Skip to:Content
|
Bottom
Cover image for Signal and image processing for biometrics
Title:
Signal and image processing for biometrics
Publication Information:
London : ISTE ; Hoboken, N.J. : Wiley, 2012
Physical Description:
xvi, 319 p. : ill. ; 24 cm.
ISBN:
9781848213852

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010306244 TK7882.B56 S54 2012 Open Access Book Book
Searching...

On Order

Summary

Summary

The aim of this book is to deal with biometrics in terms of signal and image processing methods and algorithms. This will help engineers and students working in digital signal and image processing deal with the implementation of such specific algorithms.

It discusses numerous signal and image processing techniques that are very often used in biometric applications. In particular, algorithms related to hand feature extraction, speech recognition, 2D/3D face biometrics, video surveillance and other interesting approaches are presented. Moreover, in some chapters, Matlab codes are provided so that readers can easily reproduce some basic simulation results.

This book is suitable for final-year undergraduate students, postgraduate students, engineers and researchers in the field of computer engineering and applied digital signal and image processing.

1. Introduction to Biometrics, Bernadette Dorizzi.
2. Introduction to 2D Face Recognition, Amine Nait-Ali and Dalila Cherifi.
3. Facial Soft Biometrics for Person Recognition, Antitza Dantcheva, Christelle Yemdji, Petros Elia and Jean-Luc Dugelay.
4. Modeling, Reconstruction and Tracking 
for Face Recognition, Catherine Herold, Vincent Despiegel, Stéphane Gentric,
Séverine Dubuisson and Isabelle Bloch.
5. 3D Face Recognition, Mohsen Ardabilian, Przemyslaw Szeptycki, Di Huang and Liming Chen.
6. Introduction to Iris Biometrics, Kamel Aloui, Amine Nait-Ali, Régis Fournier and Saber Naceur.
7. Voice Biometrics: Speaker Verification and Identification, Foezur Chowdhury, Sid-Ahmed Selouani
and Douglas O'Shaughnessy.
8. Introduction to Hand Biometrics, Régis Fournier and Amine Nait-Ali.
9. Multibiometrics, Romain Giot, Baptiste Hemery, Estelle Cherrier and
Christophe Rosenberger.
10. Hidden Biometrics, Amine Nait-Ali, Régis Fournier, Kamel Aloui and
Noureddine Belgacem.
11. Performance Evaluation of Biometric Systems, Mohamad El-Abed, Romain Giot, Baptiste Hemery, Julien Mahier
and Christophe Rosenberger.
12. Classification Techniques for Biometrics, Amel Bouchemha, Chérif Nait-Hamoud, Amine Nait-Ali and
Régis Fournier.
13. Data Cryptography, Islam Naveed and William Puech.
14. Visual Data Protection, Islam Naveed and William Puech.
15. Biometrics in Forensics, Guillaume Galou and Christophe Lambert.


Author Notes

Amine Nait-Ali is Professor at University Paris-Est Crteil in France. His research interests focus on biosignal processing, biometrics modeling, pattern recognition and multimodal compression. He has edited and co-edited numerous books and co-authored peer-reviewed papers I the bio-engineering field. Currently, he is in charge of a biometric research group and an international Masters program in biometrics.
Rgis Fournier is Associate Professor at University Paris Est Crteil in France. His research interests concern biosignal processing, modeling, stochastic processes, multimodal compression and biometrics. He has co-authored national and international peer-reviewed papers in the biomedical engineering field. A member of a biometric research group, he is currently involved in scientific relationships with companies for an international Masters program in biometrics


Table of Contents

Amine Naït-Ali and Régis FournierBemadette DorizziAmine Naït-Ali and Dalila CherifiAntitza Dantcheva and Christelle Yemdji and Petros Ella and Jean-Luc DugelayMohsen Ardabilian and Przemyslaw Szeptycki and Di Huang and Liming ChenKamel Aloui and Amine Naït-Ali and Régis Fournier and Saber NaceurRégis Fournier and Amine Naït-AliRomain Giot and Baptiste Hemery and Estelle Cherrier and Christophe RosenbergerAmine Naït-Ali and Régis Fournier and Kamel Aloui and Noureddine BelgacemMohamad El Abed and Romain Giot and Baptiste Hemery and Julien Mahier and Christophe RosenbergerAmel Bouchemha and Cherif Nait-Hamoud and Amine Naït-Ali and Régis FouknierIslam Naveed and William PuechIslam Naveed and William PuechGuillaume Galou and Christophe Lambert
Prefacep. xiii
Chapter 1 Introduction to Biometricsp. 1
1.1 Background: from anthropometry to biometricsp. 1
1.2 Biometrics todayp. 2
1.3 Different modes of use of a biometric system and associated usesp. 3
1.4 Biometrics as a pattern recognition problemp. 4
1.4.1 Capture module: from the sensor to the imagep. 5
1.4.2 From the image to the featuresp. 6
1.4.3 The matchingp. 7
1.5 Evaluation of different modalitiesp. 8
1.6 Qualityp. 9
1.7 Multimodalityp. 10
1.8 Biometrics and preservation of privacyp. 11
1.9 Conclusionp. 12
1.10 Bibliographyp. 12
Chapter 2 Introduction to 2D Face Recognitionp. 15
2.1 Introductionp. 15
2.2 Global face recognition techniquesp. 16
2.2.1 Principal component analysisp. 16
2.2.2 Face recognition using PCAp. 19
2.2.3 Linear discriminant analysisp. 24
2.2.4 Face recognition using LDAp. 24
2.3 Local face recognition techniquesp. 25
2.3.1 Geometric techniquesp. 25
2.3.2 Elastic graph matching techniquesp. 26
2.4 Hybrid face recognition techniquesp. 28
2.5 Some guidancesp. 32
2.6 Some databasesp. 35
2.7 Conclusionp. 35
2.8 Bibliographyp. 36
Chapter 3 Facial Soft Biometrics for Person Recognitionp. 39
3.1 Introduction to soft biometricsp. 39
3.1.1 Domains of applicationp. 40
3.1.2 Related workp. 41
3.2 Soft biometric systems for human identificationp. 42
3.2.1 Spread of the category set $p. 43
3.2.2 Bounding N for a given interference probabilityp. 45
3.2.3 Simulation evaluation of the system in the interference-limited setting of very high sensor resolutionp. 47
3.3 Overall error probability of a soft biometrics systemp. 48
3.3.1 P err of a soft biometric system in a frontal-to-side re-identification scenariop. 50
3.4 Conclusions and future directionsp. 53
3.5 Bibliographyp. 53
Chapter 4 Modeling, Reconstruction and Tracking for Face RecognitionCatherine Herold and Vincent Despiegel and Stephane Gentric and Severine Dubuisson
4.1 Backgroundp. 57
4.1.1 Applications of face recognitionp. 58
4.1.2 On-the-fly authenticationp. 58
4.2 Types of available informationp. 61
4.2.1 Information related to the acquisition systemp. 61
4.2.2 Facial featuresp. 62
4.3 Geometric approaches for the reconstructionp. 63
4.3.1 Stereovision - Multiviewp. 63
4.3.2 Shape from shadingp. 65
4.4 Model-based approaches for reconstructionp. 67
4.4.1 Modeling of the facep. 67
4.4.2 Estimation of the model parametersp. 70
4.5 Hybrid approachesp. 76
4.6 Integration of the time aspectp. 77
4.6.1 Face trackingp. 77
4.6.2 Static approach from video streamsp. 79
4.6.3 Time consolidation from video streamsp. 81
4.7 Conclusionp. 82
4.8 Bibliographyp. 83
Chapter 5 3D Face Recognitionp. 89
5.1 Introductionp. 89
5.2 3D face databasesp. 90
5.2.1 FRGCp. 91
5.2.2 GavabDBp. 91
5.2.3 3DTECp. 92
5.3 3D acquisitionp. 92
5.4 Preprocessing and normalizationp. 94
5.4.1 Sensor noise processingp. 95
5.4.2 Processing of holesp. 96
5.4.3 Localization of anthropometric landmarksp. 96
5.5 3D face recognitionp. 101
5.5.1 3D face recognition based on local features matching: a case studyp. 102
5.6 Asymmetric face recognitionp. 109
5.7 Conclusionp. 110
5.8 Bibliographyp. 111
Chapter 6 Introduction to Iris Biometricsp. 117
6.1 Introductionp. 117
6.2 Iris biometric systemsp. 118
6.3 Iris recognition methods: state-of-the-artp. 119
6.4 Preprocessing of iris imagesp. 122
6.4.1 Extraction of the region of interestp. 122
6.4.2 Construction of the noise maskp. 123
6.4.3 Normalizationp. 124
6.5 Features extraction and encodingp. 125
6.6 Similarity measure between two IrisCodesp. 126
6.7 Iris biometrics: emerging methodsp. 127
6.8 Conclusionp. 128
6.9 Bibliographyp. 128
Chapter 7 Voice Biometrics: Speaker Verification and IdentificationFoezur Chowdhury and Sid-Ahmed Selouani
7.1 Introductionp. 131
