Ear biometrics Hanna-Kaisa Lammi 19.11.2003. Contents  Biometrics in general  Using ear shape as biometrics  Three types of ear biometrics –Pictures.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
Face Recognition. Introduction Why we are interested in face recognition? Why we are interested in face recognition? Passport control at terminals in.
FATEMEH ARBAB DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF CALGARY WINTER 2009 Ear Biometric.
Adviser:Ming-Yuan Shieh Student:shun-te chuang SN:M
April 14, Infrared Identification Instructor: Natalia Schmid BIOM 426: Biometrics Systems.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Pattern Recognition Topic 1: Principle Component Analysis Shapiro chap
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
UPM, Faculty of Computer Science & IT, A robust automated attendance system using face recognition techniques PhD proposal; May 2009 Gawed Nagi.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Evaluation of Image Pre-processing Techniques for Eigenface Based Face Recognition Thomas Heseltine york.ac.uk/~tomh
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Face Recognition: A Comparison of Appearance-Based Approaches
Performance Evaluation in Computer Vision Kyungnam Kim Computer Vision Lab, University of Maryland, College Park.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Marjie Rodrigues
Facial Recognition CSE 391 Kris Lord.
Thermal imaging of ear biometrics Steinar Watne. Outline – Introduction to biometrics – Ear as biometric – Research questions – Experiment – Pre-processing.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
Karthiknathan Srinivasan Sanchit Aggarwal
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Introduction to Biometric Systems
Distinctive Image Features from Scale-Invariant Keypoints By David G. Lowe, University of British Columbia Presented by: Tim Havinga, Joël van Neerbos.
Recognition Part II Ali Farhadi CSE 455.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Gwangju Institute of Science and Technology Intelligent Design and Graphics Laboratory Multi-scale tensor voting for feature extraction from unstructured.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Face Recognition System By Arthur. Introduction  A facial recognition system is a computer application for automatically identifying or verifying a person.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Access Control Via Face Recognition. Group Members  Thilanka Priyankara  Vimalaharan Paskarasundaram  Manosha Silva  Dinusha Perera.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
OUTLINE I.Biometrics: What Is It? II.Why Ear Biometrics? III.Ear Biometrics IV.How A Biometric System Works V.Conclusion.
Facial Recognition Justin Kwong Megan Thompson Raymundo Vazquez-lugo.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Human Activity Recognition, Biometrics and Cybersecurity Mohamed Abdel-Mottaleb, Ph.D. Image Processing and Computer Vision Department of Electrical and.
WCPM 1 Chang-Tsun Li Department of Computer Science University of Warwick UK Image Clustering Based on Camera Fingerprints.
Iris-based Authentication System Daniel Schonberg and Darko Kirovski, “Iris Compression for Cryptographically Secure Person Identification”, in Proceedings.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Ear biometrics Gökhan Şengül. Contents Using ear shape as biometrics Three types of ear biometrics Pictures Earmarks Thermograms Two cases Application.
Institute of Telecommunication Image Processing Group Ear Biometrics for Human Identification Based on Image Analysis Michal Choras Image Processing Group.
Facial Recognition By Lisa Tomko.
ANITHA L ROLL NO :4 M.TECH[CSE]. LITERATURE SURVEY PROPOSED SYSTEM PERFORMANCE STUDY INTRODUCTION OBJECTIVE.
ZAGAZIG UNIVERSITY-BENHA BRANCH SHOUBRA FACULTY OF ENGINEERING ELECTRICAL ENGINGEERING DEPT. COMPUTER SYSTEM DIVISION GRAUDATION PROJECT 2003.
Tom Face Recognition Software in a border control environment: Non-zero-effort-attacks' effect on False Acceptance Rate.
Face Detection 蔡宇軒.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
FACE RECOGNITION. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Hand Geometry Recognition
Improving the Performance of Fingerprint Classification
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
PRESENTED BY Yang Jiao Timo Ahonen, Matti Pietikainen
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Recognition: Face Recognition
Facial Recognition [Biometric]
Facial Recognition in Biometrics
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

Ear biometrics Hanna-Kaisa Lammi

Contents  Biometrics in general  Using ear shape as biometrics  Three types of ear biometrics –Pictures –Earmarks –Thermograms  Two cases  Application scenarios and possible errors

Biometrics Biometrics are unique physical or behavioral characteristics of an individual which can be measured and thus compared to accurately verify or identify an individual.

Ideal biometric  universal: each person should possess the characteristics  unique: no two persons should share the characteristics  permanent: the characteristics should not change  collectable: easily presentable to a sensor and quantifiable

Identification or authentication?  Identification: the biometric is combined with the database to find who the person is: “Who I am?”  Authentication: the biometric is compared with data, which is known to be valid, e.g. data in identification card “Am I who I claim I am?”

