Face authentication for low-power mobile devices

Size: px
Start display at page:

Download "Face authentication for low-power mobile devices"

Transcription

1 Face authentication for low-power mobile devices Jean-Luc Nagel, CSEM SA, Microelectronics Division, Neuchâtel, Switzerland Patrick Stadelmann, University of Neuchâtel, IMT, Neuchâtel, Switzerland Conference on Biometrical Feature Identification and Analysis, Goettingen, Germany, 6-8 September 2007

2 Agenda Biometrics on mobile devices Motivation / selection of face authentication Challenges of mobile solutions Standard vs. custom hardware solutions for face authentication (camera + processing hardware) Proposed solutions towards mobile face authentication Elastic graph matching (EGM) algorithm A hardware platform for EGM Perspectives and conclusions Copyright 2007 CSEM Face authentication on mobile devices jln Page 1

3 Motivation (1) Beyond the Cell Phone: Mobile Communicators Convergence of PDAs and mobile phones (Smart Phones, Ultra-personal computers) Extended connectivity: IrDA, Bluetooth, GPRS, wireless LAN (802.11b), USB, Ethernet Protection of data stored on communicators Confidential business files (technical, managerial) Sensitive personal files (e.g. contacts + medical records) Banking transaction records Access to remote data / services Tele-maintenance, tele-surveillance Access to sensitive remove data Pay-per-use content M(obile)-business (e.g. weather forecasting, sports, timetables, etc.) Copyright 2007 CSEM Face authentication on mobile devices jln Page 2

4 Motivation (2) Security levels in 3G devices Communication security and data integrity: data encryption User account protection: code exchange Terminal access protection: PIN code Terminal access protection by PIN code is insufficient, because of: Limited security level Easiness to guess or steal PIN codes Limited user-friendliness Time needed to introduce PIN (keystrokes) Difficulty to remember numerous different codes users often do not even utilize PIN on mobile phones Security + user friendliness can be improved by complementing transferable knowledge (PIN codes) with info on user-being (physiological / behavioral traits) Copyright 2007 CSEM Face authentication on mobile devices jln Page 3

5 Motivation (3) Modalities most suitable for mobile terminals: Voice: Face: Fingerprint: (low-cost) microphone already exists on devices, but robustness to noisy environments is difficult Digital camera already exists on almost all mobile devices requires additional dedicated sensor. Face authentication seems a good choice for medium security applications (e.g. consumer devices) Improved robustness could be achieved using multi-modality (e.g. face + fingerprint) Copyright 2007 CSEM Face authentication on mobile devices jln Page 4

6 Motivation (4) Why entirely on the mobile device? (vs. local acquisition and verification on a remote server) Device turned on Authentication Access Advantages template store locally (no central big-brother database) accessible even if no network connection is available Drawbacks higher computational power is necessary attempts at hacking the biometric templates may be undetected Copyright 2007 CSEM Face authentication on mobile devices jln Page 5

7 Challenges Background variation : mostly a face detection problem Scaling view-angle, distance from camera (user holding the camera) Illumination variation (user authentifying himself in different lighting conditions): variations of the perceived intensity light position w.r.t. the geometry of the object; multiple light sources; non-linear effects (e.g. cast and attached shadows, highlights, saturation) variations of the illuminant spectrum Power consumption (energy consumption) Copyright 2007 CSEM Face authentication on mobile devices jln Page 6

8 Standard vs. custom hardware solution Custom Standard Image sensor Robustness to illumination variation; high dynamic range Examples: IR sensor, vision sensors Low-cost Possible reuse for other tasks Processing hardware Higher performance; lower-power consumption; low-cost (if volume is important) Examples: dedicated ASICs Customizable DSPs Examples: icyflex & macgic cores Better development tools Example: CMOS image sensor Examples: high-end DSPs Copyright 2007 CSEM Face authentication on mobile devices jln Page 7

9 Examples of non conventional image/vision sensors CSEM ViSe vision sensor auto-exposure principle : integration time measurement at the pixel level on-chip analogue computation of magnitude and direction of image contrasts. CSEM SwissRanger 3D image sensor time of flight measurement infra-red illumination Copyright 2007 CSEM Face authentication on mobile devices jln Page 8

10 Handling illumination variation on standard sensors Classical approaches: Predict the variability of the features build a statistical model of illumination variation (i.e. stats on the set of images of an object under all pose and illumination) reconstructionist (i.e. similar to image rendering in Computer Graphics) Derive new less sensitive features (i.e. near invariant) Performance of statistical methods is dependent on the quality of training set Reconstructionist approaches perform better than illumination insensitive features, but their computational complexity is not affordable on mobile devices (e.g. Blanz&Vetter several minutes on a 2 GHz PC) derivation of less sensitive features is sufficient for mobile low-power applications and is achievable on these devices. Copyright 2007 CSEM Face authentication on mobile devices jln Page 9

11 Illumination with standard image sensors Normalized mathematical morphology as a simple solution, which is not dependent on face detection results! SE (level 1, 2, 3,, 9) 9 eroded images 9 dilated images E 1 D 1 E 2 D 2 E 3 D 3 E 9 D 9 ( x, y) J ( x, y) J 9 J 8 J J 1 n 19 7 n J 10 J 11 J 12 J 19 J1( x, y) J19( x, y) J ' J ( x, y) Copyright 2007 CSEM Face authentication on mobile devices jln Page 10

12 Normalized mathematical morphology Advantages of normalized MM: Cast shadows produce local effects Attached shadows have a larger extension; feature distance is smaller in normalized morphology than in baseline morphology D 8 Standard mathematical morphology (SE of 17x 17 pixels) E 8 J 2 J 18 Normalized mathematical morphology Copyright 2007 CSEM Face authentication on mobile devices jln Page 11

13 Handling deformations Two approaches 1. Add a pre-processing stage to recover a shape free image (e.g. face warping) 2. Embed the shape matching in the algorithm Pre-processing stage depends on precise face localization (or even facial features localization) Precise detection is affected by deformations! Use the second solution Elastic graph matching is a good candidate Ok if features are near invariant to rotation and translation Copyright 2007 CSEM Face authentication on mobile devices jln Page 12

14 Elastic graph matching (EGM) Originally published by Lades et al. in 1993 In EGM, a face is holistically represented by labelled graphs local information: features associated to a node global information: topography of the graph; penalization of elastic deformations A correspondence is searched between features extracted from a reference graph and from a test graph (Euclidean feature distance minimization), which allows (but penalizes) elastic deformations M F M MxMxF? Copyright 2007 CSEM Face authentication on mobile devices jln Page 13

15 EGM improvements (1) New metrics (invariant to rotation and scaling) as compared to Lades et al. and Kotropoulos et al. Graph size variations a (a, a ) x y Copyright 2007 CSEM Face authentication on mobile devices jln Page 14

16 EGM improvements (2) Occlusion / cast shadows Out of 64 graph node distances, keep only the 32 smallest node feature distances and reject the others from the total graph distance Copyright 2007 CSEM Face authentication on mobile devices jln Page 15

17 EGM results : AVBPA 2003 Lausanne configuration II Automatic registration Copyright 2007 CSEM Face authentication on mobile devices jln Page 16

18 MEGM results : darkened XM2VTS ICBA 2006 Copyright 2007 CSEM Face authentication on mobile devices jln Page 17

19 MEGM results : Yale B database Classification Manual registration subset 1 subset 2 subset 3 subset 4 Method Id. error rate (%) vs. illuminant change Subset 2 Subset 3 Subset 4 Cones-attached (statistical) [Georghiades et al.] Cones-cast (statistical + reconstruc.) [Georghiades et al.] MEGM Copyright 2007 CSEM Face authentication on mobile devices jln Page 18

20 A hardware platform for EGM Two coprocessors (for mathematical morphology + graph matching) Programming tools (assembler, cycle-accurate simulator) Parallel processing improved power consumption compared to standard DSP Image sensor can be embedded in the same system-on-chip (SoC) when using CMOS technology Master processor can be used for other tasks Copyright 2007 CSEM Face authentication on mobile devices jln Page 19

21 FPGA demonstrator FPGA + SRAM VGACAM 146x146 pixels (out of 256x256) Ethernet Level shifter FPGA: Altera APEX-20K600 Logical elements (49 %) Ethernut Ethernet Positive slack (clock period : 100 ns) Face authentication 33.1 ns (ca 33%) 1.6 sec (~0.8 for computation) Copyright 2007 CSEM Face authentication on mobile devices jln Page 20

22 SoC power and area estimation results UMC 0.18 mm technology Power 10 MHz, 1.8 V. A power saving of ca. 3 times can be achieved at 1.0 V (same frequency) total power lower than 40 mw Other state-of-art mobile algorithms Pun et al.(spie 2005) PCA based. 5 sec for a complete authentication Running on an Intel XScale 400 MHz processor Power consumption: not given ( ~ 1 W) Power [mw] Power w/o. Power w. RAM RAM EGM copro 3 9 MM copro 1 3 Embedded SRAM (512 Ko) Micro-controller Image sensor IO pads 5 5 Total Area [mm2] w/o. RAM w. RAM EGM copro MM copro Copyright 2007 CSEM Face authentication on mobile devices jln Page 21

23 Conclusion Clear requirements for a low-cost easy-to-use solution for biometrics verification on mobile devices; Face verification can fit this requirement, but environment variations are challenging in mobile environments, especially lighting variation (indoor/outdoor use, multiple light sources, etc.); Custom cameras can improve the robustness of the solution but are too expensive; standard cameras are affordable in mobile solutions; Dedicated hardware coprocessor can fit the stringent power consumption issues; cost can be maintained low if embedded in a SoC with large volume productions (typical of mobile applications); A platform prototype based on elastic graph matching was demonstrated to correspond to power and speed requirements. Copyright 2007 CSEM Face authentication on mobile devices jln Page 22

24 Thank you for your attention.

Digital Vision Face recognition

Digital Vision Face recognition Ulrik Söderström ulrik.soderstrom@tfe.umu.se 27 May 2007 Digital Vision Face recognition 1 Faces Faces are integral to human interaction Manual facial recognition is already used in everyday authentication

More information

MDR-1 Mobile Document Reader

MDR-1 Mobile Document Reader MDR-1 Mobile Document Reader SPC_MDR-1 1/7 Mobile Document Reader MDR-1 Security Printing Consulting AG The new MDR-1 document reader fulfill the needs for fast and reliable reading, verification and authentication

