Face Authentication Competition on the BANCA Database

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3072)


This paper details the results of a face verification competition [2] held in conjunction with the First International Conference on Biometric Authentication. The contest was held on the publically available BANCA database [1] according to a defined protocol [6]. Six different verification algorithms from 4 academic and commercial institutions submitted results. Also, a standard set of face recognition software from the internet [3] was used to provide a baseline performance measure.


Linear Discriminant Analysis Biometric Authentication False Rejection Rate Automatic Face Classical Linear Discriminant Analysis 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
  3. 3.
    The CSU Face Identification Evaluation System,
  4. 4.
    Face Recognition Vendor Tests,
  5. 5.
  6. 6.
    Bailly-Bailliere, E., Bengio, S., Bimbot, F., Hamouz, M., Kittler, J., Mariethoz, J., Matas, J., Messer, K., Popovici, V., Poree, F., Ruiz, B., Thiran, J.P.: The BANCA database and evaluation protocol. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 625–638. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Cardinaux, F., Sanderson, C., Bengio, S.: Face verification using adapted generative models. In: Proc. Int. Conf. Automatic Face and Gesture Recognition (AFGR), Seoul, Korea (2004)Google Scholar
  8. 8.
    Czyz, J., Sadeghi, M., Kittler, J., Vandendorpe, L.: Decision fusion for face authentication. In: First International Conference on Biometric Authentication (2004)Google Scholar
  9. 9.
    Czyz, J.: Decision fusion for identity verification using facial images. PhD thesis, Universite Catholique de Louvain (2003)Google Scholar
  10. 10.
    Messer, K., et al.: Face verification competition on the xm2vts database. In: 4th International Conference on Audio and Video Based Biometric Person Authentication, June 2003, pp. 964–974 (2003)Google Scholar
  11. 11.
    Kittler, J., Sadeghi, M.: Physics-based decorrelation of image data for decision level fusion in face verification. In: Roli, F., Kittler, J., Windeatt, T. (eds.) MCS 2004. LNCS, vol. 3077, pp. 354–363. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Kittler, J., Ballette, M., Czyz, J., Roli, F., Vandendorpe, L.: Enhancing the performance of personal identity authentication systems by fuion of face verification experts. In: International Conference on Multimedia and Expo (2002)Google Scholar
  13. 13.
    Marcel, S.: A symmetric transformation for lda-based face verification. In: Proc. Int. Conf. Automatic Face and Gesture Recognition (AFGR), Seoul, Korea (2004)Google Scholar
  14. 14.
    Matas, J., Hamouz, M., Jonsson, K., Kittler, J., Li, Y.P., Kotropoulos, C., Tefas, A., Pitas, I., Tan, T., Yan, H., Smeraldi, F., Bigun, J., Capdevielle, N., Gerstner, W., Ben- Yacoub, S., Abdeljaoued, Y., Mayoraz, E.: Comparison and face verification results on the xm2vts database. In: Sanfeliu, A., Villanueva, J.J., Vanrell, M., Alquezar, R., Crowley, J., Shirai, Y. (eds.) Proceedings of International Conference on Pattern Recognition, 4th edn., pp. 858–863 (2000)Google Scholar
  15. 15.
    Messer, K., Matas, J., Kittler, J., Luettin, J., Maitre, G.: XM2VTSDB: The Extended M2VTS Database. In: Second International Conference on Audio and Video-based Biometric Person Authentication (March 1999)Google Scholar
  16. 16.
    Ng, J., Cheung, H.: Dynamic local feature analysis for face recognition. In: First International Conference on Biometric Authentication (2004)Google Scholar
  17. 17.
    Phillips, P.J., Moon, H., Rauss, P., Rizvi, S.A.: The feret evaluation methodology for face-recognition algorithms, vol. 22, pp. 1090–1104 (October 2000)Google Scholar
  18. 18.
    Phillips, P.J., Wechsler, H., Huang, J., Rauss, P.J.: The FERET database and evaluation procedure for face-recognition algorithm. Image and Vision Computing 16, 295–306 (1998)CrossRefGoogle Scholar
  19. 19.
    Poh, N., Bengio, S.: Non-linear variance reduction techniques in biometric authentication. In: Proc. Workshop on Multi-Modal User Authentication (MMUA), Santa Barabara, pp. 123–130 (2003)Google Scholar
  20. 20.
    Rowley, H.A., Baluja, S., Kanade, T.: Neural network-based face detection. IEEE Tran. Pattern Analysis and Machine Intelligence 20(1), 23–38 (1998)CrossRefGoogle Scholar
  21. 21.
    Sadeghi, M., Kittler, J.: Decision making in the lda space: Generalised gradient direction metric. In: The 6th Int. Conf. on Automatic Face and Gesture Recognition, Seoul, Korea (May 2004)Google Scholar
  22. 22.
    Sanderson, C., Paliwal, K.K.: Fast features for face authentication under illumination direction changes. Pattern Recognition Letters 24(14), 2409–2419 (2003)CrossRefGoogle Scholar
  23. 23.
    Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR), Hawai, vol. 1, pp. 511–518 (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  1. 1.University of SurreySurreyUK
  2. 2.Dalle Molle Institute for Perceptual Artificial IntelligenceMartignySwitzerland
  3. 3.Université Catholique de LouvainLouvain-la-NeuveBelgium
  4. 4.Titanium Technology Research CentreHong Kong

Personalised recommendations