{"title":"Fully automated facial symmetry axis detection in frontal color images","authors":"Xin Chen, P. Flynn, K. Bowyer","doi":"10.1109/AUTOID.2005.29","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.29","url":null,"abstract":"We consider the problem of automatically detecting a facial symmetry axis in what we will call a standard human face image (acquired when the subject is looking directly into the camera, in front of a clean gray background under controlled illumination). Images of this kind are encountered in face recognition scenarios; this detection should facilitate more sophisticated facial image processing. The proposed method is based on GLDH (gray level difference histogram) analysis and consists of three components: (1) the face region detection stage crops an approximate face region out of the background, (2) symmetry detection discovers a vertical axis to optimally bisect the region of interest, assuming it is bilaterally symmetric, and (3) orientation adjustment aligns the angle of the symmetry axis with the orientation of the face. An implementation of the method is described, and results are presented. This detector's robust performance is evidenced by its success finding symmetry axes in more than 7,500 images collected from 600 distinct subjects. One of our method's most noteworthy contributions is that, according to our experimental results, many of the automatically detected axes are more accurate than the reference axes. Our automated detector is a powerful tool because it is not as susceptible to human error as its manual counterpart and, as the first application of its kind, it could potentially serve as a new biometric.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130427138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability","authors":"W. K. Yip, A. Goh, D. Ngo, A. Teoh","doi":"10.1109/AUTOID.2005.17","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.17","url":null,"abstract":"We propose a method of extracting cryptographic key from dynamic handwritten signatures that does not require storage of the biometric template or any statistical information that could be used to reconstruct the biometric data. Also, the keys produced are not permanently linked to the biometric hence, allowing them to be replaced in the event of key compromise. This is achieved by incorporating randomness which provides high-entropy to the naturally low-entropy biometric key using iterative inner-product method as in Goh-Ngo, and modified multiple-bit discretization that deters guessing from key statistics. Our proposed methodology follows the design principles of block ciphers to result in unpredictable key space and secure construction.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123180436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guidelines for appropriate use of simulated data for bio-authentication research","authors":"Yan Ma, M. Schuckers, B. Cukic","doi":"10.1109/AUTOID.2005.32","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.32","url":null,"abstract":"In this paper, we outline a framework for appropriate and proper usage of simulated data for biometric authentication research. Currently, there are no formal guidelines concerning the use of simulated data in the biometric authentication literature. Some have suggested the usage of simulated or synthetic data while others have advised against it. Our position is that there is a place for simulation data in biometrics research but that such implementations need to meet certain requirements. To that end, we describe conditions under which it is reasonable to use such data, as well as criteria for evaluating the appropriateness of a data generation methodology. This criteria is that models for generation of artificial data should be flexible, consistent and parsimonious. Along with justifying these criteria, we illustrate how simulated data might be used to evaluate a classifier.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"20 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116692805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic eye-level height system for face and iris recognition systems","authors":"R. Abiantun, M. Savvides, P. Khosla","doi":"10.1109/AUTOID.2005.15","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.15","url":null,"abstract":"In this paper we present a fully automated mobile camera device platform that will automatically adjust to the eye-levels of the persons in front or approaching the system. This system serves as a front-end to aid the face recognition and iris recognition systems during both the enrollment and verification of different people of variable heights. Currently most systems are positioned at fixed heights and require subjects who are very tall or short to adjust themselves for enrollment. In some cases this requires the enrollment system operator (or officer) to adjust the camera system accordingly to the user's height. This leads to much failure to acquire errors. The current U.S. VISIT system, Immigration officers manually move the camera goose-necks to adjust to the height of the visitors for photographing. The system presented in this paper can fully automate this process by automatically adjusting the height of the camera (or other biometric device such as iris acquisition systems) to provide a good enrollment/verification photo image for matching using the automated face detection to drive the biometric sensors to the appropriate height level. The need for such a system can help the results obtained by the Independent Testing of Iris Recognition Technology (ITIRT) and face recognition systems that can lead to minimal user co-operation.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116228497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distance and matching for authentication by on-line signature","authors":"M. Wirotius, Jean-Yves Ramel, N. Vincent","doi":"10.1109/AUTOID.2005.19","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.19","url":null,"abstract":"Authentication by on-line handwritten signature is one of the most accepted authentication way, this is due to its easy use and to our cultural habits. In order to improve performances of the authentication process, we propose to take into account, on one part, the global temporal aspect and the efficiency of the writing of the signature and, on the other part, the signature variability of a person by using the only available information, the training signatures. To improve the robustness of the process we propose a method which consists of selecting the representative points in the signature. Curves comparison is based on dynamic time warping (DTW) in an original way. The different methods elaborated are tested on two databases of signatures and compared with the standard use of DTW. It shows the relevance of the improvements. All the modifications that we have presented will allow to obtain an improvement of more than 15%.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121010137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Natarajan, A. Balasubramanian, S. Mishra, R. Sridhar
{"title":"Security for energy constrained RFID system","authors":"V. Natarajan, A. Balasubramanian, S. Mishra, R. Sridhar","doi":"10.1109/AUTOID.2005.43","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.43","url":null,"abstract":"The information exchange between RFID tags and the reader is not secure due to much inherent vulnerabilities of RF links. Moreover, these tags are typically energy constrained thus limiting the implementation of complex security algorithms. Energy depleted RFID tags are source of potential attacks from intruders with malicious intent. In this paper, we present a solution that helps securing both RFID tags and the information exchange. To this end, we have developed a communication strategy where a tag periodically communicates its security status to the reader and is authenticated. The information exchange between the tags and the reader is secured using AES encryption. Also, we use PUF circuit and a power sensing circuit to identify malicious readers and tags. In addition, we introduce a concept of semi-active tags, whereby an RFID tag whose energy is depleted can use neighboring tags to communicate its security status and be authenticated by the reader. Analysis shows the benefits of our approach.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132376089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acoustic ear recognition for person identification","authors":"A. Akkermans, T. Kevenaar, Daniel W. E. Schobben","doi":"10.1109/AUTOID.2005.11","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.11","url":null,"abstract":"In this paper we investigate how the acoustic properties of the pinna-i.e., the outer flap of the ear- and the ear canal can be used as a biometric. The acoustic properties can be measured relatively easy with an inexpensive sensor and feature vectors can be derived with little effort. We achieve equal error rates in the order of 1.5%-7%, depending on the application device that is used to do the measurement.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130675475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicle license plate location based on histogramming and mathematical morphology","authors":"Feng Yang, Z. Ma","doi":"10.1109/AUTOID.2005.50","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.50","url":null,"abstract":"In a vehicle license plate identification system, plate region detection is the key step before the final recognition. This paper presents a license plate detection algorithm from complex background based on histogramming and mathematical morphology. The proposed algorithm consists of two main modules: license plate region's rough detection and license plate exactly location. The former characterized by vertical gradients detection extracts candidate regions from an input image, while the latter conceptualized in terms of mathematical morphology aims to locate the license plate fast and accurately. Experiments have been conducted for this algorithm, and 360 images taken from various scenes were employed, including diverse angles, different lightening conditions and the dynamic conditions. The algorithm can quickly and correctly detect the region of license plate and the license plate detecting rate of success is 97.78%.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"81 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134065610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating liveness by face images and the structure tensor","authors":"K. Kollreider, H. Fronthaler, J. Bigün","doi":"10.1109/AUTOID.2005.20","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.20","url":null,"abstract":"A technique evaluating liveness in short face image sequences is presented The intended purpose of the proposed system is to assist in a biometric authentication framework, by adding liveness awareness in a non-intrusive manner. Analyzing the trajectories of single parts of a live face reveal valuable information to discriminate it against a spoofed one. The proposed system uses a lightweight novel optical flow, which is especially applicable in face motion estimation based on the structure tensor and a few frames. It uses a model-based local Gabor decomposition and SVM experts for face part detection. An alternative approach for face pan detection using optical flow pattern matching is introduced as well. Experimental results on the proposed system are presented.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114238907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Off-angle iris recognition using bi-orthogonal wavelet network system","authors":"A. Abhyankar, L. Hornak, S. Schuckers","doi":"10.1109/AUTOID.2005.37","DOIUrl":"https://doi.org/10.1109/AUTOID.2005.37","url":null,"abstract":"One important category of non-ideal conditions for iris recognition is off-angle iris images. Practically it is very difficult for images to be captured with no offset. It then becomes necessary to account for off angle information in order to maintain robust performance. A bi-orthogonal wavelet based iris recognition system, previously designed at our lab, is modified and demonstrated to perform off-angle iris recognition. Bi-orthogonal wavelet network (BWN) are developed and trained for each class. The non-ideal factors are adjusted by repositioning the BWN. To test, synthetic iris images are generated by using affine and geometric transforms of 0/spl deg/, 10/spl deg/ and 20/spl deg/ experimentally collected images from 101 subjects. This approach is shown to perform better than a transformation based iris recognition approach. Iris images off-angle by up to 42/spl deg/ are successfully recognized.","PeriodicalId":206458,"journal":{"name":"Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126058904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}