IIIT Hyderabad Atif Iqbal and Anoop Namboodiri Cascaded.

Slides:



Advertisements
Similar presentations
Relevance Feedback and User Interaction for CBIR Hai Le Supervisor: Dr. Sid Ray.
Advertisements

Proximity Searching in High Dimensional Spaces with a Proximity Preserving Order Edgar Chávez Karina Figueroa Gonzalo Navarro UNIVERSIDAD MICHOACANA, MEXICO.
Presented by Xinyu Chang
Content-Based Image Retrieval
Face Recognition. Introduction Why we are interested in face recognition? Why we are interested in face recognition? Passport control at terminals in.
VisualRank: Applying PageRank to Large-Scale Image Search Yushi Jing, Member, IEEE, and Shumeet Baluja, Member, IEEE.
MIT CSAIL Vision interfaces Approximate Correspondences in High Dimensions Kristen Grauman* Trevor Darrell MIT CSAIL (*) UT Austin…
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
IIIT Hyderabad Pose Invariant Palmprint Recognition Chhaya Methani and Anoop Namboodiri Centre for Visual Information Technology IIIT, Hyderabad, INDIA.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Cascaded Filtering For Biometric Identification Using Random Projection Atif Iqbal.
Special Topic on Image Retrieval Local Feature Matching Verification.
Computer Vision Spring ,-685 Instructor: S. Narasimhan Wean 5403 T-R 3:00pm – 4:20pm Lecture #20.
Introduction to Fingerprint Biometrics By Tamar Bar.
Dimensionality Reduction
Symmetric hash functions for fingerprint minutiae
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Indexing and Binning Large Databases
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Video Google: Text Retrieval Approach to Object Matching in Videos Authors: Josef Sivic and Andrew Zisserman University of Oxford ICCV 2003.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Face Recognition: An Introduction
Spatial and Temporal Databases Efficiently Time Series Matching by Wavelets (ICDE 98) Kin-pong Chan and Ada Wai-chee Fu.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
1 Fingerprint Classification sections Fingerprint matching using transformation parameter clustering R. Germain et al, IEEE And Fingerprint Identification.
IIIT Hyderabad Security and Privacy of Visual Data Maneesh Upmanyu, C. Narsimha Raju Anoop M. Namboodiri, K. Srinathan, C.V. Jawahar Center for Visual.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Generalized Fuzzy Clustering Model with Fuzzy C-Means Hong Jiang Computer Science and Engineering, University of South Carolina, Columbia, SC 29208, US.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Features-based Object Recognition P. Moreels, P. Perona California Institute of Technology.
The Simigle Image Search Engine Wei Dong
Face Recognition: An Introduction
Virtual Vector Machine for Bayesian Online Classification Yuan (Alan) Qi CS & Statistics Purdue June, 2009 Joint work with T.P. Minka and R. Xiang.
Identifying Patterns in Time Series Data Daniel Lewis 04/06/06.
Biometrics Authentication Technology
1 Biometric Databases. 2 Overview Problems associated with Biometric databases Some practical solutions Some existing DBMS.
Efficient EMD-based Similarity Search in Multimedia Databases via Flexible Dimensionality Reduction / 16 I9 CHAIR OF COMPUTER SCIENCE 9 DATA MANAGEMENT.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
An Approximate Nearest Neighbor Retrieval Scheme for Computationally Intensive Distance Measures Pratyush Bhatt MS by Research(CVIT)
Outline Problem Background Theory Extending to NLP and Experiment
Vector and symbolic processors
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
BIOMETRICS.
Iris-based Authentication System Daniel Schonberg and Darko Kirovski, “Iris Compression for Cryptographically Secure Person Identification”, in Proceedings.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Image Retrieval and Ranking using L.S.I and Cross View Learning Sumit Kumar Vivek Gupta
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Authentication.
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Topological Signatures For Fast Mobility Analysis
Presentation transcript:

IIIT Hyderabad Atif Iqbal and Anoop Namboodiri Cascaded Filtering for Biometric Identification using Random Projections 1

IIIT Hyderabad What is Biometrics? Advantages: –User convenience, Non-repudiation, Wide range of applications (data protection, transaction and web security) “Uniquely recognizing a person based on their physiological or behavioral characteristics” 2

IIIT Hyderabad Biometric Authentication System Feature Extractor Template Generation Feature Extractor Template Matching Template Database Verification Yes No 3

IIIT Hyderabad Biometric Authentication System Feature Extractor Template Generation Feature Extractor Template Matching Template Database Identification Yes No Search in the entire database 4

IIIT Hyderabad Scale of the Matching Problem Large Database (1.25 billion in case of UID project). Identification: obtained template is matched with each template stored. If one matching takes around 1 millisecond, a single enrollment will take more than 300 hrs. With 1000 processors, it will take over 20,000 years to enroll every Indian. Unacceptable 5

IIIT Hyderabad Large Scale Search Problems Application in web search Match every search query against 1 trillion web pages Text search is fast Indexing improves the speed of data retrieval. 6

IIIT Hyderabad Biometric Indexing: A Special Case High Inter-Class Variation Low Intra-Class Variation Low variation in inter-class distances 7

IIIT Hyderabad Indexing of Biometric data 8 Indexing is difficult in biometrics Features extracted has high dimensions Do not have natural sorting order. Acquired image can be of poor quality. Use of different sensors.

IIIT Hyderabad Good Biometrics have Bad Indexability False Non-Identification Rate (FNIR) vs Penetration (%) (CASIA Iris) 9

IIIT Hyderabad Indexing in biometrics First indexing in biometrics 1900 by Edward Henry for fingerprint. Arch (~5%) Loop(~60%) Whorl(~35%) Indexing using KD-Trees Pyramid indexing a database is pruned to 8.86% of original size with 0% FNIR. In Mehrotra et al(2009) the IRIS datasets were pruned to 35% with an FNIR of 2.6%. 10

IIIT Hyderabad Filtering with projections 11

IIIT Hyderabad Random projections Distance preserving nature of random projections. Useful in variety of applications: dimensional reduction, density estimation, data clustering, nearest neighbor search, document classification etc. Derive low dimensional feature vectors. Computationally less expensive. Similarity of data vectors is preserved. Organizing textual documents. 12

IIIT Hyderabad Our approach 13

IIIT Hyderabad Feature Representation 14 Gabor response Mehrotra et al[2009]

IIIT Hyderabad Results Data pruned after each set of 50 projections, starting with 1. The improvement in pruning reduces as the number of projections increase 15

IIIT Hyderabad Results It takes 2.86 seconds for explicit comparison of a template against all samples, whereas it takes 0.84 seconds after using filtering pipeline of 104 random projections. 16

IIIT Hyderabad Summary Search space reduced by 63% and search time by 3 times. The approach is flexible using different feature vectors. Cost for inserting new data is minimal. Allows a high degree of parallelization. Possibility of creating more complex filtration with formally characterized fitness function. 17

IIIT Hyderabad 18