Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bolle, R. M., S. Pankanti, and N. K. Ratha. 2000. “Evaluation techniques for biometrics-based authentication systems (FRR).” Proceedings of International Conference on Pattern Recognition. 2831–2837
Bolle, R. M., N. K. Ratha, and S. Pankanti. 1999. “Evaluating authentication systems using bootstrap confidence intervals.” Proceedings of AutoID, Summit, NJ. 9–13
Campbell, G. 1994. “Advances in statistical methodology for the evaluation of diagnostic and laboratory tests.” Statistics in Medicine 13:499–508
Committee to Review the Scientific Evidence on the Polygraph. 2003. The polygraph and lie detection. Washington, DC: National Academies Press.
Egan, J. P. 1975. Signal detection theory and ROC analysis. New York: Academic Press.
Gelfand, A. E., S. E. Hills, A. Racine-Poon, and A. F. M. Smith. 1990. “Illustration of Bayesian inference in normal data models using Gibbs sampling.” Journal of the American Statistical Association 85(412): 972–985
Golub, G. H., M. Heath, and G. Wahba. 1979. “Generalized crossvalidation as a method for choosing a good ridge parameter.” Technometrics 21(2): 215–223
Hanley, A., and B. J. McNeil. 1982. “The meaning and use of the area under a receiver operating characteristic (ROC) curve.” Radiology 143:29–36
Havran, C., L. Hupet, J. Czyz, J. Lee, L. Vandendorpe, and M. Verleysen. 2002. “Independent component analysis for face authentication.” Proceedings of Knowledge-Based Intelligent Information and Engineering Systems (KES), Crema, Italy.
Hayes, M. H. 1982. “The reconstruction of a multidimensional sequence from the phase or magnitude of its Fourier transform.” IEEE Transaction on Acoustics, Speech and Signal Processing 30(2): 140–154
Ishwaran, H., and C. Gatsonis. 2000. “A general class of hierarchical ordinal regression models with applications to correlated ROC analysis.” The Canadian Journal of Statistics 28:731–750
Jonsson, K., J. Kittler, Y. P. Li, and J. Matas. 1999. “Support vector machines for face authentication.” Proceedings of British Machine Vision Conference (BMVC).
Kanade, T., J. F. Cohn, and Y. L. Tian. 2000. “Comprehensive database for facial expression analysis.” 4th IEEE International Conference on Automatic Face and Gesture Recognition 2000. 46–53
Li, Y., J. Kittler, and J. Matas. 1999. “Effective implementation of linear discriminant analysis for face recognition and verification.” Proceedings of 8th International Conference on Computer Analysis and Patterns, Ljubljana, Slovenia.
Lim, J. S. 1990. Two-dimensional signal and image processing. Indianapolis, IN: Prentice-Hall.
Liu, C., S. C. Zhu, and H. Y. Shum. 2001. “Learning inhomogeneous Gibbs model of faces by minimax entropy.” Proceedings of the IEEE International Conference on Computer Vision (ICCV). 281–287
Liu, X., T. Chen, and B. V. K. Vijaya Kumar. 2002. “On modeling variations for face authentication.” Proceedings of the Fifth IEEE International Conference on Automatic Face and Gesture Recognition. Washington, DC: IEEE Computer Society, 384
Mahalanobis, A., B. V. K. Vijaya Kumar, and D. Casasent. 1987. “Minimum average correlation energy filters.” Applied Optics 26:3623–3630
McLachlan, G., and D. Peel. 2000. Finite mixture models. New York: John Wiley & Sons.
Palanivel, S., B. S. Venkatesh, and B. Yegnanarayana. 2003. “Real time face authentication system using autoassociative neutral network models.” Proceedings of IEEE International Conference on Multimedia and Expo, Baltimore, MD.
Savvides, M., and B. V. K. Vijaya Kumar. 2003. “Efficient design of advanced correlation filters for robust distortion-tolerant face identification.” Proceedings of IEEE Conference on Advanced Video and Signal Based Surveillance. 45–52
Savvides, M., B. V. K. Vijaya Kumar, and P. Khosla. 2002. “Face verification using correlation filters.” 3rd IEEE Automatic Identification Advanced Technologies, Tarrytown, NY. 56–61
Schuckers, M. E. 2003. “Using the beta-binomial distribution to assess performance of a biometric identification device.” International Journal of Image Graphics 3(3): 523–529
Shen, W., M. Surette, and R. Khanna. 1997. “Evaluation of automated biometrics-based identification and verification systems.” Proceedings of IEEE 85(9): 1464–1478
Sim, T., S. Baker, and M. Bsat. 2002. “The CMU pose, illumination, and expression “PIE” database.” Proceedings of the 5th International Conference on Automatic Face and Gesture Recognition.
Turk, M., and A. Pentland. 1991. “Eigenfaces for recognition.” Cognitive Neuroscience 3(1): 71–96
Venkataramani, K., and B. V. K. Vijaya Kumar. 2003. “Fingerprint verification using correlation filters.” In Proceedings of Audio Visual Biometrics Based Person Authentication (AVBPA), edited by J. Kittler and M. S. Nixon, Volume 2688 of Lecture Notes in Computer Science 886–894. New York: Springer.
Vijaya Kumar, B. V. K. 1992. “Tutorial survey of composite filter designs for optical correlators.” Applied Optics 31(23): 4773–4801
Vijaya Kumar, B. V. K., M. Savvides, K. Venkataramani, and C. Xie. 2002. “Spatial frequency domain image processing for biometric recognition.” Proceedings of International Conference on Image Processing ICIP, Rochester, NY.
Watson, C. I. 1998. NIST special database 24.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Mitra, S. (2006). Towards Statistically Rigorous Biometric Authentication Using Facial Images. In: Wilson, A.G., Wilson, G.D., Olwell, D.H. (eds) Statistical Methods in Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/0-387-35209-0_5
Download citation
DOI: https://doi.org/10.1007/0-387-35209-0_5
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-32904-8
Online ISBN: 978-0-387-35209-1
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)