By Topic

Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)

Date 17-18 Oct. 2005

Filter Results

Displaying Results 1 - 25 of 50
  • Proceedings. Fourth IEEE Workshop on Automatic Identification Advanced Technologies

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (345 KB)
    Freely Available from IEEE
  • Fourth IEEE Workshop on Automatic Identification Advanced Technologies - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Fourth IEEE Workshop on Automatic Identification Advanced Technologies - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Fourth IEEE Workshop on Automatic Identification Advanced Technologies [Table of contents]

    Publication Year: 2005, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2005, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (18 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2005, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Statistical models for assessing the individuality of fingerprints

    Publication Year: 2005, Page(s):3 - 9
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    The problem of fingerprint individuality is as follows: Given a sample fingerprint, what is the probability of finding a sufficiently similar fingerprint in a target population? In this paper, we develop a family of finite mixture models to represent the distribution of minutiae locations and directions in fingerprint images, including clustering tendencies and dependencies in different regions of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A taxonomy for physics based synthetic biometric models

    Publication Year: 2005, Page(s):10 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Computer generated "synthetic" biometrics are not widely used within the biometrics community beyond their current use as a research tool. Yet they offer a number of potential advantages that can be developed further to support the science and practical use of biometrics. Physics-based and intermediate-pattern generation of biometrics will require validation of the underlying statistical distribut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The relation between the ROC curve and the CMC

    Publication Year: 2005, Page(s):15 - 20
    Cited by:  Papers (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    The cumulative match curve (CMC) is used as a measure of 1: m identification system performance. It judges the ranking capabilities of an identification system. The receiver operating characteristic curve (ROC curve) of a verification system, on the other hand, expresses the quality of a 1:1 matcher. The ROC plots the false accept rate (FAR) of a 1:1 matcher versus the false reject rate (FRR) of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face recognition with renewable and privacy preserving binary templates

    Publication Year: 2005, Page(s):21 - 26
    Cited by:  Papers (50)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    This paper considers generating binary feature vectors from biometric face data such that their privacy can be protected using recently introduced helper data systems. We explain how the binary feature vectors can be derived and investigate their statistical properties. Experimental results for a subset of the FERET and Caltech databases show that there is only a slight degradation in classificati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability

    Publication Year: 2005, Page(s):27 - 32
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    We propose a method of extracting cryptographic key from dynamic handwritten signatures that does not require storage of the biometric template or any statistical information that could be used to reconstruct the biometric data. Also, the keys produced are not permanently linked to the biometric hence, allowing them to be replaced in the event of key compromise. This is achieved by incorporating r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A technique for simultaneous multiple tag identification

    Publication Year: 2005, Page(s):35 - 38
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    We present for the first time ever, a technique for simultaneously decoding multiple tag responses (i.e., a collision). Additionally the technique provides a considerable degree of robustness and alleviates the problem of missed tags. A theoretical discussion of the underlying principle is done. We provide simulation results when this technique is used specifically for the EPC Gen 2 protocol; the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impedance matching concepts in RFID transponder design

    Publication Year: 2005, Page(s):39 - 42
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    In this paper, we analyze impedance matching concepts in passive radio frequency identification (RFID) transponders, which are powered by the incoming RF energy and consist of an antenna and an integrated circuit chip, both with complex impedances. The impedance match between the chip and the antenna can be characterized by the power transmission coefficient. We analyze the behavior of the power t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Randomized pseudo-random function tree walking algorithm for secure radio-frequency identification

    Publication Year: 2005, Page(s):43 - 48
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Privacy and security are two main concerns in radio frequency identification (RFID) systems. We first extend the analysis of the randomized tree walking algorithm for RFID tag collision avoidance, which is secure against passive adversaries. Then, we devise a new randomized pseudo-random function (PRF) tree walking algorithm, which is secure against active eavesdroppers and allows for the efficien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A sampling based approach to facial feature extraction

    Publication Year: 2005, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Facial feature extraction is considered a key step in many biometric applications. We propose a system that performs facial feature extraction in a given grey-scale face image using Hamiltonian sampling. During training stage of the proposed system, the parameters for a hybrid linear Gaussian model are learnt based on the training data. During the testing stage, when a new image is posed to the sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time face verification system on a cell-phone using advanced correlation filters

