Skip to main content

Face Authentication from Cell Phone Camera Images with Illumination and Temporal Variations

  • Conference paper
Book cover Biometric Authentication (ICBA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3072))

Included in the following conference series:

Abstract

Weinvestigated the performance of 3 face verification algorithms (Correlation Filters, Individual PCA, FisherFaces) on an image database that was collected by a cell phone camera. Cell phone camera images tend to be of poorer quality and because of their portability, algorithms must deal with scale changes and dynamic outdoor illumination changes. While Individual PCA and FisherFaces focus on the image domain, Correlation Filters work in the frequency domain and offer advantages such as shift-invariance, ability to accommodate in-class image variability and closed form expressions. Results suggest that correlation filters offer better verification performance with this database.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Turk, M., Pentland, A.: Eigenfaces for Recognition. J. Cognitive Neuroscience 3(1) (1991)

    Google Scholar 

  2. Belhumeur, P.N., Hespanha, J.P., Kriegman, D.J.: Eigenfaces vs. Fisherfaces – recognition using class specific linear projection. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI) 19(7), 711–720 (1997)

    Article  Google Scholar 

  3. Vijaya Kumar, B.V.K.: Tutorial Survey Of Composite Filter Designs For Optical Correlators. Applied Optics 31, 4773–4801 (1992)

    Article  Google Scholar 

  4. Réfrégier, P.: Optimal trade-off filters for noise robustness, sharpness of the correlation peak, and Horner efficiency. Optics Letters 16, 829–831 (1991)

    Article  Google Scholar 

  5. Vijaya Kumar, B.V.K., Carlson, D.W., Mahalanobis, A.: Optimal Trade-Off Synthetic Discriminant Function Filters For Arbitrary Devices. Optics Letters 19(19), 1556–1558 (1994)

    Article  Google Scholar 

  6. Savvides, M., Venkataramani, K., Vijaya Kumar, B.V.K.: Incremental Updating of Advanced Correlation Filters for Biometric Authentication System. IEEE International Conference on Multimedia and Expo (ICME) 3, 229–232 (2003)

    Google Scholar 

  7. Vijaya Kumar, B.V.K., Savvides, M., Xie, C., Venkataramani, K., Thornton, J.: Using Composite Correlation Filters for Biometric Verification. In: SPIE AeroSense, vol. 5106 (2003)

    Google Scholar 

  8. Venkataramani, K.: Reduced complexity correlation filters for fingerprint verification. MS Report. ECE department, Carnegie Mellon University (2002)

    Google Scholar 

  9. Liu, X., Chen, T., Vijaya Kumar, B.V.K.: Face Authentication for Multiple Subjects Using Eigenflow. Pattern Recognition, Special issue on Biometrics 36(2), 313–328 (2003)

    Google Scholar 

  10. Duda, R., Hart, P., Stork, D.: Pattern Classification, 2nd edn. Wiley, New York (2001)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qidwai, S., Venkataramani, K., Kumar, B.V.K.V. (2004). Face Authentication from Cell Phone Camera Images with Illumination and Temporal Variations. In: Zhang, D., Jain, A.K. (eds) Biometric Authentication. ICBA 2004. Lecture Notes in Computer Science, vol 3072. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25948-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25948-0_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22146-3

  • Online ISBN: 978-3-540-25948-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics