SlideShare a Scribd company logo
Features Editor:
Rebecca L. Deuel
rdeuel@computer.org
I n t h e N e w s
4 1094-7167/03/$17.00 © 2003 IEEE IEEE INTELLIGENT SYSTEMS
Facial recognition is an important
human ability—an infant innately
responds to face shapes at birth and can
discriminate his or her mother’s face from
a stranger’s at the tender age of 45 hours.
Recognizing and identifying people is a
vital survival skill, as is reading faces for
evidence of ill-health or deception.
Improving significantly in the last several
years, technologies that can mimic or im-
prove human abilities to recognize and read
faces are now maturing for use in medical
and security applications. The 2002 Face
RecognitionVendor Test (FRVT 2002) dem-
onstrated a significant improvement in face
recognition capabilities, and researchers
have developed systems to tackle some of
face recognition’s more interesting chal-
lenges. These systems include one that can
distinguish between identical twins.
3D face recognition system
This spring, researchers at the Technion,
Israel Institute of Technology in Haifa, pre-
sented a new twist to face recognition tech-
nology—a 3D system based on “bending
invariant canonical representation.” Michael
andAlexander Bronstein are electrical engi-
neering graduate students and twin brothers.
While working on a project headed by their
professor, Ron Kimmel, and with the help of
lab engineer Eyal Gordon, the brothers de-
cided to try to create a face recognition sys-
tem that could distinguish identical twins, a
difficult problem for most face recognition
systems. “The fact that my brother and I are
twins was inspiration for this invention,”
saysAlexander.
The team developed a system that treats
the face as a deformable object, as opposed
to a rigid surface, and uses a range camera
and a computer. The 3D system maps rather
than photographs the face, capturing facial
geometry as a canonical form, which it can
then compare to other canonical forms con-
tained in a database. The system can com-
pare surfaces with a high fidelity level, in-
dependent of surface deformations resulting
from facial expressions.
Kimmel and his former student,Asi Elad,
invented the idea of bending invariant canon-
ical forms about three years ago. Michael
explains Elad’s work as “a generalization of
the work of Eric Schwartz, who proposed the
use of a mathematical method known as
multidimensional scaling for analysis of the
brain cortex.A smart use of fast numeric al-
gorithms (joint work of Kimmel and James
Sethian) resulted in a very elegant algorithm,
which Elad tested on surface recognition
problems.” Kimmel suggested using bending
invariant canonical forms in face recognition
a year ago, Michael says.
The process of capturing canonical forms
occurs in three stages (see Figure 1).At the
first stage, the system acquires the face’s
range image and texture.At the second
stage, it converts the range image to a trian-
gulated surface and preprocesses it by re-
moving certain parts such as hair, which can
complicate the recognition process. The
mesh can be subsampled to decrease the
amount of data. The choice of the number of
subsamples is a trade-off between accuracy
and computational complexity.At the third
stage, the system computes a canonical form
of the facial surface. This representation is
practically insensitive to head orientations
and facial expressions, significantly simpli-
fying the recognition procedure. The system
performs the recognition itself on the canon-
ical surfaces.
How is this new system better than oth-
ers?Alex says that their 3D method gives
more information about the face, is less vul-
nerable to makeup and illumination condi-
tions, and fares better than other face recog-
nition systems. Michael points out that other
systems are more sensitive to facial expres-
sions, while their 3D system can handle
facial deformations. They tested a classical
2D face recognition algorithm (eigenfaces),
a 3D face recognition algorithm, and a re-
cently proposed combination of 2D and 3D
recognition, and their system fared best.
“On a database of 157 subjects, we obtained
zero error, even when we were comparing
two twins,” Michael says. “Obviously, a
larger database is required for more accurate
statistics, yet by extrapolation we can pre-
dict results significantly outperforming
other algorithms.”
FRVT 2002
Certainly security is one of the chief uses
of face recognition technology, and under-
standing the state of the art in biometrics is
key to designing effective applications. The
National Institute of Standards and Technol-
ogy (NIST), together with DARPA, the
National Institute of Justice, and several
other federal agencies, sponsored FRVT
Face Recognition Technology
By Danna Voth
ALSO FEATURED THIS ISSUE
COGNITIVE RADIOS WILL ADAPT TO USERS
Published by the IEEE Computer Society
2002, which tested commercial face recog-
nition accuracy and identified numerous
characteristics for optimizing face recogni-
tion technologies’performance, as well as
areas for future research.
Looking at 10 mature face-recognition
systems, FRVT 2002 tested them on three
basic tasks: identification, verification, and
watch-list screening. Identification involves
matching a biometric record from a single
subject probe against an entire database of
similar biometric records to determine the
record owner’s identity—a one-to-many
comparison. The verification process con-
firms that a person is who he or she claims
to be by matching the biometric record
against that of his or her claimed identity—a
one-to-one comparison. Verification rates
are offset with false accept rates, and verifi-
cation performance is described by the two
statistics. Watch-list screening is typically
the most demanding task, involving two
steps. First, a system must detect if an indi-
vidual is even on the watch list, then, if so,
correctly identify the individual.
Compared with similar tests performed
two years earlier in FRVT 2000, the FRVT
2002 results show a significant improvement
in face recognition systems’verification ca-
pabilities, indicated by a 50 percent reduc-
tion in error rates. For the best systems tested
in FRVT 2002, the top-rank identification
rate was 85 percent on a database of 800
people. With a false accept rate of 10 per-
cent, the top two systems turned in a verifica-
tion rate of 96 percent. For the best system
using a watch list of 25 people, the detection
and identification rate was 77 percent.
FRVT 2002 found that facial recognition
systems attempting verification tasks pro-
vide accuracy comparable with fingerprints.
For facial recognition, the best packages
available provide a 90 percent probability of
true verification with a 1 percent probability
of false verification. This is a helpful find-
ing: The November 2002 report “Summary
of NIST Standards for Biometric Accuracy,
Tamper Resistance, and Interoperability”
notes that, “within the intelligence commu-
nity, facial data is often the only biometric
data that has been and is currently being
captured. Face data is one key source for
watch lists, and in many situations finger-
print data cannot even be captured to use in
constructing a watch list.”
FRVT 2002 showed that facial recogni-
tion accuracy varies according to different
factors, which might help in planning better
applications and designing future research.
Several image characteristics affected re-
sults. First, as you’d expect, accuracy drops
as time increases between the acquisition of
the database image and the presentation of
the newest image because people age and
change in appearance over time. NIST
reported that performance degraded at ap-
proximately 5 percentage points per year. In
addition, the study found that indoor light-
ing changes didn’t make an appreciable
difference to the top systems’accuracy, al-
though face recognition from outdoor im-
agery showed a considerable drop in perfor-
mance, with the best performing systems
turning in a recognition rate of 50 percent.
The FRVT 2002 also compared the rates
for still and video images and found, contrary
to expectations, that recognition performance
using video sequences was similar to the
performance using still images. For images
with nonfrontal presentation, FRVT 2002
examined the use of morphable models—a
technique of taking a facial image from any
angle and projecting what the subject might
look like facing forward. There was a dra-
matic improvement in performance using the
morphable models. One of the top three sys-
tems increased its performance from 26 per-
cent on nonprocessed, nonfrontal images to
84 percent on morphed images.
The size of the database used for iden-
tification or watch-list screening signifi-
cantly impacted results. The experiments
showed that identification performance
decreases linearly with respect to the log-
arithm of the database size. NIST reports
a similar effect for the watch-list task—
as the watch list size increases, perfor-
mance decreases. The FRVT 2002 over-
view states that, “In general, a watch list
with 25 to 50 people will perform better
than a larger size watch list.”
For the first time, the test covered the
effects of demographics. The results re-
ported that males are easier to recognize
than females and that older people are
easier to identify than younger people.
For the top systems, identification rates
for males were 6 percent to 9 percent
higher than for females. For every 10
years increase in age, on average identifi-
cation performance increases approxi-
mately 5 percentage points.
Reading faces
Although recognizing faces is important
to such security applications as financial
verification (ATM and credit cards), biomet-
ric locks, and passport or visa control, read-
ing faces has important uses in medicine and
security as well.A team of scientists at the
MAY/JUNE 2003 computer.org/intelligent 5
Figure 1. Three stages of facial recognition: (a) the range image and texture; (b) the preprocessed surface; (c) the canonical form.
(a) (b) (c)
Centre forAdaptive Psychological Profiling
at Manchester Metropolitan University is
developing technology that can help doctors
study the autonomic nervous system and a
patient’s psychological state or help inter-
rogators detect deception. Zuhair Bandar,
Janet Rothwell, Jim O’Shea, David McLean,
and D.J. McCormick have developed, after
five years of work, a system they have dubbed
the Silent Talker, which observes and classi-
fies a subject’s nonverbal behavior during an
interview and detects deception.
Inspired by a challenge to monitor audi-
ence reaction in sales presentations, Bandar
realized it should be possible to make infer-
ences about people’s psychological and
emotional states by analyzing their outward
behavior withAI. “This stimulated a series
of discussions with psychologists, which
revealed the full potential for psychological
profiling,” O’Shea says.
The team developed a system that ob-
served 24 behavioral channels, such as eye
contact events, gaze, or body movements
that occurred as a subject was interviewed.
Using many channels makes it more possible
to discover meaningful patterns, and it is
impossible for a human to control so many
behaviors simultaneously.Able to handle
multichannel data, the Silent Talker’sAI
component decides which data is redundant,
noisy, or important and detects patterns
across the channels to provide classification
accuracies.
The project involved evaluating and de-
veloping the neural networks for image
processing, such as locating the subject in
the frame. “We chose artificial neural net-
works (ANNs) because they are ideal for
the image processing used in the early
stages and highly suited to the type of clas-
sification task involved in the later stages,”
says O’Shea. At the same time, the team
was reproducing a well-defined psycholog-
ical experiment to observe and classify
deception with 40 subjects.
The team digitized videos of the inter-
views from these experiments to provide
training, validation, and testing data for the
system (see Figure 2). They developed fur-
ther neural networks to locate particular
features such as the eye and classify their
state (for example, “eye shut”). Finally,
they developed neural networks to combine
all the information earlier stages provided
and classify the subject’s behavior.
Combining the practice of psychological
profiling with the power of AI, the Silent
Talker has demonstrated approximately 87
percent accuracy in classifying complete
interviews as truthful or deceptive and over
70 percent accuracy in classifying periods
of deceptive demeanor during the interview,
O’Shea says. “This is vastly superior to
humans and superior to most of the quoted
figures for other systems.”
The team plans to further develop the
technology. “It is a very effective, but not
infallible technology,” O’Shea says. “The
system inherits the generally perceived
weakness of ANNs—that they cannot ex-
plain how they reach their decision.” Plans
to improve the system include tuning the
code to implement real-time operation,
computer.org/intelligent IEEE INTELLIGENT SYSTEMS
IEEE Computer Society
Publications Office
10662 Los Vaqueros Circle, PO Box 3014
Los Alamitos, CA 90720-1314
STAFF
Associate Lead Editor
Dennis Taylor
dtaylor@computer.org
Group Managing Editor
Crystal R. Shif
cshif@computer.org
Senior Editor
Dale Strok
Associate Editor
Shani Murray
Assistant Editors
Rebecca Deuel and Denise Kano
Editorial Assistant
Joan Hong
Magazine Assistant
Pauline Hosillos
Production Assistant
Monette Velasco
Contributing Editors
Cheryl Baltes
Design Director
Toni Van Buskirk
Layout/Technical Illustrations
Carmen Flores-Garvey and Alex Torres
Publisher
Angela Burgess
Assistant Publisher
Dick Price
Membership/Circulation Marketing Manager
Georgann Carter
Business Development Manager
Sandra Brown
Assistant Advertising Coordinator
Debbie Sims
Submissions: Submit a PDF or MS Word file of all articles
and track proposals to IEEE Intelligent Systems, Magazine
Assistant, 10662 Los Vaqueros Circle, Los Alamitos,
CA 90720-1314, phone +1 714 821 8380, isystems@
computer.org. Manuscripts should be approximately 5,000
words long, preferably not exceeding 10 references. Visit
http://computer.org/intelligent for editorial guidelines.
Editorial: Unless otherwise stated, bylined articles as well as
products and services reflect the author’s or firm’s opinion;
inclusiondoesnotnecessarilyconstituteendorsementbytheIEEE
Computer Society or the IEEE.
IEEE
Figure 2. A subject onscreen undergoes scrutiny from Zuhair Bandar’s Silent Talker.
producing a wider range of neural networks
to look at culture-specific, nonverbal be-
havior, and producing systems that can
explain how they reached the classification.
It will be interesting to see where face
recognition technology will take us next.
Outdoor image analysis, projection of age
changes, performance in larger databases,
and comparisons of different expressions
will improve, as will our capabilities to de-
tect deception and other emotional states.
This will bring advances in medicine and
security as we automate our vital faculty of
recognizing and reading faces.
MAY/JUNE 2003 computer.org/intelligent
How to Reach Us
Writers
For detailed information on submitting
articles, write for our Editorial Guidelines
(isystems@computer.org) or access
http://computer.org/intelligent/author.htm.
Letters to the Editor
Send letters to
Dennis Taylor
Associate Lead Editor
IEEE Intelligent Systems
10662 Los Vaqueros Circle
Los Alamitos, CA 90720
dtaylor@computer.org
Please provide an email address or
daytime phone number with your letter.
On the Web
Access http://computer.org/intelligent for
information about IEEE Intelligent Systems.
Subscription Change of Address
Send change-of-address requests for maga-
zine subscriptions to address.change@ieee.
org. Be sure to specify IEEE Intelligent
Systems.
Membership Change of Address
Send change-of-address requests for
the membership directory to directory.
updates@computer.org.
Missing or Damaged Copies
If you are missing an issue or you received
a damaged copy, contact membership@
computer.org.
Reprints of Articles
For price information or to order reprints,
send email to isystems@computer.org or
fax +1 714 821 4010.
Reprint Permission
To obtain permission to reprint an article,
contact William Hagen, IEEE Copyrights and
Trademarks Manager, at whagen@ieee.org.
IEEE
Software radios have emerged in recent years, providing a level of programmability so that
communications products, such as cell phones, can automatically switch from one frequency
or transmission scheme to another when the primary technique is unavailable. Now that they
are moving into the marketplace, a few long-term planners are already looking at the second
or third generation of software radios, a concept that’s known as cognitive radio.
Cognitive radios are adaptive and extremely programmable, learning users’ preferences
and automatically adjusting to changes in the operating environment. Military researchers
want the security and versatility these techniques can provide, while consumers could be-
nefit by having cellular phones that relay the cheapest way to send a message.
One of the better-known proponents of this concept is Joe Mitola, a consulting scientist
at MITRE, a nonprofit research group in Bedford, Mass. He’s been working with researchers
at MIT, DARPA, Sweden’s Royal Institute of Technology, and multiple IEEE committees
to set the stage for cognitive radios.
One of the first tasks is creating an ontology, a set of terms ensuring that researchers
from various disciplines are using the same terms for the same operations and equipment.
“This will truly take an interdisciplinary effort,” Mitola says, noting that different users of
radio spectrum will use different terminology.
A big part of the work to be done using that common language centers on ways that
cognitive radios program themselves. To be successful, these radios must passively learn
user preferences and do many things without forcing users to program them. Mitola ex-
plains that if the user tunes to a certain radio station in the morning, the system must auto-
matically remember that station and time of day.
“The word passive is key. If we make the user program all the nodes, you’ll see this end
up with 12 blinking lights just like a VCR,” he says.
One application will be cell phones that determine the best way to transmit messages.
He cites an example where communicating on a home campus can be cheaper than from
a remote site. “If you’re on the way to work and want to send a message with a 10-Mbyte
attachment, the radio might suggest waiting four minutes until you’re in the building,
where it could be sent for free,” Mitola says.
Another potential application is in the military, where finding the best communica-
tions scheme and security or encryption level can be critical. DARPA is already supply-
ing some funding, and Mitola predicts that defense funding will increase, which could
catalyze the technology’s adoption.
Because the radios will do many things automatically, Mitola says that the system will
need a certain degree of security. He’s therefore thinking about biometric identifiers that
would ensure the radio isn’t being used by someone else when it sends a message to cer-
tain people or on certain frequencies.
Mitola, who is credited with helping create the foundations for software radio, does-
n’t expect to see a big market for cognitive radios in the near future. “It may be a decade
away,” he says.
Cognitive Radios Will
Adapt to Users
By Terry Costlow

More Related Content

What's hot

Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
IJERA Editor
 

What's hot (20)

The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...
 
Ijetcas14 435
Ijetcas14 435Ijetcas14 435
Ijetcas14 435
 
A COMPREHENSIVE STUDY ON OCCLUSION INVARIANT FACE RECOGNITION UNDER FACE MASK...
A COMPREHENSIVE STUDY ON OCCLUSION INVARIANT FACE RECOGNITION UNDER FACE MASK...A COMPREHENSIVE STUDY ON OCCLUSION INVARIANT FACE RECOGNITION UNDER FACE MASK...
A COMPREHENSIVE STUDY ON OCCLUSION INVARIANT FACE RECOGNITION UNDER FACE MASK...
 
Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptography
 
IRJET- Skin Disease Detection using Neural Network
IRJET- Skin Disease Detection using Neural NetworkIRJET- Skin Disease Detection using Neural Network
IRJET- Skin Disease Detection using Neural Network
 
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination EnvironmentA Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
 
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Integrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication SystemIntegrating Fusion levels for Biometric Authentication System
Integrating Fusion levels for Biometric Authentication System
 
D1061825
D1061825D1061825
D1061825
 
"Challenges for AI in Healthcare" - Peter Graven Ph.D
"Challenges for AI in Healthcare" - Peter Graven Ph.D"Challenges for AI in Healthcare" - Peter Graven Ph.D
"Challenges for AI in Healthcare" - Peter Graven Ph.D
 
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
 
DETECTING FACIAL EXPRESSION IN IMAGES
DETECTING FACIAL EXPRESSION IN IMAGESDETECTING FACIAL EXPRESSION IN IMAGES
DETECTING FACIAL EXPRESSION IN IMAGES
 
Thesis presentation ist
Thesis presentation istThesis presentation ist
Thesis presentation ist
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCAREBIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
 
IRJET- Automated Attendance System using Face Recognition
IRJET-  	  Automated Attendance System using Face RecognitionIRJET-  	  Automated Attendance System using Face Recognition
IRJET- Automated Attendance System using Face Recognition
 
Face Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine LearningFace Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine Learning
 
Comparative Studies for the Human Facial Expressions Recognition Techniques
Comparative Studies for the Human Facial Expressions Recognition TechniquesComparative Studies for the Human Facial Expressions Recognition Techniques
Comparative Studies for the Human Facial Expressions Recognition Techniques
 
The Patient Guide to Intelligence-Based Medicine
The Patient Guide to Intelligence-Based MedicineThe Patient Guide to Intelligence-Based Medicine
The Patient Guide to Intelligence-Based Medicine
 

Viewers also liked (17)

Acrl2005(1)
Acrl2005(1)Acrl2005(1)
Acrl2005(1)
 
