By Topic

Biometric interoperability across training, enrollment, and testing for face authentication

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
El Khiyari, H. ; Dept. of Comput. Sci., George Mason Univ., Fairfax, VA, USA ; Abate, A.F. ; De Marsico, M. ; Wechsler, H.

The paper focuses on “personally identifiable information” (PII) and interoperability. The emphasis is on quantitative performance analysis and validation for uncontrolled operational settings and image quality, and variable demographics and gallery composition. Biometric face authentication involves three distinct operational stages, those of face space learning (“training”), gallery enrollment, and testing (“querying”). The authentication tasks considered here are face identification and verification. Performance evaluation involves k-fold cross-validation using both PCA and LDA for face space representation. Our basic findings indicate that (a) training to learn the face space is less important than the quality of images during enrollment and testing;(b) exclusion of first eigenvectors in defining the face space improves performance particularly for the PCA face space and lesser quality data; (c) the size of the subject gallery affects performance; and (d) it does not make much difference if the face space is derived from biometric data coming from the same dataset source as that used for enrollment and testing. Possible solutions to enhance overall performance and cope with adversarial (impostor) behavior during mass screening include non-inductive learning settings, e.g., transduction and transfer learning, using both labeled and unlabeled examples.

Published in:

Biometric Measurements and Systems for Security and Medical Applications (BIOMS), 2012 IEEE Workshop on

Date of Conference:

14-14 Sept. 2012