Biometrics: Introduction and Examples. Raymond Veldhuis
|
|
- Sharon Spencer
- 6 years ago
- Views:
Transcription
1 Biometrics: Introduction and Examples Raymond Veldhuis 1
2 Overview Biometric recognition Face recognition Challenges Transparent face recognition Large-scale identification Watch list Anonymous biometrics 3D face recognition 2
3 Biometric recognition Recognition of a person based on physiological characteristics or behavioural traits. Identifying a person Verifying a claimed identity Expected pros: Unique personal characteristic. Assures physical presence. No tokens to loose nor PINS to forget. 3
4 Examples 4
5 Market now 5
6 Market future 6
7 Biometric verification identity claim template database biometric data sensor preprocessing feature extraction classifier noise noise accept/reject 7
8 Optimal classifier Performance measure: False-acceptance rate (FAR, α) False-rejection rate (FRR, β) no feature space yes Likelihood ratio: p( x C) L( x) = > p( x) Optimal decision: False-acceptance rate minimal at fixed false-rejection rate. False-rejection rate minimal at fixed false-acceptance rate. t 8
9 Receiver Operating Characteristic (ROC) High security FRR t EER FAR Easy access 9
10 Log-likelihood ratio (Gaussian case, 1) log px ( C) px ( ) Σ Σ T ( ) 1 T x μ ( x μ ) ( x μ ) 1 ( x μ ) T T T C C C μt μ Σ Σ C T C Total mean Class mean Total covariance matrix Class covariance matrix feature space 10
11 Log-likelihood ratio (Gaussian case, 2) But parameters must be estimated from examples: log px C px ( ) ( ) ˆ T ˆ ˆ T ˆ ( ) ˆ 1 ( ) ( ) ˆ 1 x μ ( ) T T x μt x μc W x μc Σ Σ Small-sample-size problem: Dimensionality of feature vector is (much) greater than number of examples. Estimated covariance matrices are singular. Even if not: Inverses are inaccurate Computationally complex 11
12 Log-likelihood ratio (Gaussian case, 3) log px C px ( ) ( ) ˆ T ˆ ˆ T ˆ ( ) ˆ 1 ( ) ( ) ˆ 1 x μ ( ) T T x μt x μc C x μc Σ Σ Dimensionality reduction by a linear transform: y = Mx log px ( C) px ( ) y ν y ν Λ y ν T T ( ) ( ) 2 1 C C C 12
13 Training, Enrolment and Verification Training identity biometric sensor data preprocessing feature extraction training Enrolment identity biometric sensor data preprocessing feature extraction Verification identity claim biometric sensor data preprocessing feature extraction template database classifier 13 a/r
14 Face verification identity claim template database biometric data sensor preprocessing feature extraction classifier noise noise yes/no Face detection Landmark detection Segmentation Registration Normalization Restoration Geometric Gray value Both 14
15 Performance (FRVT 2002) 15
16 Performance UK Passport Service Biometrics enrolment trail Well conditioned Face verification rate 69% (FRR = 31%) 16
17 Face verification identity claim template database biometric data sensor preprocessing feature extraction classifier noise noise yes/no Face detection Landmark detection Segmentation Registration Normalization Restoration Geometric Gray value Both 17
18 Pre-processing 18
19 Face and landmark detection ADABOOST Cascade of very simple classifiers Trained on feature and non-feature examples Training slow (irrelevant) Detection fast (relevant) 19
20 ADABOOST detection method c 1 c 2 c n D/R (x,y 1 ) >t 1 α 1 >T D/R (x,y n ) >t n α n 20
21 Registration and segmentation original landmarked registered segmented 21
22 Face verification identity claim template database biometric data sensor preprocessing feature extraction classifier noise noise yes/no Face detection Landmark detection Segmentation Registration Normalization Restoration Geometric Gray value Both 22
23 Geometrical features 23
24 Gray value features = + x1 x2 x3 4 x x 5 Feature vector x 24
25 Sensitivity to pose 25
26 Sensitivity to resolution 26
27 Performance example Error rates FAR FRR FAR [%] FRR [%] FRR SotA [%] matching score threshold 27
28 Face-recognition challenges Performance Robustness pose illumination Transparent face recognition Large-scale identification Watch list Anonymous biometrics 3D face recognition 28
29 Transparent face recognition No explicit user action required Home applications Uncontrolled conditions Surveillance applications (Ongoing) authentication on mobile devices 29
30 Large-scale identification Closed set Convenience, home 10 users Open set Security applications, access control Large databases n = 10E+04 to 10E+07 entries. 30
