06.02.2013 Views

Abstract book (pdf) - ICPR 2010

Abstract book (pdf) - ICPR 2010

Abstract book (pdf) - ICPR 2010

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

is integrate the features at a descriptor level, in this case arises the problem of normalizing both cues. A significant progress<br />

in the last years in object recognition has provided the bag-of-words framework that again deals with the problem of<br />

feature combination through the definition of vocabularies of visual words. Inspired in this framework, here we present<br />

perceptual textons that will allow to fuse color and texture at the level of p-blobs, which is our feature detection step.<br />

Feature representation is based on two uniform spaces representing the attributes of the p-blobs. The low-dimensionality<br />

of these text on spaces will allow to bypass the usual problems of previous approaches. Firstly, no need for normalization<br />

between cues; and secondly, vocabularies are directly obtained from the perceptual properties of text on spaces without<br />

any learning step. Our proposal improve current state-of-art of color-texture descriptors in an image retrieval experiment<br />

over a highly diverse texture dataset from Corel.<br />

10:20-10:40, Paper TuAT6.5<br />

Illumination Estimation of 3D Surface Texture based on Active Basis<br />

Dong, Junyu, Ocean Univ. of China<br />

Su, Liyuan, Ocean Univ. of China<br />

Duan, Yuanxu, Alcatel-Lucent R&D<br />

This paper describes an approach to estimate illumination directions of 3D surface texture based on Active Basis. Instead<br />

of applying Gabor wavelet transform to extract texture features, we represent our texture features with a simple Haar<br />

feature to improve efficiency. The Active Basis model can be learned from training image patches by the shared pursuit<br />

algorithm. The base histogram can then be obtained based on each model. We measure the illumination directions by minimizing<br />

the Euclidean distance and the entropy difference of base histograms between the test image and the training sets.<br />

Experimental results demonstrate the effectiveness and accuracy of the proposed approach.<br />

TuAT7 Dolmabahçe Hall C<br />

Security and Privacy Regular Session<br />

Session chair: Veldhuis, Raymond (Univ of Twente)<br />

09:00-09:20, Paper TuAT7.1<br />

Binary Discriminant Analysis for Face Template Protection<br />

Feng, Y C, Hong Kong Baptist Univ.<br />

Yuen, Pong C, Hong Kong Baptist Univ.<br />

Biometric cryptosystem (BC) is a very secure approach for template protection because the stored template is encrypted.<br />

The key issues in BC approach include(I) limited capability in handling intra-class variations and (ii) binary input is required.<br />

To overcome these problems, this paper adopts the concept of discriminative analysis and develops a new binary<br />

discriminant analysis (BDA) method to convert a real valued template to a binary template. Experimental results on CMU-<br />

PIE and FRGC face databases show that the proposed BDA method outperforms existing template binarization schemes.<br />

09:20-09:40, Paper TuAT7.2<br />

Renewable Minutiae Templates with Tunable Size and Security<br />

Yang, Bian, Gjovik Univ. Coll.<br />

Busch, Christoph, Gjovik Univ. Coll.<br />

Gafurov, Davrondzhon, Gjovik Univ. Coll.<br />

Bours, Patrick, Gjovik Univ. Coll.<br />

A renewable fingerprint minutiae template generation scheme is proposed to utilize random projection for template diversification<br />

in a security enhanced way. The scheme first achieves absolute pre-alignment over local minutiae quadruplets<br />

in the original template and results in a fix-length feature vector; and then encrypts the feature vector by projecting it to<br />

multiple random matrices and quantizing the projected result; and finally post-process the resultant binary vector in a size<br />

and security tunable way to obtain the final protected minutia vicinity. Experiments on the fingerprint database<br />

FVC2002DB2_A demonstrate the desirable biometric performance of the proposed scheme.<br />

- 79 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!