Biometric Face Authentication Using Pixel-Based Weak Classifiers
نویسندگان
چکیده
The performance of face authentication systems has steadily improved over the last few years. State-of-the-art methods use the projection of the gray-scale face image into a Linear Discriminant subspace as input of a classifier such as Support Vector Machines or Multi-layer Perceptrons. Unfortunately, these classifiers involve thousands of parameters that are difficult to store on a smart-card for instance. Recently, boosting algorithms has emerged to boost the performance of simple (weak) classifiers by combining them iteratively. The famous AdaBoost algorithm have been proposed for object detection and applied successfully to face detection. In this paper, we investigate the use of AdaBoost for face authentication to boost weak classifiers based simply on pixel values. The proposed approach is tested on a benchmark database, namely XM2VTS. Results show that boosting only hundreds of classifiers achieved near state-of-the-art results. Furthermore, the proposed approach outperforms similar work on face authentication using boosting algorithms on the same database.
منابع مشابه
Robust Biometric Based Authentication Using Watermarking
In wireless communications, significant information are getting exchanged frequently. Inorder to avoid the illegal access of that sensitive information remote authentication is being done extensively. Remote authentication involves the submission of encrypted information, along with visual and audio cues. Incase of remote examination or interviewing, Trojan Horse and other attacks can cause sev...
متن کاملHybrid Biometric Person Authentication Using Face and Voice Features
In this paper, a hybrid person authentication prototype integrating multiple biometric devices is presented. This prototype is based on several levels of abstractions: data representations, vectors and classifiers. Frontal face and text -dependent voice biometrics are chosen to authenticate a user. For each of the biometric feature, an extractor, a classifier and a simple negotiation scheme hav...
متن کاملVaulted Verification: A Scheme for Revocable Face Recognition
As biometric authentication systems become common in everyday use, researchers are beginning to wonder about the ethics of biometric recognition. In particular, this paper outlines the need for a face recognition system that does not compromise the privacy of the subjects being recognized. We present a brief overview of current face verification systems and discuss one such implementation. We a...
متن کاملMultimodal Biometric Hand-Off for Robust Unobtrusive Continuous Biometric Authentication
Conventional access control solutions rely on a single authentication to verify a user’s identity but do nothing to ensure the authenticated user is indeed the same person using the system afterwards. Without continuous monitoring, unauthorized individuals have an opportunity to “hijack” or “tailgate” the original user’s session. Continuous authentication attempts to remedy this security loopho...
متن کاملEvaluation of LDA based face verification with respect to available computational resources
In this study, we are interested in a face verification or authentication system based on Principal Component Analysis and Linear Discriminant Analysis (known as Fisherfaces). We evaluate the tradeoff between performance and computational requirements of making a decision in such a biometric system. This kind of evaluation is useful when implementing a practical system where the CPU power and s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004