Sangwoo Moon, Seong G. Kong, Jang-Hee Yoo, Kyoil Chung
{"title":"Face Recognition with Multiscale Data Fusion of Visible and Thermal Images","authors":"Sangwoo Moon, Seong G. Kong, Jang-Hee Yoo, Kyoil Chung","doi":"10.1109/CIHSPS.2006.313295","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313295","url":null,"abstract":"This paper presents face recognition with activity level fusion of visible and thermal image using multiscale decomposition. Image fusion combines images with different features to obtain a single composite image with extended information for better recognition performance. The proposed fusion technique adoptively controls the fusion ratio between visible and thermal information with multiscale analysis. Experimental results demonstrate that the proposed method effectively overcomes the weaknesses of visible and thermal images. The performance of the fusion is evaluated by classification rate with support vector machines","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115080272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti
{"title":"Personal identification and verification using multimodal biometric data","authors":"S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti","doi":"10.1109/CIHSPS.2006.313309","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313309","url":null,"abstract":"Several proposals have been formulated to combine cryptography and biometrics in order to secure data and to strengthen the personal authentication process, making the falsification of personal ID, like passports, more challenging. In this work we describe a system for personal identification and verification, based on the combination of multiple biometric readings and other user inputs. In such way authentication control can be performed and only allowed persons can access the resources which must be protected. The method consists of two main phases: enrollment and verification. In the first phase the data extracted from user inputs are processed by the proposed system and stored the in a innovative non-reversible form. In the second phase, the stored data are combined with the biometric readings and other user inputs in order to identify and verify the identity of the person. The system does not rely on network access or databases to perform the verification/authentication phase","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"R-34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126541844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iris Recognition: Measuring Feature's Quality for the Feature Selection in Unconstrained Image Capture Environments","authors":"Hugo Proença, L. Alexandre","doi":"10.1109/CIHSPS.2006.313298","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313298","url":null,"abstract":"Iris recognition has been used for several purposes. However, current iris recognition systems are unable to deal with noisy data and substantially increase their error rates, specially the false rejections, in these conditions. Several proposals have been made to access image quality and to identify noisy regions in iris images. In this paper we propose a method that measures the quality of each feature of the biometric signature and takes account into this information to constraint the comparable features and obtain the similarity between iris signatures. Experiments led us to conclude that this method significantly decreases the error rates in the recognition of noisy iris images, resultant from capturing in less constrained environments","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117320931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongzhou Zhang, Yongping Li, Lin Wang, Chengbo Wang
{"title":"Face Recognition across Poses Utilizing Feature Transformation","authors":"Hongzhou Zhang, Yongping Li, Lin Wang, Chengbo Wang","doi":"10.1109/CIHSPS.2006.313297","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313297","url":null,"abstract":"Face recognition is an advanced identification solution which can meet the crying needs in security areas. Pose effect is a big challenge for robust applications of this technology. We proposed a feature transformation approach to cope with the head rotation roughly within half profile view. Comparing with algorithms based on computer vision technology, the proposed feature transformation method is not dependent on heavy computation and easily to apply in live conditions. Popular feature extractions, least square (LS) and total least square (TLS) solution in calculating as well as some properties of transformation were explored on the FERET database","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115947457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic Framework for Biometric-Based Access Control Systems","authors":"S. Yanushkevich, A. Stoica, V. Shmerko","doi":"10.1109/CIHSPS.2006.313292","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313292","url":null,"abstract":"The variability of biometric data is one of the most significant sources of errors in the application of biometric devices. In some specific-area applications, the problem of errors and the minimization of wrong decisions caused by these errors, can be alleviated by using friendly interfaces between biometric devices, as well as decision making procedure. These interfaces are based on the semantic representation of biometric data. This paper aims to contribute to the genesis of biometric technologies using semantic interpretations of biometric data. It provides the preliminaries of the theoretical concept, including examples for practitioners. This concept has been developed during the design and prototyping of the biometric-based early warning component for the next-generation security access control system. The research work is being conducted in the Biometric Technologies Laboratory of the University of Calgary, and in the Humanoid Robotics Laboratory, at the NASA's Jet Propulsion Laboratory, California Institute of Technology","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123778226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposal for a New Home Security System in terms of