspond to power and speed requirements. Copyright 2007 CSEM Face authentication on mobile devices jln Page 22
24 Thank you for your attention.
Digital Vision Face recognition
Ulrik Söderström ulrik.soderstrom@tfe.umu.se 27 May 2007 Digital Vision Face recognition 1 Faces Faces are integral to human interaction Manual facial recognition is already used in everyday authentication
More informationMDR-1 Mobile Document Reader
MDR-1 Mobile Document Reader SPC_MDR-1 1/7 Mobile Document Reader MDR-1 Security Printing Consulting AG The new MDR-1 document reader fulfill the needs for fast and reliable reading, verification and authentication
More informationFace Recognition Markus Storer, 2007
Face Recognition Markus Storer, 2007 Agenda Face recognition by humans 3D morphable models pose and illumination model creation model fitting results Face recognition vendor test 2006 Face Recognition
More informationLow-Power SRAM and ROM Memories
Low-Power SRAM and ROM Memories Jean-Marc Masgonty 1, Stefan Cserveny 1, Christian Piguet 1,2 1 CSEM, Neuchâtel, Switzerland 2 LAP-EPFL Lausanne, Switzerland Abstract. Memories are a main concern in low-power
More informationImage Processing and Image Representations for Face Recognition
Image Processing and Image Representations for Face Recognition 1 Introduction Face recognition is an active area of research in image processing and pattern recognition. Since the general topic of face
More informationS100 Series. Compact Smart Camera. High Performance: Dual Core Cortex-A9 processor and Xilinx FPGA. acquisition and preprocessing
S100 Series Compact Smart Camera High Performance: Dual Core Cortex-A9 processor and Xilinx FPGA IP-67 Rated enclosure Programmable FPGA for image acquisition and preprocessing Multiple resolution: VGA,
More informationAdvanced Imaging Applications on Smart-phones Convergence of General-purpose computing, Graphics acceleration, and Sensors
Advanced Imaging Applications on Smart-phones Convergence of General-purpose computing, Graphics acceleration, and Sensors Sriram Sethuraman Technologist & DMTS, Ittiam 1 Overview Imaging on Smart-phones
More informationNew Sony DepthSense TM ToF Technology
ADVANCED MATERIAL HANDLING WITH New Sony DepthSense TM ToF Technology Jenson Chang Product Marketing November 7, 2018 1 3D SENSING APPLICATIONS Pick and Place Drones Collision Detection People Counting
More informationHaresh D. Chande #, Zankhana H. Shah *
Illumination Invariant Face Recognition System Haresh D. Chande #, Zankhana H. Shah * # Computer Engineering Department, Birla Vishvakarma Mahavidyalaya, Gujarat Technological University, India * Information
More informationPerformance Analysis of Face Recognition Algorithms on TMS320C64x
Application Report SPRA874 December 2002 Performance Analysis of Face Recognition Algorithms on TMS320C64x Aziz Umit Batur and Bruce E. Flinchbaugh DSP Solutions R&D Center ABSTRACT Face recognition is
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationVision-Based Technologies for Security in Logistics. Alberto Isasi
Vision-Based Technologies for Security in Logistics Alberto Isasi aisasi@robotiker.es INFOTECH is the Unit of ROBOTIKER-TECNALIA specialised in Research, Development and Application of Information and
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More information3D Time-of-Flight Image Sensor Solutions for Mobile Devices
3D Time-of-Flight Image Sensor Solutions for Mobile Devices SEMICON Europa 2015 Imaging Conference Bernd Buxbaum 2015 pmdtechnologies gmbh c o n f i d e n t i a l Content Introduction Motivation for 3D
More informationThe Implementation of Face Security for Authentication Implemented on Mobile Phone. Emir Kremic Abdulhamit Subasi
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremic Abdulhamit Subasi The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir
More informationNew Sony DepthSense TM ToF Technology
ADVANCED MATERIAL HANDLING WITH New Sony DepthSense TM ToF Technology Jenson Chang Product Marketing November 7, 2018 1 3D SENSING APPLICATIONS Pick and Place Drones Collision Detection People Counting
More informationStudying Leakages on an Embedded Biometric System Using Side Channel Analysis
Studying Leakages on an Embedded Biometric System Using Side Channel Analysis M. Berthier, Y. Bocktaels, J. Bringer, H. Chabanne, T. Chouta, J-L. Danger, M. Favre, T. Graba Institut Mines-Télécom Outline
More informationFPGA Implementation of High Performance Face Detection Using MCT and Adaboost Algorithm
