首页 > 最新文献

IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)最新文献

英文 中文
An efficient technique for image contrast enhancement using artificial bee colony 一种利用人工蜂群增强图像对比度的有效方法
Piyush Joshi, S. Prakash
Contrast enhancement is a significant phase in image processing for improving visual and informational quality of a degraded image. We propose an enhancement technique for poor contrast images which utilizes modified Artificial Bee Colony (ABC) technique. This paper includes following two major contributions. First, Direction Constraints (DC) has been associated with ABC so that artificial bees can move in right direction to obtain better solution and reduce computational time. This is similar to natural bees which use their memory to find out food sources. Second, Contrast based Quality Estimation (CQE) is used as an objective function of ABC. Experimental results show the effectiveness of the proposed technique.
对比度增强是图像处理中一个重要的阶段,用于改善退化图像的视觉和信息质量。提出了一种利用改进的人工蜂群(ABC)技术对对比度较差的图像进行增强的方法。本文包括以下两个主要贡献。首先,将方向约束(DC)与ABC相关联,使人工蜜蜂能够朝着正确的方向移动,从而获得更好的解,减少计算时间。这与天然蜜蜂利用记忆寻找食物来源类似。其次,将基于对比度的质量估计(CQE)作为ABC的目标函数。实验结果表明了该方法的有效性。
{"title":"An efficient technique for image contrast enhancement using artificial bee colony","authors":"Piyush Joshi, S. Prakash","doi":"10.1109/ISBA.2015.7126363","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126363","url":null,"abstract":"Contrast enhancement is a significant phase in image processing for improving visual and informational quality of a degraded image. We propose an enhancement technique for poor contrast images which utilizes modified Artificial Bee Colony (ABC) technique. This paper includes following two major contributions. First, Direction Constraints (DC) has been associated with ABC so that artificial bees can move in right direction to obtain better solution and reduce computational time. This is similar to natural bees which use their memory to find out food sources. Second, Contrast based Quality Estimation (CQE) is used as an objective function of ABC. Experimental results show the effectiveness of the proposed technique.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114889330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Effect of data size on performance of free-text keystroke authentication 数据大小对自由文本击键认证性能的影响
Jiaju Huang, Daqing Hou, S. Schuckers, Zhenhao Hou
Free-text keystroke authentication has been demonstrated to be a promising behavioral biometric. But unlike physiological traits such as fingerprints, in free-text keystroke authentication, there is no natural way to identify what makes a sample. It remains an open problem as to how much keystroke data are necessary for achieving acceptable authentication performance. Using public datasets and two existing algorithms, we conduct two experiments to investigate the effect of the reference profile size and test sample size on False Alarm Rate (FAR) and Imposter Pass Rate (IPR). We find that (1) larger reference profiles will drive down both IPR and FAR values, provided that the test samples are large enough, and (2) larger test samples have no obvious effect on IPR, regardless of the reference profile size. We discuss the practical implication of our findings.
