Abstract book (pdf) - ICPR 2010
Abstract book (pdf) - ICPR 2010
Abstract book (pdf) - ICPR 2010
- TAGS
- abstract
- icpr
- icpr2010.org
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
is integrate the features at a descriptor level, in this case arises the problem of normalizing both cues. A significant progress<br />
in the last years in object recognition has provided the bag-of-words framework that again deals with the problem of<br />
feature combination through the definition of vocabularies of visual words. Inspired in this framework, here we present<br />
perceptual textons that will allow to fuse color and texture at the level of p-blobs, which is our feature detection step.<br />
Feature representation is based on two uniform spaces representing the attributes of the p-blobs. The low-dimensionality<br />
of these text on spaces will allow to bypass the usual problems of previous approaches. Firstly, no need for normalization<br />
between cues; and secondly, vocabularies are directly obtained from the perceptual properties of text on spaces without<br />
any learning step. Our proposal improve current state-of-art of color-texture descriptors in an image retrieval experiment<br />
over a highly diverse texture dataset from Corel.<br />
10:20-10:40, Paper TuAT6.5<br />
Illumination Estimation of 3D Surface Texture based on Active Basis<br />
Dong, Junyu, Ocean Univ. of China<br />
Su, Liyuan, Ocean Univ. of China<br />
Duan, Yuanxu, Alcatel-Lucent R&D<br />
This paper describes an approach to estimate illumination directions of 3D surface texture based on Active Basis. Instead<br />
of applying Gabor wavelet transform to extract texture features, we represent our texture features with a simple Haar<br />
feature to improve efficiency. The Active Basis model can be learned from training image patches by the shared pursuit<br />
algorithm. The base histogram can then be obtained based on each model. We measure the illumination directions by minimizing<br />
the Euclidean distance and the entropy difference of base histograms between the test image and the training sets.<br />
Experimental results demonstrate the effectiveness and accuracy of the proposed approach.<br />
TuAT7 Dolmabahçe Hall C<br />
Security and Privacy Regular Session<br />
Session chair: Veldhuis, Raymond (Univ of Twente)<br />
09:00-09:20, Paper TuAT7.1<br />
Binary Discriminant Analysis for Face Template Protection<br />
Feng, Y C, Hong Kong Baptist Univ.<br />
Yuen, Pong C, Hong Kong Baptist Univ.<br />
Biometric cryptosystem (BC) is a very secure approach for template protection because the stored template is encrypted.<br />
The key issues in BC approach include(I) limited capability in handling intra-class variations and (ii) binary input is required.<br />
To overcome these problems, this paper adopts the concept of discriminative analysis and develops a new binary<br />
discriminant analysis (BDA) method to convert a real valued template to a binary template. Experimental results on CMU-<br />
PIE and FRGC face databases show that the proposed BDA method outperforms existing template binarization schemes.<br />
09:20-09:40, Paper TuAT7.2<br />
Renewable Minutiae Templates with Tunable Size and Security<br />
Yang, Bian, Gjovik Univ. Coll.<br />
Busch, Christoph, Gjovik Univ. Coll.<br />
Gafurov, Davrondzhon, Gjovik Univ. Coll.<br />
Bours, Patrick, Gjovik Univ. Coll.<br />
A renewable fingerprint minutiae template generation scheme is proposed to utilize random projection for template diversification<br />
in a security enhanced way. The scheme first achieves absolute pre-alignment over local minutiae quadruplets<br />
in the original template and results in a fix-length feature vector; and then encrypts the feature vector by projecting it to<br />
multiple random matrices and quantizing the projected result; and finally post-process the resultant binary vector in a size<br />
and security tunable way to obtain the final protected minutia vicinity. Experiments on the fingerprint database<br />
FVC2002DB2_A demonstrate the desirable biometric performance of the proposed scheme.<br />
- 79 -