Biometric Face Authentication Using Pixel-Based Weak Classifiers

نویسندگان

  • Sébastien Marcel
  • Yann Rodriguez
چکیده

The performance of face authentication systems has steadily improved over the last few years. State-of-the-art methods use the projection of the gray-scale face image into a Linear Discriminant subspace as input of a classifier such as Support Vector Machines or Multi-layer Perceptrons. Unfortunately, these classifiers involve thousands of parameters that are difficult to store on a smart-card for instance. Recently, boosting algorithms has emerged to boost the performance of simple (weak) classifiers by combining them iteratively. The famous AdaBoost algorithm have been proposed for object detection and applied successfully to face detection. In this paper, we investigate the use of AdaBoost for face authentication to boost weak classifiers based simply on pixel values. The proposed approach is tested on a benchmark database, namely XM2VTS. Results show that boosting only hundreds of classifiers achieved near state-of-the-art results. Furthermore, the proposed approach outperforms similar work on face authentication using boosting algorithms on the same database.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Biometric Based Authentication Using Watermarking

In wireless communications, significant information are getting exchanged frequently. Inorder to avoid the illegal access of that sensitive information remote authentication is being done extensively. Remote authentication involves the submission of encrypted information, along with visual and audio cues. Incase of remote examination or interviewing, Trojan Horse and other attacks can cause sev...

متن کامل

Hybrid Biometric Person Authentication Using Face and Voice Features

In this paper, a hybrid person authentication prototype integrating multiple biometric devices is presented. This prototype is based on several levels of abstractions: data representations, vectors and classifiers. Frontal face and text -dependent voice biometrics are chosen to authenticate a user. For each of the biometric feature, an extractor, a classifier and a simple negotiation scheme hav...

متن کامل

Vaulted Verification: A Scheme for Revocable Face Recognition

As biometric authentication systems become common in everyday use, researchers are beginning to wonder about the ethics of biometric recognition. In particular, this paper outlines the need for a face recognition system that does not compromise the privacy of the subjects being recognized. We present a brief overview of current face verification systems and discuss one such implementation. We a...

متن کامل

Multimodal Biometric Hand-Off for Robust Unobtrusive Continuous Biometric Authentication

Conventional access control solutions rely on a single authentication to verify a user’s identity but do nothing to ensure the authenticated user is indeed the same person using the system afterwards. Without continuous monitoring, unauthorized individuals have an opportunity to “hijack” or “tailgate” the original user’s session. Continuous authentication attempts to remedy this security loopho...

متن کامل

Evaluation of LDA based face verification with respect to available computational resources

In this study, we are interested in a face verification or authentication system based on Principal Component Analysis and Linear Discriminant Analysis (known as Fisherfaces). We evaluate the tradeoff between performance and computational requirements of making a decision in such a biometric system. This kind of evaluation is useful when implementing a practical system where the CPU power and s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004