SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 1
Biometrics and	Pattern Recognition Lab Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 2 Human Centered Computing Division Clemson University, Spring 2010
About Us Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 3
Biometrics and Pattern Recognition 								Lab Established in Summer 2006 Formerly the Image and Video Analysis Lab (IVAL)‏ In 2008, became part of the Center of Advanced Studies in Identity Sciences (CASIS) with CMU, UNCW, and NC A&T University. 4 Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD
Biometrics? Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 5
(Bio)(Metrics)‏ Bio Life Metrics To measure Biometrics: The science of identifying or authenticating an individual’s identity based on behavioural or physiological characteristics. Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 6
Biometric Characteristics Physical Characteristics Iris Retina Vein Pattern Hand Geometry Face Fingerprint Behavioural Characteristics Keystroke dynamics Signature dynamics Voice Gait Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 7
Why Biometrics? Eliminate memorization Users don’t have to memorize features of their voice, face, eyes, or fingerprints Eliminate misplaced tokens Users won’t forget to bring fingerprints to work Can’t be delegated Users can’t lend fingers or faces to someone else Often unique Save money and maintain database integrity by eliminating duplicate enrollments 8 Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD
Biometric System Verification (1:1) Identification (1:N) Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 9
Purpose Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 10
Two main research goals To produce:  Usable Biometrics ,[object Object], Unconstrained Biometrics ,[object Object]
We would like to reduce the dependency or get rid of it altogether11 Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD
Constraints Some common constraints are lighting, non-uniform distance, pose, expression, time lapse, occlusion Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 12 Typical image used in facial recognition Unconstrained image
Periocular Region Recognition Feature Reduction using Computational Intelligence Aging Effects on Facial Recognition Effects of Demographics on Facial Recognition Soft Biometrics Projects Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 13
Periocular Region Recognition Relaxes image quality (location of iris, focus, blurring) on iris images Could be used if more of the face is occluded Currently looking at texture, color, and eye shape Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 14
Feature Reduction using Computational Intelligence General Regression Neural Network (GRNN) Reduce the size of the features to enable faster, more portable biometric applications Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 15
Aging Effects on Facial Recognition Looking at an image of a person, can we reliably predict what age they are? what they will look like in so many years? or what they looked like in the past? Relaxes time lapse constraint Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 16
Demographics How do demographics affect recognition? Older easier to recognize than younger Males easier than females Why do some algorithms work better on certain populations than others? Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 17
Soft Biometrics What if we don’t have enough information to identify the person? We would like to know as much about them as possible: age, gender, ... Clemson University    School of Computing    Biometrics and Pattern Recognition Lab  Director: Damon Woodard, PhD 18

Weitere ähnliche Inhalte

Ähnlich wie Clemson University Biometrics and Pattern Recognition Lab

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
Face Recognition Research Report
Face Recognition Research ReportFace Recognition Research Report
Face Recognition Research ReportSandeep Garg
 
Komogortsev Biometric Identification Via An Oculomotor Plant Mathematical Model
Komogortsev Biometric Identification Via An Oculomotor Plant Mathematical ModelKomogortsev Biometric Identification Via An Oculomotor Plant Mathematical Model
Komogortsev Biometric Identification Via An Oculomotor Plant Mathematical ModelKalle
 
Dragos_Papava_dissertation
Dragos_Papava_dissertationDragos_Papava_dissertation
Dragos_Papava_dissertationDragoș Papavă
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
A COMPREHENSIVE STUDY ON OCCLUSION INVARIANT FACE RECOGNITION UNDER FACE MASK...
A COMPREHENSIVE STUDY ON OCCLUSION INVARIANT FACE RECOGNITION UNDER FACE MASK...A COMPREHENSIVE STUDY ON OCCLUSION INVARIANT FACE RECOGNITION UNDER FACE MASK...
A COMPREHENSIVE STUDY ON OCCLUSION INVARIANT FACE RECOGNITION UNDER FACE MASK...mlaij
 
Face recognition system
Face recognition systemFace recognition system
Face recognition systemYogesh Lamture
 
General introduction to computer vision
General introduction to computer visionGeneral introduction to computer vision
General introduction to computer visionbutest
 
Unlocking Any Door In The 21st Century. Immersion In Biometric Security.
Unlocking Any Door In The 21st Century. Immersion In Biometric Security.Unlocking Any Door In The 21st Century. Immersion In Biometric Security.
Unlocking Any Door In The 21st Century. Immersion In Biometric Security.Payment Village
 
Comparative Studies for the Human Facial Expressions Recognition Techniques
Comparative Studies for the Human Facial Expressions Recognition TechniquesComparative Studies for the Human Facial Expressions Recognition Techniques
Comparative Studies for the Human Facial Expressions Recognition Techniquesijtsrd
 
Age and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural NetworkAge and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural NetworkIRJET Journal
 
Paper id 25201441
Paper id 25201441Paper id 25201441
Paper id 25201441IJRAT
 
Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...IAESIJAI
 
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...IIIT Hyderabad
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...Face Verification Across Age Progression using Enhanced Convolution Neural Ne...
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...sipij
 

Ähnlich wie Clemson University Biometrics and Pattern Recognition Lab (20)