More information

Face Recognition Markus Storer, 2007

Face Recognition Markus Storer, 2007 Face Recognition Markus Storer, 2007 Agenda Face recognition by humans 3D morphable models pose and illumination model creation model fitting results Face recognition vendor test 2006 Face Recognition

More information

Low-Power SRAM and ROM Memories

Low-Power SRAM and ROM Memories Low-Power SRAM and ROM Memories Jean-Marc Masgonty 1, Stefan Cserveny 1, Christian Piguet 1,2 1 CSEM, Neuchâtel, Switzerland 2 LAP-EPFL Lausanne, Switzerland Abstract. Memories are a main concern in low-power

More information

Image Processing and Image Representations for Face Recognition

Image Processing and Image Representations for Face Recognition Image Processing and Image Representations for Face Recognition 1 Introduction Face recognition is an active area of research in image processing and pattern recognition. Since the general topic of face

More information

S100 Series. Compact Smart Camera. High Performance: Dual Core Cortex-A9 processor and Xilinx FPGA. acquisition and preprocessing

S100 Series. Compact Smart Camera. High Performance: Dual Core Cortex-A9 processor and Xilinx FPGA. acquisition and preprocessing S100 Series Compact Smart Camera High Performance: Dual Core Cortex-A9 processor and Xilinx FPGA IP-67 Rated enclosure Programmable FPGA for image acquisition and preprocessing Multiple resolution: VGA,

More information

Advanced Imaging Applications on Smart-phones Convergence of General-purpose computing, Graphics acceleration, and Sensors

Advanced Imaging Applications on Smart-phones Convergence of General-purpose computing, Graphics acceleration, and Sensors Advanced Imaging Applications on Smart-phones Convergence of General-purpose computing, Graphics acceleration, and Sensors Sriram Sethuraman Technologist & DMTS, Ittiam 1 Overview Imaging on Smart-phones

More information

New Sony DepthSense TM ToF Technology

New Sony DepthSense TM ToF Technology ADVANCED MATERIAL HANDLING WITH New Sony DepthSense TM ToF Technology Jenson Chang Product Marketing November 7, 2018 1 3D SENSING APPLICATIONS Pick and Place Drones Collision Detection People Counting

More information

Haresh D. Chande #, Zankhana H. Shah *

Haresh D. Chande #, Zankhana H. Shah * Illumination Invariant Face Recognition System Haresh D. Chande #, Zankhana H. Shah * # Computer Engineering Department, Birla Vishvakarma Mahavidyalaya, Gujarat Technological University, India * Information

More information

Performance Analysis of Face Recognition Algorithms on TMS320C64x

Performance Analysis of Face Recognition Algorithms on TMS320C64x Application Report SPRA874 December 2002 Performance Analysis of Face Recognition Algorithms on TMS320C64x Aziz Umit Batur and Bruce E. Flinchbaugh DSP Solutions R&D Center ABSTRACT Face recognition is

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

Vision-Based Technologies for Security in Logistics. Alberto Isasi

Vision-Based Technologies for Security in Logistics. Alberto Isasi Vision-Based Technologies for Security in Logistics Alberto Isasi aisasi@robotiker.es INFOTECH is the Unit of ROBOTIKER-TECNALIA specialised in Research, Development and Application of Information and

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

3D Time-of-Flight Image Sensor Solutions for Mobile Devices

3D Time-of-Flight Image Sensor Solutions for Mobile Devices 3D Time-of-Flight Image Sensor Solutions for Mobile Devices SEMICON Europa 2015 Imaging Conference Bernd Buxbaum 2015 pmdtechnologies gmbh c o n f i d e n t i a l Content Introduction Motivation for 3D

More information

The Implementation of Face Security for Authentication Implemented on Mobile Phone. Emir Kremic Abdulhamit Subasi

The Implementation of Face Security for Authentication Implemented on Mobile Phone. Emir Kremic Abdulhamit Subasi The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremic Abdulhamit Subasi The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir

More information

New Sony DepthSense TM ToF Technology

New Sony DepthSense TM ToF Technology ADVANCED MATERIAL HANDLING WITH New Sony DepthSense TM ToF Technology Jenson Chang Product Marketing November 7, 2018 1 3D SENSING APPLICATIONS Pick and Place Drones Collision Detection People Counting

More information

Studying Leakages on an Embedded Biometric System Using Side Channel Analysis

Studying Leakages on an Embedded Biometric System Using Side Channel Analysis Studying Leakages on an Embedded Biometric System Using Side Channel Analysis M. Berthier, Y. Bocktaels, J. Bringer, H. Chabanne, T. Chouta, J-L. Danger, M. Favre, T. Graba Institut Mines-Télécom Outline

More information

FPGA Implementation of High Performance Face Detection Using MCT and Adaboost Algorithm

FPGA Implementation of High Performance Face Detection Using MCT and Adaboost Algorithm FPGA Implementation of High Performance Face Detection Using MCT and Adaboost Algorithm Ramya N P.G.Scholar, ECE, SKP Engineering College, Tiruvannamalai India E-mail : ramyamevlsi@gmail.com Srimathi Mathiazhagan

More information

Memory Systems IRAM. Principle of IRAM

Memory Systems IRAM. Principle of IRAM Memory Systems 165 other devices of the module will be in the Standby state (which is the primary state of all RDRAM devices) or another state with low-power consumption. The RDRAM devices provide several

