Nearest Neighbourhood Classifiers in Biometric Fusion

Size: px
Start display at page:

Download "Nearest Neighbourhood Classifiers in Biometric Fusion"

Transcription

1 Nearest Neighbourhood Classifiers in Biometric Fusion Nearest Neighbourhood Classifiers in Biometric Fusion A. Teoh, S. A. Samad, and A. Hussain Electrical, Electronic and System Engineering Department Faculty Engineering National University of Malaysia, Malaysia Abstract. Introduction This paper presents fusion decision technique comparisons based on nearestneighborhood (NN) classifiers family for a bimodal biometric verification system that makes use of face images and speech utterances. The system is essentially constructed by a face expert, a speech expert and a fusion decision module. Each individual expert has been optimized to operate in automatic mode and designed for security access application. Fusion decision schemes considered are ordinary, modified k-nn and evidence theoretic k-nn classifier based on Dampster-Safer theory. The aim is to obtain the optimum fusion module from amongst these three techniques best suited to the target application. Keywords: Biometrics, face verification, speech verification, fusion decision. The identification of humans, for example, for financial transactions, access control or computer access, has mostly been conducted by using ID numbers, such as a PIN or a password. The main problem with those numbers is that they can be used by unauthorized persons. Instead, biometric verification systems use unique personal features of the user himself to verify the identity claimed. However, a major problem with biometrics is that the physical appearance of a person tends to vary with time. In addition, correct verification may not be guaranteed due to sensor noise and limitations of the feature extractor and matcher. One solution to cope with these limitations is to combine several biometrics in a multi-modal identity verification system. By using those multiple International Journal of The Computer, the Internet and Management Vol. # (January April, 004) pp

2 A. Teoh, S. A. Samad, A. Hussain biometric traits, a much higher accuracy can be achieved. Even when one biometric feature is somehow disturbed, for example in a noisy environment, the other traits still lead to an accurate decision. Some work on multi-modal biometric identity verification systems has been reported in literature. Brunelli and Falavigna (995) have proposed a person identification system based on acoustic and visual features, where they use a HyperBF network as the best performing fusion module. Dieckmann et al. (997) have proposed a decision level fusion scheme, based on a -out-of-3 majority voting, which integrates face and voice, analyzed by three different experts: face, lip motion, and voice. Duc et al. (997) proposed a simple averaging technique and compared it with the Bayesian integration scheme presented by Bigun et al. (997). In this multi-modal system the authors use a face identification expert, and a textdependent speech expert. Kittler et al. (998) proposed a multi-modal person verification system, using three experts: frontal face, face profile, and voice. The best combination results are obtained for a simple sum rule. Hong and Jain (998) proposed a multimodal personal identification system which integrates face and fingerprints that complement each other. The fusion algorithm operates at the expert (soft) decision level, where it combines the scores from the different experts under statistically independence hypothesis, by simply multiplying them. Ben-Yacoub (998) proposed a multi-modal data fusion approach for person authentication, based on Support Vector Machines (SVM) to combine the results obtained from a face identification expert, and a text-dependent speech expert. Pigeon (998) proposed a multi-modal person authentication approach based on simple fusion algorithms to combine the results coming from the frontal face, face profile, and voice modal. Choudhury et al. (999) proposed a multi-modal person recognition using unconstrained audio and video. The combination of the two experts is performed using a Bayes net. A bimodal biometric verification system based on facial and vocal modalities are described in this paper. It differs from the systems that are mentioned above in the sense that this system is targeted for applications involving automatic verification using personal computers and their multimedia capturing devices. Thus each module of the system has been fine-tuned to deal with the problems that may occur in this type of application, such as poor quality images obtained from using a low cost PC camera and the problem of using various types of microphones that may cause channel distortion or convolution noise. In addition, the system is designed to keep the rate as low as possible for the case when an imposter is accepted as being a genuine. Each module of the system, i.e. the face and voice, is developed separately and several fusion decision schemes are compared with the aim to obtain the optimum technique for this application.. Verification Modules. Face Verification In personal verification, face recognition refers to static, controlled full frontal portrait recognition. There are two major tasks in face recognition: (i) face detection and (ii) face verification.

3 A. Teoh, S. A. Samad, A. Hussain Input face Face Detection Face extraction & Eye detection Identification Key Model Selection Face Normalization Accept/Reject Face Verification Output face Figure Face Verification System In our system as shown in figure, the Eigenface approach (Moghaddam and Pentland, 995) is used in the face detection and face recognition modules. The main idea of the Eigenface approach is to find the vectors that best account for the distribution of face images within the entire image space and define as the face space. Face spaces are eigenvectors of the covariance matrix corresponding to the original face images, and since they are face-like in appearance they are so are called eigenfaces as shown in Figure. Figure Eigenface

4 Now let the training set of face images be i, i,, i m, the average face of the set is defined as M i = i j () M j= where M is the total number of images. Each face differs from the average by the vector φ n = i n i. A covariance matrix is constructed where: C = M j= φ φ j T j = AA where A = [φ φ φ M ]. T () Then, eigenvectors, v k and eigenvalues, λ k with symmetric matrix C are calculated. v k determine the linear combination of M difference images with φ to form the eigenfaces: M u l = v lk φ k l=,,m (3) k= From these eigenfaces, K(<M) eigenfaces are selected to correspond to the K highest eigenvalues. Face detection is accomplished by calculating the sum of the square error between a region of the scene and the Eigenface, a measure of Distance From Face Space (DFFS) that indicates a measure of how face-like a region. If a window, φ is swept across the scene, to find the DFFS at each location, the most probable location of the face can be estimated. This will simply be the point where the reconstruction error, ε has the minimum value. is the projection into face- where space. ε = φ (4) φ f φ f From the extracted face, eye co-ordinate will be determined with the hybrid rule based approach and contour mapping technique (Samad, 00). Based on the information obtained, scale normalization and lighting normalization are applied for a head in box format. The Eigenface-based face recognition method is divided into two stages: (i) the training stage, (ii) the operational stage (Turk and Pentland, 99). At the training stage, a set of normalized face images, {i} that best describe the distribution of the training facial images in a lower dimensional subspace (eigenface) is computed by the operation: ϖ = u ( i i ) (5) k k n where n =,,M and k=,,k Next, the training facial images are projected onto the eigenspace, Ω i, to generate the representations of the facials images in eigenface. Ω i = [ϖ n, ϖ n,, ϖ nk ] (6) where i=,,...,m. At the operational stage, an incoming facial image is projected onto the same eigenspace and the similarity measure which is the Mahalanobis distance between the input facial image and the template is, thus, computed in the eigenspace. 0 Let ϕ denote the representation of the input face image with claimed identity C and C ϕ denote the representation of the Cth 0 template. The similarity function between ϕ C and ϕ is defined as follows: 0 C 0 C F (ϕ,ϕ ) = ϕ - ϕ m (7) where m denotes the Mahalanobis distance. 6

5 Nearest Neighbourhood Classifiers in Biometric Fusion. Speaker Verification Anatomical variations that naturally occur amongst different people and the differences in their learned speaking habits manifest themselves as differences in the acoustic properties of the speech signal. By analyzing and identifying these differences, it is possible to discriminate among speakers (Champbell, 997). Our front end of the speech module aims to extract the user dependent information. The system includes three important stages: endpoint detection, feature extraction and pattern comparison. The endpoint detection stage aims to remove silent parts from the raw audio signal, as this part does not convey speaker dependent information. Noise reduction techniques are used to reduce the noise from the speech signal. Simple spectral subtraction (Martin, 994) is first used to remove additive noise prior to endpoint detection. Then, in order to cope with the channel distortion or convolution noise that is introduced by a microphone, the zero th order cepstral coefficients are discarded and the remaining coefficients are appended with delta feature coefficients (Rabiner and Juang, 993). In addition, the cepstral components are weighted adaptively to emphasize the narrow-band components and suppress the broadband components (Zilovic et al., 997). The cleaned audio signal is converted to a th order linear prediction cepstral coefficients (LPCC), using the autocorrelation method that leads to a 4 dimensional vector for every utterance. The significant improvement of verification rate by using this combination can be found in paper (Samad, 00). Figure 3 shows the process used in front end module. Noisy signal Additive noise reduction - spectral suppression Endpoint detection - energy and zero crossing rate Coefficient features Feature extraction - LPC Convolution noise reduction - delta coefficients -.adaptive component weighting - zero th order cepstral. Figure 3 The front-end of the speaker verification module. As with the face recognition module, the speaker verification module also consists of two stages: (i) the training stage and (ii) the operational stage. At training phase, two sample utterances with the same words from the same speaker are collected and trained using the modified k-mean algorithm (Wilpon and Rabiner, 985). The main advantages of this algorithm are the statistical consistency of the generated templates and their ability to cope with a wide range of individual speech variations in a speaker-independent environment. At the operational stage, we opted for a well-known pattern-matching algorithm Dynamic Time Warping (DTW) (Sakoe and Chiba, 97) to compute the distance between the trained template and the input sample. 0 Let ϕ represent the input speech sample with the claimed identity C and ϕ C International Journal of The Computer, the Internet and Management Vol. # (January April, 004) pp

6 Cth template. The similarity function between ϕ and ϕ is defined as follows: 0 C F (ϕ,ϕ ) = ϕ - ϕ (8) 0 C 0 C where denotes the distance score result from DTW. 3. Fusion Decision Module 3. k NN (Nearest Neighborhood) Classifier The k-nn classifier (Duda and Hart, 973) is a simple classifier that needs no specific training phase. All that are required are reference data points for both classes representing the genuine and the imposter. A pattern x s to be classified is then attributed with the same class label as the label of the majority of its k nearest reference neighbors. To find the k nearest neighbors, the Euclidean distance between the test point and all the reference points is calculated. The distances are then ranked in ascending order and the reference points corresponding to the k smallest Euclidean distances are taken. The exhaustive distance calculation step during the test phase leads rapidly to large computing time, which is the major drawback of this otherwise very simple algorithm. A special case of the k-nn classifier can be obtained when k =. In this case, the classifier is called the Nearest Neighbor (NN) classifier. 3. Evidence Theoretic k-nn Classifier Based On Dempster-Safer Theory In Dempster-Shafer theory, a problem is represented by a set of Θ of mutually exclusive and exhaustive hypotheses called the frame of discernment (Safer, 976). A basic belief assignment (BBA) is a function m : Θ [0 ] verifying m(ø) = 0 and Σ A Θ.m(A) =. The quantity m(a) can be interpreted as the measure of the belief that is committed exactly to A, given the available evidence. Two evidential functions derived from the BBA are the credibility function Bel and the plausibility function Pl defined respectively as Bel(A) = Σ B A.m(B) and Pl(A) = Σ A B φ m(b) for all A Θ. A probability distribution P such that Bel(H n ) P(H n ) Pl(H n ) for any subset A of Θ is said to be compatible with m. An example of such a probability distribution is the pignistic probability distribution BetP defined for each single hypothesis θ Θ as BetP (θ) = θ A m( A ) A (9) Any subset A of Θ such that m(a) > 0 is called a focal element of m. Given two BBAs m and m representing two independent sources of evidence, the Dempster-Shafer s rule defined a new BBA m = m m verifying m(φ) = 0 and m( A ) = K A B = A where K is defined by m ( A ).m ( A ) (0) K = m ( A ).m ( A ) () A B φ for all A φ. For bimodal biometric verification system, we consider the problem of classifying entities into M= categories or classes. The set of classes is denoted by Ω = {ω, ω }. The available information is assumed to consist in a training set T = {(x (),ω () ),..., (x N,ω N )} of dimensional patterns x (i), i =,, N and their corresponding class labels ω i, i=, taking values in Ω. The similarity between patterns 8

7 Nearest Neighbourhood Classifiers in Biometric Fusion is assumed to be correctly measured by a certain distance function d(, ). Let x be the test input to be classified on the basis of the information contained in T. Each pair (x i,ω i ) constitutes a distinct item of evidence regarding the class membership of x. If x is close to x i according to the relevant metric d, then one will be inclined to believe that both vectors belong to the same class. On the contrary, if d(x,x i ) is very large, then the consideration of x i will leave us in a situation of almost complete ignorance concerning the class of x. Consequently, this item of evidence may be postulated to induce a basic belief assignment (BBA) m( x i ) over Ω defined by: m({ω q } x i ) = αφ q (d i ) () m(ω x i ) = - αφ q (d i ) (3) m(a x i ) = 0, A Ω \ {Ω,{ω q }} (4) where d i = d(x,x i ), ω q is the class of x i (ω i = ω q ), α is a parameter such as 0 < α < and φ q is a decreasing function verifying φ q (0) = and lim d φ q (d) = 0. When d denotes Euclidean distance, a rational choice for φ q to be φ q (d) = exp(-γ q d ) (5) γ q being a positive parameter associated to class ω q. As a result of considering each training pattern in turn, we obtain N BBAs that can be combined using Demster s rule of combination to form a resulting BBA m synthesizing one s final belief regarding the class of x. m = m( x ) m( x N ) (6) Since those training patterns situated far from x actually provide very little information, it is sufficient to consider the k nearest neighbors of x in this sum. An alternative definition of m is therefore m = m( x (i ) ) m( x (i k ) ) (7) where I k = {i,..., i k }contains the indices of the k nearest neighbors of x in T. This can be illustrated in below: x x BBA BBA x k BBA k m=m( x (i ) ) m( x (i k ) ) returns two BBA. That is Training set for class and class respectively Test point Figure 4 Evidence theoretic k-nn classifier International Journal of The Computer, the Internet and Management Vol. # (January April, 004) pp

8 A. Teoh, S. A. Samad, A. Hussain The k nearest neighbors of x can be regarded as k independent sources of information, each one represented by a BBA. Note that the calculation of m involves the combination of k simple BBAs, and therefore can be performed in linear time with respect to the number of classes. With adopt the definition in equation (0), () and (7), m can be shown to have the following expression: i i m({ ωq}) = ( ( αφq ( d ))) ( αφr ( d )) K m(ω) = K i I k, q r i Ik, r r q i I k, r q {,} (8) i ( αφ ( d )) (9) where I k,q is the subset of I k corresponding to those neighbors of x belonging to class ω q and K is a normalizing factor. Hence the focal elements of m are singletons and the whole frame Ω. Consequently, the credibility and the plausibility of each class ω q are respectively equal to: bel({ω q }) = m({ω q }) (0) pl({ω q }) = m({ω q }) + m(ω) () As for the pignistic probability in eq(9), we can write in the form: BetP({ω q }) = m({ω q }) + m(ω)/m () A decision is made by assigning a pattern to the class ω qmax with maximum credibility (or equivalently, with maximum plausibility or pignistic probability): qmax = arg max q m({ω q }) (3) r The main advantage of evidence theoretic k-nn classifier over the other classifiers is that reject options are provided (Hellman, 970). Ambiguity reject is required when the pattern under consideration is located close to class boundaries. In this case, the probability of misclassification is high, and it may be preferable to postpone decision making. Distance reject is applied when the pattern is situated far from all known classes. In such a situation, it may be assumed that this pattern actually belongs to an unknown class that is not represented in the training set. However, the distance rejection is not suited to the identity verification application because the classes are already known. Given a vector x to be classified, ambiguity reject can be decided by comparing conf to a user defined threshold k r (0 k r ): If conf k r, then x is ambiguityrejected (4) 3.0 Experiments and Discussion 3. Distance score normalization The similarity measure values from equations (7) and (8) have different ranges and hence cannot be fused directly. They have to be mapped into a common score interval between [0 ]. A high score indicates the person is genuine, while a low opinion suggests the person is an imposter. The opinions from the modality experts are used by a fusion stage also referred to as a decision stage. It considers the opinions and makes the final decision to either accept or reject the claim.

9 Nearest Neighbourhood Classifiers in Biometric Fusion The bimodal biometric system here is designed as shown in Figure 5.. Speech utterance Face image Speech Expert Face Expert Normalized score Fusion Stage Accept/ Reject Figure 5 The building block of the bimodal face and speech verification system From the distance scores, x, that is produced by the speech and face databases, the mean, µ, and the variance, σ of the distance values of the speech and face expert, respectively are found separately by performing validation experiments on the database. The distance score is then normalized by mapping it to the range [-,] using y = x µ (5) σ The [-,] interval corresponds to the approximately linear changing portion of the sigmoid function f ( y) = + exp( y) (6) used to map the values to the [0,] interval. Figure 6 shows the distribution plot for the genuine and imposter reference points obtained for the mapping technique. Legend: Genuine Reference Point Imposter Reference Point Figure 6 The distribution plot for the genuine and imposter reference point International Journal of The Computer, the Internet and Management Vol. # (January April, 004) pp

10 A. Teoh, S. A. Samad, A. Hussain 3. Performance Criteria The basic error measure of a verification system are false acceptance rate (FAR) and false rejection rate (FRR) as defined in equations (7) and (8). FAR = Number of accepted imposter claims Total number of imposter accesses x 00% (7) FRR = Number of rejected genuine claims Total number of genuine accesses x 00% (8) An unique measure can be obtained by combining these two errors into the total error rate (TER) or total success rate (TSR) where TER = FAR + FRR Total number of accesses x 00 (9) TSR = TER (30) For the individual experts, EER (i.e FAR = FRR ) is used to obtained their corresponding threshold value. For the targeted application that uses bimodal biometric verification system, the Minimum Total Misclassification Error (MTME) criterion is used, which means the system always tries to minimize ε as shown in equation (3) ε = min(fa +FR) (3) In order to apply this criterion, we set FAR<% while keeping the FRR to a minimum possible value. 3.3 Experimental Setup All experiments are performed using a face database obtained from Olivetti Research Lab (000), speech database contributed by Otago speech corpus (000) and Digit multi-modal Database (Sanderson, 000). Three sessions of the face database and speech database are used separately. The first enrollment session is used for training. This means that each access is used to model the respective genuine, yielding 60 different genuine models. In the second enrollment session, the accesses from each person are used to generate the validation data in two different manners. The first is to derive a single genuine access by matching the shot or utterance template of a specific person with his own reference model, and the other is to generate 59 impostor accesses by matching it to the 59 models of the other persons of the database. This simple strategy thus leads to 60 genuine and 3540 impostor accesses, which are used to validate the performance of the individual verification system and to calculate the thresholds for the equal error rate (EER) criterion. The third enrollment session is used to test these verification systems, using the thresholds calculated with the validation data set. 3.4 Experimental Results The performance of the speech and face expert is as shown in Table. FRR(%) FAR(%) TER(%) TSR(%) Speec Face Table Individual performance of the face and speech expert.

11 Nearest Neighbourhood Classifiers in Biometric Fusion From the values TSR in Table, we can observe that the experts are working equally well individually. The results shown in following Table are obtained by applying the k-nn technique. K FRR(%) FAR(%) TER(%) TSR(%) Table Results from k-nn fusion scheme From the Table, it can be observed that the FRR will increase but FAR decreases when k increases due to the unbalanced condition between the imposter number (3540) compared to genuine number (60). According to Verlinde and Chollet (000), the number of imposter can be reduced using the k-means algorithm since this operation induces a loss of information. It will create the cluster center points which can replace the actual imposter reference points. Thus, we can create varying R clusters and range k. The best experimental result is obtained at k=3 for the application targeted and the results are as shown in Table 3. R FRR(%) FAR(%) TER(%) TSR(%) Table 3 Results for Modified k-nn fusion technique. From Table 3, it is observed that the FRR increases and FAR decreases with R as expected. The optimal number of imposter prototypes R depends on the cost-function as specified by the application. While referring to the MTME criteria that states FAR<%, at the same time the FRR to a minimum possible value in experiments, we found that R=500 gives the best performance through the experiments. Although the TSR is smaller than the ordinary k-nn, it gives much lower FRR. By using the evidence theoretic k-nn classifier, the results as shown in Table 4 are obtained. k FRR (%) FAR (%) TER (%) TSR (%) Note rejected rejected rejected rejected rejected rejected Table 4 Results for evidence theoretic k- NN fusion based on Dempster-Shafer theory. From the table, we found that the results are insensitive to the choices of the value k and outperforms the ordinary and modified k NN classifiers. When k = 0 the smallest values for FRR and FAR are obtained. In addition, this classifier provides an uncertainty management engine which can be used to improve the system performance. In the operational system, the user will be asked to perform another session of authentication. 5. Conclusion The paper has shown fusion decision technique comparisons based on k-nn International Journal of The Computer, the Internet and Management Vol. # (January April, 004) pp

12 classifiers and its variations for a biometric verification system. The system consists of a speech and face experts developed separately and targeted for applications involving automatic verification using personal computers and their multimedia capturing devices. In addition, the system is designed to keep the rate as low as possible for the case when an imposter is accepted as being a genuine. The fusion decision schemes considered are both the ordinary and modified k-nn classifier and also evidence theoretic k-nn classifier based on Dempster- Shafer theory. From the experiments, it is found that the best result is obtained using the evidence theoretic k-nn classifier as it introduces low FAR and FRR compared to both the ordinary and modified k-nn classifier. It also provides an uncertainty management engine which can improve the system performance effectively. 6. Acknowledgement The authors are indebted to the Ministry of Science, Technology and Environment for funding this project under IRPA References Bigun, E., Bigun, J., Duc, B. and Fisher, S. (997), Expert conciliation for multi modal person authentication systems by Bayesian statistics. Proceedings of the first international conference on Audio and Video-based Biometric Person Authentication Brunelli, R. and Falavigna, D. (995), Personal Identification Using Multiple Cues. IEEE Trans. on Pattern Analysis and Machine Intelligence 7(0), Campbell, J. (997), Speaker Recognition, A tutorial. Proceeding of the IEEE 85(9), , September 997. Choudhury, T., Clarkson, B., Jebara, T. and Pentland, A. (999), Multimodal Person Recognition using Unconstrained Audio and Video. Second International Conference on Audio- and Video-based Biometric Person Authentication Olivetti Research Lab (000): Database of faces. facedatabase.html. Accessed APRIL 000. Denoeux, T. (994), A k-nearest neighbor classification rule based on Dempster- Safer theory. IEEE Trans Syst. Man. Cybern. SMC-5(5): Dieckmann, U., Plankensteiner, P. and Sesam, T. W. (997), A biometric person identification system using sensor fusion. Pattern recognition letters 8(9): Duc, B., Maýtre, G., Fischer, S and Bigun, J. (997), Person authentication by fusing face and speech information. Proceedings of the First International Conference on Audio and Video-based Biometric Person Authentication LNCS- 06:3-38. Duda, R. O. and Hart, P. E. (973), Pattern Classification and Scene Analysis. New York: John Wiley & Sons. Hellman, M. F. (970), The k nearest neighbor classification rule with a reject 34

13 Nearest Neighbourhood Classifiers in Biometric Fusion option. IEEE Trans Syst. Man. Cybern., vol. SMC-6(3), pp Hong, L. and Jain, A. (998), Integrating Faces and Fingerprints for Personal Identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 0(): Kittler, J., Hatef, M., Duin, R. P. W. and Matas, J. (998), On combining classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence, 0(3): Martin, R. (994), Spectral Subtraction Based on Minimum Statistics. Proc. Seventh European Signal Processing Conference Moghaddam, B. and Pentland, A. (995), Probabilistic Visual Learning for Object Detection. 5th International Conference on Computer Vision Otago (000), Otago Speech Corpus. o.html. Accessed MAC 000. Pigeon, S and Vandendorpe, L. (998), Multiple experts for robust face authentication. SPIE, editor, Optical security and counterfeit deterrence II 334: Rabiner, L. and Juang, B. H. (993), Fundamentals of speech recognition. United State: Prentice-Hall International, Inc. Safer, G. (976), A mathematical theory of evidence.princeton: Princeton University Press. Sakoe, H. and Chiba, S. A. (97), Dynamic Programming Approach To Continuous Speech Recognition. Proc. 7th Int. Congress Acoustics 0: C3. Samad, S. A., Hussein, A. and Teoh, A. (00), Eye Detection Using Hybrid Rule Based Method and Contour Mapping. Proceeding of the Sixth International Symposium on Signal Processing and Its Applications, pages , Kuala Lumpur, Malaysia, August 00. Samad, S. A., Hussein, A. and Teoh, A. (00): Increasing Robustness In A Speaker Verification System With Template Training And Noise Reduction Techniques. Proceedings of the International Conference on Information Technology and Multimedia, UNITEN, August 00. Sanderson, C. (00), Digit Database.0 - multimodal database for speaker identification/recognition. Accessed MAY 00. Turk, M. and Pentland, A. (99), Face Recognition Using Eigenfaces. Journal of Cognitive Neuroscience 3(): Verlinde, P. and Chollet, G. (999), Comparing decision fusion paradigms using k-nnbased classifiers, decision trees and logistic regression in a multimodal identity verification application. In Second International Conference on Audio and Video-based Biometric Person Authentication (AVBPA), Washington D. C., USA, March 999. Wilpon J. G. and Rabiner, L. R. (985), A Modified K-Means Clustering Algorithm For Use In Isolated Word Recognition. IEEE Trans, Acoustics Speech, Signal Proc. 33(3): International Journal of The Computer, the Internet and Management Vol. # (January April, 004) pp

14 Yacoub, S. B. (999), Multi-Modal Data Fusion for Person Authentication using SVM. Proceedings of the Second International Conference on Audio and Video-based Biometric Person Authentication (AVBPA'99) Zilovic, M. S., Ramachandran, R. P. and Mammone, R. J. (997), A Fast Algorithm For Finding The Adaptive Component Weighting Cepstrum For Speaker Recognition. IEEE Transactions on Speech & Audio Processing 5:

Handling imprecise and uncertain class labels in classification and clustering

Handling imprecise and uncertain class labels in classification and clustering Handling imprecise and uncertain class labels in classification and clustering Thierry Denœux 1 1 Université de Technologie de Compiègne HEUDIASYC (UMR CNRS 6599) COST Action IC 0702 Working group C, Mallorca,

More information

Multimodal Biometric Fusion Joint Typist (Keystroke) and Speaker Verification

Multimodal Biometric Fusion Joint Typist (Keystroke) and Speaker Verification Multimodal Biometric Fusion Joint Typist (Keystroke) and Speaker Verification Jugurta R. Montalvão Filho and Eduardo O. Freire Abstract Identity verification through fusion of features from keystroke dynamics

More information

Automatic Identity Verification Using Face Images

Automatic Identity Verification Using Face Images Automatic Identity Verification Using Face Images Sabry F. Saraya and John F. W. Zaki Computer & Systems Eng. Dept. Faculty of Engineering Mansoura University. Abstract This paper presents two types of

More information

Eigenface-based facial recognition

Eigenface-based facial recognition Eigenface-based facial recognition Dimitri PISSARENKO December 1, 2002 1 General This document is based upon Turk and Pentland (1991b), Turk and Pentland (1991a) and Smith (2002). 2 How does it work? The

More information

Score Normalization in Multimodal Biometric Systems

Score Normalization in Multimodal Biometric Systems Score Normalization in Multimodal Biometric Systems Karthik Nandakumar and Anil K. Jain Michigan State University, East Lansing, MI Arun A. Ross West Virginia University, Morgantown, WV http://biometrics.cse.mse.edu

More information

EEL 851: Biometrics. An Overview of Statistical Pattern Recognition EEL 851 1

EEL 851: Biometrics. An Overview of Statistical Pattern Recognition EEL 851 1 EEL 851: Biometrics An Overview of Statistical Pattern Recognition EEL 851 1 Outline Introduction Pattern Feature Noise Example Problem Analysis Segmentation Feature Extraction Classification Design Cycle

More information

Dimensionality Reduction Using PCA/LDA. Hongyu Li School of Software Engineering TongJi University Fall, 2014

Dimensionality Reduction Using PCA/LDA. Hongyu Li School of Software Engineering TongJi University Fall, 2014 Dimensionality Reduction Using PCA/LDA Hongyu Li School of Software Engineering TongJi University Fall, 2014 Dimensionality Reduction One approach to deal with high dimensional data is by reducing their

More information

A novel k-nn approach for data with uncertain attribute values

A novel k-nn approach for data with uncertain attribute values A novel -NN approach for data with uncertain attribute values Asma Trabelsi 1,2, Zied Elouedi 1, and Eric Lefevre 2 1 Université de Tunis, Institut Supérieur de Gestion de Tunis, LARODEC, Tunisia trabelsyasma@gmail.com,zied.elouedi@gmx.fr

More information

Dynamic Linear Combination of Two-Class Classifiers

Dynamic Linear Combination of Two-Class Classifiers Dynamic Linear Combination of Two-Class Classifiers Carlo Lobrano 1, Roberto Tronci 1,2, Giorgio Giacinto 1, and Fabio Roli 1 1 DIEE Dept. of Electrical and Electronic Engineering, University of Cagliari,

More information

Comparative Assessment of Independent Component. Component Analysis (ICA) for Face Recognition.

Comparative Assessment of Independent Component. Component Analysis (ICA) for Face Recognition. Appears in the Second International Conference on Audio- and Video-based Biometric Person Authentication, AVBPA 99, ashington D. C. USA, March 22-2, 1999. Comparative Assessment of Independent Component

More information

If you wish to cite this paper, please use the following reference:

If you wish to cite this paper, please use the following reference: This is an accepted version of a paper published in Proceedings of the st IEEE International Workshop on Information Forensics and Security (WIFS 2009). If you wish to cite this paper, please use the following

More information

Lecture: Face Recognition

Lecture: Face Recognition Lecture: Face Recognition Juan Carlos Niebles and Ranjay Krishna Stanford Vision and Learning Lab Lecture 12-1 What we will learn today Introduction to face recognition The Eigenfaces Algorithm Linear

More information

I D I A P R E S E A R C H R E P O R T. Samy Bengio a. November submitted for publication

I D I A P R E S E A R C H R E P O R T. Samy Bengio a. November submitted for publication R E S E A R C H R E P O R T I D I A P Why Do Multi-Stream, Multi-Band and Multi-Modal Approaches Work on Biometric User Authentication Tasks? Norman Poh Hoon Thian a IDIAP RR 03-59 November 2003 Samy Bengio

More information

Likelihood Ratio Based Biometric Score Fusion

Likelihood Ratio Based Biometric Score Fusion 1 To appear in IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007 Based Biometric Score Fusion Karthik Nandakumar, Student Member, IEEE, Yi Chen, Student Member, IEEE, Sarat C. Dass,

More information

Estimation of Relative Operating Characteristics of Text Independent Speaker Verification

Estimation of Relative Operating Characteristics of Text Independent Speaker Verification International Journal of Engineering Science Invention Volume 1 Issue 1 December. 2012 PP.18-23 Estimation of Relative Operating Characteristics of Text Independent Speaker Verification Palivela Hema 1,

More information

ECE 661: Homework 10 Fall 2014

ECE 661: Homework 10 Fall 2014 ECE 661: Homework 10 Fall 2014 This homework consists of the following two parts: (1) Face recognition with PCA and LDA for dimensionality reduction and the nearest-neighborhood rule for classification;

More information

Robust Speaker Identification

Robust Speaker Identification Robust Speaker Identification by Smarajit Bose Interdisciplinary Statistical Research Unit Indian Statistical Institute, Kolkata Joint work with Amita Pal and Ayanendranath Basu Overview } } } } } } }

More information

Face Detection and Recognition

Face Detection and Recognition Face Detection and Recognition Face Recognition Problem Reading: Chapter 18.10 and, optionally, Face Recognition using Eigenfaces by M. Turk and A. Pentland Queryimage face query database Face Verification

More information

A Modified Incremental Principal Component Analysis for On-line Learning of Feature Space and Classifier

A Modified Incremental Principal Component Analysis for On-line Learning of Feature Space and Classifier A Modified Incremental Principal Component Analysis for On-line Learning of Feature Space and Classifier Seiichi Ozawa, Shaoning Pang, and Nikola Kasabov Graduate School of Science and Technology, Kobe

More information

Keywords Eigenface, face recognition, kernel principal component analysis, machine learning. II. LITERATURE REVIEW & OVERVIEW OF PROPOSED METHODOLOGY

Keywords Eigenface, face recognition, kernel principal component analysis, machine learning. II. LITERATURE REVIEW & OVERVIEW OF PROPOSED METHODOLOGY Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Eigenface and

More information

Two-Layered Face Detection System using Evolutionary Algorithm

Two-Layered Face Detection System using Evolutionary Algorithm Two-Layered Face Detection System using Evolutionary Algorithm Jun-Su Jang Jong-Hwan Kim Dept. of Electrical Engineering and Computer Science, Korea Advanced Institute of Science and Technology (KAIST),

More information

Pattern Recognition 2

Pattern Recognition 2 Pattern Recognition 2 KNN,, Dr. Terence Sim School of Computing National University of Singapore Outline 1 2 3 4 5 Outline 1 2 3 4 5 The Bayes Classifier is theoretically optimum. That is, prob. of error

More information

COS 429: COMPUTER VISON Face Recognition

COS 429: COMPUTER VISON Face Recognition COS 429: COMPUTER VISON Face Recognition Intro to recognition PCA and Eigenfaces LDA and Fisherfaces Face detection: Viola & Jones (Optional) generic object models for faces: the Constellation Model Reading:

More information

Fusion of Dependent and Independent Biometric Information Sources

Fusion of Dependent and Independent Biometric Information Sources Fusion of Dependent and Independent Biometric Information Sources Dongliang Huang ECE, University of Calgary Henry Leung ECE, University of Calgary Winston Li ECE, University of Calgary Department of Electrical

More information

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY [Gaurav, 2(1): Jan., 2013] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Face Identification & Detection Using Eigenfaces Sachin.S.Gurav *1, K.R.Desai 2 *1

More information

Information Fusion for Local Gabor Features Based Frontal Face Verification

Information Fusion for Local Gabor Features Based Frontal Face Verification Information Fusion for Local Gabor Features Based Frontal Face Verification Enrique Argones Rúa 1, Josef Kittler 2, Jose Luis Alba Castro 1, and Daniel González Jiménez 1 1 Signal Theory Group, Signal

More information

Sound Recognition in Mixtures

Sound Recognition in Mixtures Sound Recognition in Mixtures Juhan Nam, Gautham J. Mysore 2, and Paris Smaragdis 2,3 Center for Computer Research in Music and Acoustics, Stanford University, 2 Advanced Technology Labs, Adobe Systems

More information

A Modified Incremental Principal Component Analysis for On-Line Learning of Feature Space and Classifier

A Modified Incremental Principal Component Analysis for On-Line Learning of Feature Space and Classifier A Modified Incremental Principal Component Analysis for On-Line Learning of Feature Space and Classifier Seiichi Ozawa 1, Shaoning Pang 2, and Nikola Kasabov 2 1 Graduate School of Science and Technology,

More information

A Unified Bayesian Framework for Face Recognition

A Unified Bayesian Framework for Face Recognition Appears in the IEEE Signal Processing Society International Conference on Image Processing, ICIP, October 4-7,, Chicago, Illinois, USA A Unified Bayesian Framework for Face Recognition Chengjun Liu and

More information

Support Vector Machines using GMM Supervectors for Speaker Verification

Support Vector Machines using GMM Supervectors for Speaker Verification 1 Support Vector Machines using GMM Supervectors for Speaker Verification W. M. Campbell, D. E. Sturim, D. A. Reynolds MIT Lincoln Laboratory 244 Wood Street Lexington, MA 02420 Corresponding author e-mail:

More information

Speaker Verification Using Accumulative Vectors with Support Vector Machines

Speaker Verification Using Accumulative Vectors with Support Vector Machines Speaker Verification Using Accumulative Vectors with Support Vector Machines Manuel Aguado Martínez, Gabriel Hernández-Sierra, and José Ramón Calvo de Lara Advanced Technologies Application Center, Havana,

More information

BIOMETRIC verification systems are used to verify the

BIOMETRIC verification systems are used to verify the 86 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 1, JANUARY 2004 Likelihood-Ratio-Based Biometric Verification Asker M. Bazen and Raymond N. J. Veldhuis Abstract This paper

More information

Example: Face Detection

Example: Face Detection Announcements HW1 returned New attendance policy Face Recognition: Dimensionality Reduction On time: 1 point Five minutes or more late: 0.5 points Absent: 0 points Biometrics CSE 190 Lecture 14 CSE190,

More information

Error Rates. Error vs Threshold. ROC Curve. Biometrics: A Pattern Recognition System. Pattern classification. Biometrics CSE 190 Lecture 3

Error Rates. Error vs Threshold. ROC Curve. Biometrics: A Pattern Recognition System. Pattern classification. Biometrics CSE 190 Lecture 3 Biometrics: A Pattern Recognition System Yes/No Pattern classification Biometrics CSE 190 Lecture 3 Authentication False accept rate (FAR): Proportion of imposters accepted False reject rate (FRR): Proportion

More information

Lecture 24: Principal Component Analysis. Aykut Erdem May 2016 Hacettepe University

Lecture 24: Principal Component Analysis. Aykut Erdem May 2016 Hacettepe University Lecture 4: Principal Component Analysis Aykut Erdem May 016 Hacettepe University This week Motivation PCA algorithms Applications PCA shortcomings Autoencoders Kernel PCA PCA Applications Data Visualization

More information

Face detection and recognition. Detection Recognition Sally

Face detection and recognition. Detection Recognition Sally Face detection and recognition Detection Recognition Sally Face detection & recognition Viola & Jones detector Available in open CV Face recognition Eigenfaces for face recognition Metric learning identification

More information

PCA & ICA. CE-717: Machine Learning Sharif University of Technology Spring Soleymani

PCA & ICA. CE-717: Machine Learning Sharif University of Technology Spring Soleymani PCA & ICA CE-717: Machine Learning Sharif University of Technology Spring 2015 Soleymani Dimensionality Reduction: Feature Selection vs. Feature Extraction Feature selection Select a subset of a given

More information

Score calibration for optimal biometric identification

Score calibration for optimal biometric identification Score calibration for optimal biometric identification (see also NIST IBPC 2010 online proceedings: http://biometrics.nist.gov/ibpc2010) AI/GI/CRV 2010, Ottawa Dmitry O. Gorodnichy Head of Video Surveillance

More information

Combining evidence in personal identity verification systems

Combining evidence in personal identity verification systems Pattern Recognition Letters ELSEVIER Pattern Recognition Letters 18 (1997) 845-852 Combining evidence in personal identity verification systems J. Kittler *, J. Matas 1, K. Jonsson, M.U. Ramos S~nchez

More information

Reconnaissance d objetsd et vision artificielle

Reconnaissance d objetsd et vision artificielle Reconnaissance d objetsd et vision artificielle http://www.di.ens.fr/willow/teaching/recvis09 Lecture 6 Face recognition Face detection Neural nets Attention! Troisième exercice de programmation du le

More information

Recognition Using Class Specific Linear Projection. Magali Segal Stolrasky Nadav Ben Jakov April, 2015

Recognition Using Class Specific Linear Projection. Magali Segal Stolrasky Nadav Ben Jakov April, 2015 Recognition Using Class Specific Linear Projection Magali Segal Stolrasky Nadav Ben Jakov April, 2015 Articles Eigenfaces vs. Fisherfaces Recognition Using Class Specific Linear Projection, Peter N. Belhumeur,

More information

PCA FACE RECOGNITION

PCA FACE RECOGNITION PCA FACE RECOGNITION The slides are from several sources through James Hays (Brown); Srinivasa Narasimhan (CMU); Silvio Savarese (U. of Michigan); Shree Nayar (Columbia) including their own slides. Goal

More information

Hierarchical Proportional Redistribution Principle for Uncertainty Reduction and BBA Approximation

Hierarchical Proportional Redistribution Principle for Uncertainty Reduction and BBA Approximation Hierarchical Proportional Redistribution Principle for Uncertainty Reduction and BBA Approximation Jean Dezert Deqiang Han Zhun-ga Liu Jean-Marc Tacnet Abstract Dempster-Shafer evidence theory is very

More information

Sensitivity of the Elucidative Fusion System to the Choice of the Underlying Similarity Metric

Sensitivity of the Elucidative Fusion System to the Choice of the Underlying Similarity Metric Sensitivity of the Elucidative Fusion System to the Choice of the Underlying Similarity Metric Belur V. Dasarathy Dynetics, Inc., P. O. Box 5500 Huntsville, AL. 35814-5500, USA Belur.d@dynetics.com Abstract

More information

Face Recognition Using Eigenfaces

Face Recognition Using Eigenfaces Face Recognition Using Eigenfaces Prof. V.P. Kshirsagar, M.R.Baviskar, M.E.Gaikwad, Dept. of CSE, Govt. Engineering College, Aurangabad (MS), India. vkshirsagar@gmail.com, madhumita_baviskar@yahoo.co.in,

More information

Random Sampling LDA for Face Recognition

Random Sampling LDA for Face Recognition Random Sampling LDA for Face Recognition Xiaogang Wang and Xiaoou ang Department of Information Engineering he Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk Abstract Linear Discriminant

More information

Eigenimaging for Facial Recognition

Eigenimaging for Facial Recognition Eigenimaging for Facial Recognition Aaron Kosmatin, Clayton Broman December 2, 21 Abstract The interest of this paper is Principal Component Analysis, specifically its area of application to facial recognition

More information

CITS 4402 Computer Vision

CITS 4402 Computer Vision CITS 4402 Computer Vision A/Prof Ajmal Mian Adj/A/Prof Mehdi Ravanbakhsh Lecture 06 Object Recognition Objectives To understand the concept of image based object recognition To learn how to match images

More information

Image Analysis. PCA and Eigenfaces

Image Analysis. PCA and Eigenfaces Image Analysis PCA and Eigenfaces Christophoros Nikou cnikou@cs.uoi.gr Images taken from: D. Forsyth and J. Ponce. Computer Vision: A Modern Approach, Prentice Hall, 2003. Computer Vision course by Svetlana

More information

How to Deal with Multiple-Targets in Speaker Identification Systems?

How to Deal with Multiple-Targets in Speaker Identification Systems? How to Deal with Multiple-Targets in Speaker Identification Systems? Yaniv Zigel and Moshe Wasserblat ICE Systems Ltd., Audio Analysis Group, P.O.B. 690 Ra anana 4307, Israel yanivz@nice.com Abstract In

More information

System 1 (last lecture) : limited to rigidly structured shapes. System 2 : recognition of a class of varying shapes. Need to:

System 1 (last lecture) : limited to rigidly structured shapes. System 2 : recognition of a class of varying shapes. Need to: System 2 : Modelling & Recognising Modelling and Recognising Classes of Classes of Shapes Shape : PDM & PCA All the same shape? System 1 (last lecture) : limited to rigidly structured shapes System 2 :

More information

Speaker Recognition Using Artificial Neural Networks: RBFNNs vs. EBFNNs

Speaker Recognition Using Artificial Neural Networks: RBFNNs vs. EBFNNs Speaer Recognition Using Artificial Neural Networs: s vs. s BALASKA Nawel ember of the Sstems & Control Research Group within the LRES Lab., Universit 20 Août 55 of Sida, BP: 26, Sida, 21000, Algeria E-mail

More information

IDIAP. Martigny - Valais - Suisse ADJUSTMENT FOR THE COMPENSATION OF MODEL MISMATCH IN SPEAKER VERIFICATION. Frederic BIMBOT + Dominique GENOUD *

IDIAP. Martigny - Valais - Suisse ADJUSTMENT FOR THE COMPENSATION OF MODEL MISMATCH IN SPEAKER VERIFICATION. Frederic BIMBOT + Dominique GENOUD * R E S E A R C H R E P O R T IDIAP IDIAP Martigny - Valais - Suisse LIKELIHOOD RATIO ADJUSTMENT FOR THE COMPENSATION OF MODEL MISMATCH IN SPEAKER VERIFICATION Frederic BIMBOT + Dominique GENOUD * IDIAP{RR

More information

arxiv: v1 [cs.ai] 28 Oct 2013

arxiv: v1 [cs.ai] 28 Oct 2013 Ranking basic belief assignments in decision making under uncertain environment arxiv:30.7442v [cs.ai] 28 Oct 203 Yuxian Du a, Shiyu Chen a, Yong Hu b, Felix T.S. Chan c, Sankaran Mahadevan d, Yong Deng

More information

L11: Pattern recognition principles

L11: Pattern recognition principles L11: Pattern recognition principles Bayesian decision theory Statistical classifiers Dimensionality reduction Clustering This lecture is partly based on [Huang, Acero and Hon, 2001, ch. 4] Introduction

More information

Shankar Shivappa University of California, San Diego April 26, CSE 254 Seminar in learning algorithms