Ear shape  physical biometric, which is characterized by the shape of the outer ear, lobes and bone structure  unique enough?  new biometric, not widely used yet  no applications available yet

Ear Most important parts in ear shape identification are Foseta Antitrago Helix

Same ear can look different…

Advantages - disadvantages  Ears are smaller than e.g. faces  reduced spatial resolution  Ears are not as variable as e.g. faces  We have almost none adjectives to describe ears: we can recognize people from faces but can we recognize them from ears?

Permanence of biometrics Bromba GmbH

3 types of ear biometrics  biometrics from photo of ear: most researched, most famous is Iannarelli’s classification work  “ear marks”: interesting in crime detection  thermogram pictures: a new possibility

Alfred Iannarelli  deputy sheriff and campus police in California, no scientific background  compared over 10,000 ears drawn from a randomly selected sample in California  another study was among identical and non- identical twins  Using Iannarelli’s measurements  Result: ears are not identical. Even identical twins had similar but not identical ears.

Iannarelli’s measurements (a) Anatomy, (b) Measurements. (a) 1 Helix Rim, 2 Lobule, 3 Antihelix, 4 Concha, 5 Tragus, 6 Antitragus, 7 Crus of Helix, 8 Triangular Fossa, 9 Incisure Intertragica. (b) The locations of the anthropometric measurements used in the “Iannarelli System”. (Burge et al., 1998)

Iannarelli’s system - weaknesses  if the first point is incorrect, all measurements are incorrect  localizing the anatomical points is not very well suitable for machine vision  some other methods had to be found

Methods using pictures (1/4)  Moreno et al. (1999) –multiple identification method, which combines the results from several neural classifiers using feature outer ear points, information obtained from ear shape and wrinkles, and macro features extracted by compression network –introduce three different classification techniques for outer ear or auricle identifying.

Methods using pictures (2/4)  Burge and Burger (1998, 2000) –automating ear biometrics with Voronoi diagram of its curve segments. –a novel graph matching based algorithm for authentication, which takes into account the possible error curves, which can be caused by e.g. lightning, shadowing and occlusion.

Methods using pictures (3/4)  Hurley, Nixon and Carter (2000a, 2000b) –force field transformations for ear recognition. –the image is treated as an array of Gaussian attractors that act as the source of the force field –according to the researchers this feature extraction technique is robust and reliable and it possesses good noise tolerance.

Methods using pictures (4/4)  Victor, Chang, Bowyer, Sarkar (at least 2 publications in 2002 and 2003) –principal component analysis approach –comparison between ears and faces This method is presented later with 2 cases.

Earmarks  when the ear is pressed against some hard material, e.g. glass, the result is called earmark  used in forensic research  at least 4 criminals are judged because of earmarks in decade of 1980 in England and in The Netherlands  later it was decided by a Dutch court that earmarks are not unique and reliable enough

Ear thermogram Thermogram of an ear. Image provided by Brent Griffith, Infrared Thermography Laboratory, Lawrence Berkeley, National Laboratory. (Burge et al., 1998) used for removing “non-ear”, e.g. hair and other obstacles in this case hair is between 27.2 and 29.7ºC while the outer ear areas range from 30.0 to 37.2 ºC

Case 1: an evaluation of face and ear biometrics  Done by Victor, B., Bowyer, K., and Sarkar S, published in Proceedings of International Conference on Pattern Recognition, August 2002  The used method is principal component analysis (PCA) and the design principle is adopted from the FERET methodology  Null hypothesis: there is no significant performance difference between using the ear or face as a biometric

PCA Method

Points for normalization

Tests of research by Victor et al.  For faces: 1.Same day, different expression 2.Different day, similar expression 3.Different day, different expression  For ears: 1.Same day, opposite ear 2.Different day, same ear 3.Different day, opposite ear

Same day, different expression or opposite ear ear

Different day, similar expression or same ear ear

Different day, different expression or opposite ear ear

Victor et al. research result Experiment #Expected ResultResult 1Same day, different expression Same day, opposite ear Greater variation in expressions than ears; ears perform better Face performs better 2Different day, similar expression Different day, same ear Greater variation in expression across days; ears perform better Face performs better 3Differet day, different expression Different day, opposite ear Greater variation in face expression than ear; ears perform better Face performs better Face/Ear compared

Case 2: Ear and Face images  ”Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics” by Chang, K., Bowyer, K.W., Sarkar, S., and Victor, B.  Published in IEEE Transactions on Pattern Analysis and Machine Intelligence on September  Hypothesis: (i) ear provide better biometric performance than images of the face and (ii) exploring whether a combination of ear and face images may provide better performance than either one individually

Images used in research by Chang et al. (2003) Same kinds of sets for faces, too. PCA, FERET

Tests for the research 1. day variation  other conditions constant 2. different lightning condition  taken in the same day in the same session 3. pose variation  22.5 degree rotation, other conditions constant, taken in the same day Combined face, ear and face+ear What do you think the result was?

Day variation test

Different lightning conditions

Pose variation (22.5 degree rotation)

Results  In this research face biometrics seem to be better in constant conditions, ear biometrics in changing conditions  Multimodal biometrics face plus ear gives the best results, why not use them?

Ear shape applications  currently there are no applications, which use ear identification or authentication  crime investigation is interested in using ear identification  active ear authentication could be possible in different scenarios

Application scenarios  Application scenarios are quite traditional for biometrics: –collecting child from daycare –ATM –any other active identification  passive –e.g. when trying to solve a crime and there’s a picture of ear in the tape of a surveillance camera e.g. gas station robbery in The Netherlands

Biometric suitability for authentication purpose Bromba GmbH

Error possibilities in ear recognition

False rates in ear identification  FRR = false reject rate  FAR = false acceptance rate Normally one of these is tried to minimize.

Improving the FRR with ear curve widths, an example width of an ear curve corresponding to the upper Helix rim  better results

Removal of noise curves in the inner ear Graph model (Burge et al.) and false curves because of e.g. oil and wax of the ear.

Possibilities to enhance ear biometrics  Using accurate measurements, e.g. ear curve and upper helix rim  Removing noise curves  Thermograms  removal of obstacles  Better quality cameras  more accurate pictures  Combined biometrics

References (1/2)  Bamber, D. Prisoners to appeal as unique ‘earprint’ evidence is discredited. Telegraph Newspaper (UK). Updated 02/12/2001 [Retrieved October 3, 2003] From:  Bromba GmbH, Bioidentification Frequently Asked Questions. Updated [Retrieved October 28, 2003] From:  Burge, M. and Burger, W. Ear Biometrics. In A. Jain R. Bolle and S. Pankanti, editors, BIOMETRICS: Personal Identification in a Networked Society, pp Kluwer Academic,  Burge, M. and Burger, W. Ear Biometrics in Computer Vision. In the 15 th International Conference of Pattern Recognition, ICPR 2000, pp  Carreira-Perpinan, M.A. Abstract from MSc thesis Compression neural networks for feature extraction: Application to human recognition from ear images, Technical University of Madrid [Retrieved October 16, 2003]. From  Chang, K., Bowyer. K.W., Sarkar, S., Victor, B. Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 9, September 2003, pp  Forensic Evidence News: Ear Identification. Version updated Nov. 1, [Retrieved October 3, 2003] From

References (2/2)  Hoogstrate, A.J., Van den Heuvel, H., Huyben, E. Ear Identification Based on Surveillance Camera’s Images. Version updated May 31, [Retrieved October 7, 2003] From: evidence.com/site/ID/IDearCamera.html.  Hurley, D.J., Nixon, M. S., Carter, J.N. Automated Ear Recognition by Force Field Transformations in Proceedings IEE Colloquium: Visual Biometris (00/018), 2000a, pp. 8/1-8/5.  Hurley, D.J., Nixon, M.S., Carter, J.N. A New Force Field Transform for Ear and Face Recognition. In Proceedings of the IEEE 2000 International Conference on Image Processin ICIP 2000b, pp  Jain, A., Hong, L., Pankati, S. Biometric Identification. Communications of the ACM, February 2000/Vol. 43, No. 2, pp  Moreno, B., Sánchez, Á., Vélez. J.F. On the Use of Outer Ear Images for Personal Identification in Security Applications. IEEE 33 rd Annual International Carnahan Conference on Security Technology, 1999, pp  Morgan, J. Court Holds Earprint Identification Not Generally Accepted In Scientific Community, State v. David Wayne Kunze [Retrieved September 9, 2003]. From: evidence.com/site/ID/ID_Kunze.html  Ratha, N.K., Senior, A., Bolle, R.M. Automated Biometrics in Proceedings of International Conference on Advances in Pattern Recognition, Rio de Janeiro, Brazil, March  Victor, B., Bowyer, K., Sarkar, S. An evaluation of face and ear biometrics in Proceedings of International Conference on Pattern Recognition, pp , August 2002.

Questions? Thank you for your attention!