Robust Face Based Identity Veri cation
نویسنده
چکیده
| In this paper we propose two feature extraction techniques, termed DCT-mod and DCT-delta, for use in an illumination invariant face based identity veri cation system. We compare the performance of the proposed techniques against two standard methods: Principal Component Analysis (PCA) and the 2-D Discrete Cosine Transform (DCT). Experiments on the VidTIMIT database support the use of the proposed techniques.
منابع مشابه
About MultiModal Identity Veri cation in Interactive Dialogue Systems
The aim of this paper is to introduce multimodal iden tity veri cation techniques to the InteractiveDialogue Sys tems society, and to identify possible applications. The multimodal identity veri cation system presented here is based on two biometric modalities (speech and vision) and it uses 3 experts (using voice, frontal face and pro le images), based on these two modalities, in parallel....
متن کاملCon dence Measures for Multimodal Identity
Multimodal fusion for identity veri cation has already shown great improvement compared to unimodal algorithms. In this paper, we propose to integrate con dence measures during the fusion process. We present a comparison of three di erent methods to generate such con dence information from unimodal identity veri cation systems. These methods can be used either to enhance the performance of a mu...
متن کاملFeatures for robust face-based identity verification
In this paper we propose the discrete cosine transform (DCT) mod 2 feature set, which utilizes polynomial coe2cients derived from 2D DCT coe2cients obtained from spatially neighboring blocks. Face veri%cation results on the multi-session VidTIMIT database suggest that the DCT-mod 2 feature set is superior (in terms of robustness to illumination direction changes and discrimination ability) to f...
متن کاملStop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System
Currently known basic anonymity techniques depend on identity veri cation. If veri cation of user identities is not possible due to the related management overhead or a general lack of information (e.g. on the Internet), an adversary can participate several times in a communication relationship and observe the honest users. In this paper we focus on the problem of providing anonymity without id...
متن کاملCombining key-phrase detection and subword-based verification for flexible speech understanding
A exible speech understanding framework combining key-phrase detection and veri cation is presented. Detection of semantically-tagged key-phrases directly leads to robust understanding. In order to select reliable detection and eliminate false alarms, utterance veri cation technique is incorporated. A phrase veri er combines subword-based likelihood ratios of correct models and anti-subword alt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001