Biometrics: Introduction and Examples. Raymond Veldhuis

Similar documents
EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER

Error Rates. Error vs Threshold. ROC Curve. Biometrics: A Pattern Recognition System. Pattern classification. Biometrics CSE 190 Lecture 3

Score calibration for optimal biometric identification

Biometric verification based on grip-pattern recognition

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY

BIOMETRIC verification systems are used to verify the

Estimation of Relative Operating Characteristics of Text Independent Speaker Verification

Face Recognition Using Eigenfaces

Biometric Hash based on Statistical Features of Online Signatures

Likelihood Ratio-Based Biometric Verification

Palmprint based Verification System Robust to Occlusion using Low-order Zernike Moments of Sub-images

Biometric Security Based on ECG

Two-Layered Face Detection System using Evolutionary Algorithm

Orientation Map Based Palmprint Recognition

Roadmap. Introduction to image analysis (computer vision) Theory of edge detection. Applications

This is an accepted version of a paper published in Elsevier Information Fusion. If you wish to cite this paper, please use the following reference:

If you wish to cite this paper, please use the following reference:

PCA FACE RECOGNITION

Robust License Plate Detection Using Covariance Descriptor in a Neural Network Framework

2D Image Processing Face Detection and Recognition

System 1 (last lecture) : limited to rigidly structured shapes. System 2 : recognition of a class of varying shapes. Need to:

Robust Speaker Identification

A Contrario Detection of False Matches in Iris Recognition

CARNEGIE MELLON UNIVERSITY

Technical Report. Results from 200 billion iris cross-comparisons. John Daugman. Number 635. June Computer Laboratory

CFAR TARGET DETECTION IN TREE SCATTERING INTERFERENCE

Joint Factor Analysis for Speaker Verification

Boosting: Algorithms and Applications

Data Mining: Concepts and Techniques. (3 rd ed.) Chapter 8. Chapter 8. Classification: Basic Concepts

I D I A P R E S E A R C H R E P O R T. Samy Bengio a. November submitted for publication

IBM Research Report. The Relation between the ROC Curve and the CMC

Score Normalization in Multimodal Biometric Systems

Multimodal Biometric Fusion Joint Typist (Keystroke) and Speaker Verification

Face detection and recognition. Detection Recognition Sally

When enough is enough: early stopping of biometrics error rate testing

Semi-parametric Distributional Models for Biometric Fusion

CITS 4402 Computer Vision

Theoretical Statistical Correlation for Biometric Identification Performance

Automatic Identity Verification Using Face Images

Role of Assembling Invariant Moments and SVM in Fingerprint Recognition

Corners, Blobs & Descriptors. With slides from S. Lazebnik & S. Seitz, D. Lowe, A. Efros

Predicting large population data cumulative match characteristic performance from small population data

Face Detection and Recognition

ECE 661: Homework 10 Fall 2014

Palmprint Verification with Moments

Likelihood Ratio Based Biometric Score Fusion

Modeling Classes of Shapes Suppose you have a class of shapes with a range of variations: System 2 Overview

COS 429: COMPUTER VISON Face Recognition

Fusion of Dependent and Independent Biometric Information Sources

Lecture 16: Small Sample Size Problems (Covariance Estimation) Many thanks to Carlos Thomaz who authored the original version of these slides

An Analysis of BioHashing and Its Variants

Bayes Filter Reminder. Kalman Filter Localization. Properties of Gaussians. Gaussians. Prediction. Correction. σ 2. Univariate. 1 2πσ e.

Introduction to Mobile Robotics Bayes Filter Particle Filter and Monte Carlo Localization

Citation for published version (APA): Susyanto, N. (2016). Semiparametric copula models for biometric score level fusion

COMP 408/508. Computer Vision Fall 2017 PCA for Recognition

How to Deal with Multiple-Targets in Speaker Identification Systems?