31 Large-scale identification Large databases n = 10E+04 to 10E+07 entries. Usually cooperative subjects Requires extremely good biometric. β total = β c n αtotal = 1 (1 αc) nαc ß High security Easy access α 31
32 Watch lists Surveillance applications Possibly uncontrolled conditions, transparency High detection rate required. Usually medium sized databases n = Non-cooperative subjects. Requires extremely good biometric High security 0.7 p d = 1 β n α = 1 (1 α ) nα total c c c ß Easy access α 32
33 Anonymous Face Recognition enrolment recognition and derolment recognition 33
34 Anonymous Face Recognition Surveillance applications Tracking Detection of suspicious conduct Uncontrolled conditions Many users and identification points complicate problem. Use of other (biometric) characteristics to improve performance 34
35 3D face recognition Recognition based on surface in 3D space Calibrated image Easy registration Robust to lighting variations Difficult acquisition Limited scan volume Spikes and holes 35
36 3D acquisition Laser scanner Stereo vision Structured light 36
37 Detect nose 3D registration Bring image into standard position by rigid 3D transform 37
38 Range image result Result: 3000 numbers representing face geometry 38
39 3D recognition results Testing each test vector against every class average: Training samples per subject EER % % % % % % n=2 (2 training samples per subject) One-to-one testing: similar results 39
40 Conclusion Biometric recognition Face recognition Challenges Performance Robustness Transparent face recognition Large-scale identification Watch list Anonymous biometrics 3D face recognition 40
EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER
17th European Signal Processing Conference (EUSIPCO 29) Glasgow, Scotland, August 24-28, 29 EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMA AREA UNER THE CURVE FOR THE HAMMING ISTANCE CASSIFIER Chun Chen,
More informationError Rates. Error vs Threshold. ROC Curve. Biometrics: A Pattern Recognition System. Pattern classification. Biometrics CSE 190 Lecture 3
Biometrics: A Pattern Recognition System Yes/No Pattern classification Biometrics CSE 190 Lecture 3 Authentication False accept rate (FAR): Proportion of imposters accepted False reject rate (FRR): Proportion
More informationScore calibration for optimal biometric identification
Score calibration for optimal biometric identification (see also NIST IBPC 2010 online proceedings: http://biometrics.nist.gov/ibpc2010) AI/GI/CRV 2010, Ottawa Dmitry O. Gorodnichy Head of Video Surveillance
More informationBiometric verification based on grip-pattern recognition
Biometric verification based on grip-pattern recognition Raymond Veldhuis, Asker Bazen, Joost Kauffman, Pieter Hartel University of Twente, Faculty of Electrical Engineering, Mathematics and Computer Science
More informationINTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY
[Gaurav, 2(1): Jan., 2013] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Face Identification & Detection Using Eigenfaces Sachin.S.Gurav *1, K.R.Desai 2 *1
More informationBIOMETRIC verification systems are used to verify the
86 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 1, JANUARY 2004 Likelihood-Ratio-Based Biometric Verification Asker M. Bazen and Raymond N. J. Veldhuis Abstract This paper
More informationEstimation of Relative Operating Characteristics of Text Independent Speaker Verification
International Journal of Engineering Science Invention Volume 1 Issue 1 December. 2012 PP.18-23 Estimation of Relative Operating Characteristics of Text Independent Speaker Verification Palivela Hema 1,
More informationFace Recognition Using Eigenfaces
Face Recognition Using Eigenfaces Prof. V.P. Kshirsagar, M.R.Baviskar, M.E.Gaikwad, Dept. of CSE, Govt. Engineering College, Aurangabad (MS), India. vkshirsagar@gmail.com, madhumita_baviskar@yahoo.co.in,
More informationBiometric Hash based on Statistical Features of Online Signatures
Biometric Hash based on Statistical Features of Online Signatures Claus Vielhauer 1,2, Ralf Steinmetz 1, Astrid Mayerhöfer 3 1 Technical University Darmstadt Institute for Industrial Process- and System
More informationLikelihood Ratio-Based Biometric Verification
Likelihood Ratio-Based Biometric Verification Asker M. Bazen and Raymond N.J. Veldhuis University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 27, 75 AE
More informationPalmprint based Verification System Robust to Occlusion using Low-order Zernike Moments of Sub-images
BADRINATH, NARESH, GUPTA: PALMPRINT BASED VERIFICATION SYSTEM 1 Palmprint based Verification System Robust to Occlusion using Low-order Zernike Moments of Sub-images Badrinath G. S. badri@cse.iitk.ac.in
More informationBiometric Security Based on ECG
Biometric Security Based on ECG Lingni Ma, J.A. de Groot and Jean-Paul Linnartz Eindhoven University of Technology Signal Processing Systems, Electrical Engineering l.ma.1@student.tue.nl j.a.d.groot@tue.nl
More informationTwo-Layered Face Detection System using Evolutionary Algorithm
Two-Layered Face Detection System using Evolutionary Algorithm Jun-Su Jang Jong-Hwan Kim Dept. of Electrical Engineering and Computer Science, Korea Advanced Institute of Science and Technology (KAIST),
More informationOrientation Map Based Palmprint Recognition
Orientation Map Based Palmprint Recognition (BM) 45 Orientation Map Based Palmprint Recognition B. H. Shekar, N. Harivinod bhshekar@gmail.com, harivinodn@gmail.com India, Mangalore University, Department
More informationRoadmap. Introduction to image analysis (computer vision) Theory of edge detection. Applications
Edge Detection Roadmap Introduction to image analysis (computer vision) Its connection with psychology and neuroscience Why is image analysis difficult? Theory of edge detection Gradient operator Advanced
More informationThis is an accepted version of a paper published in Elsevier Information Fusion. If you wish to cite this paper, please use the following reference:
This is an accepted version of a paper published in Elsevier Information Fusion. If you wish to cite this paper, please use the following reference: T. Murakami, T. Ohki, K. Takahashi, Optimal sequential
More informationIf you wish to cite this paper, please use the following reference:
This is an accepted version of a paper published in Proceedings of the st IEEE International Workshop on Information Forensics and Security (WIFS 2009). If you wish to cite this paper, please use the following
More informationPCA FACE RECOGNITION
PCA FACE RECOGNITION The slides are from several sources through James Hays (Brown); Srinivasa Narasimhan (CMU); Silvio Savarese (U. of Michigan); Shree Nayar (Columbia) including their own slides. Goal
More informationRobust License Plate Detection Using Covariance Descriptor in a Neural Network Framework
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Robust License Plate Detection Using Covariance Descriptor in a Neural Network Framework Fatih Porikli, Tekin Kocak TR2006-100 January 2007
More information2D Image Processing Face Detection and Recognition
2D Image Processing Face Detection and Recognition Prof. Didier Stricker Kaiserlautern University http://ags.cs.uni-kl.de/ DFKI Deutsches Forschungszentrum für Künstliche Intelligenz http://av.dfki.de
More informationSystem 1 (last lecture) : limited to rigidly structured shapes. System 2 : recognition of a class of varying shapes. Need to:
System 2 : Modelling & Recognising Modelling and Recognising Classes of Classes of Shapes Shape : PDM & PCA All the same shape? System 1 (last lecture) : limited to rigidly structured shapes System 2 :
More informationRobust Speaker Identification
Robust Speaker Identification by Smarajit Bose Interdisciplinary Statistical Research Unit Indian Statistical Institute, Kolkata Joint work with Amita Pal and Ayanendranath Basu Overview } } } } } } }
More informationA Contrario Detection of False Matches in Iris Recognition
A Contrario Detection of False Matches in Iris Recognition Marcelo Mottalli, Mariano Tepper, and Marta Mejail Departamento de Computación, Universidad de Buenos Aires, Argentina Abstract. The pattern of
More informationCARNEGIE MELLON UNIVERSITY
CARNEGIE MELLON UNIVERSITY OPTIMAL CLASSIFIER ENSEMBLES FOR IMPROVED BIOMETRIC VERIFICATION A Dissertation Submitted to the Faculty of Graduate School In Partial Fulfillment of the Requirements for The
More informationTechnical Report. Results from 200 billion iris cross-comparisons. John Daugman. Number 635. June Computer Laboratory
Technical Report UCAM-CL-TR-635 ISSN 1476-2986 Number 635 Computer Laboratory Results from 200 billion iris cross-comparisons John Daugman June 2005 15 JJ Thomson Avenue Cambridge CB3 0FD United Kingdom
More informationCFAR TARGET DETECTION IN TREE SCATTERING INTERFERENCE