More information

Platform-based Design

Platform-based Design Platform-based Design The New System Design Paradigm IEEE1394 Software Content CPU Core DSP Core Glue Logic Memory Hardware BlueTooth I/O Block-Based Design Memory Orthogonalization of concerns: the separation

More information

Carmen Alonso Montes 23rd-27th November 2015

Carmen Alonso Montes 23rd-27th November 2015 Practical Computer Vision: Theory & Applications 23rd-27th November 2015 Wrap up Today, we are here 2 Learned concepts Hough Transform Distance mapping Watershed Active contours 3 Contents Wrap up Object

More information

11th symposium on advanced space technologies in robotics and automation

11th symposium on advanced space technologies in robotics and automation 11th symposium on advanced space technologies in robotics and automation CONTRIBUTION OF A POWERFUL IMAGE PROCESSING UNIT TO THE AUTONOMY OF ROBOTIC INSTRUMENTS Thomas Würgler, Neuchâtel, Switzerland Thursday,

More information

Bio-LINK

Bio-LINK Bio-LINK Introduction Bio-Link is a exquisitely made versatile masterpiece and state-of-the-art from Star Link. The Bio-Link is very effective in managing attendance in small setup like IT firm, industries,

More information

Face Tracking. Synonyms. Definition. Main Body Text. Amit K. Roy-Chowdhury and Yilei Xu. Facial Motion Estimation

Face Tracking. Synonyms. Definition. Main Body Text. Amit K. Roy-Chowdhury and Yilei Xu. Facial Motion Estimation Face Tracking Amit K. Roy-Chowdhury and Yilei Xu Department of Electrical Engineering, University of California, Riverside, CA 92521, USA {amitrc,yxu}@ee.ucr.edu Synonyms Facial Motion Estimation Definition

More information

TIED FACTOR ANALYSIS FOR FACE RECOGNITION ACROSS LARGE POSE DIFFERENCES

TIED FACTOR ANALYSIS FOR FACE RECOGNITION ACROSS LARGE POSE DIFFERENCES TIED FACTOR ANALYSIS FOR FACE RECOGNITION ACROSS LARGE POSE DIFFERENCES SIMON J.D. PRINCE, JAMES H. ELDER, JONATHAN WARRELL, FATIMA M. FELISBERTI IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE,

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

Announcements. Recognition I. Gradient Space (p,q) What is the reflectance map?

Announcements. Recognition I. Gradient Space (p,q) What is the reflectance map? Announcements I HW 3 due 12 noon, tomorrow. HW 4 to be posted soon recognition Lecture plan recognition for next two lectures, then video and motion. Introduction to Computer Vision CSE 152 Lecture 17

More information

Augmenting Reality, Naturally:

Augmenting Reality, Naturally: Augmenting Reality, Naturally: Scene Modelling, Recognition and Tracking with Invariant Image Features by Iryna Gordon in collaboration with David G. Lowe Laboratory for Computational Intelligence Department

More information

INTUS 1600PS Palm Vein Authentication

INTUS 1600PS Palm Vein Authentication INTUS 1600PS Palm Vein Authentication PalmSecure TM is a mark from Fujitsu Page 1 Biometry what s the use of it? І Need for trustable and automated person identification. І Addition / replacement of traditional

More information

Information Security Identification and authentication. Advanced User Authentication II

Information Security Identification and authentication. Advanced User Authentication II Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background

More information

UK Industrial Vision SWIR Challenges

UK Industrial Vision SWIR Challenges UK Industrial Vision SWIR Challenges Ian Alderton ALRAD IMAGING ALRAD INSTRUMENTS LTD 1 ALRAD - Company Profile. ALRAD are a Distribution company for Imaging, Electro Optic, Analytical Components and Instruments

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

FILTERBANK-BASED FINGERPRINT MATCHING. Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239)

FILTERBANK-BASED FINGERPRINT MATCHING. Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239) FILTERBANK-BASED FINGERPRINT MATCHING Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239) Papers Selected FINGERPRINT MATCHING USING MINUTIAE AND TEXTURE FEATURES By Anil

More information

VISION IMPACT+ OCR HIGHLIGHTS APPLICATIONS. Lot and batch number reading. Dedicated OCR user interface. Expiration date verification

VISION IMPACT+ OCR HIGHLIGHTS APPLICATIONS. Lot and batch number reading. Dedicated OCR user interface. Expiration date verification IMPACT+ OCR IMPACT+ OCR is the new Datalogic innovative solution for robust and effective Optical Character Recognition (e.g. expiration date, lot number) for the Food & Beverage industry. The new Datalogic

More information

EagleEye4 Series Smart Camera

EagleEye4 Series Smart Camera ISO 9001:2008 认证 EagleEye4 Series Smart Camera Application ITS: Red Light, Speed Enforcement, Tolling, Parking Management Security: HD Intelligent Surveillance, Real Time Event Analysis Machine Vision:

More information

WinStream Corp.

WinStream Corp. 1 Introduction Highlights of DSP Cores Full Harvard DSP Architecture Extremely Small Gate Counts Standard ADSP 218X Development Environment Powerful Scalar DSP Performance On-the-fly Reconfigurable Architecture

More information

Smart Ultra-Low Power Visual Sensing

Smart Ultra-Low Power Visual Sensing Smart Ultra-Low Power Visual Sensing Manuele Rusci*, Francesco Conti * manuele.rusci@unibo.it f.conti@unibo.it Energy-Efficient Embedded Systems Laboratory Dipartimento di Ingegneria dell Energia Elettrica

More information

From Eye to Insight. Leica DMC2900. Digital microscope camera for easy, efficient documentation and presentation in industry and research

From Eye to Insight. Leica DMC2900. Digital microscope camera for easy, efficient documentation and presentation in industry and research From Eye to Insight Leica DMC2900 Digital microscope camera for easy, efficient documentation and presentation in industry and research 3 High Speed Imaging Leica DMC2900 with USB 3.0 interface for highest

More information

3D Modeling from Range Images

3D Modeling from Range Images 1 3D Modeling from Range Images A Comprehensive System for 3D Modeling from Range Images Acquired from a 3D ToF Sensor Dipl.-Inf. March 22th, 2007 Sensor and Motivation 2 3D sensor PMD 1k-S time-of-flight

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India

More information

Illumination-Robust Face Recognition based on Gabor Feature Face Intrinsic Identity PCA Model

Illumination-Robust Face Recognition based on Gabor Feature Face Intrinsic Identity PCA Model Illumination-Robust Face Recognition based on Gabor Feature Face Intrinsic Identity PCA Model TAE IN SEOL*, SUN-TAE CHUNG*, SUNHO KI**, SEONGWON CHO**, YUN-KWANG HONG*** *School of Electronic Engineering

More information

3D Face Recognition. Anil K. Jain. Dept. of Computer Science & Engineering Michigan State University.

3D Face Recognition. Anil K. Jain. Dept. of Computer Science & Engineering Michigan State University. 3D Face Recognition Anil K. Jain Dept. of Computer Science & Engineering Michigan State University http://biometrics.cse.msu.edu Face Recognition 1959? 1960 1972 1973 Face detection using OpenCV Viola-Jones

More information

CHAPTER 4 FACE RECOGNITION DESIGN AND ANALYSIS

CHAPTER 4 FACE RECOGNITION DESIGN AND ANALYSIS CHAPTER 4 FACE RECOGNITION DESIGN AND ANALYSIS As explained previously in the scope, this thesis will also create a prototype about face recognition system. The face recognition system itself has several

More information

Intel Research mote. Ralph Kling Intel Corporation Research Santa Clara, CA

Intel Research mote. Ralph Kling Intel Corporation Research Santa Clara, CA Intel Research mote Ralph Kling Intel Corporation Research Santa Clara, CA Overview Intel mote project goals Project status and direction Intel mote hardware Intel mote software Summary and outlook Intel

More information

Distributed Vision Processing in Smart Camera Networks

Distributed Vision Processing in Smart Camera Networks Distributed Vision Processing in Smart Camera Networks CVPR-07 Hamid Aghajan, Stanford University, USA François Berry, Univ. Blaise Pascal, France Horst Bischof, TU Graz, Austria Richard Kleihorst, NXP

More information

Announcements. Recognition. Recognition. Recognition. Recognition. Homework 3 is due May 18, 11:59 PM Reading: Computer Vision I CSE 152 Lecture 14

Announcements. Recognition. Recognition. Recognition. Recognition. Homework 3 is due May 18, 11:59 PM Reading: Computer Vision I CSE 152 Lecture 14 Announcements Computer Vision I CSE 152 Lecture 14 Homework 3 is due May 18, 11:59 PM Reading: Chapter 15: Learning to Classify Chapter 16: Classifying Images Chapter 17: Detecting Objects in Images Given

More information

TL100C Features: Real-time 1-touch data export 3rd party hosted & non-hosted applications

TL100C Features: Real-time 1-touch data export 3rd party hosted & non-hosted applications TL100C Features: Color TFT screen with GUI Interface for ease of use Optical Sensor 1 touch a-second user recognition Stores 3,000 templates and 100,000 transactions Reads Fingerprint and/or PINs integrated

More information

Snakes, level sets and graphcuts. (Deformable models)

Snakes, level sets and graphcuts. (Deformable models) INSTITUTE OF INFORMATION AND COMMUNICATION TECHNOLOGIES BULGARIAN ACADEMY OF SCIENCE Snakes, level sets and graphcuts (Deformable models) Centro de Visión por Computador, Departament de Matemàtica Aplicada

More information

Spatial Frequency Domain Methods for Face and Iris Recognition

Spatial Frequency Domain Methods for Face and Iris Recognition Spatial Frequency Domain Methods for Face and Iris Recognition Dept. of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh, PA 15213 e-mail: Kumar@ece.cmu.edu Tel.: (412) 268-3026

More information

Features. NOTE: Customization Possible (As per the requirement).

Features. NOTE: Customization Possible (As per the requirement). Industrial Bio-LYNX Introduction Industrial Bio Lynx is another masterpiece from Star Link in the segment of Industrial Models that serve its purpose of attendance perfectly. It features transaction storage

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

An Overview of Biometric Image Processing

An Overview of Biometric Image Processing An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional

More information

Spring semester 2008 June 24 th 2009

Spring semester 2008 June 24 th 2009 Spring semester 2008 June 24 th 2009 Introduction Suggested Algorithm Outline Implementation Summary Live Demo 2 Project Motivation and Domain High quality pedestrian detection and tracking system. Fixed

More information

scs1 highlights Phone: Fax: Web:

scs1 highlights Phone: Fax: Web: VISION SENSORS scs1 The SCS1 Smart Camera offers visual inspection and identification functionalities, with the simplicity, dimensions and prices of an advanced sensor. Applications including multiple

More information

Color and Shading. Color. Shapiro and Stockman, Chapter 6. Color and Machine Vision. Color and Perception

Color and Shading. Color. Shapiro and Stockman, Chapter 6. Color and Machine Vision. Color and Perception Color and Shading Color Shapiro and Stockman, Chapter 6 Color is an important factor for for human perception for object and material identification, even time of day. Color perception depends upon both

More information

Copy 2013 Eazzy Digital Video Technology Company. All rights reserved.

Copy 2013 Eazzy Digital Video Technology Company. All rights reserved. Model No. : BC-881H Hidden Bulb WiFi/AP HD960P P2P IP Network DVR Camera (Motion Detection, Email Alert) - Simple installation, screw in -like a bulb - No Light at night (invisible to human eyes) - New

More information

Introduction to Embedded Systems

Introduction to Embedded Systems Introduction to Embedded Systems Outline Embedded systems overview What is embedded system Characteristics Elements of embedded system Trends in embedded system Design cycle 2 Computing Systems Most of

More information

Sensor Modalities. Sensor modality: Different modalities:

Sensor Modalities. Sensor modality: Different modalities: Sensor Modalities Sensor modality: Sensors which measure same form of energy and process it in similar ways Modality refers to the raw input used by the sensors Different modalities: Sound Pressure Temperature

More information

Head Frontal-View Identification Using Extended LLE

Head Frontal-View Identification Using Extended LLE Head Frontal-View Identification Using Extended LLE Chao Wang Center for Spoken Language Understanding, Oregon Health and Science University Abstract Automatic head frontal-view identification is challenging

More information

Introduction. Bio-LYNX can be customized according to the requirements of the customer.

Introduction. Bio-LYNX can be customized according to the requirements of the customer. Bio-LYNX Introduction Bio-LYNX is one the most advanced attendance machine packed with latest technology and updated features. It is a Wi-Fi, GPRS, GPS enabled attendance device with multiple operational

More information

Lab. Manual. Robotics (EngE425) Robonova-AI. Prepared By Dr. Emad Saeid Eng. Hidayath Mirza

Lab. Manual. Robotics (EngE425) Robonova-AI. Prepared By Dr. Emad Saeid Eng. Hidayath Mirza KINGDOM OF SAUDI ARABIA JAZAN UNIVERSTY College of Engineering Electrical Engineering Department المملكة العربية السعودية وزارة التعليم العالي جامعة جازان كلية الهندسة قسم الهندسة الكهرباي ية Lab. Manual

More information

Actel s SX Family of FPGAs: A New Architecture for High-Performance Designs

Actel s SX Family of FPGAs: A New Architecture for High-Performance Designs Actel s SX Family of FPGAs: A New Architecture for High-Performance Designs A Technology Backgrounder Actel Corporation 955 East Arques Avenue Sunnyvale, California 94086 April 20, 1998 Page 2 Actel Corporation

More information

B-191 B-191s B-192 B-192S. B-190 Series - Range. 1000x. 600x. 1000x. 600x

B-191 B-191s B-192 B-192S. B-190 Series - Range. 1000x. 600x. 1000x. 600x B-190 Series - Range B-191 B-191s 1 1 600x Entry level model with monocular head up to total magnification, mechanical stage and exclusive X-LED 2 for unmatchable performance, powerful and uniform illumination.

More information

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:

More information

Combining Gabor Features: Summing vs.voting in Human Face Recognition *

Combining Gabor Features: Summing vs.voting in Human Face Recognition * Combining Gabor Features: Summing vs.voting in Human Face Recognition * Xiaoyan Mu and Mohamad H. Hassoun Department of Electrical and Computer Engineering Wayne State University Detroit, MI 4822 muxiaoyan@wayne.edu

More information

Human Detection. A state-of-the-art survey. Mohammad Dorgham. University of Hamburg

Human Detection. A state-of-the-art survey. Mohammad Dorgham. University of Hamburg Human Detection A state-of-the-art survey Mohammad Dorgham University of Hamburg Presentation outline Motivation Applications Overview of approaches (categorized) Approaches details References Motivation

More information

Design of Intelligent Mobile Human Recognition and Location Identification System Based on Arm7 and Open CV

Design of Intelligent Mobile Human Recognition and Location Identification System Based on Arm7 and Open CV International Journal of Emerging Engineering Research and Technology Volume 2, Issue 8, November 2014, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Design of Intelligent Mobile Human Recognition

More information

Lecture 19: Depth Cameras. Visual Computing Systems CMU , Fall 2013

Lecture 19: Depth Cameras. Visual Computing Systems CMU , Fall 2013 Lecture 19: Depth Cameras Visual Computing Systems Continuing theme: computational photography Cameras capture light, then extensive processing produces the desired image Today: - Capturing scene depth

More information

Small is the New Big: Data Analytics on the Edge

Small is the New Big: Data Analytics on the Edge Small is the New Big: Data Analytics on the Edge An overview of processors and algorithms for deep learning techniques on the edge Dr. Abhay Samant VP Engineering, Hiller Measurements Adjunct Faculty,

More information

Hybrid Biometric Person Authentication Using Face and Voice Features

Hybrid Biometric Person Authentication Using Face and Voice Features Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person

