Skip to main content

Authenticating Corrupted Facial Images on Stand-Alone DSP System

  • Conference paper
Audio- and Video-Based Biometric Person Authentication (AVBPA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 3546))

  • 2278 Accesses

Abstract

In this paper, we propose a method of authenticating corrupted photo images based on noise parameter estimation and implement an authentication system using TMS320C6711 DSP chip. The proposed method first generates corrupted images and the noise parameters in the training phase. With a corrupted image and an original image, the noise parameters of the corrupted photo image can be estimated in the testing phase. Finally, we can make a synthesized photo image from the original photo image using the estimated noise parameters. We made some experiments on the prototype of the stand-alone system to verify the performance of the proposed method and to apply for real-life applications. The experimental results on this system show that the proposed method can estimate the noise parameters accurately and improve the performance of photo image authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Schölkopf, B., Smola, A., Müller, K.: Non-linear Component Analysis as a Kernel Eigenvalue Problem. Neural Computation 10(5), 1299–1319 (1998)

    Article  Google Scholar 

  2. Sanderson, C., Bengio, S.: Robust Features for Frontal Face Authentication in Difficult Image Condition. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 495–504. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Takahashi, T., Kurita, T.: Robust De-Noising by Kernel PCA. In: Proc. of Int. Conf. on Artificial Neural Networks, Madrid, Spain, pp. 739–744 (2002)

    Google Scholar 

  4. Turk, M., Pentland, A.: Eigenfaces for Recognition. Journal of Cognitive Neuroscience 12(1), 71–86 (1991)

    Article  Google Scholar 

  5. Hwang, B.-W., Byun, H., Roh, M.-C., Lee, S.-W.: Performance Evaluation of Face Recognition Algorithms on the Asian Face Database, KFDB. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 557–565. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Strang, G.: Linear Algebra and Its Applications, pp. 442–451. Harcourt Brace Jovanovich College Publishers, New York (1988)

    Google Scholar 

  7. Flusser, J., Suk, T.: Degraded Image Analysis: An Invariant Approach. IEEE Trans. on Pattern Analysis and Machine Intelligence 20(6), 590–603 (1998)

    Article  Google Scholar 

  8. IBM ZISC036 Data Sheet, http://www.ibm.com

  9. Yang, F., Paindavoine, M., Abdi, H.: Parallel Implementation on DSPs of a Face Detection Algorithm. In: Proc. of International Conference on the Software Process, Chicago, USA (1998)

    Google Scholar 

  10. Gilbert, J., Yang, W.: A Real-Time Face Recognition System Using Custom VLSI Hardware. In: Proc. of Computer Architectures for Machine Perceptron Workshop, New Orleans, USA, pp. 58–66 (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, SW., Jung, HC., Lee, SW. (2005). Authenticating Corrupted Facial Images on Stand-Alone DSP System. In: Kanade, T., Jain, A., Ratha, N.K. (eds) Audio- and Video-Based Biometric Person Authentication. AVBPA 2005. Lecture Notes in Computer Science, vol 3546. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527923_103

Download citation

  • DOI: https://doi.org/10.1007/11527923_103

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27887-0

  • Online ISBN: 978-3-540-31638-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics