Advertisement

Pyramid Based Interpolation for Face-Video Playback in Audio Visual Recognition

  • Dereje Teferi
  • Josef Bigun
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4642)

Abstract

Biometric systems, such as face tracking and recognition, are increasingly being used as a means of security in many areas. The usability of these systems depend not only on how accurate they are in terms of detection and recognition but also on how well they withstand attacks. In this paper we developed a text-driven face-video signal from the XM2VTS database. The synthesized video can be used as a means of playback attack for face detection and recognition systems. We use Hidden Markov Model to recognize the speech of a person and use the transcription file for reshuffling the image sequences as per the prompted text. The discontinuities in the new video are significantly minimized by using a pyramid based multi-resolution frame interpolation technique. The playback can also be used to test liveness detection systems that rely on lip-motion to speech synchronization and motion of the head while posing/speaking. Finally we suggest possible approaches to enable biometric systems to stand against this kind of attacks. Other uses of our results include web-based video communication for electronic commerce.

Keywords

Hide Markov Model Motion Vector Motion Estimation Face Detection Search Area 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Jain, A., Ross, A., Prebhakar, S.: An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics 14(1) (January 2004)Google Scholar
  2. 2.
    Ortega-Garcia, J., Bigun, J., Reynolds, D., Gonzalez-Rodriguez, J.: Authentication Gets Personal with Biometrics. IEEE Signal Processing Magazine 21(2), 50–62 (2004)CrossRefGoogle Scholar
  3. 3.
    Faundez-Zanuy, M.: Biometric Security Technology. IEEE Aerospace and Electronic Systems Magazine 21(6), 15–26 (2006)CrossRefGoogle Scholar
  4. 4.
    Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing Security and Privacy in Biometrics-Based Authentication Systems. IBM Systems Journal 40(3), 614–634 (2001)CrossRefGoogle Scholar
  5. 5.
    Kollreider, K., Fronthaller, H., Bigun, J.: Evaluating Liveness by Face Images and the Structure Tensor. In: AutoID 2005. Fourth Workshop on Automatic Identification Advanced Technologies, pp. 75–80. IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  6. 6.
    Li, J., Wang, Y., Tan, T., Jain, A.K.: Live Face Detection Based on the Analysis of Fourier Spectra. In: Jain, A.K., Ratha, N.K. (eds.) Biometric Technology for Human Identification. Proceedings of the SPIE, vol. 5404, pp. 296–303 (August 2004)Google Scholar
  7. 7.
    Faraj, M., Bigun, J.: Person Verification by Lip-Motion. In: CVPRW. Computer Vision and Pattern Recognition Workshop, pp. 37–45 (June 2006)Google Scholar
  8. 8.
    Messer, K., Matas, J., Kitler, J., Luettin, J., Maitre, G.: XM2VTSDB: The Extended M2VTS Database. In: AVBPA 1999. 2nd International Conference on Audio and Video-based Biometric Person Authentication, pp. 72–77 (1999)Google Scholar
  9. 9.
    Veeravalli, A.G., Pan, W., Adhami, R., Cox, P.G.: A Tutorial on Using Hidden Markov Models for Phoneme Recognition. In: SSST 2005. Thirty-Seventh Southeastern Symposium on System Theory (2005)Google Scholar
  10. 10.
    Young, S., Evermann, G., Gales, M., Hein, T., Kershaw, D., Moore, G., Odell, J., Ollason, D., Povey, D., Valtchev, V., Woodland, P.: The htk Book. for Version 3.3 (April 2005), http://htk.eng.cam.ac.uk/docs/docs.shtml
  11. 11.
    Bigun, J.: Vision with Direction: A Systematic Introduction to Image Processing and Computer Vision. Springer, Heidlberg (2006)Google Scholar
  12. 12.
    Jain, J., Jain, A.K.: Displacement Measurement and its Application in Interframe Image Coding. IEEE Transactions on Communication COM 29, 1799–1808 (December 1981)Google Scholar
  13. 13.
    Cheng, K.W., Chan, S.C.: Fast Block Matching Algorithms for Motion Estimation. In: ICASSP 1996. IEEE International Conference on Acoustic Speech and Signal Processing, vol. 4(1), pp. 2311–2314. IEEE Computer Society Press, Los Alamitos (1996)Google Scholar
  14. 14.
    Aly, S., Youssef, A.: Real-Time Motion Based Frame Estimation in Video Lossy Transmission. In: Symposium on Applications and the Internet, pp. 139–146 (January 2001)Google Scholar
  15. 15.
    Zhai, J., Yu, K., Li, J., Li, S.: A Low Complexity Motion Compensated Frame Interpolation Method. In: ISCAS 2005. IEEE International Symposium on Circuits and Systems, vol. 5, pp. 4927–4930. IEEE Computer Society Press, Los Alamitos (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Dereje Teferi
    • 1
  • Josef Bigun
    • 1
  1. 1.School of Information Science, Computer, and Electrical Engineering (IDE), Halmstad University, P.O. Box 823, SE-301 18, HalmstadSweden

Personalised recommendations