Transactions on Data Hiding and Multimedia Security VIII

Relative Entropy (RE) of individual’s biometric features is the amount of information that distinguishes the individual from a given population. This paper presents an analysis of RE measures for face biometric in relation to accuracy of face-based authentication, and proposes a RE-based partial face recognition scheme that fuses face regions according to their RE-ranks. We establish that different facial feature extraction techniques (FET) result in different RE values, and compare RE values in PCA features with those for a number of wavelet subband features at different levels of decomposition. We demonstrate that for each of the FETs there is a strong positive correlation between RE and authentication accuracy, and that increased image quality results in increased RE and increased authentication accuracy for all FETs. In fact, severe image quality degradation may result in more than 75% drop in RE values. We also present a regional version of these investigations in order to determine the facial regions that have more influence on accuracy and RE values, and propose a partial face recognition that fuses in a cumulative manner horizontal face regions according to their RE-ranks. We argue that the proposed approach is not only useful when parts of facial images are unavailable but also it outperforms the use of the full face images. Our experiments show that the required percentage of facial images for achieving the optimal performance of face recognition varies from just over 1% to 45% of the face image depending on image quality whereas authentication accuracy improves significantly especially for low quality face images.

[1]  Bülent Sankur,et al.  Statistical evaluation of image quality measures , 2002, J. Electronic Imaging.

[2]  Hany Farid,et al.  Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.

[3]  Felix C. Freiling,et al.  Multimedia Forensics Is Not Computer Forensics , 2009, IWCF.

[4]  Siwei Lyu,et al.  How realistic is photorealistic , 2005 .

[5]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.

[6]  Thomas Gloe,et al.  Feature-Based Forensic Camera Model Identification , 2012, Trans. Data Hiding Multim. Secur..

[7]  Jan P. Allebach,et al.  Scanner identification using sensor pattern noise , 2007, Electronic Imaging.

[8]  J. Fridrich,et al.  Digital image forensics , 2009, IEEE Signal Processing Magazine.

[9]  Jan P. Allebach,et al.  Forensic classification of imaging sensor types , 2007, Electronic Imaging.

[10]  Bülent Sankur,et al.  Blind identification of cellular phone cameras , 2007, Electronic Imaging.

[11]  Nasir D. Memon,et al.  Blind source camera identification , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[12]  Min Wu,et al.  Robust scanner identification based on noise features , 2007, Electronic Imaging.

[13]  Hany Farid,et al.  Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.

[14]  Hany Farid Digital Image Ballistics from JPEG Quantization: A Followup Study , 2008 .

[15]  Alex ChiChung Kot,et al.  Accurate Detection of Demosaicing Regularity for Digital Image Forensics , 2009, IEEE Transactions on Information Forensics and Security.

[16]  Bülent Sankur,et al.  Blind Identification of Source Cell-Phone Model , 2008, IEEE Transactions on Information Forensics and Security.

[17]  Thomas Gloe,et al.  Feature-Based Camera Model Identification Works in Practice , 2009, Information Hiding.

[18]  Rainer Böhme,et al.  The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.

[19]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[20]  Josef Kittler,et al.  Floating search methods in feature selection , 1994, Pattern Recognit. Lett..

[21]  Siwei Lyu,et al.  Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.

[22]  Thomas Gloe,et al.  Forensics for flatbed scanners , 2007, Electronic Imaging.

[23]  Jessica J. Fridrich,et al.  Large scale test of sensor fingerprint camera identification , 2009, Electronic Imaging.

[24]  Min Wu,et al.  Nonintrusive component forensics of visual sensors using output images , 2007, IEEE Transactions on Information Forensics and Security.

[25]  Thomas Gloe,et al.  Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics , 2010, Electronic Imaging.