Abstract book (pdf) - ICPR 2010
Abstract book (pdf) - ICPR 2010
Abstract book (pdf) - ICPR 2010
- TAGS
- abstract
- icpr
- icpr2010.org
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
evaluation of micropattern representations on four forms of Gabor features for face recognition. Three evaluation rules<br />
are proposed and observed for a fair comparison. To reduce the high feature dimensionality problem, uniform quantization<br />
is used to partition the spatial histograms. The experimental results reveal that: 1) micropattern representation based on<br />
Gabor magnitude features outperforms the other three representations, and the performances of the other three are comparable;<br />
and 2) micropattern representation based on the combination of Gabor magnitude and phase features performs<br />
the best.<br />
09:00-11:10, Paper TuAT9.39<br />
Block Pyramid based Adaptive Quantization Watermarking for Multimodal Biometric Authentication<br />
Ma, Bin, Beihang Univ.<br />
Li, Chunlei, Beihang Univ.<br />
Wang, Yunhong, Beihang Univ.<br />
Zhang, Zhaoxiang, Beihang Univ.<br />
Wang, Yiding, North China Univ. of Tech.<br />
This paper proposes a novel robust watermarking scheme to embed fingerprint minutiae into face images for multimodal<br />
biometric authentication. First, a block pyramid is layered according to the block-wise face region distinctiveness estimated<br />
by Adaboost; upper level indicates informative spacial regions. Then, we adopt a first-order statics QIM method to perform<br />
watermark embedding in each pyramid level. Numeric watermark bits with higher priority are embedded into upper pyramid<br />
level with a larger embedding strength. By joint differentiation of host image regions and watermark bits priority, our<br />
scheme achieves a trade-offs among watermarking robustness, capacity and fidelity. Experimental results demonstrate<br />
that our approach guarantees the robustness of hidden biometric data, while preserving the distinctiveness of host biometric<br />
images.<br />
09:00-11:10, Paper TuAT9.40<br />
A Topologic Approach to User-Dependent Key Extraction from Fingerprints<br />
Gudkov, Vladimir, Sonda<br />
Ushmaev, Oleg, Russian Acad. of Sciences<br />
The paper briefly describes an approach to key extraction from fingerprint images based on topological descriptors of<br />
minutiae point neighborhood. The approach allows designing biometric encryption procedures with variable key length<br />
and successful decryption rate.<br />
09:00-11:10, Paper TuAT9.41<br />
Robust Face Recognition using Block-Based Bag of Words<br />
Li, Zisheng, The Univ. of Electro-Communications<br />
Imai, Jun-Ichi, The Univ. of Electro-Communications<br />
Kaneko, Masahide, The Univ. of Electro-Communications<br />
A novel block-based bag of words (BboW) method is proposed for robust face recognition. In our approach, a face image<br />
is partitioned into multiple blocks, dense SIFT features are then calculated and vector quantized into different codewords<br />
on each block respectively. Finally, histograms of codeword distribution on each local block are concatenated to represent<br />
the face image. Experimental results on AR database show that only using one neutral expression frame per person for<br />
training, our method can obtain excellent face recognition results on face images with extreme expressions, variant illumination,<br />
and partial occlusions. Our method also achieves an average recognition rate of 100% on XM2VTS database.<br />
09:00-11:10, Paper TuAT9.42<br />
Analysis of Fingerprint Pores for Vitality Detection<br />
Marcialis, Gian Luca, Univ. of Cagliari<br />
Roli, Fabio, Univ. of Cagliari<br />
Tidu, Alessandra, Univ. of Cagliari<br />
Spoofing is an open-issue for fingerprint recognition systems. It consists in submitting an artificial fingerprint replica from<br />
a genuine user. Current sensors provide an image which is then processed as a true fingerprint. Recently, the so-called 3 rd -<br />
level features, namely, pores, which are visible in high-definition fingerprint images, have been used for matching. In this<br />
- 105 -