A Survey of Synthetic Biometrics: Capabilities and Benefits

Size: px
Start display at page:

Download "A Survey of Synthetic Biometrics: Capabilities and Benefits"

Transcription

1 Accepted for publication in The 2004 International Conference on Artificial Intelligence (IC-AI 04) A Survey of Synthetic Biometrics: Capabilities and Benefits Nicholas M. Orlans The MITRE Corporation 7515 Colshire Drive McLean, VA Douglas J. Buettner The Aerospace Corporation P.O. Box M1/112 Los Angeles, CA Joe Marques The MITRE Corporation 7515 Colshire Drive McLean, VA Abstract Within the Association for Computing Machinery (ACM) Special Interest Group on Computer Graphics (SIGGRAPH) community, a long-standing goal has been held for photo-realism in the generation of synthetic images a goal that some feel has been achieved [7]. This body of work, spanning over three decades, documents achievements in modeling, animation, and rendering human subjects. The visual products range from feature films, commercial art, to video games. Computer generated synthetic biometrics are not widely used within the biometrics community beyond their current use as a research tool. Yet they offer a number of potential advantages that can be developed further to support the science and practical use of biometrics. They can be used to improve the understanding of a biometric system s robustness and as an engineering tool to predict system performance. This paper surveys the state of synthetic biometrics generation, provides a glimpse at some benefits that can be obtained from their use, and discusses the issues retarding their adoption by the biometrics community. 1. Introduction This survey explores the current state of computer generated (synthetic) biometric images, and discusses areas where synthetic biometrics can provide added value to the biometrics community and ultimately to the public and private sector interests that it serves. Also discussed are the areas of research that need to be conducted before their possible wide spread adoption and use by the biometrics community. The most advanced synthetic images come from the movie industry and have yet to be fully adapted to suit biometric needs. A synthetically rendered face is illustrated in Figure Synthetic Biometrics Synthetic image generation, as shown in Table 1, has been achieved for the most widely recognized image-based biometrics of fingerprint, face, and iris [1, 2, 3, 4, 5, 6]. Table 1. Synthetic Biometric Data Generation Synthetic image generation Statistical feature model Validated model Environment effects Fingerprint Face Iris yes yes yes yes- level 2 minutiae yes - (method) yes (theoretical) no no no partial partial partial Figure 1. Rendering Of A Synthetic Face. 1 The quest for realistic computer-generated artificial-persons has created an art and science that includes physics-based models to control physical form, motion and illumination properties of materials [8]. Today, computer generated characteristics address detailed aspects of facial features, skin, hair, gait, as well as body and eye movement [3, 4, 5, 8, 9, 10, 11, 12, 13, 14]. Statistical feature models are empirical or mathematical models that provide a statistically valid method for a computer algorithm to generate 1 Image Source: reproduced with permission from the author The MITRE Corporation and The Aerospace Corporation All Rights Reserved. Page 1 of 7

2 biometric features across a target population. Statistical feature models should, in general, be derived from the physics. However, they can also be generated from empirical methods. For example, the optimal statistical derivation model for fingerprints would be derived from the biological factors that create the unique friction ridge and pore patterns in the human fetus. The method of empirically determining equivalent statistical parameters however suffices, where the analysis of anthropometric, fingerprint or other private/public databases of biometrics can be utilized [15, 16, 17, 18, 19, 20, 21]. The Pankanti et al. derivation of fingerprint uniqueness was for fingerprint minutia from ridge flow [22]. No statistical derivation has been proposed for finger ridge/trough patterns or level 3 information [21, 22]. Level 3 information includes pores and more subtle details about friction ridge width, shape and deviation. Hence for fingerprints, a partial theoretical mathematical model and empirical data exist that could be used to validate the synthetic model generator. Methods for empirically deriving statistical shape models for the face or body exist [23, 24]. Daugman has published treatments addressing the statistical uniqueness of the human iris [25, 26]. Empirical and mathematical models are validated by comparing their statistical distributions to the statistical distributions from real biometrics. The closest testing that approaches what is needed to validate synthetic biometrics generators against real biometrics is the University of Bologna Fingerprint Verification Competition (FVC) Tests [27, 28]. These tests use synthetic images from the University of Bologna s SFinGe tool (shown below in Figure 2) [29]. Very realistic images simulate a low-cost sensor with rotation, displacement and distortion characteristics approximating images from real biometrics. Figure 2. The SFinGe Fingerprint Generation Tool The National Institute of Standards and Technology s (NIST) Facial Recognition Verification Tests (FRVT) are equivalent to the FVC tests; the NIST tests, however, do not utilize synthetic faces [30]. There is no equivalent public testing of iris recognition vendors due to the limited number of vendors. Environmental affects not only refer to the ability to control through parametric means (while maintaining calibrated results) the effect of nature on acquired biometric image data, it also refers to the influences from the image acquisition physics. As an example, SFinGe, contains controls for pressure, moisture, skin elasticity, and the ability to choose specific sensor types to mimic sensor specific image acquisition affects [1, 2, 27]. Methods for synthesizing potential environmental affects on the acquisition of synthetic face and iris images can be gleaned from the radiosity and global illumination methods [8, 31]. Additional models for environmental factors such as temperature on human subjects can eventually be used to account for the effects of physical changes like sweat on biometrics [32]. Complete accounting for image acquisition affects is also possible using physical optics theory and the physics of the response by the imaging device to electromagnetic radiation. Image processing methods exist for measuring image acquisition distortion among other effects [see for example The Biometrics Community Within the biometrics community, the use of synthetic biometric images for research and testing is not a new concept or practice. As previously discussed, research groups have utilized synthetic biometric images for testing and parametrically controlled data generation [27, 28]. Of the mainstream biometrics, synthetic fingerprint and facial images have perhaps received the most attention by biometrics researchers [1, 2]. Using synthetic biometrics is generally not considered a best practice for testing biometrics systems [27, 33]. Additionally, the requirements of Common Criteria testing provide a further roadblock to the adoption of these methods [34]. Common Criteria requires the use of real images obtained from the sensor in an operational scenario for security certification testing, as the focus is on operational security. Hence, using synthetic images is not desirable in this case since they are not integrated into the biometric system; where the fully operational system s security vulnerabilities need to be uncovered The MITRE Corporation and The Aerospace Corporation All Rights Reserved. Page 2 of 7

