Property:Abstract
From ISLAB/CAISR
Jump to navigationJump to searchThis is a property of type Text.
A
Audio- and Video-Based Biometric Person Authentication : Third International Conference, AVBPA 2001 Halmstad, Sweden, June 6--8, 2001 Proceedings +
<p>This book constitutes the refereed proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication, AVBPA 2001, held in Halmstad, Sweden in June 2001.The 51 revised papers presented together with three invited papers were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on face as biometrics; face image processing; speech as biometrics and speech processing; fingerprints as biometrics; gait as biometrics; and hand, signature, and iris as biometrics.</p> +
<p>This paper describes a new identity authentication technique by a synergetic use of lip-motion and speech. The lip-motion is defined as the distribution of apparent velocities in the movement of brightness patterns in an image and is estimated by computing the velocity components of the structure tensor by 1D processing, in 2D manifolds. Since the velocities are computed without extracting the speaker’s lip-contours, more robust visual features can be obtained in comparison to motion features extracted from lip-contours. The motion estimations are performed in a rectangular lip-region, which affords increased computational efficiency. A person authentication implementation based on lip-movements and speech is presented along with experiments exhibiting a recognition rate of 98%. Besides its value in authentication, the technique can be used naturally to evaluate the “liveness” of someone speaking as it can be used in text-prompted dialogue. The XM2VTS database was used for performance quantification as it is currently the largest publicly available database (≈300 persons) containing both lip-motion and speech. Comparisons with other techniques are presented.</p> +
<p>Securing the exchange of intellectual property and providing protection to multimedia contents in distribution systems have enabled the advent of digital rights management (DRM) systems. User authentication, a key component of any DRM system, ensures that only those with specific rights are able to access the digital information. It is here that biometrics play an essential role. It reinforces security at all stages where customer authentication is needed. Biometric recognition, as a means of personal authentication, is an emerging signal processing area focused on increasing security and convenience of use in applications where users need to be securely identified. In this article, we outline the state-of-the-art of several popular biometric modalities and technologies and provide specific applications where biometric recognition may be beneficially incorporated. In addition, the article also discussed integration strategies of biometric authentication technologies into DRM systems that satisfy the needs and requirements of consumers, content providers, and payment brokers, securing delivery channels and contents.</p> +
Automated image analysis- and soft computing-based detection of the invasive dinoflagellate Prorocentrum minimum (Pavillard) Schiller +
<p>A long term goal of this work is an automated system for image analysis- and soft computing-based detection, recognition, and derivation of quantitative concentration estimates of different phytoplankton species using a simple imaging system. This article is limited, however, to detection of objects in phytoplankton images, especially objects representing one invasive species-Prorocentrum minimum (P. minimum), which is known to cause harmful blooms in many estuarine and coastal environments. A new technique, combining phase congruency-based detection of circular objects, stochastic optimization, and image segmentation was developed for solving the task. The developed algorithms were tested using 114 images of 1280 × 960 pixels size recorded by a colour camera. There were 2088 objects representing P. minimum cells in the images in total. The algorithms were able to detect 93.25% of the objects. Bearing in mind simplicity of the imaging system used the result is rather encouraging and may be applied for future development of the algorithms aimed at automated classification of objects into classes representing different phytoplankton species. © 2011 Elsevier Ltd. All rights reserved.</p> +
<p>In order to maximize protein identification by peptide mass fingerprinting noise peaks must be removed from spectra and recalibration is often required. The preprocessing of the spectra before database searching is essential but is time-consuming. Nevertheless, the optimal database search parameters often vary over a batch of samples. For high-throughput protein identification, these factors should be set automatically, with no or little human intervention. In the present work automated batch filtering and recalibration using a statistical filter is described. The filter is combined with multiple data searches that are performed automatically. We show that, using several hundred protein digests, protein identification rates could be more than doubled, compared to standard database searching. Furthermore, automated large-scale in-gel digestion of proteins with endoproteinase LysC, and matrix-assisted laser desorption/ionization-time of flight (MALDI-TOF) analysis, followed by subsequent trypsin digestion and MALDI-TOF analysis were performed. Several proteins could be identified only after digestion with one of the enzymes, and some less significant protein identifications were confirmed after digestion with the other enzyme. The results indicate that identification of especially small and low-abundance proteins could be significantly improved after sequential digestions with two enzymes.</p> +
