We discuss the effect of an optimisation strategy to be applied to image data in a smart card based face verification system. Accordingly, we propose a system architecture considering the trade-off between performance versus the improvement of memory and bandwidth management. In order to establish the system limitations, studies were performed on the XM2VTS and FERET databases demonstrating that, spatial and grey level resolution as well as JPEG compression settings for face representation can be optimised from the point of view of verification error. We show that the use of a fixed precision data type does not affect system performance very much but can speed up the verification process. Since the optimisation framework of such a system is very complicated, the search space was simplified by applying some heuristics to the problem. In the adopted suboptimal search strategy one parameter is optimised at a time. The optimisation of one stage in the sequence was carried out for the parameters of the subsequent stages. Different results were achieved on different databases, indicating that the selection of different optimum parameters for system evaluation may call for different optimum operating points.
[1]
Touradj Ebrahimi,et al.
A study of JPEG 2000 still image coding versus other standards
,
2000,
2000 10th European Signal Processing Conference.
[2]
Jiri Matas,et al.
XM2VTSDB: The Extended M2VTS Database
,
1999
.
[3]
M. Turk,et al.
Eigenfaces for Recognition
,
1991,
Journal of Cognitive Neuroscience.
[4]
Azriel Rosenfeld,et al.
Face recognition: A literature survey
,
2003,
CSUR.
[5]
Josef Kittler,et al.
Face verification system architecture using smart cards
,
2004,
ICPR 2004.
[6]
Josef Kittler,et al.
JPEG Compression Effects on a Smart Card Face Verification System
,
2005,
MVA.
[7]
Hyeonjoon Moon,et al.
The FERET Evaluation Methodology for Face-Recognition Algorithms
,
2000,
IEEE Trans. Pattern Anal. Mach. Intell..
[8]
Juergen Luettin,et al.
Evaluation Protocol for the extended M2VTS Database (XM2VTSDB)
,
1998
.
[9]
Josef Kittler,et al.
Performance versus Computational Complexity Trade-Off in Face Verification
,
2004,
ICBA.
[10]
Alfred C. Weaver,et al.
Biometric authentication
,
2006,
Computer.