Skip to main content

Large-Scale Biometric Multimedia Processing

  • Chapter
  • First Online:
Multimedia Data Mining and Analytics

Abstract

The field of Biometrics analyses organic signals from people to identify or verify an identity using a combination of physiological, behavioural or cognitive characteristics such as voice, fingerprints, eye color, facial features, iris, handwriting or other characteristics. Large-scale biometric identification systems can benefit from modern optimisation, classification and parallel computation techniques to reduce cost and increase accuracy. This chapter discusses recent and novel developments by the authors in the approaches taken to enable large-scale biometric identification. The authors present an overview of different techniques to perform the tasks of search space reduction, feature selection and parallel processing of biometrics data. Topics covered are: support vector machines and hyperspace transformations for effectively searching extremely large fingerprint databases to identify individuals; evolutionary computing to perform efficient facial feature selection for identification purposes; and cloud and high-performance designs for biometric systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.Top500.org.

  2. 2.

    https://portal.uidai.gov.in/uidwebportal/dashboard.do.

  3. 3.

    http://aws.amazon.com/ec2.

  4. 4.

    http://www.rightscale.com.

References

  1. Germain RS, Califano A, Colville S (1997) Fingerprint matching using transformation parameter clustering. Comput Sci Eng 4(4):42–49

    Article  Google Scholar 

  2. Bolle R, Connell J, Pankanti S, Ratha N, W A (2010) Guide to biometrics. Springer Professional Computing, Springer. http://books.google.co.za/books?id=wBBScgAACAAJ

  3. Ratha NK, Bolle R et al (2004) Automatic fingerprint recognition systems. Springer, New York

    Book  Google Scholar 

  4. Gelb A, Clark J (2013) Performance lessons from India’s universal identification program. CGD Policy Paper 20

    Google Scholar 

  5. Baughman AK (2008) Evolutionary facial feature selection. In: Proceedings of the 2008 GECCO conference companion on genetic and evolutionary computation. ACM, pp 2099–2104

    Google Scholar 

  6. Baughman AK, Van Der Stockt S, Greenland A (2010) Large scale fingerprint mining. In: Proceedings of the tenth international workshop on multimedia data mining. ACM, p 1

    Google Scholar 

  7. Jain A, Pankanti S (2000) Fingerprint classification and matching. Handbook for image and video processing. Academic Press, London

    Google Scholar 

  8. Ross A, Nandakumar K, Jain A (2008) Introduction to multibiometrics. In: Jain A, Flynn P, Ross A (eds) Handbook of biometrics. Springer, New York, pp 271–292

    Google Scholar 

  9. Yao Y, Marcialis GL, Pontil M, Frasconi P, Roli F (2003) Combining flat and structured representations for fingerprint classification with recursive neural networks and support vector machines. Pattern Recognit 36(2):397–406

    Article  Google Scholar 

  10. Blackburn D, Miles C, Wing B (2009) Biometrics foundation documents. Technical report, DTIC Document

    Google Scholar 

  11. Fawcett T (2006) An introduction to ROC analysis. Pattern Recognit Lett 27(8):861–874

    Article  MathSciNet  Google Scholar 

  12. Jain AK, Dubes RC (1988) Algorithms for clustering data. Prentice-Hall Inc, London

    MATH  Google Scholar 

  13. Watson CI, Garris MD, Tabassi E, Wilson CL, Mccabe RM, Janet S, Ko K (2007) User’s guide to NIST biometric image software (NBIS). Citeseer

    Google Scholar 

  14. Hong JH, Min JK, Cho UK, Cho SB (2008) Fingerprint classification using one-vs-all support vector machines dynamically ordered with naïve bayes classifiers. Pattern Recognit 41(2):662–671

    Google Scholar 

  15. Bishop CM et al (1995) Neural networks for pattern recognition. Clarendon Press, Oxford

    Google Scholar 

  16. Bishop CM et al (2006) Pattern recognition and machine learning. Springer, New York

    MATH  Google Scholar 

  17. Mohanta PP, Mukherjee DP, Acton ST (2002) Agglomerative clustering for image segmentation. In: Proceedings of the 2002 16th International Conference on Pattern Recognition. IEEE, vol 1. pp 664–667

    Google Scholar 

  18. Bauer E, Kohavi R (1999) An empirical comparison of voting classification algorithms: bagging, boosting, and variants. Mach Learn 36(1–2):105–139

    Article  Google Scholar 

  19. Bradley JN, Brislawn CM (1994) The wavelet/scalar quantization compression standard for digital fingerprint images. In: 1994 IEEE international symposium on circuits and systems, ISCAS’94. IEEE, vol 3, pp 205–208

    Google Scholar 

  20. Collins RJ (1992) Studies in artificial evolution. University of California at Los Angeles

    Google Scholar 

  21. Engelbrecht AP (2007) Computational intelligence: an introduction. Wiley, New York

    Book  Google Scholar 

  22. Goldberg D (1989) Genetic algorithms in search, optimization, and machine learning., Artificial IntelligenceAddison-Wesley, Reading

    MATH  Google Scholar 

  23. Goldberg DE, Deb K, Clark JH (1991) Genetic algorithms, noise, and the sizing of populations. Complex Syst 6:333–362

    Google Scholar 

  24. Holland JH (2000) Building blocks, cohort genetic algorithms, and hyperplane-defined functions. Evolut Comput 8(4):373–391

    Article  Google Scholar 

  25. Goldberg DE, Sastry K (2001) A practical schema theorem for genetic algorithm design and tuning. In: Proceedings of the genetic and evolutionary computation conference, pp 328–335

    Google Scholar 

  26. Goldberg DE, Sastry K, Latoza T (2001) On the supply of building blocks. In: Proceedings of the genetic and evolutionary computation conference, pp 336–342