Any timeanywhere
Any timeanywhereAny timeanywhere
Any timeanywhere
 
Apr
AprApr
Apr
 
Apr 1
Apr 1Apr 1
Apr 1
 
Being there
Being thereBeing there
Being there
 
Acrl2005(1)
Acrl2005(1)Acrl2005(1)
Acrl2005(1)
 
First Slideshare
First SlideshareFirst Slideshare
First Slideshare
 
Acrl2005
Acrl2005Acrl2005
Acrl2005
 
Abc
AbcAbc
Abc
 
Any timeanywhereold
Any timeanywhereoldAny timeanywhereold
Any timeanywhereold
 
Belgrade 1
Belgrade 1Belgrade 1
Belgrade 1
 
Apr 1
Apr 1Apr 1
Apr 1
 
Belgrade 2
Belgrade 2Belgrade 2
Belgrade 2
 
Any timeanywhere
Any timeanywhereAny timeanywhere
Any timeanywhere
 
Satisfying Business and Engineering Requirements: Client-server JavaScript, S...
Satisfying Business and Engineering Requirements: Client-server JavaScript, S...Satisfying Business and Engineering Requirements: Client-server JavaScript, S...
Satisfying Business and Engineering Requirements: Client-server JavaScript, S...
 
A&i
A&iA&i
A&i
 
1647 makalah teknologi beton dan bahan
1647 makalah teknologi beton dan bahan1647 makalah teknologi beton dan bahan
1647 makalah teknologi beton dan bahan
 

Similar to Ieee pub

Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identification
ijtsrd
 
Paper id 24201475
Paper id 24201475Paper id 24201475
Paper id 24201475
IJRAT
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
ijbuiiir1
 
Paper id 25201441
Paper id 25201441Paper id 25201441
Paper id 25201441
IJRAT
 
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
ijtsrd
 

Similar to Ieee pub (20)

Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...
 
Comparative analysis of augmented datasets performances of age invariant face...
Comparative analysis of augmented datasets performances of age invariant face...Comparative analysis of augmented datasets performances of age invariant face...
Comparative analysis of augmented datasets performances of age invariant face...
 
Dr Gurumurthi V. Ramanan Face Recognition - Presentation
Dr Gurumurthi V. Ramanan Face Recognition - PresentationDr Gurumurthi V. Ramanan Face Recognition - Presentation
Dr Gurumurthi V. Ramanan Face Recognition - Presentation
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identification
 
FACE VERIFICATION ACROSS AGE PROGRESSION USING ENHANCED CONVOLUTION NEURAL NE...
FACE VERIFICATION ACROSS AGE PROGRESSION USING ENHANCED CONVOLUTION NEURAL NE...FACE VERIFICATION ACROSS AGE PROGRESSION USING ENHANCED CONVOLUTION NEURAL NE...
FACE VERIFICATION ACROSS AGE PROGRESSION USING ENHANCED CONVOLUTION NEURAL NE...
 
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...Face Verification Across Age Progression using Enhanced Convolution Neural Ne...
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Paper id 24201475
Paper id 24201475Paper id 24201475
Paper id 24201475
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
G041041047
G041041047G041041047
G041041047
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
Paper id 25201441
Paper id 25201441Paper id 25201441
Paper id 25201441
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
 
FACIAL AGE ESTIMATION USING TRANSFER LEARNING AND BAYESIAN OPTIMIZATION BASED...
FACIAL AGE ESTIMATION USING TRANSFER LEARNING AND BAYESIAN OPTIMIZATION BASED...FACIAL AGE ESTIMATION USING TRANSFER LEARNING AND BAYESIAN OPTIMIZATION BASED...
FACIAL AGE ESTIMATION USING TRANSFER LEARNING AND BAYESIAN OPTIMIZATION BASED...
 
Face Recognition Research Report
Face Recognition Research ReportFace Recognition Research Report
Face Recognition Research Report
 
Feature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A SurveyFeature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A Survey
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
 

