Constructing SVM multiple tree for face membership authentication

被引:0
|
作者
Pang, SN [1 ]
机构
[1] Auckland Univ Technol, Knowledge Engn & Discover Res Inst, Auckland 1020, New Zealand
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In membership authentication problem that has a complicated and mixed data distribution, the authentication accuracy obtained from using one classifier is not sufficient despite its powerful classification ability. To overcome this limitation, an support vector machine (SVM) multiple tree is developed in this paper according to a "divide and conquer" strategy. It is demonstrated that the proposed method shows a good membership authentication performance, as well as the strong robustness to the variations of group membership, as compared with the SVM ensemble method [1]. Specifically, the proposed method shows a better improvement in authentication performance as the group size increases larger.
引用
收藏
页码:37 / 43
页数:7
相关论文
共 50 条
  • [41] Evaluating membership functions for fuzzy discrete SVM
    Orsenigo, Carlotta
    Vercellis, Carlo
    [J]. APPLICATIONS OF FUZZY SETS THEORY, 2007, 4578 : 187 - +
  • [42] ON CONSTRUCTING THE ELIMINATION TREE
    ZHU, YZ
    MUTCHLER, D
    [J]. DISCRETE APPLIED MATHEMATICS, 1994, 48 (01) : 93 - 98
  • [43] Constructing tree lattices
    Carbone, LJ
    [J]. ALGEBRAS AND COMBINATORICS, 1999, : 63 - 97
  • [44] Constructing a phylogenetic tree
    Lis, Monika
    [J]. Communications in Computer and Information Science, 2014, 500 : 101 - 109
  • [45] Audio-Visual Person Authentication with Multiple Visualized-Speech Features and Multiple Face Profiles
    Das, Amitava
    Manyam, Ohil K.
    Tapaswi, Makarand
    [J]. SIXTH INDIAN CONFERENCE ON COMPUTER VISION, GRAPHICS & IMAGE PROCESSING ICVGIP 2008, 2008, : 39 - 46
  • [46] Constructing authentication web in cloud computing
    Zhao, Gansen
    Ba, Zhongjie
    Wang, Xinming
    Zhang, Feng
    Huang, Changqin
    Tang, Yong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2843 - 2860
  • [47] An efficient and flexible mechanism for constructing membership functions
    Medaglia, AL
    Fang, SC
    Nuttle, HLW
    Wilson, JR
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2002, 139 (01) : 84 - 95
  • [48] Constructing Topic Hierarchy Tree for User Interests From Multiple Knowledge Bases
    Eissa, Amani H. B.
    El-Sharkawi, Mohamed E.
    Mokhtar, Hoda M. O.
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATICS AND APPLICATIONS (ICIA2016), 2016, : 123 - 126
  • [49] On Modeling variations for face authentication
    Liu, XM
    Chen, TH
    Kumar, BVKV
    [J]. FIFTH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION, PROCEEDINGS, 2002, : 384 - 389
  • [50] Secure authentication for face recognition
    Dabbah, M. A.
    Woo, W. L.
    Dlay, S. S.
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN IMAGE AND SIGNAL PROCESSING, 2007, : 121 - 126