Principles and Methods for Face Recognition and Face Modelling

This chapter focuses on the principles behind methods currently used for face recognition, which have a wide variety of uses from biometrics, surveillance and forensics. After a brief description of how faces can be detected in images, we describe 2D feature extraction methods that operate on all the image pixels in the face detected region: Eigenfaces and Fisherfaces first proposed in the early 1990s. Although Eigenfaces can be made to work reasonably well for faces captured in controlled conditions, such as frontal faces under the same illumination, recognition rates are poor. We discuss how greater accuracy can be achieved by extracting features from the boundaries of the faces by using Active Shape Models and, the skin textures, using Active Appearance Models, originally proposed by Cootes and Talyor. The remainder of the chapter on face recognition is dedicated such shape models, their implementation and use and their extension to 3D. We show that if multiple cameras are used the the 3D geometry of the captured faces can be recovered without the use of range scanning or structured light. 3D face models make recognition systems better at dealiing with pose and lighting variation

[1]  Harry Wechsler,et al.  The FERET database and evaluation procedure for face-recognition algorithms , 1998, Image Vis. Comput..

[2]  Peter H. N. de With,et al.  Real-time facial feature extraction using statistical shape model and Haar-wavelet based feature search , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[3]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[4]  Shambhu Upadhyaya,et al.  A Multistage Framework to Defend Against Phishing Attacks , 2012 .

[5]  Andreas Mitrakas,et al.  Law, CyberCrime and Digital Forensics: Trailing Digital Suspects , 2006 .

[6]  Stan Z. Li,et al.  Manifold Learning and Applications in Recognition , 2005 .

[7]  Ming-Hsuan Yang Extended Isomap for classification , 2002, Object recognition supported by user interaction for service robots.

[8]  Umar Mohammed,et al.  Latent Identity Variables: Biometric Matching Without Explicit Identity Estimation , 2007, ICB.

[9]  Paul A. Viola,et al.  Robust Real-time Object Detection , 2001 .

[10]  J. Bagby Balancing the Public Policy Drivers in the Tension between Privacy and Security , 2009 .

[11]  Abhir Bhalerao,et al.  Minimum Entropy Light and Shading Approximation , 2006, BMVC.

[12]  Alice J. O'Toole,et al.  FRVT 2006 and ICE 2006 large-scale results , 2007 .

[13]  Chang-Tsun Li Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions , 2010, Handbook of Research on Computational Forensics, Digital Crime, and Investigation.

[14]  Tejaswini C. Herath Internet Crime: How Vulnerable Are You? Do Gender, Social Influence and Education play a Role in Vulnerability? , 2009 .

[15]  P. Kittipanya-ngam,et al.  The effect of texture representations on AAM performance , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[16]  Paul A. Viola,et al.  Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.

[17]  Mikkel B. Stegmann,et al.  The IMM Face Database, An Annotated Dataset of 240 Face Images , 2004 .

[18]  Andy Harter,et al.  Parameterisation of a stochastic model for human face identification , 1994, Proceedings of 1994 IEEE Workshop on Applications of Computer Vision.

[19]  Sharath Pankanti,et al.  Biometrics: a grand challenge , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[20]  L Sirovich,et al.  Low-dimensional procedure for the characterization of human faces. , 1987, Journal of the Optical Society of America. A, Optics and image science.

[21]  R. Fisher THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .

[22]  Shimon Ullman,et al.  Face Recognition: The Problem of Compensating for Changes in Illumination Direction , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[23]  David J. Kriegman,et al.  From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[24]  Hyeonjoon Moon,et al.  The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[25]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[26]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[27]  Klaus J. Kirchberg,et al.  Robust Face Detection Using the Hausdorff Distance , 2001, AVBPA.

[28]  Aleix M. Martinez,et al.  The AR face database , 1998 .

[29]  Panagiotis Kanellis,et al.  Digital Crime And Forensic Science in Cyberspace (N/A) , 2006 .

[30]  Ralph Gross,et al.  Eigen light-fields and face recognition across pose , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.

[31]  M. Veloso,et al.  Latent Variable Models , 2019, Statistical and Econometric Methods for Transportation Data Analysis.

[32]  Rainer Lienhart,et al.  An extended set of Haar-like features for rapid object detection , 2002, Proceedings. International Conference on Image Processing.

[33]  K. Ricanek,et al.  Aspects of Age Variation in Facial Morphology Affecting Biometrics , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.