FPGA Implementation of High Performance Face Detection Using MCT and Adaboost Algorithm Ramya N P.G.Scholar, ECE, SKP Engineering College, Tiruvannamalai India E-mail : ramyamevlsi@gmail.com Srimathi Mathiazhagan
More informationMemory Systems IRAM. Principle of IRAM
Memory Systems 165 other devices of the module will be in the Standby state (which is the primary state of all RDRAM devices) or another state with low-power consumption. The RDRAM devices provide several
More informationPlatform-based Design
Platform-based Design The New System Design Paradigm IEEE1394 Software Content CPU Core DSP Core Glue Logic Memory Hardware BlueTooth I/O Block-Based Design Memory Orthogonalization of concerns: the separation
More informationCarmen Alonso Montes 23rd-27th November 2015
Practical Computer Vision: Theory & Applications 23rd-27th November 2015 Wrap up Today, we are here 2 Learned concepts Hough Transform Distance mapping Watershed Active contours 3 Contents Wrap up Object
More information11th symposium on advanced space technologies in robotics and automation
11th symposium on advanced space technologies in robotics and automation CONTRIBUTION OF A POWERFUL IMAGE PROCESSING UNIT TO THE AUTONOMY OF ROBOTIC INSTRUMENTS Thomas Würgler, Neuchâtel, Switzerland Thursday,
More informationBio-LINK
Bio-LINK Introduction Bio-Link is a exquisitely made versatile masterpiece and state-of-the-art from Star Link. The Bio-Link is very effective in managing attendance in small setup like IT firm, industries,
More informationFace Tracking. Synonyms. Definition. Main Body Text. Amit K. Roy-Chowdhury and Yilei Xu. Facial Motion Estimation
Face Tracking Amit K. Roy-Chowdhury and Yilei Xu Department of Electrical Engineering, University of California, Riverside, CA 92521, USA {amitrc,yxu}@ee.ucr.edu Synonyms Facial Motion Estimation Definition
More informationTIED FACTOR ANALYSIS FOR FACE RECOGNITION ACROSS LARGE POSE DIFFERENCES
TIED FACTOR ANALYSIS FOR FACE RECOGNITION ACROSS LARGE POSE DIFFERENCES SIMON J.D. PRINCE, JAMES H. ELDER, JONATHAN WARRELL, FATIMA M. FELISBERTI IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE,
More informationBIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal
BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION
More informationAnnouncements. Recognition I. Gradient Space (p,q) What is the reflectance map?
Announcements I HW 3 due 12 noon, tomorrow. HW 4 to be posted soon recognition Lecture plan recognition for next two lectures, then video and motion. Introduction to Computer Vision CSE 152 Lecture 17
More informationAugmenting Reality, Naturally:
Augmenting Reality, Naturally: Scene Modelling, Recognition and Tracking with Invariant Image Features by Iryna Gordon in collaboration with David G. Lowe Laboratory for Computational Intelligence Department
More informationINTUS 1600PS Palm Vein Authentication
INTUS 1600PS Palm Vein Authentication PalmSecure TM is a mark from Fujitsu Page 1 Biometry what s the use of it? І Need for trustable and automated person identification. І Addition / replacement of traditional
More informationInformation Security Identification and authentication. Advanced User Authentication II
Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background
More informationUK Industrial Vision SWIR Challenges
UK Industrial Vision SWIR Challenges Ian Alderton ALRAD IMAGING ALRAD INSTRUMENTS LTD 1 ALRAD - Company Profile. ALRAD are a Distribution company for Imaging, Electro Optic, Analytical Components and Instruments
More informationRole of Biometrics in Cybersecurity. Sam Youness
Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday
More informationFILTERBANK-BASED FINGERPRINT MATCHING. Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239)
FILTERBANK-BASED FINGERPRINT MATCHING Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239) Papers Selected FINGERPRINT MATCHING USING MINUTIAE AND TEXTURE FEATURES By Anil
More informationVISION IMPACT+ OCR HIGHLIGHTS APPLICATIONS. Lot and batch number reading. Dedicated OCR user interface. Expiration date verification
IMPACT+ OCR IMPACT+ OCR is the new Datalogic innovative solution for robust and effective Optical Character Recognition (e.g. expiration date, lot number) for the Food & Beverage industry. The new Datalogic
More informationEagleEye4 Series Smart Camera
ISO 9001:2008 认证 EagleEye4 Series Smart Camera Application ITS: Red Light, Speed Enforcement, Tolling, Parking Management Security: HD Intelligent Surveillance, Real Time Event Analysis Machine Vision:
More informationWinStream Corp.
