Scenario based performance optimisation in face verification using smart cards

被引:0
|
作者
Bourlai, T [1 ]
Messer, K [1 ]
Kittler, J [1 ]
机构
[1] Univ Surrey, Sch Elect & Phys Sci, Ctr Vis Speech & Signal Proc, Guildford GU2 7XH, Surrey, England
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We discuss the effect of an optimisation strategy to be applied to image data in a smart card based face verification system. Accordingly, we propose a system architecture considering the trade-off between performance versus the improvement of memory and bandwidth management. In order to establish the system limitations, studies were performed on the XM2VTS and FERET databases demonstrating that, spatial and grey level resolution as well as JPEG compression settings for face representation can be optimised from the point of view of verification error. We show that the use of a fixed precision data type does not affect system performance very much but can speed up the verification process. Since the optimisation framework of such a system is very complicated, the search space was simplified by applying some heuristics to the problem. In the adopted suboptimal search strategy one parameter is optimised at a time. The optimisation of one stage in the sequence was carded out for the parameters of the subsequent stages. Different results were achieved on different databases, indicating that the selection of different optimum parameters for system evaluation may call for different optimum operating points.
引用
收藏
页码:289 / 300
页数:12
相关论文
共 50 条
  • [41] A portable DRM scheme using smart cards
    Lee, Wei-Bin
    Wu, Wei-Jhen
    Chang, Chen-Yi
    [J]. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2007, 17 (03) : 247 - 258
  • [42] Session key distribution using smart cards
    Shoup, V
    Rubin, A
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 321 - 331
  • [43] Verification of Scenario-based Behavioural Models using Capella and PyNuSMV
    Busard, Simon
    Ponsard, Christophe
    Pecheur, Charles
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT (MODELSWARD), 2021, : 337 - 343
  • [44] Anonymous services using smart cards and cryptography
    Canard, S
    Traoré, J
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS VI, 2004, 153 : 83 - 98
  • [45] User Authentication Schemes Based on Smart Cards
    Li Zhongxian
    Zhan Banghua and Yang Yixian (Beijing University of Posts and Telecommunications
    [J]. The Journal of China Universities of Posts and Telecommunications, 1998, (02) : 57 - 59
  • [46] Fingerprint-based remote user authentication scheme using smart cards
    Lee, JK
    Ryu, SR
    Yoo, KY
    [J]. ELECTRONICS LETTERS, 2002, 38 (12) : 554 - 555
  • [47] A remote authentication scheme based on smart cards
    Liu, Jiqiang
    Zhong, Sheng
    Tang, Weimin
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1, 2008, : 1175 - 1177
  • [48] On the Security of the Discrete Logarithm Based Remote Authentication Scheme Using Smart Cards
    Lee, Yung-Cheng
    Lee, Pei-Ju
    [J]. APPLIED SCIENCE AND PRECISION ENGINEERING INNOVATION, PTS 1 AND 2, 2014, 479-480 : 963 - +
  • [49] Cryptanalysis of timestamp-based password authentication schemes using smart cards
    Wang, Guilin
    Bao, Feng
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 399 - +
  • [50] An OpenID Provider based on SSL Smart Cards
    Urien, Pascal
    [J]. 2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 444 - 445