Face Recognition Today

advertisement
Part 1 Ideas for themes/topics/misconceptions
1. Biometrics – Reality and Myths
2. Biometrics in Real Life
3. Biometrics –privacy
Hollywood Face Recognition
Common misconceptions
– 100% match to any image at
any angle
– Instantly recognize any
person
– Tied into a “super database”
that knows who everyone is
– Available to and in use by
law enforcement
Movie scene
(downloaded from www
pubic domain)
Hollywood DNA
Misconceptions
– Access to a super
database that has
everyone’s DNA
– Automatically and
rapidly processes a
sample
Movie scene
(Pubic domain)
Hollywood Fingerprints
Common misconceptions
– instant match
– Only one fingerprint is
enough
– Available to use at any
location
Screenshot from “Man in black” movie
(Pubic domain)
Face Recognition Today
• Today’s Reality
– Affected by lighting, angle,
quality of captured image
– Requires a “high-end”
computer for real-time face
capture/processing
– Many are stand-alone
systems
– Being evaluated, not
deployed
Ft. Lauderdale Airport, Florida
IdentiFace system interface
Face Recognition Today
• Today’s Reality
– Varying confidence of match
depending on application
– Multiple unique and
proprietary image formats
make sharing hard
– Intelligence images not
available to local law
enforcement or corrections
– Data sharing across jurisdictions
is a problem
100 known images in the database
Identiface
Face Recognition Today
• Face Recognition Vendor Test 2002
and 2006 provides independent
government evaluations of
commercially available and mature
prototype face recognition systems.
• Results available at
http://www.itl.nist.gov/iad/894.03/f
ace/face.html
•
•
•
•
FRVT 2002 and 2006 evaluated
performance on:
High resolution still imagery (5 to
6 mega-pixels)
3D facial scans
Multi-sample still facial imagery
Pre-processing algorithms that
compensate for pose and
illumination
FpVTE Fingerprint Vendor Technology
Evaluation
• The Fingerprint Vendor Technology Evaluation (FpVTE) 2003 is an
independently administered technology evaluation of fingerprint
matching, identification, and verification systems.
• Assessed the capability of 18 vendors fingerprint systems to meet
requirements for large-scale and small-scale real applications.
• Consists of multiple tests performed with combinations of fingers and
different types and qualities of operational fingerprints
• Conducted by the National Institute of Standards & Technology (NIST)
between October and November 2003 on behalf of U.S. Department of
Justice.
• Report made public in June 2004 at http://FpVTE.nist.gov
FpVTE Fingerprint Vendor Technology
Evaluation
Some of the Results
• Systems that performed most accurately were developed by
NEC, SAGEM, and Cogent
• The variables that had the largest effect on system accuracy
were the number of fingers used and fingerprint quality.
• Different systems were distinguished by how they performed
across the spectrum from good to bad (performance
separation was really on “bad” quality).
Applications: Biometrics in Schools
•
National News Reports
•
•
Interior System
Exterior System
Eleven, Single-Eye LG Electronics
IrisAccess 2200 Iris Recognition
Cameras were Evaluated
– 6 cameras within closed areas in
3 schools
– 5 cameras were located
outdoors with fabricated
protective closures
Unsuccessful attempts mostly due to
camera capture errors (16%) and
access attempts by unknown users
(5.8%)
Issues remaining:
– Tailgating (accepted users
holding door open for others)
– Ability to Capture Iris Outdoors
(lighting conditions)
Applications: Biometrics in Correction
Facilities
•
Demonstration and Assessment of
Facial Recognition Technology at
Prince George’s County Correctional
Facility (Visionics corporation)
• Visionics (now Identix) system
installed based on results of FRVT
2000
• Required re-work of room
lighting, addition of camera lights,
and training of staff and system
users.
• Interfaced with Staff and
Volunteer Access Control System
to verify identity of staff and
volunteers upon entry and exit
from the facility
• Augments manned access control
station
PRIVACY: Video surveillance
When you walk into a
building from a parking lot?
When you shop at your
favorite store?
Go to your bank?
Privacy: Video surveillance
When you buy gas for your
car?
Pay at a toll booth?
Video surveillance is a
daily fact of life.
Current motivation is
mostly to avoid theft in
commerce.
Summary:
• Biometric Technology is concerned with representation,
storage, matching, synthesis and visualization of biometric
information.
• Tremendous advance has been achieved over the last few
years in both fundamental theoretical development,
matching and synthesis, as well as biometric hardware and
software products.
• Many misconceptions remain, and are supported by mass
media and newspapers
• There are real privacy concerns with video surveillance
technology, which is not biometrics.
Part 2 Ideas for biometric theme – definitions,
variety of resources
1. Biometrics Identifiers - classification
2. Biometric market share
3. Biometric – how to make choice
Biometric identifiers
From G. Bromba research
Biometric Market Share
Comparison of biometric techniques
Palm
Hand vein
Facial Thermogram
Ear print
Retina
Which Biometric is the Best?
•
•
•
•
•
Universality (everyone should have this trait)
Uniqueness (everyone has a different value)
Permanence (should be invariant with time)
Collectability (can be measured quantitatively)
Performance (achievable recognition accuracy, resources
required, operating environment)
• Acceptability (are people willing to accept it?)
• Circumvention (how easily can it be spoofed?)
Selecting a Biometric
Selecting the ‘right’ biometric is a complicated problem
that involves more factors than just accuracy. It depends
on cost, error rates, computational speed, reliability,
privacy and easy of use.
Part 3 Historical artifacts
1. History of fingerprints
2. First automated computer systems
3. Historical artifacts
4. Fingerprint devices in real life
5. Optional – sensing devices
6. Face recognition – methods, illusions, image
synthesis
7. Other biometric devices
Cartoon (copyrighted)
History of fingerprints
• Use of fingerprints to associate a person with
an event or transaction can be traced to
ancient China, Babylonia and Assyria as early
as 6,000 BC.
28
Archaelogical remains
29
History of fingerprints
• 1750 B.C.- people in Babylon used
fingerprints to sign their identity on clay
tablets
• 300 B.C.-Emperors of China used
personalized clay seals
• In 1686, Marcello Malpighi, an anatomy
professor at the University of Bologna,
wrote in a paper that fingerprints
contained ridges, spirals and loops.
• In 1856, Sir William Herschel, a British
Magistrate in Jungipoor, India, used
fingerprints (actually palmprints) to certify
native contracts.
30
History of fingerprints
• During the 1870s, Dr. Henry Faulds, a British
surgeon in Japan, after noticing finger marks
on ancient pottery, studied fingerprints,
recognized the potential for identification,
and devised a method for classifying
fingerprint patterns.
• 1880 -Faulds published an article in
"Nature," discussing fingerprints as a means
of personal identification. He is also credited
with the first fingerprint identification of a
greasy fingerprint left on an alcohol bottle.
31
32
History of fingerprints
• In 1880, Alphonse Bertillon, a Paris police department
employee and son of an anthropologist, developed a system
of anthropometry as a means for classifying criminals and
used this system to identify recidivists.
Anthropometry (a system of cataloging an individual's body
measurements such as height, weight, lengths of arm, leg,
index finger etc.) was shown to fail in a famous case at
Leavenworth Prison, where two prisoners, both named
William West, were found to have nearly identical
measurements even though they claimed not to be
biologically related.
33
Alphonse Bertillon
Alphonse Bertillon
34
History of fingerprints
• Francis Galton, an anthropologist, began a systematic study of
fingerprints as a means of identification in the 1880s.
In 1892, he published the first book on fingerprints.
• In 1897, Sir Edward Henry, a British police officer in India,
established a modified fingerprint classification system using
Galton's observations. This system was ultimately adopted by
Scotland Yard in 1901 and is still used in many Englishspeaking countries.
35
Historical Overview
• Henry Faulds, William Herschel and Sir Francis Galton
proposed quantitative identification through fingerprint
and facial measurements in the 1880s.
• Edmond Locard introduced using
biometrics in forensic identification
in 1920s.
36
History of fingerprints
• 1924-an act of U.S. Congress established the Identification
Division of the FBI (Federal Bureau of Investigation) with a
database of 810 000 fingerprint cards
• Most of the early fingerprint identification systems were put
into place in major metropolitan areas or as national
repositories. Juan Vucetich established a fingerprint file
system in Argentina in 1891, followed by Sir Edward Henry in
1901 at Scotland Yard in England.
37
Classification: Manual Card Files
In the Henry classification system, numerical weights are
assigned to fingers with a whorl pattern. A bin number, based
on the sum of the weights for the right hand and sum of the
weights for the left hand is computed to generate 1,024
possible bins. Letter symbols are assigned to fingers: capital
letters to the index fingers and lower-case letters to other
fingers.
These are combined with the numeric code to further
subdivide the 1,024 bins. Each of these pattern groupings
defines bins into which fingerprint cards with the same
pattern group are placed.
A bin might be a folder in a file drawer or several file drawers if it
contains a common pattern group and the file is large.
38
Classification
• Fingerprint patterns comprise
of loops (left or right), whorls
and arches. The patterns are
differentiated based on the
presence of zero, one or two
delta regions.
A delta region is defined by a
tri-radial ridge direction at a
point. Arch patterns have no
delta, loops have one delta,
and whorls have two deltas.
Some of the common fingerprint
types. The core points are marked
with solid white circles while the
delta points are marked with solid
black circles.
39
Matching
Fingerprint matching prior to automation involved the manual
examination of the so-called Galton details (ridge endings,
bifurcations, lakes, islands, pores etc. collectively known as
"minutiae").
Prior to the late 1960s, neither the available computer
systems that could display fingerprint images for comparison
were affordable, nor a significant number of digital fingerprint
images were available for display. Consequently, the
comparison was manual, requiring a magnification glass for
comparing the features of the many candidate prints
manually retrieved from the database files.
40
Early Automation Efforts
• US NBS/NIST Research: In the mid-1960s, the National
Institute of Standards and Technology (NIST) initiated
several research projects to automate the fingerprint
identification process. The efforts were supported by the
Federal Bureau of Investigation (FBI) as part of an initiative
to automate many of the processes in the Bureau.
• Royal Canadian Police: By the mid-1960s, the fingerprint
collection of the Royal Canadian Mounted Police (RCMP)
had grown to over a million tenprint records. The videofile system was operational until the mid-1970s, when
the RCMP installed the first automated fingerprint
identification system (AFIS).
41
Early Automation Efforts
• FBI: In the USA, at about the same time that the RCMP and
the UK Home Office were looking for automation
technologies, the FBI was investigating the possibilities for
automating the fingerprint identification operations. In the
mid-1960s, the FBI signed research contracts with 3
companies to build a working prototype for scanning FBI
fingerprint cards, completed by the early 1970s.
• United Kingdom: In the UK, over about the same time-scale as
the FBI, the Home Office was working within its own Scientific
Research and Development Branch (SRDB).
• Japan: The Japanese National Police (JNP) who had a
fingerprint file of over six million records, also initiated study
of the automation possibilities.
42
Further Development
•
During the 1970s, the FBI contracted with a number of organizations as well as
developed their own research organization to manage the numerous projects that
lead the way to the Integrated Automated Fingerprint Identification System (IAFIS).
•
The transition to a large-scale imaging application environment provided
enormous challenges for everyone at that time, but it was especially challenging
for the FBI to implement a system to manage up to 35,000 image-based
transactions per day.
•
The efforts put into AFIS interoperability by NIST under the FBI sponsorship
resulted in an ANSI/NIST standard for data interchange. This standard was initially
crafted in mid-1980, is updated every 5 years and defines data formats for images,
features and text.
43
Early Devices
• The FBI initiated a research program to build an engineering model
of a scanner that could sample an object area of 1.5 X 1.5 in at 500
pixels per inch (DPI), with an effective sampling spot size of 0.0015
in, signal-to-noise ratio (S/N) in excess of 100:1 and digitized to at
least 6 bits (64 gray levels).
• In the late 1960s, these requirements could only be met by a
system that used a cathode ray tube and a precision deflection
system, an array of tubes that measure and reflected light, and
amplifier-digitizer to convert the electrical signal into a digital
value for each pixel.
• There were relatively few scanning devices by the late 1970s that
met the technical characteristics requirements of 500 dpi, a 0.0015
inch effective sample size, greater than 100 S/N noise ratio and a 6
bit dynamic range.
• It ten more years the scan quality standards were set by IAFIS,
which is the current benchmark for scanning of fingerprint images,
44
requiring 200 or more gray levels.
Overview
EarlyHistorical
Computerized
Systems
•
Speaker and fingerprint recognition systems were first AUTOMATED
systems in 1960. The potential for application of this technology to
high-security access control, personal locks and financial transactions
were recognized in the early 1960s.
•
The 1970s saw development and deployment of hand geometry
systems, the start of large-scale testing and increasing interest in
government use of these "automated personal identification"
technologies. There are currently 180 readers used by about 18,000
enrolled users.
•
Retinal and signature verification systems came in the 1980s, followed
by the face systems.
•
Iris recognition systems were developed in the 1990s.
45
Biometrics
and Privacy
Modern examples
Biometric measures can be used in place of a name, Social Security
number or other form of identification to secure anonymous transactions.
Walt Disney World sells season passes to buyers anonymously, then uses
finger geometry to verify that the passes are not being transferred. (Image of pass to
Disney World)
The real fear is that biometric measures will link people to personal data,
or allow movements to be tracked. After all, credit card and phone records
can be used in court to establish a person's activities and movements.
Phone books are public databases linking people to their phone number.
