Aristotle University of Thessaloniki, Department of Informatics A. Tefas, C. Kotropoulos, I. Pitas A RISTOTLE U NIVERSITY OF T HESSALONIKI D EPARTMENT.

Slides:



Advertisements
Similar presentations
Context-based object-class recognition and retrieval by generalized correlograms by J. Amores, N. Sebe and P. Radeva Discussion led by Qi An Duke University.
Advertisements

Road-Sign Detection and Recognition Based on Support Vector Machines Saturnino, Sergio et al. Yunjia Man ECG 782 Dr. Brendan.
Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
Designing Facial Animation For Speaking Persian Language Hadi Rahimzadeh June 2005.
Face Recognition By Sunny Tang.
Face Description with Local Binary Patterns:
AGE ESTIMATION: A CLASSIFICATION PROBLEM HANDE ALEMDAR, BERNA ALTINEL, NEŞE ALYÜZ, SERHAN DANİŞ.
A Temporal Network of Support Vector Machines for the Recognition of Visual Speech Mihaela Gordan *, Constantine Kotropoulos **, Ioannis Pitas ** * Faculty.
As applied to face recognition.  Detection vs. Recognition.
1 Fast Asymmetric Learning for Cascade Face Detection Jiaxin Wu, and Charles Brubaker IEEE PAMI, 2008 Chun-Hao Chang 張峻豪 2009/12/01.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
Face Recognition Committee Machine Presented by Sunny Tang.
ICIP 2000, Vancouver, Canada IVML, ECE, NTUA Face Detection: Is it only for Face Recognition?  A few years earlier  Face Detection Face Recognition 
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
Dynamic Face Recognition Committee Machine Presented by Sunny Tang.
Face Recognition using PCA (Eigenfaces) and LDA (Fisherfaces)
Research activities at AUTH related to dialogue detection Ioannis Pitas Constantine Kotropoulos Nikos Nikolaidis Research activities at AUTH related to.
Feature vs. Model Based Vocal Tract Length Normalization for a Speech Recognition-based Interactive Toy Jacky CHAU Department of Computer Science and Engineering.
FACE RECOGNITION, EXPERIMENTS WITH RANDOM PROJECTION
Presented by Zeehasham Rasheed
Optimized Numerical Mapping Scheme for Filter-Based Exon Location in DNA Using a Quasi-Newton Algorithm P. Ramachandran, W.-S. Lu, and A. Antoniou Department.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
N. Nikolaidis C. Kotropoulos I. Pitas Artificial Intelligence and Information Analysis (AIIA) Laboratory Department of Informatics Aristotle University.
Three-Dimensional Face Recognition Using Surface Space Combinations Thomas Heseltine, Nick Pears, Jim Austin Advanced Computer Architecture Group Department.
Oral Defense by Sunny Tang 15 Aug 2003
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Face Recognition Using Neural Networks Presented By: Hadis Mohseni Leila Taghavi Atefeh Mirsafian.
Overview Introduction to local features
Recognition Part II Ali Farhadi CSE 455.
Face Model Fitting with Generic, Group-specific, and Person- specific Objective Functions Chair for Image Understanding and Knowledge-based Systems Institute.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
KYLE PATTERSON Automatic Age Estimation and Interactive Museum Exhibits Advisors: Prof. Cass and Prof. Lawson.
General Tensor Discriminant Analysis and Gabor Features for Gait Recognition by D. Tao, X. Li, and J. Maybank, TPAMI 2007 Presented by Iulian Pruteanu.
Chapter 14 Speaker Recognition 14.1 Introduction to speaker recognition 14.2 The basic problems for speaker recognition 14.3 Approaches and systems 14.4.
COMPARISON OF IMAGE ANALYSIS FOR THAI HANDWRITTEN CHARACTER RECOGNITION Olarik Surinta, chatklaw Jareanpon Department of Management Information System.
Multimodal Information Analysis for Emotion Recognition
Handwritten Recognition with Neural Network Chatklaw Jareanpon, Olarik Surinta Mahasarakham University.
Face Recognition: An Introduction
The Extraction and Classification of Craquelure for Geographical and Conditional Based Analysis of Pictorial Art Mouhanned El-Youssef, Spike Bucklow, Roman.
A Face processing system Based on Committee Machine: The Approach and Experimental Results Presented by: Harvest Jang 29 Jan 2003.
Designing multiple biometric systems: Measure of ensemble effectiveness Allen Tang NTUIM.
Optimal Component Analysis Optimal Linear Representations of Images for Object Recognition X. Liu, A. Srivastava, and Kyle Gallivan, “Optimal linear representations.
Categorization by Learning and Combing Object Parts B. Heisele, T. Serre, M. Pontil, T. Vetter, T. Poggio. Presented by Manish Jethwa.
Voice Activity Detection based on OptimallyWeighted Combination of Multiple Features Yusuke Kida and Tatsuya Kawahara School of Informatics, Kyoto University,
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
Timo Ahonen, Abdenour Hadid, and Matti Pietikainen
2D-LDA: A statistical linear discriminant analysis for image matrix
Fast face localization and verification J.Matas, K.Johnson,J.Kittler Presented by: Dong Xie.
Robodog Frontal Facial Recognition AUTHORS GROUP 5: Jing Hu EE ’05 Jessica Pannequin EE ‘05 Chanatip Kitwiwattanachai EE’ 05 DEMO TIMES: Thursday, April.
Facial Recognition By Lisa Tomko.
Evaluation of Gender Classification Methods with Automatically Detected and Aligned Faces Speaker: Po-Kai Shen Advisor: Tsai-Rong Chang Date: 2010/6/14.
ZAGAZIG UNIVERSITY-BENHA BRANCH SHOUBRA FACULTY OF ENGINEERING ELECTRICAL ENGINGEERING DEPT. COMPUTER SYSTEM DIVISION GRAUDATION PROJECT 2003.
Tom Face Recognition Software in a border control environment: Non-zero-effort-attacks' effect on False Acceptance Rate.
Face Detection & Recognition
Content Based Coding of Face Images
PRESENTED BY Yang Jiao Timo Ahonen, Matti Pietikainen
FACE RECOGNITION TECHNOLOGY
Final Year Project Presentation --- Magic Paint Face
RECURRENT NEURAL NETWORKS FOR VOICE ACTIVITY DETECTION
Cheng-Ming Huang, Wen-Hung Liao Department of Computer Science
Outline S. C. Zhu, X. Liu, and Y. Wu, “Exploring Texture Ensembles by Efficient Markov Chain Monte Carlo”, IEEE Transactions On Pattern Analysis And Machine.
Scale-Space Representation for Matching of 3D Models
Scale-Space Representation for Matching of 3D Models
Faculty of Science IT Department Lecturer: Raz Dara MA.
An Infant Facial Expression Recognition System Based on Moment Feature Extraction C. Y. Fang, H. W. Lin, S. W. Chen Department of Computer Science and.
Presentation transcript:

Aristotle University of Thessaloniki, Department of Informatics A. Tefas, C. Kotropoulos, I. Pitas A RISTOTLE U NIVERSITY OF T HESSALONIKI D EPARTMENT OF I NFORMATICS F RONTIERS OF M ATHEMATICAL M ORPHOLOGY F RONTIERS OF M ATHEMATICAL M ORPHOLOGY April 17-20, 2000, Strasbourg, France F ACE A UTHENTICATION BASED ON M ATHEMATICAL M ORPHOLOGY

Aristotle University of Thessaloniki, Department of Informatics O UTLINE 4 4 Introduction 4 4 Morphological techniques in elastic graph matching 4 4 Morphological elastic graph matching 4 4 Morphological signal decomposition 4 4 Experimental Results 4 4 Conclusions

Aristotle University of Thessaloniki, Department of Informatics I NTRODUCTION 4 Face recognition has exhibited a tremendous growth for more than two decades. 4 Face verification:“Given a reference facial image or images and a test one, decide whether the test face corresponds to the reference one”. 4 Multi-modal person verification.

Aristotle University of Thessaloniki, Department of Informatics I NTRODUCTION 4 Elastic graph matching (EGM) exploits both the gray- level information and shape information. 4 The response of a set of 2D Gabor filters tuned to different orientations and scales is measured at the grid nodes in EGM. 4 Morphological elastic graph matching (MEGM) and morphological signal decomposition elastic graph matching (MSD-EGM) use the multi-scale morphological dilation-erosion and the morphological signal decomposition instead of Gabor filters.

Aristotle University of Thessaloniki, Department of Informatics Elastic Graph Matching 4 Local descriptors extracted at the nodes of a sparse grid: 4 The objective is to minimize the cost function: 4 Signal Similarity measure: M ORPHOLOGICAL T ECHNIQUES IN E LASTIC G RAPH M ATCHING

Aristotle University of Thessaloniki, Department of Informatics M ORPHOLOGICAL T ECHNIQUES IN E LASTIC G RAPH M ATCHING Definitions

Aristotle University of Thessaloniki, Department of Informatics Multi-scale dilation-erosion of an image by a structuring function: Feature vector located at a grid node: M ORPHOLOGICAL T ECHNIQUES IN E LASTIC G RAPH M ATCHING

