Ambient Intelligence Through Image Retrieval

  • Jean-Marc Seigneur
  • Daniel Solis
  • Fergal Shevlin
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3115)


An ambient intelligent environment needs dynamic enrollment of strangers without too much human intervention. For this purpose, we propose an entity recognition process based on images captured with low-cost but widespread webcams and easy-to-deploy image processing techniques. We find that the use of levels of confidence in recognition due to different techniques and context-based image retrieval improves the process.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bigun, J., Fierrez-Aguilar, J., Ortega-Garcia, J., G.-R. J: Multimodal Biometric Authentication using Quality Signals in Mobile Communications. In: Proceedings of the 12th International Conference on Image Analysis and Processing, IEEE, Los Alamitos (2003)Google Scholar
  2. 2.
    Castro, P., Muntz, R.: Using Context to Assist in Multimedia Object Retrieval. In: ACM Workshop on Multimedia Intelligent Storage and Retrieval Management (1999),
  3. 3.
    Creese, S., Goldsmith, M., Roscoe, B., Zakiuddin, I.: Authentication for Pervasive Computing. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 116–129. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  4. 4.
    Crowley, J.L., Coutaz, J., Rey, G., Reignier, P.: Perceptual Components for Context Aware Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, p. 117. Springer, Heidelberg (2002), CrossRefGoogle Scholar
  5. 5.
    Czirjek, C., O’Connor, N., Marlow, S., Murphy, N.: Face Detection and Clustering for Video Indexing Applications. In: Proceedings of Advanced Concepts for Intelligent Vision Systems (2003),
  6. 6.
    Jain, A.K., Ross, A., Prabhakar, S.: "An Introduction to Biometric Recognition", in IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics (2003)Google Scholar
  7. 7.
    Perez, C., Vicente, M.A., Fernandez, C., et al.: Aplicacion de los diferentes espacios de color para deteccion y seguimiento de caras. In: Proceedings of XXIV Jornados de Automatica, Universidad Miguel Hernandez (2003)Google Scholar
  8. 8.
    Seigneur, J.-M., Damsgaard Jensen, C., Farrell, S., Gray, E., Chen, Y.: Towards Security Auto-configuration for Smart Appliances. In: Proceedings of the Smart Objects Conference (2003),
  9. 9.
    Seigneur, J.-M., Farrell, S., Jensen, C.D., Gray, E., Chen, Y.: End-to-end Trust Starts with Recognition. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 130–142. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Shakhnarovich, G., Lee, L., Darrell, T.: Integrated Face and Gait Recognition From Multiple Views. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (2001)Google Scholar
  11. 11.
    Sonka, M., Hlavac, V., Boyle, R.: Image Processing, Analysis, and Machine Vision, 2nd edn. PWS Publishing (1999)Google Scholar
  12. 12.
    Stajano, F.: Security for Ubiquitous Computing. John Wiley & Sons, Chichester (2002) ISBN 0470844930CrossRefGoogle Scholar
  13. 13.
    Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Proceedings of the International Security Protocols Workshop (1999),
  14. 14.
    Weiser, M.: ”The Computer for the 21st Century”, Scientific American (1991),

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Jean-Marc Seigneur
    • 1
  • Daniel Solis
    • 2
  • Fergal Shevlin
    • 1
  1. 1.Department of Computer ScienceTrinity CollegeDublin
  2. 2.Facultat d’Informàtica de BarcelonaUniversitat Politècnica de Catalunya 

Personalised recommendations