自由文本击键认证已被证明是一种很有前途的行为生物识别技术。但与指纹等生理特征不同,在自由文本击键认证中,没有自然的方法来识别样本的构成。需要多少击键数据才能实现可接受的身份验证性能,这仍然是一个悬而未决的问题。利用公共数据集和两种现有算法,我们进行了两个实验,研究了参考轮廓大小和测试样本大小对虚警率(FAR)和冒名顶替者合格率(IPR)的影响。我们发现:(1)在测试样本足够大的情况下,较大的参考剖面会降低IPR和FAR值;(2)无论参考剖面大小如何,较大的测试样本对IPR没有明显影响。我们讨论了我们的发现的实际意义。
{"title":"Effect of data size on performance of free-text keystroke authentication","authors":"Jiaju Huang, Daqing Hou, S. Schuckers, Zhenhao Hou","doi":"10.1109/ISBA.2015.7126361","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126361","url":null,"abstract":"Free-text keystroke authentication has been demonstrated to be a promising behavioral biometric. But unlike physiological traits such as fingerprints, in free-text keystroke authentication, there is no natural way to identify what makes a sample. It remains an open problem as to how much keystroke data are necessary for achieving acceptable authentication performance. Using public datasets and two existing algorithms, we conduct two experiments to investigate the effect of the reference profile size and test sample size on False Alarm Rate (FAR) and Imposter Pass Rate (IPR). We find that (1) larger reference profiles will drive down both IPR and FAR values, provided that the test samples are large enough, and (2) larger test samples have no obvious effect on IPR, regardless of the reference profile size. We discuss the practical implication of our findings.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A two-stage estimation method for depth estimation of facial landmarks 人脸标志深度估计的两阶段估计方法
Xun Gong, Zehua Fu, Xinxin Li, Lin Feng
To address the problem of 3D face modeling based on a set of landmarks on images, the traditional feature-based morphable model, using face class-specific information, makes direct use of these 2D points to infer a dense 3D face surface. However, the unknown depth of landmarks degrades accuracy considerably. A promising solution is to predict the depth of landmarks at first. Bases on this idea, a two-stage estimation method is proposed to compute the depth value of landmarks from two images. And then, the estimated 3D landmarks are applied to a deformation algorithm to make a precise 3D dense facial shape. Test results on synthesized images with known ground-truth show that the proposed two-stage estimation method can obtain landmarks' depth both effectively and efficiently, and further that the reconstructed accuracy is greatly enhanced with the estimated 3D landmarks. Reconstruction results of real-world photos are rather realistic.
为了解决基于图像上的一组地标的三维人脸建模问题,传统的基于特征的变形模型利用特定于人脸类别的信息,直接利用这些二维点来推断密集的三维人脸表面。然而,未知的地标深度大大降低了精度。一个有希望的解决方案是首先预测地标的深度。在此基础上,提出了一种两阶段估计方法,从两幅图像中计算地标的深度值。然后,将估计的三维地标应用到变形算法中,得到精确的三维密集面部形状。在已知地真值的合成图像上的测试结果表明,所提出的两阶段估计方法能够有效且高效地获得地标深度,并且根据估计的三维地标重建精度大大提高。真实照片的重建结果比较逼真。
{"title":"A two-stage estimation method for depth estimation of facial landmarks","authors":"Xun Gong, Zehua Fu, Xinxin Li, Lin Feng","doi":"10.1109/ISBA.2015.7126355","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126355","url":null,"abstract":"To address the problem of 3D face modeling based on a set of landmarks on images, the traditional feature-based morphable model, using face class-specific information, makes direct use of these 2D points to infer a dense 3D face surface. However, the unknown depth of landmarks degrades accuracy considerably. A promising solution is to predict the depth of landmarks at first. Bases on this idea, a two-stage estimation method is proposed to compute the depth value of landmarks from two images. And then, the estimated 3D landmarks are applied to a deformation algorithm to make a precise 3D dense facial shape. Test results on synthesized images with known ground-truth show that the proposed two-stage estimation method can obtain landmarks' depth both effectively and efficiently, and further that the reconstructed accuracy is greatly enhanced with the estimated 3D landmarks. Reconstruction results of real-world photos are rather realistic.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126252624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards EEG biometrics: pattern matching approaches for user identification 迈向脑电图生物识别:用户识别的模式匹配方法
Qiong Gui, Zhanpeng Jin, Maria V. Ruiz-Blondet, Sarah Laszlo, Wenyao Xu
EEG brainwaves have recently emerged as a promising biometric that can be used for individual identification, since those signals are confidential, sensitive, and hard to steal and replicate. In this study, we propose a new stimuli-driven, non-volitional brain responses based framework towards individual identification. The non-volitional mechanism provides an even more secure way in which the subjects are not aware of and thus can not manipulate their brain activities. We present our preliminary investigations based on two pattern matching approaches: Euclidean Distance (ED) and Dynamic Time Warping (DTW). We investigate the performance of our proposed methods using four different visual stimuli and the potential impacts from four different EEG electrode channels. Experimental results show that, the Oz channel provides the best identification accuracy for both ED and DTW methods, and the stimuli of illegal strings and words seem to trigger more distinguishable brain responses. For ED method, the accuracy of identifying 30 subjects could reach over 80%, which is better than the best accuracy of about 68% that can be achieved by DTW method. Our study lays a foundation for future investigation of brainwave-based biometric approaches.