<p>The long-term goal of the work is a decision support system for diagnostics of laryngeal diseases. Colour images of vocal folds, a voice signal, and questionnaire data are the information sources to be used in the analysis. This paper is concerned with automated analysis of a voice signal applied to screening of laryngeal diseases. The effectiveness of 11 different feature sets in classification of voice recordings of the sustained phonation of the vowel sound /a/ into a healthy and two pathological classes, diffuse and nodular, is investigated. A k-NN classifier, SVM, and a committee build using various aggregation options are used for the classification. The study was made using the mixed gender database containing 312 voice recordings. The correct classification rate of 84.6% was achieved when using an SVM committee consisting of four members. The pitch and amplitude perturbation measures, cepstral energy features, autocorrelation features as well as linear prediction cosine transform coefficients were amongst the feature sets providing the best performance. In the case of two class classification, using recordings from 79 subjects representing the pathological and 69 the healthy class, the correct classification rate of 95.5% was obtained from a five member committee. Again the pitch and amplitude perturbation measures provided the best performance.</p> +
<p>A method using local features to assess the quality of an image, with demonstration in biometrics, is proposed. Recently, image quality awareness has been found to increase recognition rates and to support decisions in multimodal authentication systems significantly. Nevertheless, automatic quality assessment is still an open issue, especially with regard to general tasks. Indicators of perceptual quality like noise, lack of structure, blur, etc. can be retrieved from the orientation tensor of an image, but there are few studies reporting on this. Here we study the orientation tensor with a set of symmetry descriptors, which can be varied according to the application. Allowed classes of local shapes are generically provided by the user but no training or explicit reference information is required. Experimental results are given for fingerprint. Furthermore, we indicate the applicability of the proposed method to face images.</p> +
<p>The main objective of this work is to establish an automated classification system of seabed images. A novel two-stage approach to solving the image region classification task is presented. The first stage is based on information characterizing geometry, colour and texture of the region being analysed. Random forests and support vector machines are considered as classifiers in this work. In the second stage, additional information characterizing image regions surrounding the region being analysed is used. The reliability of decisions made in the first stage regarding the surrounding regions is taken into account when constructing a feature vector for the second stage. The proposed technique was tested in an image region recognition task including five benthic classes: red algae, sponge, sand, lithothamnium and kelp. The task was solved with the average accuracy of 90.11% using a data set consisting of 4589 image regions and the tenfold cross-validation to assess the performance. The two-stage approach allowed increasing the classification accuracy for all the five classes, more than 27% for the “difficult” to recognize “kelp” class. © 2018, Springer-Verlag London Ltd., part of Springer Nature.</p> +
<p>Automatic detection, recognition and geometric characterization of bacteriophages in electron microscopy images was the main objective of this work. A novel technique, combining phase congruency-based image enhancement, Hough transform-, Radon transform- and open active contours with free boundary conditions-based object detection was developed to detect and recognize the bacteriophages associated with infection and lysis of cyanobacteria Aphanizomenon flos-aquae. A random forest classifier designed to recognize phage capsids provided higher than 99% accuracy, while measurable phage tails were detected and associated with a correct capsid with 81.35% accuracy. Automatically derived morphometric measurements of phage capsids and tails exhibited lower variability than the ones obtained manually. The technique allows performing precise and accurate quantitative (e.g. abundance estimation) and qualitative (e.g. diversity and capsid size) measurements for studying the interactions between host population and different phages that infect the same host. © 2015 Elsevier Ltd.</p> +
Autonomous construction using scarce resources in unknown environments : Ingredients for an intelligent robotic interaction with the physical world +
<p>The goal of creating machines that autonomously perform useful work in a safe, robust and intelligent manner continues to motivate robotics research.Achieving this autonomy requires capabilities for understanding the environment, physically interacting with it, predicting the outcomes of actions and reasoning with this knowledge.Such intelligent physical interaction was at the centre of early robotic investigations and remains an open topic.</p><p>In this paper, we build on the fruit of decades of research to explore further this question in the context of autonomous construction in unknown environments with scarce resources.Our scenario involves a miniature mobile robot that autonomously maps an environment and uses cubes to bridge ditches and build vertical structures according to high-level goals given by a human.</p><p>Based on a "real but contrived" experimental design, our results encompass practical insights for future applications that also need to integrate complex behaviours under hardware constraints, and shed light on the broader question of the capabilities required for intelligent physical interaction with the real world.</p> +
