Abstract
The field of Biometrics analyses organic signals from people to identify or verify an identity using a combination of physiological, behavioural or cognitive characteristics such as voice, fingerprints, eye color, facial features, iris, handwriting or other characteristics. Large-scale biometric identification systems can benefit from modern optimisation, classification and parallel computation techniques to reduce cost and increase accuracy. This chapter discusses recent and novel developments by the authors in the approaches taken to enable large-scale biometric identification. The authors present an overview of different techniques to perform the tasks of search space reduction, feature selection and parallel processing of biometrics data. Topics covered are: support vector machines and hyperspace transformations for effectively searching extremely large fingerprint databases to identify individuals; evolutionary computing to perform efficient facial feature selection for identification purposes; and cloud and high-performance designs for biometric systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Germain RS, Califano A, Colville S (1997) Fingerprint matching using transformation parameter clustering. Comput Sci Eng 4(4):42–49
Bolle R, Connell J, Pankanti S, Ratha N, W A (2010) Guide to biometrics. Springer Professional Computing, Springer. http://books.google.co.za/books?id=wBBScgAACAAJ
Ratha NK, Bolle R et al (2004) Automatic fingerprint recognition systems. Springer, New York
Gelb A, Clark J (2013) Performance lessons from India’s universal identification program. CGD Policy Paper 20
Baughman AK (2008) Evolutionary facial feature selection. In: Proceedings of the 2008 GECCO conference companion on genetic and evolutionary computation. ACM, pp 2099–2104
Baughman AK, Van Der Stockt S, Greenland A (2010) Large scale fingerprint mining. In: Proceedings of the tenth international workshop on multimedia data mining. ACM, p 1
Jain A, Pankanti S (2000) Fingerprint classification and matching. Handbook for image and video processing. Academic Press, London
Ross A, Nandakumar K, Jain A (2008) Introduction to multibiometrics. In: Jain A, Flynn P, Ross A (eds) Handbook of biometrics. Springer, New York, pp 271–292
Yao Y, Marcialis GL, Pontil M, Frasconi P, Roli F (2003) Combining flat and structured representations for fingerprint classification with recursive neural networks and support vector machines. Pattern Recognit 36(2):397–406
Blackburn D, Miles C, Wing B (2009) Biometrics foundation documents. Technical report, DTIC Document
Fawcett T (2006) An introduction to ROC analysis. Pattern Recognit Lett 27(8):861–874
Jain AK, Dubes RC (1988) Algorithms for clustering data. Prentice-Hall Inc, London
Watson CI, Garris MD, Tabassi E, Wilson CL, Mccabe RM, Janet S, Ko K (2007) User’s guide to NIST biometric image software (NBIS). Citeseer
Hong JH, Min JK, Cho UK, Cho SB (2008) Fingerprint classification using one-vs-all support vector machines dynamically ordered with naïve bayes classifiers. Pattern Recognit 41(2):662–671
Bishop CM et al (1995) Neural networks for pattern recognition. Clarendon Press, Oxford
Bishop CM et al (2006) Pattern recognition and machine learning. Springer, New York
Mohanta PP, Mukherjee DP, Acton ST (2002) Agglomerative clustering for image segmentation. In: Proceedings of the 2002 16th International Conference on Pattern Recognition. IEEE, vol 1. pp 664–667
Bauer E, Kohavi R (1999) An empirical comparison of voting classification algorithms: bagging, boosting, and variants. Mach Learn 36(1–2):105–139
Bradley JN, Brislawn CM (1994) The wavelet/scalar quantization compression standard for digital fingerprint images. In: 1994 IEEE international symposium on circuits and systems, ISCAS’94. IEEE, vol 3, pp 205–208
Collins RJ (1992) Studies in artificial evolution. University of California at Los Angeles
Engelbrecht AP (2007) Computational intelligence: an introduction. Wiley, New York
Goldberg D (1989) Genetic algorithms in search, optimization, and machine learning., Artificial IntelligenceAddison-Wesley, Reading
Goldberg DE, Deb K, Clark JH (1991) Genetic algorithms, noise, and the sizing of populations. Complex Syst 6:333–362
Holland JH (2000) Building blocks, cohort genetic algorithms, and hyperplane-defined functions. Evolut Comput 8(4):373–391
Goldberg DE, Sastry K (2001) A practical schema theorem for genetic algorithm design and tuning. In: Proceedings of the genetic and evolutionary computation conference, pp 328–335
Goldberg DE, Sastry K, Latoza T (2001) On the supply of building blocks. In: Proceedings of the genetic and evolutionary computation conference, pp 336–342