1 Introduction Highlights of DSP Cores Full Harvard DSP Architecture Extremely Small Gate Counts Standard ADSP 218X Development Environment Powerful Scalar DSP Performance On-the-fly Reconfigurable Architecture
More informationSmart Ultra-Low Power Visual Sensing
Smart Ultra-Low Power Visual Sensing Manuele Rusci*, Francesco Conti * manuele.rusci@unibo.it f.conti@unibo.it Energy-Efficient Embedded Systems Laboratory Dipartimento di Ingegneria dell Energia Elettrica
More informationFrom Eye to Insight. Leica DMC2900. Digital microscope camera for easy, efficient documentation and presentation in industry and research
From Eye to Insight Leica DMC2900 Digital microscope camera for easy, efficient documentation and presentation in industry and research 3 High Speed Imaging Leica DMC2900 with USB 3.0 interface for highest
More information3D Modeling from Range Images
1 3D Modeling from Range Images A Comprehensive System for 3D Modeling from Range Images Acquired from a 3D ToF Sensor Dipl.-Inf. March 22th, 2007 Sensor and Motivation 2 3D sensor PMD 1k-S time-of-flight
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India
More informationIllumination-Robust Face Recognition based on Gabor Feature Face Intrinsic Identity PCA Model
Illumination-Robust Face Recognition based on Gabor Feature Face Intrinsic Identity PCA Model TAE IN SEOL*, SUN-TAE CHUNG*, SUNHO KI**, SEONGWON CHO**, YUN-KWANG HONG*** *School of Electronic Engineering
More information3D Face Recognition. Anil K. Jain. Dept. of Computer Science & Engineering Michigan State University.
3D Face Recognition Anil K. Jain Dept. of Computer Science & Engineering Michigan State University http://biometrics.cse.msu.edu Face Recognition 1959? 1960 1972 1973 Face detection using OpenCV Viola-Jones
More informationCHAPTER 4 FACE RECOGNITION DESIGN AND ANALYSIS
CHAPTER 4 FACE RECOGNITION DESIGN AND ANALYSIS As explained previously in the scope, this thesis will also create a prototype about face recognition system. The face recognition system itself has several
More informationIntel Research mote. Ralph Kling Intel Corporation Research Santa Clara, CA
Intel Research mote Ralph Kling Intel Corporation Research Santa Clara, CA Overview Intel mote project goals Project status and direction Intel mote hardware Intel mote software Summary and outlook Intel
More informationDistributed Vision Processing in Smart Camera Networks
Distributed Vision Processing in Smart Camera Networks CVPR-07 Hamid Aghajan, Stanford University, USA François Berry, Univ. Blaise Pascal, France Horst Bischof, TU Graz, Austria Richard Kleihorst, NXP
More informationAnnouncements. Recognition. Recognition. Recognition. Recognition. Homework 3 is due May 18, 11:59 PM Reading: Computer Vision I CSE 152 Lecture 14
Announcements Computer Vision I CSE 152 Lecture 14 Homework 3 is due May 18, 11:59 PM Reading: Chapter 15: Learning to Classify Chapter 16: Classifying Images Chapter 17: Detecting Objects in Images Given
More informationTL100C Features: Real-time 1-touch data export 3rd party hosted & non-hosted applications
TL100C Features: Color TFT screen with GUI Interface for ease of use Optical Sensor 1 touch a-second user recognition Stores 3,000 templates and 100,000 transactions Reads Fingerprint and/or PINs integrated
More informationSnakes, level sets and graphcuts. (Deformable models)
INSTITUTE OF INFORMATION AND COMMUNICATION TECHNOLOGIES BULGARIAN ACADEMY OF SCIENCE Snakes, level sets and graphcuts (Deformable models) Centro de Visión por Computador, Departament de Matemàtica Aplicada
More informationSpatial Frequency Domain Methods for Face and Iris Recognition
Spatial Frequency Domain Methods for Face and Iris Recognition Dept. of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh, PA 15213 e-mail: Kumar@ece.cmu.edu Tel.: (412) 268-3026
More informationFeatures. NOTE: Customization Possible (As per the requirement).
