Face authentication using graph-based low-rank representation of facial local structures for mobile vision applications
Mobile vision systems involve more challenges than ordinary vision systems. In this paper, we propose a novel face authentication approach that considers the difficulties, which exist in mobile vision systems, e.g. lower resolution and quality acquisition, lower storage capabilities, lower computati...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 47 |
---|---|
container_issue | |
container_start_page | 40 |
container_title | |
container_volume | |
creator | Abdel-Hakim, Alaa E. El-Saban, M. |
description | Mobile vision systems involve more challenges than ordinary vision systems. In this paper, we propose a novel face authentication approach that considers the difficulties, which exist in mobile vision systems, e.g. lower resolution and quality acquisition, lower storage capabilities, lower computation power, and poor imaging conditions. The proposed authentication approach uses specific fiducial components for authentication purposes. A facial graph model, which involves both of appearance and geometric facial information, is built for face representation. The graph of an image in the gallery set is composed of the low rank matrices of those components as nodes and the mean Euclidean distances between these components as edges. The probe image is represented in a similar way, except that the nodes are represented by the intensity vectors of the components. A weighted matching procedure is performed between the probe and the gallery graphs to make an authentication decision. The proposed system was evaluated using a locally-designed challenging dataset, which is acquired using a cell phone camera. The quality of the captured images of the evaluation dataset is intentionally very low, in order to mimic severe imaging conditions, which a mobile authentication system may encounter. For comparison purposes and as a benchmark test, we evaluate the proposed approach using the FRGC 2.0 dataset. The evaluation results show the potential of the proposed approach in making correct authentication decisions, given very low quality-images. The effectiveness of the proposed approach, in terms of accuracy and memory requirements, versus relevant approaches is demonstrated. |
doi_str_mv | 10.1109/ICCVW.2011.6130220 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6130220</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6130220</ieee_id><sourcerecordid>6130220</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-52b310fb738b5939a6c6a910b22b4a8794e66370ecc60d58d5255bb5df18af8b3</originalsourceid><addsrcrecordid>eNpF0FFLwzAQB_CICOrcF9CXfIHOS9KkzaMUp4OBL0MfxyVNtmjXlqR1-O2tbOA93PGHH3dwhNwzWDAG-nFVVe8fCw6MLRQTwDlckFuWq0IAKKYu_wPPr8k8pU-YSqlSK7ghxyVaR3Ec9q4dgsUhdC0dU2h3dBex32cGk6tp0x2ziO0Xja6PLk32JDtPPdqAzSTs1NMQRzuME6G-i_TQmdA4-h3SH8a-b84n0h258tgkNz_PGdksnzfVa7Z-e1lVT-ssaBgyyY1g4E0hSiO10KisQs3AcG5yLAudO6VEAc5aBbUsa8mlNEbWnpXoSyNm5OG0Njjntn0MB4w_2_OfxC-n9l8P</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Face authentication using graph-based low-rank representation of facial local structures for mobile vision applications</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Abdel-Hakim, Alaa E. ; El-Saban, M.</creator><creatorcontrib>Abdel-Hakim, Alaa E. ; El-Saban, M.</creatorcontrib><description>Mobile vision systems involve more challenges than ordinary vision systems. In this paper, we propose a novel face authentication approach that considers the difficulties, which exist in mobile vision systems, e.g. lower resolution and quality acquisition, lower storage capabilities, lower computation power, and poor imaging conditions. The proposed authentication approach uses specific fiducial components for authentication purposes. A facial graph model, which involves both of appearance and geometric facial information, is built for face representation. The graph of an image in the gallery set is composed of the low rank matrices of those components as nodes and the mean Euclidean distances between these components as edges. The probe image is represented in a similar way, except that the nodes are represented by the intensity vectors of the components. A weighted matching procedure is performed between the probe and the gallery graphs to make an authentication decision. The proposed system was evaluated using a locally-designed challenging dataset, which is acquired using a cell phone camera. The quality of the captured images of the evaluation dataset is intentionally very low, in order to mimic severe imaging conditions, which a mobile authentication system may encounter. For comparison purposes and as a benchmark test, we evaluate the proposed approach using the FRGC 2.0 dataset. The evaluation results show the potential of the proposed approach in making correct authentication decisions, given very low quality-images. The effectiveness of the proposed approach, in terms of accuracy and memory requirements, versus relevant approaches is demonstrated.</description><identifier>ISBN: 1467300624</identifier><identifier>ISBN: 9781467300629</identifier><identifier>EISBN: 1467300616</identifier><identifier>EISBN: 9781467300612</identifier><identifier>EISBN: 1467300632</identifier><identifier>EISBN: 9781467300636</identifier><identifier>DOI: 10.1109/ICCVW.2011.6130220</identifier><language>eng</language><publisher>IEEE</publisher><ispartof>2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops), 2011, p.40-47</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6130220$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6130220$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Abdel-Hakim, Alaa E.</creatorcontrib><creatorcontrib>El-Saban, M.