• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Automatic Person Verification Using Speech and Face Information (2002)

by S Sanderson
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 37
Next 10 →

COMPARISON OF MLP AND GMM CLASSIFIERS FOR FACE VERIFICATION ON XM2VTS

by Fabien Cardinaux , Conrad Sanderson, Sébastien Marcel , 2003
"... ..."
Abstract - Cited by 75 (42 self) - Add to MetaCart
Abstract not found

A segment-based audio-visual speech recognizer: Data collection, development, and initial experiments

by T J Hazen, K Saenko, C La, J R Glass - in Proceedings of the International conference on Multimodal Interfaces (ICMI , 2004
"... ..."
Abstract - Cited by 29 (8 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

..., which was recently made available by the Linguistic Data Consortium (LDC). It consists of 43 subjects reciting 10 TIMIT sentences each, and has been used in multi-modal person verification research =-=[20]-=-. This corpus was not yet publicly available at the onset of our own data collection effort.sFigure 1: Sample still shots from the AV-TIMIT corpus showing the two lighting conditions used in the recor...

Benchmarking Quality-dependent and Cost-sensitive Score-level Multimodal Biometric Fusion Algorithms

by Norman Poh, Thirimachos Bourlai, Josef Kittler, Lorene Allano, Fernando Alonso-Fernandez, Onkar Ambekar, John Baker, Bernadette Dorizzi, Omolara Fatukasi, Julian Fierrez, Harald Ganster, Javier Ortega-Garcia, Albert Ali Salah, Tobias Scheidat, Claus Vielhauer, et al.
"... Automatically verifying the identity of a person by means of biometrics (e.g., face and fingerprint) is an important application in our day-to-day activities such as accessing banking services and security control in airports. To increase the system reliability, several biometric devices are often ..."
Abstract - Cited by 21 (8 self) - Add to MetaCart
Automatically verifying the identity of a person by means of biometrics (e.g., face and fingerprint) is an important application in our day-to-day activities such as accessing banking services and security control in airports. To increase the system reliability, several biometric devices are often used. Such a combined system is known as a multimodal biometric system. This paper reports a benchmarking study carried out within the framework the Biosecure DS2 (Access Control) evaluation campaign organized by the University of Surrey, involving face, fingerprint and iris biometrics for person authentication, targeting the application of physical access control in a mediumsize establishment with some 500 persons. While multimodal biometrics is a well investigated subject in the literature, there exists no benchmark for a fusion algorithm comparison. Working towards this goal, we designed two sets of experiments: quality-dependent

Face verification competition on the xm2vts database

by Kieron Messer, Josef Kittler, Mohammad Sadeghi, Sebastien Marcel, Christine Marcel, Samy Bengio, F. Cardinaux, J. Czyz, Sanun Srisuk, Maria Petrou, Werasak Kurutach, Roberto Paredes, B. Kepenekci, F. B. Tek, G. B. Akar, Nick Mavity, Universite Catholique De Louvain, Batiment Stevin, Place Du Levant - in Int. Conf. Audio and Video Based Biometric Person Authentication , 2003
"... Abstract. In the year 2000 a competition was organised to collect face verification results on an identical, publicly available data set using a standard evaluation protocol. The database used was the Xm2vts database along with the Lausanne protocol [14]. Four different institutions submitted result ..."
Abstract - Cited by 15 (2 self) - Add to MetaCart
Abstract. In the year 2000 a competition was organised to collect face verification results on an identical, publicly available data set using a standard evaluation protocol. The database used was the Xm2vts database along with the Lausanne protocol [14]. Four different institutions submitted results on the database which were subsequently published in [13]. Three years later, a second contest using the same dataset and protocol was organised as part of AVBPA 2003. This time round seven seperate institutions submitted results to the competition. This paper presents the results of the competition and shows that verification results on this protocol have increased in performance by a factor of 3. 1
(Show Context)

Citation Context

...verification algorithms into the competition. A brief description of each technique is given below. IDIAP – Cardinaux The proposed face verification method is based on Gaussian Mixture Models (GMMs)=-=, [19]-=- and[4]. The face images are analyzed on a block by block basis. Each block is decomposed in terms of an extension of the 2D Discrete Cosine Transform (DCT), namely DCT-mod2. The GMM approach uses a c...

