Human Recognition in Unconstrained Environments: Using Computer Vision, Pattern Recognition and Machine Learning Methods for Biometrics
()
About this ebook
Human Recognition in Unconstrained Environments provides a unique picture of the complete ‘in-the-wild’ biometric recognition processing chain; from data acquisition through to detection, segmentation, encoding, and matching reactions against security incidents.
Coverage includes:
- Data hardware architecture fundamentals
- Background subtraction of humans in outdoor scenes
- Camera synchronization
- Biometric traits: Real-time detection and data segmentation
- Biometric traits: Feature encoding / matching
- Fusion at different levels
- Reaction against security incidents
- Ethical issues in non-cooperative biometric recognition in public spaces
- Use computer vision, pattern recognition and machine learning methods for biometric recognition in real-world, real-time settings, especially those related to forensics and security
- Choose the most suited biometric traits and recognition methods for uncontrolled settings
- Evaluate the performance of a biometric system on real world data
With this book readers will learn how to:
- Presents a complete picture of the biometric recognition processing chain, ranging from data acquisition to the reaction procedures against security incidents
- Provides specific requirements and issues behind each typical phase of the development of a robust biometric recognition system
- Includes a contextualization of the ethical/privacy issues behind the development of a covert recognition system which can be used for forensics and security activities
Related to Human Recognition in Unconstrained Environments
Related ebooks
Hybrid Computational Intelligence: Challenges and Applications Rating: 0 out of 5 stars0 ratingsQuantum Inspired Computational Intelligence: Research and Applications Rating: 0 out of 5 stars0 ratingsDigital Media Steganography: Principles, Algorithms, and Advances Rating: 0 out of 5 stars0 ratingsSecurity in IoT Social Networks Rating: 0 out of 5 stars0 ratingsComputer Vision for Microscopy Image Analysis Rating: 0 out of 5 stars0 ratingsContemporary Digital Forensic Investigations of Cloud and Mobile Applications Rating: 0 out of 5 stars0 ratingsEngineering a Compiler Rating: 0 out of 5 stars0 ratingsBioinformatics: Algorithms, Coding, Data Science And Biostatistics Rating: 0 out of 5 stars0 ratingsLossless Information Hiding in Images Rating: 0 out of 5 stars0 ratingsComputer forensics Second Edition Rating: 0 out of 5 stars0 ratingsFinite Automata: Behavior and Synthesis Rating: 5 out of 5 stars5/5Digital Forensics Framework A Complete Guide Rating: 0 out of 5 stars0 ratingsSOA Security Rating: 0 out of 5 stars0 ratingsPro Cryptography and Cryptanalysis: Creating Advanced Algorithms with C# and .NET Rating: 0 out of 5 stars0 ratingsFrom Fragments to Objects: Segmentation and Grouping in Vision Rating: 0 out of 5 stars0 ratingsScene of the Cybercrime: Computer Forensics Handbook Rating: 4 out of 5 stars4/5Beginning C: From Beginner to Pro Rating: 0 out of 5 stars0 ratingsSwarm Intelligence: Make better business judgments thanks to artificial intelligence inspired by honeybees Rating: 0 out of 5 stars0 ratingsThe Inaction Man Rating: 5 out of 5 stars5/5Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services Rating: 0 out of 5 stars0 ratingsReadings in Artificial Intelligence Rating: 0 out of 5 stars0 ratingsParallel Processing for Artificial Intelligence 1 Rating: 5 out of 5 stars5/5Tarsnap Mastery: IT Mastery, #6 Rating: 0 out of 5 stars0 ratingsOf the Odyssey 100 to NewsGames: A Genealogy of the Games as Information Rating: 0 out of 5 stars0 ratingsThe Way To Geometry Rating: 0 out of 5 stars0 ratingsMalware Diffusion Models for Modern Complex Networks: Theory and Applications Rating: 0 out of 5 stars0 ratingsPrivacy-Preserving Machine Learning Rating: 0 out of 5 stars0 ratingsHandbook of Neural Computing Applications Rating: 5 out of 5 stars5/5Topological Data Structures for Surfaces: An Introduction to Geographical Information Science Rating: 0 out of 5 stars0 ratings
Computers For You
Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5The Insider's Guide to Technical Writing Rating: 0 out of 5 stars0 ratingsGrokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5User Friendly: How the Hidden Rules of Design Are Changing the Way We Live, Work, and Play Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5Computer Science: A Concise Introduction Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Python Machine Learning By Example Rating: 4 out of 5 stars4/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsSQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsElon Musk Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling Rating: 0 out of 5 stars0 ratingsThe Mega Box: The Ultimate Guide to the Best Free Resources on the Internet Rating: 4 out of 5 stars4/5Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5The Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5
Reviews for Human Recognition in Unconstrained Environments
0 ratings0 reviews
Book preview
Human Recognition in Unconstrained Environments - Maria De Marsico
2016
Chapter 1
Unconstrained Data Acquisition Frameworks and Protocols
João C. Neves⁎; Juan C. Moreno⁎; Silvio Barra⁎⁎; Fabio Narducci⁎⁎⁎; Hugo Proença⁎ ⁎IT – Instituto de Telecomunicações, University of Beira Interior, Covilhã, Portugal
⁎⁎Department of Mathematic and Computer Science, University of Cagliari, Cagliari, Italy
⁎⁎⁎BIPLab – University of Salerno, Fisciano, Italy
Abstract
The identification of humans in non-ideal conditions has been gaining increasing attention, mainly supported by the multitude of novel methods specifically developed to address the covariates of non-cooperative biometric recognition. Surveillance environments are one of the most representative cases of unconstrained scenarios, where fully automated human recognition has not been achieved, yet. These environments are particularly harsh for several reasons (e.g., high variations in illumination, pose, and expression), but the limited resolution of the biometric data acquired is regarded as the major factor for performance degradation. Consequently, different strategies for imaging subjects at-a-distance have been introduced. This chapter provides a comprehensive review of the state-of-the-art surveillance systems for acquiring biometric data at-a-distance in a non-cooperative manner. The challenges and the open issues of current architectures are highlighted. Also, the most promising strategies and future lines of research are outlined.
Keywords
Surveillance scenarios; Unconstrained data acquisition; Non-cooperative biometric; Recognition; Biometric recognition at a distance; PTZ cameras; Camera calibration
Chapter Outline
1.1 Introduction
1.2 Unconstrained Biometric Data Acquisition Modalities
1.3 Typical Challenges
1.3.1 Optical Constraints
1.3.2 Non-comprehensive View of the Scene
1.3.3 Out-of-Focus
1.3.4 Calibration of Multi-camera Systems
1.4 Unconstrained Biometric Data Acquisition Systems
1.4.1 Low Resolutions Systems
1.4.1.1 Super-resolution Approach
1.4.1.2 Gait Recognition
1.4.2 PTZ-Based Systems
1.4.3 Face
1.4.3.1 Typical Design of Master–Slave Systems
1.4.3.2 Systems Based on Logical Alignment of the Cameras
1.4.3.3 QUIS–CAMPI System
1.4.3.4 Other Biometrics: Iris, Periocular, and Ear
1.5 Conclusions
References
1.1 Introduction
The recognition of individuals either from physical or behavioral traits, usually denoted as biometric traits, is common practice in environments where the subjects cooperate with the acquisition system.
In the last years, the focus has been placed on extending the robustness of recognition methods to address less constrained scenarios with non-cooperative subjects. Researchers have introduced different strategies to address high variability in the age [1], pose [2], illumination [3], expression [4] (A-PIE), and other confounding factors such as occlusion [5] and blur [6]. Also, these improvements have been evidenced by the performance advances reported in unconstrained biometric datasets, such as the Labeled Faces in the Wild (LFW) [7].
Despite these achievements, the recognition of humans in totally wild conditions observed in visual surveillance scenarios has not been achieved, yet. In this kind of setup, images are captured from large distances, and the acquired data have limited discriminative capabilities, even when using high-resolution cameras [8]. Considering that in unconstrained environments data resolution may have a greater impact on the performance than A-PIE factors, several authors have been particularly devoted to extending the workability of biometric data acquisition frameworks to unconstrained scenarios in which human collaboration is not assumed.
In this chapter, we review most of the relevant frameworks and protocols for acquiring biometric data in unconstrained scenarios. In Section 1.2, we provide a comparative analysis between the different acquisition modalities. The advantages of using magnifications devices, such as PTZ cameras, are evidenced by the difference in the resolution between the eyes (interpupillary distance). The resolution of biometric data acquired by PTZ cameras at the maximum zoom is five times higher than typical surveillance cameras. Also, the minimum resolution required to acquire high-resolution face images (interpupillary distance greater than 60 pixels) with a stand-off distance larger than 5 m can only be attained using PTZ devices.
Section 1.3 discusses the advantages and drawbacks of the different acquisition modalities with special attention given to the use of magnification devices in unconstrained environments. The use of a highly narrow field of view introduces a multitude of challenges that restrict the workability of PTZ-based systems in outdoor scenarios (inter-camera calibration) and degrade image quality (e.g., out-of-focus, incorrect exposure).
In Section 1.4, we present a comprehensive collection of the state-of-the-art systems for unconstrained scenarios. The systems are organized according to the modalities of unconstrained biometric data acquisition: (i) low-resolution systems; and (ii) PTZ-based systems. In the former, most approaches rely on soft biometrics (e.g., gait) for recognizing individuals in unconstrained scenarios, since the reduced discrimination of data inhibits the use of hard biometrics. The use of these traits is only feasible when relying on super-resolution. In the latter, the systems are grouped with respect to the biometric trait that they were designed to acquire. Despite the advantages of iris regarding recognition performance, its reduced size curtails the maximum stand-off distance of these systems. Consequently, most approaches have introduced multiple strategies to acquire facial imagery at large stand-off distances. The workability of these approaches in real unconstrained environments is discussed by analyzing their feasibility in surveillance scenarios, which are among of the most representative examples of these environments. Among these systems, particular attention is given to the works of Park et al. [9] and Neves et al. [10], which are two representative examples of PTZ-based systems capable of acquiring high-resolution face images in surveillance scenarios. Finally, Section 1.5 concludes the