Face Authentication Competition on the BANCA Database
نویسندگان
چکیده
This paper details the results of a face verification competition [2] held in conjunction with the First International Conference on Biometric Authentication. The contest was held on the publically available BANCA database [1] according to a defined protocol [6]. Six different verification algorithms from 4 academic and commercial institutions submitted results. Also, a standard set of face recognition software from the internet [3] was used to provide a baseline performance measure.
منابع مشابه
Face Authentication Using Adapted Local Binary Pattern Histograms
In this paper, we propose a novel generative approach for face authentication, based on a Local Binary Pattern (LBP) description of the face. A generic face model is considered as a collection of LBP-histograms. Then, a client-specific model is obtained by an adaptation technique from this generic model under a probabilistic framework. We compare the proposed approach to standard state-of-the-a...
متن کاملOn the Recent Use of Local Binary Patterns for Face Authentication
This paper presents a survey on the recent use of Local Binary Patterns (LBPs) for face recognition. LBP is becoming a popular technique for face representation. It is a non-parametric kernel which summarizes the local spacial structure of an image and it is invariant to monotonic gray-scale transformations. This is a very interesting property in face recognition. This probably explains the rec...
متن کاملQuality-Based Score Normalization and Frame Selection for Video-Based Person Authentication
This paper addresses the incorporation of quality measures to videobased person authentication. A theoretical framework to incorporate quality measures in biometric authentication is exposed. Two different quality-based score normalization techniques are derived from this theoretical framework. Furthermore, a quality-based frame selection technique and a new face image quality measure are also ...
متن کاملFast and Robust Face Authentication
It has been previously demonstrated that systems based on Hidden Markov Models (HMMs) are suitable for face recognition. The proposed approaches in the literature are either HMMs with one-dimensional (1D-HMMs) or two-dimensional (2D-HMMs) topology. Both have shown some serious drawbacks. The 1D-HMM approaches typically use a whole row (or column) of an image as observation vector and by consequ...
متن کاملSession variability modelling for face authentication
This paper examines session variability modelling for face authentication using Gaussian mixture models. Session variability modelling aims to explicitly model and suppress detrimental within-class (inter-session) variation. We examine two techniques to do this, inter-session variability modelling (ISV) and joint factor analysis (JFA), which were initially developed for speaker authentication. ...
متن کامل