脑电图脑电波最近成为一种很有前途的生物识别技术,可以用于个人身份识别,因为这些信号是机密的、敏感的、难以窃取和复制的。在这项研究中,我们提出了一个新的刺激驱动的、基于非意志大脑反应的个体识别框架。非意志机制提供了一种更安全的方式,在这种方式中,受试者没有意识到,因此无法操纵他们的大脑活动。我们提出了基于两种模式匹配方法的初步研究:欧几里得距离(ED)和动态时间翘曲(DTW)。我们使用四种不同的视觉刺激和四种不同脑电电极通道的潜在影响来研究我们提出的方法的性能。实验结果表明,在ED和DTW两种方法中,Oz通道都提供了最好的识别精度,并且非法字符串和单词的刺激似乎能触发更多可区分的大脑反应。ED方法识别30个受试者的准确率可达80%以上,优于DTW方法68%左右的最佳准确率。我们的研究为未来基于脑波的生物识别方法的研究奠定了基础。
{"title":"Towards EEG biometrics: pattern matching approaches for user identification","authors":"Qiong Gui, Zhanpeng Jin, Maria V. Ruiz-Blondet, Sarah Laszlo, Wenyao Xu","doi":"10.1109/ISBA.2015.7126357","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126357","url":null,"abstract":"EEG brainwaves have recently emerged as a promising biometric that can be used for individual identification, since those signals are confidential, sensitive, and hard to steal and replicate. In this study, we propose a new stimuli-driven, non-volitional brain responses based framework towards individual identification. The non-volitional mechanism provides an even more secure way in which the subjects are not aware of and thus can not manipulate their brain activities. We present our preliminary investigations based on two pattern matching approaches: Euclidean Distance (ED) and Dynamic Time Warping (DTW). We investigate the performance of our proposed methods using four different visual stimuli and the potential impacts from four different EEG electrode channels. Experimental results show that, the Oz channel provides the best identification accuracy for both ED and DTW methods, and the stimuli of illegal strings and words seem to trigger more distinguishable brain responses. For ED method, the accuracy of identifying 30 subjects could reach over 80%, which is better than the best accuracy of about 68% that can be achieved by DTW method. Our study lays a foundation for future investigation of brainwave-based biometric approaches.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125575074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Cardiac radar for biometric identification using nearest neighbour of continuous wavelet transform peaks 利用连续小波变换峰的最近邻进行心脏雷达生物特征识别
D. Rissacher, D. Galy
This work explores the use of cardiac data acquired by a 2.4 GHz radar system as a potential biometric identification tool. Monostatic and bistatic systems are used to record data from human subjects over two visits. Cardiac data is extracted from the radar recordings and an ensemble average is computed using ECG as a time reference. The Continuous Wavelet Transform is then computed to provide time-frequency analysis of the average radar cardiac cycle and a nearest neighbor technique is applied to demonstrate that a cardiac radar system has some promise as a biometric identification technology currently producing Rank-1 accuracy of 19% and Rank-5 accuracy of 42% over 26 subjects.
这项工作探讨了使用2.4 GHz雷达系统获取的心脏数据作为潜在的生物识别工具。单站和双站系统用于记录人类受试者两次访问的数据。从雷达记录中提取心脏数据,并使用ECG作为时间参考计算集合平均值。然后计算连续小波变换以提供平均雷达心脏周期的时频分析,并应用最近邻技术来证明心脏雷达系统作为一种生物识别技术具有一定的前景,目前在26个受试者中产生的Rank-1精度为19%,Rank-5精度为42%。
{"title":"Cardiac radar for biometric identification using nearest neighbour of continuous wavelet transform peaks","authors":"D. Rissacher, D. Galy","doi":"10.1109/ISBA.2015.7126356","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126356","url":null,"abstract":"This work explores the use of cardiac data acquired by a 2.4 GHz radar system as a potential biometric identification tool. Monostatic and bistatic systems are used to record data from human subjects over two visits. Cardiac data is extracted from the radar recordings and an ensemble average is computed using ECG as a time reference. The Continuous Wavelet Transform is then computed to provide time-frequency analysis of the average radar cardiac cycle and a nearest neighbor technique is applied to demonstrate that a cardiac radar system has some promise as a biometric identification technology currently producing Rank-1 accuracy of 19% and Rank-5 accuracy of 42% over 26 subjects.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128930990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Efficient blind image deblurring method for palm print images 掌纹图像的高效盲去模糊方法
M. S. Shakeel, Wenxiong Kang
This paper introduces an efficient approach towards blind deblurring of palm print images suffered from severe motion blur. First an improved Hough transform method is proposed to detect the blur angle and length of palm print image accurately. Analysis of blurred image is performed in Fourier domain which contains important information about the blur orientation of an image. After detecting the blur parameters successfully an improved augmented lagrangian method is proposed that utilizes the point spread function constructed from blur parameters to de blur the image. Deconvolution algorithm is first divided into various sub problems which are then solved iteratively to find their corresponding solutions by using alternating direction method. This proposed method provides de blurred image which is free of ringing artifacts. Its main application is in biometric systems in which camera captured blurred image because of user's hand motion.
本文介绍了一种有效的掌纹图像盲去模糊方法。首先提出了一种改进的Hough变换方法来准确检测掌纹图像的模糊角度和模糊长度。模糊图像的分析在傅里叶域中进行,傅里叶域中包含图像模糊方向的重要信息。在成功检测到模糊参数后,提出了一种改进的增广拉格朗日方法,利用模糊参数构造的点扩散函数对图像进行去模糊处理。该算法首先将反卷积算法分解为多个子问题,然后采用交替方向法进行迭代求解,得到相应的解。该方法可提供无环形伪影的去模糊图像。它的主要应用是在生物识别系统中,相机捕捉由于用户的手部运动而产生的模糊图像。
{"title":"Efficient blind image deblurring method for palm print images","authors":"M. S. Shakeel, Wenxiong Kang","doi":"10.1109/ISBA.2015.7126364","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126364","url":null,"abstract":"This paper introduces an efficient approach towards blind deblurring of palm print images suffered from severe motion blur. First an improved Hough transform method is proposed to detect the blur angle and length of palm print image accurately. Analysis of blurred image is performed in Fourier domain which contains important information about the blur orientation of an image. After detecting the blur parameters successfully an improved augmented lagrangian method is proposed that utilizes the point spread function constructed from blur parameters to de blur the image. Deconvolution algorithm is first divided into various sub problems which are then solved iteratively to find their corresponding solutions by using alternating direction method. This proposed method provides de blurred image which is free of ringing artifacts. Its main application is in biometric systems in which camera captured blurred image because of user's hand motion.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116485612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Tattoo recognition technology - challenge (Tatt-C): an open tattoo database for developing tattoo recognition research 纹身识别技术-挑战(Tattoo - c):一个开放的纹身数据库,用于开展纹身识别研究
M. Ngan, P. Grother
Tattoos have been used for many years to assist law enforcement in investigations leading to the identification of criminals and victims. A tattoo is an elective biometric trait that could contain more discriminative information to support person identification than traditional soft biometrics such as age, gender and race. While some research has been done in the area of image-based tattoo detection and retrieval, it is not a mature domain. There are no common datasets to evaluate and develop operationally-relevant tattoo recognition applications. To address this shortcoming, the NIST Tattoo Recognition Technology Challenge (Tatt-C) database was developed as an initial tattoo research corpus that addresses use cases representative of operational scenarios. The Tatt-C database represents an initial attempt to provide a set of ground-truthed tattoo images focused on, but not limited to, five primary use cases. This paper describes the details of the database along with the experimental protocols and test cases that should be followed, which will enable consistent performance comparison of tattoo recognition methods.
多年来,纹身一直被用于协助执法部门进行调查,从而识别罪犯和受害者。纹身是一种选择性的生物特征,与传统的软生物特征(如年龄、性别和种族)相比,它可以包含更多的歧视性信息,以支持个人识别。虽然在基于图像的纹身检测和检索方面已经做了一些研究,但还不是一个成熟的领域。没有通用的数据集来评估和开发与操作相关的纹身识别应用。为了解决这一缺点,NIST纹身识别技术挑战(tat - c)数据库被开发为一个初始纹身研究语料库,用于解决具有代表性的操作场景用例。tattoo - c数据库代表了提供一组真实的纹身图像的初步尝试,这些图像集中于但不限于五个主要用例。本文描述了数据库的细节,以及应该遵循的实验方案和测试用例,使纹身识别方法的性能比较保持一致。
{"title":"Tattoo recognition technology - challenge (Tatt-C): an open tattoo database for developing tattoo recognition research","authors":"M. Ngan, P. Grother","doi":"10.1109/ISBA.2015.7126369","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126369","url":null,"abstract":"Tattoos have been used for many years to assist law enforcement in investigations leading to the identification of criminals and victims. A tattoo is an elective biometric trait that could contain more discriminative information to support person identification than traditional soft biometrics such as age, gender and race. While some research has been done in the area of image-based tattoo detection and retrieval, it is not a mature domain. There are no common datasets to evaluate and develop operationally-relevant tattoo recognition applications. To address this shortcoming, the NIST Tattoo Recognition Technology Challenge (Tatt-C) database was developed as an initial tattoo research corpus that addresses use cases representative of operational scenarios. The Tatt-C database represents an initial attempt to provide a set of ground-truthed tattoo images focused on, but not limited to, five primary use cases. This paper describes the details of the database along with the experimental protocols and test cases that should be followed, which will enable consistent performance comparison of tattoo recognition methods.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133965761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Locality Preserving Discriminant Projection 保局域判别投影
G. Shikkenawis, S. Mitra
Face is the most powerful biometric as far as human recognition system is concerned which is not the case for machine vision. Face recognition by machine is yet incomplete due to adverse, unconstrained environment. Out of several attempts made in past few decades, subspace based methods appeared to be more accurate and robust. In the present proposal, a new subspace based method is developed. It preserves the local geometry of data points, here face images. In particular, it keeps the neighboring points which are from the same class close to each other and those from different classes far apart in the subspace. The first part can be seen as a variant of locality preserving projection (LPP) and the combination of both the parts is mentioned as locality preserving discriminant projection (LPDP). The performance of the proposed subspace based approach is compared with a few other contemporary approaches on some benchmark databases for face recognition. The current method seems to perform significantly better.
就人类识别系统而言,人脸是最强大的生物特征,而机器视觉则不然。由于不利的、不受约束的环境,机器人脸识别尚不完善。在过去几十年的几次尝试中,基于子空间的方法似乎更准确、更健壮。本文提出了一种新的基于子空间的方法。它保留了数据点的局部几何形状,这里是人脸图像。特别地,它使同一类的相邻点在子空间中彼此靠近,而不同类的相邻点在子空间中相距很远。第一部分可以看作是局部保持投影(locality preserving projection, LPP)的一种变体,两者的结合称为局部保持判别投影(locality preserving discriminant projection, LPDP)。在一些人脸识别基准数据库上,将所提出的基于子空间的方法与其他几种方法的性能进行了比较。目前的方法似乎表现得更好。
{"title":"Locality Preserving Discriminant Projection","authors":"G. Shikkenawis, S. Mitra","doi":"10.1109/ISBA.2015.7126365","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126365","url":null,"abstract":"Face is the most powerful biometric as far as human recognition system is concerned which is not the case for machine vision. Face recognition by machine is yet incomplete due to adverse, unconstrained environment. Out of several attempts made in past few decades, subspace based methods appeared to be more accurate and robust. In the present proposal, a new subspace based method is developed. It preserves the local geometry of data points, here face images. In particular, it keeps the neighboring points which are from the same class close to each other and those from different classes far apart in the subspace. The first part can be seen as a variant of locality preserving projection (LPP) and the combination of both the parts is mentioned as locality preserving discriminant projection (LPDP). The performance of the proposed subspace based approach is compared with a few other contemporary approaches on some benchmark databases for face recognition. The current method seems to perform significantly better.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124329501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Orientation invariant gait matching algorithm based on the Kabsch alignment 基于kabch对齐的方向不变步态匹配算法
R. Subramanian, Sudeep Sarkar, M. Labrador, K. Contino, Christopher Eggert, O. Javed, Jiejie Zhu, Hui Cheng
Accelerometer and gyroscope sensors in smart phones capture the dynamics of human gait that can be matched to arrive at identity authentication measures of the person carrying the phone. Any such matching method has to take into account the reality that the phone may be placed at uncontrolled orientations with respect to the human body. In this paper, we present a novel orientation invariant gaitmatching algorithm based on the Kabsch alignment. The algorithm consists of simple, intuitive, yet robust methods for cycle splitting, aligning orientation, and comparing gait signals. We demonstrate the effectiveness of the method using a dataset from 101 subjects, with the phone placed in uncontrolled orientations in the holster and in the pocket, and collected on different days. We find that the orientation invariant gait algorithm results in a significant reduction in error: up to a 9% reduction in equal error rate, from 30.4% to 21.5% when comparing data captured on different days. On the McGill dataset from 20 subjects, which is the other dataset with orientation variation, we find a more pronounced effect; the identification rate increased from 67.5% to 96.5%. On the OU-ISIR data, which has data from 745 subjects, the equal error rates are as low as 6.3%, which is among the best reported in the literature.
智能手机中的加速度计和陀螺仪传感器捕捉人类步态的动态,可以匹配到携带手机的人的身份认证措施。任何这样的匹配方法都必须考虑到手机可能被放置在相对于人体的不受控制的方向上的现实。本文提出了一种新的基于kabch对齐的方向不变步态匹配算法。该算法包括简单、直观、鲁棒的周期分割、定向对齐和步态信号比较方法。我们使用来自101个受试者的数据集来证明该方法的有效性,将手机以不受控制的方向放在皮套和口袋中,并在不同的日子收集。我们发现,方向不变步态算法显著降低了误差:当比较不同日期捕获的数据时,相等错误率降低了9%,从30.4%降至21.5%。在来自20个受试者的麦吉尔数据集上,这是另一个具有取向变化的数据集,我们发现了更明显的效应;鉴别率由67.5%提高到96.5%。在u - isir数据中,有745名受试者的数据,平均错误率低至6.3%,在文献报道中名列前茅。
{"title":"Orientation invariant gait matching algorithm based on the Kabsch alignment","authors":"R. Subramanian, Sudeep Sarkar, M. Labrador, K. Contino, Christopher Eggert, O. Javed, Jiejie Zhu, Hui Cheng","doi":"10.1109/ISBA.2015.7126347","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126347","url":null,"abstract":"Accelerometer and gyroscope sensors in smart phones capture the dynamics of human gait that can be matched to arrive at identity authentication measures of the person carrying the phone. Any such matching method has to take into account the reality that the phone may be placed at uncontrolled orientations with respect to the human body. In this paper, we present a novel orientation invariant gaitmatching algorithm based on the Kabsch alignment. The algorithm consists of simple, intuitive, yet robust methods for cycle splitting, aligning orientation, and comparing gait signals. We demonstrate the effectiveness of the method using a dataset from 101 subjects, with the phone placed in uncontrolled orientations in the holster and in the pocket, and collected on different days. We find that the orientation invariant gait algorithm results in a significant reduction in error: up to a 9% reduction in equal error rate, from 30.4% to 21.5% when comparing data captured on different days. On the McGill dataset from 20 subjects, which is the other dataset with orientation variation, we find a more pronounced effect; the identification rate increased from 67.5% to 96.5%. On the OU-ISIR data, which has data from 745 subjects, the equal error rates are as low as 6.3%, which is among the best reported in the literature.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116908883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
An efficient finger vein indexing scheme based on unsupervised clustering 一种基于无监督聚类的高效指静脉索引方案
Ramachandra Raghavendra, Jayachander Surbiryala, C. Busch
Finger vein recognition has emerged as the robust biometric modality because of their unique vein pattern that can be captured using near infrared spectrum. The large scale finger vein based biometric solutions demand the need of searching the probe finger vein sample against the large collection of gallery samples. In order to improve the reliability in searching for the suitable identity in the large-scale finger vein database, it is essential to introduce the finger vein indexing and retrieval scheme. In this work, we present a novel finger vein indexing and retrieval scheme based on unsupervised clustering. To this extent we investigated three different clustering schemes namely K-means, K-medoids and Self Organizing Maps (SOM) neural networks. In addition, we also present a new feature extraction scheme to extract both compact and discriminant features from the finger vein images that are more suitable to build the indexing space. Extensive experiments are carried out on a large-scale heterogeneous finger vein database comprised of 2850 unique identities constructed using seven different publicly available finger vein databases. The obtained results demonstrated the efficacy of the proposed scheme with a pre-selection rate of 7.58% (hit rate of 92.42%) with a penetration rate of 42.48%. Further, the multi-cluster search demonstrated the performance with pre-selection error rate of 0.98% (hit rate of 99.02%) with a penetration rate of 52.88%.
手指静脉识别由于其独特的静脉模式可以使用近红外光谱捕获而成为强大的生物识别方式。基于手指静脉的大规模生物识别解决方案需要在大量的画廊样本中搜索探针手指静脉样本。为了提高在大规模手指静脉数据库中搜索到合适身份的可靠性,有必要引入手指静脉索引和检索方案。在这项工作中,我们提出了一种新的基于无监督聚类的手指静脉索引和检索方案。在此范围内,我们研究了三种不同的聚类方案,即K-means, k - medioids和自组织映射(SOM)神经网络。此外,我们还提出了一种新的特征提取方案,从手指静脉图像中提取更适合构建索引空间的紧凑特征和判别特征。利用7种不同的公开手指静脉数据库构建了2850个独特身份的大型异质手指静脉数据库,并对其进行了大量实验。结果表明,该方案的预选率为7.58%(命中率为92.42%),穿透率为42.48%。此外,多聚类搜索的预选错误率为0.98%(命中率为99.02%),渗透率为52.88%。
{"title":"An efficient finger vein indexing scheme based on unsupervised clustering","authors":"Ramachandra Raghavendra, Jayachander Surbiryala, C. Busch","doi":"10.1109/ISBA.2015.7126343","DOIUrl":"https://doi.org/10.1109/ISBA.2015.7126343","url":null,"abstract":"Finger vein recognition has emerged as the robust biometric modality because of their unique vein pattern that can be captured using near infrared spectrum. The large scale finger vein based biometric solutions demand the need of searching the probe finger vein sample against the large collection of gallery samples. In order to improve the reliability in searching for the suitable identity in the large-scale finger vein database, it is essential to introduce the finger vein indexing and retrieval scheme. In this work, we present a novel finger vein indexing and retrieval scheme based on unsupervised clustering. To this extent we investigated three different clustering schemes namely K-means, K-medoids and Self Organizing Maps (SOM) neural networks. In addition, we also present a new feature extraction scheme to extract both compact and discriminant features from the finger vein images that are more suitable to build the indexing space. Extensive experiments are carried out on a large-scale heterogeneous finger vein database comprised of 2850 unique identities constructed using seven different publicly available finger vein databases. The obtained results demonstrated the efficacy of the proposed scheme with a pre-selection rate of 7.58% (hit rate of 92.42%) with a penetration rate of 42.48%. Further, the multi-cluster search demonstrated the performance with pre-selection error rate of 0.98% (hit rate of 99.02%) with a penetration rate of 52.88%.","PeriodicalId":398910,"journal":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131702501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1