More information

ToF Camera for high resolution 3D images with affordable pricing

ToF Camera for high resolution 3D images with affordable pricing ToF Camera for high resolution 3D images with affordable pricing Basler AG Jana Bartels, Product Manager 3D Agenda Coming next I. Basler AG II. 3D Purpose and Time-of-Flight - Working Principle III. Advantages

More information

LabVIEW ON SMALL TARGET

LabVIEW ON SMALL TARGET LabVIEW ON SMALL TARGET Silviu FOLEA *, Marius GHERCIOIU **, Horia HEDESIU *, Crisan GRATIAN **, Ciprian CETERAS **, Ioan MONOSES ** * Technical University of Cluj-Napoca, ** National Instruments USA,

More information

A&E SPECIFICATIONS. TeleEye MX Series Network Camera Model MX925-HD

A&E SPECIFICATIONS. TeleEye MX Series Network Camera Model MX925-HD A&E SPECIFICATIONS TeleEye MX Series Network Camera Model MX925-HD General Description The network camera ( camera ) described shall be a TeleEye MX925-HD or equivalent. It is designed for professional

More information

Projected Texture for Hand Geometry based Authentication

Projected Texture for Hand Geometry based Authentication Projected Texture for Hand Geometry based Authentication Avinash Sharma Nishant Shobhit Anoop Namboodiri Center for Visual Information Technology International Institute of Information Technology, Hyderabad,

More information

Structured Light II. Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov

Structured Light II. Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov Structured Light II Johannes Köhler Johannes.koehler@dfki.de Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov Introduction Previous lecture: Structured Light I Active Scanning Camera/emitter

More information

FEITIAN Technologies, Co., Ltd.

FEITIAN Technologies, Co., Ltd. POWER CARD www.ftsafe.com FEITIAN Technologies, Co., Ltd. Power Card Power Cards are security solutions in ISO standard card form factor and are able to combine various security functions into one card

More information

Announcements. Recognition (Part 3) Model-Based Vision. A Rough Recognition Spectrum. Pose consistency. Recognition by Hypothesize and Test

Announcements. Recognition (Part 3) Model-Based Vision. A Rough Recognition Spectrum. Pose consistency. Recognition by Hypothesize and Test Announcements (Part 3) CSE 152 Lecture 16 Homework 3 is due today, 11:59 PM Homework 4 will be assigned today Due Sat, Jun 4, 11:59 PM Reading: Chapter 15: Learning to Classify Chapter 16: Classifying

More information

Restricting Unauthorized Access Using Biometrics In Mobile

Restricting Unauthorized Access Using Biometrics In Mobile Restricting Unauthorized Access Using Biometrics In Mobile S.Vignesh*, M.Narayanan# Under Graduate student*, Assistant Professor# Department Of Computer Science and Engineering, Saveetha School Of Engineering

More information

Su et al. Shape Descriptors - III

Su et al. Shape Descriptors - III Su et al. Shape Descriptors - III Siddhartha Chaudhuri http://www.cse.iitb.ac.in/~cs749 Funkhouser; Feng, Liu, Gong Recap Global A shape descriptor is a set of numbers that describes a shape in a way that

More information

Advanced Vision Guided Robotics. David Bruce Engineering Manager FANUC America Corporation

Advanced Vision Guided Robotics. David Bruce Engineering Manager FANUC America Corporation Advanced Vision Guided Robotics David Bruce Engineering Manager FANUC America Corporation Traditional Vision vs. Vision based Robot Guidance Traditional Machine Vision Determine if a product passes or

More information

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova CPSC 695 Geometric Algorithms in Biometrics Dr. Marina L. Gavrilova Biometric goals Verify users Identify users Synthesis - recently Biometric identifiers Courtesy of Bromba GmbH Classification of identifiers

More information

Guppy F-033. Description. Specifications. IEEE 1394a camera Lightweight Robust design Machine vision camera

Guppy F-033. Description. Specifications. IEEE 1394a camera Lightweight Robust design Machine vision camera Guppy F-033 IEEE 1394a camera Lightweight Robust design Machine vision camera Description Ultra-compact, inexpensive IEEE 1394a VGA machine vision camera The Guppy F-033B/C is an ultra-compact, inexpensive

More information

Face Recognition At-a-Distance Based on Sparse-Stereo Reconstruction

Face Recognition At-a-Distance Based on Sparse-Stereo Reconstruction Face Recognition At-a-Distance Based on Sparse-Stereo Reconstruction Ham Rara, Shireen Elhabian, Asem Ali University of Louisville Louisville, KY {hmrara01,syelha01,amali003}@louisville.edu Mike Miller,

More information

A&E SPECIFICATIONS. TeleEye MX Series Network Camera Model MX151E-HD

A&E SPECIFICATIONS. TeleEye MX Series Network Camera Model MX151E-HD A&E SPECIFICATIONS TeleEye MX Series Network Camera Model MX151E-HD General Description The network camera ( camera ) described shall be a TeleEye MX151E-HD or equivalent. It is designed for professional

More information

Statistical alignment of remote sensing images to improve classifiers portability and change detection

Statistical alignment of remote sensing images to improve classifiers portability and change detection Statistical alignment of remote sensing images to improve classifiers portability and change detection giona.matasci@unil.ch Institute of Geomatics and Analysis of Risk University of Lausanne, Switzerland