</creatorcontrib><title>Face authentication using graph-based low-rank representation of facial local structures for mobile vision applications</title><title>2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)</title><addtitle>ICCVW</addtitle><description>Mobile vision systems involve more challenges than ordinary vision systems. In this paper, we propose a novel face authentication approach that considers the difficulties, which exist in mobile vision systems, e.g. lower resolution and quality acquisition, lower storage capabilities, lower computation power, and poor imaging conditions. The proposed authentication approach uses specific fiducial components for authentication purposes. A facial graph model, which involves both of appearance and geometric facial information, is built for face representation. The graph of an image in the gallery set is composed of the low rank matrices of those components as nodes and the mean Euclidean distances between these components as edges. The probe image is represented in a similar way, except that the nodes are represented by the intensity vectors of the components. A weighted matching procedure is performed between the probe and the gallery graphs to make an authentication decision. The proposed system was evaluated using a locally-designed challenging dataset, which is acquired using a cell phone camera. The quality of the captured images of the evaluation dataset is intentionally very low, in order to mimic severe imaging conditions, which a mobile authentication system may encounter. For comparison purposes and as a benchmark test, we evaluate the proposed approach using the FRGC 2.0 dataset. The evaluation results show the potential of the proposed approach in making correct authentication decisions, given very low quality-images. The effectiveness of the proposed approach, in terms of accuracy and memory requirements, versus relevant approaches is demonstrated.</description><isbn>1467300624</isbn><isbn>9781467300629</isbn><isbn>1467300616</isbn><isbn>9781467300612</isbn><isbn>1467300632</isbn><isbn>9781467300636</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpF0FFLwzAQB_CICOrcF9CXfIHOS9KkzaMUp4OBL0MfxyVNtmjXlqR1-O2tbOA93PGHH3dwhNwzWDAG-nFVVe8fCw6MLRQTwDlckFuWq0IAKKYu_wPPr8k8pU-YSqlSK7ghxyVaR3Ec9q4dgsUhdC0dU2h3dBex32cGk6tp0x2ziO0Xja6PLk32JDtPPdqAzSTs1NMQRzuME6G-i_TQmdA4-h3SH8a-b84n0h258tgkNz_PGdksnzfVa7Z-e1lVT-ssaBgyyY1g4E0hSiO10KisQs3AcG5yLAudO6VEAc5aBbUsa8mlNEbWnpXoSyNm5OG0Njjntn0MB4w_2_OfxC-n9l8P</recordid><startdate>201111</startdate><enddate>201111</enddate><creator>Abdel-Hakim, Alaa E.</creator><creator>El-Saban, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201111</creationdate><title>Face authentication using graph-based low-rank representation of facial local structures for mobile vision applications</title><author>Abdel-Hakim, Alaa E. ; El-Saban, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-52b310fb738b5939a6c6a910b22b4a8794e66370ecc60d58d5255bb5df18af8b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Abdel-Hakim, Alaa E.</creatorcontrib><creatorcontrib>El-Saban, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Abdel-Hakim, Alaa E.</au><au>El-Saban, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Face authentication using graph-based low-rank representation of facial local structures for mobile vision applications</atitle><btitle>2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)</btitle><stitle>ICCVW</stitle><date>2011-11</date><risdate>2011</risdate><spage>40</spage><epage>47</epage><pages>40-47</pages><isbn>1467300624</isbn><isbn>9781467300629</isbn><eisbn>1467300616</eisbn><eisbn>9781467300612</eisbn><eisbn>1467300632</eisbn><eisbn>9781467300636</eisbn><abstract>Mobile vision systems involve more challenges than ordinary vision systems. In this paper, we propose a novel face authentication approach that considers the difficulties, which exist in mobile vision systems, e.g. lower resolution and quality acquisition, lower storage capabilities, lower computation power, and poor imaging conditions. The proposed authentication approach uses specific fiducial components for authentication purposes. A facial graph model, which involves both of appearance and geometric facial information, is built for face representation. The graph of an image in the gallery set is composed of the low rank matrices of those components as nodes and the mean Euclidean distances between these components as edges. The probe image is represented in a similar way, except that the nodes are represented by the intensity vectors of the components. A weighted matching procedure is performed between the probe and the gallery graphs to make an authentication decision. The proposed system was evaluated using a locally-designed challenging dataset, which is acquired using a cell phone camera. The quality of the captured images of the evaluation dataset is intentionally very low, in order to mimic severe imaging conditions, which a mobile authentication system may encounter. For comparison purposes and as a benchmark test, we evaluate the proposed approach using the FRGC 2.0 dataset. The evaluation results show the potential of the proposed approach in making correct authentication decisions, given very low quality-images. The effectiveness of the proposed approach, in terms of accuracy and memory requirements, versus relevant approaches is demonstrated.</abstract><pub>IEEE</pub><doi>10.1109/ICCVW.2011.6130220</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1467300624 |
ispartof | 2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops), 2011, p.40-47 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6130220 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
title | Face authentication using graph-based low-rank representation of facial local structures for mobile vision applications |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T01%3A22%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Face%20authentication%20using%20graph-based%20low-rank%20representation%20of%20facial%20local%20structures%20for%20mobile%20vision%20applications&rft.btitle=2011%20IEEE%20International%20Conference%20on%20Computer%20Vision%20Workshops%20(ICCV%20Workshops)&rft.au=Abdel-Hakim,%20Alaa%20E.&rft.date=2011-11&rft.spage=40&rft.epage=47&rft.pages=40-47&rft.isbn=1467300624&rft.isbn_list=9781467300629&rft_id=info:doi/10.1109/ICCVW.2011.6130220&rft_dat=%3Cieee_6IE%3E6130220%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1467300616&rft.eisbn_list=9781467300612&rft.eisbn_list=1467300632&rft.eisbn_list=9781467300636&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6130220&rfr_iscdi=true |