Holland JH (1992) Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence. A Bradford Book
Wayman JL, Jain AK, Maltoni D, Maio D (2005) Biometric systems: technology, design and performance evaluation. Springer, New York
Liu C, Wechsler H (2000) Evolutionary pursuit and its application to face recognition. IEEE Trans Pattern Anal Mach Intell 22(6):570–582
Sim T, Baker S, Bsat M (2002) The CMU pose, illumination, and expression (PIE) database. In: Proceedings of the Fifth IEEE International Conference on automatic face and gesture recognition, pp 46–51
Banner CS (1972) The state of development of the FBI’s automatic fingerprint identification system. Technical report, FBI
Phillips PJ, Grother P, Micheals R, Blackburn DM, Tabassi E, Bone M, (2003) Face recognition vendor test 2002. In: IEEE International Workshop on analysis and modeling of faces and gestures (AMFG), p 44
Phillips PJ, Scruggs WT, O’Toole AJ, Flynn PJ, Bowyer KW, Schott CL, Sharpe M (2007) FRVT 2006 and ice 2006 large-scale results. National Institute of Standards and Technology, NISTIR, Gaithersburg
Wilson CL, Hicklin RA, Korves H, Ulery B, Zoepfl M, Bone M, Grother PJ, Micheals RJ, Otto S, Watson CI et al (2004) Fingerprint vendor technology evaluation 2003: Summary of results and analysis report. US Department of Commerce, National Institute of Standards and Technology
Pelecanos J, Navrátil J, Ramaswamy G (2008) Conversational biometrics: a probabilistic view. In: Ratha N, Govindaraju V (eds) Advances in biometrics. Springer, London, pp 203–224
Kephart JO, Chess DM (2003) The vision of autonomic computing. Computer 36(1):41–50
Scadden RR, Bogdany RJ, Clifford JW, Pearthree HD, Locke RA (2008) Resilient hosting in a continuously available virtualized environment. IBM Syst. J. 47(4):535–548
Shivam P, Babu S, Chase JS (2006) Learning application models for utility resource planning. In: IEEE International conference on autonomic computing (ICAC’06), pp 255–264
Zhu X, Young D, Watson BJ, Wang Z, Rolia J, Singhal S, McKee B, Hyser C, Gmach D, Gardner R et al (2008) 1000 islands: integrated capacity and workload management for the next generation data center. In: International conference on autonomic computing (ICAC’08), pp 172–181
Shen Z, Subbiah S, Gu X, Wilkes J (2011) Cloudscale: elastic resource scaling for multi-tenant cloud systems. In: Proceedings of the 2nd ACM symposium on cloud computing. ACM, p 5
Gong Z, Gu X, Wilkes J (2010) Press: Predictive elastic resource scaling for cloud systems. In: 2010 international conference on network and service management (CNSM), IEEE, pp 9–16
Nguyen H, Shen Z, Gu X, Subbiah S, Wilkes J (2013) Agile: elastic distributed resource scaling for infrastructure-as-a-service. In: Proceedings of the USENIX international conference on automated computing (ICAC’13). San Jose
Gmach D, Rolia J, Cherkasova L, Kemper A (2007) Capacity management and demand prediction for next generation data centers. In: IEEE international conference on web services, ICWS 2007, IEEE, pp 43–50
Kalyvianaki E, Charalambous T, Hand S (2009) Self-adaptive and self-configured CPU resource provisioning for virtualized servers using Kalman filters. In: Proceedings of the 6th international conference on autonomic computing. ACM, pp 117–126
Galante G, Bona LCEd (2012) A survey on cloud computing elasticity. In: Proceedings of the 2012 IEEE/ACM fifth international conference on utility and cloud computing. IEEE Computer Society, pp 263–270
Watson CI, Garris MD, Tabassi E, Wilson C, McCabe R, Janet S, Ko K (2004) User’s guide to export controlled distribution of NIST biometric image software. NIST report
Ferrucci D, Brown E, Chu-Carroll J, Fan J, Gondek D, Kalyanpur AA, Lally A, Murdock JW, Nyberg E, Prager J et al (2010) Building Watson: an overview of the DeepQA project. AI Mag 31(3):59–79
Epstein EA, Schor MI, Iyer B, Lally A, Brown EW, Cwiklik J (2012) Making Watson fast. IBM J Res Dev 56(3.4):1–15
Identification L (ed) (2005) ABIS system developer’s guide. 050-138, Revision A, Software version 4.1
Acknowledgments
The authors would like to thank Nalini Ratha, IBM Corporation, for his suggestions and review of the chapter.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
van der Stockt, S., Baughman, A.K., Perlitz, M. (2015). Large-Scale Biometric Multimedia Processing. In: Baughman, A., Gao, J., Pan, JY., Petrushin, V. (eds) Multimedia Data Mining and Analytics. Springer, Cham. https://doi.org/10.1007/978-3-319-14998-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-14998-1_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14997-4
Online ISBN: 978-3-319-14998-1
eBook Packages: Computer ScienceComputer Science (R0)