3 Another issue retarding the adoption of synthetic biometrics pertains to the availability of real biometrics from engineering staff members working on the development of these systems, and from the understandable desire to simply use biometrics from real people captured by the actual system. Finally, the current synthetic biometric generation systems do not fully mimic real sensors, and do not provide statistically valid representations of real populations. Hence, despite the availability of cost-effective commercially available tools to synthesize complete human subjects, their use has not been fully realized within the biometrics community. This brings up the fundamental question of how these issues retarding their adoption can be removed to facilitate their use within this community. For example, how could the biometrics community best incorporate these tools to potentially further refine the testing and evaluation of any system, which incorporates biometrics (a.k.a. biometric systems)? What are the benefits? This introduction has provided some initial background into the state of computer generated (synthetic) biometrics. We now review the hurdles facing the adoption of synthetic biometrics within the biometrics community and ponder some potential advantages for using synthetic biometrics within that community. 2. Benefits for Biometric Systems While not a substitute for the biological diversity provided by live biometrics, computer generated biometrics do offer several advantages. The potential benefits for using synthetic biometrics, as well as research areas that should be explored are provided in this section. 2.1 Parametric Biometric Systems Testing The Common Criteria testing issue, mentioned in section 1.2, is circumvented if the use of synthetic images for testing biometric systems is restricted to testing the artificial intelligence underpinnings (i.e. the image processing algorithm s robustness factors and environmental boundaries). The system s biometric inputs are synthetically generated up front using any number of carefully controlled parameters. The synthetic images are then processed in a simulated operational mode, where the biometrics processing logic that will be employed by the operational system remains intact. System robustness issues can be investigated from the parametric control provided by these synthetic scenes. For example, synthetic face images for facial recognition tests can include carefully controlled changes to pose angle, illumination, expression, and obstructions [35]. Additional relevant parameters include motion and location information. Differences in biometric recognition performance across demographic populations and sub-populations (such as age) have been reported in recent tests, but the causes are not always fully understood [36]. Synthetic techniques may play a role in isolating demographic differences and associated specific parameters, which might play a role in effecting biometric recognition performance [37]. Figure 3. Synthesized Aging Sequence The illustration in Figure 3 is an example of using hybrid synthetic images to study aging, where a photographic image of a live person is added to a 3D face model. In this example, the model is aged forwards and backwards in a progressive sequence using the FaceGen application from Singular Inversions, Inc. [36]. In the case of fingerprinting, friction ridge quality and finger size correlations to age, ethnicity and gender effects on performance could be readily tested using validated synthetic images. Differences across environments and sensors are known to result in differences in performance. Some biometric systems address some of the environmental or sensor differences. However, the majority of systems have yet to effectively account for all differences. Here, the ability to parametrically control environmental difference is a necessary step towards the ability to account for (or cancel) its particular influences. 2.2 Operational Scenario Testing Synthetic scenes with injected biometrics provide the potential to construct arbitrary representations of real-world scenarios using a fixed 2004 The MITRE Corporation and The Aerospace Corporation All Rights Reserved. Page 3 of 7

4 set of model "subjects" or randomly generated populations of subjects and scenarios. Ground truth, that is, the actual layout of the potential operational location, is known in advance, eliminating the need to re-identify and re-orient human subjects or physical objects. Variations on a basic theme, such as a video of subjects walking through a chokepoint, can be systematically modeled with parametric settings. Parameters range from global, environmental factors such as illumination and camera angle, to local aspects such as hair length, pose angle, and facial expressions. Furthermore, specific behavioral outliers to normal chokepoint transit behavior can be examined to reveal system vulnerabilities. Biometric systems engineers could run a vast array of operational scenario tests to define the optimum layout of biometrically enabled security devices by testing the system in the computational realm prior to deployment. As biometric systems are deployed in support of national security, border control, and immigration applications, understanding the affects of international populations becomes very significant. Countries with population groups that lack sufficient diversity in age and ethnicity for thorough testing of border management applications would certainly benefit. For example, the FaceGen software permits control of several ethnic characteristics [36]. A recognition system s inability to properly discriminate between controlled variations in ethnic or racial attributes for example, suggests there may be an inadequate body of system training data used to fine-tune the system or a fundamental problem with the recognition algorithms. 2.3 Enhancing privacy Another important benefit for synthetic biometrics is their lack of association with a specific individual s identity. Hence, they provide the unique ability to be anonymous in origin by design and thus allow researchers to simulate populations without having to worry about security arrangements for the handling and use of biometrics from real people [38]. An example that highlights the touchy subject of biometrics use by governments in the area of privacy was the proposed use of biometrics in a Department of Defense anti-terrorism total information awareness system that attracted congressional and public scrutiny concerning privacy, policy, and potential abuse issues. Those concerns, ultimately led to the cancellation of that program, are summarized in a December 2003 audit report from the Inspector General of the U.S. Department of Defense [39]. Synthetically generated biometrics provide a benefit to security systems testing by providing a privacy sensitive method, where synthetics are not subject to the same privacy and legal issues that must be addressed when personal data is collected and maintained. Moreover, there should be few if any restrictions for distributing, publishing, and sharing synthetic datasets. There are these types of issues, however, when attempting to analyze real datasets from private or government sources. With fewer restrictions, there are additional benefits for information sharing for research as well as cost reductions from storage and data handling. 2.4 Cost and Time Once necessary software is in place and control parameters are configured, synthetically generated biometrics can be quickly produced. Typically, database production times are on the order of minutes or hours as opposed to months or even years for the collection of the same number of natural images. The synthetic fingerprint generator, SfinGe, reportedly generates 10,000 realistic prints in ten hours using a single Pentium IV CPU [1]. A MITRE experiment experienced similar generation times for face images [36]. Synthetic generators are functionally capable of scaling to produce very large databases or simply generating large numbers of randomly selected biometrics from the specified parametric controls. Collecting medium to large databases of biometrics from real people for testing (or any purpose) is expensive and challenging. Actual costs vary according to the collection protocol and logistics of the target population. Most collections undertaken by universities tend to incorporate small numbers of test subjects for the test population, typically from the young university population [17, 18]. Larger government or industry sponsored collection efforts, on the order of thousands or tens of thousands of images are extremely costly. The only alternative to carefully controlled biometrics collection protocols for research is use of private or government databases. This use restricts the publication visibility of the research results, due to privacy concerns. The ultimate scalability to large quantities of valid synthetic images hinges not only on the ability to create realistic synthetic biometric images, but also is directly dependent on the availability of valid statistical models. 3. Statistical modeling Statistical models are essentially mathematical equations or empirically derived algorithms, which 2004 The MITRE Corporation and The Aerospace Corporation All Rights Reserved. Page 4 of 7

