Abstract
We discuss the effect of an optimisation strategy to be applied to image data in a smart card based face verification system. Accordingly, we propose a system architecture considering the trade-off between performance versus the improvement of memory and bandwidth management. In order to establish the system limitations, studies were performed on the XM2VTS and FERET databases demonstrating that, spatial and grey level resolution as well as JPEG compression settings for face representation can be optimised from the point of view of verification error. We show that the use of a fixed precision data type does not affect system performance very much but can speed up the verification process. Since the optimisation framework of such a system is very complicated, the search space was simplified by applying some heuristics to the problem. In the adopted suboptimal search strategy one parameter is optimised at a time. The optimisation of one stage in the sequence was carried out for the parameters of the subsequent stages. Different results were achieved on different databases, indicating that the selection of different optimum parameters for system evaluation may call for different optimum operating points.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bourlai, T., Kittler, J., Messer, K.: Jpeg compression effects on a smart card face verification system. In: Submitted for acceptance in IAPR Conference on Machine Vision Applications, May 16-18 (2005)
Bourlai, T., Messer, K., Kittler, J.: Face verification system architecture using smart cards. In: The Proceedings of the 17th International Conference on Pattern Recognition, ICPR 2004, August 23-26, vol. 1, pp. 793–796 (2004)
Bourlai, T., Messer, K., Kittler, J.: Performance versus computational complexity trade-off in face verification. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 169–177. Springer, Heidelberg (2004)
Leuttin, J., MaÃtre, G.: Evaluation protocol for the extended m2vts database (xm2vts). IDIAP (Dalle Molle Institute for Perceptual Artificial Intelligence (July 1998)
Li, Y.P., Kittler, J., Matas, J.: Face verification using client specific fisher faces. In: Kent, J.T., Aykroyd, R.G. (eds.) Proc. Int. conf. on The Statistics of Directions, Shapes and Images, September 2000, pp. 63–66 (2000)
Messer, K., Matas, J., Kittler, J., Luettin, J., Maitre, G.: Xm2vtsdb: The extended m2vts database. In: AVBPA, March 1999, pp. 72–77 (1999)
Phillips, P.J., Moon, H.J., Rizvi, S.A., Rauss, P.J.: ‘The feret evaluation methodology for face-recognition algorithms’. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI) 22(10), 1090–1104 (2000)
Santa-Crus, D., Ebrahimi, T.: A study of jpeg 2000 still image coding versus other standards. In: Proc. Of the X European Signal Processing Conference, Signal Processing Laboratory, Swiss Federal Institute of Technology, Lausanne, pp. 673–676 (September 2002)
Rabbani, M.: The jpeg 2000 still-image compresion standard. Eastman Kodak Research Labs, Diego Santa Cruz (2003)
Turk, M., Pentland, A.: Eigenfaces for recognition. J. Cognitive NeuroscienceIEEE Transactions on Pattern Analysis and Machine Intelligence 3(1), 71–86 (1991)
Zhao, W., Chellappa, R., Rosenfeld, A., Phillips, P.: Face recognition: A literature survey, UMD CfAR Technical Report CAR-TR-948 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bourlai, T., Messer, K., Kittler, J. (2005). Scenario Based Performance Optimisation in Face Verification Using Smart Cards. In: Kanade, T., Jain, A., Ratha, N.K. (eds) Audio- and Video-Based Biometric Person Authentication. AVBPA 2005. Lecture Notes in Computer Science, vol 3546. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527923_30
Download citation
DOI: https://doi.org/10.1007/11527923_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-27887-0
Online ISBN: 978-3-540-31638-1
eBook Packages: Computer ScienceComputer Science (R0)