Cover image for Biometric authentication : a machine learning approach
Title:
Biometric authentication : a machine learning approach
Personal Author:
Publication Information:
Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, 2005
ISBN:
9780131478244

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004859934 TK7882.P3 K864 2005 Open Access Book Book
Searching...

On Order

Summary

Summary

A breakthrough approach to improving biometrics performance Constructing robust information processing systems for face and voice recognition Supporting high-performance data fusion in multimodal systems Algorithms, implementation techniques, and application examples

Machine learning: driving significant improvements in biometric performance

As they improve, biometric authentication systems are becoming increasingly indispensable for protecting life and property. This book introduces powerful machine learning techniques that significantly improve biometric performance in a broad spectrum of application domains.

Three leading researchers bridge the gap between research, design, and deployment, introducing key algorithms as well as practical implementation techniques. They demonstrate how to construct robust information processing systems for biometric authentication in both face and voice recognition systems, and to support data fusion in multimodal systems.

Coverage includes:

How machine learning approaches differ from conventional template matching Theoretical pillars of machine learning for complex pattern recognition and classification Expectation-maximization (EM) algorithms and support vector machines (SVM) Multi-layer learning models and back-propagation (BP) algorithms Probabilistic decision-based neural networks (PDNNs) for face biometrics Flexible structural frameworks for incorporating machine learning subsystems in biometric applications Hierarchical mixture of experts and inter-class learning strategies based on class-based modular networks Multi-cue data fusion techniques that integrate face and voice recognition Application case studies


Author Notes

Sun-Yuan Kung is a professor of electrical engineering at Princeton University. His research and teaching interests include VLSI signal processing; neural networks; digital signal, image, and video processing; and multimedia information systems. His books include VLSI Array Processors and Digital Neural Networks (Prentice Hall PTR).

Man-Wai Mak is an assistant professor at The Hong Kong Polytechnic University and chairman of the IEEE Hong Kong Section Computer Chapter. His research interests include speaker recognition, machine learning, and neural networks.

Shang-Hung Lin is a senior architect at Nvidia, a leader in video and imaging products.




Excerpts

Excerpts

Biometrics has long been an active research field, particularly because of all the attention focused on public and private security systems in recent years. Advances in digital computers, software technologies, and embedded systems have further catalyzed increased interest in commercially available biometric application systems. Biometric authentication can be regarded as a special technical area in the field of pattern classification. Research and development on biometric authentication have focused on two separate fronts: one covering the theoretical aspect of machine learning for pattern classification and the other covering system design and deployment issues of biometric systems. This book is meant to bridge the gap between these two fronts, with a special emphasis on the promising roles of modern machine learning and neural network techniques. To develop an effective biometric authentication system, it is vital to acquire a thorough understanding of the input feature space , then develop proper mapping of such feature space onto the expert space and eventually onto the output classification space . Unlike the conventional template matching approach, in which learning amounts to storing representative example patterns of a class, the machine learning approach adopts representative statistical models to capture the characteristics of patterns in the feature domain. This book explores the rich synergy between various machine learning models from the perspective of biometric applications. Practically, the machine learning models can be adopted to construct a robust information processing system for biometric authentication and data fusion. It is potentially useful in a broad spectrum of application domains, including but not limited to biometric authentication. The book is organized into four related parts. Part I--Chapters 1 and 2--provides an overview of the state-of-the-art in face and speaker biometrics authentication systems. Part II--Chapters 3, 4, and 5--establishes the theoretical pillars of machine learning methods adopted in the book. To facilitate the development of effective biometric authentication systems, several modern machine learning models are instrumental in handling complex pattern recognition and classification problems. Part II discusses the expectation-maximization (EM) algorithm (Chapter 3); describes the fundamental theory on Fisher's linear discriminant analysis (LDA) and support vector machines (SVM) (Chapter 4); and offers comprehensive coverage of multi-layer learning models, in addition to well-known back-propagation (BP) algorithms (Chapter 5). Part III--Chapters 6 and 7--proposes several flexible structural frameworks based on hierarchical and modular neural networks, under which machine learning modules can be incorporated as subsystems. The discussion introduces several expert-based modular networks such as the so-called hierarchical mixture-of-experts (Chapter 6) as well as interclass learning strategies based on class-based modular networks (Chapter 7). Part IV--Chapters 8, 9, and 10--presents the theoretical foundations behind the learning networks, which can find natural and fruitful applications in biometric authentication systems. The most important authentication application domains are face recognition and speaker verification. Specifically, Chapter 8 presents probabilistic neural networks for face biometrics, while Chapter 9 covers authentication by human voices. Several multicue data-fusion techniques are addressed in Chapter 10. As suggested by the title, the book covers two main themes: (1) biometric authentication and (2) the machine learning approach. The ultimate objective is to demonstrate how machine learning models can be integrated into a unified and intelligent recognition system for biometric authentication. However, the authors must admit the book's coverage is far from being comprehensive enough to do justice to either theme. First, the book does not address many important biometric authentication techniques such as signature, fingerprint, iris pattern, palm, DNA, and so on. The focus is placed strictly on visual recognition of faces and audio verification of speakers. Due to space constraints, the book has likewise overlooked many promising machine learning models. To those numerous contributors who deserve many more credits than are given here, the authors wish to express their most sincere apologies. In closing, Biometric Authentication: A Machine Learning Approach is intended for one-semester graduate school courses in machine learning, neural networks, and biometrics. It is also intended for professional engineers, scientists, and system integrators who want to learn systematic, practical ways of implementing computationally intelligent authentication systems based on the human face and voice. 0131478249P08272004 Excerpted from Biometric Authentication: A Machine Learning Approach by Sun-Yuang Kung, M. W. Mak, S. H. Lin All rights reserved by the original copyright owners. Excerpts are provided for display purposes only and may not be reproduced, reprinted or distributed without the written permission of the publisher.

