Abstract
On October 10, 2001, the US President identified the most wanted persons sought by the United States of America. Agencies such as FBI, CIA and Homeland Security spread images of the most wanted persons across the United States. Even though US citizens saw their images on television, the Internet and posters, computers had, and still have for that matter, no ability at all to identify these persons. To date FBI, CIA and Homeland Security depend entirely on human beings, not computers, to identify persons at borders and international airports. In other words, facial recognition remains an incompetent technology.
Accordingly, authors first succinctly show the weaknesses of the current facial recognition methodologies, namely Eigenface Technology, Local Feature Analysis (from the classical 7 point to the 32–50 blocks approach), the Scale-Space Approach, Morphological Operations and industrial or patented methodologies such as ILEFIS™, Viisage™, Visionics™ and Cognitec’s FaceVACS-Logon™, Identix™ and Neven Vision™. Secondly, they introduce a completely new, simple and robust methodology called Innertron.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Patsuris, P. (2004), Homeland Security: Viisage Puts On A Good Face, 04.22.04, 8:00 AM ET, See: http://www.forbes.com/technology/2004/04/22/cx_pp_0421visage_ii.html
OMIT, http://www.forbes.com/technology/2004/04/22/cx_pp_0421visage_ii.html
See: http://www.frost.com/prod/servlet/search-results.pag?srchid=28266978
Morrison, P. (2002), More Than a Face in the Crowd, WPI Transofmations, See: http://www.wpi.edu/News/Transformations/2002Spring/face.html
Bray, H. (2002), The Boston Globe, Jul 17, See: http://www.boston.com/dailyglobe2/198/metro/_Face_testing_at_Logan_is_found_lacking+.shtml
Willing, R. (2003), Airport anti-terror systems flub tests, USA TODAY, Posted 9/1/2003, 11:14 PM, Updated 9/2/2003, 7:53 AM, See: http://www.usatoday.com/news/nation/2003-09-01-faces-usat_x.htm
See: http://www.identix.com/products/pro_security_bnp_argus.html
Stanley, J., Steinhardt, B. (2002), Drawing a Blank: The failure of facial recognition technology, in Tampa, Florida, AN ACLU SPECIAL REPORT, Jan 3
Black, J. (2001), Face It, Face-Cams Are Here to Stay, BusinessWeek Online, NOVEMBER 15, 2001. See: http://www.businessweek.com/bwdaily/dnflash/nov2001/nf20011115_3919.htm
Feder B. (2004), Technology Strains to Find Menace in the Crowd; Face-Recognition Technology Comes of Age. The New York Times, 06/04/2004, See: http://www.policeone.com/police-technology/software/facial/articles/88418/
Thalheim, L., Krissler, J., Ziegler, P. (2002), Body Check: Biometric Access Protection Devices and their Programs, Put to the Testc’t 11/2002, page 114 Biometrie, See: http://www.heise.de/ct/english/02/11/114/
Leyden, J. (2002), The Register, Security-Biometric sensors beaten senseless in tests, published Thursday, 23rd May, 2002, 05:44 GMT. See: http://www.theregister.com/2002/05/23/biometric_sensors_beaten_senseless/
Neven, H. (2004), Neven Vision Machine Technology, See: http://www.nevenvision.com/co_neven.html
Pasquerello, M. (2004), Neven Vision and Graphco Blend Face and Voice Recognition to Secure Military, Government and Transportation Facilities, in BiometritchNews, May 12, 2004, See: http://www.tmcnet.com/usubmit/2004/May/1041332.htm
Okada, K. (2001), Analysis, Synthesis and Recognition of Human Faces with Pose Variations, Ph.D. Thesis, Univ. of Southern California, Computer Science
Graham, D., Allinson, N. (1998), Characterizing virtual eigensignatures for general purpose face recognition, in Face Recognition: From Theory to Applications, Springer-Verlag, 446–456
Graham, D., Allinson, N. (1998), Face recognition from unfamiliar views: Subspace methods and pose dependency, in Proceedings of Third International Conference on Automatic Face and Gesture Recognition, 348–353
Wieghardt, J., von der Malsburg, C. (2000), Pose-independent object representation by 2-D views, in Proceedings of IEEE International Workshop on Biologically Motivated Computer Vision, May
Turk M. and Pentland, A. (1991), Face recognition using eigenfaces, in Proc. IEEE Conference on Computer Vision and Pattern Recognition, Maui, Hawaii
Turk M. and Pentland, A. (1991), Eigenfaces for recognition, in Journal of Cognitive Neuroscience, Vol. 3, No. 1, 71–86
See: http://www.cs.ucsb.edu/etc/news/past/2000.shtml
Marcus., Minc. 1988 Page 144.
Pentland A., Moghaddam, B., Starner, T., Oliyide, O., Turk, M. (1993), View-Based and Modular Eigenspaces for Face Recognition, Technical Report 245, MIT Media Lab.
Pentland L., Kirby, M. (1987), Low-dimensional procedure for the characterization of human faces, Journal of the Optical Society of America, No. 4, 519–524
Kirby, M., Sirovich, L. (1990), Application of the Karhunen-Loeve procedure for the characterization of human faces, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 12, No. 1, 103–108
Turk M. and Pentland, A. (1991), Eigenfaces for Recognition, Journal of Cognitive Neuroscience, Vol. 3, No. 1
Rowley A., Baluja, S., Kanade, T. (1997), Rotation invariant neural network-based face detection, CS Technical Report, CMU-CS-97-201, CMU, Pittsburgh
Schneiderman H., Kanade, T. (1998), Probabilistic modeling of local appearance and spatial relationships for object recognition, in Proc. IEEE Conference on Computer Vision and Pattern Recognition, Santa Barbara, 4551
John Moran Eye Center University of Utah, See: http://webvision.med.utah.edu/imageswv/scan.jpeg
See: http://before.eyelids-blepharoplasty.com/sub_anatomy.html
See: http://www.drmeronk.com/blephnews/anatomy.html#external
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lewis, R.A., Raś, Z.W. (2005). Innertron: New Methodology of Facial Recognition, Part I. In: Kłopotek, M.A., Wierzchoń, S.T., Trojanowski, K. (eds) Intelligent Information Processing and Web Mining. Advances in Soft Computing, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-32392-9_74
Download citation
DOI: https://doi.org/10.1007/3-540-32392-9_74
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25056-2
Online ISBN: 978-3-540-32392-1
eBook Packages: EngineeringEngineering (R0)