CFAR TARGET DETECTION IN TREE SCATTERING INTERFERENCE Anshul Sharma and Randolph L. Moses Department of Electrical Engineering, The Ohio State University, Columbus, OH 43210 ABSTRACT We have developed
More informationJoint Factor Analysis for Speaker Verification
Joint Factor Analysis for Speaker Verification Mengke HU ASPITRG Group, ECE Department Drexel University mengke.hu@gmail.com October 12, 2012 1/37 Outline 1 Speaker Verification Baseline System Session
More informationBoosting: Algorithms and Applications
Boosting: Algorithms and Applications Lecture 11, ENGN 4522/6520, Statistical Pattern Recognition and Its Applications in Computer Vision ANU 2 nd Semester, 2008 Chunhua Shen, NICTA/RSISE Boosting Definition
More informationData Mining: Concepts and Techniques. (3 rd ed.) Chapter 8. Chapter 8. Classification: Basic Concepts
Data Mining: Concepts and Techniques (3 rd ed.) Chapter 8 1 Chapter 8. Classification: Basic Concepts Classification: Basic Concepts Decision Tree Induction Bayes Classification Methods Rule-Based Classification
More informationI D I A P R E S E A R C H R E P O R T. Samy Bengio a. November submitted for publication
R E S E A R C H R E P O R T I D I A P Why Do Multi-Stream, Multi-Band and Multi-Modal Approaches Work on Biometric User Authentication Tasks? Norman Poh Hoon Thian a IDIAP RR 03-59 November 2003 Samy Bengio
More informationIBM Research Report. The Relation between the ROC Curve and the CMC
RC23885 (W0602-49) February 7, 2006 Mathematics IBM Research Report The Relation between the ROC Curve and the CMC R. M. Bolle, J. H. Connell, S. Pankanti, N. K. Ratha, A. W. Senior IBM Research Division
More informationScore Normalization in Multimodal Biometric Systems
Score Normalization in Multimodal Biometric Systems Karthik Nandakumar and Anil K. Jain Michigan State University, East Lansing, MI Arun A. Ross West Virginia University, Morgantown, WV http://biometrics.cse.mse.edu
More informationMultimodal Biometric Fusion Joint Typist (Keystroke) and Speaker Verification
Multimodal Biometric Fusion Joint Typist (Keystroke) and Speaker Verification Jugurta R. Montalvão Filho and Eduardo O. Freire Abstract Identity verification through fusion of features from keystroke dynamics
More informationFace detection and recognition. Detection Recognition Sally
Face detection and recognition Detection Recognition Sally Face detection & recognition Viola & Jones detector Available in open CV Face recognition Eigenfaces for face recognition Metric learning identification
More informationWhen enough is enough: early stopping of biometrics error rate testing
When enough is enough: early stopping of biometrics error rate testing Michael E. Schuckers Department of Mathematics, Computer Science and Statistics St. Lawrence University and Center for Identification
More informationSemi-parametric Distributional Models for Biometric Fusion
Semi-parametric Distributional Models for Biometric Fusion Wenmei Huang and Sarat C. Dass Department of Statistics and Probability, Michigan State University, East Lansing, MI, 48824, USA Abstract The
More informationCITS 4402 Computer Vision
CITS 4402 Computer Vision A/Prof Ajmal Mian Adj/A/Prof Mehdi Ravanbakhsh Lecture 06 Object Recognition Objectives To understand the concept of image based object recognition To learn how to match images
More informationTheoretical Statistical Correlation for Biometric Identification Performance
Theoretical Statistical Correlation for Biometric Identification Performance Michael E. Schuckers schuckers@stlawu.edu Theoretical Statistical Correlation for Biometric Identification Performance p. 1/20
More informationAutomatic Identity Verification Using Face Images
Automatic Identity Verification Using Face Images Sabry F. Saraya and John F. W. Zaki Computer & Systems Eng. Dept. Faculty of Engineering Mansoura University. Abstract This paper presents two types of
More informationRole of Assembling Invariant Moments and SVM in Fingerprint Recognition
56 Role of Assembling Invariant Moments SVM in Fingerprint Recognition 1 Supriya Wable, 2 Chaitali Laulkar 1, 2 Department of Computer Engineering, University of Pune Sinhgad College of Engineering, Pune-411
More informationCorners, Blobs & Descriptors. With slides from S. Lazebnik & S. Seitz, D. Lowe, A. Efros
Corners, Blobs & Descriptors With slides from S. Lazebnik & S. Seitz, D. Lowe, A. Efros Motivation: Build a Panorama M. Brown and D. G. Lowe. Recognising Panoramas. ICCV 2003 How do we build panorama?
