Advertisement

Face Recognition in Uncontrolled Environments, Experiments in an Airport

  • Cristina Conde
  • Isaac Martin de Diego
  • Enrique Cabello
Part of the Communications in Computer and Information Science book series (CCIS, volume 314)

Abstract

This paper presents and an evaluation of results obtained from a face recognition system in a real uncontrolled localization. The involved infrastructure is Barajas Airport (the international airport in Madrid, Spain). The use of this infrastructure during normal operation hours has imposed some constrains. It was not allowed to change or to add new cameras and passengers should not be disturbed by any means. Passengers should not be aware of the presence of the system, so no request should be done to change their normal behavior. To fulfill these requirements, three video surveillance cameras were selected: two in the corridor areas and one in a control point. Images were acquired and processed with illumination changes, several quality levels, collaborative and non-collaborative subjects and during three weeks. The influence of data compression method and classificator has been detailed in the paper. Three scenarios were simulated: first one is a normal operational mode, second one is a high security mode and last one is a friendly or soft-recognition mode. Four data compression methods were considered in the paper: 1dpca (1d principal components analysis), 2dpca (2d principal components analysis), 2dlda (2d linear discriminant analysis) and csa (coupled subspace analysis). Csa has obtained the best performance. For classificatory purpoises, svm (support vector machines) were selected with excellent results. The overall analysis shows that the approach taken will lead to excellent results given the hard conditions of a real scenario such an airport.