7.1.1 Voice biometric techniquesp. 132
7.1.2 Challenge of speaker recognition on mobile devicesp. 133
7.2 Acoustic analysis for robust speaker recognitionp. 134
7.2.1 Mel-frequency analysisp. 135
7.2.2 Wiener filtering for noise reductionp. 137
7.3 Distributed speaker recognition through UBM-GMM modelsp. 138
7.3.1 Bayesian adaptation to target modelsp. 139
7.3.2 Scoring technique for speaker identificationp. 140
7.3.3 Likelihood ratio for speaker verificationp. 140
7.3.4 Normalization of the verification score and Z-normp. 141
7.4 Performance evaluation of DSIDVp. 142
7.4.1 Corpusp. 142
7.4.2 Experimental protocolp. 142
7.4.3 Experimental resultsp. 143
7.5 Conclusionp. 145
7.6 Bibliographyp. 146
Chapter 8 Introduction to Hand Biometricsp. 149
8.1 Introductionp. 149
8.2 Characterization by minutiae extractionp. 151
8.2.1 Histogram equalizationp. 151
8.2.2 Binarizationp. 154
8.2.3 Skeletonization (thinning)p. 156
8.2.4 Detection of minutiaep. 157
8.2.5 Matchingp. 159
8.2.6 Evaluation of performancesp. 160
8.3 A few databasesp. 160
8.3.1 Fingerprint verification competition (FVC 2000, 2002, 2004, 2006)p. 161
8.3.2 CASIA fingerprintp. 162
8.3.3 Wet and wrinkled fingerprintp. 162
8.3.4 The HK Polytechnic University fingervein image database [HKF]p. 162
8.3.5 CASIA palmprint (visible/multispectral)p. 162
8.3.6 Database (THUPALMLAB)p. 163
8.4 Conclusionp. 165
8.5 Bibliographyp. 165
Chapter 9 Multibiometricsp. 167
9.1 Introductionp. 167
9.2 Different principles of multibiometricsp. 169
9.3 Fusion levelsp. 171
9.3.1 Capture fusionp. 171
9.3.2 Feature fusionp. 175
9.3.3 Score fusionp. 177
9.3.4 Fusion of decision and rankp. 184
9.3.5 Evaluationp. 187
9.4 Applications and illustrationsp. 189
9.5 Conclusionp. 191
9.6 Bibliographyp. 192
Chapter 10 Hidden Biometricsp. 195
10.1 Introductionp. 195
10.2 Biometrics using ECGp. 196
10.3 Biometrics using EMG: preliminary experimentsp. 198
10.4 Biometrics using medical imagingp. 200
10.4.1 Biometrics using MRI imagesp. 200
10.4.2 Biometrics with X-ray imagesp. 203
10.5 Conclusionp. 205
10.6 Bibliographyp. 205
Chapter 11 Performance Evaluation of Biometric Systemsp. 207
11.1 Introductionp. 207
11.2 Reminders on biometric systemsp. 208
11.2.1 Biometricsp. 208
11.2.2 Biometric characteristicsp. 209
11.2.3 Biometric modelsp. 209
11.2.4 Enrollment, verification and identificationp. 210
11.2.5 Architecture of a biometric systemp. 211
11.3 Results analysis toolsp. 212
11.3.1 Performance of biometric systemsp. 212
11.3.2 Benchmarksp. 222
11.4 Illustration of the GREYC-Keystroke systemp. 223
11.4.1 Evaluation protocolp. 223
11.4.2 Experimental resultsp. 226
11.5 Conclusionp. 228
11.6 Bibliographyp. 229
Chapter 12 Classification Techniques for Biometricsp. 231
12.1 Introductionp. 231
12.2 Generalization aptitude and performance measuresp. 232
12.3 Parametric approachesp. 234
12.3.1 Naive Bayesian classificationp. 234
12.3.2 Linear discriminant analysisp. 236
12.4 Non-parametric approachesp. 241
12.4.1 KNN classifierp. 241
12.4.2 Classification using artificial neural networksp. 243
12.4.3 Support vector machinep. 250
12.5 Conclusionp. 260
12.6 Bibliographyp. 261
Chapter 13 Data Cryptographyp. 263
13.1 Introductionp. 263
13.2 Cryptographyp. 263
13.2.1 Introduction to modem cryptographyp. 264
13.2.2 Definitionsp. 265
13.2.3 Classification of modern crytographyp. 265
13.2.4 Cryptanalysisp. 275
13.3 Conclusionp. 276
13.4 Bibliographyp. 276
Chapter 14 Visual Data Protectionp. 279
14.1 Introductionp. 279
14.2 Visual data hidingp. 279
14.2.1 Digital watermarkingp. 280
14.2.2 Digital fingerprintingp. 282
14.3 A proposed homomorphism-based visual secret sharing schemep. 284
14.3.1 Image encryption procedure in the proposed schemep. 285
14.3.2 The proposed image sharing schemep. 285
14.3.3 Experimental results and discussionp. 291
14.4 Conclusionp. 294
14.5 Bibliographyp. 294
Chapter 15 Biometrics in Forensicsp. 297
15.1 Introductionp. 297
15.2 Facial comparisonp. 298
15.2.1 Biometrics dedicated to forensic approximationp. 298
15.2.2 The problem of facial comparison for forensic assessmentp. 299
15.3 Voice comparison in forensicsp. 301
15.3.1 Introductionp. 301
15.3.2 Particularities of the voice modality in the field of biometricsp. 302
15.3.3 Voice comparison and forensic assessmentp. 304
15.3.4 Inference of identity in forensicsp. 304
15.3.5 Automatic voice comparisonp. 306
15.3.6 Conclusionp. 311
15.4 Bibliographyp. 311
List of Authorsp. 313
Indexp. 317
Go to:Top of Page