More information

Authentication. Chapter 2

Authentication. Chapter 2 Authentication Chapter 2 Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand how CHAP works Understand what mutual authentication

More information

Overview of Computer Vision. CS308 Data Structures

Overview of Computer Vision. CS308 Data Structures Overview of Computer Vision CS308 Data Structures What is Computer Vision? Deals with the development of the theoretical and algorithmic basis by which useful information about the 3D world can be automatically

More information

Traffic Sign Recognition for Autonomous Driving Robot

Traffic Sign Recognition for Autonomous Driving Robot Volume-7, Issue-4, July-August 2017 International Journal of Engineering and Management Research Page Number: 385-392 Traffic Sign Recognition for Autonomous Driving Robot K.Pavani 1, A. Prasanna Lakshmi

More information

High speed CMOS image sensors Wim Wuyts Sr. Staff Applications Engineer Cypress Semiconductor Corporation Belgium Vision 2006

High speed CMOS image sensors Wim Wuyts Sr. Staff Applications Engineer Cypress Semiconductor Corporation Belgium Vision 2006 High speed CMOS image sensors Wim Wuyts Sr. Staff Applications Engineer Cypress Semiconductor Corporation Belgium Vision 2006 P E R F O R M Outline Introduction Architecture Analog high speed CIS Digital

More information

Seminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht

Seminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht Personal Area Networks Seminar: Mobile Systems November 19th 2009 Krzysztof Dabkowski Supervisor: Fabio Hecht Agenda Motivation Application areas Historical and technical overview Security issues Discussion

More information

Datasheet. High-Definition IP Surveillance Cameras. Models: UVC-G3, UVC-G3-DOME. Scalable Day and Night Surveillance

Datasheet. High-Definition IP Surveillance Cameras. Models: UVC-G3, UVC-G3-DOME. Scalable Day and Night Surveillance High-Definition IP Surveillance Cameras Models: UVC-G3, UVC-G3-DOME Scalable Day and Night Surveillance Advanced Hardware and Optics for 1080p Full HD Video Powerful Features and Analytic Capabilities

More information

Structured light 3D reconstruction

Structured light 3D reconstruction Structured light 3D reconstruction Reconstruction pipeline and industrial applications rodola@dsi.unive.it 11/05/2010 3D Reconstruction 3D reconstruction is the process of capturing the shape and appearance

More information

Recognition (Part 4) Introduction to Computer Vision CSE 152 Lecture 17

Recognition (Part 4) Introduction to Computer Vision CSE 152 Lecture 17 Recognition (Part 4) CSE 152 Lecture 17 Announcements Homework 5 is due June 9, 11:59 PM Reading: Chapter 15: Learning to Classify Chapter 16: Classifying Images Chapter 17: Detecting Objects in Images

More information

Lesson 2: Input, Output, and Processing

Lesson 2: Input, Output, and Processing Lesson 2: Input, Output, and Processing TRUE/FALSE 1. After data is processed, it is presented to the user through an input device. ANS: F REF: Mod1-28 2. A laser virtual keyboard is packaged in a case

More information

Ethernet Switch. WAN Gateway. Figure 1: Switched LAN Example

Ethernet Switch. WAN Gateway. Figure 1: Switched LAN Example 1 Introduction An Ethernet switch is used to interconnect a number of Ethernet LANs (Local Area Networks), forming a large Ethernet network. Different ports of the switch are connected to different LAN

More information

An Associate-Predict Model for Face Recognition FIPA Seminar WS 2011/2012

An Associate-Predict Model for Face Recognition FIPA Seminar WS 2011/2012 An Associate-Predict Model for Face Recognition FIPA Seminar WS 2011/2012, 19.01.2012 INSTITUTE FOR ANTHROPOMATICS, FACIAL IMAGE PROCESSING AND ANALYSIS YIG University of the State of Baden-Wuerttemberg

More information

Intel CoFluent Studio in Digital Imaging

Intel CoFluent Studio in Digital Imaging Intel CoFluent Studio in Digital Imaging Sensata Technologies Use Case Sensata Technologies www.sensatatechnologies.com Formerly Texas Instruments Sensors & Controls, Sensata Technologies is the world

More information

FPGA implementations of Histograms of Oriented Gradients in FPGA

FPGA implementations of Histograms of Oriented Gradients in FPGA FPGA implementations of Histograms of Oriented Gradients in FPGA C. Bourrasset 1, L. Maggiani 2,3, C. Salvadori 2,3, J. Sérot 1, P. Pagano 2,3 and F. Berry 1 1 Institut Pascal- D.R.E.A.M - Aubière, France

More information

DSP using Labview FPGA. T.J.Moir AUT University School of Engineering Auckland New-Zealand

DSP using Labview FPGA. T.J.Moir AUT University School of Engineering Auckland New-Zealand DSP using Labview FPGA T.J.Moir AUT University School of Engineering Auckland New-Zealand Limitations of a basic processor Despite all of the advancements we ve made in the world of processors, they still

More information

Web-Based Home Appliances Controlling System

Web-Based Home Appliances Controlling System Web-Based Home Appliances Controlling System B.E. EXTC, TSEC Aman Chadha Mahesh Dubey Siddhesh Shirodker 1 Agenda House monitoring using a live feed Advanced security system based on userauthentication

More information