Robust feature modeling for face authentication in smart device

As smart devices become widespread, security has emerged as a crucial problem for users. Biometrics is an effective means of user authentication that has been applied to smart devices. Face authentication has been widely studied in this context because of its short interaction time and quick authentication. In this paper, we propose robust feature modeling for face authentication in smart devices. Our approach uses coefficients of low-rank representation as a measure of similarity between samples. Label regression and reconstructed label information are then used to supervise feature subspace learning. We added three types of noise and interference to three public face datasets to simulate potential problems in face authentication on smart devices. The results of the experiment show that our proposed approach can achieve better authentication performance than conventional methods.

[1]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[2]  Junfeng Yang,et al.  A Fast Algorithm for Edge-Preserving Variational Multichannel Image Restoration , 2009, SIAM J. Imaging Sci..

[3]  Kun Zhou,et al.  Locality Sensitive Discriminant Analysis , 2007, IJCAI.

[4]  D. Reynolds,et al.  Authentication gets personal with biometrics , 2004, IEEE Signal Processing Magazine.

[5]  Diptadeep Addy,et al.  Physical access control based on biometrics and GSM , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[6]  Shuicheng Yan,et al.  Latent Low-Rank Representation for subspace segmentation and feature extraction , 2011, 2011 International Conference on Computer Vision.

[7]  Danilo P. Mandic,et al.  In-Ear EEG Biometrics for Feasible and Readily Collectable Real-World Person Authentication , 2017, IEEE Transactions on Information Forensics and Security.

[8]  Junfeng Yang,et al.  Alternating Direction Algorithms for 1-Problems in Compressive Sensing , 2009, SIAM J. Sci. Comput..

[9]  Yi Ma,et al.  Robust principal component analysis? , 2009, JACM.

[10]  Guanglu Sun,et al.  Collaborative Self-Regression Method With Nonlinear Feature Based on Multi-Task Learning for Image Classification , 2018, IEEE Access.

[11]  G. Sapiro,et al.  A collaborative framework for 3D alignment and classification of heterogeneous subvolumes in cryo-electron tomography. , 2013, Journal of structural biology.

[12]  Stefan Fischer,et al.  Face authentication with Gabor information on deformable graphs , 1999, IEEE Trans. Image Process..

[13]  René Mayrhofer,et al.  Smartphone-Based Gait Recognition: From Authentication to Imitation , 2017, IEEE Transactions on Mobile Computing.

[14]  Johan Stephen Simeon Ballot Face recognition using Hidden Markov Models , 2005 .

[15]  Alex Pentland,et al.  View-based and modular eigenspaces for face recognition , 1994, 1994 Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.

[16]  Trevor J. Hastie,et al.  Sparse Discriminant Analysis , 2011, Technometrics.

[17]  Wotao Yin,et al.  A feasible method for optimization with orthogonality constraints , 2013, Math. Program..

[18]  Guanglu Sun,et al.  Self-supervised sparse coding scheme for image classification based on low rank representation , 2018, PloS one.

[19]  Jiri Matas,et al.  Support vector machines for face authentication , 2002, Image Vis. Comput..

[20]  Richard H. Bartels,et al.  Algorithm 432 [C2]: Solution of the matrix equation AX + XB = C [F4] , 1972, Commun. ACM.

[21]  Angelos Stavrou,et al.  Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users , 2015, RAID.

[22]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[23]  Anil K. Jain,et al.  Biometric Authentication: System Security and User Privacy , 2012, Computer.

[24]  Stephen P. Boyd,et al.  Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..

[25]  Ashwin Ashok,et al.  Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns , 2016, 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[26]  Yi Ma,et al.  The Augmented Lagrange Multiplier Method for Exact Recovery of Corrupted Low-Rank Matrices , 2010, Journal of structural biology.

[27]  Julian Fierrez,et al.  Facial soft biometric features for forensic face recognition. , 2015, Forensic science international.

[28]  Wai Keung Wong,et al.  Approximate Low-Rank Projection Learning for Feature Extraction , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[29]  Chunheng Wang,et al.  Sparse representation for face recognition based on discriminative low-rank dictionary learning , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.

[30]  Sergey Ioffe,et al.  Probabilistic Linear Discriminant Analysis , 2006, ECCV.

[31]  Masashi Sugiyama,et al.  Dimensionality Reduction of Multimodal Labeled Data by Local Fisher Discriminant Analysis , 2007, J. Mach. Learn. Res..

[32]  Zhao Kang,et al.  Kernel-driven similarity learning , 2017, Neurocomputing.

[33]  Debiao He,et al.  Robust Biometrics-Based Authentication Scheme for Multiserver Environment , 2015, IEEE Systems Journal.

[34]  Tsuhan Chen,et al.  A GMM parts based face representation for improved verification through relevance adaptation , 2004, Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004..

[35]  Zhao Kang,et al.  Subspace Clustering Using Log-determinant Rank Approximation , 2015, KDD.