ON BINARY REPRESENTATIONS FOR BIOMETRIC TEMPLATE PROTECTION. Chun Chen

Activity related recognition in AmI environments

COM336: Neural Computing

Informatics 2B: Learning and Data Lecture 10 Discriminant functions 2. Minimal misclassifications. Decision Boundaries

ISCA Archive

A Modular NMF Matching Algorithm for Radiation Spectra

SYDE 372 Introduction to Pattern Recognition. Probability Measures for Classification: Part I

Application of hopfield network in improvement of fingerprint recognition process Mahmoud Alborzi 1, Abbas Toloie- Eshlaghy 1 and Dena Bazazian 2

Recognition Performance from SAR Imagery Subject to System Resource Constraints

AASS, Örebro University

Anomaly Detection. Jing Gao. SUNY Buffalo

Covariance Tracking Algorithm on Bilateral Filtering under Lie Group Structure Yinghong Xie 1,2,a Chengdong Wu 1,b

Classification. 1. Strategies for classification 2. Minimizing the probability for misclassification 3. Risk minimization

Around the Speaker De-Identification (Speaker diarization for de-identification ++) Itshak Lapidot Moez Ajili Jean-Francois Bonastre

CS 231A Section 1: Linear Algebra & Probability Review. Kevin Tang

Tracking and Identification of Multiple targets

CS 231A Section 1: Linear Algebra & Probability Review

Bayesian decision theory Introduction to Pattern Recognition. Lectures 4 and 5: Bayesian decision theory

Inertial Navigation and Various Applications of Inertial Data. Yongcai Wang. 9 November 2016

Maximum Likelihood and Maximum A Posteriori Adaptation for Distributed Speaker Recognition Systems

Abnormal Activity Detection and Tracking Namrata Vaswani Dept. of Electrical and Computer Engineering Iowa State University

Aruna Bhat Research Scholar, Department of Electrical Engineering, IIT Delhi, India

Face recognition Computer Vision Spring 2018, Lecture 21

An Introduction to Machine Learning

Lecture 8: Interest Point Detection. Saad J Bedros

Information Fusion for Local Gabor Features Based Frontal Face Verification

Concerns of the Psychophysicist. Three methods for measuring perception. Yes/no method of constant stimuli. Detection / discrimination.

Learning theory. Ensemble methods. Boosting. Boosting: history

AN INTRODUCTION TO NEURAL NETWORKS. Scott Kuindersma November 12, 2009

Bayesian Decision Theory

Covariance to PCA. CS 510 Lecture #8 February 17, 2014

Recipes for the Linear Analysis of EEG and applications

1. Omit Human and Physical Geography electives (6 credits) 2. Add GEOG 677:Internet GIS (3 credits) 3. Add 3 credits to GEOG 797: Final Project

Robotics 2 AdaBoost for People and Place Detection

Gaussian Models

SIMATIC Ident Industrial Identification Systems

Covariance to PCA. CS 510 Lecture #14 February 23, 2018

Bayesian decision making

CS 195-5: Machine Learning Problem Set 1

Vision for Mobile Robot Navigation: A Survey

A New Efficient Method for Producing Global Affine Invariants

Speaker Recognition Using Artificial Neural Networks: RBFNNs vs. EBFNNs

Computer Vision Group Prof. Daniel Cremers. 11. Sampling Methods

Transcription:

Biometrics: Introduction and Examples Raymond Veldhuis 1

Overview Biometric recognition Face recognition Challenges Transparent face recognition Large-scale identification Watch list Anonymous biometrics 3D face recognition 2

Biometric recognition Recognition of a person based on physiological characteristics or behavioural traits. Identifying a person Verifying a claimed identity Expected pros: Unique personal characteristic. Assures physical presence. No tokens to loose nor PINS to forget. 3

Examples 4

Market now 5

Market future 6

Biometric verification identity claim template database biometric data sensor preprocessing feature extraction classifier noise noise accept/reject 7

Optimal classifier Performance measure: False-acceptance rate (FAR, α) False-rejection rate (FRR, β) no feature space yes Likelihood ratio: p( x C) L( x) = > p( x) Optimal decision: False-acceptance rate minimal at fixed false-rejection rate. False-rejection rate minimal at fixed false-acceptance rate. t 8

Receiver Operating Characteristic (ROC) 1 0.9 High security 0.8 0.7 FRR 0.6 0.5 0.4 t 0.3 0.2 0.1 EER 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 FAR Easy access 9

Log-likelihood ratio (Gaussian case, 1) log px ( C) px ( ) Σ Σ T ( ) 1 T x μ ( x μ ) ( x μ ) 1 ( x μ ) T T T C C C μt μ Σ Σ C T C Total mean Class mean Total covariance matrix Class covariance matrix feature space 10

Log-likelihood ratio (Gaussian case, 2) But parameters must be estimated from examples: log px C px ( ) ( ) ˆ T ˆ ˆ T ˆ ( ) ˆ 1 ( ) ( ) ˆ 1 x μ ( ) T T x μt x μc W x μc Σ Σ Small-sample-size problem: Dimensionality of feature vector is (much) greater than number of examples. Estimated covariance matrices are singular. Even if not: Inverses are inaccurate Computationally complex 11