Improving Classification With Class-Independent Quality Measures: Q-stack in Face Verification

by Krzysztof Kryszczuk, Andrzej Drygajlo
"... Abstract. Existing approaches to classification with signal quality measures make a clear distinction between the single- and multiple classifier scenarios. This paper presents an uniform approach to dichotomization based on the concept of stacking, Q-stack, which makes use of classindependent signa ..."
Abstract - Cited by 15 (5 self) - Add to MetaCart
Abstract. Existing approaches to classification with signal quality measures make a clear distinction between the single- and multiple classifier scenarios. This paper presents an uniform approach to dichotomization based on the concept of stacking, Q-stack, which makes use of classindependent signal quality measures and baseline classifier scores in order to improve classification in uni- and multimodal systems alike. In this paper we demonstrate the application of Q-stack on the task of biometric identity verification using face images and associated quality measures. We show that the use of the proposed technique allows for reducing the error rates below those of baseline classifiers in single- and multi-classifier scenarios. We discuss how Q-stack can serve as a generalized framework in any single, multiple, and multimodal classifier ensemble.
(Show Context)

Citation Context

...[14]. In our experiments we used the following two face matchers: 1. DCT -local DCTmod2 features and a Bayes classifier based on the feature distributions approximated by Gaussian Mixture Models (GMM)=-=[15]-=- (scores produced by the DCT matcher denoted as x1), 2. PCA - Mahalanobis distance between global PCA feature vectors [16]. The PCA projection space was found using all images from the training datase...

Robust Features for Frontal Face Authentication in Difficult Image Conditions

by Sanderson , 2003
"... In this report we extend the recently proposed DCT-mod2 feature extraction technique (which utilizes polynomial coefficients derived from 2D DCT coefficients obtained from horizontally & vertically neighbouring blocks) via the use of various windows and diagonally neighbouring blocks. We also ev ..."
Abstract - Cited by 14 (8 self) - Add to MetaCart
In this report we extend the recently proposed DCT-mod2 feature extraction technique (which utilizes polynomial coefficients derived from 2D DCT coefficients obtained from horizontally & vertically neighbouring blocks) via the use of various windows and diagonally neighbouring blocks. We also evaluate enhanced PCA, where traditional PCA feature extraction is combined with DCT-mod2. Results using test images corrupted by a linear and a non-linear illumination change, white Gaussian noise and compression artefacts, show that use of diagonally neighbouring blocks and windowing is detrimental to robustness against illumination changes while being useful for increasing robustness against white noise and compression artefacts. We also show that the enhanced PCA technique retains all the positive aspects of traditional PCA (that is robustness against white noise and compression artefacts) while also being robust to illumination direction changes; moreover, enhanced PCA outperforms PCA with histogram equalisation pre-processing.

The VidTIMIT database

by C Sanderson, K K Paliwal - IDIAP Communication , 2002
"... ..."
Abstract - Cited by 11 (1 self) - Add to MetaCart
Abstract not found

Robust speaker identification based on perceptual log area ratio and Gaussian mixture models

by David Chow, Waleed H. Abdulla - Proceedings of 8th International Conference on Spoken Language Processing , 2004
"... This paper presents a new feature for speaker identification called perceptual log area ratio (PLAR). PLAR is closely related to the log area ratio (LAR) feature. PLAR is derived from the perceptual linear prediction (PLP) rather than the linear predictive coding (LPC). The PLAR feature derived from ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
This paper presents a new feature for speaker identification called perceptual log area ratio (PLAR). PLAR is closely related to the log area ratio (LAR) feature. PLAR is derived from the perceptual linear prediction (PLP) rather than the linear predictive coding (LPC). The PLAR feature derived from PLP is more robust to noise than the LAR feature. In this paper, PLAR, LAR and MFCC features were tested in a Gaussian mixture model (GMM) based speaker identification system. The F-ratio feature analysis showed that the lower order PLAR and LAR coefficients are superior in classification performance to their MFCC counterparts. The text-independent, closed-set speaker identification accuracies, as tested on KING, YOHO and the down-sampled version of TIMIT databases were 98.81%, 85.29%, 97.045 % using PLAR, 97.92%, 61.76%, 94.76 % using LAR and 96.73%, 84.31%, 96.48 % using MFCC. Those results showed that PLAR is better than LAR and MFCC in both clean and noisy environments. 1.
(Show Context)

Citation Context

...ntss(MFCC) and linear predictive cepstral coefficients (LPCC) assfeature vectors [1]. Currently, researches are focusing onsimproving these two cepstral features [2] or appending newsfeatures on them =-=[3]-=-. Although MFCC and LPCC were provedsto be two very good features in speech recognition, they aresnot necessarily being as good in speaker identification. In fact,sit is generally believed that the sp...

A BioSecure (DS2) Report on the Technological Evaluation of Score-level Quality-dependent and Cost-sensitive Multimodal Biometric Performance

by Norman Poh, Thirimachos Bourlai, Josef Kittler, Albert Salah, O Alonso John, Baker Harald Ganster, Lorene Allano, Omalara Fatukasi, Onkar Ambekar
"... This report summarizes the result of the BioSEcure DS2 (Desktop) evaluation campaign. This campaign aims at evaluating multimodal fusion algorithms involving face, fingerprint and iris biometrics for person authentication, targeting at the application of physical access control in a medium-sized est ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
This report summarizes the result of the BioSEcure DS2 (Desktop) evaluation campaign. This campaign aims at evaluating multimodal fusion algorithms involving face, fingerprint and iris biometrics for person authentication, targeting at the application of physical access control in a medium-sized establishment with some 500 persons. While multimodal biometrics is a well investigated subject in the literature, there exists no benchmark results on which basis fusion algorithms can be compared. Working towards this goal, we designed two sets of experiments: quality-dependent and cost-sensitive evaluations. The quality-dependent evaluation aims at evaluating how well fusion algorithms can perform under changing quality of raw biometric images principally due to change of devices. The cost-sensitive evaluation, on the other hand, aims at how well a fusion algorithm can perform given restricted computation and in the presence of software and hardware failures, resulting in errors such as failure to acquire and failure to match. Since multiple capturing devices are available, a fusion algorithm should be able to handle this non-ideal but nevertheless realistic scenario. It is on this ground that this evaluation is proposed. In both evaluations, a fusion algorithm is supplied with scores from each biometric comparison subsystems as well as the quality measures of both the template and the quality measures. The evaluation campaign is very encouraging, receiving 15 fusion systems. To the best of our knowledge, the BioSecure DS2 evaluation campaign is the first

Multibiometrics for Identity Authentication: Issues, Benefits and Challenges

by Josef Kiltter, Norman Poh
"... Abstract — Multi biometric systems exploit different biometric traits, multiple samples and multiple algorithms to establish the identity of an individual. Over any single biometric system, they have the advantage of increasing the population coverage, offering user choice, making biometric authenti ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract — Multi biometric systems exploit different biometric traits, multiple samples and multiple algorithms to establish the identity of an individual. Over any single biometric system, they have the advantage of increasing the population coverage, offering user choice, making biometric authentication systems more reliable and resilient to spoofing, and most importantly, improving the authentication performance. However, both the design and deployment of multi biometric systems raise many issues. These include system architecture, fusion methodology, selection of component biometric experts based on their accuracy and diversity, measurement of their quality, reliability and competence, as well as overall system usability, and economic viability. These issues will be addressed and possible ways forward discussed. I.
(Show Context)

Citation Context

...on – examples of methods are multi-band [5], multi-stream [6], [7], front-end multi-feature [8] approaches and the union model [9]; in the form of ensemble [10]; in audio-visual person authentication =-=[11]-=-; and, in multi-biometrics [12], [13], [14], [15], [16] (and references herein), among others. In fact, one of the earliest work addressing multimodal biometric fusion was reported in 1978 [17]. There...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University