Robust 2D Face Recognition Under Different Illuminations Using Binarized Partial Face Features: Towards Protecting ID Documents

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8915)

Abstract

Biometric recognition techniques have been widely employed in numerous applications, such as access control, identity check etc. In this paper we propose a method for protecting personal identity documents against forgery by using 2D face image on the ID document. The main components of this method includes detection of the face image from the document, extracting features from partial face images and converting the extracted features to binary feature vectors using Local Gradient Increasing Pattern (LGIP) approach. The binary feature vectors are concatenated to form a binary template which can be encoded and stored on the ID document in the form of a 2D bar code. This 2D bar code will be used to authenticate the ownership of the ID document. The face recognition method is evaluated using FRGC and FERET databases. The results show that this method can efficiently authenticate an ID document on the basis of the face image and the method can also be used to retrieve a subject from a database of images. The method is proved to be robust even if an ID document is scanned under different illuminations conditions. A report on document authentication where the face image is damaged is also presented.

Keywords

Biometrics Face recognition Document forgery Verification and identification 

References

  1. 1.
    Zhou, X., Schmucker, M.: Securing of Personal Identity Documents against Forgery (Sichern von personen-identitätsdokumenten gegen Falschung). Patent WO 2009/074342 A1, June 2009Google Scholar
  2. 2.
  3. 3.
    Oh, B.-S., Toh, K.-A., Choi, K., Teoh, A.B.J., Kim, J.: Extraction and fusion of partial face features for cancelable identity verification. Pattern Recogn. 45, 3288–3303 (2012)CrossRefGoogle Scholar
  4. 4.
    Lubing, Z., Han, W.: Local gradient increasing pattern for facial expression recognition. In: 19th IEEE International Conference on Image Processing (ICIP) (2012)Google Scholar
  5. 5.
    Zhou, L.B., Wang, H.: Local gradient increasing pattern (LGIP) for facial representation and gender recognition. In: Campilho, A., Kamel, M. (eds.) ICIAR 2012, Part II. LNCS, vol. 7325, pp. 46–53. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  6. 6.
    Odeh, S., Khalil, M.: Off-line signature verification and recognition: neural network approach. In: International Symposium on Innovations in Intelligent Systems and Applications (INISTA) (2011)Google Scholar
  7. 7.
    Karouni, A., Daya, B., Bahlak, S.: Offline signature recognition using neural networks approach. In: World Conference on Information Technology WCIT 2010, Procedia Computer Science (2011)Google Scholar
  8. 8.
    ZXing (zebra crossing), bar code image processing library. https://github.com/zxing/zxing. Accessed 4 June 2014
  9. 9.
    Quricol 2.0 QR Code Generator. http://delphi32.blogspot.de/2013/09/quricol-20-qr-code-generator.html. Accessed 4 June 2014
  10. 10.
    Phillips, P.J., Flynn, P.J., Scruggs, T., Bowyer, K.W., Worek, W.: Preliminary face recognition grand challenge results. In: 7th International Conference on Automatic Face and Gesture Recognition (2006)Google Scholar
  11. 11.
    Phillips, P.J., Moon, H., Rauss, P.J., Rizvi, S.: The FERET evaluation methodology for face recognition algorithms. IEEE Trans. Pattern 22, 1090–1104 (2000)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Competence Center Identification and BiometricsFraunhofer Institute for Computer Graphics Research IGDDarmstadtGermany

Personalised recommendations