Log-likelihood ratio (Gaussian case, 3) log px C px ( ) ( ) ˆ T ˆ ˆ T ˆ ( ) ˆ 1 ( ) ( ) ˆ 1 x μ ( ) T T x μt x μc C x μc Σ Σ Dimensionality reduction by a linear transform: y = Mx log px ( C) px ( ) y ν y ν Λ y ν T T ( ) ( ) 2 1 C C C 12

Training, Enrolment and Verification Training identity biometric sensor data preprocessing feature extraction training Enrolment identity biometric sensor data preprocessing feature extraction Verification identity claim biometric sensor data preprocessing feature extraction template database classifier 13 a/r

Face verification identity claim template database biometric data sensor preprocessing feature extraction classifier noise noise yes/no Face detection Landmark detection Segmentation Registration Normalization Restoration Geometric Gray value Both 14

Performance (FRVT 2002) 15

Performance UK Passport Service Biometrics enrolment trail Well conditioned Face verification rate 69% (FRR = 31%) http://www.ukpa.gov.uk/publications.asp 16

Face verification identity claim template database biometric data sensor preprocessing feature extraction classifier noise noise yes/no Face detection Landmark detection Segmentation Registration Normalization Restoration Geometric Gray value Both 17

Pre-processing 18

Face and landmark detection ADABOOST Cascade of very simple classifiers Trained on feature and non-feature examples Training slow (irrelevant) Detection fast (relevant) 19

ADABOOST detection method c 1 c 2 c n D/R (x,y 1 ) >t 1 α 1 >T D/R (x,y n ) >t n α n 20

Registration and segmentation original landmarked registered segmented 21

Face verification identity claim template database biometric data sensor preprocessing feature extraction classifier noise noise yes/no Face detection Landmark detection Segmentation Registration Normalization Restoration Geometric Gray value Both 22

Geometrical features 23

Gray value features = + x1 x2 x3 4 x + + + + x 5 Feature vector x 24

Sensitivity to pose 25

Sensitivity to resolution 26

Performance example Error rates 10 0 10 1 10 2 FAR FRR FAR [%] FRR [%] FRR SotA [%] 10 1.6 4.0 1 6.5 10 10 3 0.1 15 18 10 4 180 160 140 120 100 80 60 40 20 0 20 matching score threshold 27

Face-recognition challenges Performance Robustness pose illumination Transparent face recognition Large-scale identification Watch list Anonymous biometrics 3D face recognition 28

Transparent face recognition No explicit user action required Home applications Uncontrolled conditions Surveillance applications (Ongoing) authentication on mobile devices 29

Large-scale identification Closed set Convenience, home 10 users Open set Security applications, access control Large databases n = 10E+04 to 10E+07 entries. 30

Large-scale identification Large databases n = 10E+04 to 10E+07 entries. Usually cooperative subjects Requires extremely good biometric. β total = β c n αtotal = 1 (1 αc) nαc ß 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 High security Easy access 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 α 31

Watch lists Surveillance applications Possibly uncontrolled conditions, transparency High detection rate required. Usually medium sized databases n = 10..1000. Non-cooperative subjects. Requires extremely good biometric. 1 0.9 0.8 High security 0.7 p d = 1 β n α = 1 (1 α ) nα total c c c ß 0.6 0.5 0.4 0.3 0.2 0.1 Easy access 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 α 32

Anonymous Face Recognition enrolment recognition and derolment recognition 33

Anonymous Face Recognition Surveillance applications Tracking Detection of suspicious conduct Uncontrolled conditions Many users and identification points complicate problem. Use of other (biometric) characteristics to improve performance 34

3D face recognition Recognition based on surface in 3D space Calibrated image Easy registration Robust to lighting variations Difficult acquisition Limited scan volume Spikes and holes 35

3D acquisition Laser scanner Stereo vision Structured light 36

Detect nose 3D registration Bring image into standard position by rigid 3D transform 37

Range image result Result: 3000 numbers representing face geometry 38

3D recognition results Testing each test vector against every class average: Training samples per subject EER 2 0.48% 3 0.21% 4 0.20% 5 0.14% 6 0.047% 7 0.015% n=2 (2 training samples per subject) One-to-one testing: similar results 39

Conclusion Biometric recognition Face recognition Challenges Performance Robustness Transparent face recognition Large-scale identification Watch list Anonymous biometrics 3D face recognition 40