Deep Learning in Biometrics
eBook - ePub

Deep Learning in Biometrics

Mayank Vatsa, Richa Singh, Angshul Majumdar, Mayank Vatsa, Richa Singh, Angshul Majumdar

Share book
  1. 316 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Deep Learning in Biometrics

Mayank Vatsa, Richa Singh, Angshul Majumdar, Mayank Vatsa, Richa Singh, Angshul Majumdar

Book details
Book preview
Table of contents
Citations

About This Book

Deep Learning is now synonymous with applied machine learning. Many technology giants (e.g. Google, Microsoft, Apple, IBM) as well as start-ups are focusing on deep learning-based techniques for data analytics and artificial intelligence. This technology applies quite strongly to biometrics. This book covers topics in deep learning, namely convolutional neural networks, deep belief network and stacked autoencoders. The focus is also on the application of these techniques to various biometric modalities: face, iris, palmprint, and fingerprints, while examining the future trends in deep learning and biometric research.



  • Contains chapters written by authors who are leading researchers in biometrics.


  • Presents a comprehensive overview on the internal mechanisms of deep learning.


  • Discusses the latest developments in biometric research.


  • Examines future trends in deep learning and biometric research.


  • Provides extensive references at the end of each chapter to enhance further study.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Deep Learning in Biometrics an online PDF/ePUB?
Yes, you can access Deep Learning in Biometrics by Mayank Vatsa, Richa Singh, Angshul Majumdar, Mayank Vatsa, Richa Singh, Angshul Majumdar in PDF and/or ePUB format, as well as other popular books in Ciencia de la computación & Ciencias computacionales general. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2018
ISBN
9781351264983
1
Deep Learning: Fundamentals and Beyond
Shruti Nagpal, Maneet Singh, Mayank Vatsa, and Richa Singh
CONTENTS
1.1 Introduction
1.2 Restricted Boltzmann Machine
1.2.1 Incorporating supervision in RBMs
1.2.2 Other advances in RBMs
1.2.3 RBMs for biometrics
1.3 Autoencoder
1.3.1 Incorporating supervision in AEs
1.3.2 Other variations of AEs
1.4 Convolutional Neural Networks
1.4.1 Architecture of a traditional CNNs
1.4.2 Existing architectures of CNNs
1.5 Other Deep Learning Architectures
1.6 Deep Learning: Path Ahead
References
1.1 Introduction
The science of uniquely identifying a person based on his or her physiological or behavioral characteristics is termed biometrics. Physiological characteristics include face, iris, fingerprint, and DNA, whereas behavioral modalities include handwriting, gait, and keystroke dynamics. Jain et al. [1] lists seven factors that are essential for any trait (formally termed modality) to be used for biometric authentication. These factors are: universality, uniqueness, permanence, measurability, performance, acceptability, and circumvention.
An automated biometric system aims to either correctly predict the identity of the instance of a modality or verify whether the given sample is the same as the existing sample stored in the database. Figure 1.1 presents a traditional pipeline of a biometric authentication system. Input data corresponds to the raw data obtained directly from the sensor(s). Segmentation, or detection, refers to the process of extracting the region of interest from the given input. Once the required region of interest has been extracted, it is preprocessed to remove the noise, enhance the image, and normalize the data for subsequent ease of processing. After segmentation and preprocessing, the next step in the pipeline is feature extraction. Feature extraction refers to the process of extracting unique and discriminatory information from the given data. These features are then used for performing classification. Classification refers to the process of creating a model, which given a seen/unseen input feature vector is able to provide its correct label. For example, in case of a face recognition pipeline, the aim is to identify the individual in the given input sample. Here, the input data consists of images captured from the camera, containing at least one face image along with background or other objects. Segmentation, or detection, corresponds to detecting the face in the given input image. Several techniques can be applied for this step [2,3]; the most common being the Viola Jones face detector [4]. Once the faces are detected, they are normalized with respect to their geometry and intensity. For feature extraction, hand-crafted features such as Gabor filterbank [5], histogram of oriented gradients [6], and local binary patterns [7] and more recently, representation learning approaches have been used. The extracted features are then provided to a classifier such as a support vector machine [8] or random decision forest [9] for classification.
Image
FIGURE 1.1
Illustrating the general biometrics authentication pipeline, which consists of five stages.
Automated biometric authentication systems have been used for several real-world applications, ranging from fingerprint sensors on mobile phones to border control applications at airports. One of the large-scale applications of automated biometric authentication is the ongoing project of Unique Identification Authority of India, pronounced “Aadhaar.” Initiated by the Indian Government,* the project aims to provide a unique identification number for each resident of India and capture his or her biometric modalities—face, fingerprint, and irises. This is done in an attempt to facilitate digital authentication anytime, anywhere, using the collected biometric data. Currently, the project has enrolled more than 1.1 billion individuals. Such large-scale projects often result in data having large intraclass variations, low interclass variations, and unconstrained environments.
Image
FIGURE 1.2
Sample images showcasing the large intraclass and low interclass variations that can be observed for the problem of face recognition. All images are taken from the Internet: (a) Images belonging to the same subject depicting high intraclass variations and (b) Images belonging to the different subjects showing low interclass variations. (Top, from left to right: https://tinyurl.com/y7hbvwsy,https://tinyurl.com/ydx3mvbf,https://tinyurl.com/y9uryu, https://tinyurl.com/y8lrnvrm; bottom from left to right, https://tinyurl.com/ybgvst84, https://tinyurl.com/y8762gl3, https://tinyurl.com/y956vrb6.)
Figure 1.2 presents sample face images that illustrate the low interclass and high intraclass variations that can be observed in face recognition. In an attempt to model the challenges of real-world applications, several largescale data sets, such as MegaFace [10], CelebA [11], and CMU Multi-PIE [12] have been prepared. The availability of large data sets and sophisticated technologies (both hardware and algorithms) provide researchers the resources to model the variations observed in the data. These variations can be modeled in either of the four stages shown in Figure 1.1. Each of the four stages in the biometrics pipeline can also be viewed as separate machine learning tasks, which involve learning of the optimal parameters to enhance the final authentication performance. For instance, in the segmentation stage, each pixel can be classified into modality (foreground) or background [13,14]. Similarly, at the time of preprocessing, based on prior knowledge, different techniques can be applied depending on the type or quality of input [15]. Moreover, because of the progress in machine learning research, feature extraction is now viewed as a learning task.
Traditionally, research in feature extraction focused largely on handcrafted features such as Gabor and Haralick features [5,16], histogram of oriented gradients [6], and local binary patterns [7]. Many such hand-crafted features encode the pixel variations in the images to generate robust feature vectors for performing classification. Building on these, more complex hand-crafted features are also proposed that encode rotation and scale variations in the feature vectors as well [17,18]. With the availability of training data, researchers have started focusing on learning-based techniques, resulting in several representation learning-based algorithms. Moreover, because the premise is to train the machines for tasks performed with utmost ease by humans, it seemed fitting to understand and imitate the functioning of the human brain. This led researchers to reproduce similar structures to automate complex tasks, which gave rise to the dom...

Table of contents