Table of Contents

Preface
1 Overview
Introduction
Biometric Authentication Methods
Face Recognition: Reality and Challenge
Speaker Recognition: Reality and Challenge
Road Map of the Book
2 Biometric Authentication Systems
Introduction
Design Tradeoffs
Feature Extraction
Adaptive Classifiers
Visual-Based Feature Extraction and Pattern Classification
Audio-Based Feature Extraction and Pattern Classification
Concluding Remarks
3 Expectation-Maximization Theory
Introduction
Traditional Derivation of EM
An Entropy Interpretation
Doubly-Stochastic EM
Concluding Remarks
4 Support Vector Machines
Introduction
Fisher's Linear Discriminant Analysis
Linear SVMs: Separable Case
Linear SVMs: Fuzzy Separation
Nonlinear SVMs
Biometric Authentication Application Examples
5 Multi-Layer Neural Networks
Introduction
Neuron Models
Multi-Layer Neural Networks
The Back-Propagation Algorithms
Two-Stage Training Algorithms
Genetic Algorithm for Multi-Layer Networks
Biometric Authentication Application Examples
6 Modular and Hierarchical Networks
Introduction
Class-Based Modular Networks
Mixture-of-Experts Modular Networks
Hierarchical Machine Learning Models
Biometric Authentication Application Examples
7 Decision-Based Neural Networks
Introduction
Basic Decision-Based Neural Networks
Hierarchical Design of Decision-Based Learning Models
Two-Class Probabilistic DBNNs
Multiclass Probabilistic DBNNs
Biometric Authentication Application Examples
8 Biometric Authentication by Face Recognition
Introduction
Facial Feature Extraction Techniques
Facial Pattern Classification Techniques
Face Detection and Eye Localization
PDBNN Face Recognition System Case Study
Application Examples for Face Recognition Systems
Concluding Remarks
9 Biometric Authentication by Voice Recognition
Introduction
Speaker Recognition
Kernel-Based Probabilistic Speaker Models
Handset and Channel Distortion
Blind Handset-Distortion Compensation
Speaker Verification Based on Articulatory Features
Concluding Remarks
10 Multicue Data Fusion
Introduction
Sensor Fusion for Biometrics
Hierarchical Neural Networks for Sensor Fusion
Multisample Fusion
Audio and Visual Biometric Authentication
Concluding Remarks
Appendix A Convergence Properties of EM
Appendix B Average DET Curves
Appendix C Matlab Projects
Matlab Project 1 GMMs and RBF Networks for Speech Pattern Recognition
Matlab Project 2 SVMs for Pattern Classification
Bibliography
Index