Ieee pub

  • 1. Features Editor: Rebecca L. Deuel rdeuel@computer.org I n t h e N e w s 4 1094-7167/03/$17.00 © 2003 IEEE IEEE INTELLIGENT SYSTEMS Facial recognition is an important human ability—an infant innately responds to face shapes at birth and can discriminate his or her mother’s face from a stranger’s at the tender age of 45 hours. Recognizing and identifying people is a vital survival skill, as is reading faces for evidence of ill-health or deception. Improving significantly in the last several years, technologies that can mimic or im- prove human abilities to recognize and read faces are now maturing for use in medical and security applications. The 2002 Face RecognitionVendor Test (FRVT 2002) dem- onstrated a significant improvement in face recognition capabilities, and researchers have developed systems to tackle some of face recognition’s more interesting chal- lenges. These systems include one that can distinguish between identical twins. 3D face recognition system This spring, researchers at the Technion, Israel Institute of Technology in Haifa, pre- sented a new twist to face recognition tech- nology—a 3D system based on “bending invariant canonical representation.” Michael andAlexander Bronstein are electrical engi- neering graduate students and twin brothers. While working on a project headed by their professor, Ron Kimmel, and with the help of lab engineer Eyal Gordon, the brothers de- cided to try to create a face recognition sys- tem that could distinguish identical twins, a difficult problem for most face recognition systems. “The fact that my brother and I are twins was inspiration for this invention,” saysAlexander. The team developed a system that treats the face as a deformable object, as opposed to a rigid surface, and uses a range camera and a computer. The 3D system maps rather than photographs the face, capturing facial geometry as a canonical form, which it can then compare to other canonical forms con- tained in a database. The system can com- pare surfaces with a high fidelity level, in- dependent of surface deformations resulting from facial expressions. Kimmel and his former student,Asi Elad, invented the idea of bending invariant canon- ical forms about three years ago. Michael explains Elad’s work as “a generalization of the work of Eric Schwartz, who proposed the use of a mathematical method known as multidimensional scaling for analysis of the brain cortex.A smart use of fast numeric al- gorithms (joint work of Kimmel and James Sethian) resulted in a very elegant algorithm, which Elad tested on surface recognition problems.” Kimmel suggested using bending invariant canonical forms in face recognition a year ago, Michael says. The process of capturing canonical forms occurs in three stages (see Figure 1).At the first stage, the system acquires the face’s range image and texture.At the second stage, it converts the range image to a trian- gulated surface and preprocesses it by re- moving certain parts such as hair, which can complicate the recognition process. The mesh can be subsampled to decrease the amount of data. The choice of the number of subsamples is a trade-off between accuracy and computational complexity.At the third stage, the system computes a canonical form of the facial surface. This representation is practically insensitive to head orientations and facial expressions, significantly simpli- fying the recognition procedure. The system performs the recognition itself on the canon- ical surfaces. How is this new system better than oth- ers?Alex says that their 3D method gives more information about the face, is less vul- nerable to makeup and illumination condi- tions, and fares better than other face recog- nition systems. Michael points out that other systems are more sensitive to facial expres- sions, while their 3D system can handle facial deformations. They tested a classical 2D face recognition algorithm (eigenfaces), a 3D face recognition algorithm, and a re- cently proposed combination of 2D and 3D recognition, and their system fared best. “On a database of 157 subjects, we obtained zero error, even when we were comparing two twins,” Michael says. “Obviously, a larger database is required for more accurate statistics, yet by extrapolation we can pre- dict results significantly outperforming other algorithms.” FRVT 2002 Certainly security is one of the chief uses of face recognition technology, and under- standing the state of the art in biometrics is key to designing effective applications. The National Institute of Standards and Technol- ogy (NIST), together with DARPA, the National Institute of Justice, and several other federal agencies, sponsored FRVT Face Recognition Technology By Danna Voth ALSO FEATURED THIS ISSUE COGNITIVE RADIOS WILL ADAPT TO USERS Published by the IEEE Computer Society
  • 2. 2002, which tested commercial face recog- nition accuracy and identified numerous characteristics for optimizing face recogni- tion technologies’performance, as well as areas for future research. Looking at 10 mature face-recognition systems, FRVT 2002 tested them on three basic tasks: identification, verification, and watch-list screening. Identification involves matching a biometric record from a single subject probe against an entire database of similar biometric records to determine the record owner’s identity—a one-to-many comparison. The verification process con- firms that a person is who he or she claims to be by matching the biometric record against that of his or her claimed identity—a one-to-one comparison. Verification rates are offset with false accept rates, and verifi- cation performance is described by the two statistics. Watch-list screening is typically the most demanding task, involving two steps. First, a system must detect if an indi- vidual is even on the watch list, then, if so, correctly identify the individual. Compared with similar tests performed two years earlier in FRVT 2000, the FRVT 2002 results show a significant improvement in face recognition systems’verification ca- pabilities, indicated by a 50 percent reduc- tion in error rates. For the best systems tested in FRVT 2002, the top-rank identification rate was 85 percent on a database of 800 people. With a false accept rate of 10 per- cent, the top two systems turned in a verifica- tion rate of 96 percent. For the best system using a watch list of 25 people, the detection and identification rate was 77 percent. FRVT 2002 found that facial recognition systems attempting verification tasks pro- vide accuracy comparable with fingerprints. For facial recognition, the best packages available provide a 90 percent probability of true verification with a 1 percent probability of false verification. This is a helpful find- ing: The November 2002 report “Summary of NIST Standards for Biometric Accuracy, Tamper Resistance, and Interoperability” notes that, “within the intelligence commu- nity, facial data is often the only biometric data that has been and is currently being captured. Face data is one key source for watch lists, and in many situations finger- print data cannot even be captured to use in constructing a watch list.” FRVT 2002 showed that facial recogni- tion accuracy varies according to different factors, which might help in planning better applications and designing future research. Several image characteristics affected re- sults. First, as you’d expect, accuracy drops as time increases between the acquisition of the database image and the presentation of the newest image because people age and change in appearance over time. NIST reported that performance degraded at ap- proximately 5 percentage points per year. In addition, the study found that indoor light- ing changes didn’t make an appreciable difference to the top systems’accuracy, al- though face recognition from outdoor im- agery showed a considerable drop in perfor- mance, with the best performing systems turning in a recognition rate of 50 percent. The FRVT 2002 also compared the rates for still and video images and found, contrary to expectations, that recognition performance using video sequences was similar to the performance using still images. For images with nonfrontal presentation, FRVT 2002 examined the use of morphable models—a technique of taking a facial image from any angle and projecting what the subject might look like facing forward. There was a dra- matic improvement in performance using the morphable models. One of the top three sys- tems increased its performance from 26 per- cent on nonprocessed, nonfrontal images to 84 percent on morphed images. The size of the database used for iden- tification or watch-list screening signifi- cantly impacted results. The experiments showed that identification performance decreases linearly with respect to the log- arithm of the database size. NIST reports a similar effect for the watch-list task— as the watch list size increases, perfor- mance decreases. The FRVT 2002 over- view states that, “In general, a watch list with 25 to 50 people will perform better than a larger size watch list.” For the first time, the test covered the effects of demographics. The results re- ported that males are easier to recognize than females and that older people are easier to identify than younger people. For the top systems, identification rates for males were 6 percent to 9 percent higher than for females. For every 10 years increase in age, on average identifi- cation performance increases approxi- mately 5 percentage points. Reading faces Although recognizing faces is important to such security applications as financial verification (ATM and credit cards), biomet- ric locks, and passport or visa control, read- ing faces has important uses in medicine and security as well.A team of scientists at the MAY/JUNE 2003 computer.org/intelligent 5 Figure 1. Three stages of facial recognition: (a) the range image and texture; (b) the preprocessed surface; (c) the canonical form. (a) (b) (c)
  • 3. Centre forAdaptive Psychological Profiling at Manchester Metropolitan University is developing technology that can help doctors study the autonomic nervous system and a patient’s psychological state or help inter- rogators detect deception. Zuhair Bandar, Janet Rothwell, Jim O’Shea, David McLean, and D.J. McCormick have developed, after five years of work, a system they have dubbed the Silent Talker, which observes and classi- fies a subject’s nonverbal behavior during an interview and detects deception. Inspired by a challenge to monitor audi- ence reaction in sales presentations, Bandar realized it should be possible to make infer- ences about people’s psychological and emotional states by analyzing their outward behavior withAI. “This stimulated a series of discussions with psychologists, which revealed the full potential for psychological profiling,” O’Shea says. The team developed a system that ob- served 24 behavioral channels, such as eye contact events, gaze, or body movements that occurred as a subject was interviewed. Using many channels makes it more possible to discover meaningful patterns, and it is impossible for a human to control so many behaviors simultaneously.Able to handle multichannel data, the Silent Talker’sAI component decides which data is redundant, noisy, or important and detects patterns across the channels to provide classification accuracies. The project involved evaluating and de- veloping the neural networks for image processing, such as locating the subject in the frame. “We chose artificial neural net- works (ANNs) because they are ideal for the image processing used in the early stages and highly suited to the type of clas- sification task involved in the later stages,” says O’Shea. At the same time, the team was reproducing a well-defined psycholog- ical experiment to observe and classify deception with 40 subjects. The team digitized videos of the inter- views from these experiments to provide training, validation, and testing data for the system (see Figure 2). They developed fur- ther neural networks to locate particular features such as the eye and classify their state (for example, “eye shut”). Finally, they developed neural networks to combine all the information earlier stages provided and classify the subject’s behavior. Combining the practice of psychological profiling with the power of AI, the Silent Talker has demonstrated approximately 87 percent accuracy in classifying complete interviews as truthful or deceptive and over 70 percent accuracy in classifying periods of deceptive demeanor during the interview, O’Shea says. “This is vastly superior to humans and superior to most of the quoted figures for other systems.” The team plans to further develop the technology. “It is a very effective, but not infallible technology,” O’Shea says. “The system inherits the generally perceived weakness of ANNs—that they cannot ex- plain how they reach their decision.” Plans to improve the system include tuning the code to implement real-time operation, computer.org/intelligent IEEE INTELLIGENT SYSTEMS IEEE Computer Society Publications Office 10662 Los Vaqueros Circle, PO Box 3014 Los Alamitos, CA 90720-1314 STAFF Associate Lead Editor Dennis Taylor dtaylor@computer.org Group Managing Editor Crystal R. Shif cshif@computer.org Senior Editor Dale Strok Associate Editor Shani Murray Assistant Editors Rebecca Deuel and Denise Kano Editorial Assistant Joan Hong Magazine Assistant Pauline Hosillos Production Assistant Monette Velasco Contributing Editors Cheryl Baltes Design Director Toni Van Buskirk Layout/Technical Illustrations Carmen Flores-Garvey and Alex Torres Publisher Angela Burgess Assistant Publisher Dick Price Membership/Circulation Marketing Manager Georgann Carter Business Development Manager Sandra Brown Assistant Advertising Coordinator Debbie Sims Submissions: Submit a PDF or MS Word file of all articles and track proposals to IEEE Intelligent Systems, Magazine Assistant, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720-1314, phone +1 714 821 8380, isystems@ computer.org. Manuscripts should be approximately 5,000 words long, preferably not exceeding 10 references. Visit http://computer.org/intelligent for editorial guidelines. Editorial: Unless otherwise stated, bylined articles as well as products and services reflect the author’s or firm’s opinion; inclusiondoesnotnecessarilyconstituteendorsementbytheIEEE Computer Society or the IEEE. IEEE Figure 2. A subject onscreen undergoes scrutiny from Zuhair Bandar’s Silent Talker.
  • 4. producing a wider range of neural networks to look at culture-specific, nonverbal be- havior, and producing systems that can explain how they reached the classification. It will be interesting to see where face recognition technology will take us next. Outdoor image analysis, projection of age changes, performance in larger databases, and comparisons of different expressions will improve, as will our capabilities to de- tect deception and other emotional states. This will bring advances in medicine and security as we automate our vital faculty of recognizing and reading faces. MAY/JUNE 2003 computer.org/intelligent How to Reach Us Writers For detailed information on submitting articles, write for our Editorial Guidelines (isystems@computer.org) or access http://computer.org/intelligent/author.htm. Letters to the Editor Send letters to Dennis Taylor Associate Lead Editor IEEE Intelligent Systems 10662 Los Vaqueros Circle Los Alamitos, CA 90720 dtaylor@computer.org Please provide an email address or daytime phone number with your letter. On the Web Access http://computer.org/intelligent for information about IEEE Intelligent Systems. Subscription Change of Address Send change-of-address requests for maga- zine subscriptions to address.change@ieee. org. Be sure to specify IEEE Intelligent Systems. Membership Change of Address Send change-of-address requests for the membership directory to directory. updates@computer.org. Missing or Damaged Copies If you are missing an issue or you received a damaged copy, contact membership@ computer.org. Reprints of Articles For price information or to order reprints, send email to isystems@computer.org or fax +1 714 821 4010. Reprint Permission To obtain permission to reprint an article, contact William Hagen, IEEE Copyrights and Trademarks Manager, at whagen@ieee.org. IEEE Software radios have emerged in recent years, providing a level of programmability so that communications products, such as cell phones, can automatically switch from one frequency or transmission scheme to another when the primary technique is unavailable. Now that they are moving into the marketplace, a few long-term planners are already looking at the second or third generation of software radios, a concept that’s known as cognitive radio. Cognitive radios are adaptive and extremely programmable, learning users’ preferences and automatically adjusting to changes in the operating environment. Military researchers want the security and versatility these techniques can provide, while consumers could be- nefit by having cellular phones that relay the cheapest way to send a message. One of the better-known proponents of this concept is Joe Mitola, a consulting scientist at MITRE, a nonprofit research group in Bedford, Mass. He’s been working with researchers at MIT, DARPA, Sweden’s Royal Institute of Technology, and multiple IEEE committees to set the stage for cognitive radios. One of the first tasks is creating an ontology, a set of terms ensuring that researchers from various disciplines are using the same terms for the same operations and equipment. “This will truly take an interdisciplinary effort,” Mitola says, noting that different users of radio spectrum will use different terminology. A big part of the work to be done using that common language centers on ways that cognitive radios program themselves. To be successful, these radios must passively learn user preferences and do many things without forcing users to program them. Mitola ex- plains that if the user tunes to a certain radio station in the morning, the system must auto- matically remember that station and time of day. “The word passive is key. If we make the user program all the nodes, you’ll see this end up with 12 blinking lights just like a VCR,” he says. One application will be cell phones that determine the best way to transmit messages. He cites an example where communicating on a home campus can be cheaper than from a remote site. “If you’re on the way to work and want to send a message with a 10-Mbyte attachment, the radio might suggest waiting four minutes until you’re in the building, where it could be sent for free,” Mitola says. Another potential application is in the military, where finding the best communica- tions scheme and security or encryption level can be critical. DARPA is already supply- ing some funding, and Mitola predicts that defense funding will increase, which could catalyze the technology’s adoption. Because the radios will do many things automatically, Mitola says that the system will need a certain degree of security. He’s therefore thinking about biometric identifiers that would ensure the radio isn’t being used by someone else when it sends a message to cer- tain people or on certain frequencies. Mitola, who is credited with helping create the foundations for software radio, does- n’t expect to see a big market for cognitive radios in the near future. “It may be a decade away,” he says. Cognitive Radios Will Adapt to Users By Terry Costlow