These databases are accessible on the Internet. “Reverse" phone books also exist (a
name from a phone number).
Unlike phone books, databases of biometric measures cannot
generally be reversed to reveal names from measures because biometric
measures, although distinctive, are not unique.
46
Modern Examples
47
Biometrics
and Privacy
Everyday applications
• Samples of these documents can be requested:
• Five US states have electronic fingerprint records of social service
recipients (Arizona, California, Connecticut, New York and Texas).
• Six states (California, Colorado, Georgia, Hawaii, Oklahoma and Texas)
maintain electronic fingerprints of all licensed drivers.
• Nearly all states maintain copies of driver's license and social service
recipient photos.
• FBI and state governments maintain fingerprint databases on convicted
felons and sex offenders.
• Federal government maintains hand geometry records on those who have
voluntarily requested border crossing cards.
48
•
Interesting facts
•
Like telephone and credit card information, biometric databases can be
searched outside of their intended purpose by court order.
•
Unlike credit card, telephone or Social Security numbers, biometric
characteristics change from one measurement to the next.
•
Unlike more common forms of identification, biometric measures contain
no personal information and are more difficult to forge or steal.
•
Biometric measures can be used in place of a name or Social Security
number to secure anonymous transactions.
•
Some biometric measures (face images, voice signals and "latent"
fingerprints left on surfaces) can be taken without a person's knowledge,
but cannot be linked to an identity without a pre-existing database.
•
Searching for personal data based on biometric measures is not as reliable
or efficient as using better identifiers, like legal name or Social Security
number.
•
Biometric measures are not always secret, but are sometimes publicly
observable and cannot be revoked if compromised.
Biometric and Privacy
49
OPTIONAL: Fingerprint Sensing: optical
FTIR
Frustered Total Internal Reflection (FTIR):
The oldest and most used livescan
technique. Reflection allows the
ridges (appear dark) to be
discriminated from the valleys
(appear bright). Because devices
sense a 3D surface, they cannot be
easily deceived by a photograph or
printed image of a fingerprint.
50
Fingerprint Sensing: FTIR with a sheet
prism
51
Optical Fibers
52
Optical Sensors
53
Ultrasound sensors
54
Solid State Sensing
Thermal
Electric Field
Piezoelectric
55
Really rare examples of fingerprints
56
Face Recognition (copyrighted
cartoon)
Imaging
Face tracking in digital cameras
FotoNation Face Tracker
http://www.fotonation.com/index.php?module=product&item=23
Tracking through background
Cha Zhang (Microsoft Research) – my
colleague- uses background
segmentation for face identification and
tracking
Psychological Aspects of Face
Perception and Recognition
Visually Derived Semantic Categories of Faces
Humans can recognize faces along a number of dimensions referred as
• “visually derived semantic categories”: race, sex, and age.
• personality characteristics (visually specified, albeit abstract, categories):
face that looks “generous”, or “extroverted”
An intriguing aspect of this phenomenon is that making such judgments
actually increases human accuracy when compared to making physical
feature-based judgments (e.g., nose size).
In contrast to the information needed to specify facial identity, visually
derived semantic categorizations are based on the features a face shares
with an entire category of faces.
There has been less research on the perception of visually derived semantic
categories than on the face recognition.
Thatcher illusion. The inverted face appears normal. Upright,
however, the configural distortion is evident. The illusion illustrates
the limits of configural processing for atypical views of the face.
Modeling expression
This system (FACS) is
purely descriptive and
includes no inferential
labels.
By converting codes to
EMFACS or similar
systems, face images
may be coded for
emotion-specified
expressions as well as
for more molar categories
of positive or negative
emotion.
64
Computationally-derived information
in images and three dimensional
head models that specifies the
gender of a face.
SUMMARY part 3
Although many recent advances and successes in automatic facial
expression analysis have been achieved, many questions remain
open. Some major ones are:
How do humans correctly recognize facial expressions?
Is it always better to analyze finer levels of expression?
Is there any better way to code facial expressions for computer
systems?
How do we obtain reliable ground truth?
How do we recognize facial expressions in real life?
Ho do we best use the temporal information?
How may we integrate facial expression analysis with other
modalities?
Which role psychology plays in the process?
What impact quality of devices has on the result of
recognition?
Other technologies – signature
authentication
Digitizing Tablet
Iris synthesis
An ocularist's approach to human iris synthesis. Lefohn et. al. 2003.
Used with permission.
Summary:
In BT lab, we are trying to find answer
on those and other questions related to
multi-modal biometric and intelligent
data representation and processing.
Asimo, Honda robot – one example of attempt
to make robot resemble humans in both
appearance and action.
Download