Industrial Bio-LYNX Introduction Industrial Bio Lynx is another masterpiece from Star Link in the segment of Industrial Models that serve its purpose of attendance perfectly. It features transaction storage
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationAn Overview of Biometric Image Processing
An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional
More informationSpring semester 2008 June 24 th 2009
Spring semester 2008 June 24 th 2009 Introduction Suggested Algorithm Outline Implementation Summary Live Demo 2 Project Motivation and Domain High quality pedestrian detection and tracking system. Fixed
More informationscs1 highlights Phone: Fax: Web:
VISION SENSORS scs1 The SCS1 Smart Camera offers visual inspection and identification functionalities, with the simplicity, dimensions and prices of an advanced sensor. Applications including multiple
More informationColor and Shading. Color. Shapiro and Stockman, Chapter 6. Color and Machine Vision. Color and Perception
Color and Shading Color Shapiro and Stockman, Chapter 6 Color is an important factor for for human perception for object and material identification, even time of day. Color perception depends upon both
More informationCopy 2013 Eazzy Digital Video Technology Company. All rights reserved.
Model No. : BC-881H Hidden Bulb WiFi/AP HD960P P2P IP Network DVR Camera (Motion Detection, Email Alert) - Simple installation, screw in -like a bulb - No Light at night (invisible to human eyes) - New
More informationIntroduction to Embedded Systems
Introduction to Embedded Systems Outline Embedded systems overview What is embedded system Characteristics Elements of embedded system Trends in embedded system Design cycle 2 Computing Systems Most of
More informationSensor Modalities. Sensor modality: Different modalities:
Sensor Modalities Sensor modality: Sensors which measure same form of energy and process it in similar ways Modality refers to the raw input used by the sensors Different modalities: Sound Pressure Temperature
More informationHead Frontal-View Identification Using Extended LLE
Head Frontal-View Identification Using Extended LLE Chao Wang Center for Spoken Language Understanding, Oregon Health and Science University Abstract Automatic head frontal-view identification is challenging
More informationIntroduction. Bio-LYNX can be customized according to the requirements of the customer.
Bio-LYNX Introduction Bio-LYNX is one the most advanced attendance machine packed with latest technology and updated features. It is a Wi-Fi, GPRS, GPS enabled attendance device with multiple operational
More informationLab. Manual. Robotics (EngE425) Robonova-AI. Prepared By Dr. Emad Saeid Eng. Hidayath Mirza
KINGDOM OF SAUDI ARABIA JAZAN UNIVERSTY College of Engineering Electrical Engineering Department المملكة العربية السعودية وزارة التعليم العالي جامعة جازان كلية الهندسة قسم الهندسة الكهرباي ية Lab. Manual
More informationActel s SX Family of FPGAs: A New Architecture for High-Performance Designs
Actel s SX Family of FPGAs: A New Architecture for High-Performance Designs A Technology Backgrounder Actel Corporation 955 East Arques Avenue Sunnyvale, California 94086 April 20, 1998 Page 2 Actel Corporation
More informationB-191 B-191s B-192 B-192S. B-190 Series - Range. 1000x. 600x. 1000x. 600x
B-190 Series - Range B-191 B-191s 1 1 600x Entry level model with monocular head up to total magnification, mechanical stage and exclusive X-LED 2 for unmatchable performance, powerful and uniform illumination.
More informationDEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta
DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:
More informationCombining Gabor Features: Summing vs.voting in Human Face Recognition *
Combining Gabor Features: Summing vs.voting in Human Face Recognition * Xiaoyan Mu and Mohamad H. Hassoun Department of Electrical and Computer Engineering Wayne State University Detroit, MI 4822 muxiaoyan@wayne.edu
More informationHuman Detection. A state-of-the-art survey. Mohammad Dorgham. University of Hamburg
Human Detection A state-of-the-art survey Mohammad Dorgham University of Hamburg Presentation outline Motivation Applications Overview of approaches (categorized) Approaches details References Motivation
More informationDesign of Intelligent Mobile Human Recognition and Location Identification System Based on Arm7 and Open CV
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 8, November 2014, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Design of Intelligent Mobile Human Recognition
More informationLecture 19: Depth Cameras. Visual Computing Systems CMU , Fall 2013
Lecture 19: Depth Cameras Visual Computing Systems Continuing theme: computational photography Cameras capture light, then extensive processing produces the desired image Today: - Capturing scene depth
More informationSmall is the New Big: Data Analytics on the Edge
Small is the New Big: Data Analytics on the Edge An overview of processors and algorithms for deep learning techniques on the edge Dr. Abhay Samant VP Engineering, Hiller Measurements Adjunct Faculty,
More informationHybrid Biometric Person Authentication Using Face and Voice Features
Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person
More informationToF Camera for high resolution 3D images with affordable pricing
ToF Camera for high resolution 3D images with affordable pricing Basler AG Jana Bartels, Product Manager 3D Agenda Coming next I. Basler AG II. 3D Purpose and Time-of-Flight - Working Principle III. Advantages
More informationLabVIEW ON SMALL TARGET
LabVIEW ON SMALL TARGET Silviu FOLEA *, Marius GHERCIOIU **, Horia HEDESIU *, Crisan GRATIAN **, Ciprian CETERAS **, Ioan MONOSES ** * Technical University of Cluj-Napoca, ** National Instruments USA,
More informationA&E SPECIFICATIONS. TeleEye MX Series Network Camera Model MX925-HD
A&E SPECIFICATIONS TeleEye MX Series Network Camera Model MX925-HD General Description The network camera ( camera ) described shall be a TeleEye MX925-HD or equivalent. It is designed for professional
More informationProjected Texture for Hand Geometry based Authentication
Projected Texture for Hand Geometry based Authentication Avinash Sharma Nishant Shobhit Anoop Namboodiri Center for Visual Information Technology International Institute of Information Technology, Hyderabad,
More informationStructured Light II. Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov
Structured Light II Johannes Köhler Johannes.koehler@dfki.de Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov Introduction Previous lecture: Structured Light I Active Scanning Camera/emitter
More informationFEITIAN Technologies, Co., Ltd.
POWER CARD www.ftsafe.com FEITIAN Technologies, Co., Ltd. Power Card Power Cards are security solutions in ISO standard card form factor and are able to combine various security functions into one card
More informationAnnouncements. Recognition (Part 3) Model-Based Vision. A Rough Recognition Spectrum. Pose consistency. Recognition by Hypothesize and Test
Announcements (Part 3) CSE 152 Lecture 16 Homework 3 is due today, 11:59 PM Homework 4 will be assigned today Due Sat, Jun 4, 11:59 PM Reading: Chapter 15: Learning to Classify Chapter 16: Classifying
More informationRestricting Unauthorized Access Using Biometrics In Mobile
Restricting Unauthorized Access Using Biometrics In Mobile S.Vignesh*, M.Narayanan# Under Graduate student*, Assistant Professor# Department Of Computer Science and Engineering, Saveetha School Of Engineering
More informationSu et al. Shape Descriptors - III
Su et al. Shape Descriptors - III Siddhartha Chaudhuri http://www.cse.iitb.ac.in/~cs749 Funkhouser; Feng, Liu, Gong Recap Global A shape descriptor is a set of numbers that describes a shape in a way that
More informationAdvanced Vision Guided Robotics. David Bruce Engineering Manager FANUC America Corporation
Advanced Vision Guided Robotics David Bruce Engineering Manager FANUC America Corporation Traditional Vision vs. Vision based Robot Guidance Traditional Machine Vision Determine if a product passes or
More informationCPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova
CPSC 695 Geometric Algorithms in Biometrics Dr. Marina L. Gavrilova Biometric goals Verify users Identify users Synthesis - recently Biometric identifiers Courtesy of Bromba GmbH Classification of identifiers
More informationGuppy F-033. Description. Specifications. IEEE 1394a camera Lightweight Robust design Machine vision camera
Guppy F-033 IEEE 1394a camera Lightweight Robust design Machine vision camera Description Ultra-compact, inexpensive IEEE 1394a VGA machine vision camera The Guppy F-033B/C is an ultra-compact, inexpensive
