emba 2009 – information systems and applications lecture iii
DESCRIPTION
Introduction to CBIRF and Biometrics Frank Yeong-Sung Lin Department of Information Management National Taiwan University. EMBA 2009 – Information Systems and Applications Lecture III. Outline. Introduction to CBIRF Introduction to (face-based) biometrics Discussions. 2. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/1.jpg)
Introduction to CBIRF and Biometrics
Frank Yeong-Sung Lin
Department of Information ManagementNational Taiwan University
EMBA 2009 – Information Systems and ApplicationsLecture III
![Page 2: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/2.jpg)
Outline
Introduction to CBIRFIntroduction to (face-based) biometricsDiscussions
2
![Page 3: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/3.jpg)
Introduction to CBIRFCBIRF – Content Based Image/Information Retrieval and Filtering Characteristics
Adoption of only color, texture, shape and object position/size/orientation information in an imageNo metadata or human indexing/annotation requiredReal-time responseHigh scalabilityHigh availability/reliabilityInternet as the search targetRelevance feedback (learning)
Other applicationsAnti-pornography EngineAnti-leakage Engine (for protection of confidential images)
3
![Page 4: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/4.jpg)
4
Introduction to CBIRF (cont’d)
Content based image retrieval
Characteristics Feature extraction High dimensional indexing Relevance feedback (learning)
Image Features (color, texture, shape…)
Database
![Page 5: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/5.jpg)
5
Introduction to CBIRF (cont’d)
Query/Seed Image
Search Results
![Page 6: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/6.jpg)
6
Applications of CBIRF
Image searchVideo searchLogo searchIPR protectionConfidential image managementObjectionable image managementImage and photo organizerBiometrics
![Page 7: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/7.jpg)
7
Extension of CBIRF— Porn Filtering
Anti pornography engine
Applications1. Email filtering2. Desktop content management3. Porn blacklist collection4. Objectionable URL/Web content
blocking
Pornography Pornographic Features Database
![Page 8: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/8.jpg)
8
Extension of CBIRF— Leakage DetectionAnti (confidentiality/privacy) leakage engine
Applications1. Email filtering2. Confidential content management
Confidential Images
Features
Database
![Page 9: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/9.jpg)
9
Introduction to Biometrics
Total biometrics industry revenue would grow from more than US$3.4 billion in 2009 to more than US$9.3 billion in 2014 (excluding the revenue from related professional and integration services).
(International Biometric Group, 2009-2014)
![Page 10: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/10.jpg)
10
Introduction to Biometrics (cont’d)
TLJ Confidential
![Page 11: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/11.jpg)
• Remarks by Bill Gates, Chairman and Chief Software Architect, Microsoft CorporationIT Forum 2004Copenhagen, Denmark, November 16, 2004
• Passwords will soon be a thing of the past, replaced by biometric and smart-card technology, Bill Gates reiterated on Tuesday. – from Tech News on ZDNews
• Another major issue for identity systems is, of course, the weakness of the password. Passwords have been the primary way that people identify who they are. Unfortunately, for the type of critical information on these systems and the regulations that ask that these systems be secure, whether it is health data, financial data or customer access to customer records where only certain people should have that information, we are not going to be able to simply rely on passwords. Therefore, moving to biometric identification and particularly in moving to smart cards, is a way that is coming. This is something that has been talked about for several years, but now we finally see the leading edge customers taking that step.
• From “(i) what you have” to “(ii) what you know about” and eventually to “ (iii) who you really are”
• ICAO advocates biometrics technologies, particularly face-based, for passport holder authentication.
Introduction to Biometrics (cont’d)
11
![Page 12: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/12.jpg)
12
Introduction to Biometrics (cont’d)
First choice
Biometric Types Defined by ICAO (International Civil Aviation Organization)
![Page 13: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/13.jpg)
Introduction to Biometrics (cont’d)
The Enrollment Process
Photo Taking Facial Area PositioningFace Detection
Facial Feature Extraction from the Facial Area
Facial Feature Archiving into the Specified Storage Device as a “Gallery”
13
![Page 14: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/14.jpg)
Introduction to Biometrics (cont’d)
The Facial Feature Verification Process
Photo Taking Facial Area PositioningFace Detection
Facial Feature Extraction from the Facial Area
Retrieval of the Enrolled Facial Feature (Gallery) from the Storage Device
Intelligent Comparison of the 2 Feature Sets Comparison Result Reporting
ACCEPT
14
![Page 15: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/15.jpg)
Introduction to Biometrics (cont’d)
Advantages of face-based over fingerprint-based biometric approaches
More convenientLess intrusiveMore hygienicLeveraging on existing infrastructure (webcam)Less prone to duplicate (fingerprints easily available on protected devices, e.g. NBs)Capable of continuous verificationVerifiability by human eyes Effects of deterrence and non-repudiation by logging probe/novel images
15
![Page 16: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/16.jpg)
Introduction to Biometrics (cont’d)
Characteristics of desirable face verification technologies
• Suitability for PCs/NBs/UMPCs/PDAs/Mobile Phones• Insensitivity to lighting, pose, expression and accessory variations• Low enrollment time• Low verification time• User adjustable and personalized sensitivity• Dynamic thresholding• Intelligent and self-learning galleries• Factuality/Liveness detection• Extremely high accuracy: e.g. product of FAR (False Acceptance Rate) & FRR (False Rejection Rate) lower than 10-6
• Integration with other, e.g., the credential (ID and password) mechanism 16
![Page 17: EMBA 2009 – Information Systems and Applications Lecture III](https://reader033.vdocuments.net/reader033/viewer/2022051117/568158a8550346895dc5fb35/html5/thumbnails/17.jpg)
Merry Christmas and Happy New Year!
17