267 results on '"Michael Fairhurst"'
Search Results
2. Advances In Digital Handwritten Signature Processing: A Human Artefact For E-society: A Human Artefact for e-Society
- Author
-
Giuseppe Pirlo, Donato Impedovo, Michael Fairhurst
- Published
- 2014
3. Improving multi-view facial expression recognition through two novel texture-based feature representations
- Author
-
Xuejian Wang, Anne M. P. Canuto, and Michael Fairhurst
- Subjects
Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020206 networking & telecommunications ,Pattern recognition ,02 engineering and technology ,Texture (geology) ,Theoretical Computer Science ,Facial expression recognition ,Artificial Intelligence ,Feature (computer vision) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,Artificial intelligence ,business - Abstract
Although several automatic computer systems have been proposed to address facial expression recognition problems, the majority of them still fail to cope with some requirements of many practical application scenarios. In this paper, one of the most influential and common issues raised in practical application scenarios when applying automatic facial expression recognition system, head pose variation, is comprehensively explored and investigated. In order to do this, two novel texture feature representations are proposed for implementing multi-view facial expression recognition systems in practical environments. These representations combine the block-based techniques with Local Ternary Pattern-based features, providing a more informative and efficient feature representation of the facial images. In addition, an in-house multi-view facial expression database has been designed and collected to allow us to conduct a detailed research study of the effect of out-of-plane pose angles on the performance of a multi-view facial expression recognition system. Along with the proposed in-house dataset, the proposed system is tested on two well-known facial expression databases, CK+ and BU-3DFE datasets. The obtained results shows that the proposed system outperforms current state-of-the-art 2D facial expression systems in the presence of pose variations.
- Published
- 2020
- Full Text
- View/download PDF
4. The Multiscenario Multienvironment BioSecure Multimodal Database (BMDB)
- Author
-
Lale Akarun, Bernadette Dorizzi, Javier Ortega-Garcia, Joaquin Gonzalez-Rodriguez, Bao Ly-Van, Sonia Garcia-Salicetti, Arman Savran, Harald Ganster, M.R. Freire, Jonas Richiardi, Josef Kittler, Andrezj Drygajlo, Javier Galbally, Massimo Tistarelli, Sri-Kaushik Pavani, Jean Hennebert, J.L. Alba-Castro, Fernando Alonso-Fernandez, Linda Brodo, Thirimachos Bourlai, Lorene Allano, Enrique Otero-Muras, Elisardo González-Agulla, Michael Fairhurst, Alejandro F. Frangi, Ming Ng, Julian Fierrez, Norman Poh, Farzin Deravi, Carmen García-Mateo, Federico M. Sukno, Andreas Humm, Biometric Recognition Group (Universidad Autonoma de Madrid) (ATVS), Departamento de Teoría de la Señal y Comunicaciones (Universidad de Vigo ) (TSC), Département Electronique et Physique (EPH), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Centre for Vision, Speech and Signal Processing (CVSSP), University of Surrey (UNIS), Lane Department of Computer Science and Electrical Engineering [Virginia] (LCSEE), West Virginia University [Morgantown], School of Engineering and Digital Art (University of Kent) (EDA), Department of Informatics (University of Fribourg), Computer Vision Laboratory (Facoltà di Architettura ad Alghero, Università degli studi di Sassari), Speech Processing and Biometrics Group (Laboratory of IDIAP, Signal Processing Institute, SwissFederal Institute of Technology ) (GTPB), Institute of Digital Image Processing (Joanneum Research) (DIP), Biomedical Research Networking Center in Bioengineering, Biomaterials and Nanomedicine (CIBER-BBN), Instituto de Salud Carlos III [Madrid] (ISC)-ministerio de ciencia e innovacion, Center for Computational Imaging and Simulation Technologies in Biomedicine (CISTIB), Universitat Pompeu Fabra [Barcelona] (UPF), Department of Computer Engineering [Bogazici], Boǧaziçi üniversitesi = Boğaziçi University [Istanbul], Signal and Image Processing Laboratory (Bogazici University) (BUSIM), Department of Electrical and Electronics Engineering (Bogazici University), Universitat Pompeu Fabra, and Boğaziçi University [Istanbul]
- Subjects