    Google Scholar 

  27. Holland JH (1992) Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence. A Bradford Book

    Google Scholar 

  28. Wayman JL, Jain AK, Maltoni D, Maio D (2005) Biometric systems: technology, design and performance evaluation. Springer, New York

    Book  Google Scholar 

  29. Liu C, Wechsler H (2000) Evolutionary pursuit and its application to face recognition. IEEE Trans Pattern Anal Mach Intell 22(6):570–582

    Article  Google Scholar 

  30. Sim T, Baker S, Bsat M (2002) The CMU pose, illumination, and expression (PIE) database. In: Proceedings of the Fifth IEEE International Conference on automatic face and gesture recognition, pp 46–51

    Google Scholar 

  31. Banner CS (1972) The state of development of the FBI’s automatic fingerprint identification system. Technical report, FBI

    Google Scholar 

  32. Phillips PJ, Grother P, Micheals R, Blackburn DM, Tabassi E, Bone M, (2003) Face recognition vendor test 2002. In: IEEE International Workshop on analysis and modeling of faces and gestures (AMFG), p 44

    Google Scholar 

  33. Phillips PJ, Scruggs WT, O’Toole AJ, Flynn PJ, Bowyer KW, Schott CL, Sharpe M (2007) FRVT 2006 and ice 2006 large-scale results. National Institute of Standards and Technology, NISTIR, Gaithersburg

    Google Scholar 

  34. Wilson CL, Hicklin RA, Korves H, Ulery B, Zoepfl M, Bone M, Grother PJ, Micheals RJ, Otto S, Watson CI et al (2004) Fingerprint vendor technology evaluation 2003: Summary of results and analysis report. US Department of Commerce, National Institute of Standards and Technology

    Google Scholar 

  35. Pelecanos J, Navrátil J, Ramaswamy G (2008) Conversational biometrics: a probabilistic view. In: Ratha N, Govindaraju V (eds) Advances in biometrics. Springer, London, pp 203–224

    Chapter  Google Scholar 

  36. Kephart JO, Chess DM (2003) The vision of autonomic computing. Computer 36(1):41–50

    Article  MathSciNet  Google Scholar 

  37. Scadden RR, Bogdany RJ, Clifford JW, Pearthree HD, Locke RA (2008) Resilient hosting in a continuously available virtualized environment. IBM Syst. J. 47(4):535–548

    Article  Google Scholar 

  38. Shivam P, Babu S, Chase JS (2006) Learning application models for utility resource planning. In: IEEE International conference on autonomic computing (ICAC’06), pp 255–264

    Google Scholar 

  39. Zhu X, Young D, Watson BJ, Wang Z, Rolia J, Singhal S, McKee B, Hyser C, Gmach D, Gardner R et al (2008) 1000 islands: integrated capacity and workload management for the next generation data center. In: International conference on autonomic computing (ICAC’08), pp 172–181

    Google Scholar 

  40. Shen Z, Subbiah S, Gu X, Wilkes J (2011) Cloudscale: elastic resource scaling for multi-tenant cloud systems. In: Proceedings of the 2nd ACM symposium on cloud computing. ACM, p 5

    Google Scholar 

  41. Gong Z, Gu X, Wilkes J (2010) Press: Predictive elastic resource scaling for cloud systems. In: 2010 international conference on network and service management (CNSM), IEEE, pp 9–16

    Google Scholar 

  42. Nguyen H, Shen Z, Gu X, Subbiah S, Wilkes J (2013) Agile: elastic distributed resource scaling for infrastructure-as-a-service. In: Proceedings of the USENIX international conference on automated computing (ICAC’13). San Jose

    Google Scholar 

  43. Gmach D, Rolia J, Cherkasova L, Kemper A (2007) Capacity management and demand prediction for next generation data centers. In: IEEE international conference on web services, ICWS 2007, IEEE, pp 43–50

    Google Scholar 

  44. Kalyvianaki E, Charalambous T, Hand S (2009) Self-adaptive and self-configured CPU resource provisioning for virtualized servers using Kalman filters. In: Proceedings of the 6th international conference on autonomic computing. ACM, pp 117–126

    Google Scholar 

  45. Galante G, Bona LCEd (2012) A survey on cloud computing elasticity. In: Proceedings of the 2012 IEEE/ACM fifth international conference on utility and cloud computing. IEEE Computer Society, pp 263–270

    Google Scholar 

  46. Watson CI, Garris MD, Tabassi E, Wilson C, McCabe R, Janet S, Ko K (2004) User’s guide to export controlled distribution of NIST biometric image software. NIST report

    Google Scholar 

  47. Ferrucci D, Brown E, Chu-Carroll J, Fan J, Gondek D, Kalyanpur AA, Lally A, Murdock JW, Nyberg E, Prager J et al (2010) Building Watson: an overview of the DeepQA project. AI Mag 31(3):59–79

    Google Scholar 

  48. Epstein EA, Schor MI, Iyer B, Lally A, Brown EW, Cwiklik J (2012) Making Watson fast. IBM J Res Dev 56(3.4):1–15

    Google Scholar 

  49. Identification L (ed) (2005) ABIS system developer’s guide. 050-138, Revision A, Software version 4.1

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank Nalini Ratha, IBM Corporation, for his suggestions and review of the chapter.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefan van der Stockt .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

van der Stockt, S., Baughman, A.K., Perlitz, M. (2015). Large-Scale Biometric Multimedia Processing. In: Baughman, A., Gao, J., Pan, JY., Petrushin, V. (eds) Multimedia Data Mining and Analytics. Springer, Cham. https://doi.org/10.1007/978-3-319-14998-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14998-1_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14997-4

  • Online ISBN: 978-3-319-14998-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics