A comparative evaluation of global representation-based schemes for face verification

نویسندگان

  • Julian Fiérrez
  • S. Cruz-Llana
  • Javier Ortega-Garcia
  • Joaquín González-Rodríguez
چکیده

This paper is focused on algorithmic issues for biometric face verification (i.e., given an image of the face and an identity claim, decide whether they correspond to each other or not). Several alternatives for geometric normalization of images, photometric normalization, dimensionality reduction and similarity measures are proposed and compared using the XM2VTS database and the associated Lausanne protocol [10], [11]. Experiments under this particular framework show that best verification results are obtained when holistic approaches for face recognition (such as eigenfaces or fisherfaces) are combined with techniques traditionally associated to local feature-based approaches, such as Gabor decompositions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comparative Evaluation of Fusion Strategies for Multimodal Biometric Verification

The aim of this paper, regarding multimodal biometric verification, is twofold: on the one hand, some score fusion strategies reported in the literature are reviewed and, on the other hand, we compare experimentally a selection of them using as monomodal baseline experts: i) our face verification system based on a global face appearance representation scheme, ii) our minutiaebased fingerprint v...

متن کامل

Face Detection with methods based on color by using Artificial Neural Network

The face Detection methodsis used in order to provide security. The mentioned methods problems are that it cannot be categorized because of the great differences and varieties in the face of individuals. In this paper, face Detection methods has been presented for overcoming upon these problems based on skin color datum. The researcher gathered a face database of 30 individuals consisting of ov...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Verification and Validation of Common Derivative Terms Approximation in Meshfree Numerical Scheme

In order to improve the approximation of spatial derivatives without meshes, a set of meshfree numerical schemes for derivative terms is developed, which is compatible with the coordinates of Cartesian, cylindrical, and spherical. Based on the comparisons between numerical and theoretical solutions, errors and convergences are assessed by a posteriori method, which shows that the approximations...

متن کامل

Comparative Textbook Evaluation: Representation of Learning Objectives in Locally and Internationally Published ELT Textbooks

The present study evaluated the learning objectives represented in the recent Iranian nation-wide ELT textbooks, i.e. Prospect and Vision series, and compared them to those in the internationally-published textbook of Four Corners. To this end, Bloom’s revised taxonomy of learning objectives was utilized as the analytical framework to scrutinize the tasks and exercises of the textbooks using a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003