More informationFace Recognition At-a-Distance Based on Sparse-Stereo Reconstruction
Face Recognition At-a-Distance Based on Sparse-Stereo Reconstruction Ham Rara, Shireen Elhabian, Asem Ali University of Louisville Louisville, KY {hmrara01,syelha01,amali003}@louisville.edu Mike Miller,
More informationA&E SPECIFICATIONS. TeleEye MX Series Network Camera Model MX151E-HD
A&E SPECIFICATIONS TeleEye MX Series Network Camera Model MX151E-HD General Description The network camera ( camera ) described shall be a TeleEye MX151E-HD or equivalent. It is designed for professional
More informationStatistical alignment of remote sensing images to improve classifiers portability and change detection
Statistical alignment of remote sensing images to improve classifiers portability and change detection giona.matasci@unil.ch Institute of Geomatics and Analysis of Risk University of Lausanne, Switzerland
More informationAuthentication. Chapter 2
Authentication Chapter 2 Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand how CHAP works Understand what mutual authentication
More informationOverview of Computer Vision. CS308 Data Structures
Overview of Computer Vision CS308 Data Structures What is Computer Vision? Deals with the development of the theoretical and algorithmic basis by which useful information about the 3D world can be automatically
More informationTraffic Sign Recognition for Autonomous Driving Robot
Volume-7, Issue-4, July-August 2017 International Journal of Engineering and Management Research Page Number: 385-392 Traffic Sign Recognition for Autonomous Driving Robot K.Pavani 1, A. Prasanna Lakshmi
More informationHigh speed CMOS image sensors Wim Wuyts Sr. Staff Applications Engineer Cypress Semiconductor Corporation Belgium Vision 2006
High speed CMOS image sensors Wim Wuyts Sr. Staff Applications Engineer Cypress Semiconductor Corporation Belgium Vision 2006 P E R F O R M Outline Introduction Architecture Analog high speed CIS Digital
More informationSeminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht
Personal Area Networks Seminar: Mobile Systems November 19th 2009 Krzysztof Dabkowski Supervisor: Fabio Hecht Agenda Motivation Application areas Historical and technical overview Security issues Discussion
More informationDatasheet. High-Definition IP Surveillance Cameras. Models: UVC-G3, UVC-G3-DOME. Scalable Day and Night Surveillance
High-Definition IP Surveillance Cameras Models: UVC-G3, UVC-G3-DOME Scalable Day and Night Surveillance Advanced Hardware and Optics for 1080p Full HD Video Powerful Features and Analytic Capabilities
More informationStructured light 3D reconstruction
Structured light 3D reconstruction Reconstruction pipeline and industrial applications rodola@dsi.unive.it 11/05/2010 3D Reconstruction 3D reconstruction is the process of capturing the shape and appearance
More informationRecognition (Part 4) Introduction to Computer Vision CSE 152 Lecture 17
Recognition (Part 4) CSE 152 Lecture 17 Announcements Homework 5 is due June 9, 11:59 PM Reading: Chapter 15: Learning to Classify Chapter 16: Classifying Images Chapter 17: Detecting Objects in Images
More informationLesson 2: Input, Output, and Processing
Lesson 2: Input, Output, and Processing TRUE/FALSE 1. After data is processed, it is presented to the user through an input device. ANS: F REF: Mod1-28 2. A laser virtual keyboard is packaged in a case
More informationEthernet Switch. WAN Gateway. Figure 1: Switched LAN Example
1 Introduction An Ethernet switch is used to interconnect a number of Ethernet LANs (Local Area Networks), forming a large Ethernet network. Different ports of the switch are connected to different LAN
More informationAn Associate-Predict Model for Face Recognition FIPA Seminar WS 2011/2012
An Associate-Predict Model for Face Recognition FIPA Seminar WS 2011/2012, 19.01.2012 INSTITUTE FOR ANTHROPOMATICS, FACIAL IMAGE PROCESSING AND ANALYSIS YIG University of the State of Baden-Wuerttemberg
More informationIntel CoFluent Studio in Digital Imaging
Intel CoFluent Studio in Digital Imaging Sensata Technologies Use Case Sensata Technologies www.sensatatechnologies.com Formerly Texas Instruments Sensors & Controls, Sensata Technologies is the world
More informationFPGA implementations of Histograms of Oriented Gradients in FPGA
FPGA implementations of Histograms of Oriented Gradients in FPGA C. Bourrasset 1, L. Maggiani 2,3, C. Salvadori 2,3, J. Sérot 1, P. Pagano 2,3 and F. Berry 1 1 Institut Pascal- D.R.E.A.M - Aubière, France
More informationDSP using Labview FPGA. T.J.Moir AUT University School of Engineering Auckland New-Zealand
DSP using Labview FPGA T.J.Moir AUT University School of Engineering Auckland New-Zealand Limitations of a basic processor Despite all of the advancements we ve made in the world of processors, they still
More informationWeb-Based Home Appliances Controlling System
Web-Based Home Appliances Controlling System B.E. EXTC, TSEC Aman Chadha Mahesh Dubey Siddhesh Shirodker 1 Agenda House monitoring using a live feed Advanced security system based on userauthentication
More information