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Icpc12b.ppt
Icpc12b.pptIcpc12b.ppt
Icpc12b.ppt
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Face Recognition Research Report
Face Recognition Research ReportFace Recognition Research Report
Face Recognition Research Report
 
Komogortsev Biometric Identification Via An Oculomotor Plant Mathematical Model
Komogortsev Biometric Identification Via An Oculomotor Plant Mathematical ModelKomogortsev Biometric Identification Via An Oculomotor Plant Mathematical Model
Komogortsev Biometric Identification Via An Oculomotor Plant Mathematical Model
 
Icpc12b.ppt
Icpc12b.pptIcpc12b.ppt
Icpc12b.ppt
 
Dragos_Papava_dissertation
Dragos_Papava_dissertationDragos_Papava_dissertation
Dragos_Papava_dissertation
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
A COMPREHENSIVE STUDY ON OCCLUSION INVARIANT FACE RECOGNITION UNDER FACE MASK...
A COMPREHENSIVE STUDY ON OCCLUSION INVARIANT FACE RECOGNITION UNDER FACE MASK...A COMPREHENSIVE STUDY ON OCCLUSION INVARIANT FACE RECOGNITION UNDER FACE MASK...
A COMPREHENSIVE STUDY ON OCCLUSION INVARIANT FACE RECOGNITION UNDER FACE MASK...
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Final_ppt1
Final_ppt1Final_ppt1
Final_ppt1
 
General introduction to computer vision
General introduction to computer visionGeneral introduction to computer vision
General introduction to computer vision
 
Unlocking Any Door In The 21st Century. Immersion In Biometric Security.
Unlocking Any Door In The 21st Century. Immersion In Biometric Security.Unlocking Any Door In The 21st Century. Immersion In Biometric Security.
Unlocking Any Door In The 21st Century. Immersion In Biometric Security.
 
Comparative Studies for the Human Facial Expressions Recognition Techniques
Comparative Studies for the Human Facial Expressions Recognition TechniquesComparative Studies for the Human Facial Expressions Recognition Techniques
Comparative Studies for the Human Facial Expressions Recognition Techniques
 
Age and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural NetworkAge and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural Network
 
Paper id 25201441
Paper id 25201441Paper id 25201441
Paper id 25201441
 
Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...
 
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...Face Verification Across Age Progression using Enhanced Convolution Neural Ne...
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Clemson University Biometrics and Pattern Recognition Lab

  • 1. Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 1
  • 2. Biometrics and Pattern Recognition Lab Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 2 Human Centered Computing Division Clemson University, Spring 2010
  • 3. About Us Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 3
  • 4. Biometrics and Pattern Recognition Lab Established in Summer 2006 Formerly the Image and Video Analysis Lab (IVAL)‏ In 2008, became part of the Center of Advanced Studies in Identity Sciences (CASIS) with CMU, UNCW, and NC A&T University. 4 Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD
  • 5. Biometrics? Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 5
  • 6. (Bio)(Metrics)‏ Bio Life Metrics To measure Biometrics: The science of identifying or authenticating an individual’s identity based on behavioural or physiological characteristics. Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 6
  • 7. Biometric Characteristics Physical Characteristics Iris Retina Vein Pattern Hand Geometry Face Fingerprint Behavioural Characteristics Keystroke dynamics Signature dynamics Voice Gait Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 7
  • 8. Why Biometrics? Eliminate memorization Users don’t have to memorize features of their voice, face, eyes, or fingerprints Eliminate misplaced tokens Users won’t forget to bring fingerprints to work Can’t be delegated Users can’t lend fingers or faces to someone else Often unique Save money and maintain database integrity by eliminating duplicate enrollments 8 Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD
  • 9. Biometric System Verification (1:1) Identification (1:N) Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 9
  • 10. Purpose Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 10
  • 11.
  • 12. We would like to reduce the dependency or get rid of it altogether11 Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD
  • 13. Constraints Some common constraints are lighting, non-uniform distance, pose, expression, time lapse, occlusion Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 12 Typical image used in facial recognition Unconstrained image
  • 14. Periocular Region Recognition Feature Reduction using Computational Intelligence Aging Effects on Facial Recognition Effects of Demographics on Facial Recognition Soft Biometrics Projects Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 13
  • 15. Periocular Region Recognition Relaxes image quality (location of iris, focus, blurring) on iris images Could be used if more of the face is occluded Currently looking at texture, color, and eye shape Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 14
  • 16. Feature Reduction using Computational Intelligence General Regression Neural Network (GRNN) Reduce the size of the features to enable faster, more portable biometric applications Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 15
  • 17. Aging Effects on Facial Recognition Looking at an image of a person, can we reliably predict what age they are? what they will look like in so many years? or what they looked like in the past? Relaxes time lapse constraint Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 16
  • 18. Demographics How do demographics affect recognition? Older easier to recognize than younger Males easier than females Why do some algorithms work better on certain populations than others? Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 17
  • 19. Soft Biometrics What if we don’t have enough information to identify the person? We would like to know as much about them as possible: age, gender, ... Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 18
  • 20. Questions? Clemson University School of Computing Biometrics and Pattern Recognition Lab Director: Damon Woodard, PhD 19