Male ,FOS: Computer and information sciences ,Computer Science - Cryptography and Security ,Databases, Factual ,Computer science ,Performance ,Computer Vision and Pattern Recognition (cs.CV) ,0211 other engineering and technologies ,Fingerprint ,Computer Science - Computer Vision and Pattern Recognition ,Iris ,02 engineering and technology ,computer.software_genre ,Benchmark ,Signature ,Bases de dades ,Data acquisition ,0202 electrical engineering, electronic engineering, information engineering ,Evaluation ,Biometria ,Database ,Applied Mathematics ,ING-INF/05 Sistemi di elaborazione delle informazioni ,Speaker ,Online Signature Verification ,Quality Measures ,Fingerprint recognition ,Base-Line Corpus ,Computational Theory and Mathematics ,Biometrics ,Biometric Identification ,Data Interpretation, Statistical ,Female ,020201 artificial intelligence & image processing ,The Internet ,Computer Vision and Pattern Recognition ,[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing ,Cryptography and Security (cs.CR) ,Biometric Database ,Mobile computing ,Signalbehandling ,Iris flower data set ,Artificial Intelligence ,Humans ,Dermatoglyphics ,INF/01 Informatica ,021110 strategic, defence & security studies ,business.industry ,Reproducibility of Results ,Hand ,Recognition ,Multimodal biometrics ,Face ,Signal Processing ,Multimodal ,Voice ,Database Management Systems ,business ,computer ,Software - Abstract
A new multimodal biometric database designed and acquired within the framework of the European BioSecure Network of Excellence is presented. It is comprised of more than 600 individuals acquired simultaneously in three scenarios: 1) over the Internet, 2) in an office environment with desktop PC, and 3) in indoor/outdoor environments with mobile portable hardware. The three scenarios include a common part of audio/video data. Also, signature and fingerprint data have been acquired both with desktop PC and mobile portable hardware. Additionally, hand and iris data were acquired in the second scenario using desktop PC. Acquisition has been conducted by 11 European institutions. Additional features of the BioSecure Multimodal Database (BMDB) are: two acquisition sessions, several sensors in certain modalities, balanced gender and age distributions, multimodal realistic scenarios with simple and quick tasks per modality, cross-European diversity, availability of demographic data, and compatibility with other multimodal databases. The novel acquisition conditions of the BMDB allow us to perform new challenging research and evaluation of either monomodal or multimodal biometric systems, as in the recent BioSecure Multimodal Evaluation campaign. A description of this campaign including baseline results of individual modalities from the new database is also given. The database is expected to be available for research purposes through the BioSecure Association during 2008, Published at IEEE Transactions on Pattern Analysis and Machine Intelligence journal
- Published
- 2021
- Full Text
- View/download PDF
5. Effect of Ground Motion Duration on Reinforced Concrete Shear Wall Buildings
- Author
-
Carlos E. Ventura, Armin Bebamzadeh, and Michael Fairhurst
- Subjects
Ground motion ,Geophysics ,medicine ,Shear wall ,Geotechnical engineering ,medicine.symptom ,Duration (project management) ,Geotechnical Engineering and Engineering Geology ,Reinforced concrete ,Geology ,Collapse (medical) - Abstract
This paper investigates the effect of earthquake ground motion duration on the design and collapse risk of reinforced concrete shear wall buildings from 6 to 30 stories. Both design and collapse levels of shaking were considered through nonlinear incremental dynamic analysis. At the design level of shaking, it was found that (1) maximum interstory drifts were increased as ground motion duration increased (from
- Published
- 2019
- Full Text
- View/download PDF
6. Reinforcement of Light-Frame Wood Structures
- Author
-
Michael Fairhurst, Thomas Tannert, and Marisa Mulder
- Subjects
Brittleness ,Computer science ,business.industry ,Frame (networking) ,Shear wall ,Seismic retrofit ,Structural engineering ,Reinforcement ,business ,Roof - Abstract
Recent post-earthquake evaluations of the performance of light-frame wood buildings have pointed out a number of deficiencies that may make such buildings susceptible to high levels of damage and collapse in a seismic event. This chapter focuses, firstly, on defining the deficiencies that are common in light-frame wood structures, including weak first storey, weak roof or floor diaphragms, shear walls with insufficient strength, inadequate load path, geometric and mass eccentricities, and brittle components. Subsequently, the chapter describes conventional as well as state-of-the-art retrofit solutions that are available in specific codes and guidelines.
- Published
- 2021
- Full Text
- View/download PDF
7. Costatone C—A new halogenated monoterpene from the New Zealand red alga plocamium angustum
- Author
-
Robert Keyzers, M Ali Hashmi, Giuseppe Zuccarello, Monica Gerth, Michael Fairhurst, Z Sohail, and Joe Bracegirdle
- Abstract
© 2019 by the authors Red algae of the genus Plocamium have been a rich source of halogenated monoterpenes. Herein, a new cyclic monoterpene, costatone C (7), was isolated from the extract of P. angustum collected in New Zealand, along with the previously reported (1E,5Z)-1,6-dichloro-2-methylhepta-1,5-dien-3-ol (8). Elucidation of the planar structure of 7 was achieved through conventional NMR and (−)-HR-APCI-MS techniques, and the absolute configuration by comparison of experimental and DFT-calculated ECD spectra. The absolute configuration of 8 was determined using Mosher’s method. Compound 7 showed mild antibacterial activity against Staphylococcus aureus and S. epidermidis. The state of Plocamium taxonomy and its implications upon natural product distributions, especially across samples from specimens collected in different countries, is also discussed.
- Published
- 2020
- Full Text
- View/download PDF
8. Determining Subcategories of Facial Expressions for Improved Performance in Practical Applications
- Author
-
Anne M. P. Canuto, Michael Fairhurst, and Xuejian Wang
- Subjects
0209 industrial biotechnology ,Facial expression ,Computer science ,Context (language use) ,02 engineering and technology ,Space (commercial competition) ,Computer Science Applications ,Theoretical Computer Science ,Improved performance ,020901 industrial engineering & automation ,Facial expression recognition ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,Software ,Cognitive psychology - Abstract
In the context of facial expression recognition (FER), this paper reviews the fundamental theories of emotions and further explains the key dimensions of a defined emotional space. The main contribution of this paper is to propose a set of novel categorization methods for facial expressions to be used in the design of an automatic FER system. This novel categorization enables the facial expression to be interpreted in a better way that and to be more effective in practical applications of automatic FER systems. In order to validate the feasibility of the proposed categorization methods, a set of experiments is reported which investigates and analyzes the influence that the novel categorization brings to a multi-view FER system.
- Published
- 2020
- Full Text
- View/download PDF
9. Seismic reliability analysis of a timber steel hybrid system
- Author
-
Thomas Tannert, Xiaoyue Zhang, and Michael Fairhurst
- Subjects
business.industry ,Computer science ,Structural system ,0211 other engineering and technologies ,Stiffness ,020101 civil engineering ,02 engineering and technology ,Structural engineering ,Standard deviation ,0201 civil engineering ,Nonlinear system ,Structural load ,Hybrid system ,021105 building & construction ,medicine ,medicine.symptom ,business ,Ductility ,Reliability (statistics) ,Civil and Structural Engineering - Abstract
Seismic reliability analyses account for the inherent uncertainties in both the actions (earthquakes) and the reactions (properties of the structural systems) of a structure. To predict the failure probability of a structure, the system response due to external loads is usually estimated by a numerical method. In this paper, seismic reliability analyses were performed on a novel timber-steel hybrid system labelled FFTT (Finding the Forest Through the Trees) system. The FFTT system utilizes mass-timber panels to resist gravity and lateral loads and interconnecting steel members to provide the necessary ductility for seismic demands. To reduce the computational effort for reliability analyses, Genetic Algorithms (GA) and Analysis of Variance in combination with response surface methods were applied and compared. Uncertainties involving ground motions, seismic weight, connection properties of the lateral load resisting system, and ductility factor were considered in formulating the performance functions. Mean and standard deviation of peak inter-storey drift were selected as performance criteria. Nonlinear dynamic analyses were run to generate the response database for the FFTT system and the reliability index was calculated using second-order reliability methods. The results showed that the GA method was superior and that the ground motion was the most significant factor for structural reliability, while the ductility factor, the structural weight, the hold-down and connection stiffness also played significant roles.
- Published
- 2018
- Full Text
- View/download PDF
10. Predictive biometrics: a review and analysis of predicting personal characteristics from biometric data
- Author
-
Marjory Da Costa-Abreu, Cheng Li, and Michael Fairhurst
- Subjects
Value (ethics) ,021110 strategic, defence & security studies ,User authentication ,Biometrics ,Computer science ,Subject Age ,Data_MISCELLANEOUS ,Soft biometrics ,0211 other engineering and technologies ,02 engineering and technology ,Key issues ,Data science ,Identification (information) ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,Biometric data ,Software - Abstract
Interest in the exploitation of soft biometrics information has continued to develop over the last decade or so. In comparison with traditional biometrics, which focuses principally on person identification, the idea of soft biometrics processing is to study the utilisation of more general information regarding a system user, which is not necessarily unique. There are increasing indications that this type of data will have great value in providing complementary information for user authentication. However, the authors have also seen a growing interest in broadening the predictive capabilities of biometric data, encompassing both easily definable characteristics such as subject age and, most recently, `higher level' characteristics such as emotional or mental states. This study will present a selective review of the predictive capabilities, in the widest sense, of biometric data processing, providing an analysis of the key issues still adequately to be addressed if this concept of predictive biometrics is to be fully exploited in the future.
- Published
- 2017
- Full Text
- View/download PDF
11. Introducing an approach for writer recognition based on the i ‐vector paradigm
- Author
-
Carmen García-Mateo, Francisco Troncoso-Pastoriza, and Michael Fairhurst
- Subjects
021110 strategic, defence & security studies ,Point of interest ,Computer science ,business.industry ,Feature extraction ,0211 other engineering and technologies ,Verification system ,Pattern recognition ,02 engineering and technology ,Speaker recognition ,I vector ,computer.software_genre ,Field (computer science) ,Handwriting ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,Artificial intelligence ,business ,computer ,Software ,Natural language processing - Abstract
An off-line text-independent writer verification system that leverages the similarities with the field of speaker recognition by employing analogous techniques for modelling and comparing the features extracted from the input text images is presented. The main contribution of this work is the use of the i -vector paradigm in a writer verification setting. The proposed system is evaluated with images of lines of text from the IAM Handwriting Database, and compared with more traditional approaches. The authors also analyse several algorithms for the detection and extraction of points of interest in the text images, different parameters for the modelling part and different scoring techniques. The obtained results show that the use of i -vectors clearly improves the performance of the system even for configurations where the overhead of the additional calculations is minimal.
- Published
- 2017
- Full Text
- View/download PDF
12. Investigating the Impact of Combining Handwritten Signature and Keyboard Keystroke Dynamics for Gender Prediction
- Author
-
Cheng Li, Anne M. P. Canuto, Danilo Rodrigo Cavalcante Bandeira, Diego S. C. Nascimento, Marjory Da Costa-Abreu, and Michael Fairhurst
- Subjects
021110 strategic, defence & security studies ,Modalities ,Biometrics ,Artificial neural network ,Computer science ,business.industry ,Data_MISCELLANEOUS ,0211 other engineering and technologies ,020207 software engineering ,Context (language use) ,02 engineering and technology ,Space (commercial competition) ,Machine learning ,computer.software_genre ,Identification (information) ,Keystroke dynamics ,Handwriting ,ComputerApplications_MISCELLANEOUS ,0202 electrical engineering, electronic engineering, information engineering ,Artificial intelligence ,InformationSystems_MISCELLANEOUS ,business ,computer - Abstract
© 2019 IEEE. The use of soft-biometric data as an auxiliary tool on user identification is already well known. Gender, handorientation and emotional state are some examples which can be called soft-biometrics. These soft-biometric data can be predicted directly from the biometric templates. It is very common to find researches using physiological modalities for soft-biometric prediction, but behavioural biometric is often not well explored for this context. Among the behavioural biometric modalities, keystroke dynamics and handwriting signature have been widely explored for user identification, including some soft-biometric predictions. However, in these modalities, the soft-biometric prediction is usually done in an individual way. In order to fill this space, this study aims to investigate whether the combination of those two biometric modalities can impact the performance of a soft-biometric data, gender prediction. The main aim is to assess the impact of combining data from two different biometric sources in gender prediction. Our findings indicated gains in terms of performance for gender prediction when combining these two biometric modalities, when compared to the individual ones.
- Published
- 2019
- Full Text
- View/download PDF
13. Investigating the Effect of Writer Style, Age and Gender on Natural Revocability Analysis in Handwritten Signature Biometric
- Author
-
Tasmina Islam and Michael Fairhurst
- Subjects
010504 meteorology & atmospheric sciences ,Relation (database) ,Revocation ,Biometrics ,business.industry ,Computer science ,Compromise ,media_common.quotation_subject ,010501 environmental sciences ,computer.software_genre ,01 natural sciences ,Signature (logic) ,Style (sociolinguistics) ,Natural (music) ,Artificial intelligence ,business ,Function (engineering) ,computer ,Natural language processing ,0105 earth and related environmental sciences ,media_common - Abstract
“Natural revocability” is an extremely simple and intuitive strategy for the revocation process in the event of compromise without the need for complex mathematical processing, This paper investigates the possibilities of adopting the strategy, in relation to security and reliability in handwritten signature analysis by exploring the effect of writer style, age and gender on signature analysis. This is examined by performing analysis of variance for the extracted features based on three style categories, two gender groups and three age groups. The results from the analysis provide some valuable insight into the concept of natural revocability as a function of writer style, age and gender.