5 are fed randomly generated numbers to create data that are statistically equivalent to real data. Mathematical models provide researchers and engineers with the ability to predict the performance of larger populations based on the modeled performance of smaller populations [40, 41]. Match score distributions from biometric systems contain many underlying behavioral and physical population uncertainties. Figure 4 shows the match score distributions from a corpus of input images (see [42] for details on the corpus). Figure 4. A Fingerprint Algorithm s Raw Scores The distribution is dependent on the conditions of the test and the subjects used. For example, high humidity and temperature causes sweat, where low humidity causes dry skin. This environmental influence on our skin, in turn influences the acquisition of the fingerprint image differently for different types of fingerprint sensors. Even though the corpus in Figure 4 was accumulated in a climate controlled indoor environment, some of the younger test subjects provided sweaty fingerprints. Future physics-based or empirically derived models from biometric technology testing can be combined with Monte Carlo simulations. This provides a powerful tool for scientists and engineers working with biometric systems, in the same manner that these methods help researchers in other disciplines [43]. 4. Conclusions and recommendations It is evident that the realm of biometrics is exploding and the integration of various biometrics into sophisticated and robust models is occurring. The ability to increase the reliability and accuracy of these systems is critical, as biometrics become an essential part of law enforcement and security communities. The use of synthetic biometrics by researchers in simulations provides a potential method for testing these systems in a privacyenhancing manner. Simulations provide controlled statistical sampling through the use of a model. The models in turn are used to provide an approximation about complex, multi-variable problems. The lack of statistically valid models remains one of the main problems faced by the biometrics community. The authors recommend that targeted studies and prototyping efforts be conducted to progress the state of the art as presented previously in Table 1. Additionally, a demonstration of how real biometrics samples can be accurately transformed across two or more diverse synthetic environments is an important and achievable next step for the advancement of biometrics. For example, face images with indoor illumination versus outdoor illumination can be simulated and then used to accurately compensate for the undesired variances from live images. An example of a biometrics deployment that may have benefited from the use of synthetic biometrics is an operational scenario test of the highly publicized face recognition system test at Boston s Logan Airport. The deployment reportedly failed to match the identities of 38% of a test group of employees [44]. Had this deployment been modeled and checked synthetically, by a third party, this highly public failure with its associated publicity debacle may have been avoided. A much better example of where the technology could be utilized in the future is in the testing of border management scenarios where there is a wide range of atmospheric and operational conditions. The U.S. alone must contend with the extreme cold wintertime conditions in Alaska to the hot humid summertime conditions in Florida [45]. As discussed, the ultimate scalability to large quantities of valid synthetic images hinges directly on the statistical models underpinning the generated data, and this is an area where questions remain. A synthetic generator for biometric data must contain a model, where currently it must make assumptions about the distinguishable phenomenology of the biometric trait, its natural variances, and also its responses to the environment. The creation, formalization and assessment of such models are important next steps towards allowing an understanding of performance derived from testing with synthetic biometrics The MITRE Corporation and The Aerospace Corporation All Rights Reserved. Page 5 of 7

6 Bibliography 1. Computer Science Department, University of Bologna, Synthetic Fingerprint Generator (SfinGe) Home, Version 2.5, January 2004, 2. R. Cappelli, A. Erol, D. Maio, D. Maltoni, Synthetic fingerprint-image generation, Proceedings 15th International Conference on Pattern Recognition, Vol. 3, Sept V. Blanz, and T.Vetter, A Morphable Model for the Synthesis of 3D Faces, Computer Graphics Proceedings of SIGGRAPH, pp Los Angeles, J. Yan, H. Zhang, Realistic Virtual Face and Body Synthesis, IAPR Workshop on Machine Vision Applications, Tokyo, Japan, Nov K. Waters, A muscle model for animating threedimensional facial expression, Computer Graphics Proceedings of SIGGRAPH, pp , A. Lefohn et al., "An Ocularist's Approach to Human Iris Synthesis." IEEE Computer Graphics, Vol. 23, No. 6. pp , November/December D. P. Greenberg et al., A Framework for Realistic Image Synthesis, Computer Graphics Proceedings of SIGGRAPH, pp , G. Ward. Radiance Synthetic Imaging System. Lawrence Berkeley National Laboratory, present, 9. P. Debevec et al., Acquiring the reflectance field of a human face, Computer Graphics Proceedings of SIGGRAPH, pp , Tae-Yong Kim, and U. Neumann, Interactive multiresolution hair modeling and editing, Computer Graphics Proceedings of SIGGRAPH, pp , B. Allen, B. Curless, and Z. Popović. The Space of Human Body Shapes: Reconstruction and Parameterization from Range Scan, Computer Graphics Proceedings of SIGGRAPH, July, H. C. Sun, and D. N. Metaxas, Automating gait generation, Computer Graphics Proceedings of SIGGRAPH, pp , P. Faloutsos, M. van de Panne, and D. Terzopoulos, Composable Controllers for Physics-Based Character Animation, Computer Graphics Proceedings of SIGGRAPH, pp , S. P. Lee, J. B. Badler, N. I. Badler, Eyes Alive, in Computer Graphics Proceedings of SIGGRAPH, pp , Civilian American and European Surface Anthropometry Resource Project CAESAR TM, available online at ome.htm 16. Anthropometric data of Japanese, available online at Japanthropdat.html 17. The AR Face Database, available online at abase.html 18. The Yale Face Database, available online at B.html 19. The UMIST Face Database, available online at The Database of Faces, An archive of the AT&T Cambridge Laboratories, available online at l 21. S. Meagher, An Update on Daubert Hearings on Fingerprints, International Association for Identification (IAI) 87th International Educational Conference, Las Vegas, NV, August 4-10, 2002, available online at S. Pankanti, S. Prabhakar, and A. K. Jain, "On the Individuality of Fingerprints", IEEE Transactions on PAMI, Vol. 24, No. 8, pp , A shorter version also appears in Fingerprint Whorld, pp , July I. L. Dryden and K. V. Mardia, Statistical Shape Analysis, John Wiley & Sons, A. El-Hussuna, Statistical variation of Three Dimensional face models, M. Sc. Thesis, IT- University of Copenhagen Multimedia Technologies, March J. Daugman, The importance of being random: Statistical principles of iris recognition, Pattern Recognition, vol. 36, no. 2, pp , J. Daugman and C. Downing, Epigenetic randomness, complexity, and singularity of 2004 The MITRE Corporation and The Aerospace Corporation All Rights Reserved. Page 6 of 7

7 human iris patterns, Proceedings of the Royal Society, B, 268, Biological Sciences, pp , D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, A. K. Jain, FVC2000: Fingerprint Verification Competition, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, No. 3, pp , March 2002, the full report is available online at 00_report.pdf 28. D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, A. K. Jain, FVC2002: Second Fingerprint Verification Competition, 16th International Conference on Pattern Recognition (ICPR'02) Volume 3, p , August D. Maltoni, D. Maio, A.K. Jain and S. Prabhakar, Handbook of Fingerprint Recognition, Springer (New York), P. J. Phillips, P. Grother, R.J. Micheals, D.M. Blackburn, E. Tabassi, and J.M. Bone, Face recognition vendor test 2002: Overview and Summary, Technical report, NIST, March 2003, available online at D. S. Ebert, Advanced modeling techniques for computer graphics, ACM Computing Surveys (CSUR), Vol. 28, Issue 1, pp , March Y. Daun, Fuzzy Role Based Expert System for Human Thermoregulation Model, U.C. Berkley Mechanical Engineering ME290M Final Project, 1999, available online at me290final.pdf 33. A. J. Mansfield and J. L. Wayman, Best Practices in Testing and Reporting Performance of Biometric Devices, Version 2.01, NPL Report CMSC 14/02, August P. Zatychec, Evaluation & Certification of Biometric Technologies to ISO Common Criteria Standards, Biometrics Consortium Conference 2001, available online at L_BCFEB02/FINAL_4_Final%20Paul%20Zatyc hec%20brief.pdf 35. J. Marques, N. Orlans, and A. Piszcz, Effects of Eye Position on Eigenface-Based Face Recognition Scoring, available online at ers_03/marques_eigenface/marques_eigenface.p df 36. N. Orlans, A. Piszcz, R. Chavez, Parametrically Controlled Synthetic Imagery Experiment for Face Recognition Testing, ACM SIGMM 2003 Proceedings, October N. Furl, P. J. Phillips, and A. J. O Toole, Face recognition algorithms and the other-race effect: computational mechanisms for a developmental contact hypothesis, Cognitive Science 26, pp , C. J. Hill, Risk of Masquerade Arising from the Storage of Biometrics, B.S. Thesis, Australian National University, 2001, available online at Department of Defense Office of the Inspector General (Information Technology Management), Terrorism Information Awareness Program (D ). December A. Y. Johnson, J. Sun, and A. F. Bobick, Predicting large population data cumulative match characteristic performance from small population data, 4th International Conference on Audio- and Video Based Biometric Person Authentication (AVBPA 2003), University of Surrey, Guildford, UK, June A. Y. Johnson, J. Sun, and A. F. Bobick, Using similarity scores from a small gallery to estimate recognition performance for larger galleries, IEEE International Workshop on Analysis and Modeling of Faces and Gestures held in conjunction with the International Conference on Computer Vision (ICCV 2003), Nice, France, October D. J. Buettner, Effects Of WSQ Compression On Client-Server Biometric Identification Performance, Proceedings of the 2002 International Conference on Artificial Intelligence (IC-AI 02), Vol. 1, pg , June R. Saucier, "Computer Generation of Statistical Distributions", Army Research Laboratory Technical Report, ARL-TR-2168, March S. Murphy, and H. Bray, Face recognition devices failed in test at Logan, The Boston Globe, Sept. 3, 2003, available on line at 09/03/face_recognition_devices_failed_in_test_a t_logan/ 45. See U.S. ports of entry documents found at editorial_0333.xml 2004 The MITRE Corporation and The Aerospace Corporation All Rights Reserved. Page 7 of 7

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge

More information

Impact of Resolution and Blur on Iris Identification

Impact of Resolution and Blur on Iris Identification 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 Abstract

More information

Evaluation of Biometric Systems. Christophe Rosenberger

Evaluation of Biometric Systems. Christophe Rosenberger Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC

More information

Title Goes Here Algorithms for Biometric Authentication

Title Goes Here Algorithms for Biometric Authentication Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing

More information

Design Science Research Methods. Prof. Dr. Roel Wieringa University of Twente, The Netherlands

Design Science Research Methods. Prof. Dr. Roel Wieringa University of Twente, The Netherlands Design Science Research Methods Prof. Dr. Roel Wieringa University of Twente, The Netherlands www.cs.utwente.nl/~roelw UFPE 26 sept 2016 R.J. Wieringa 1 Research methodology accross the disciplines Do

More information

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...

