An Introduction to Multimodal Biometric Identity Recognition
Introduction to Biometric Recognition Technologies...
Transcript of Introduction to Biometric Recognition Technologies...
![Page 1: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/1.jpg)
Introduction to Biometric Recognition Technologies
andApplications
Dr. Marios Savvides
Carnegie Mellon CyLab & [email protected]
![Page 2: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/2.jpg)
What are Biometrics?
The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). For our use, biometrics refers to technologies for measuring and analyzing a person's physiological or behavioral characteristics. These characteristics are unique to individuals hence can be used to verify or identify a person.
Also Look at report by Duane M. Blackburn, Federal Bureau of Investigationhttp://www.biometricscatalog.org/biometrics/biometrics_101.pdf or biometrics_101.pdf
![Page 3: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/3.jpg)
Problems with current security systems…
• Based on Passwords, or ID/Swipe cards• Can be Lost.• Can be forgotten.• Worse! Can be stolen and used by a
thief/intruder to access your data, bank accounts, car etc….
![Page 4: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/4.jpg)
Some Examples of Different Biometrics
• Face• Fingerprint• Voice• Palmprint• Hand Geometry• Iris• Retina Scan• Voice• DNA• Signatures• Gait• Keystroke
![Page 5: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/5.jpg)
Minutiae base fingerprint Matching
• This is one of the most commonly used algorithms for extracting features that characterizes a fingerprint.
• The different Minutiae feature locations and types can identify different individuals.
• These are what are stored in the Biometric template.
• We at CMU have other technologies based on Distortion-Tolerant Advanced Correlation Filters (we will talk about these later on)
![Page 6: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/6.jpg)
Fingerprint Minutiae Extraction
Original Processed Thinning
![Page 7: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/7.jpg)
Fingerprint Minutiae Extraction
Original Final Processed with Fingerprint Minutiae Detected
Minutiae
![Page 8: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/8.jpg)
Some example Minutiae types
Ref: Salil Prabhakar, Anil K. Jain, Sharath Pankanti: Learning fingerprint minutiae location and type. Pattern Recognition 36(8): 1847-1857 (2003)
prabhakar_PR3465.pdf
![Page 9: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/9.jpg)
Minutiae Based Matching
• Enrollment: Minutiae are extracted and stored in database (or could be smart-card)
• Verification: Minutiae are extracted during the test phase and matched against those stored in database.
![Page 10: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/10.jpg)
How Optical Sensors work
• http://perso.wanadoo.fr/fingerchip/biometrics/types/fingerprint_sensors_physics.htm#thermal
Basic Idea
• Fingerprint touches the prism. It is illuminated from one side from the lamp and is transmitted to the CCD camera through the lens using total internal reflection.
![Page 11: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/11.jpg)
Touchless (reflection) Fingerprint Sensors
• Light is reflected from the fingerprint itself onto the CMOS sensor to form the fingerprint image.
• http://perso.wanadoo.fr/fingerchip/biometrics/types/fingerprint_sensors_physics.htm#thermal
![Page 12: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/12.jpg)
Touch-less Sensors can be used to provide a surround fingerprint
http://www.tbsinc.com/products/finger_sensor/index.php
•Surround Fingerprint is captured
![Page 13: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/13.jpg)
Capacitative Sensors
• These sensors measure the capacitance between the skin and the sensor to acquire fingerprints.
• Ridge and valleys of a fingerprint have different capacitance which provide a signature to output a fingerprint image.
• These sensors are typically very cheap but are prone to damage by electro-static discharge (ESD).
![Page 14: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/14.jpg)
Companies with Capacitative Sensors
• Upek (spin-off from ST-Microelectronics): www.upek.com
• Fujitsu: http://www.fma.fujitsu.com/biometric/
• LighTuning: http://www.lightuning.com/
• SONY: http://www.sony.net/Products/SC-HP/sys/finger/
• Infineon (formerly Siemens): http://www.infineon.com/cgi/ecrm.dll/jsp/home.do?lang=EN
• Atrua: http://www.atrua.com/index.html
• Melfas:http://www.melfas.com/
![Page 15: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/15.jpg)
Companies with Optical Fingerprint Sensors
• TesTech (electro-optical)http://www.testech.co.kr/
• Digital Persona http://www.digitalpersona.com/
• CASIO:http://www.casio.co.jp/ced/english/fingerprint.html
• Sannaedle / Cecrop / Kinetic Scienceshttp://www.cecrop.com/
![Page 16: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/16.jpg)
Companies with Ultrasound Sensor• UltraScan: http://www.ultra-scan.com/
-“They claim superior performance over optical sensors”
Source: http://www.ultra-scan.com/technology/index.html
![Page 17: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/17.jpg)
Cellphones with Fingerprint Sensors
• LG’s rolling out their latest handset with a built-in biometric fingerprint scanner, the LG-LP3550 (Apr, 2005)
• Has a 3.24 megapixel digital camera• MP3 playback software• Dual 3D stereo speakers• miniSD card slot.
![Page 18: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/18.jpg)
Iris Biometrics
![Page 19: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/19.jpg)
Iris Biometric got really famous in the lost Afghan girl story..
http://news.nationalgeographic.com/news/2002/03/0311_020312_sharbat.html
• In 1994 National Geographic photographer Steve McCurry took a picture of a little Afghan girl called Sharbat Gula in refugee camp in Pakistan.
•Her photo (she had amazing green eyes) made it to National Geographic 100 best Pictures!
•McCurry later tried to trace and find the girl, until finally 17 years later he located a girl with those same haunting green eyes.
Source: National Geographic Magazine
![Page 20: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/20.jpg)
17 years passed…how to verify if this was the same girl?
• Hard-ship changed the girl’s appearance. But she had those same haunting green eyes…
• The Explorer team got verification using U.S. FBI iris scanning technology. They used iris image from old taken photograph and compared to the new one.
• Iris code declared a ‘match’!• This was indeed the same girl! Iris biometric
made it possible to verify this.
![Page 21: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/21.jpg)
Iris as BiometricThe iris is the colored portion of the eye surrounding the pupil. Its pattern results from a meshwork of muscle ligaments, and its color and contrast are determined by pigmentation.
Inner boundary (pupil)Outer boundary
(sclera)
Sphincter ring
Dilator muscles
Biometric Advantages
thought to be very unique, potentially more discriminate than fingerprints
remains stable over an individual’s lifetime
for cooperating subjects, iris pattern is captured quickly in an image
![Page 22: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/22.jpg)
Iris as a BiometricThe iris is the colored portion of the eye surrounding the pupil. Its pattern results from a meshwork of muscle ligaments and pigmentation.
Biometric Advantages
§ thought to be very unique, potentially more discriminate than fingerprints.
§ remains stable over an individual’s lifetime (does not change with aging)
§ captured quickly in a cooperative scenario
Iris Camera Equipment
§ We acquire images using equipment built around a Fuji S1 Pro digital camera (pictured left).
§ Images are taken at close range under normal illumination, and at very high resolution (12 megapixels).
Source: National Geographic Magazine
18 years later
![Page 23: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/23.jpg)
First Step: Iris Segmentation
Inner boundary (with pupil)
Outer boundary (with sclera)
“Unwrapping” the iris
![Page 24: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/24.jpg)
Boundary Detection: Example
![Page 25: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/25.jpg)
Other Fast Segmentation Examples (from CASIA)
![Page 26: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/26.jpg)
Iris Polar Mapping
Video : Illustration of the mapping into normalized polar coordinates
![Page 27: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/27.jpg)
Common Algorithm: Gabor Wavelets
2 2
2 2( , ) exp 2 2x y
x yx y j yψ ωσ σ
⎡ ⎤= − − −⎢ ⎥
⎢ ⎥⎣ ⎦
Gabor wavelets have the form:
Complex exponential with a Gaussian envelope
Localized in both space and frequency
Projections of different Gabor wavelets of different orientations and scale are performed on different parts of the Iris image
Gabor wavelet (real part)
Left: 2D, Right: 3D
John Daugman proposed Gabor wavelet feature extraction.
