ICASSP'06 1 S. Y. Kung 1 and M. W. Mak 2 1 Dept. of Electrical Engineering, Princeton University 2 Dept. of Electronic and Information Engineering, The.

Slides:



Advertisements
Similar presentations
Pseudo-Relevance Feedback For Multimedia Retrieval By Rong Yan, Alexander G. and Rong Jin Mwangi S. Kariuki
Advertisements

1 1 Slide © 2008 Thomson South-Western. All Rights Reserved Chapter 9 Hypothesis Testing Developing Null and Alternative Hypotheses Developing Null and.
Improved Neural Network Based Language Modelling and Adaptation J. Park, X. Liu, M.J.F. Gales and P.C. Woodland 2010 INTERSPEECH Bang-Xuan Huang Department.
1 Performance Evaluation of Score Level Fusion in Multimodal Biometric Systems Web Computing Laboratory Computer Science and Information Engineering Department.
Face detection Many slides adapted from P. Viola.
® Norman Poh Hoon Thian What is Biometric Authentication? A process of verifying an identity claim using a person’s behavioral and physiological characteristics.
Bayesian Decision Theory Chapter 2 (Duda et al.) – Sections
ICB /08/28 Curvewise DET Confidence Regions and Pointwise EER Confidence Intervals Michael Schuckers Yordan Minev St. Lawrence University, Canton,
Generic Object Detection using Feature Maps Oscar Danielsson Stefan Carlsson
Robust Real-time Object Detection by Paul Viola and Michael Jones ICCV 2001 Workshop on Statistical and Computation Theories of Vision Presentation by.
Speaker Adaptation for Vowel Classification
Dynamic Face Recognition Committee Machine Presented by Sunny Tang.
Business Statistics: A Decision-Making Approach, 6e © 2005 Prentice-Hall, Inc. Chap 9-1 Introduction to Statistics Chapter 10 Estimation and Hypothesis.
ROC Curves.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
CRICOS No J † e-Health Research Centre/ CSIRO ICT Centre * Speech, Audio, Image and Video Research Laboratory Comparing Audio and Visual Information.
C82MCP Diploma Statistics School of Psychology University of Nottingham 1 Overview of Lecture Independent and Dependent Variables Between and Within Designs.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Biometric ROC Curves Methods of Deriving Biometric Receiver Operating Characteristic Curves from the Nearest Neighbor Classifier Robert Zack dissertation.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
PY 427 Statistics 1Fall 2006 Kin Ching Kong, Ph.D Lecture 6 Chicago School of Professional Psychology.
Oral Defense by Sunny Tang 15 Aug 2003
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Learning at Low False Positive Rate Scott Wen-tau Yih Joshua Goodman Learning for Messaging and Adversarial Problems Microsoft Research Geoff Hulten Microsoft.
KinWrite: Handwriting-Based Authentication Using Kinect Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS 2013 Jing.
Machine Learning CS 165B Spring 2012
Person-Specific Domain Adaptation with Applications to Heterogeneous Face Recognition (HFR) Presenter: Yao-Hung Tsai Dept. of Electrical Engineering, NTU.
Link Reconstruction from Partial Information Gong Xiaofeng, Li Kun & C. H. Lai
An Integration Framework for Sensor Networks and Data Stream Management Systems.
Ajay Kumar, Member, IEEE, and David Zhang, Senior Member, IEEE.
Table 3:Yale Result Table 2:ORL Result Introduction System Architecture The Approach and Experimental Results A Face Processing System Based on Committee.
LOGO On Person Authentication by Fusing Visual and Thermal Face Biometrics Presented by: Rubie F. Vi ñ as, 方如玉 Adviser: Dr. Shih-Chung Chen, 陳世中.
Pengujian Hipotesis Dua Populasi By. Nurvita Arumsari, Ssi, MSi.
Multimodal Information Analysis for Emotion Recognition
One-class Training for Masquerade Detection Ke Wang, Sal Stolfo Columbia University Computer Science IDS Lab.
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Sound-Event Partitioning and Feature Normalization for Robust Sound-Event Detection 2 Department of Electronic and Information Engineering The Hong Kong.
Jun-Won Suh Intelligent Electronic Systems Human and Systems Engineering Department of Electrical and Computer Engineering Speaker Verification System.
Beyond Sliding Windows: Object Localization by Efficient Subwindow Search The best paper prize at CVPR 2008.
A Face processing system Based on Committee Machine: The Approach and Experimental Results Presented by: Harvest Jang 29 Jan 2003.
Speaker Verification Speaker verification uses voice as a biometric to determine the authenticity of a user. Speaker verification systems consist of two.
Designing multiple biometric systems: Measure of ensemble effectiveness Allen Tang NTUIM.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
Biometric for Network Security. Finger Biometrics.
A DYNAMIC APPROACH TO THE SELECTION OF HIGH ORDER N-GRAMS IN PHONOTACTIC LANGUAGE RECOGNITION Mikel Penagarikano, Amparo Varona, Luis Javier Rodriguez-
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
1 Testing of Hypothesis Two Sample test Dr. T. T. Kachwala.
1 Chi-square Test Dr. T. T. Kachwala. Using the Chi-Square Test 2 The following are the two Applications: 1. Chi square as a test of Independence 2.Chi.
NTU & MSRA Ming-Feng Tsai
AP Statistics. Chap 13-1 Chapter 13 Estimation and Hypothesis Testing for Two Population Parameters.
STD Approach Two general approaches: word-based and phonetics-based Goal is to rapidly detect the presence of a term in a large audio corpus of heterogeneous.
Multi-view Traffic Sign Detection, Recognition and 3D Localisation Radu Timofte, Karel Zimmermann, and Luc Van Gool.
UCD Electronic and Electrical Engineering Robust Multi-modal Person Identification with Tolerance of Facial Expression Niall Fox Dr Richard Reilly University.
Fast face localization and verification J.Matas, K.Johnson,J.Kittler Presented by: Dong Xie.
Statistical Inference for the Mean Objectives: (Chapter 8&9, DeCoursey) -To understand the terms variance and standard error of a sample mean, Null Hypothesis,
Tom Face Recognition Software in a border control environment: Non-zero-effort-attacks' effect on False Acceptance Rate.
Ch8.4 P-Values The P-value is the smallest level of significance at which H0 would be rejected when a specified test procedure is used on a given data.
Estimation & Hypothesis Testing for Two Population Parameters
College of Engineering
PLIP BASED UNSHARP MASKING FOR MEDICAL IMAGE ENHANCEMENT
Fast Preprocessing for Robust Face Sketch Synthesis
3. Applications to Speaker Verification
LECTURE 05: THRESHOLD DECODING
CSSE463: Image Recognition Day 11
Minimax Probability Machine (MPM)
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
Multimodal Caricatural Mirror
Section 11.1: Significance Tests: Basics
Presentation transcript:

ICASSP'06 1 S. Y. Kung 1 and M. W. Mak 2 1 Dept. of Electrical Engineering, Princeton University 2 Dept. of Electronic and Information Engineering, The Hong Kong Polytechnic University On Consistent Fusion of Multimodal Biometrics

ICASSP'06 2Outline Why Fusion for Audio-Visual Biometrics Consistent (vs. Catastrophic) Fusion Mixture-of-Expert Fusion Architecture Consistent fusion Linear fusion Nonlinear fusion Conclusion

ICASSP'06 3 Why Fusion for Audio-Visual Biometrics Voice biometrics can suffer severe performance degradation under noisy environment, but facial images are unaffected. Facial image quality can be severely affected in poor lighting conditions, but lighting has no effect on voice quality. Speech and faces provide complementary information sources that are ideal candidates for fusion – as verified by ROC(DET). Results based on 295 subjects from XM2VTSDB

ICASSP'06 4 Mixture-of-Expert Fusion Architecture The lower layer contains local experts, each produces a local score based on a single modality The upper layer contains a gating network

ICASSP'06 5ROC(DET) We may consider the audio and visual sources separately, i.e., we have two decision thresholds and two decision boundaries. By shifting the decision boundaries independently, we obtain two DET curves, one for each modality. False Acceptance Rate False Rejection Rate

ICASSP' users Imposters Regions of Consistent and Catastrophic Fusion Consistent Region Catastrophic Region

ICASSP'06 7 Consistent Fusion Yield a lower bound performance of consistent fusion (fusion that leads to performance equal to or better than any individual modalities) False Acceptance Rate False Rejection Rate Face Voice Imposters users

ICASSP'06 8 False Acceptance Rate False Rejection Rate Linear Fusion

ICASSP'06 9 Score distribution of multi-modalities Nonlinear Fusion

ICASSP'06 10 False Acceptance Rate False Rejection Rate Nonlinear Fusion

ICASSP' Face Voice Face+Voice (Nonlinear) Face+Voice (Linear) Linear Vs. Nonlinear Fusion

ICASSP'06 12 What if there are N (N >2) modalities: Which pair of modalities would be the best choice? Answer: DET (ROC) could provide a good indication on (1) how good and (2) how complementary. What guaranteed advantage to adopt N (N>2) modalities? False Acceptance Rate False Rejection Rate A B C

ICASSP'06 13 But there is a catch on statistical significance! This can be upheld only if the training data set, held-out set, and test set are assumed to have statistically the same distribution and provided in large volume.

ICASSP'06 14 Thank you

ICASSP'06 15Conclusions The notion of consistent fusion is proposed for multimodality fusion The consistent fusion framework leads to several adaptive fusion schemes, such as hard-switching, linear combination, and adaptive nonlinear SVM fusion. Results suggest that consistent fusion provides a valuable framework for choosing different modalities in multimodal biometric authentication.

ICASSP'06 16 For a single modality, a test sequence from a claimant is classified as coming from the true client if Decision threshold Score Distributions of Single Modality

ICASSP'06 17 DET Based on Single Modality Changing the threshold ηfrom small to large values, we obtain an ROC or DET False Acceptance Rate Large η Small η False Rejection Rate

ICASSP'06 18 Is Linear Fusion a good idea?

ICASSP'06 19 Classifier for Audio Channel Classifier for Visual Channel Adaptive Gating Network (e.g. hard-switch, linear combiner, and SVM) Fused Score Why Fusion for Audio-Visual Biometrics