06.02.2013 Views

Abstract book (pdf) - ICPR 2010

Abstract book (pdf) - ICPR 2010

Abstract book (pdf) - ICPR 2010

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

evaluation of micropattern representations on four forms of Gabor features for face recognition. Three evaluation rules<br />

are proposed and observed for a fair comparison. To reduce the high feature dimensionality problem, uniform quantization<br />

is used to partition the spatial histograms. The experimental results reveal that: 1) micropattern representation based on<br />

Gabor magnitude features outperforms the other three representations, and the performances of the other three are comparable;<br />

and 2) micropattern representation based on the combination of Gabor magnitude and phase features performs<br />

the best.<br />

09:00-11:10, Paper TuAT9.39<br />

Block Pyramid based Adaptive Quantization Watermarking for Multimodal Biometric Authentication<br />

Ma, Bin, Beihang Univ.<br />

Li, Chunlei, Beihang Univ.<br />

Wang, Yunhong, Beihang Univ.<br />

Zhang, Zhaoxiang, Beihang Univ.<br />

Wang, Yiding, North China Univ. of Tech.<br />

This paper proposes a novel robust watermarking scheme to embed fingerprint minutiae into face images for multimodal<br />

biometric authentication. First, a block pyramid is layered according to the block-wise face region distinctiveness estimated<br />

by Adaboost; upper level indicates informative spacial regions. Then, we adopt a first-order statics QIM method to perform<br />

watermark embedding in each pyramid level. Numeric watermark bits with higher priority are embedded into upper pyramid<br />

level with a larger embedding strength. By joint differentiation of host image regions and watermark bits priority, our<br />

scheme achieves a trade-offs among watermarking robustness, capacity and fidelity. Experimental results demonstrate<br />

that our approach guarantees the robustness of hidden biometric data, while preserving the distinctiveness of host biometric<br />

images.<br />

09:00-11:10, Paper TuAT9.40<br />

A Topologic Approach to User-Dependent Key Extraction from Fingerprints<br />

Gudkov, Vladimir, Sonda<br />

Ushmaev, Oleg, Russian Acad. of Sciences<br />

The paper briefly describes an approach to key extraction from fingerprint images based on topological descriptors of<br />

minutiae point neighborhood. The approach allows designing biometric encryption procedures with variable key length<br />

and successful decryption rate.<br />

09:00-11:10, Paper TuAT9.41<br />

Robust Face Recognition using Block-Based Bag of Words<br />

Li, Zisheng, The Univ. of Electro-Communications<br />

Imai, Jun-Ichi, The Univ. of Electro-Communications<br />

Kaneko, Masahide, The Univ. of Electro-Communications<br />

A novel block-based bag of words (BboW) method is proposed for robust face recognition. In our approach, a face image<br />

is partitioned into multiple blocks, dense SIFT features are then calculated and vector quantized into different codewords<br />

on each block respectively. Finally, histograms of codeword distribution on each local block are concatenated to represent<br />

the face image. Experimental results on AR database show that only using one neutral expression frame per person for<br />

training, our method can obtain excellent face recognition results on face images with extreme expressions, variant illumination,<br />

and partial occlusions. Our method also achieves an average recognition rate of 100% on XM2VTS database.<br />

09:00-11:10, Paper TuAT9.42<br />

Analysis of Fingerprint Pores for Vitality Detection<br />

Marcialis, Gian Luca, Univ. of Cagliari<br />

Roli, Fabio, Univ. of Cagliari<br />

Tidu, Alessandra, Univ. of Cagliari<br />

Spoofing is an open-issue for fingerprint recognition systems. It consists in submitting an artificial fingerprint replica from<br />

a genuine user. Current sensors provide an image which is then processed as a true fingerprint. Recently, the so-called 3 rd -<br />

level features, namely, pores, which are visible in high-definition fingerprint images, have been used for matching. In this<br />

- 105 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!