User-friendliness and Prompt Intrusion Notification","authors":"M. Fujikawa, H. Doi, S. Tsujii","doi":"10.1109/CIHSPS.2006.313308","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313308","url":null,"abstract":"With the present home security system, a timer is incorporated in a terminal installed in the home. The purpose is to allow the user time to change the alarm mode of the terminal from disarmed to armed and close the door when leaving the residence; conversely, the user needs time to open the door and change the alarm mode from armed to disarmed when returning to the residence. However, we think the timer is stressful for the user and represents a problem that, should an intruder gain entry, the situation cannot be reported immediately. Therefore, we propose a system to solve these problems. Since the proposed system is capable of recognizing the principal user through the use of an RFID tag, the terminal can appropriately change the alarm modes and quickly provide notification of an intruder. We will also confirm that the proposed system functions effectively through experiments, describe the effectiveness of the proposed system, and consider feasibility studies","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128427248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Wolverto, I. Harrison, J. Lowrance, A. Rodriguez, J. Thoméré
{"title":"Software Supported Pattern Development in Intelligence Analysis","authors":"M. Wolverto, I. Harrison, J. Lowrance, A. Rodriguez, J. Thoméré","doi":"10.1109/CIHSPS.2006.313291","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313291","url":null,"abstract":"Intelligence professionals work with incomplete and noisy data. Their information needs are often hard to express, and almost impossible to get right the first time. This paper describes the GEM pattern language for encoding analysts' information needs in graphical patterns, and its use in the Link Analysis Workbench (LAW) system to find inexact matches to those patterns in large relational data sets. The LAW user typically interacts with the system through a cycle in which the user (1) creates an initial GEM pattern corresponding to his information need, (2) uses the LAW matcher to retrieve a collection of matching episodes in the data, (3) revises the pattern based on the shortcomings of the matches, and (4) repeats the process until the revised pattern is returning the right data. The pattern language and the system are designed to facilitate the user in quickly traversing this cycle","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomous Rail Track Inspection using Vision Based System","authors":"M. Singh, S. Singh, J. Jaiswal, J. Hempshall","doi":"10.1109/CIHSPS.2006.313313","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313313","url":null,"abstract":"This paper proposes a rail track inspection technique using automated video analysis. This system is aimed to replace manual visual checks performed by the railway engineers for track inspection. We suggest a combination of image processing and analysis methods to achieve high performance automated rail track inspection. This paper addresses the problem of finding missing clips and finding blue clips which have been recently replaced in place of damaged clips. The experimental results show high performance in machine vision based inspection on a large sample of real train video","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129914662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Camera Face Recognition by Reliability-Based Selection","authors":"B. Xie, T. Boult, Visvanathan Ramesh, Ying Zhu","doi":"10.1109/CIHSPS.2006.313294","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313294","url":null,"abstract":"Automatic face recognition has a lot of application areas and current single-camera face recognition has severe limitations when the subject is not cooperative, or there are pose changes and different illumination conditions. A face recognition system using multiple cameras overcomes these limitations. In each channel, real-time component-based face detection detects the face with moderate pose and illumination changes employing fusion of individual component detectors for eyes and mouth, and the normalized face is recognized using an LDA recognizer. A reliability measure is trained using the features extracted from both face detection and recognition processes, to evaluate the inherent quality of channel recognition. The recognition from the most reliable channel is selected as the final recognition results. The recognition rate is far better than that of either single channel, and consistently better than common classifier fusion rules","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125279945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Autonomous Spherical Robot for Security Tasks","authors":"M. Seeman, M. Broxvall, A. Saffiotti, P. Wide","doi":"10.1109/CIHSPS.2006.313312","DOIUrl":"https://doi.org/10.1109/CIHSPS.2006.313312","url":null,"abstract":"The use of remotely operated robotic systems in security related applications is becoming increasingly popular However, the direct teleoperation interfaces commonly used today put a large amount of cognitive burden on the operators, thus seriously reducing the efficiency and reliability of these systems. We present an approach to alleviate this problem by exploiting both software and hardware autonomy. At the software level, we propose a variable autonomy control architecture that dynamically adapts the degree of autonomy of the robot in terms of control, perception, and interaction. At the hardware level, we rely on the intrinsic autonomy and robustness provided by the spherical morphology of our Ground-Bot robot. We also present a prototype system for facilitating the interaction between human operators and robots using our control architecture. This work is specifically aimed at increasing the effectiveness of the GroundBot robot for remote inspection tasks","PeriodicalId":340527,"journal":{"name":"2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety","volume":"10 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}