More informationPredicting large population data cumulative match characteristic performance from small population data
Predicting large population data cumulative match characteristic performance from small population data Amos Y. Johnson, Jie Sun, and Aaron F. Bobick GVU Center / College of Computing Georgia Tech, Atlanta,
More informationFace Detection and Recognition
Face Detection and Recognition Face Recognition Problem Reading: Chapter 18.10 and, optionally, Face Recognition using Eigenfaces by M. Turk and A. Pentland Queryimage face query database Face Verification
More informationECE 661: Homework 10 Fall 2014
ECE 661: Homework 10 Fall 2014 This homework consists of the following two parts: (1) Face recognition with PCA and LDA for dimensionality reduction and the nearest-neighborhood rule for classification;
More informationPalmprint Verification with Moments
Palmprint Verification with Moments Ying-Han Pang Andrew T.B.J David N.C.L Hiew Fu San Faculty of Information Science and Technology Multimedia University Jalan Ayer Keroh Lama 75450, Melaka, Malaysia.
More informationLikelihood Ratio Based Biometric Score Fusion
1 To appear in IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007 Based Biometric Score Fusion Karthik Nandakumar, Student Member, IEEE, Yi Chen, Student Member, IEEE, Sarat C. Dass,
More informationModeling Classes of Shapes Suppose you have a class of shapes with a range of variations: System 2 Overview
4 4 4 6 4 4 4 6 4 4 4 6 4 4 4 6 4 4 4 6 4 4 4 6 4 4 4 6 4 4 4 6 Modeling Classes of Shapes Suppose you have a class of shapes with a range of variations: System processes System Overview Previous Systems:
More informationCOS 429: COMPUTER VISON Face Recognition
COS 429: COMPUTER VISON Face Recognition Intro to recognition PCA and Eigenfaces LDA and Fisherfaces Face detection: Viola & Jones (Optional) generic object models for faces: the Constellation Model Reading:
More informationFusion of Dependent and Independent Biometric Information Sources
Fusion of Dependent and Independent Biometric Information Sources Dongliang Huang ECE, University of Calgary Henry Leung ECE, University of Calgary Winston Li ECE, University of Calgary Department of Electrical
More informationLecture 16: Small Sample Size Problems (Covariance Estimation) Many thanks to Carlos Thomaz who authored the original version of these slides
Lecture 16: Small Sample Size Problems (Covariance Estimation) Many thanks to Carlos Thomaz who authored the original version of these slides Intelligent Data Analysis and Probabilistic Inference Lecture
More informationAn Analysis of BioHashing and Its Variants
An Analysis of BioHashing and Its Variants 1, 2 Adams Kong, 1 King-Hong Cheung, 1 David Zhang, 2 Mohamed Kamel and 1 Jane You 1 Biometrics Research Centre Department of Computing The Hong Kong Polytechnic
More informationBayes Filter Reminder. Kalman Filter Localization. Properties of Gaussians. Gaussians. Prediction. Correction. σ 2. Univariate. 1 2πσ e.
Kalman Filter Localization Bayes Filter Reminder Prediction Correction Gaussians p(x) ~ N(µ,σ 2 ) : Properties of Gaussians Univariate p(x) = 1 1 2πσ e 2 (x µ) 2 σ 2 µ Univariate -σ σ Multivariate µ Multivariate
More informationIntroduction to Mobile Robotics Bayes Filter Particle Filter and Monte Carlo Localization
Introduction to Mobile Robotics Bayes Filter Particle Filter and Monte Carlo Localization Wolfram Burgard, Cyrill Stachniss, Maren Bennewitz, Kai Arras 1 Motivation Recall: Discrete filter Discretize the
More informationCitation for published version (APA): Susyanto, N. (2016). Semiparametric copula models for biometric score level fusion
UvA-DARE (Digital Academic Repository) Semiparametric copula models for biometric score level fusion Susyanto, N. Link to publication Citation for published version (APA): Susyanto, N. (2016). Semiparametric
More informationCOMP 408/508. Computer Vision Fall 2017 PCA for Recognition
COMP 408/508 Computer Vision Fall 07 PCA or Recognition Recall: Color Gradient by PCA v λ ( G G, ) x x x R R v, v : eigenvectors o D D with v ^v (, ) x x λ, λ : eigenvalues o D D with λ >λ v λ ( B B, )
More informationHow to Deal with Multiple-Targets in Speaker Identification Systems?
