A Person Authentication System Based on RFID Tags and a Cascade of Face Recognition Algorithms

Face recognition represents an appealing solution for biometrics-based unobtrusive and flexible person authentication. However, most solutions proposed in the literature suffer from some significant drawbacks, such as high computational complexity, the need for a centralized biometrics database (which is not desirable due to widespread international provisions discouraging collections of sensitive personal data), and limited scalability on a large number of enrolled subjects. We propose a novel person authentication solution based on a cascade of face recognition and pattern matching algorithms that not only provides high reliability and robustness against impostors but also stores in a personal radio frequency identification (RFID) tag all the needed individual biometrics information of the user, who therefore always remains in control, and has the exclusive availability, of such sensitive data. This paper describes the proposed approach, called RFaceID, and discusses its performance in terms of the ratio between false acceptance rate and false rejection rate and in terms of authentication time when applied to the VidTIMIT, Extended Yale B, and Mobile Biometry (MOBIO) widely adopted face databases.

[1]  Josef Kittler,et al.  A comparison of photometric normalisation algorithms for face verification , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..

[2]  S. P. Lloyd,et al.  Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.

[3]  Daniel S. Yeung,et al.  RFID access authorization by face recognition , 2009, 2009 International Conference on Machine Learning and Cybernetics.

[4]  Rolf P. Würtz,et al.  Face Recognition with Disparity Corrected Gabor Phase Differences , 2012, ICANN.

[5]  Rama Chellappa,et al.  Principal components null space analysis for image and video classification , 2006, IEEE Transactions on Image Processing.

[6]  Josef Kittler,et al.  A Unified Framework for Biometric Expert Fusion Incorporating Quality Measures , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[7]  David J. Kriegman,et al.  Acquiring linear subspaces for face recognition under variable lighting , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[8]  V. Kshirsagar,et al.  Face recognition using Eigenfaces , 2011, 2011 3rd International Conference on Computer Research and Development.

[9]  Xiaohua Xie Illumination preprocessing for face images based on empirical mode decomposition , 2014, Signal Process..

[10]  Fabio Roli,et al.  Personal identity verification by serial fusion of fingerprint and face matchers , 2009, Pattern Recognit..

[11]  Craig I. Watson,et al.  Studies of biometric fusion , 2006 .

[12]  Takeo Kanade,et al.  Recognizing Action Units for Facial Expression Analysis , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[13]  Wen Gao,et al.  A comparative study on illumination preprocessing in face recognition , 2013, Pattern Recognit..

[14]  Moncef Gabbouj,et al.  The 2013 face recognition evaluation in mobile environment , 2013, 2013 International Conference on Biometrics (ICB).

[15]  Brian C. Lovell,et al.  Video face matching using subset selection and clustering of probabilistic Multi-Region Histograms , 2010, 2010 25th International Conference of Image and Vision Computing New Zealand.

[16]  Adnan Aff,et al.  RFID and Face Recognition Based Security and Access Control System , 2013 .

[17]  Qinghan Xiao,et al.  Robust face detection from still images , 2014, 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM).

[18]  Elgar Fleisch,et al.  Serialized TID numbers - A headache or a blessing for RFID crackers? , 2009, 2009 IEEE International Conference on RFID.

[19]  Avinash C. Kak,et al.  PCA versus LDA , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[20]  Zhan-Wei Song,et al.  RFID-Based Security Authentication System Based on a Novel Face-Recognition Structure , 2010, 2010 WASE International Conference on Information Engineering.

[21]  Matthijs C. Dorst Distinctive Image Features from Scale-Invariant Keypoints , 2011 .

[22]  Sébastien Marcel,et al.  The 2013 speaker recognition evaluation in mobile environment , 2013, 2013 International Conference on Biometrics (ICB).

[23]  Alejandro F. Frangi,et al.  Two-dimensional PCA: a new approach to appearance-based face representation and recognition , 2004 .

[24]  Gwo-Jia Jong,et al.  Multi-recognition Combined Security System for Intelligent Car Electronics , 2012 .

[25]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[26]  S. Ranjitha Kumari,et al.  A Survey on Performance Analysis of DES , AES and RSA Algorithm along with LSB Substitution Technique , 2013 .

[27]  Massimo Tistarelli,et al.  Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation , 2007, ICB.

[28]  Herman Martins Gomes,et al.  An Improved Face Verification Approach Based on Speedup Robust Features and Pairwise Matching , 2013, 2013 XXVI Conference on Graphics, Patterns and Images.

[29]  Xudong Jiang,et al.  Eigenfeature Regularization and Extraction in Face Recognition , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[30]  Paul A. Viola,et al.  Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[31]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[32]  Meng Joo Er,et al.  Illumination compensation and normalization for robust face recognition using discrete cosine transform in logarithm domain , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[33]  Xiaoyang Tan,et al.  Enhanced Local Texture Feature Sets for Face Recognition Under Difficult Lighting Conditions , 2007, IEEE Transactions on Image Processing.

[34]  Conrad Sanderson,et al.  The VidTIMIT Database , 2002 .

[35]  Ming Li,et al.  2D-LDA: A statistical linear discriminant analysis for image matrix , 2005, Pattern Recognit. Lett..

[36]  Alex Pentland,et al.  Face recognition using eigenfaces , 1991, Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[37]  Simon Dobrisek,et al.  Exploiting representation plurality for robust and efficie nt face recognition , 2013 .

[38]  Ashish Goel,et al.  DESIGN AND ANALYSIS OF COMPOSITE LEAF SPRING FOR LIGHT VEHICLES , 2013 .

[39]  Thomas B. Moeslund,et al.  Extracting a Good Quality Frontal Face Image From a Low-Resolution Video Sequence , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[40]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[41]  Jian-Huang Lai,et al.  Normalization of Face Illumination Based on Large-and Small-Scale Features , 2011, IEEE Transactions on Image Processing.

[42]  Jae-Woo Kim,et al.  The Entrance Authentication System in Real-Time Using Face Extraction and the RFID Tag , 2011, 2011 International Conference on Ubiquitous Computing and Multimedia Applications.

[43]  Himani Agrawal Matlab implementation, analysis & comparison of some RSA family cryptosystems , 2010, 2010 IEEE International Conference on Computational Intelligence and Computing Research.

[44]  Tien Dzung Nguyen,et al.  An efficient and reliable human resource management system based on a hybrid of face authentication and RFID technology , 2012, 2012 Fourth International Conference on Communications and Electronics (ICCE).

[45]  Matti Pietikäinen,et al.  Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data , 2012, 2012 IEEE International Conference on Multimedia and Expo Workshops.

[46]  Peter A. Flach The Geometry of ROC Space: Understanding Machine Learning Metrics through ROC Isometrics , 2003, ICML.

[47]  Xudong Jiang,et al.  Interest point detection using rank order LoG filter , 2013, Pattern Recognit..

[48]  Dae-Hee Seo,et al.  Improved Authentication Scheme Using Facial Recognition Scheme Based on RFID Tag , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[49]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..