Person authentication using nearest feature line embedding transformation and biased discriminant analysis

Chen-Ta Hsieh, Chin-Chuan Han, Chang-Hsing Lee, Kuo-Chin Fan
{"title":"Person authentication using nearest feature line embedding transformation and biased discriminant analysis","authors":"Chen-Ta Hsieh, Chin-Chuan Han, Chang-Hsing Lee, Kuo-Chin Fan","doi":"10.1109/CCST.2017.8167858","DOIUrl":null,"url":null,"abstract":"Personal authentication (PA) on smartphones plays the crucial role in mobile payment. Facial features are the most user-friendly biometric feature because of the build-in camera, when we use smartphones as the payment devices. In this study, a novel authenticated method is proposed for PA by integrating feature line embedding (FLE) transformation and biased discriminant analysis (BDA) by using facial features. Due to the few training samples, the discriminant power is limited for learning. In feature spaces, feature lines are regarded as the feature combination between two training samples and infinitely simulate the possible features of various conditions for training. In PA, only positive samples is used to calculate the within-class scatter, and the between class scatter is also calculated using negative samples by the BDA strategy. Compared with the traditional two-class classification and BDA problems, the FLE integrates with BDA to obtain a better dimension reduction transformation. A support vector machine (SVM) classifier is further trained to determine a query sample is a real or a forged sample.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2017.8167858","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Personal authentication (PA) on smartphones plays the crucial role in mobile payment. Facial features are the most user-friendly biometric feature because of the build-in camera, when we use smartphones as the payment devices. In this study, a novel authenticated method is proposed for PA by integrating feature line embedding (FLE) transformation and biased discriminant analysis (BDA) by using facial features. Due to the few training samples, the discriminant power is limited for learning. In feature spaces, feature lines are regarded as the feature combination between two training samples and infinitely simulate the possible features of various conditions for training. In PA, only positive samples is used to calculate the within-class scatter, and the between class scatter is also calculated using negative samples by the BDA strategy. Compared with the traditional two-class classification and BDA problems, the FLE integrates with BDA to obtain a better dimension reduction transformation. A support vector machine (SVM) classifier is further trained to determine a query sample is a real or a forged sample.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于最近特征线嵌入变换和有偏判别分析的人物认证
智能手机上的个人认证(PA)在移动支付中起着至关重要的作用。当我们使用智能手机作为支付设备时,面部特征是最方便用户使用的生物特征,因为它内置了摄像头。本文提出了一种基于人脸特征的人脸识别方法,该方法将特征线嵌入(FLE)变换与有偏判别分析(BDA)相结合。由于训练样本较少,学习的判别能力受到限制。在特征空间中,将特征线视为两个训练样本之间的特征组合,无限模拟各种条件下可能出现的特征进行训练。在PA中,只使用正样本计算类内散点,使用BDA策略也使用负样本计算类间散点。与传统的两类分类和BDA问题相比,FLE与BDA相结合,获得了更好的降维变换。进一步训练支持向量机(SVM)分类器来判断查询样本是真实样本还是伪造样本。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Competence measure in social networks Stability of a dynamic biometric signature created on various devices Real-time behavioral DGA detection through machine learning Cyber-physical risk management for PV photovoltaic plants Encrypted computing: Speed, security and provable obfuscation against insiders
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1