• No results found

Guest Editorial: Special Issue on Human Detection and Recognition

N/A
N/A
Protected

Academic year: 2021

Share "Guest Editorial: Special Issue on Human Detection and Recognition"

Copied!
3
0
0

Loading.... (view fulltext now)

Full text

(1)

 

Halmstad University Post-Print

Guest Editorial: Special Issue on Human Detection and Recognition

Bir Bhanu, Nalini K. Ratha, Vijay Kumar, Rama Chellappa and Josef Bigun

N.B.: When citing this work, cite the original article.

©2007 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Bhanu B, Ratha N, Kumar V, Chellappa R, Bigun J. Guest Editorial: Special Issue on Human Detection and Recognition. New York: IEEE; IEEE Transactions on Information Forensics and Security. 2007;2(3 part 2):489-490.

DOI: http://dx.doi.org/10.1109/TIFS.2007.905740 Copyright: IEEE

Post-Print available at: Halmstad University DiVA

http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1988

(2)

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 3, SEPTEMBER 2007 489

Guest Editorial

Special Issue on Human Detection and Recognition

WITH A very security-conscious society, biomet- rics-based authentication and identification have become one of the key technologies for many important ap- plications. It is generally believed that biometrics can provide the necessary accuracy and reliability for applications, such as access control. Biometrics research and technology continue to mature rapidly, driven by pressing industrial and government needs. As the number and types of biometrics architectures and sensors increase, the need to disseminate research results increases as well. This special issue is intended to be positioned at the frontier of biometrics research and showcase the excel- lent advanced work underway at academic and private research organizations as well as government laboratories.

A biometrics system may involve a variety of techniques from signal processing, image processing, image analysis, pattern recognition, human vision, and machine learning. As many of the applications require a higher level of performance that is not feasible with a single biometrics, it is believed that fusing multiple biometrics or an ensemble of algorithms will provide a wider coverage of the population who may not be able to provide a single biometrics at all times. This will also improve the security of the biometric systems against spoof attacks.

Research issues in biometrics deal with sensing (intensity, color, depth, thermal, pressure, time series); the nature of an individual or multibiometrics systems (face, finger, ear, eye, iris, retina, vein pattern, palm, gait, foot, handwriting);

biometric template computation, storage, and its readiness over time; feature extraction, feature selection, classification, indexing, and matching and identification techniques; score level, decision-level and feature-level integration; architectures for integration and evidence accumulation; attacks on biometric systems and the determination of liveness; normalization tech- niques involved in fusion techniques; signal-processing and machine-learning techniques in biometrics fusion; applica- tion-dependence personalization of multibiometrics systems;

theoretical studies showing models for integration; perfor- mance modeling, prediction and evaluation of multibiometrics systems; and security improvement assessment for multibio- metrics systems.

The evolution of standards, protocols, competition, and organized challenges, availability of large publicly available databases and score files, performance baselines in single and multibiometric systems, and a balance between the needs of security and privacy with a wide variety of real-world applica- tions are important issues in single or multibiometrics systems.

Digital Object Identifier 10.1109/TIFS.2007.905740

This special issue addresses some aspects of the above re- search issues dealing with different sensing modalities with the goal of improving performance of biometrics over existing tech- niques. In the following, we present a synopsis of the papers se- lected for this special issue on human detection and recognition using a range of biometrics and their associated techniques.

PAPERS INTHISISSUE

The goals of this special issue are to provide the reader with an overview of the state of the art in this field and to collect significant research results. All of the papers were reviewed in accordance with the transactions policy. The special issue con- sists of 15 papers: 12 regular papers and three correspondences.

These papers represent gait, face (3-D, 2-D, video), iris, palm- print, cardiac sounds, and vulnerability of biometrics and pro- tection against the spoof attacks.

Regular Papers

The first two papers deal with spoof attacks for gait and the protection of biometric templates for face recognition. In the first paper on spoof attacks on the gait authentication system, Gafurov et al. address the problem of vulnerability of gait bio- metrics to two kinds of attacks: minimal-effort impersonation attack and the closest person attack. It is found that minimal ef- fort impersonation attacks are not serious but the attackers with knowledge of their closest person in the database can be a se- rious threat to the gait authentication system. The second paper by Sutcu et al. on protecting biometric templates with sketch:

theory and practice deals with the issue of enhancing privacy and security of biometrics template with a focus on face recog- nition. It is shown that the theoretical bounds have their limita- tions in practical schemes, and the security of the system often needs careful investigation.

The next three papers address representation and recognition algorithms for 3-D face recognition. In the third paper on 3-D face recognition based on warped examples, Zou et al. present a 3-D face recognition system that uses carefully selected ex- amples and a generic face. The results are shown on a database of 600 range images. The fourth paper on multiscale represen- tation for 3-D face recognition by Cook et al. suggests multi- scale techniques based on Gabor filters to partition the informa- tion contained in the frequency domain prior to dimensionality reduction by techniques based on eigenfaces and Fisherfaces.

