Abstract
There are tremendous need for personal verification and identification in internet security, electronic commerce and access control in recent years. Also, as the demands for security in many applications such as data protection and financial transaction become an increasingly relevant issues, the importance of biometrics technology is rapidly increasing. We explored face recognition system for person authentication applications by explicitly state the design decisions by introducing a generic modular PCA face recognition system. We designed implementations of each module, and evaluate the performance variations based on virtual galleries and probe sets. We perform various experiments and report results using equal error rates (EER) for verification scenario. In our experiment, we report performance results on 100 randomly generated image sets (galleries) of the same size.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Egan, J.P.: Signal Detection Theory and ROC Analysis. Academic Press, London (1975)
Moon, H., Kim, J.: Biometrics identification and verification using projection-based face recognition system. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol. 2908, pp. 380–394. Springer, Heidelberg (2004)
Moon, H., Phillips, P.J.: Computational and performance aspectsm of projection-based face recognition algorithms. Perception 30, 303–321 (2001)
Phillips, P.J., Moon, H., Rizvi, S., Rauss, P.: The feret evaluation methodology for face-recognition algorithms. IEEE Trans. PAMI 22, 1090–1104 (2000)
Turk, M., Pentland, A.: Eigenfaces for recognition. J. Cognitive Neuroscience 3(1), 71–86 (1991)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Moon, H. (2004). Biometrics Person Authentication Using Projection-Based Face Recognition System in Verification Scenario. In: Zhang, D., Jain, A.K. (eds) Biometric Authentication. ICBA 2004. Lecture Notes in Computer Science, vol 3072. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25948-0_29
Download citation
DOI: https://doi.org/10.1007/978-3-540-25948-0_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22146-3
Online ISBN: 978-3-540-25948-0
eBook Packages: Springer Book Archive