Shankar Shivappa University of California, San Diego April 26, CSE 254 Seminar in learning algorithms Recognition of Visual Speech Elements Using Adaptively Boosted Hidden Markov Models. Say Wei Foo, Yong Lian, Liang Dong. IEEE Transactions on Circuits and Systems for Video Technology, May 2004. Shankar

More information

Principles of Pattern Recognition. C. A. Murthy Machine Intelligence Unit Indian Statistical Institute Kolkata

Principles of Pattern Recognition. C. A. Murthy Machine Intelligence Unit Indian Statistical Institute Kolkata Principles of Pattern Recognition C. A. Murthy Machine Intelligence Unit Indian Statistical Institute Kolkata e-mail: murthy@isical.ac.in Pattern Recognition Measurement Space > Feature Space >Decision

More information

When enough is enough: early stopping of biometrics error rate testing

When enough is enough: early stopping of biometrics error rate testing When enough is enough: early stopping of biometrics error rate testing Michael E. Schuckers Department of Mathematics, Computer Science and Statistics St. Lawrence University and Center for Identification

More information

Robot Image Credit: Viktoriya Sukhanova 123RF.com. Dimensionality Reduction

Robot Image Credit: Viktoriya Sukhanova 123RF.com. Dimensionality Reduction Robot Image Credit: Viktoriya Sukhanova 13RF.com Dimensionality Reduction Feature Selection vs. Dimensionality Reduction Feature Selection (last time) Select a subset of features. When classifying novel

More information

Principal Component Analysis

Principal Component Analysis B: Chapter 1 HTF: Chapter 1.5 Principal Component Analysis Barnabás Póczos University of Alberta Nov, 009 Contents Motivation PCA algorithms Applications Face recognition Facial expression recognition

More information

Sequential adaptive combination of unreliable sources of evidence

Sequential adaptive combination of unreliable sources of evidence Sequential adaptive combination of unreliable sources of evidence Zhun-ga Liu, Quan Pan, Yong-mei Cheng School of Automation Northwestern Polytechnical University Xi an, China Email: liuzhunga@gmail.com

More information

Facial Expression Recognition using Eigenfaces and SVM

Facial Expression Recognition using Eigenfaces and SVM Facial Expression Recognition using Eigenfaces and SVM Prof. Lalita B. Patil Assistant Professor Dept of Electronics and Telecommunication, MGMCET, Kamothe, Navi Mumbai (Maharashtra), INDIA. Prof.V.R.Bhosale

More information

A Generative Model Based Kernel for SVM Classification in Multimedia Applications

A Generative Model Based Kernel for SVM Classification in Multimedia Applications Appears in Neural Information Processing Systems, Vancouver, Canada, 2003. A Generative Model Based Kernel for SVM Classification in Multimedia Applications Pedro J. Moreno Purdy P. Ho Hewlett-Packard

More information

Maximum Likelihood and Maximum A Posteriori Adaptation for Distributed Speaker Recognition Systems

Maximum Likelihood and Maximum A Posteriori Adaptation for Distributed Speaker Recognition Systems Maximum Likelihood and Maximum A Posteriori Adaptation for Distributed Speaker Recognition Systems Chin-Hung Sit 1, Man-Wai Mak 1, and Sun-Yuan Kung 2 1 Center for Multimedia Signal Processing Dept. of

More information

Mixtures of Gaussians with Sparse Regression Matrices. Constantinos Boulis, Jeffrey Bilmes

Mixtures of Gaussians with Sparse Regression Matrices. Constantinos Boulis, Jeffrey Bilmes Mixtures of Gaussians with Sparse Regression Matrices Constantinos Boulis, Jeffrey Bilmes {boulis,bilmes}@ee.washington.edu Dept of EE, University of Washington Seattle WA, 98195-2500 UW Electrical Engineering

More information

Lecture 13 Visual recognition

Lecture 13 Visual recognition Lecture 13 Visual recognition Announcements Silvio Savarese Lecture 13-20-Feb-14 Lecture 13 Visual recognition Object classification bag of words models Discriminative methods Generative methods Object

More information

Eigenfaces. Face Recognition Using Principal Components Analysis

Eigenfaces. Face Recognition Using Principal Components Analysis Eigenfaces Face Recognition Using Principal Components Analysis M. Turk, A. Pentland, "Eigenfaces for Recognition", Journal of Cognitive Neuroscience, 3(1), pp. 71-86, 1991. Slides : George Bebis, UNR

More information

Machine Learning 2017

Machine Learning 2017 Machine Learning 2017 Volker Roth Department of Mathematics & Computer Science University of Basel 21st March 2017 Volker Roth (University of Basel) Machine Learning 2017 21st March 2017 1 / 41 Section

More information

Analytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System

Analytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System Volume Issue 8, November 4, ISSN No.: 348 89 3 Analytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System Divya Singhal, Ajay Kumar Yadav M.Tech, EC Department,

More information

Face recognition Computer Vision Spring 2018, Lecture 21

Face recognition Computer Vision Spring 2018, Lecture 21 Face recognition http://www.cs.cmu.edu/~16385/ 16-385 Computer Vision Spring 2018, Lecture 21 Course announcements Homework 6 has been posted and is due on April 27 th. - Any questions about the homework?

More information

Multiple Similarities Based Kernel Subspace Learning for Image Classification

Multiple Similarities Based Kernel Subspace Learning for Image Classification Multiple Similarities Based Kernel Subspace Learning for Image Classification Wang Yan, Qingshan Liu, Hanqing Lu, and Songde Ma National Laboratory of Pattern Recognition, Institute of Automation, Chinese

More information

Brief Introduction of Machine Learning Techniques for Content Analysis

Brief Introduction of Machine Learning Techniques for Content Analysis 1 Brief Introduction of Machine Learning Techniques for Content Analysis Wei-Ta Chu 2008/11/20 Outline 2 Overview Gaussian Mixture Model (GMM) Hidden Markov Model (HMM) Support Vector Machine (SVM) Overview

More information

STUDY ON METHODS FOR COMPUTER-AIDED TOOTH SHADE DETERMINATION

STUDY ON METHODS FOR COMPUTER-AIDED TOOTH SHADE DETERMINATION INTERNATIONAL JOURNAL OF INFORMATION AND SYSTEMS SCIENCES Volume 5, Number 3-4, Pages 351 358 c 2009 Institute for Scientific Computing and Information STUDY ON METHODS FOR COMPUTER-AIDED TOOTH SHADE DETERMINATION

More information

EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER

EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER 17th European Signal Processing Conference (EUSIPCO 29) Glasgow, Scotland, August 24-28, 29 EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMA AREA UNER THE CURVE FOR THE HAMMING ISTANCE CASSIFIER Chun Chen,

More information

Structurally noise resistant classifier for multi-modal person verification

Structurally noise resistant classifier for multi-modal person verification Pattern Recognition Letters 4 (3) 389 399 www.elsevier.com/locate/patrec Structurally noise resistant classifier for multi-modal person verification Conrad Sanderson a,b, *, Kuldip K. Paliwal b a IDIAP,

More information

This is an accepted version of a paper published in Elsevier Information Fusion. If you wish to cite this paper, please use the following reference:

This is an accepted version of a paper published in Elsevier Information Fusion. If you wish to cite this paper, please use the following reference: This is an accepted version of a paper published in Elsevier Information Fusion. If you wish to cite this paper, please use the following reference: T. Murakami, T. Ohki, K. Takahashi, Optimal sequential

More information

Kazuhiro Fukui, University of Tsukuba

Kazuhiro Fukui, University of Tsukuba Subspace Methods Kazuhiro Fukui, University of Tsukuba Synonyms Multiple similarity method Related Concepts Principal component analysis (PCA) Subspace analysis Dimensionality reduction Definition Subspace

More information

Advanced Introduction to Machine Learning CMU-10715

Advanced Introduction to Machine Learning CMU-10715 Advanced Introduction to Machine Learning CMU-10715 Principal Component Analysis Barnabás Póczos Contents Motivation PCA algorithms Applications Some of these slides are taken from Karl Booksh Research

More information

Application of Evidence Theory to Construction Projects

Application of Evidence Theory to Construction Projects Application of Evidence Theory to Construction Projects Desmond Adair, University of Tasmania, Australia Martin Jaeger, University of Tasmania, Australia Abstract: Crucial decisions are necessary throughout

More information

Time Series Classification

Time Series Classification Distance Measures Classifiers DTW vs. ED Further Work Questions August 31, 2017 Distance Measures Classifiers DTW vs. ED Further Work Questions Outline 1 2 Distance Measures 3 Classifiers 4 DTW vs. ED

More information

Biometrics: Introduction and Examples. Raymond Veldhuis

Biometrics: Introduction and Examples. Raymond Veldhuis Biometrics: Introduction and Examples Raymond Veldhuis 1 Overview Biometric recognition Face recognition Challenges Transparent face recognition Large-scale identification Watch list Anonymous biometrics

More information

Non-parametric Classification of Facial Features

Non-parametric Classification of Facial Features Non-parametric Classification of Facial Features Hyun Sung Chang Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Problem statement In this project, I attempted

More information

2D Image Processing Face Detection and Recognition

2D Image Processing Face Detection and Recognition 2D Image Processing Face Detection and Recognition Prof. Didier Stricker Kaiserlautern University http://ags.cs.uni-kl.de/ DFKI Deutsches Forschungszentrum für Künstliche Intelligenz http://av.dfki.de

More information

The exam is closed book, closed notes except your one-page (two sides) or two-page (one side) crib sheet.

The exam is closed book, closed notes except your one-page (two sides) or two-page (one side) crib sheet. CS 189 Spring 013 Introduction to Machine Learning Final You have 3 hours for the exam. The exam is closed book, closed notes except your one-page (two sides) or two-page (one side) crib sheet. Please

More information

Symmetric Distortion Measure for Speaker Recognition

Symmetric Distortion Measure for Speaker Recognition ISCA Archive http://www.isca-speech.org/archive SPECOM 2004: 9 th Conference Speech and Computer St. Petersburg, Russia September 20-22, 2004 Symmetric Distortion Measure for Speaker Recognition Evgeny

More information

Introduction to Support Vector Machines

Introduction to Support Vector Machines Introduction to Support Vector Machines Hsuan-Tien Lin Learning Systems Group, California Institute of Technology Talk in NTU EE/CS Speech Lab, November 16, 2005 H.-T. Lin (Learning Systems Group) Introduction

More information

Biometric Security Based on ECG

Biometric Security Based on ECG Biometric Security Based on ECG Lingni Ma, J.A. de Groot and Jean-Paul Linnartz Eindhoven University of Technology Signal Processing Systems, Electrical Engineering l.ma.1@student.tue.nl j.a.d.groot@tue.nl

More information

Unsupervised Learning: K- Means & PCA

Unsupervised Learning: K- Means & PCA Unsupervised Learning: K- Means & PCA Unsupervised Learning Supervised learning used labeled data pairs (x, y) to learn a func>on f : X Y But, what if we don t have labels? No labels = unsupervised learning

More information

Ch 4. Linear Models for Classification

Ch 4. Linear Models for Classification Ch 4. Linear Models for Classification Pattern Recognition and Machine Learning, C. M. Bishop, 2006. Department of Computer Science and Engineering Pohang University of Science and echnology 77 Cheongam-ro,

More information

Dynamic Time-Alignment Kernel in Support Vector Machine

Dynamic Time-Alignment Kernel in Support Vector Machine Dynamic Time-Alignment Kernel in Support Vector Machine Hiroshi Shimodaira School of Information Science, Japan Advanced Institute of Science and Technology sim@jaist.ac.jp Mitsuru Nakai School of Information

More information

A Confidence-Based Late Fusion Framework For Audio-Visual Biometric Identification

A Confidence-Based Late Fusion Framework For Audio-Visual Biometric Identification Pattern Recognition Letters journal homepage: www.elsevier.com A Confidence-Based Late Fusion Framework For Audio-Visual Biometric Identification Mohammad Rafiqul Alam a,, Mohammed Bennamoun a, Roberto

More information

TinySR. Peter Schmidt-Nielsen. August 27, 2014

TinySR. Peter Schmidt-Nielsen. August 27, 2014 TinySR Peter Schmidt-Nielsen August 27, 2014 Abstract TinySR is a light weight real-time small vocabulary speech recognizer written entirely in portable C. The library fits in a single file (plus header),

More information

FACE RECOGNITION BY EIGENFACE AND ELASTIC BUNCH GRAPH MATCHING. Master of Philosophy Research Project First-term Report SUPERVISED BY

FACE RECOGNITION BY EIGENFACE AND ELASTIC BUNCH GRAPH MATCHING. Master of Philosophy Research Project First-term Report SUPERVISED BY FACE RECOGNITION BY EIGENFACE AND ELASTIC BUNCH GRAPH MATCHING Master of Philosophy Research Proect First-term Report SUPERVISED BY Professor LYU, Rung Tsong Michael PREPARED BY JANG KIM FUNG (01036550)

More information

Constrained Optimization and Support Vector Machines

Constrained Optimization and Support Vector Machines Constrained Optimization and Support Vector Machines Man-Wai MAK Dept. of Electronic and Information Engineering, The Hong Kong Polytechnic University enmwmak@polyu.edu.hk http://www.eie.polyu.edu.hk/

More information

arxiv: v1 [cs.cv] 11 Jun 2008

arxiv: v1 [cs.cv] 11 Jun 2008 HUMAN EXPERTS FUSION FOR IMAGE CLASSIFICATION Arnaud MARTIN and Christophe OSSWALD arxiv:0806.1798v1 [cs.cv] 11 Jun 2008 Abstract In image classification, merging the opinion of several human experts is

More information

Selection of Classifiers based on Multiple Classifier Behaviour

Selection of Classifiers based on Multiple Classifier Behaviour Selection of Classifiers based on Multiple Classifier Behaviour Giorgio Giacinto, Fabio Roli, and Giorgio Fumera Dept. of Electrical and Electronic Eng. - University of Cagliari Piazza d Armi, 09123 Cagliari,

More information

Signal Modeling Techniques in Speech Recognition. Hassan A. Kingravi

Signal Modeling Techniques in Speech Recognition. Hassan A. Kingravi Signal Modeling Techniques in Speech Recognition Hassan A. Kingravi Outline Introduction Spectral Shaping Spectral Analysis Parameter Transforms Statistical Modeling Discussion Conclusions 1: Introduction

More information

Principal Component Analysis -- PCA (also called Karhunen-Loeve transformation)

Principal Component Analysis -- PCA (also called Karhunen-Loeve transformation) Principal Component Analysis -- PCA (also called Karhunen-Loeve transformation) PCA transforms the original input space into a lower dimensional space, by constructing dimensions that are linear combinations

More information

Likelihood Ratio in a SVM Framework: Fusing Linear and Non-Linear Face Classifiers

Likelihood Ratio in a SVM Framework: Fusing Linear and Non-Linear Face Classifiers Likelihood Ratio in a SVM Framework: Fusing Linear and Non-Linear Face Classifiers Mayank Vatsa, Richa Singh, Arun Ross, and Afzel Noore Lane Department of Computer Science and Electrical Engineering West

More information