How to Deal with Multiple-Targets in Speaker Identification Systems? Yaniv Zigel and Moshe Wasserblat ICE Systems Ltd., Audio Analysis Group, P.O.B. 690 Ra anana 4307, Israel yanivz@nice.com Abstract In
More informationON BINARY REPRESENTATIONS FOR BIOMETRIC TEMPLATE PROTECTION. Chun Chen
ON BINARY REPRESENTATIONS FOR BIOMETRIC TEMPLATE PROTECTION Chun Chen De promotiecommissie: voorzitter en secretaris: Prof.dr.ir. A.J. Mouthaan promotor: Prof.dr.ir. C.H. Slump assistent promotor: Dr.ir.
More informationActivity related recognition in AmI environments
Informatics & Telematics Institute Presentation Activity related recognition in AmI environments Mr. Anastasios Drosou (Dr. Tzovaras Group) Outline Introduction Activity Detection Activity related recognition
More informationCOM336: Neural Computing
COM336: Neural Computing http://www.dcs.shef.ac.uk/ sjr/com336/ Lecture 2: Density Estimation Steve Renals Department of Computer Science University of Sheffield Sheffield S1 4DP UK email: s.renals@dcs.shef.ac.uk
More informationInformatics 2B: Learning and Data Lecture 10 Discriminant functions 2. Minimal misclassifications. Decision Boundaries
Overview Gaussians estimated from training data Guido Sanguinetti Informatics B Learning and Data Lecture 1 9 March 1 Today s lecture Posterior probabilities, decision regions and minimising the probability
More informationISCA Archive
ISCA Archive http://www.isca-speech.org/archive ODYSSEY04 - The Speaker and Language Recognition Workshop Toledo, Spain May 3 - June 3, 2004 Analysis of Multitarget Detection for Speaker and Language Recognition*
More informationA Modular NMF Matching Algorithm for Radiation Spectra
A Modular NMF Matching Algorithm for Radiation Spectra Melissa L. Koudelka Sensor Exploitation Applications Sandia National Laboratories mlkoude@sandia.gov Daniel J. Dorsey Systems Technologies Sandia
More informationSYDE 372 Introduction to Pattern Recognition. Probability Measures for Classification: Part I
SYDE 372 Introduction to Pattern Recognition Probability Measures for Classification: Part I Alexander Wong Department of Systems Design Engineering University of Waterloo Outline 1 2 3 4 Why use probability
More informationApplication of hopfield network in improvement of fingerprint recognition process Mahmoud Alborzi 1, Abbas Toloie- Eshlaghy 1 and Dena Bazazian 2
5797 Available online at www.elixirjournal.org Computer Science and Engineering Elixir Comp. Sci. & Engg. 41 (211) 5797-582 Application hopfield network in improvement recognition process Mahmoud Alborzi
More informationRecognition Performance from SAR Imagery Subject to System Resource Constraints
Recognition Performance from SAR Imagery Subject to System Resource Constraints Michael D. DeVore Advisor: Joseph A. O SullivanO Washington University in St. Louis Electronic Systems and Signals Research
More informationAASS, Örebro University
Mobile Robotics Achim J. and Lilienthal Olfaction Lab, AASS, Örebro University 1 Contents 1. Gas-Sensitive Mobile Robots in the Real World 2. Gas Dispersal in Natural Environments 3. Gas Quantification
More informationAnomaly Detection. Jing Gao. SUNY Buffalo
Anomaly Detection Jing Gao SUNY Buffalo 1 Anomaly Detection Anomalies the set of objects are considerably dissimilar from the remainder of the data occur relatively infrequently when they do occur, their
More informationCovariance Tracking Algorithm on Bilateral Filtering under Lie Group Structure Yinghong Xie 1,2,a Chengdong Wu 1,b
Applied Mechanics and Materials Online: 014-0-06 ISSN: 166-748, Vols. 519-50, pp 684-688 doi:10.408/www.scientific.net/amm.519-50.684 014 Trans Tech Publications, Switzerland Covariance Tracking Algorithm
More informationClassification. 1. Strategies for classification 2. Minimizing the probability for misclassification 3. Risk minimization
Classification Volker Blobel University of Hamburg March 2005 Given objects (e.g. particle tracks), which have certain features (e.g. momentum p, specific energy loss de/ dx) and which belong to one of
More informationAround the Speaker De-Identification (Speaker diarization for de-identification ++) Itshak Lapidot Moez Ajili Jean-Francois Bonastre
Around the Speaker De-Identification (Speaker diarization for de-identification ++) Itshak Lapidot Moez Ajili Jean-Francois Bonastre The 2 Parts HDM based diarization System The homogeneity measure 2 Outline
More informationCS 231A Section 1: Linear Algebra & Probability Review. Kevin Tang
CS 231A Section 1: Linear Algebra & Probability Review Kevin Tang Kevin Tang Section 1-1 9/30/2011 Topics Support Vector Machines Boosting Viola Jones face detector Linear Algebra Review Notation Operations
More informationTracking and Identification of Multiple targets
Tracking and Identification of Multiple targets Samir Hachour, François Delmotte, Eric Lefèvre, David Mercier Laboratoire de Génie Informatique et d'automatique de l'artois, EA 3926 LGI2A first name.last
More informationCS 231A Section 1: Linear Algebra & Probability Review
CS 231A Section 1: Linear Algebra & Probability Review 1 Topics Support Vector Machines Boosting Viola-Jones face detector Linear Algebra Review Notation Operations & Properties Matrix Calculus Probability
More informationBayesian decision theory Introduction to Pattern Recognition. Lectures 4 and 5: Bayesian decision theory
Bayesian decision theory 8001652 Introduction to Pattern Recognition. Lectures 4 and 5: Bayesian decision theory Jussi Tohka jussi.tohka@tut.fi Institute of Signal Processing Tampere University of Technology
More informationInertial Navigation and Various Applications of Inertial Data. Yongcai Wang. 9 November 2016
Inertial Navigation and Various Applications of Inertial Data Yongcai Wang 9 November 2016 Types of Gyroscope Mechanical Gyroscope Laser Gyroscope Sagnac Effect Stable Platform IMU and Strapdown IMU In
More informationMaximum Likelihood and Maximum A Posteriori Adaptation for Distributed Speaker Recognition Systems
Maximum Likelihood and Maximum A Posteriori Adaptation for Distributed Speaker Recognition Systems Chin-Hung Sit 1, Man-Wai Mak 1, and Sun-Yuan Kung 2 1 Center for Multimedia Signal Processing Dept. of
More informationAbnormal Activity Detection and Tracking Namrata Vaswani Dept. of Electrical and Computer Engineering Iowa State University
Abnormal Activity Detection and Tracking Namrata Vaswani Dept. of Electrical and Computer Engineering Iowa State University Abnormal Activity Detection and Tracking 1 The Problem Goal: To track activities
More informationAruna Bhat Research Scholar, Department of Electrical Engineering, IIT Delhi, India
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Robust Face Recognition System using Non Additive
More informationFace recognition Computer Vision Spring 2018, Lecture 21
Face recognition http://www.cs.cmu.edu/~16385/ 16-385 Computer Vision Spring 2018, Lecture 21 Course announcements Homework 6 has been posted and is due on April 27 th. - Any questions about the homework?
More informationAn Introduction to Machine Learning
An Introduction to Machine Learning L2: Instance Based Estimation Alexander J. Smola Statistical Machine Learning Program Canberra, ACT 0200 Australia Alex.Smola@nicta.com.au Tata Institute, Pune, January
More informationLecture 8: Interest Point Detection. Saad J Bedros
#1 Lecture 8: Interest Point Detection Saad J Bedros sbedros@umn.edu Last Lecture : Edge Detection Preprocessing of image is desired to eliminate or at least minimize noise effects There is always tradeoff
More informationInformation Fusion for Local Gabor Features Based Frontal Face Verification
Information Fusion for Local Gabor Features Based Frontal Face Verification Enrique Argones Rúa 1, Josef Kittler 2, Jose Luis Alba Castro 1, and Daniel González Jiménez 1 1 Signal Theory Group, Signal
More informationConcerns of the Psychophysicist. Three methods for measuring perception. Yes/no method of constant stimuli. Detection / discrimination.