<p>The phrase “most cruel and revolting crimes” has been used to describe some poor historical treatment of vulnerable impaired persons by precisely those who should have had the responsibility of protecting and helping them. We believe we might be poised to see history repeat itself, as increasingly humanlike aware robots become capable of engaging in behavior which we would consider immoral in a human–either unknowingly or deliberately. In the current paper we focus in particular on exploring some potential dangers affecting persons with dementia (PWD), which could arise from insufficient software or external factors, and describe a proposed solution involving rich causal models and accountability measures: Specifically, the Consequences of Needs-driven Dementia-compromised Behaviour model (C-NDB) could be adapted to be used with conversation topic detection, causal networks and multi-criteria decision making, alongside reports, audits, and deterrents. Our aim is that the considerations raised could help inform the design of care robots intended to support well-being in PWD.</p> +
Avoiding Playfulness Gone Wrong: Exploring Multi-objective Reaching Motion Generation in a Social Robot +
<p>Companion robots will be able to perform useful tasks in homes and public places, while also providing entertainment through playful interactions. “Playful” here means fun, happy, and humorous. A challenge is that generating playful motions requires a non-trivial understanding of how people attribute meaning and intentions. The literature suggests that playfulness can lead to some undesired impressions such as that a robot is obnoxious, untrustworthy, unsafe, moving in a meaningless fashion, or boring. To generate playfulness while avoiding such typical failures, we proposed a model for the scenario of a robot arm reaching for an object: some simplified movement patterns such as sinusoids are structured toward appearing helpful, clear about goals, safe, and combining a degree of structure and anomaly. We integrated our model into a mathematical framework (CHOMP) and built a new robot, Kakapo, to perform dynamically generated motions. The results of an exploratory user experiment were positive, suggesting that: Our proposed system was perceived as playful over the course of several minutes. Also a better impression resulted compared with an alternative playful system which did not use our proposed heuristics; furthermore a negative effect was observed for several minutes after showing the alternative motions, suggesting that failures are important to avoid. And, an inverted u-shaped correlation was observed between motion length and degree of perceived playfulness, suggesting that motions should neither be too short or too long and that length is also a factor which can be considered when generating playful motions. A short follow-up study provided some additional support for the idea that playful motions which seek to avoid failures can be perceived positively. Our intent is that these exploratory results will provide some insight for designing various playful robot motions, toward achieving some good interactions. © 2017, The Author(s).</p> +
B
<p>The battery cells are an important part of electric and hybrid vehicles and their deterioration due to aging directly affects the life cycle and performance of the whole battery system. Therefore an early aging detection of the battery cell is an important task and its correct solution could significantly improve the whole vehicle performance. This paper presents a computational strategy for battery aging detection, based on available data chunks from real operation of the vehicle. The first step is to aggregate (reduce) the original large amount of data by much smaller number of cluster centers. This is done by a newly proposed sequential clustering algorithm that arranges the clusters in decreasing order of their volumes. The next step is the proposed fuzzy inference procedure for weighed approximation of the cluster centers that creates comparable one dimensional fuzzy model for each available data set. Finally, the detection of the aged battery is treated as a similarity analysis problem, in which the pair distances between all battery cells are estimated by analyzing the predicted values from the respective fuzzy models. All these three steps of the computational procedure are explained in the paper and applied to real experimental data for battery aging detection. The results are positive and suggestions for further improvements are made in the conclusions. © 2012 IEEE.</p> +
<p>The battery cells are an important part of electric and hybrid vehicles and their deterioration due to aging directly affects the life cycle and performance of the whole battery system. Therefore an early aging detection of the battery cell is an important task and its correct solution could significantly improve the whole vehicle performance. This paper presents a computational strategy for battery aging detection, based on available data chunks from real operation of the vehicle. The first step is to aggregate (reduce) the original large amount of data by much smaller number of cluster centers. This is done by a newly proposed sequential clustering algorithm that arranges the clusters in decreasing order of their volumes. The next step is the proposed fuzzy inference procedure for weighed approximation of the cluster centers that creates comparable one dimensional fuzzy model for each available data set. Finally, the detection of the aged battery is treated as a similarity analysis problem, in which the pair distances between all battery cells are estimated by analyzing the predicted values from the respective fuzzy models. All these three steps of the computational procedure are explained in the paper and applied to real experimental data for battery aging detection. The results are positive and suggestions for further improvements are made in the conclusions. © 2012 IEEE.</p> +
<p>The diversity of components in electricity distribution grids makes it impossible, or at least very expensive, to deploy monitoring and fault diagnostics to every individual element. Therefore, power distribution companies are looking for cheap and reliable approaches that can help them to estimate the condition of their assets and to predict the when and where the faults may occur. In this paper we propose a simplified representation of failure patterns within historical faults database, which facilitates visualization of association rules using Bayesian Networks. Our approach is based on exploring the failure history and detecting correlations between different features available in those records. We show that a small subset of the most interesting rules is enough to obtain a good and sufficiently accurate approximation of the original dataset. A Bayesian Network created from those rules can serve as an easy to understand visualization of the most relevant failure patterns. In addition, by varying the threshold values of support and confidence that we consider interesting, we are able to control the tradeoff between accuracy of the model and its complexity in an intuitive way. © 2016 IEEE</p> +
<p>We evaluate the most useful regions for periocular recognition. For this purpose, we employ our periocular algorithm based on retinotopic sampling grids and Gabor analysis of the spectrum. We use both NIR and visible iris images. The best regions are selected via Sequential Forward Floating Selection (SFFS). The iris neighborhood (including sclera and eyelashes) is found as the best region with NIR data, while the surrounding skin texture (which is over-illuminated in NIR images) is the most discriminative region in visible range. To the best of our knowledge, only one work in the literature has evaluated the influence of different regions in the performance of periocular recognition algorithms. Our results are in the same line, despite the use of completely different matchers. We also evaluate an iris texture matcher, providing fusion results with our periocular system as well.</p> +
<p>HIV-1 protease has a broad and complex substrate specificity, which hitherto has escaped a simple comprehensive definition. This, and the relatively high mutation rate of the retroviral protease, makes it challenging to design effective protease inhibitors. Several attempts have been made during the last two decades to elucidate the enigmatic cleavage specificity of HIV-1 protease and to predict cleavage of novel substrates using bioinformatic analysis methods. This review describes the methods that have been utilized to date to address this important problem and the results achieved. The data sets used are also reviewed and important aspects of these are highlighted.</p> +
<p>We present a new system for biometric recognition using periocular images based on retinotopic sampling grids and Gabor analysis of the local power spectrum at different frequencies and orientations. A number of aspects are studied, including: 1) grid adaptation to dimensions of the target eye vs. grids of constant size, 2) comparison between circular- and rectangular-shaped grids, 3) use of Gabor magnitude vs. phase vectors for recognition, and 4) rotation compensation between query and test images. Results show that our system achieves competitive verification rates compared with other periocular recognition approaches. We also show that top verification rates can be obtained without rotation compensation, thus allowing to remove this step for computational efficiency. Also, the performance is not affected substantially if we use a grid of fixed dimensions, or it is even better in certain situations, avoiding the need of accurate detection of the iris region.</p> +
Biometric authentication : International ECCV 2002 Workshop, Copenhagen, Denmark, June 1, 2002 : proceedings +
<p>This book constitutes the refereed proceedings of the International Workshop on Biometric Authentication held in Copenhagen, Denmark, in June 2001 as a satellite event of ECCV 2002.The 19 revised full papers presented were carefully reviewed. The papers are organized in topical sections on face recognition, fingerprint recognition, psychology and biometrics, face detection and localization, gait and signature recognition, and classifiers for recognition.</p> +
<p>We present a new application area for biometric recognition: the identification of laboratory animals to replace today's invasive methods. Through biometric identification a non invasive identification technique is applied with a code space that is restricted only by the uniqueness of the biometric identifier in use, and with an error rate that is predictable. In this work we present the blood vessel pattern in a mouse-ear as a suitable biometric identifier used for mouse identification. Genuine and impostor score distributions are presented using a total of 50 mice. An EER of 2.5% is reported for images captured at the same instance of time which verifies the distinctive property of the biometric identifier.</p> +