    Publication Year: 2005, Page(s):57 - 62
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    We present a real-time face recognition system that we implemented on a cell-phone using computationally efficient minimum average correlation energy filters. We examine the challenges faced in realizing such a practical system that can perform both enrollment and verification in real-time on the cell-phone using its limited memory and computational resources. Due to the speed and memory constrain... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance enhancement of 2D face recognition via mosaicing

    Publication Year: 2005, Page(s):63 - 68
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    We describe a face mosaicing scheme that generates a composite face image during enrollment based on the evidence provided by frontal and semi-profile face images of an individual. Face mosaicing obviates the need to store multiple face templates representing multiple poses of a user's face image. In the proposed scheme, the side profile images are aligned with the frontal image using a terrain tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PCA vs. automatically pruned wavelet-packet PCA for illumination tolerant face recognition

    Publication Year: 2005, Page(s):69 - 74
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Facial recognition/verification R. Chellappa et al., (1995), is a continuing and growing area of research in the field of biometrics. One of the first approaches to this challenge was principal component analysis (PCA) [M. A. Turk et al., (1991), T. Chen et al., (2002)]. Typically PCA is performed in the original spatial domain. However, PCA has a high sensitivity to illumination effects in the or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating liveness by face images and the structure tensor

    Publication Year: 2005, Page(s):75 - 80
    Cited by:  Papers (33)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    A technique evaluating liveness in short face image sequences is presented The intended purpose of the proposed system is to assist in a biometric authentication framework, by adding liveness awareness in a non-intrusive manner. Analyzing the trajectories of single parts of a live face reveal valuable information to discriminate it against a spoofed one. The proposed system uses a lightweight nove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-tag radio frequency identification systems

    Publication Year: 2005, Page(s):83 - 88
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    We propose and analyze the effects of attaching more than one RFID tag to each object. We define different types of multi-tag systems and examine their benefits, both analytically and empirically. We also analyze how multi-tags affect some existing tag singulation algorithms. We show how multi-tags can serve as security enhancers, and propose several new promising applications of multi-tags, such ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vehicle license plate location based on histogramming and mathematical morphology

    Publication Year: 2005, Page(s):89 - 94
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    In a vehicle license plate identification system, plate region detection is the key step before the final recognition. This paper presents a license plate detection algorithm from complex background based on histogramming and mathematical morphology. The proposed algorithm consists of two main modules: license plate region's rough detection and license plate exactly location. The former characteri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speaker recognition using features derived from fractional Fourier transform

    Publication Year: 2005, Page(s):95 - 100
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (90 KB) | HTML iconHTML

    As the generalization of the classical Fourier transform, fractional Fourier transform(FRFT) is introduced into the field of speaker recognition in this paper. The individual feature sets derived from fractional Fourier transform achieve the excellent recognition success rate which goes up to the extent a little higher than the counterparts of the classical MFCC parameters when applied in the GMM ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using volatile state storage for substantial improvement in RFID throughput

    Publication Year: 2005, Page(s):101 - 105
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    One of the major problems facing RFID systems today is that of tags not being read, resulting in reduced tag identification rates. This is more likely to happen as large number of tags is present in a small enclosure. We examine one of the causes for missed tags, namely coupling between adjacent tags. We present a theoretical explanation for the cause of coupling between tags and the mechanism by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fully automated facial symmetry axis detection in frontal color images

    Publication Year: 2005, Page(s):106 - 111
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    We consider the problem of automatically detecting a facial symmetry axis in what we will call a standard human face image (acquired when the subject is looking directly into the camera, in front of a clean gray background under controlled illumination). Images of this kind are encountered in face recognition scenarios; this detection should facilitate more sophisticated facial image processing. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speaker verification with combined threshold, identification front-end, and UBM

    Publication Year: 2005, Page(s):112 - 117
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    This paper presents a novel approach to improve accuracy performance of a speaker verification system through combination or cascading three different verification methods using an identification "front-end", a universal background model, and an individual matching score threshold. The performance of a speaker verification system can be determined in terms of false rejection rate and false accepta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.