Human Identification Using Soft Biometrics


Book Description

Humans naturally use descriptions to verbally convey the appearance of an individual. Eyewitness descriptions are an important resource for many criminal investigations. However, they cannot be used to automatically search databases featuring video or biometric data - reducing the utility of human descriptions in the search for the suspect. Soft biometrics are a new form of biometric identification which uses physical or behavioural traits that can be naturally described by humans. This thesis will explore how soft biometrics can be used alongside traditional biometrics, allowing video footage and biometric data to be searched using a description. To permit soft biometric identification the human description must be accurate, yet conventional descriptions comprising of absolute labels and estimations are often unreliable. A novel method of obtaining human descriptions will be introduced which utilizes comparative categorical labels to describe the differences between subjects. A database of facial and bodily comparative labels is introduced and analysed. Prior to use as a biometric feature, comparative descriptions must be anchored. Several techniques to convert multiple comparative labels into a single relative measurement are explored. Recognition experiments were conducted to assess the discriminative capabilities of relative measurements as a biometric. Relative measurements can also be obtained from other forms of human representation. This is demonstrated using several machine learning techniques to determine relative measurements from gait biometric signatures. Retrieval results are presented showing the ability to automatically search video footage using comparative descriptions.










Surveillance in Action


Book Description

This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition. The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection. The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master’s and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.




A Survey on Soft Biometrics for Human Identification


Book Description

The focus has been changed to multi-biometrics due to the security demands. The ancillary information extracted from primary biometric (face and body) traits such as facial measurements, gender, colour of the skin, ethnicity, and height is called soft biometrics and can be integrated to improve the speed and overall system performance of a primary biometric system (e.g., fuse face with facial marks) or to generate human semantic interpretation description (qualitative) of a person and limit the search in the whole dataset when using gender and ethnicity (e.g., old African male with blue eyes) in a fusion framework. This chapter provides a holistic survey on soft biometrics that show major works while focusing on facial soft biometrics and discusses some of the features of extraction and classification techniques that have been proposed and show their strengths and limitations.




Behavioral Biometrics for Human Identification: Intelligent Applications


Book Description

"This edited book provides researchers and practitioners a comprehensive understanding of the start-of-the-art of behavioral biometrics techniques, potential applications, successful practice, and available resources"--Provided by publisher.




Machine Learning and Biometrics


Book Description

We are entering the era of big data, and machine learning can be used to analyze this deluge of data automatically. Machine learning has been used to solve many interesting and often difficult real-world problems, and the biometrics is one of the leading applications of machine learning. This book introduces some new techniques on biometrics and machine learning, and new proposals of using machine learning techniques for biometrics as well. This book consists of two parts: "Biometrics" and "Machine Learning for Biometrics." Parts I and II contain four and three chapters, respectively. The book is reviewed by editors: Prof. Jucheng Yang, Prof. Dong Sun Park, Prof. Sook Yoon, Dr. Yarui Chen, and Dr. Chuanlei Zhang.




Biometric Authentication


Book Description

This book constitutes the refereed proceedings of the First International Conference on Biometric Authentication, ICBA 2004, held in Hong Kong, China in July 2004. The 104 revised full papers presented were carefully reviewed and selected from 157 submissions; also included are summaries of 3 biometric competitions on fingerprint verification, face authentication, and signature verification. The papers are organized in topical sections on face, fingerprint, iris, signature, speech, biometric fusion and risk analysis, and other biometric issues.




Human Recognition in Unconstrained Environments


Book Description

Human Recognition in Unconstrained Environments provides a unique picture of the complete ‘in-the-wild’ biometric recognition processing chain; from data acquisition through to detection, segmentation, encoding, and matching reactions against security incidents. Coverage includes: Data hardware architecture fundamentals Background subtraction of humans in outdoor scenes Camera synchronization Biometric traits: Real-time detection and data segmentation Biometric traits: Feature encoding / matching Fusion at different levels Reaction against security incidents Ethical issues in non-cooperative biometric recognition in public spaces With this book readers will learn how to: Use computer vision, pattern recognition and machine learning methods for biometric recognition in real-world, real-time settings, especially those related to forensics and security Choose the most suited biometric traits and recognition methods for uncontrolled settings Evaluate the performance of a biometric system on real world data Presents a complete picture of the biometric recognition processing chain, ranging from data acquisition to the reaction procedures against security incidents Provides specific requirements and issues behind each typical phase of the development of a robust biometric recognition system Includes a contextualization of the ethical/privacy issues behind the development of a covert recognition system which can be used for forensics and security activities