More information

SVC2004: First International Signature Verification Competition

SVC2004: First International Signature Verification Competition SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University

More information

Research on Friction Ridge Pattern Analysis

Research on Friction Ridge Pattern Analysis Research on Friction Ridge Pattern Analysis Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York Research Supported by National Institute

More information

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database Roll versus Plain Prints: An Experimental Study Using the NIST SD 9 Database Rohan Nadgir and Arun Ross West Virginia University, Morgantown, WV 5 June 1 Introduction The fingerprint image acquired using

More information

The Center for Identification Technology Research (CITeR)

The Center for Identification Technology Research (CITeR) The Center for Identification Technology Research () Presented by Dr. Stephanie Schuckers February 24, 2011 Status Report is an NSF Industry/University Cooperative Research Center (IUCRC) The importance

More information

Effective and Efficient Fingerprint Image Postprocessing

Effective and Efficient Fingerprint Image Postprocessing Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg

More information

A Study of Distortion Effects on Fingerprint Matching

A Study of Distortion Effects on Fingerprint Matching A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department

More information

FACE VERIFICATION SYSTEM IN MOBILE DEVICES BY USING COGNITIVE SERVICES

FACE VERIFICATION SYSTEM IN MOBILE DEVICES BY USING COGNITIVE SERVICES International Journal of Intelligent Systems and Applications in Engineering Advanced Technology and Science ISSN:2147-67992147-6799 www.atscience.org/ijisae Original Research Paper FACE VERIFICATION SYSTEM

More information

Biometrics and Fingerprint Authentication Technical White Paper

Biometrics and Fingerprint Authentication Technical White Paper Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical

More information

A Generative Model for Fingerprint Minutiae

A Generative Model for Fingerprint Minutiae A Generative Model for Fingerprint Minutiae Qijun Zhao, Yi Zhang Sichuan University {qjzhao, yi.zhang}@scu.edu.cn Anil K. Jain Michigan State University jain@cse.msu.edu Nicholas G. Paulter Jr., Melissa

More information

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS

More information

Advances in Iris Recognition Interoperable Iris Recognition systems

Advances in Iris Recognition Interoperable Iris Recognition systems Advances in Iris Recognition Interoperable Iris Recognition systems Date 5/5/09 Agenda How best to meet operational requirements Historical Overview of iris technology The current standard Market and Technological

More information

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area

More information

Distinguishing Identical Twins by Face Recognition

Distinguishing Identical Twins by Face Recognition Distinguishing Identical Twins by Face Recognition P. Jonathon Phillips, Patrick J. Flynn, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick J. Grother, George W. Quinn, and Matthew Pruitt Abstract The

More information

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea

More information

Experiments with An Improved Iris Segmentation Algorithm

Experiments with An Improved Iris Segmentation Algorithm Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.

More information

Iris Recognition using Histogram Analysis

Iris Recognition using Histogram Analysis Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition

More information

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit)

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit) Exhibit R-2 0602308A Advanced Concepts and Simulation ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit) FY 2005 FY 2006 FY 2007 FY 2008 FY 2009 FY 2010 FY 2011 Total Program Element (PE) Cost 22710 27416

More information

Review of Major Testing Initiatives and Recent Technical Advances

Review of Major Testing Initiatives and Recent Technical Advances Review of Major Testing Initiatives and Recent Technical Advances Dr. James L. Wayman San Jose State University 1 TECHNICAL ADVANCES Lab Iris Face Voice Fingerprint Hand Geometry 2 Recent Technical Advances

More information

28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies 8th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies A LOWER BOUND ON THE STANDARD ERROR OF AN AMPLITUDE-BASED REGIONAL DISCRIMINANT D. N. Anderson 1, W. R. Walter, D. K.

More information

The 2019 Biometric Technology Rally

The 2019 Biometric Technology Rally DHS SCIENCE AND TECHNOLOGY The 2019 Biometric Technology Rally Kickoff Webinar, November 5, 2018 Arun Vemury -- DHS S&T Jake Hasselgren, John Howard, and Yevgeniy Sirotin -- The Maryland Test Facility

More information

Non-Contact Vein Recognition Biometrics

Non-Contact Vein Recognition Biometrics Non-Contact Vein Recognition Biometrics www.nearinfraredimaging.com 508-384-3800 info@nearinfraredimaging.com NII s technology is multiple modality non-contact vein-recognition biometrics, the visualization

More information

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets CCV: The 5 th sian Conference on Computer Vision, 3-5 January, Melbourne, ustralia Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets Sylvain Bernard,, Nozha Boujemaa, David Vitale,

More information

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication

More information

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,

More information

MODIFICATION OF ADAPTIVE LOGARITHMIC METHOD FOR DISPLAYING HIGH CONTRAST SCENES BY AUTOMATING THE BIAS VALUE PARAMETER

MODIFICATION OF ADAPTIVE LOGARITHMIC METHOD FOR DISPLAYING HIGH CONTRAST SCENES BY AUTOMATING THE BIAS VALUE PARAMETER International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 73-77 MODIFICATION OF ADAPTIVE LOGARITHMIC METHOD FOR DISPLAYING HIGH CONTRAST SCENES BY

More information

3D Face Recognition in Biometrics

3D Face Recognition in Biometrics 3D Face Recognition in Biometrics CHAO LI, ARMANDO BARRETO Electrical & Computer Engineering Department Florida International University 10555 West Flagler ST. EAS 3970 33174 USA {cli007, barretoa}@fiu.edu

