Face authentication using graph-based low-rank representation of facial local structures for mobile vision applications

Mobile vision systems involve more challenges than ordinary vision systems. In this paper, we propose a novel face authentication approach that considers the difficulties, which exist in mobile vision systems, e.g. lower resolution and quality acquisition, lower storage capabilities, lower computati...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Abdel-Hakim, Alaa E., El-Saban, M.
Format: Tagungsbericht
Sprache:eng
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 47
container_issue
container_start_page 40
container_title
container_volume
creator Abdel-Hakim, Alaa E.
El-Saban, M.
description Mobile vision systems involve more challenges than ordinary vision systems. In this paper, we propose a novel face authentication approach that considers the difficulties, which exist in mobile vision systems, e.g. lower resolution and quality acquisition, lower storage capabilities, lower computation power, and poor imaging conditions. The proposed authentication approach uses specific fiducial components for authentication purposes. A facial graph model, which involves both of appearance and geometric facial information, is built for face representation. The graph of an image in the gallery set is composed of the low rank matrices of those components as nodes and the mean Euclidean distances between these components as edges. The probe image is represented in a similar way, except that the nodes are represented by the intensity vectors of the components. A weighted matching procedure is performed between the probe and the gallery graphs to make an authentication decision. The proposed system was evaluated using a locally-designed challenging dataset, which is acquired using a cell phone camera. The quality of the captured images of the evaluation dataset is intentionally very low, in order to mimic severe imaging conditions, which a mobile authentication system may encounter. For comparison purposes and as a benchmark test, we evaluate the proposed approach using the FRGC 2.0 dataset. The evaluation results show the potential of the proposed approach in making correct authentication decisions, given very low quality-images. The effectiveness of the proposed approach, in terms of accuracy and memory requirements, versus relevant approaches is demonstrated.
doi_str_mv 10.1109/ICCVW.2011.6130220
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6130220</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6130220</ieee_id><sourcerecordid>6130220</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-52b310fb738b5939a6c6a910b22b4a8794e66370ecc60d58d5255bb5df18af8b3</originalsourceid><addsrcrecordid>eNpF0FFLwzAQB_CICOrcF9CXfIHOS9KkzaMUp4OBL0MfxyVNtmjXlqR1-O2tbOA93PGHH3dwhNwzWDAG-nFVVe8fCw6MLRQTwDlckFuWq0IAKKYu_wPPr8k8pU-YSqlSK7ghxyVaR3Ec9q4dgsUhdC0dU2h3dBex32cGk6tp0x2ziO0Xja6PLk32JDtPPdqAzSTs1NMQRzuME6G-i_TQmdA4-h3SH8a-b84n0h258tgkNz_PGdksnzfVa7Z-e1lVT-ssaBgyyY1g4E0hSiO10KisQs3AcG5yLAudO6VEAc5aBbUsa8mlNEbWnpXoSyNm5OG0Njjntn0MB4w_2_OfxC-n9l8P</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Face authentication using graph-based low-rank representation of facial local structures for mobile vision applications</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Abdel-Hakim, Alaa E. ; El-Saban, M.</creator><creatorcontrib>Abdel-Hakim, Alaa E. ; El-Saban, M.</creatorcontrib><description>Mobile vision systems involve more challenges than ordinary vision systems. In this paper, we propose a novel face authentication approach that considers the difficulties, which exist in mobile vision systems, e.g. lower resolution and quality acquisition, lower storage capabilities, lower computation power, and poor imaging conditions. The proposed authentication approach uses specific fiducial components for authentication purposes. A facial graph model, which involves both of appearance and geometric facial information, is built for face representation. The graph of an image in the gallery set is composed of the low rank matrices of those components as nodes and the mean Euclidean distances between these components as edges. The probe image is represented in a similar way, except that the nodes are represented by the intensity vectors of the components. A weighted matching procedure is performed between the probe and the gallery graphs to make an authentication decision. The proposed system was evaluated using a locally-designed challenging dataset, which is acquired using a cell phone camera. The quality of the captured images of the evaluation dataset is intentionally very low, in order to mimic severe imaging conditions, which a mobile authentication system may encounter. For comparison purposes and as a benchmark test, we evaluate the proposed approach using the FRGC 2.0 dataset. The evaluation results show the potential of the proposed approach in making correct authentication decisions, given very low quality-images. The effectiveness of the proposed approach, in terms of accuracy and memory requirements, versus relevant approaches is demonstrated.</description><identifier>ISBN: 1467300624</identifier><identifier>ISBN: 9781467300629</identifier><identifier>EISBN: 1467300616</identifier><identifier>EISBN: 9781467300612</identifier><identifier>EISBN: 1467300632</identifier><identifier>EISBN: 9781467300636</identifier><identifier>DOI: 10.1109/ICCVW.2011.6130220</identifier><language>eng</language><publisher>IEEE</publisher><ispartof>2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops), 2011, p.40-47</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6130220$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6130220$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Abdel-Hakim, Alaa E.</creatorcontrib><creatorcontrib>El-Saban, M.</creatorcontrib><title>Face authentication using graph-based low-rank representation of facial local structures for mobile vision applications</title><title>2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)</title><addtitle>ICCVW</addtitle><description>Mobile vision systems involve more challenges than ordinary vision systems. In this paper, we propose a novel face authentication approach that considers the difficulties, which exist in mobile vision systems, e.g. lower resolution and quality acquisition, lower storage capabilities, lower computation power, and poor imaging conditions. The proposed authentication approach uses specific fiducial components for authentication purposes. A facial graph model, which involves both of appearance and geometric facial information, is built for face representation. The graph of an image in the gallery set is composed of the low rank matrices of those components as nodes and the mean Euclidean distances between these components as edges. The probe image is represented in a similar way, except that the nodes are represented by the intensity vectors of the components. A weighted matching procedure is performed between the probe and the gallery graphs to make an authentication decision. The proposed system was evaluated using a locally-designed challenging dataset, which is acquired using a cell phone camera. The quality of the captured images of the evaluation dataset is intentionally very low, in order to mimic severe imaging conditions, which a mobile authentication system may encounter. For comparison purposes and as a benchmark test, we evaluate the proposed approach using the FRGC 2.0 dataset. The evaluation results show the potential of the proposed approach in making correct authentication decisions, given very low quality-images. The effectiveness of the proposed approach, in terms of accuracy and memory requirements, versus relevant approaches is demonstrated.</description><isbn>1467300624</isbn><isbn>9781467300629</isbn><isbn>1467300616</isbn><isbn>9781467300612</isbn><isbn>1467300632</isbn><isbn>9781467300636</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpF0FFLwzAQB_CICOrcF9CXfIHOS9KkzaMUp4OBL0MfxyVNtmjXlqR1-O2tbOA93PGHH3dwhNwzWDAG-nFVVe8fCw6MLRQTwDlckFuWq0IAKKYu_wPPr8k8pU-YSqlSK7ghxyVaR3Ec9q4dgsUhdC0dU2h3dBex32cGk6tp0x2ziO0Xja6PLk32JDtPPdqAzSTs1NMQRzuME6G-i_TQmdA4-h3SH8a-b84n0h258tgkNz_PGdksnzfVa7Z-e1lVT-ssaBgyyY1g4E0hSiO10KisQs3AcG5yLAudO6VEAc5aBbUsa8mlNEbWnpXoSyNm5OG0Njjntn0MB4w_2_OfxC-n9l8P</recordid><startdate>201111</startdate><enddate>201111</enddate><creator>Abdel-Hakim, Alaa E.</creator><creator>El-Saban, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201111</creationdate><title>Face authentication using graph-based low-rank representation of facial local structures for mobile vision applications</title><author>Abdel-Hakim, Alaa E. ; El-Saban, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-52b310fb738b5939a6c6a910b22b4a8794e66370ecc60d58d5255bb5df18af8b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Abdel-Hakim, Alaa E.</creatorcontrib><creatorcontrib>El-Saban, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Abdel-Hakim, Alaa E.</au><au>El-Saban, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Face authentication using graph-based low-rank representation of facial local structures for mobile vision applications</atitle><btitle>2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)</btitle><stitle>ICCVW</stitle><date>2011-11</date><risdate>2011</risdate><spage>40</spage><epage>47</epage><pages>40-47</pages><isbn>1467300624</isbn><isbn>9781467300629</isbn><eisbn>1467300616</eisbn><eisbn>9781467300612</eisbn><eisbn>1467300632</eisbn><eisbn>9781467300636</eisbn><abstract>Mobile vision systems involve more challenges than ordinary vision systems. In this paper, we propose a novel face authentication approach that considers the difficulties, which exist in mobile vision systems, e.g. lower resolution and quality acquisition, lower storage capabilities, lower computation power, and poor imaging conditions. The proposed authentication approach uses specific fiducial components for authentication purposes. A facial graph model, which involves both of appearance and geometric facial information, is built for face representation. The graph of an image in the gallery set is composed of the low rank matrices of those components as nodes and the mean Euclidean distances between these components as edges. The probe image is represented in a similar way, except that the nodes are represented by the intensity vectors of the components. A weighted matching procedure is performed between the probe and the gallery graphs to make an authentication decision. The proposed system was evaluated using a locally-designed challenging dataset, which is acquired using a cell phone camera. The quality of the captured images of the evaluation dataset is intentionally very low, in order to mimic severe imaging conditions, which a mobile authentication system may encounter. For comparison purposes and as a benchmark test, we evaluate the proposed approach using the FRGC 2.0 dataset. The evaluation results show the potential of the proposed approach in making correct authentication decisions, given very low quality-images. The effectiveness of the proposed approach, in terms of accuracy and memory requirements, versus relevant approaches is demonstrated.</abstract><pub>IEEE</pub><doi>10.1109/ICCVW.2011.6130220</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1467300624
ispartof 2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops), 2011, p.40-47
issn
language eng
recordid cdi_ieee_primary_6130220
source IEEE Electronic Library (IEL) Conference Proceedings
title Face authentication using graph-based low-rank representation of facial local structures for mobile vision applications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T01%3A22%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Face%20authentication%20using%20graph-based%20low-rank%20representation%20of%20facial%20local%20structures%20for%20mobile%20vision%20applications&rft.btitle=2011%20IEEE%20International%20Conference%20on%20Computer%20Vision%20Workshops%20(ICCV%20Workshops)&rft.au=Abdel-Hakim,%20Alaa%20E.&rft.date=2011-11&rft.spage=40&rft.epage=47&rft.pages=40-47&rft.isbn=1467300624&rft.isbn_list=9781467300629&rft_id=info:doi/10.1109/ICCVW.2011.6130220&rft_dat=%3Cieee_6IE%3E6130220%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1467300616&rft.eisbn_list=9781467300612&rft.eisbn_list=1467300632&rft.eisbn_list=9781467300636&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6130220&rfr_iscdi=true