SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Pa#ern	
  Recogni-on	
  	
  
and	
  Applica-ons	
  Lab	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
	
  
University	
  
of	
  Cagliari,	
  Italy	
  
	
  
Department	
  of	
  
Electrical	
  and	
  Electronic	
  
Engineering	
  
Sparse Support Faces
Ba#sta	
  Biggio,	
  Marco	
  Melis,	
  Giorgio	
  Fumera,	
  Fabio	
  Roli	
  
	
  
	
  
	
  
Dept.	
  Of	
  Electrical	
  and	
  Electronic	
  Engineering	
  
University	
  of	
  Cagliari,	
  Italy	
  
Phuket,	
  Thailand,	
  May	
  19-­‐22,	
  2015	
  ICB	
  2015	
  
 
http://pralab.diee.unica.it
Template-based Face Verification
2	
  
gc ≥ϑc
genuine	
  
impostor	
  
true	
  
false	
  
s(x,tc
i
){ }i=1
p
Matcher	
  
	
  s(⋅,⋅)
Fusion	
  
rule	
  
gc (x)xFeature	
  
extrac-on	
  
Verifica-on	
  is	
  based	
  on	
  how	
  similar	
  the	
  submi#ed	
  image	
  is	
  to	
  the	
  client’s	
  templates	
  
Client-­‐specific	
  one-­‐class	
  classifica:on	
  
mean gc (x) =
1
p
s(x,tc
i
)
i=1
p
∑
gc (x) = max
i=1,…,p
s(x,tc
i
)max
Claimed	
  
Iden-ty	
  
tc
1
, …, tc
p
{ }
Claimed	
  iden-ty’s	
  templates	
  
 
http://pralab.diee.unica.it
Cohort-based Face Verification
3	
  
Verifica-on	
  is	
  based	
  on	
  how	
  similar	
  the	
  submi#ed	
  image	
  is	
  to	
  the	
  client’s	
  templates	
  
and	
  on	
  how	
  different	
  it	
  is	
  from	
  the	
  cohorts’	
  templates	
  
Client-­‐specific	
  two-­‐class	
  classifica:on	
  (one-­‐vs-­‐all)	
  
gc ≥ϑc
genuine	
  
impostor	
  
true	
  
false	
  
s(x,tc
i
){ }i=1
n
Matcher	
  
	
  s(⋅,⋅)
Fusion	
  
rule	
  
gc (x)xFeature	
  
extrac-on	
  
tc
1
, …, tc
p
{ }
Claimed	
  iden-ty’s	
  templates	
   Cohorts	
  
tc
p+1
, …, tc
n
{ }
Claimed	
  
Iden-ty	
  
 
http://pralab.diee.unica.it
Cohort-based Fusion Rules
•  Cohort selection is heuristically driven
–  e.g., selection of the closest cohorts to the client’s templates
•  Cohort-based fusion rules are also based on heuristics
–  Test-normalization
[Auckenthaler et al., DSP 2000]
–  Aggarwal’s max rule
[Aggarwal et al., CVPR-W 2006]
4	
  
gc (x) =
1
σc (x)
1
p
s(x,tc
i
)
i=1
p
∑ −µc (x)
#
$
%
&
'
(
gc (x) =
max
i=1,…,p
s(x,tc
i
)
max
j=p+1,…,n
s(x,tc
j
)
 
http://pralab.diee.unica.it
Open Issues
•  Fusion rules and cohort selection are based on heuristics
–  No guarantees of optimality in terms of verification error
•  Our goal: to design a procedure to optimally select the
reference templates and the fusion rule
–  Optimal in the sense that it minimizes verification error (FRR and FAR)
•  Underlying idea: to consider face verification as a two-class
classification problem in similarity space
5	
  
 
http://pralab.diee.unica.it
s(x, )
s(x, )
Face Verification in Similarity Space
•  The matching function maps faces onto a similarity space
–  How to design an optimal decision function in this space?
6	
  
?	
  
 
http://pralab.diee.unica.it
Support Face Machines (SFMs)
•  We learn a two-class SVM for each client
–  using the matching score as the kernel function
–  genuine client y=+1, impostors y=-1
•  SVM minimizes the classification error (optimal in that sense)
–  FRR and FAR in our case
•  The fusion rule is a linear combination of matching scores
•  The templates are automatically selected for each client
–  support vectors à support faces
7	
  
gc (x) = αis(x,tc
i
)
i
∑ − αjs(x,tc
j
)
j
∑ + b
 
http://pralab.diee.unica.it
Support Face Machines (SFMs)
8	
  
s(x, )
s(x, )
•  Maximum-margin classifiers
gc (x) = αis(x,tc
i
)
i
∑ − αjs(x,tc
j
)
j
∑ + b
 
http://pralab.diee.unica.it
Sparse Support Faces
•  Open issue: SFMs require too many support faces
–  Number of support faces scales linearly with training set size
•  Our goal: to learn a much sparser combination of match scores
•  by jointly optimizing the weighting coefficients and support faces:
9	
  
hc (x) = βis(x, zc
k
)+ b
k=1
m
∑ , m << n
min
β,z
Ω β, z( )=
1
n
uk gc (xk )− hc (xk )( )
2
+ λβT
β
i=1
n
∑
 
http://pralab.diee.unica.it
z-­‐step
Sparse Support Faces
10	
  
SFM with 12 support faces
−5 0 5
−5
0
5
−5
0
5
SSFM with 4 virtual faces
−5 0 5
−5
0
5
−5
0
5
β-­‐step	
  
Solu:on	
  algorithm	
  is	
  an	
  itera-ve	
  two-­‐step	
  procedure:	
  
If s(x,z) is not differentiable or
analytically given, gradient
can be approximated
	
  
	
  
 
http://pralab.diee.unica.it
0.5 1 2 5 10
0
5
10
15
20 AT&T − RBF Kernel
FAR (%)
FRR(%)
mean (5)
max (5)
t−norm (10)
aggarwal−max (10)
SFM (37.5 ± 3.8)
SFM−sel (10)
SFM−red (2)
SSFM (2)
Experiments
11	
  
Datasets:
AT&T (40 clients, 10
images each)
BioID (23 clients,
1,521 images)
Matcher:
PCA+RBF kernel
(exact gradient)
5 repetitions,
different clients in
TR/TS splits
TR: 5 images/client
0.5 1 2 5 10
0
10
20
30
40 BioID − RBF Kernel
FAR (%)
FRR(%)
mean (5)
max (5)
t−norm (10)
aggarwal−max (10)
SFM (23.9 ± 2.7)
SFM−sel (10)
SFM−red (2)
SSFM (2)
 
http://pralab.diee.unica.it
Experiments
12	
  0.5 1 2 5 10
0
10
20
30
40 BioID − EBGM
FAR (%)
FRR(%)
mean (5)
max (5)
t−norm (10)
aggarwal−max (10)
SFM (15.0 ± 2.6)
SFM−sel (5)
SFM−red (5)
SSFM (5)
0.5 1 2 5 10
0
5
10
15
20 AT&T − EBGM
FAR (%)
FRR(%)
mean (5)
max (5)
t−norm (10)
aggarwal−max (10)
SFM (19.5 ± 3.0)
SFM−sel (5)
SFM−red (5)
SSFM (5)
Datasets:
AT&T (40 clients, 10
images each)
BioID (23 clients,
1,521 images)
Matcher:
EBGM
(approx. gradient)
5 repetitions,
different clients in
TR/TS splits
TR: 5 images/client
 
http://pralab.diee.unica.it
From Support Faces to Sparse Support Faces
•  A client’s gallery of 17 support faces (and weights) reduced to 5
virtual templates by our sparse support face machine
–  Dataset: BioID
–  Matching algorithm: EBGM
13	
  
4.040 2.854 −0.997 −3.525 −2.208
 
http://pralab.diee.unica.it
Conclusions and Future Research Directions
•  Sparse support face machines:
–  reduce computational time and storing requirements during
verification without affecting verification accuracy
–  by jointly learning an optimal combination of matching scores, and a
corresponding sparse set of virtual support faces
•  No explicit feature representation is required
–  Matching algorithm exploited as kernel function
–  Virtual templates created exploiting approximations of its gradient
•  Future work
–  Fingerprint verification
–  Identification setting
•  Joint reduction of virtual templates for each client-specific classifier
14	
  
 
http://pralab.diee.unica.it
?	
  Any questions
Thanks	
  for	
  your	
  a#en-on!	
  
15	
  
Code available at: http://pralab.diee.unica.it/en/SSFCodeProject

Weitere ähnliche Inhalte

Was ist angesagt?

A software fault localization technique based on program mutations
A software fault localization technique based on program mutationsA software fault localization technique based on program mutations
A software fault localization technique based on program mutations
Tao He
 
System Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataSystem Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed Automata
Lionel Briand
 

Was ist angesagt? (17)

WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
adversarial robustness through local linearization
 adversarial robustness through local linearization adversarial robustness through local linearization
adversarial robustness through local linearization
 
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
 
On the Malware Detection Problem: Challenges & Novel Approaches
On the Malware Detection Problem: Challenges & Novel ApproachesOn the Malware Detection Problem: Challenges & Novel Approaches
On the Malware Detection Problem: Challenges & Novel Approaches
 
All You Need to Know to Win a Cybersecurity Adversarial Machine Learning Comp...
All You Need to Know to Win a Cybersecurity Adversarial Machine Learning Comp...All You Need to Know to Win a Cybersecurity Adversarial Machine Learning Comp...
All You Need to Know to Win a Cybersecurity Adversarial Machine Learning Comp...
 
Robustness in deep learning
Robustness in deep learningRobustness in deep learning
Robustness in deep learning
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
 
[Tho Quan] Fault Localization - Where is the root cause of a bug?
[Tho Quan] Fault Localization - Where is the root cause of a bug?[Tho Quan] Fault Localization - Where is the root cause of a bug?
[Tho Quan] Fault Localization - Where is the root cause of a bug?
 
Anomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-EncodersAnomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-Encoders
 
A software fault localization technique based on program mutations
A software fault localization technique based on program mutationsA software fault localization technique based on program mutations
A software fault localization technique based on program mutations
 
System Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataSystem Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed Automata
 
Galegalidou Christiana Thesis Presentation
Galegalidou Christiana Thesis PresentationGalegalidou Christiana Thesis Presentation
Galegalidou Christiana Thesis Presentation
 
Applications of Machine Learning and Metaheuristic Search to Security Testing
Applications of Machine Learning and Metaheuristic Search to Security TestingApplications of Machine Learning and Metaheuristic Search to Security Testing
Applications of Machine Learning and Metaheuristic Search to Security Testing
 
Icsoc12 tooldemo.ppt
Icsoc12 tooldemo.pptIcsoc12 tooldemo.ppt
Icsoc12 tooldemo.ppt
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 

Andere mochten auch

Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Pluribus One
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Pluribus One
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 

Andere mochten auch (13)

Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
 
Making neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursionMaking neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursion
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial Settings
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 

Ähnlich wie Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Phuket, Thailand, May 19-22, 2015

isabelle_webinar_jan..
isabelle_webinar_jan..isabelle_webinar_jan..
isabelle_webinar_jan..
butest
 
stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...
stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...
stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...
NETWAYS
 
Classification of voltage disturbance using machine learning
Classification of voltage disturbance using machine learning Classification of voltage disturbance using machine learning
Classification of voltage disturbance using machine learning
Mohan Kashyap
 

Ähnlich wie Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Phuket, Thailand, May 19-22, 2015 (20)

Two methods for optimising cognitive model parameters
Two methods for optimising cognitive model parametersTwo methods for optimising cognitive model parameters
Two methods for optimising cognitive model parameters
 
Lab 2: Classification and Regression Prediction Models, training and testing ...
Lab 2: Classification and Regression Prediction Models, training and testing ...Lab 2: Classification and Regression Prediction Models, training and testing ...
Lab 2: Classification and Regression Prediction Models, training and testing ...
 
Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
 
All projects
All projectsAll projects
All projects
 
Factorization Machines and Applications in Recommender Systems
Factorization Machines and Applications in Recommender SystemsFactorization Machines and Applications in Recommender Systems
Factorization Machines and Applications in Recommender Systems
 
SVD and the Netflix Dataset
SVD and the Netflix DatasetSVD and the Netflix Dataset
SVD and the Netflix Dataset
 
isabelle_webinar_jan..
isabelle_webinar_jan..isabelle_webinar_jan..
isabelle_webinar_jan..
 
My Postdoctoral Research
My Postdoctoral ResearchMy Postdoctoral Research
My Postdoctoral Research
 
[DOLAP2020] Towards Conversational OLAP
[DOLAP2020] Towards Conversational OLAP[DOLAP2020] Towards Conversational OLAP
[DOLAP2020] Towards Conversational OLAP
 
Dubai meetup 2016
Dubai meetup 2016Dubai meetup 2016
Dubai meetup 2016
 
Complex models in ecology: challenges and solutions
Complex models in ecology: challenges and solutionsComplex models in ecology: challenges and solutions
Complex models in ecology: challenges and solutions
 
TransmogrifAI - Automate Machine Learning Workflow with the power of Scala an...
TransmogrifAI - Automate Machine Learning Workflow with the power of Scala an...TransmogrifAI - Automate Machine Learning Workflow with the power of Scala an...
TransmogrifAI - Automate Machine Learning Workflow with the power of Scala an...
 
stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...
stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...
stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...
 
Alex Smola, Professor in the Machine Learning Department, Carnegie Mellon Uni...
Alex Smola, Professor in the Machine Learning Department, Carnegie Mellon Uni...Alex Smola, Professor in the Machine Learning Department, Carnegie Mellon Uni...
Alex Smola, Professor in the Machine Learning Department, Carnegie Mellon Uni...
 
Heuristic design of experiments w meta gradient search
Heuristic design of experiments w meta gradient searchHeuristic design of experiments w meta gradient search
Heuristic design of experiments w meta gradient search
 
projectreport
projectreportprojectreport
projectreport
 
Improving Spam Mail Filtering Using Classification Algorithms With Partition ...
Improving Spam Mail Filtering Using Classification Algorithms With Partition ...Improving Spam Mail Filtering Using Classification Algorithms With Partition ...
Improving Spam Mail Filtering Using Classification Algorithms With Partition ...
 
Assessing the Reliability of a Human Estimator
Assessing the Reliability of a Human EstimatorAssessing the Reliability of a Human Estimator
Assessing the Reliability of a Human Estimator
 
Classification of voltage disturbance using machine learning
Classification of voltage disturbance using machine learning Classification of voltage disturbance using machine learning
Classification of voltage disturbance using machine learning
 

Mehr von Pluribus One

Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
Pluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
Pluribus One
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
Pluribus One
 
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Pluribus One
 
Understanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsUnderstanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environments
Pluribus One
 
Amilab IJCB 2011 Poster
Amilab IJCB 2011 PosterAmilab IJCB 2011 Poster
Amilab IJCB 2011 Poster
Pluribus One
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011
Pluribus One
 
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterAriu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Pluribus One
 
Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011
Pluribus One
 
Ariu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern AnalysisAriu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern Analysis
Pluribus One
 
Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011
Pluribus One
 
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Pluribus One
 

Mehr von Pluribus One (14)

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
 
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
 
Understanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsUnderstanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environments
 
Amilab IJCB 2011 Poster
Amilab IJCB 2011 PosterAmilab IJCB 2011 Poster
Amilab IJCB 2011 Poster
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011
 
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterAriu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
 
Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011
 
Ariu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern AnalysisAriu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern Analysis
 
Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011
 
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
 
Wiamis2010 poster
Wiamis2010 posterWiamis2010 poster
Wiamis2010 poster
 

Kürzlich hochgeladen

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Phuket, Thailand, May 19-22, 2015

  • 1. Pa#ern  Recogni-on     and  Applica-ons  Lab                                     University   of  Cagliari,  Italy     Department  of   Electrical  and  Electronic   Engineering   Sparse Support Faces Ba#sta  Biggio,  Marco  Melis,  Giorgio  Fumera,  Fabio  Roli         Dept.  Of  Electrical  and  Electronic  Engineering   University  of  Cagliari,  Italy   Phuket,  Thailand,  May  19-­‐22,  2015  ICB  2015  
  • 2.   http://pralab.diee.unica.it Template-based Face Verification 2   gc ≥ϑc genuine   impostor   true   false   s(x,tc i ){ }i=1 p Matcher    s(⋅,⋅) Fusion   rule   gc (x)xFeature   extrac-on   Verifica-on  is  based  on  how  similar  the  submi#ed  image  is  to  the  client’s  templates   Client-­‐specific  one-­‐class  classifica:on   mean gc (x) = 1 p s(x,tc i ) i=1 p ∑ gc (x) = max i=1,…,p s(x,tc i )max Claimed   Iden-ty   tc 1 , …, tc p { } Claimed  iden-ty’s  templates  
  • 3.   http://pralab.diee.unica.it Cohort-based Face Verification 3   Verifica-on  is  based  on  how  similar  the  submi#ed  image  is  to  the  client’s  templates   and  on  how  different  it  is  from  the  cohorts’  templates   Client-­‐specific  two-­‐class  classifica:on  (one-­‐vs-­‐all)   gc ≥ϑc genuine   impostor   true   false   s(x,tc i ){ }i=1 n Matcher    s(⋅,⋅) Fusion   rule   gc (x)xFeature   extrac-on   tc 1 , …, tc p { } Claimed  iden-ty’s  templates   Cohorts   tc p+1 , …, tc n { } Claimed   Iden-ty  
  • 4.   http://pralab.diee.unica.it Cohort-based Fusion Rules •  Cohort selection is heuristically driven –  e.g., selection of the closest cohorts to the client’s templates •  Cohort-based fusion rules are also based on heuristics –  Test-normalization [Auckenthaler et al., DSP 2000] –  Aggarwal’s max rule [Aggarwal et al., CVPR-W 2006] 4   gc (x) = 1 σc (x) 1 p s(x,tc i ) i=1 p ∑ −µc (x) # $ % & ' ( gc (x) = max i=1,…,p s(x,tc i ) max j=p+1,…,n s(x,tc j )
  • 5.   http://pralab.diee.unica.it Open Issues •  Fusion rules and cohort selection are based on heuristics –  No guarantees of optimality in terms of verification error •  Our goal: to design a procedure to optimally select the reference templates and the fusion rule –  Optimal in the sense that it minimizes verification error (FRR and FAR) •  Underlying idea: to consider face verification as a two-class classification problem in similarity space 5  
  • 6.   http://pralab.diee.unica.it s(x, ) s(x, ) Face Verification in Similarity Space •  The matching function maps faces onto a similarity space –  How to design an optimal decision function in this space? 6   ?  
  • 7.   http://pralab.diee.unica.it Support Face Machines (SFMs) •  We learn a two-class SVM for each client –  using the matching score as the kernel function –  genuine client y=+1, impostors y=-1 •  SVM minimizes the classification error (optimal in that sense) –  FRR and FAR in our case •  The fusion rule is a linear combination of matching scores •  The templates are automatically selected for each client –  support vectors à support faces 7   gc (x) = αis(x,tc i ) i ∑ − αjs(x,tc j ) j ∑ + b
  • 8.   http://pralab.diee.unica.it Support Face Machines (SFMs) 8   s(x, ) s(x, ) •  Maximum-margin classifiers gc (x) = αis(x,tc i ) i ∑ − αjs(x,tc j ) j ∑ + b
  • 9.   http://pralab.diee.unica.it Sparse Support Faces •  Open issue: SFMs require too many support faces –  Number of support faces scales linearly with training set size •  Our goal: to learn a much sparser combination of match scores •  by jointly optimizing the weighting coefficients and support faces: 9   hc (x) = βis(x, zc k )+ b k=1 m ∑ , m << n min β,z Ω β, z( )= 1 n uk gc (xk )− hc (xk )( ) 2 + λβT β i=1 n ∑
  • 10.   http://pralab.diee.unica.it z-­‐step Sparse Support Faces 10   SFM with 12 support faces −5 0 5 −5 0 5 −5 0 5 SSFM with 4 virtual faces −5 0 5 −5 0 5 −5 0 5 β-­‐step   Solu:on  algorithm  is  an  itera-ve  two-­‐step  procedure:   If s(x,z) is not differentiable or analytically given, gradient can be approximated    
  • 11.   http://pralab.diee.unica.it 0.5 1 2 5 10 0 5 10 15 20 AT&T − RBF Kernel FAR (%) FRR(%) mean (5) max (5) t−norm (10) aggarwal−max (10) SFM (37.5 ± 3.8) SFM−sel (10) SFM−red (2) SSFM (2) Experiments 11   Datasets: AT&T (40 clients, 10 images each) BioID (23 clients, 1,521 images) Matcher: PCA+RBF kernel (exact gradient) 5 repetitions, different clients in TR/TS splits TR: 5 images/client 0.5 1 2 5 10 0 10 20 30 40 BioID − RBF Kernel FAR (%) FRR(%) mean (5) max (5) t−norm (10) aggarwal−max (10) SFM (23.9 ± 2.7) SFM−sel (10) SFM−red (2) SSFM (2)
  • 12.   http://pralab.diee.unica.it Experiments 12  0.5 1 2 5 10 0 10 20 30 40 BioID − EBGM FAR (%) FRR(%) mean (5) max (5) t−norm (10) aggarwal−max (10) SFM (15.0 ± 2.6) SFM−sel (5) SFM−red (5) SSFM (5) 0.5 1 2 5 10 0 5 10 15 20 AT&T − EBGM FAR (%) FRR(%) mean (5) max (5) t−norm (10) aggarwal−max (10) SFM (19.5 ± 3.0) SFM−sel (5) SFM−red (5) SSFM (5) Datasets: AT&T (40 clients, 10 images each) BioID (23 clients, 1,521 images) Matcher: EBGM (approx. gradient) 5 repetitions, different clients in TR/TS splits TR: 5 images/client
  • 13.   http://pralab.diee.unica.it From Support Faces to Sparse Support Faces •  A client’s gallery of 17 support faces (and weights) reduced to 5 virtual templates by our sparse support face machine –  Dataset: BioID –  Matching algorithm: EBGM 13   4.040 2.854 −0.997 −3.525 −2.208
  • 14.   http://pralab.diee.unica.it Conclusions and Future Research Directions •  Sparse support face machines: –  reduce computational time and storing requirements during verification without affecting verification accuracy –  by jointly learning an optimal combination of matching scores, and a corresponding sparse set of virtual support faces •  No explicit feature representation is required –  Matching algorithm exploited as kernel function –  Virtual templates created exploiting approximations of its gradient •  Future work –  Fingerprint verification –  Identification setting •  Joint reduction of virtual templates for each client-specific classifier 14  
  • 15.   http://pralab.diee.unica.it ?  Any questions Thanks  for  your  a#en-on!   15   Code available at: http://pralab.diee.unica.it/en/SSFCodeProject