The FRGC dataset of 3-D face images is used to examine the performance of face recognition. The fifth paper on 3-D face recognition with the geodesic polar representation by Mpiperis et al. proposes a new representation that can handle the surface deformation caused by expressions. The authors view the face surface as a 2-D manifold embedded in the 3-D Euclidean space, characterized by a Riemannian metric and described by intrinsic properties, namely geodesics.

1556-6013/$25.00 © 2007 IEEE

(3)

490 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 3, SEPTEMBER 2007

An important first step in face recognition is the detection of faces. Face detection can reduce the computational burden by selecting regions of images possibly containing faces. The next two papers deal with face detection in images. The sixth paper on real-time face detection and motion analysis with applica- tion in liveness assessment by Kollreider et al. introduces a ro- bust face detection technique that can process video frames in real time. The proposed method is also used to assess the live- ness and to achieve lip reading of digits. The seventh paper on components and their topology for robust face detection in the presence of partial occlusions by Goldmann et al. discusses ro- bust detection of faces by combining techniques from statistical and structural pattern recognition domain in conjunction with face component detection.

The eighth paper by Goudelis et al. proposes nonlinear subspace methods for face verification, modeled as a two-class problem. The methods proposed in this paper exploit the in- dividuality of the human face and find a nonlinear subspace representation with enhanced discriminant power. The ninth paper on a discriminant non-negative matrix factorization algorithm with applications to facial image characterization problems by Kotsia et al. explore an algebraic theory to solve problems in face biometrics and facial expression recognition.

The convergence stability of the limit during factorization iter- ations pays particular attention to obtain meaningful solutions.

Any biometric trait has circumstances in which it cannot be utilized or its performance is poor. Accordingly, novel biometric signal modalities expand the application fields of the identifica- tion technologies. The tenth paper on biometric identification based on frequency analysis of cardiac sounds by Beritelli and Serrano is a contribution in this direction. It studies the bio- metric characteristics of PhonoCardioGram (PCG) signals from cardiac auscultation and discusses their usefulness. An impor- tant aspect of biometric recognition is the storage and trans- mission of biometric images and/or associated templates. In the eleventh paper on an evaluation of image sampling and com- pression for human iris recognition, Rakshit and Monro inves- tigate the robustness of the performance of three human iris image-matching algorithms to subsampling and compression.

Correlating two patterns to match them belong to fundamentals in machine recognition. The technique requires a prototype per class to reach a decision. The last paper on palmprint classifi- cation using multiple advanced correlation filters and palm-spe- cific segmentation by Hennings et al. improves the correlation paradigm by devising multiple prototypes or filters per class and shows its usefulness for palmprint classification.

Correspondences

The first correspondence on gait recognition using com- pact feature extraction transforms and depth information by Ioannidis et al. presents a gait identification and authentica- tion method based on the use of 2-D and 3-D features of the image silhouette sequence. In the second correspondence on 3-D face recognition using local appearance-based models, Ekenel et al. present a local appearance-based approach for face recognition. The last correspondence on face verification using template matching by Sao and Yegnanarayana proposes a template-matching approach using an edge-based representa- tion of the face image. The authors use reference face images (at different poses or different lighting conditions) separately for template matching.

ACKNOWLEDGMENT

The guest editors would like to thank the authors who submitted their work. They thank the referees who spent their valuable time in reviewing the manuscripts. They would also like to thank P. Moulin, Editor-in-Chief of IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, for providing useful suggestions during the development and processing of the special issue and J. Huber, Administrative Assistant of IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, who provided excellent support during the various stages of the entire review process.

BIR BHANU, Guest Editor

University of California at Riverside Riverside, CA 92521 USA NALINI K. RATHA, Guest Editor IBM T. J. Watson Research Center Yorktown Heights, NY 10598 USA VIJAY KUMAR, Guest Editor Carnegie Mellon University Pittsburgh, PA 15235 USA RAMA CHELLAPPA, Guest Editor University of Maryland

College Park, MD 20742 USA JOSEF BIGUN, Guest Editor Halmstad University Halmstad, SE-3018 Sweden

References

Related documents

 Investigations using the method of direct, continuous, long-term and ambulant measurements of ME pressure and ET provocation tests were performed successfully in subjects with

Historical, paleoenvironnmental and archaeolo- gical research in India, among other places, shows us some of the limits of models and time markers built on an European base,

His research interests are estimation and control over sensor network, sensor and actuator network, target tracking in sensor networks, optimization in mobile sensor

The aim of the two-week data modeling was to compare the predictive performance of input-output models and no-input models, as well as tuned one-step predictors and tuned

We then combine existing works on counter, predicate, and constrained monotonic abstraction and build a nested counter exam- ple based refinement scheme for establishing

Om det beror på att företagen inte innehar den värderingskompetens som krävs för att genomföra en objektiv företagsvärdering av sitt egna bolag inför

(a) Original graph (b) Ordered during the scheduling process for the time point that comes just after ܵ ଴ǡ଴ has been scheduled.. The number of nodes taken into account at a time

Three crucial thermal issues related to temperature variations, temperature gradients, and temperature cycling are addressed in this thesis.. Existing test scheduling techniques