1 J.G. Daugman, “High Confidence Visual Recognition of Persons by a Test of Statistical Independence,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 15, no. 11, pp. 1148-61, Nov. 1993. h
1
![Page 28: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/28.jpg)
Implementation
Daugman’s method (original 2048 bits)
Result : 15,696 bit code for each iris pattern (our implementation)
Shifts : store multiple codes at 10 shifts (3 pixels apart)
![Page 29: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/29.jpg)
Why Is Shift Invariance Important?
Rotation Shift(in polar coordinates)
Gabor wavelet codes: shifting changes the iris projection onto the wavelet family, altering the bit code
PCA/ICA: even small shifts completely change the subspace representation
As a result, these methods must try to patch the problem with multiple templates of shifted images.
![Page 30: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/30.jpg)
Further Experiments: CMU Iris Database
101 different iris classes
Every class contains approx. 24 images from same eye, collected on 2 different days
Collected at high resolution under visible illumination
We collected an iris image database for testing recognition algorithms.
Sample images
![Page 31: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/31.jpg)
Further Experiments: CMU Iris Database
Typical within-class variations:
Scale change – caused by changes in head position and camera zoom
Eyelid occlusion – subjects relax their eyelids to varying degrees during image capture
Pupil dilation – pupil contraction and dilation is an involuntary response
Other difficulties
inconsistent camera focus head / eye rotation
eyelash obstruction saturation due to reflected flash
![Page 32: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/32.jpg)
1
Pattern MatchingHow to match two patterns?
How do you locate where the pattern is in a long sequence of patterns?
Are these two patterns the same?
How to compute a match metric?
a
b
Marios Savvides
![Page 33: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/33.jpg)
2
Pattern Matching
2 ( ) ( ) 2e = = = + −T T T Ta - b a - b a - b a a b b a b
2
1
( ) _ _N
i
a i energy of a=
= =∑Ta a
a b
-(subtract)
=
c
Lets define mean squared error, i.e.
2 ( ) ( ) 2e = = = + −T T T Ta - b a - b a - b a a b b a b
2
1
( ) _ _N
i
i energy of=
= =∑Tb b b b1
( ) ( ) _N
i
i i correlation term=
= =∑Ta b a b
Marios Savvides
![Page 34: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/34.jpg)
3
Pattern Matching
Assume we normalize energy of a and b to 1 i.e. aTa=bTb=1Then to minimize error, we seek to maximize the correlation term.
So performing correlation, the maximum correlation point is the location where the two pattern match best.
2
1
( ) _ _N
i
a i energy of a=
= =∑Ta a
2 ( ) ( ) 2e = = = + −T T T Ta - b a - b a - b a a b b a b
2
1
( ) _ _N
i
i energy of=
= =∑Tb b b b1
( ) ( ) _N
i
i i correlation term=
= =∑Ta b a b
Marios Savvides
![Page 35: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/35.jpg)
4
Correlation Pattern Recognition
Normalized correlation between a(x) and b(x) gives 1 if they match perfectly (i.e. only if a(x) = b(x) ) and close to 0 if they don’t match.Problem: Reference patterns rarely have same appearanceSolution: Find the pattern that is consistent (i.e., yields large correlation) among the observed variations.
1 1( )( )
− ≤ ≤T
T T
a ba a b b
r(x) test patterns(x) reference pattern
Marios Savvides
![Page 36: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/36.jpg)
5
Object Recognition using correlation
Goal: Locate all occurrences of a target in the input scene
FINGERCMU-ECEFEATURE
CInput Scene
TargetImage
IdealCorrelation Output
InputScene
Marios Savvides
![Page 37: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/37.jpg)
6
Why correlation filters?Built-in Shift-Invariance: shift in the input image leads to a corresponding shift in the output peak. Classification result remains unchanged.Matched filters are just replicas of the object that we are trying to find. Problem is we need as many matched filters as the different appearances that object can look under different conditions. (i.e. a matched filter for every pose, illumination and expression variation).Using Matched filters is computationally and memory very expensive.We can synthesize distortion tolerant filters that can recognize more than one view of an object.We can build different types of distortion-tolerance in each filter (e.g. scale, rotation, illumination etc).We will show advanced correlation filters exhibit graceful degredationwith input image distortions.
