Selection of User-Dependent Cohorts Using Bezier Curve for Person Identification

  • Jogendra Garain
  • Ravi Kant Kumar
  • Dakshina Ranjan Kisku
  • Goutam Sanyal
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9730)


The traditional biometric systems can be strengthened further with exploiting the concept of cohort selection to achieve the high demands of the organizations for a robust automated person identification system. To accomplish this task the researchers are being motivated towards developing robust biometric systems using cohort selection. This paper proposes a novel user-dependent cohort selection method using Bezier curve. It makes use of invariant SIFT descriptor to generate matching pair points between a pair of face images. Further for each subject, considering all the imposter scores as control points, a Bezier curve of degree n is plotted by applying De Casteljau algorithm. As long as the imposter scores represent the control points in the curve, a cohort subset is formed by considering the points determined to be far from the Bezier curve. In order to obtain the normalized cohort scores, T-norm cohort normalization technique is applied. The normalized scores are then used in recognition. The experiment is conducted on FEI face database. This novel cohort selection method achieves superior performance that validates its efficiency.


Bezier curve SIFT descriptor Imposter scores Control point Biometric system Cohort subset Normalization technique 


  1. 1.
    Merati, A., Poh, N., Kittler, J.: User-specific cohort selection and score normalization for biometric systems. IEEE Trans. Inf. Forensics Secur. 7(4), 1270–1277 (2012)CrossRefGoogle Scholar
  2. 2.
    Merati, A., Poh, N., Kittler, J.: Extracting discriminative information from cohort models. In: Proceedings of 4th IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pp. 1–6 (2010)Google Scholar
  3. 3.
    Garain, J., Kumar, R.K., Sanyal, G., Kisku, D.R.: Cohort selection of specific user using max-min-centroid-cluster (mmcc) method to enhance the performance of a biometric system. Int. J. Secur. Appl. 9(6), 263–270 (2015)Google Scholar
  4. 4.
    Lowe, D.G.: Distinctive image features from scale-invariant key points. Int. J. Comput. Vis. 60(2), 91–110 (2004)CrossRefGoogle Scholar
  5. 5.
    Tistarelli, M., Sun, Y., Poh, N.: On the use of discriminative cohort score normalization for unconstrained face recognition. IEEE Trans. Inf. Forensics Secur. 9(12), 2063–2075 (2014)CrossRefGoogle Scholar
  6. 6.
    Aggarwal, G., Ratha, N.K., Bolle, R.M.: Biometric verification: looking beyond raw similarity scores. In: Proceedings of Computer Vision and Pattern Recognition Workshop, p. 31 (2006)Google Scholar
  7. 7.
    Auckenthaler, R., Carey, M., Thomas, H.L.: Score normalization for text-independent speaker verification systems. Digit. Signal Proc. 10, 42–54 (2000)CrossRefGoogle Scholar
  8. 8.
    Tulyakov, S., Zhang, Z., Govindaraju, V.: Comparison of combination methods utilizing T-normalization and second best score model. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshop, pp. 1–5 (2008)Google Scholar
  9. 9.
    De Faget, P., De Casteljau, D.F.D.: Outillage methodes calcul. Enveloppe Soleau 40.040, Institute National de la Propriete Industrielle, Paris (1959)Google Scholar
  10. 10.
    Thomaz, C.E., Giraldi, G.A.: A new ranking method for principal components analysis and its application to face image analysis. Image Vis. Comput. 28(6), 902–913 (2010)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Institute of Technology DurgapurDurgapurIndia

Personalised recommendations