Architectures for efficient face authentication in embedded systems

Biometrics represents a promising approach for reliable and secure user authentication. However, they have not yet been widely adopted in embedded systems, particularly in resource-constrained devices such as cell phones and personal digital assistants (PDAs). In this paper, we investigate the challenges involved in using face-based biometrics for authenticating a user to an embedded system. To enable high authentication accuracy, we consider robust face verifiers based on principal component analysis/linear discriminant analysis (PCA-LDA) algorithms and Bayesian classifiers, and their combined use (multi-modal biometrics). Since embedded systems are severely constrained in their processing capabilities, algorithms that provide sufficient accuracy tend to be computationally expensive, leading to unacceptable authentication times. On the other hand, achieving acceptable performance often comes at the cost of degradation in the quality of results. Our work aims at developing embedded processing architectures that improve face verification speed with minimal hardware requirements and without any compromise in verification accuracy. We analyze the computational characteristics of face verifiers when running on an embedded processor, and systematically identify opportunities for accelerating their execution. We then present a range of targeted hardware and software enhancements that include the use of fixed-point arithmetic, various code optimizations, application-specific custom instructions and co-processors, and parallel processing capabilities in multi-processor systems-on-chip (SoCs). We evaluated the proposed architectures in the context of open-source face verification algorithms running on a commercial embedded processor (Xtensa from Tensilica). Our work shows that fast, in-system verification is possible even in the context of many resource-constrained embedded systems. We also demonstrate that high authentication accuracy can be achieved with minimum hardware overheads, while requiring no modifications to the core face verification algorithms

[1]  Norbert Krüger,et al.  Face recognition by elastic bunch graph matching , 1997, Proceedings of International Conference on Image Processing.

[2]  Alex Pentland,et al.  A Bayesian similarity measure for direct image matching , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[3]  Arun Ross,et al.  Score normalization in multimodal biometric systems , 2005, Pattern Recognit..

[4]  Srivaths Ravi,et al.  Energy estimation for extensible processors , 2003, 2003 Design, Automation and Test in Europe Conference and Exhibition.

[5]  Ira Krepchin,et al.  Texas Instruments Inc. , 1963, Nature.

[6]  Yajie Tian,et al.  Handbook of face recognition , 2003 .

[7]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[8]  D. B. Davis,et al.  Intel Corp. , 1993 .

[9]  Xilin Chen,et al.  A PDA-based face recognition system , 2002, Sixth IEEE Workshop on Applications of Computer Vision, 2002. (WACV 2002). Proceedings..

[10]  Sharath Pankanti,et al.  Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .

[11]  Luc Vandendorpe,et al.  Independent component analysis for face authentication , 2002 .

[12]  Michele Borgatti,et al.  A reconfigurable system featuring dynamically extensible embedded microprocessor, FPGA, and customizable I/O , 2003 .

[13]  Daniel Klein,et al.  Foiling the cracker: A survey of, and improvements to, password security , 1992 .

[14]  Srivaths Ravi,et al.  Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..

[15]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[16]  Azriel Rosenfeld,et al.  Face recognition: A literature survey , 2003, CSUR.

[17]  Alex Park,et al.  MULTI-MODAL FACE AND SPEAKER IDENTIFICATION ON A HANDHELD DEVICE , 2003 .

[18]  Sunil Hattangady,et al.  Reducing the Security Threats to 2.5G and 3G Wireless Applications , 2002 .