Marios Savvides
![Page 38: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/38.jpg)
7
How to do Correlations Efficiently?Use Fast Fourier Transforms…How? Fourier Transform property tells us:
Convolution Theorem:Convolution of two functions a(x) and b(x) in the spatial domain is equivalently computed in the Fourier domain by multiplying the FT{a(x)} with the FT{b(x)}.i.e. in matlab this would be
– Convolution=IFFT ( FFT(a) .* FFT(b) ) (assuming 1 D)Correlation Theorem:
Similar to convolution except the correlation of functions a(x) and b(x) in the spatial domain is equivalently computed in the Fourier domain by multiplying FT{a(x)} with conjugate of FT{b(x)}.
– Correlation=IFFT ( FFT(a) .* conj(FFT(b)) )
Marios Savvides
![Page 39: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/39.jpg)
8
So Correlation in Fourier domain is…..
Is just like convolution except we convolve the test signal t(x) with a time-reversed signal h(x).Taking the conjugate in the Fourier domain time-reverses the signal in the time domain.
Since convolution automatically time-reverses h(x) also..(there is a double time reversal, which cancels out, meaning that you end up computing inner-products with the reference signal and the test signal in the Fourier domain.
Marios Savvides
![Page 40: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/40.jpg)
9
Lets start with a random sample signal a(x)
Marios Savvides
![Page 41: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/41.jpg)
10
Here is the result of correlating a(x) with a(x)
Marios Savvides
![Page 42: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/42.jpg)
11
2D random image s(x,y)
Marios Savvides
![Page 43: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/43.jpg)
12
Convolution of s(x,y) with s(x,y)
Marios Savvides
![Page 44: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/44.jpg)
13
Correlation of s(x,y) with s(x,y) (auto-correlation)Notice nice peak..with height of 1 at the location where the images perfectly align. The peak height indicates confidence of match. Because s(x,y) is random signal, no other shifts of the signal match and there is only a single peak appearing exactly where the two signals are aligned.
Marios Savvides
![Page 45: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/45.jpg)
14
Matched Filter
Matched Filter is simply the reference image that you want to match in the scene.Matched Filter is optimal for detecting the known reference signal in additive white Gaussian noise (AWGN) – it has maximum Signal-to-Noise Ratio.OK...but what are the short-comings of Matched Filters?
Matched Filters only match with the reference signal, and even slight distortions will not produce a match.Thus you need as many matched filters as number of training images (N).Not feasible from a computational viewpoint as you will need to perform N correlations and store all N filters.
Marios Savvides
![Page 46: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/46.jpg)
15
Typical Enrollment for Correlation FiltersEnrollment for Correlation Filters
Training Training Images Images captured captured by by cameracamera
Filter Design Filter Design ModuleModule
Correlation Correlation Filter H Filter H (Template)(Template)
Frequency Frequency Domain arrayDomain array
Frequency Frequency Domain arrayDomain array
Frequency Frequency Domain arrayDomain array
FFTFFT
FFTFFT
FFTFFT
N x N pixelsN x N pixels N x N pixels (complex)N x N pixels (complex)
N x N pixels N x N pixels (complex)(complex)
Marios Savvides
![Page 47: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/47.jpg)
16
Recognition stageRecognition stage
Test Image Test Image captured captured by by cameracamera
Correlation Correlation Filter H Filter H (Template)(Template)
Frequency Frequency Domain arrayDomain array
FFTFFT
N x N pixelsN x N pixels
N x N pixelsN x N pixelsResulting Resulting Frequency Frequency Domain arrayDomain array
IFFTIFFT
PSRPSR
![Page 48: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/48.jpg)
17
Minimum Average Correlation Energy (MACE) FiltersMinimum Average Correlation Energy (MACE) FiltersMACE filter minimizes the average energy of the correlation outputs while maintaining the correlation value at the origin at a pre-specified level.Sidelobes are reduced greatly and discrimination performance is improved
MACE Filter produces a MACE Filter produces a sharp peak at the originsharp peak at the origin
Correlation Plane
![Page 49: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/49.jpg)
18
MACE Filter FormulationMACE Filter FormulationMinimizing spatial correlation energy can be done directly in the frequency domain by expressing the ith correlation plane (ci) energy Ei as follows:
hDhhXXh iii
d
kid
d
pidi kXkHpcE ++
==
==== ∑∑ *
1
221
1
21 )()()(
⎥⎥⎥⎥⎥⎥
⎦
⎤
⎢⎢⎢⎢⎢⎢
⎣
⎡
)(.
)3()2(
)1(
dX
XX
X
i
i
i
i
DhhhXXh +
=
+
=
=⎥⎥⎦
⎤
⎢⎢⎣
⎡== ∑∑
N
iiiN
N
iiNave EE
1
*1
1
1
The Average correlation plane energy for the N training images is given by Eave
Parseval’s Theorem!
![Page 50: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/50.jpg)
19
MACE Filter Formulation (ContMACE Filter Formulation (Cont’’d.)d.)
The value at the origin of the correlation of the i-th training image is:
* 2 0 *
1 1
(0) ( ) ( ) ( ) ( )d d
j pi i i i
p p
c H p X p e H p X pπ +
= =
= = =∑ ∑ h x
Specify the correlation peak values for all the training image using column vector u
uhX =+
Minimizing the average correlation energies h+Dh subject to the constraints X+h=u leads to the MACE filter solution.
hMACE = D-1 X (X+ D-1 X)-1 u
![Page 51: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/51.jpg)
20
Example Correlation Outputs from an Authentic
![Page 52: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/52.jpg)
21
Example Correlation Outputs from an Impostor
![Page 53: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/53.jpg)
22
Different Figure of Merit (FOM)
For Matched Filter we showed that the peak height is what was used for recognition.For MACE filters, the optimization is not only to keep the peak height at 1 but also to create sharp peaks.Thus it makes sense to use a metric that can measure whether we have achieved this optimizationWe need a metric that can measure the Peak sharpness! As images that resemble the training classes will produce a sharp peak whereas impostor classes will not produce sharp peaks as they were not optimized to do so!
![Page 54: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/54.jpg)
23
Peak to Sidelobe Ratio (PSR)
σmeanPeakPSR −
=
1. Locate peak1. Locate peak
2. Mask a small 2. Mask a small pixel regionpixel region
3. Compute the mean and 3. Compute the mean and σσ in a in a bigger region centered at the peakbigger region centered at the peak
PSR invariant to constant illumination changes
Match declared when PSR is large, i.e., peak must not only be large, but sidelobes must be small.
![Page 55: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/55.jpg)
24
Example Correlation OutputsUse these images for training (peak=1 for all correlation outputs)
PSR: 41.6 44.8 54.2
![Page 56: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/56.jpg)
25
Example Correlation Output Impostors using MACE
No discernible peaks (0.16 and 0.12 and PSR 5.6 for impostor class! Very good!
![Page 57: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/57.jpg)
26
Example correlation output for authentic people (but slightly different illumination)
Marios Savvides
![Page 58: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/58.jpg)
27
Facial Expression Database
Facial Expression Database (AMP Lab, CMU)13 People75 images per personVarying Expressions64x64 pixelsConstant illumination
1 filter per person made from 3 training images
![Page 59: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/59.jpg)
28
PSRs for the Filter Trained on 3 Images
Response to Training Images Response to
Faces Images from Person A
MARGIN OF SEPARATION
Response to 75 face images of the other 12 people=900 PSRs
PSR
![Page 60: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/60.jpg)
29
49 Faces from PIE Database illustrating the variations in illumination
![Page 61: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/61.jpg)
30
Training Image selectionWe used three face images to synthesize a correlation filter The three selected training images consisted of 3 extreme cases (dark left half face, normal face illumination, dark righthalf face).
![Page 62: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/62.jpg)
31
0 10 20 30 40 50 60
10
20
30
40
50
60
Equal Error Rate using Individual Eigenface Subspace Method on PIE Database with No Background Illumination
Person
Equ
al E
rror R
ate
Average Equal Error Average Equal Error Rate = 30.8 %Rate = 30.8 %
EER using IPCA with no Background illumination
![Page 63: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/63.jpg)
32
Reject Reject
AuthenticateAuthenticateThresholdThreshold
EER using Filter with no Background illumination
![Page 64: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/64.jpg)
33
1 2 1 2 3 4 5 3 4 5
6 7 6 7 8 9 10 8 9 10
11 12 1311 12 13 14 15 14 15
16 17 18 16 17 18 19 20 19 20
2121
21 different illuminations of a person’s face in the database
![Page 65: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/65.jpg)
34
99.9%199.9%294.2%7998.4%2291.0%12218,19,20
99.9%199.9%182.1%24497.8%3078.0%3008,9,10
99.1%1099.1%1073.3%36550.9%67036.1%8727,10,19
99.7%399.9%171.4%39093.2%9372.4%3375,7,9,10
100%099.9%189.3%14597.1%4091.4%1105,6,7,8,9, 10
100%0100%097.3%3697.3%3197.6%335,6,7,8,9,10,11,18,19,20
% RecRate
# Errors
% RecRate
# Errors
%RecRate
# Errors
%RecRate
# Errors
%RecRate
# Errors
Training Images
UMACE FiltersMACE FiltersFisherfaces3D Linear Subspace
IPCAFrontal Lighting
PIE dataset (face images captured with room lights off)
Recognition Accuracy using Frontal Lighting Training Images
![Page 66: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/66.jpg)
35
Reduced Complexity Filters
Reducing the computational and storage complexity of filters has many applications:
– PDA’s / Cellphone Biometric recognition–Ability to store Biometric templates on smart cards and other limited memory devices. –System-on-Chip implementations
Idea is to reduce representation of filters to 4 phase levels.
We use phase since phase contains most of the information for reconstruction for images than magnitude.
Ideal for Passport form-factor Biometric storage specifications. E.g. for face only 127bytes/templates are required.
*M.Savvides and B.V.K. Vijaya Kumar, "Quad Phase Minimum Average Correlation Energy Filters for Reduced Memory Illumination Tolerant Face Authentication" pp. 19, Lecture Notes in Computer Science, Springer-Verlag Heidelberg, volume 2680 / 2003, January 2003* US Patent pending
![Page 67: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/67.jpg)
36
Phase retains most of the information for images
![Page 68: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/68.jpg)
37
Iterative Reconstruction from Phase
![Page 69: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/69.jpg)
38
Face Identification from Partial Faces
We have shown that these correlation filters seem to be tolerant to illumination variations, even when half the face is completely black and still achieve excellent recognition rates.What about partial face recognition?In practice a face detector will detect and retrieve part of theface (another type of registration error). In many cases, occluded by another face or object. Other face recognition methods fail in this circumstance.
*M. Savvides, B.V.K. Vijaya Kumar and P.K. Khosla, "Robust, Shift-Invariant Biometric Identification from Partial Face Images", Defense & Security Symposium, special session on Biometric Technologies for Human Identification (OR51) 2004.
![Page 70: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/70.jpg)
39
Vertical cropping of test face image pixels (correlation filters are trained on FULL size images)
Using Training set #1 (3 Using Training set #1 (3 extreme lighting images)extreme lighting images)
Using Training set #2 (3 Using Training set #2 (3 frontal lighting images)frontal lighting images)
![Page 71: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/71.jpg)
40
Recognition using selected face regions
Using Training set #1 (3 Using Training set #1 (3 extreme lighting images)extreme lighting images)
Using Training set #2 (3 Using Training set #2 (3 frontal lighting images)frontal lighting images)
![Page 72: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/72.jpg)
41
Vertical crop + texture #2
Zero intensity backgroundZero intensity background Textured backgroundTextured background*M. Savvides, B.V.K. Vijaya Kumar and P.K. Khosla, "Robust, Shift-Invariant Biometric Identification from Partial Face Images", Defense & Security Symposium, special session on Biometric Technologies for Human Identification (OR51) 2004.
![Page 73: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/73.jpg)
42
Train filter on illuminations 3,7,16. Train filter on illuminations 3,7,16.
Test on 10.Test on 10.
![Page 74: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/74.jpg)
43
Using same Filter trained before,
Perform cross-correlation on cropped-face shown on left
![Page 75: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/75.jpg)
44
Using same Filter trained before,
Perform cross-correlation on cropped-face shown on left.
![Page 76: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/76.jpg)
45
•• CORRELATION FILTERS ARE SHIFT-INVARIANT
• Correlation output is shifted down by the same amount of the shifted face image, PSR remains SAME!
*M.Savvides and B.V.K. Vijaya Kumar, "Efficient Design of Advanced Correlation Filters for Robust Distortion-Tolerant Face Identification", IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) 2003.
![Page 77: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/77.jpg)
46
•Using SOMEONE ELSE’S Filter,…. Perform cross-correlation on cropped-face shown on left.
•As expected very low PSR.
![Page 78: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/78.jpg)
47
That’s All Folks – Demo time
Questions / Demo?
![Page 79: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/79.jpg)
48
Cancellable Biometric Filters:-practical ways of deploying correlation filter biometrics
A biometric filter (stored on a card) can be lost or stolenCan we re-issue a different one (just as we re-issue a different credit card)?There are only a limited set of biometric images per person (e.g., only one face) We can use standard encryption methods to encrypt the biometricsand then decrypt them for use during the recognition stage, however there is a ‘window’ of opportunity where a hacker can obtain the decrypted biometric during the recognition stage.We have figure out a way to encrypt them and ‘work’ or authenticate in the encrypted domain and NOT directly in the original biometric domain.
*M. Savvides, B.V.K. Vijaya Kumar and P.K. Khosla, "Authentication-Invariant Cancelable Biometric Filters for Illumination-Tolerant Face Verification", Defense & Security Symposium, special session on Biometric Technologies for Human Identification, 2004.
![Page 80: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/80.jpg)
49
Enrollment Stage
*
Training Images Random PSF
Random Number
Generator
PIN
Encrypted Training Images
Encrypted MACE Filter
seed
![Page 81: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/81.jpg)
50
Authentication Stage
*
Test Image Random Convolution
Kernel
Random Number
Generator
PIN(can be obtained from another biometric e.g. fingerprint)
Encrypted Test Image Encrypted MACE Filter
*
PSRseed
![Page 82: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/82.jpg)
51
What about performance?
We can show theoretically that performing this convolution pre-processing step does not affect resulting Peak-to-Sidelobe ratios.
Thus, working in this encrypted domain does not change the verification performance
![Page 83: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/83.jpg)
52
Random Convolution Random Convolution Kernel 1Kernel 1
Random Convolution Random Convolution Kernel 2Kernel 2
Encrypted MACE Encrypted MACE Filter 1Filter 1
Encrypted MACE Encrypted MACE Filter 2Filter 2
![Page 84: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/84.jpg)
53
Convolved with Convolved with Random Random
Convolution Convolution Kernel 1Kernel 1
Convolved with Convolved with Random Random
Convolution Convolution Kernel 2Kernel 2
Original Original Training Training ImagesImages
![Page 85: Introduction to Biometric Recognition Technologies …users.ece.cmu.edu/~jzhu/class/18200/F05/Lecture06_Marios_Lecture.pdf · Introduction to Biometric Recognition Technologies and](https://reader034.fdocuments.net/reader034/viewer/2022051308/5b0758047f8b9a5c308e398d/html5/thumbnails/85.jpg)
54
Correlation Output from Correlation Output from Encrypted MACE Filter 1Encrypted MACE Filter 1
Correlation Output from Correlation Output from Encrypted MACE Filter 2Encrypted MACE Filter 2