Human Activity Recognition, Biometrics and Cybersecurity Mohamed Abdel-Mottaleb, Ph.D. Image Processing and Computer Vision Department of Electrical and.

Slides:



Advertisements
Similar presentations
Active Appearance Models
Advertisements

Kien A. Hua Division of Computer Science University of Central Florida.
Face Recognition. Introduction Why we are interested in face recognition? Why we are interested in face recognition? Passport control at terminals in.
Víctor Ponce Miguel Reyes Xavier Baró Mario Gorga Sergio Escalera Two-level GMM Clustering of Human Poses for Automatic Human Behavior Analysis Departament.
Face Alignment with Part-Based Modeling
Automatic Feature Extraction for Multi-view 3D Face Recognition
3D Face Modeling Michaël De Smet.
Amir Hosein Omidvarnia Spring 2007 Principles of 3D Face Recognition.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
Object Recognition with Invariant Features n Definition: Identify objects or scenes and determine their pose and model parameters n Applications l Industrial.
Face Recognition Under Varying Illumination Erald VUÇINI Vienna University of Technology Muhittin GÖKMEN Istanbul Technical University Eduard GRÖLLER Vienna.
ADVISE: Advanced Digital Video Information Segmentation Engine
A Study of Approaches for Object Recognition
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
UPM, Faculty of Computer Science & IT, A robust automated attendance system using face recognition techniques PhD proposal; May 2009 Gawed Nagi.
3-D Object Recognition From Shape Salvador Ruiz Correa Department of Electrical Engineering.
Automatic Pose Estimation of 3D Facial Models Yi Sun and Lijun Yin Department of Computer Science State University of New York at Binghamton Binghamton,
FACE RECOGNITION, EXPERIMENTS WITH RANDOM PROJECTION
Visual Information Retrieval Chapter 1 Introduction Alberto Del Bimbo Dipartimento di Sistemi e Informatica Universita di Firenze Firenze, Italy.
MVL (Machine Vision Lab) UIC HUMAN MOTION VIDEO DATABASE Jezekiel Ben-Arie ECE Department University Of Illinois at Chicago Scripts, Queries, Recognition.
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
Three-Dimensional Face Recognition Using Surface Space Combinations Thomas Heseltine, Nick Pears, Jim Austin Advanced Computer Architecture Group Department.
Shape Recognition and Pose Estimation for Mobile Augmented Reality Author : N. Hagbi, J. El-Sana, O. Bergig, and M. Billinghurst Date : Speaker.
Multimedia Databases (MMDB)
General Tensor Discriminant Analysis and Gabor Features for Gait Recognition by D. Tao, X. Li, and J. Maybank, TPAMI 2007 Presented by Iulian Pruteanu.
Face Recognition System By Arthur. Introduction  A facial recognition system is a computer application for automatically identifying or verifying a person.
CSCE 5013 Computer Vision Fall 2011 Prof. John Gauch
Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering.
Video Based Palmprint Recognition Chhaya Methani and Anoop M. Namboodiri Center for Visual Information Technology International Institute of Information.
An Information Fusion Approach for Multiview Feature Tracking Esra Ataer-Cansizoglu and Margrit Betke ) Image and.
Multimodal Information Analysis for Emotion Recognition
Computer Science Department Pacific University Artificial Intelligence -- Computer Vision.
Access Control Via Face Recognition. Group Members  Thilanka Priyankara  Vimalaharan Paskarasundaram  Manosha Silva  Dinusha Perera.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
A Two-level Pose Estimation Framework Using Majority Voting of Gabor Wavelets and Bunch Graph Analysis J. Wu, J. M. Pedersen, D. Putthividhya, D. Norgaard,
Kansas State University Department of Computing and Information Sciences CIS 830: Advanced Topics in Artificial Intelligence Wednesday, March 29, 2000.
1 Terrorists Face recognition of suspicious and (in most cases) evil homo-sapiens.
Action and Gait Recognition From Recovered 3-D Human Joints IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS— PART B: CYBERNETICS, VOL. 40, NO. 4, AUGUST.
Efficient Visual Object Tracking with Online Nearest Neighbor Classifier Many slides adapt from Steve Gu.
2005/12/021 Fast Image Retrieval Using Low Frequency DCT Coefficients Dept. of Computer Engineering Tatung University Presenter: Yo-Ping Huang ( 黃有評 )
A NOVEL METHOD FOR COLOR FACE RECOGNITION USING KNN CLASSIFIER
Semantic Extraction and Semantics-Based Annotation and Retrieval for Video Databases Authors: Yan Liu & Fei Li Department of Computer Science Columbia.
Team Members Ming-Chun Chang Lungisa Matshoba Steven Preston Supervisors Dr James Gain Dr Patrick Marais.
Using decision trees to build an a framework for multivariate time- series classification 1 Present By Xiayi Kuang.
VISUAL INFORMATION RETRIEVAL Presented by Dipti Vaidya.
Motion Segmentation at Any Speed Shrinivas J. Pundlik Department of Electrical and Computer Engineering, Clemson University, Clemson, SC.
Face Recognition Technology By Catherine jenni christy.M.sc.
WLD: A Robust Local Image Descriptor Jie Chen, Shiguang Shan, Chu He, Guoying Zhao, Matti Pietikäinen, Xilin Chen, Wen Gao 报告人:蒲薇榄.
Portable Camera-Based Assistive Text and Product Label Reading From Hand-Held Objects for Blind Persons.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
By: Suvigya Tripathi (09BEC094) Ankit V. Gupta (09BEC106) Guided By: Prof. Bhupendra Fataniya Dept. of Electronics and Communication Engineering, Nirma.
Under Guidance of Mr. A. S. Jalal Associate Professor Dept. of Computer Engineering and Applications GLA University, Mathura Presented by Dev Drume Agrawal.
Visual Information Retrieval
Gait Recognition Gökhan ŞENGÜL.
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
Face Recognition 1.
FACE RECOGNITION TECHNOLOGY
Submitted by: Ala Berawi Sujod Makhlof Samah Hanani Supervisor:
Can Computer Algorithms Guess Your Age and Gender?
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
ABSTRACT FACE RECOGNITION RESULTS
Recovery from Occlusion in Deep Feature Space for Face Recognition
Facial Recognition in Biometrics
Domingo Mery Department of Computer Science
Faculty of Science IT Department Lecturer: Raz Dara MA.
Authors: C. Shyu, C.Brodley, A. Kak, A. Kosaka, A. Aisen, L. Broderick
Paper Reading Dalong Du April.08, 2011.
Domingo Mery Department of Computer Science
Presentation transcript:

Human Activity Recognition, Biometrics and Cybersecurity Mohamed Abdel-Mottaleb, Ph.D. Image Processing and Computer Vision Department of Electrical and Computer Engineering University of Miami

Human Activity Recognition

Results Sampled frames from a sequence with several activities We collected 81 video sequences of single activities for training HMMs. The algorithm has been tested on a set of sixteen sequences of continuous complex activities consisting of totally 66 single activities. 59 single activities were properly segmented and recognized from the sixteen video clips. This means that our system has an accuracy rate of 89%. The results demonstrate the efficiency of the algorithm with respect to segmentation and recognition voting results for the complex activity

Pathologic Gait Identification Pathologic Gait Identification

Data collection Camera positions within the reconstruction volume A motion-capturing system composed of eight M-Cam cameras (Vicon 512, Vicon Motion Systems, Lake Forest, CA) that record the spatial positions of the markers throughout the whole gait cycles. A motion-capturing system composed of eight M-Cam cameras (Vicon 512, Vicon Motion Systems, Lake Forest, CA) that record the spatial positions of the markers throughout the whole gait cycles.

Data collection Marker set used in the current study we are interested in assessing the walking gait based on motion symmetry, we just use the data from symmetrical markers for our purpose. We also use the data from marker CLAV in our work. we are interested in assessing the walking gait based on motion symmetry, we just use the data from symmetrical markers for our purpose. We also use the data from marker CLAV in our work.

Biometrics The use of unique human characteristics to positively identify a person The use of unique human characteristics to positively identify a person Biometrics has attracted much attention due to its potential in a broad range of applications Biometrics has attracted much attention due to its potential in a broad range of applications Biometrics offers reliable technique to answer the enormous need in society Biometrics offers reliable technique to answer the enormous need in society 7

8 Fully Automated Face Normalization and Single Sample Face Recognition in Unconstrained Environments

9 Our proposed face normalization technique. (a) Estimated landmarks using the flexible mixture of trees. (b) Triangularization of the initial mesh created by the estimated landmarks. (c) Fitting active appearance model on the face. (d) Result of the piecewise affine warping into the frontal mesh. Single Sample Face Recognition in the Wild We proposed a pose normalization technique that synthesizes a frontal face from rotated faces.

10 Single Sample Face Recognition in the Wild Experimental Results on the LFW Database Publications: M. Haghighat, M. Abdel-Mottaleb, “Fully Automatic Face Normalization and Single Sample Face Recognition in Unconstrained Environments,” Expert Systems With Applications, vol. 47, pp , (Impact Factor: 2.57)

Ear Recognition 11

Shape from Shading 12  Shape from shading is ideal for 3D surface reconstruction of texture-less, quasi-Lambertian objects such as the ear.

Gender Recognition from Ear Images Ear Detection Ear Detection Feature Extraction: Gabor Wavelets Feature Extraction: Gabor Wavelets Feature Reduction: PCA Feature Reduction: PCA Building The Dictionary (Matrix A) Building The Dictionary (Matrix A) Sparse Representation Sparse Representation Majority Voting Majority Voting 13 R. Khorsandi and M. Abdel-Mottaleb, “Ear Biometrics and Sparse Representation based on Smoothed L0 Norm”, Accepted in International Journal of Pattern Recognition and Artificial Intelligence, 2014

14 Cloud-Based Privacy-Preserving Biometric Identification (CloudID) Biometrics as a key attribute: Advantages: high level of security precise identification not being transferable mobility impossibility to forge user friendliness Face as a biometric: Additional Advantages: no need for subject’s interaction no need for additional hardware can be done from long distance and anonymously applications in surveillance systems Cons: changes in illumination, pose, expression, image occlusion changes by aging similarities between people irretrievable identity theft CloudID uses a k-d tree structure to create encrypted search queries. Applying this structure in the core of a searchable encryption technique helps the system not only to quantize the biometric features but also to handle the variations in the biometric data.

15 Trusted Party Cloud DB Query(TK,C) Anti- Spoofing Face Detection Feature Extraction Dimensionality Reduction Quantization (k-d tree) Generate Token ( TK ) Create Encrypted Predicate Cloud Cloud-Based Privacy-Preserving Biometric Identification (CloudID) CloudID is the first cloud-based biometric identification system. It links the confidential information of the users to their biometrics and stores it in an encrypted fashion. Making use of a searchable encryption technique, biometric identification is performed in encrypted domain to make sure that the cloud provider or potential attackers do not gain access to any sensitive data or even the contents of the individual queries. M. Haghighat, S. Zonouz, M. Abdel-Mottaleb, "CloudID: Trustworthy Cloud-based and Cross-Enterprise Biometric Identification", Expert Systems With Applications, 42, pp , June 2015 (selected as one of the top 26 biometrics research papers across Elsevier in )

Medical Applications Nursing Applications? Nursing Applications? Home Personal Assistant Home Personal Assistant Helping the Visually Impaired Helping the Visually Impaired Medical Applications Medical Applications Psychological assessment of patients from video clips showing their interactions Psychological assessment of patients from video clips showing their interactions Study of Autistic Children from Video Study of Autistic Children from Video