More information

INSTRUCTIONAL MATERIALS ADOPTION

INSTRUCTIONAL MATERIALS ADOPTION INSTRUCTIONAL MATERIALS ADOPTION Score Sheet I. Generic Evaluation Criteria II. Instructional Content Analysis III. Specific Science Criteria GRADE: 11-12 VENDOR: CORD COMMUNICATIONS, INC. COURSE: PHYSICS-TECHNICAL

More information

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor

More information

Computer Vision in Human-Computer Interaction

Computer Vision in Human-Computer Interaction Invited talk in 2010 Autumn Seminar and Meeting of Pattern Recognition Society of Finland, M/S Baltic Princess, 26.11.2010 Computer Vision in Human-Computer Interaction Matti Pietikäinen Machine Vision

More information

Subjective Study of Privacy Filters in Video Surveillance

Subjective Study of Privacy Filters in Video Surveillance Subjective Study of Privacy Filters in Video Surveillance P. Korshunov #1, C. Araimo 2, F. De Simone #3, C. Velardo 4, J.-L. Dugelay 5, and T. Ebrahimi #6 # Multimedia Signal Processing Group MMSPG, Institute

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

Pattern Recognition in Blur Motion Noisy Images using Fuzzy Methods for Response Integration in Ensemble Neural Networks

Pattern Recognition in Blur Motion Noisy Images using Fuzzy Methods for Response Integration in Ensemble Neural Networks Pattern Recognition in Blur Motion Noisy Images using Methods for Response Integration in Ensemble Neural Networks M. Lopez 1, 2 P. Melin 2 O. Castillo 2 1 PhD Student of Computer Science in the Universidad

More information

HDR imaging Automatic Exposure Time Estimation A novel approach

HDR imaging Automatic Exposure Time Estimation A novel approach HDR imaging Automatic Exposure Time Estimation A novel approach Miguel A. MARTÍNEZ,1 Eva M. VALERO,1 Javier HERNÁNDEZ-ANDRÉS,1 Javier ROMERO,1 1 Color Imaging Laboratory, University of Granada, Spain.

More information

DESIGN AND CAPABILITIES OF AN ENHANCED NAVAL MINE WARFARE SIMULATION FRAMEWORK. Timothy E. Floore George H. Gilman

DESIGN AND CAPABILITIES OF AN ENHANCED NAVAL MINE WARFARE SIMULATION FRAMEWORK. Timothy E. Floore George H. Gilman Proceedings of the 2011 Winter Simulation Conference S. Jain, R.R. Creasey, J. Himmelspach, K.P. White, and M. Fu, eds. DESIGN AND CAPABILITIES OF AN ENHANCED NAVAL MINE WARFARE SIMULATION FRAMEWORK Timothy

More information

CircumSpect TM 360 Degree Label Verification and Inspection Technology

CircumSpect TM 360 Degree Label Verification and Inspection Technology CircumSpect TM 360 Degree Label Verification and Inspection Technology Written by: 7 Old Towne Way Sturbridge, MA 01518 Contact: Joe Gugliotti Cell: 978-551-4160 Fax: 508-347-1355 jgugliotti@machinevc.com

More information

Automatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval

Automatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval Automatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval Sheraz Ahmed, Koichi Kise, Masakazu Iwamura, Marcus Liwicki, and Andreas Dengel German Research Center for

More information

BIOMETRICS BY- VARTIKA PAUL 4IT55

BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

More information

3D Face Recognition System in Time Critical Security Applications

3D Face Recognition System in Time Critical Security Applications Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications

More information

Artificial Life Simulation on Distributed Virtual Reality Environments

Artificial Life Simulation on Distributed Virtual Reality Environments Artificial Life Simulation on Distributed Virtual Reality Environments Marcio Lobo Netto, Cláudio Ranieri Laboratório de Sistemas Integráveis Universidade de São Paulo (USP) São Paulo SP Brazil {lobonett,ranieri}@lsi.usp.br

More information

About user acceptance in hand, face and signature biometric systems

About user acceptance in hand, face and signature biometric systems About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación

More information

Head-Movement Evaluation for First-Person Games

Head-Movement Evaluation for First-Person Games Head-Movement Evaluation for First-Person Games Paulo G. de Barros Computer Science Department Worcester Polytechnic Institute 100 Institute Road. Worcester, MA 01609 USA pgb@wpi.edu Robert W. Lindeman

More information

Chess Beyond the Rules

Chess Beyond the Rules Chess Beyond the Rules Heikki Hyötyniemi Control Engineering Laboratory P.O. Box 5400 FIN-02015 Helsinki Univ. of Tech. Pertti Saariluoma Cognitive Science P.O. Box 13 FIN-00014 Helsinki University 1.

More information

Intelligent Identification System Research

Intelligent Identification System Research 2016 International Conference on Manufacturing Construction and Energy Engineering (MCEE) ISBN: 978-1-60595-374-8 Intelligent Identification System Research Zi-Min Wang and Bai-Qing He Abstract: From the

More information

AR 2 kanoid: Augmented Reality ARkanoid

AR 2 kanoid: Augmented Reality ARkanoid AR 2 kanoid: Augmented Reality ARkanoid B. Smith and R. Gosine C-CORE and Memorial University of Newfoundland Abstract AR 2 kanoid, Augmented Reality ARkanoid, is an augmented reality version of the popular

More information

Semi-Automatic Antenna Design Via Sampling and Visualization

Semi-Automatic Antenna Design Via Sampling and Visualization MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Semi-Automatic Antenna Design Via Sampling and Visualization Aaron Quigley, Darren Leigh, Neal Lesh, Joe Marks, Kathy Ryall, Kent Wittenburg

More information

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS List of Journals with impact factors Date retrieved: 1 August 2009 Journal Title ISSN Impact Factor 5-Year Impact Factor 1. ACM SURVEYS 0360-0300 9.920 14.672 2. VLDB JOURNAL 1066-8888 6.800 9.164 3. IEEE

More information

Fuzzy-Heuristic Robot Navigation in a Simulated Environment

Fuzzy-Heuristic Robot Navigation in a Simulated Environment Fuzzy-Heuristic Robot Navigation in a Simulated Environment S. K. Deshpande, M. Blumenstein and B. Verma School of Information Technology, Griffith University-Gold Coast, PMB 50, GCMC, Bundall, QLD 9726,

More information

Executive Summary. Chapter 1. Overview of Control

Executive Summary. Chapter 1. Overview of Control Chapter 1 Executive Summary Rapid advances in computing, communications, and sensing technology offer unprecedented opportunities for the field of control to expand its contributions to the economic and

More information

Segmentation of Fingerprint Images Using Linear Classifier

Segmentation of Fingerprint Images Using Linear Classifier EURASIP Journal on Applied Signal Processing 24:4, 48 494 c 24 Hindawi Publishing Corporation Segmentation of Fingerprint Images Using Linear Classifier Xinjian Chen Intelligent Bioinformatics Systems

More information

The Role of Biometrics in Virtual Communities. and Digital Governments

The Role of Biometrics in Virtual Communities. and Digital Governments The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024

More information

Designing Semantic Virtual Reality Applications

Designing Semantic Virtual Reality Applications Designing Semantic Virtual Reality Applications F. Kleinermann, O. De Troyer, H. Mansouri, R. Romero, B. Pellens, W. Bille WISE Research group, Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussels, Belgium

More information

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) www.irjaet.com ISSN (PRINT) : 2454-4744 ISSN (ONLINE): 2454-4752 Vol. 1, Issue 4, pp.240-245, November, 2015 IRIS RECOGNITION

More information

Touchless Fingerprint Recognization System

Touchless Fingerprint Recognization System e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph

More information

Responsible Data Use Assessment for Public Realm Sensing Pilot with Numina. Overview of the Pilot:

Responsible Data Use Assessment for Public Realm Sensing Pilot with Numina. Overview of the Pilot: Responsible Data Use Assessment for Public Realm Sensing Pilot with Numina Overview of the Pilot: Sidewalk Labs vision for people-centred mobility - safer and more efficient public spaces - requires a

More information

Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction

Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction Pattern Recognition 40 (2007) 1270 1281 www.elsevier.com/locate/pr Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction Feng Zhao, Xiaoou Tang Department of Information Engineering,

More information

Software Development Kit to Verify Quality Iris Images

Software Development Kit to Verify Quality Iris Images Software Development Kit to Verify Quality Iris Images Isaac Mateos, Gualberto Aguilar, Gina Gallegos Sección de Estudios de Posgrado e Investigación Culhuacan, Instituto Politécnico Nacional, México D.F.,

More information

This list supersedes the one published in the November 2002 issue of CR.

This list supersedes the one published in the November 2002 issue of CR. PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK NC-FACE DATABASE FOR FACE AND FACIAL EXPRESSION RECOGNITION DINESH N. SATANGE Department

More information

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical

More information

Industry 4.0: the new challenge for the Italian textile machinery industry

Industry 4.0: the new challenge for the Italian textile machinery industry Industry 4.0: the new challenge for the Italian textile machinery industry Executive Summary June 2017 by Contacts: Economics & Press Office Ph: +39 02 4693611 email: economics-press@acimit.it ACIMIT has

More information

Segmentation of Fingerprint Images

Segmentation of Fingerprint Images Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

Challenges and Potential Research Areas In Biometrics

Challenges and Potential Research Areas In Biometrics Challenges and Potential Research Areas In Biometrics Defence Research and Development Canada Qinghan Xiao and Karim Dahel Defence R&D Canada - Ottawa October 18, 2004 Recherche et développement pour la

More information

Technology Engineering and Design Education

Technology Engineering and Design Education Technology Engineering and Design Education Grade: Grade 6-8 Course: Technological Systems NCCTE.TE02 - Technological Systems NCCTE.TE02.01.00 - Technological Systems: How They Work NCCTE.TE02.02.00 -

More information

Extending X3D for Augmented Reality

Extending X3D for Augmented Reality Extending X3D for Augmented Reality Seventh AR Standards Group Meeting Anita Havele Executive Director, Web3D Consortium www.web3d.org anita.havele@web3d.org Nov 8, 2012 Overview X3D AR WG Update ISO SC24/SC29

More information

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Research Supervisor: Minoru Etoh (Professor, Open and Transdisciplinary Research Initiatives, Osaka University)

More information

LENSLESS IMAGING BY COMPRESSIVE SENSING

LENSLESS IMAGING BY COMPRESSIVE SENSING LENSLESS IMAGING BY COMPRESSIVE SENSING Gang Huang, Hong Jiang, Kim Matthews and Paul Wilford Bell Labs, Alcatel-Lucent, Murray Hill, NJ 07974 ABSTRACT In this paper, we propose a lensless compressive

More information

The use of a cast to generate person-biased photo-albums

The use of a cast to generate person-biased photo-albums The use of a cast to generate person-biased photo-albums Dave Grosvenor Media Technologies Laboratory HP Laboratories Bristol HPL-2007-12 February 5, 2007* photo-album, cast, person recognition, person

More information

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer.

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer. a Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document,

More information

Texture characterization in DIRSIG

Texture characterization in DIRSIG Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 2001 Texture characterization in DIRSIG Christy Burtner Follow this and additional works at: http://scholarworks.rit.edu/theses

More information

Chapter 6 Face Recognition at a Distance: System Issues

Chapter 6 Face Recognition at a Distance: System Issues Chapter 6 Face Recognition at a Distance: System Issues Meng Ao, Dong Yi, Zhen Lei, and Stan Z. Li Abstract Face recognition at a distance (FRAD) is one of the most challenging forms of face recognition

More information

BODILY NON-VERBAL INTERACTION WITH VIRTUAL CHARACTERS

BODILY NON-VERBAL INTERACTION WITH VIRTUAL CHARACTERS KEER2010, PARIS MARCH 2-4 2010 INTERNATIONAL CONFERENCE ON KANSEI ENGINEERING AND EMOTION RESEARCH 2010 BODILY NON-VERBAL INTERACTION WITH VIRTUAL CHARACTERS Marco GILLIES *a a Department of Computing,

More information

How Many Pixels Do We Need to See Things?

How Many Pixels Do We Need to See Things? How Many Pixels Do We Need to See Things? Yang Cai Human-Computer Interaction Institute, School of Computer Science, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15213, USA ycai@cmu.edu

More information

BIOMETRIC IDENTIFICATION USING 3D FACE SCANS

BIOMETRIC IDENTIFICATION USING 3D FACE SCANS BIOMETRIC IDENTIFICATION USING 3D FACE SCANS Chao Li Armando Barreto Craig Chin Jing Zhai Electrical and Computer Engineering Department Florida International University Miami, Florida, 33174, USA ABSTRACT

More information

Card IEEE Symposium Series on Computational Intelligence

Card IEEE Symposium Series on Computational Intelligence 2015 IEEE Symposium Series on Computational Intelligence Cynthia Sthembile Mlambo Council for Scientific and Industrial Research Information Security Pretoria, South Africa smlambo@csir.co.za Distortion

More information

Multimedia Virtual Laboratory: Integration of Computer Simulation and Experiment

Multimedia Virtual Laboratory: Integration of Computer Simulation and Experiment Multimedia Virtual Laboratory: Integration of Computer Simulation and Experiment Tetsuro Ogi Academic Computing and Communications Center University of Tsukuba 1-1-1 Tennoudai, Tsukuba, Ibaraki 305-8577,

More information

PHOTOGRAPHY Course Descriptions and Outcomes

PHOTOGRAPHY Course Descriptions and Outcomes PHOTOGRAPHY Course Descriptions and Outcomes PH 2000 Photography 1 3 cr. This class introduces students to important ideas and work from the history of photography as a means of contextualizing and articulating

More information

Law, Economics, Political Science, and Public Policy. Associate Professor F. Scott Kieff School of Law

Law, Economics, Political Science, and Public Policy. Associate Professor F. Scott Kieff School of Law Law, Economics, Political Science, and Public Policy Associate Professor F. Scott Kieff School of Law Thrust Objectives Study legal, economic, political, and social implications of Center's technical projects.

More information

A Proposal for Security Oversight at Automated Teller Machine System

A Proposal for Security Oversight at Automated Teller Machine System International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.18-25 A Proposal for Security Oversight at Automated

More information

DIGITALGLOBE ATMOSPHERIC COMPENSATION

DIGITALGLOBE ATMOSPHERIC COMPENSATION See a better world. DIGITALGLOBE BEFORE ACOMP PROCESSING AFTER ACOMP PROCESSING Summary KOBE, JAPAN High-quality imagery gives you answers and confidence when you face critical problems. Guided by our

More information

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,

More information

CS295-1 Final Project : AIBO

CS295-1 Final Project : AIBO CS295-1 Final Project : AIBO Mert Akdere, Ethan F. Leland December 20, 2005 Abstract This document is the final report for our CS295-1 Sensor Data Management Course Final Project: Project AIBO. The main

More information

The secret behind mechatronics

The secret behind mechatronics The secret behind mechatronics Why companies will want to be part of the revolution In the 18th century, steam and mechanization powered the first Industrial Revolution. At the turn of the 20th century,

More information

Years 9 and 10 standard elaborations Australian Curriculum: Digital Technologies

Years 9 and 10 standard elaborations Australian Curriculum: Digital Technologies Purpose The standard elaborations (SEs) provide additional clarity when using the Australian Curriculum achievement standard to make judgments on a five-point scale. They can be used as a tool for: making

More information

Color Constancy Using Standard Deviation of Color Channels

Color Constancy Using Standard Deviation of Color Channels 2010 International Conference on Pattern Recognition Color Constancy Using Standard Deviation of Color Channels Anustup Choudhury and Gérard Medioni Department of Computer Science University of Southern

More information

Partner sought to develop a Free Viewpoint Video capture system for virtual and mixed reality applications

Partner sought to develop a Free Viewpoint Video capture system for virtual and mixed reality applications Technology Request Partner sought to develop a Free Viewpoint Video capture system for virtual and mixed reality applications Summary An Austrian company active in the area of artistic entertainment and

More information

Proposers Day Workshop

Proposers Day Workshop Proposers Day Workshop Monday, January 23, 2017 @srcjump, #JUMPpdw Cognitive Computing Vertical Research Center Mandy Pant Academic Research Director Intel Corporation Center Motivation Today s deep learning

More information

Individuality of Fingerprints

Individuality of Fingerprints Individuality of Fingerprints Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York srihari@cedar.buffalo.edu IAI Conference, San Diego, CA

More information

Report to Congress regarding the Terrorism Information Awareness Program

Report to Congress regarding the Terrorism Information Awareness Program Report to Congress regarding the Terrorism Information Awareness Program In response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, 111(b) Executive Summary May 20, 2003

More information

Biometrics technology: Faces

Biometrics technology: Faces References: [FC1] [FC2] Biometrics technology: Faces Toshiaki Kondo and Hong Yan, "Automatic human face detection and recognition under nonuniform illumination ", Pattern Recognition, Volume 32, Issue

More information

Application of GIS to Fast Track Planning and Monitoring of Development Agenda

Application of GIS to Fast Track Planning and Monitoring of Development Agenda Application of GIS to Fast Track Planning and Monitoring of Development Agenda Radiometric, Atmospheric & Geometric Preprocessing of Optical Remote Sensing 13 17 June 2018 Outline 1. Why pre-process remotely

More information