ISVC 2010: Advances in Visual Computing pp 461-468 | Cite as
Acquisition Scenario Analysis for Face Recognition at a Distance
Abstract
An experimental analysis of three acquisition scenarios for face recognition at a distance is reported, namely: close, medium, and far distance between camera and query face, the three of them considering templates enrolled in controlled conditions. These three representative scenarios are studied using data from the NIST Multiple Biometric Grand Challenge, as the first step in order to understand the main variability factors that affect face recognition at a distance based on realistic yet workable and widely available data. The scenario analysis is conducted quantitatively in two ways. First, we analyze the information content in segmented faces in the different scenarios. Second, we analyze the performance across scenarios of three matchers, one commercial, and two other standard approaches using popular features (PCA and DCT) and matchers (SVM and GMM). The results show to what extent the acquisition setup impacts on the verification performance of face recognition at a distance.
Keywords
Biometrics face recognition at a distance on the moveReferences
- 1.Zhao, W., Chellappa, R., Phillips, P.J., Rosenfeld, A.: Face recognition: A literature survey. ACM Comput. Surv. 35, 399–458 (2003)CrossRefGoogle Scholar
- 2.Matey, J., Naroditsky, O., Hanna, K., Kolczynski, R., LoIacono, D., Mangru, S., Tinker, M., Zappia, T., Zhao, W.: Iris on the move: Acquisition of images for iris recognition in less constrained environments. Proc. of the IEEE 94, 1936–1947 (2006)CrossRefGoogle Scholar
- 3.Li, S.Z., Schouten, B., Tistarelli, M.: Biometrics at a Distance: Issues, Challenges, and Prospects. In: Handbook of Remote Biometrics for Surveillance and Security, pp. 3–21. Springer, Heidelberg (2009)CrossRefGoogle Scholar
- 4.Robust2008: Robust biometrics: Understanding science and technology (2008), http://biometrics.cylab.cmu.edu/ROBUST2008
- 5.MBGC: Multiple biometric grand challenge. (NIST - National Institute of Standard and Technology)Google Scholar
- 6.Galbally, J., McCool, C., Fierrez, J., Marcel, S., Ortega-Garcia, J.: On the vulnerability of face verification systems to hill-climbing attacks. Pattern Recognition 43, 1027–1038 (2010)CrossRefMATHGoogle Scholar