USER AUTHENTICATION VIA ADAPTED GENERATIVE MODELS OF FACE IMAGES

It has been previously demonstrated that systems based on local features and relatively complex generative models, namely 1D Hidden Markov Models (HMMs) and pseudo-2D HMMs, are suitable for face recognition. Recently, a simpler generative model, namely the Gaussian Mixture Model (GMM), was also shown to perform well. In most of the previous literature related to these models, the experiments were performed with controlled images (perfect face localization, controlled lighting, background, pose, expression, etc.); however, for most secure authentication applications, the system has to be robust to more challenging conditions. In this article we evaluate the performance, robustness and complexity of GMM and HMM based approaches, using both perfect and automatic face localization, on the relatively difficult BANCA database. We also evaluate different training techniques for both GMM and HMM based systems; we show that the traditionally used Maximum Likelihood (ML) training approach has problems estimating robust model parameters when there is only a few training images available; we propose to tackle this problem through the use of Maximum a Posteriori (MAP) training, where the lack of data problem can be effectively circumvented. We show that models estimated with MAP are significantly more robust and are able to generalize to adverse conditions present in the BANCA database. A positive side-effect of MAP based training is that the number of client specific parameters is less than half of the number required for ML based training. We also propose to extend the GMM approach through the use of local features with embedded positional information (hence increasing performance without sacrificing the low complexity of the approach); we show that the proposed extended GMM approach obtains performance comparable to the 1D HMM approach, while being more robust and considerably less complex. We also show that while the pseudo-2D HMM approach has overall the best performance, it requires relatively long times for training and authentication.

[1]  D. Reynolds,et al.  Authentication gets personal with biometrics , 2004, IEEE Signal Processing Magazine.

[2]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[3]  Joachim M. Buhmann,et al.  Distortion Invariant Object Recognition in the Dynamic Link Architecture , 1993, IEEE Trans. Computers.

[4]  Rama Chellappa,et al.  Human and machine recognition of faces: a survey , 1995, Proc. IEEE.

[5]  Jiri Matas,et al.  Combining evidence in personal identity verification systems , 1997, Pattern Recognit. Lett..

[6]  Kuldip K. Paliwal,et al.  Fast features for face authentication under illumination direction changes , 2003, Pattern Recognit. Lett..

[7]  Chengjun Liu,et al.  A Bayesian Discriminating Features Method for Face Detection , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[8]  Hyeonjoon Moon,et al.  The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[10]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .

[11]  Samy Bengio,et al.  Torch: a modular machine learning software library , 2002 .

[12]  Wendy Atkins A testing time for face recognition technology , 2001 .

[13]  Ioannis Pitas,et al.  Recent advances in biometric person authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[14]  Stefan Fischer,et al.  Face authentication with Gabor information on deformable graphs , 1999, IEEE Trans. Image Process..

[15]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[16]  Jean-Philippe Thiran,et al.  The BANCA Database and Evaluation Protocol , 2003, AVBPA.

[17]  Tai Sing Lee,et al.  Image Representation Using 2D Gabor Wavelets , 1996, IEEE Trans. Pattern Anal. Mach. Intell..

[18]  Samy Bengio,et al.  Augmenting Frontal Face Models for Non-Frontal Verification , 2003 .

[19]  Y. L. Yu,et al.  Face recognition with eigenfaces , 1994, Proceedings of 1994 IEEE International Conference on Industrial Technology - ICIT '94.

[20]  Seong G. Kong,et al.  Recent advances in visual and infrared face recognition - a review , 2005, Comput. Vis. Image Underst..

[21]  Jiri Matas,et al.  XM2VTSDB: The Extended M2VTS Database , 1999 .

[22]  Ferdinando Silvestro Samaria,et al.  Face recognition using Hidden Markov Models , 1995 .

[23]  Samy Bengio,et al.  Evaluation of Biometric Technology on XM2VTS , 2001 .

[24]  Josef Kittler,et al.  A Comparative Study of Automatic Face Verification Algorithms on the BANCA Database , 2003, AVBPA.

[25]  Samy Bengio,et al.  A comparative study of adaptation methods for speaker verification , 2002, INTERSPEECH.

[26]  Douglas A. Reynolds,et al.  Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..

[27]  Jun Zhang,et al.  Pace recognition: eigenface, elastic matching, and neural nets , 1997, Proc. IEEE.

[28]  Samy Bengio,et al.  Statistical transformations of frontal models for non-frontal face verification , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[29]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[30]  Chin-Hui Lee,et al.  Maximum a posteriori estimation for multivariate Gaussian mixture observations of Markov chains , 1994, IEEE Trans. Speech Audio Process..

[31]  James L. Wayman Digital signal processing in biometric identification: a review , 2002, Proceedings. International Conference on Image Processing.

[32]  Kuldip K. Paliwal,et al.  Identity verification using speech and face information , 2004, Digit. Signal Process..

[33]  Monson H. Hayes,et al.  Face Recognition Using An Embedded HMM , 1999 .

[34]  Gerhard Rigoll,et al.  Recognition of JPEG compressed face images based on statistical methods , 2000, Image Vis. Comput..

[35]  Monson H. Hayes,et al.  Maximum likelihood training of the embedded HMM for face detection and recognition , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[36]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[37]  Sébastien Marcel,et al.  Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS , 2003, AVBPA.

[38]  John D. Woodward,et al.  Biometrics: privacy's foe or privacy's friend? , 1997, Proc. IEEE.

[39]  Douglas A. Reynolds,et al.  The NIST speaker recognition evaluation - Overview, methodology, systems, results, perspective , 2000, Speech Commun..

[40]  Alex Pentland,et al.  View-based and modular eigenspaces for face recognition , 1994, 1994 Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.

[41]  M. A. Grudin,et al.  On internal representations in face recognition systems , 2000, Pattern Recognit..