Keywords

Face recognition Uncontrolled environment airport 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Gafurov, D.: Security analysis of impostor attempts with respect to gender in gait biometrics. In: IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington D.C., USA, September 27-29 (2007)Google Scholar
  2. 2.
    Kale, A., Cuntoor, N., Yegnanarayana, B., Rajagopalan, A.N., Chellappa, R.: Gait Analysis for Human Identification. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 706–714. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Sundaresan, A., RoyChowdhury, A., Chellappa, R.: A hidden Markov model based framework for recognition of humans from gait sequences. In: Int. Conf. on Image Processing ICIP 2003, vol. 3, pp. 93–96 (2003)Google Scholar
  4. 4.
    Phillips, J., Todd Scruggs, W., O’Toole, A.J., Flynn, P.J., Bowyer, K.W., Schott, C.L., Sharpe, M.: FRVT 2006 and ICE 2006 Large-Scale Results. NISTIR 7408 (March 2007)Google Scholar
  5. 5.
    CEN. Recommendations for using Biometrics in European ABC. CEN/TC 224/WG 18Google Scholar
  6. 6.
    Frontex Technical Report. BIOPASS II Automated Biometric Border Crossing Systems Based on Electronic Passports and Facial Recognition: RAPID and SmartGate (2010)Google Scholar
  7. 7.
    Krahnstoever, N., Tu, P., Sebastian, T., Perera, A., Collins, R.: Multiview detection and tracking of travelers and luggage in mass transit environments. In: Ninth IEEE International Workshop on Performance Evaluation of Tracking and Surveillance, PETS (2006)Google Scholar
  8. 8.
    Dantcheva, A., Dugelay, J.-L., Elia, P.: Soft biometrics systems: Reliability and asymptotic bounds. In: Fourth IEEE Int. Conference on Biometrics: Theory Applications and Systems, BTAS (2010)Google Scholar
  9. 9.
    Okumura, M., Iwama, H., Makihara, Y., Yagi, Y.: Performance evaluation of vision-based gait recognition using a very large-scale gait database. In: Fourth IEEE Int. Conference on Biometrics: Theory Applications and Systems, BTAS (2010)Google Scholar
  10. 10.
    Grgic, M., Delac, K., Grgic, S.: SCface - surveillance cameras face database. Multimedia Tools and Applications Journal 51(3), 863–879 (2011)CrossRefGoogle Scholar
  11. 11.
    Wheeler, F.W., Weiss, R.L., Tu, P.H.: Face recognition at a distance system for surveil-lance applications. In: Fourth IEEE Int. Conference on Biometrics: Theory Applications and Systems, BTAS (2010)Google Scholar
  12. 12.
    Zhou, X., Collins, R., Kanade, T., Metes, P.: A master-slave system to acquire biometric imagery of humans at distance. In: ACM International Workshop on Video Surveillance (December 2003)Google Scholar
  13. 13.
    Marchesotti, L., Marcenaro, L., Regazzoni, C.: Dual camera system for face detection in unconstrained environments. In: Proc. International Conference on Image Processing (2003)Google Scholar
  14. 14.
    Hampapur, A., Pankanti, S., Senior, A., Tian, Y.-L., Brown, L., Bolle, R.: Face cataloger: multi-scale imaging for relating identity to location. In: IEEE Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 13–20 (July 2003)Google Scholar
  15. 15.
    Senior, A., Hampapur, A., Lu, M.: Acquiring multi-scale imagesby pan-tilt-zoom control and automatic multi-camera calibration. In: IEEE Workshop on Application of Computer Vision (WACV), vol. 1, pp. 433–438 (January 2005)Google Scholar
  16. 16.
    Prince, S., Elder, J., Warrell, J., Felisberti, F.: Tied factor analysisfor face recognition across large pose differences. IEEE Trans. on Pattern Analysis and Machine Intelligence 30, 970–984 (2008)CrossRefGoogle Scholar
  17. 17.
    Prince, S., Elder, J., Hou, Y., Sizinstev, M., Olevsky, E.: Towardsface recognition at a distance. In: IET Conf. on Crimeand Security, pp. 570–575 (June 2006)Google Scholar
  18. 18.
    Elder, J.H., Prince, S., Hou, Y., Sizintsev, M., Oleviskiy, Y.: Preattentiveand attentive detection of humans in wide-field scenes. Int. J. Computer Vision 72, 47–66 (2007)CrossRefGoogle Scholar
  19. 19.
    Bellotto, N., Sommerlade, E., Benfold, B., Bibby, C., Reid, I., Roth, D., Fernandez, C., Gool, L.V., Gonzalez, J.: A distributed camerasystem for multi-resolution surveillance. In: ACM/IEEEIntl. Conf. on Distributed Smart Cameras, ICDSC (2009)Google Scholar
  20. 20.
    Krahnstoever, N., Yu, T., Lim, S.-N., Patwardhan, K., Tu, P.: Collaborativereal-time control of active cameras in large scale surveillancesystems. In: Workshop on Multi-camera and Multi-modal SensorFusion Algorithms and Applications (M2SFA2) (October 2008)Google Scholar
  21. 21.
    International Civil Aviation Organization. Machine Readable Travel Document. Doc 9303 (2008)Google Scholar
  22. 22.
    SpanishParliament. Ley Organica 15/1999 de protección de datos de caracter personal. BOE (1999)Google Scholar
  23. 23.
    Viola, P., Jones, M.J.: Robust real-time face detection. International Journal of Computer Vision 57(2), 151–173 (2004)CrossRefGoogle Scholar
  24. 24.
    Pang, S., Kim, D., Bang, S.Y.: Membership authentication in the dynamic group by face classification using SVM ensemble. Pattern Recognition Letters 24, 215–225 (2003)zbMATHCrossRefGoogle Scholar
  25. 25.
    Yang, J., Yang, J.: From image vector to matrix: a straightforward image projection technique–IMPCA vs. PCA. Pattern Recognition 35, 1997–1999 (2002)zbMATHCrossRefGoogle Scholar
  26. 26.
    Yang, J., Zhang, D., Frangi, F., Yang, J.: Two-Dimensional PCA: A new approach to apperance-based face representation and recognition. IEEE Transacctions on Pattern Recognition and Machine Intelligence 26, 131–137 (2004)CrossRefGoogle Scholar
  27. 27.
    Li, M., Yuan, B.Z.: A novel statistical linear discriminant analysis for image matrix: two-dimensional fisherfaces. In: Proceedings of the International Conference on Signal Processing, pp. 1419–1422 (2004)Google Scholar
  28. 28.
    Chen, S., Zhu, Y., Zhang, D., Yang, J.: Feature extraction approaches based on matrix pattern: MatPCA and MatFLDA. Pattern Recognition Letters 26(8), 1157–1167 (2005)CrossRefGoogle Scholar
  29. 29.
    Xu, D., Yan, S., Zhang, L., Liu, Z., Zhang, H.: Coupled subspace analysis. Technical Report MSR-TR-2004-106, Microsof Research (2004)Google Scholar
  30. 30.
    Turkand, M., Pentland, A.: Eigenfaces for recognition. Journal of Cognitive Neuroscience 3, 71–86 (1999)Google Scholar
  31. 31.
    Cortes, C., Vapnik, V.: Support vector network. Machine Learning 20, 273–297 (1995)zbMATHGoogle Scholar
  32. 32.
    Martín de Diego, I., Serrano, Á., Conde, C., Cabello, E.: Face Verification with a Kernel Fusion Method. Pattern Recognition Letters 31(9), 837–844 (2010)CrossRefGoogle Scholar
  33. 33.
    Joachims, T.: Making large scale support vector machine learning practical. In: Advances in Kernel Methods: Support Vector Machines. MIT Press, Cambridge (1998)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Cristina Conde
    • 1
  • Isaac Martin de Diego
    • 1
  • Enrique Cabello
    • 1
  1. 1.Universidad Rey Juan CarlosMostolesSpain

Personalised recommendations