Skip to main content

Towards Statistically Rigorous Biometric Authentication Using Facial Images

  • Chapter
Statistical Methods in Counterterrorism
  • 1293 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bolle, R. M., S. Pankanti, and N. K. Ratha. 2000. “Evaluation techniques for biometrics-based authentication systems (FRR).” Proceedings of International Conference on Pattern Recognition. 2831–2837

    Google Scholar 

  2. Bolle, R. M., N. K. Ratha, and S. Pankanti. 1999. “Evaluating authentication systems using bootstrap confidence intervals.” Proceedings of AutoID, Summit, NJ. 9–13

    Google Scholar 

  3. Campbell, G. 1994. “Advances in statistical methodology for the evaluation of diagnostic and laboratory tests.” Statistics in Medicine 13:499–508

    Google Scholar 

  4. Committee to Review the Scientific Evidence on the Polygraph. 2003. The polygraph and lie detection. Washington, DC: National Academies Press.

    Google Scholar 

  5. Egan, J. P. 1975. Signal detection theory and ROC analysis. New York: Academic Press.

    Google Scholar 

  6. Gelfand, A. E., S. E. Hills, A. Racine-Poon, and A. F. M. Smith. 1990. “Illustration of Bayesian inference in normal data models using Gibbs sampling.” Journal of the American Statistical Association 85(412): 972–985

    Article  Google Scholar 

  7. Golub, G. H., M. Heath, and G. Wahba. 1979. “Generalized crossvalidation as a method for choosing a good ridge parameter.” Technometrics 21(2): 215–223

    Article  MathSciNet  MATH  Google Scholar 

  8. Hanley, A., and B. J. McNeil. 1982. “The meaning and use of the area under a receiver operating characteristic (ROC) curve.” Radiology 143:29–36

    Google Scholar 

  9. Havran, C., L. Hupet, J. Czyz, J. Lee, L. Vandendorpe, and M. Verleysen. 2002. “Independent component analysis for face authentication.” Proceedings of Knowledge-Based Intelligent Information and Engineering Systems (KES), Crema, Italy.

    Google Scholar 

  10. Hayes, M. H. 1982. “The reconstruction of a multidimensional sequence from the phase or magnitude of its Fourier transform.” IEEE Transaction on Acoustics, Speech and Signal Processing 30(2): 140–154

    Article  MathSciNet  MATH  Google Scholar 

  11. Ishwaran, H., and C. Gatsonis. 2000. “A general class of hierarchical ordinal regression models with applications to correlated ROC analysis.” The Canadian Journal of Statistics 28:731–750

    MathSciNet  MATH  Google Scholar 

  12. Jonsson, K., J. Kittler, Y. P. Li, and J. Matas. 1999. “Support vector machines for face authentication.” Proceedings of British Machine Vision Conference (BMVC).

    Google Scholar 

  13. Kanade, T., J. F. Cohn, and Y. L. Tian. 2000. “Comprehensive database for facial expression analysis.” 4th IEEE International Conference on Automatic Face and Gesture Recognition 2000. 46–53

    Google Scholar 

  14. Li, Y., J. Kittler, and J. Matas. 1999. “Effective implementation of linear discriminant analysis for face recognition and verification.” Proceedings of 8th International Conference on Computer Analysis and Patterns, Ljubljana, Slovenia.

    Google Scholar 

  15. Lim, J. S. 1990. Two-dimensional signal and image processing. Indianapolis, IN: Prentice-Hall.

    Google Scholar 

  16. Liu, C., S. C. Zhu, and H. Y. Shum. 2001. “Learning inhomogeneous Gibbs model of faces by minimax entropy.” Proceedings of the IEEE International Conference on Computer Vision (ICCV). 281–287

    Google Scholar 

  17. Liu, X., T. Chen, and B. V. K. Vijaya Kumar. 2002. “On modeling variations for face authentication.” Proceedings of the Fifth IEEE International Conference on Automatic Face and Gesture Recognition. Washington, DC: IEEE Computer Society, 384

    Google Scholar 

  18. Mahalanobis, A., B. V. K. Vijaya Kumar, and D. Casasent. 1987. “Minimum average correlation energy filters.” Applied Optics 26:3623–3630

    Article  Google Scholar 

  19. McLachlan, G., and D. Peel. 2000. Finite mixture models. New York: John Wiley & Sons.

    Book  MATH  Google Scholar 

  20. Palanivel, S., B. S. Venkatesh, and B. Yegnanarayana. 2003. “Real time face authentication system using autoassociative neutral network models.” Proceedings of IEEE International Conference on Multimedia and Expo, Baltimore, MD.

    Google Scholar 

  21. Savvides, M., and B. V. K. Vijaya Kumar. 2003. “Efficient design of advanced correlation filters for robust distortion-tolerant face identification.” Proceedings of IEEE Conference on Advanced Video and Signal Based Surveillance. 45–52

    Google Scholar 

  22. Savvides, M., B. V. K. Vijaya Kumar, and P. Khosla. 2002. “Face verification using correlation filters.” 3rd IEEE Automatic Identification Advanced Technologies, Tarrytown, NY. 56–61

    Google Scholar 

  23. Schuckers, M. E. 2003. “Using the beta-binomial distribution to assess performance of a biometric identification device.” International Journal of Image Graphics 3(3): 523–529

    Article  Google Scholar 

  24. Shen, W., M. Surette, and R. Khanna. 1997. “Evaluation of automated biometrics-based identification and verification systems.” Proceedings of IEEE 85(9): 1464–1478

    Article  Google Scholar 

  25. Sim, T., S. Baker, and M. Bsat. 2002. “The CMU pose, illumination, and expression “PIE” database.” Proceedings of the 5th International Conference on Automatic Face and Gesture Recognition.

    Google Scholar 

  26. Turk, M., and A. Pentland. 1991. “Eigenfaces for recognition.” Cognitive Neuroscience 3(1): 71–96

    Article  Google Scholar 

  27. Venkataramani, K., and B. V. K. Vijaya Kumar. 2003. “Fingerprint verification using correlation filters.” In Proceedings of Audio Visual Biometrics Based Person Authentication (AVBPA), edited by J. Kittler and M. S. Nixon, Volume 2688 of Lecture Notes in Computer Science 886–894. New York: Springer.

    Google Scholar 

  28. Vijaya Kumar, B. V. K. 1992. “Tutorial survey of composite filter designs for optical correlators.” Applied Optics 31(23): 4773–4801

    Google Scholar 

  29. Vijaya Kumar, B. V. K., M. Savvides, K. Venkataramani, and C. Xie. 2002. “Spatial frequency domain image processing for biometric recognition.” Proceedings of International Conference on Image Processing ICIP, Rochester, NY.

    Google Scholar 

  30. Watson, C. I. 1998. NIST special database 24.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Mitra, S. (2006). Towards Statistically Rigorous Biometric Authentication Using Facial Images. In: Wilson, A.G., Wilson, G.D., Olwell, D.H. (eds) Statistical Methods in Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/0-387-35209-0_5

Download citation

Publish with us

Policies and ethics