Three methods for measuring perception Concerns of the Psychophysicist. Magnitude estimation 2. Matching 3. Detection/discrimination Bias/ Attentiveness Strategy/Artifactual Cues History of stimulation
More informationLearning theory. Ensemble methods. Boosting. Boosting: history
Learning theory Probability distribution P over X {0, 1}; let (X, Y ) P. We get S := {(x i, y i )} n i=1, an iid sample from P. Ensemble methods Goal: Fix ɛ, δ (0, 1). With probability at least 1 δ (over
More informationAN INTRODUCTION TO NEURAL NETWORKS. Scott Kuindersma November 12, 2009
AN INTRODUCTION TO NEURAL NETWORKS Scott Kuindersma November 12, 2009 SUPERVISED LEARNING We are given some training data: We must learn a function If y is discrete, we call it classification If it is
More informationBayesian Decision Theory
Introduction to Pattern Recognition [ Part 4 ] Mahdi Vasighi Remarks It is quite common to assume that the data in each class are adequately described by a Gaussian distribution. Bayesian classifier is
More informationCovariance to PCA. CS 510 Lecture #8 February 17, 2014
Covariance to PCA CS 510 Lecture 8 February 17, 2014 Status Update Programming Assignment 2 is due March 7 th Expect questions about your progress at the start of class I still owe you Assignment 1 back
More informationRecipes for the Linear Analysis of EEG and applications
Recipes for the Linear Analysis of EEG and applications Paul Sajda Department of Biomedical Engineering Columbia University Can we read the brain non-invasively and in real-time? decoder 1001110 if YES
More information1. Omit Human and Physical Geography electives (6 credits) 2. Add GEOG 677:Internet GIS (3 credits) 3. Add 3 credits to GEOG 797: Final Project
The Department of Geography and the Office of Professional Studies propose to modify the Master of Professional Studies in Geospatial Information Sciences (GIS) as follows: 1. Omit Human and Physical Geography
More informationRobotics 2 AdaBoost for People and Place Detection
Robotics 2 AdaBoost for People and Place Detection Giorgio Grisetti, Cyrill Stachniss, Kai Arras, Wolfram Burgard v.1.0, Kai Arras, Oct 09, including material by Luciano Spinello and Oscar Martinez Mozos
More informationGaussian Models
Gaussian Models ddebarr@uw.edu 2016-04-28 Agenda Introduction Gaussian Discriminant Analysis Inference Linear Gaussian Systems The Wishart Distribution Inferring Parameters Introduction Gaussian Density
More informationSIMATIC Ident Industrial Identification Systems
Related catalogs SIMATIC Ident Industrial Identification Systems Catalog ID 10 2012 Introduction System overview SIMATIC Ident 1 RFID systems for the HF frequency range SIMATIC RF200 SIMATIC RF300 MOBY
More informationCovariance to PCA. CS 510 Lecture #14 February 23, 2018
Covariance to PCA CS 510 Lecture 14 February 23, 2018 Overview: Goal Assume you have a gallery (database) of images, and a probe (test) image. The goal is to find the database image that is most similar
More informationBayesian decision making
Bayesian decision making Václav Hlaváč Czech Technical University in Prague Czech Institute of Informatics, Robotics and Cybernetics 166 36 Prague 6, Jugoslávských partyzánů 1580/3, Czech Republic http://people.ciirc.cvut.cz/hlavac,
More informationCS 195-5: Machine Learning Problem Set 1
CS 95-5: Machine Learning Problem Set Douglas Lanman dlanman@brown.edu 7 September Regression Problem Show that the prediction errors y f(x; ŵ) are necessarily uncorrelated with any linear function of
More informationVision for Mobile Robot Navigation: A Survey
Vision for Mobile Robot Navigation: A Survey (February 2002) Guilherme N. DeSouza & Avinash C. Kak presentation by: Job Zondag 27 February 2009 Outline: Types of Navigation Absolute localization (Structured)
More informationA New Efficient Method for Producing Global Affine Invariants
A New Efficient Method for Producing Global Affine Invariants Esa Rahtu, Mikko Salo 2, and Janne Heikkilä Machine Vision Group, Department of Electrical and Information Engineering, P.O. Box 45, 94 University
More informationSpeaker Recognition Using Artificial Neural Networks: RBFNNs vs. EBFNNs
Speaer Recognition Using Artificial Neural Networs: s vs. s BALASKA Nawel ember of the Sstems & Control Research Group within the LRES Lab., Universit 20 Août 55 of Sida, BP: 26, Sida, 21000, Algeria E-mail
More informationComputer Vision Group Prof. Daniel Cremers. 11. Sampling Methods
Prof. Daniel Cremers 11. Sampling Methods Sampling Methods Sampling Methods are widely used in Computer Science as an approximation of a deterministic algorithm to represent uncertainty without a parametric
More information