Scenario based performance optimisation in face verification using smart cards

被引:0
|
作者
Bourlai, T [1 ]
Messer, K [1 ]
Kittler, J [1 ]
机构
[1] Univ Surrey, Sch Elect & Phys Sci, Ctr Vis Speech & Signal Proc, Guildford GU2 7XH, Surrey, England
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We discuss the effect of an optimisation strategy to be applied to image data in a smart card based face verification system. Accordingly, we propose a system architecture considering the trade-off between performance versus the improvement of memory and bandwidth management. In order to establish the system limitations, studies were performed on the XM2VTS and FERET databases demonstrating that, spatial and grey level resolution as well as JPEG compression settings for face representation can be optimised from the point of view of verification error. We show that the use of a fixed precision data type does not affect system performance very much but can speed up the verification process. Since the optimisation framework of such a system is very complicated, the search space was simplified by applying some heuristics to the problem. In the adopted suboptimal search strategy one parameter is optimised at a time. The optimisation of one stage in the sequence was carded out for the parameters of the subsequent stages. Different results were achieved on different databases, indicating that the selection of different optimum parameters for system evaluation may call for different optimum operating points.
引用
收藏
页码:289 / 300
页数:12
相关论文
共 50 条
  • [1] Face verification system architecture using smart cards
    Bourlai, T
    Messer, K
    Kittler, J
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 1, 2004, : 793 - 796
  • [2] Fingerprint verification using smart cards for access control systems
    Sanchez-Reillo, R
    Sanchez-Avila, C
    [J]. IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2002, 17 (09) : 12 - 15
  • [3] Fingerprint verification using smart cards for access control systems
    Sanchez-Reillo, R
    Sanchez-Avila, C
    [J]. 35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2001, : 250 - 253
  • [4] Bytecode verification on Java smart cards
    Leroy, Xavier
    [J]. Software - Practice and Experience, 2002, 32 (04): : 319 - 340
  • [5] "Internet of Smart Cards": A pocket attacks scenario
    Sportiello, Luigi
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2019, 26
  • [6] Bytecode verification on Java']Java smart cards
    Leroy, X
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2002, 32 (04): : 319 - 340
  • [7] Research on WLAN scenario optimisation policy based on IoT smart campus
    Wu, Yu-Qin
    Feng, Wei
    Li, Shun-Bin
    [J]. International Journal of Information and Communication Technology, 2023, 22 (04) : 343 - 361
  • [8] Biometrics person authentication using projection-based face recognition system in verification scenario
    Moon, H
    [J]. BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3072 : 207 - 213
  • [9] A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards
    Henzl, Martin
    Hanacek, Petr
    [J]. RADIOENGINEERING, 2016, 25 (01) : 132 - 139
  • [10] Byte code verification for Java']Java smart cards based on model checking
    Posegga, J
    Vogt, H
    [J]. COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 175 - 190