Ngoc-Son Vu, Alice Caplier, GIPSA - Architecture, Géométrie, Perception, Images, Gestes (GIPSA-AGPIG), Département Images et Signal (GIPSA-DIS), Grenoble Images Parole Signal Automatique (GIPSA-lab), Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Stendhal - Grenoble 3-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Stendhal - Grenoble 3-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Grenoble Images Parole Signal Automatique (GIPSA-lab), Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Stendhal - Grenoble 3-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Stendhal - Grenoble 3-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS), Vesalis (Vesalis), PME, Jucheng Yang and Loris Nanni (Eds.), and Caplier, Alice
Due to its wide variety of real-life applications, ranging from user-authentication (access control, ATM) to video surveillance and law enforcements, face recognition has been one of the most active research topics in computer vision and pattern recognition. Also, it has obvious advantages over other biometric techniques, since it is natural, socially well accepted, and notably non-intrusive. In reality, several reliable biometrics authentication techniques are available and widely used nowadays (such as iris or fingerprint), but they mostly rely on an active participation of the user. On the contrary, facial biometric demands very little cooperation from the user; thanks to this user-friendly capability, face recognition is said to be non-intrusive. Over the last decades, significant progress has been achieved in face recognition area. Since the seminal work of Turk and Pentland (Turk & Pentland, 1991), where the Principal Component Analysis (PCA) is proposed to apply to face images (Eigenfaces), more sophisticated techniques for face recognition appear, such as Fisherfaces (Belhumeur et al., 1997), based on linear discriminant analysis (LDA), Elastic Bunch Graph Matching (EBGM) (Wiskott et al., 1997), as well as approaches based upon Support Vector Machines (SVM) (Phillips, 1999), or Hidden Markov Models (HMM) (Nefian & III, 1998; Vu & Caplier, 2010b), etc. Nevertheless, face recognition, notably under uncontrolled scenarios, remains active and unsolved. Among many factors affecting the performance of face recognition systems, illumination is known to be one of the most significant. Indeed, it was proven, both theoretically (Moses et al., 1994) and experimentally (Adini et al., 1997) that image variation due to lighting changes is more significant than that due to different personal identities. In other words, the difference between two face images of the same individual taken under varying lighting conditions is larger than the difference between any two face images taken under the same lighting conditions, as illustrated in Fig. 1. Inspired by the great ability of human retina that enables the eyes to see objects in different lighting conditions, we present in this chapter a novel method of illumination normalization by simulating the performance of its two layers: the photoreceptors and the outer plexiform layer. Thus, we say the algorithm biologically inspired. The rest of the chapter is structured as follows: Section 2 briefly discusses the related work; Section 3 presents the model of retinal processing and its advantage. In Section 4, the 6