Aristotle University of Thessaloniki, Department of Informatics Suitable structuring functions 4 Scaled hemisphere: 4 Flat: 4 Circular paraboloid: M ORPHOLOGICAL T ECHNIQUES IN E LASTIC G RAPH M ATCHING

Aristotle University of Thessaloniki, Department of Informatics M ORPHOLOGICAL T ECHNIQUES IN E LASTIC G RAPH M ATCHING

Aristotle University of Thessaloniki, Department of Informatics Output of multi-scale dilation-erosion for nine scales. The first nine pictures are dilated images and the remaining nine are eroded images. M ORPHOLOGICAL T ECHNIQUES IN E LASTIC G RAPH M ATCHING

Aristotle University of Thessaloniki, Department of Informatics MORPHOLOGICAL SIGNAL DECOMPOSITION M ORPHOLOGICAL T ECHNIQUES IN E LASTIC G RAPH M ATCHING 4 objective: 4 i-th component: 4 spine: 4 maximal function: 4 first spine: and

Aristotle University of Thessaloniki, Department of Informatics M ORPHOLOGICAL T ECHNIQUES IN E LASTIC G RAPH M ATCHING MSD algorithm 4 Step 1: initialization. 4 Step 2: i-th level of decomposition. 4 Step 3: calculate i-th component. 4 Step 4: calculate reconstructed image.

Aristotle University of Thessaloniki, Department of Informatics M ORPHOLOGICAL T ECHNIQUES IN E LASTIC G RAPH M ATCHING 4 Feature vector for MSD-EGM: 4 Reconstructed images at nineteen levels of decomposition

Aristotle University of Thessaloniki, Department of Informatics G RID M ATCHING P ROCEDURE (a) (b) (c) Grid matching procedure: (a) Model grid for person BP. (b) Best grid for test person BP after elastic graph matching with the model grid. (c) Best grid for test person BS after elastic graph matching with the model grid for person BP.

Aristotle University of Thessaloniki, Department of Informatics D ISCRIMINANT A NALYSIS T ECHNIQUES 4 Principal component analysis for feature dimension reduction. 4 Linear discriminant analysis for feature selection. 4 Discriminatory power coefficients based on Fisher linear discriminant function for node weighting. 4 Support vector machines for node weighting.

Aristotle University of Thessaloniki, Department of Informatics M2VTS database   The database contains 37 persons’ video data, which include speech consisting of uttering digits and image sequences or rotated heads.   Four recordings (i.e., shots) of the 37 persons have been collected.  Frontal facial images with uniform background were used for the experiments. Experimental protocol  “Leave one out” principle.  5328 impostor and 5328 client claims. E XPERIMENTAL R ESULTS

Aristotle University of Thessaloniki, Department of Informatics E XPERIMENTAL R ESULTS Experimental protocol

Aristotle University of Thessaloniki, Department of Informatics E XPERIMENTAL R ESULTS Performance evaluation 4 False acceptance (FA) occurs when an impostor claim is accepted. 4 False rejection (FR) occurs when a client claim is rejected. 4 Equal error rate (EER) is the operating state where FA rate=FR rate. 4 Receiver operating characteristics (ROC) is the plot of FA rate versus FR rate.

Aristotle University of Thessaloniki, Department of Informatics E XPERIMENTAL R ESULTS Comparison of equal error rates for several authentication techniques in the M2VTS database.

Aristotle University of Thessaloniki, Department of Informatics E XPERIMENTAL R ESULTS

Aristotle University of Thessaloniki, Department of Informatics PERFORMANCE OF MEGM IN XM2VTSdb XM2VTS database  295 persons (8 images per person)  uniform background  Four training images for each client  Evaluation: impostor and 400 client claims  Testing: impostor and 400 client claims  Training: impostor and 200 client claims  Evaluation: impostor and 600 client claims  Testing: impostor and 400 client claims Experimental protocol Configuration II Experimental protocol Configuration I

Aristotle University of Thessaloniki, Department of Informatics PERFORMANCE OF MEGM IN XM2VTSdb Receiver Operating Characteristics MEGM Configuration I Configuration II

Aristotle University of Thessaloniki, Department of Informatics PERFORMANCE OF MEGM IN XM2VTSdb Rates at several FAR on XM2VTSdb in the two configurations of the experimental protocol. All rates are in %.

Aristotle University of Thessaloniki, Department of Informatics C ONCLUSIONS å åNovel methods for image analysis into the elastic graph matching have been proposed. å åThey are based on multi-scale erosion dilation and morphological signal decomposition of the facial image. å åDiscriminant analysis was applied in order to enhance the performance of the proposed methods. å åThe experimental results indicated the success of the proposed methods in frontal face authentication.