- Published
- 2019
- Full Text
- View/download PDF
14. Seismic Response and Collapse Risk of Shearwall Buildings Subjected to Long Duration Ground Motion
- Author
-
Ilaria Capraro, Carlos E. Ventura, Armin Bebamzadeh, and Michael Fairhurst
- Subjects
Ground motion ,Subduction ,business.industry ,medicine ,Shear wall ,Structural engineering ,medicine.symptom ,Duration (project management) ,Reinforced concrete ,business ,Short duration ,Geology ,Collapse (medical) - Abstract
The damage caused by large subduction earthquakes is due in part to high number of load reversal cycles. Experimental and analytical studies indicate that shaking duration and number of cycles contribute to the damage. Currently, building codes do not include explicit design provisions for shaking duration. This paper investigates how shaking duration affects the response of tall, shearwall buildings in British Columbia, which is located in the Cascadia Subduction Zone. A suite of concrete shearwall archetype building models are analyzed with suites long and short duration ground motions. A case study of a reinforced concrete frame is presented to illustrate that long duration shaking can also affect significantly their seismic response. The results are useful for the elaboration of design provisions to account for shaking duration.
- Published
- 2019
- Full Text
- View/download PDF
15. Fusion of Local Descriptors for Multi-view Facial Expression Recognition
- Author
-
Anne M. P. Canuto, Xuejian Wang, and Michael Fairhurst
- Subjects
Facial expression ,Computer science ,business.industry ,Texture Descriptor ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020207 software engineering ,Pattern recognition ,02 engineering and technology ,Facial recognition system ,ComputingMethodologies_PATTERNRECOGNITION ,Histogram ,Face (geometry) ,0202 electrical engineering, electronic engineering, information engineering ,Feature (machine learning) ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Computer facial animation - Abstract
Facial expressions can be seen as a form of non-verbal communication as well as a primary means of conveying social information among humans.Automatic facial expression recognition (FER) can be applied to a wide range of scenarios in human-computer interaction, facial animation, entertainment, and psychology studies. For feature representation in a FER system, various texture descriptors have been employed to derive an effective solution for this system. However, these individual texture descriptor-based FER systems have often failed to achieve effective performance in the recognition of facial expressions. In this sense, it is necessary to further improve the general performance of a facial expression recognition system, evaluating different feature representations. In this paper, a novel local descriptor for a facial expression recognition system is proposed, designated the level of difference descriptor (LOD). The main goal is to use this descriptor as a supplement to state-of-the-art local descriptors to further improve the performance of a FER system in terms of classification accuracy. Furthermore, the fusion of various texture features for devising a robust feature representation for multi-view facial expression recognition is presented.
- Published
- 2018
16. Biometrics: A Very Short Introduction
- Author
-
Michael Fairhurst
- Abstract
Biometrics is the scientific discipline of identifying individuals by means of the measurement of unique personal attributes, such as facial appearance, fingerprints, iris patterning, the voice, the way we write, and the way we walk. The new technologies of biometrics have a wide range of practical applications, from securing mobile phones and laptops to establishing identity in bank transactions, travel documents, and national identity cards. Biometrics: A Very Short Introduction considers the capabilities of biometrics-based identity checking and looks at the basic techniques in use today, developments in system design, and emerging technologies. It also explores the benefits and limitations of biometrics technologies, and how they can effectively support our increasingly interconnected society.
- Published
- 2018
- Full Text
- View/download PDF
17. 3. Making biometrics work
- Author
-
Michael Fairhurst
- Subjects
Work (electrical) ,Biometrics ,Computer science ,ComputerApplications_MISCELLANEOUS ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data science - Abstract
In order to assess the practicality or suitability of a particular biometric modality in any given application, or to judge how effective biometrics-based identity monitoring is likely to be in a particular situation, we need to understand the principal issues that affect a chosen modality. ‘Making biometrics work’ examines the relevant technologies of four major modalities—fingerprints, iris patterns, facial images, and the handwritten signature. All modalities offer both advantages and disadvantages, and performance will depend very much on the nature of the proposed application, the nature of the population who will be the primary users of the system, and the environment in which it is to operate.
- Published
- 2018
- Full Text
- View/download PDF
18. 6. Where are we going?
- Author
-
Michael Fairhurst
- Subjects
ComputingMethodologies_PATTERNRECOGNITION ,Data_MISCELLANEOUS - Abstract
‘Where are we going?’ looks at some other biometric modalities that may achieve a higher profile in future, including hand-based biometrics, keystroke dynamics, ear-shape biometrics, and electrocardiogram and electroencephalogram measurements. It then discusses the problem of ageing in the design and use of biometric systems before considering human interaction with biometric systems and the impact of the usability of systems on their success. Biometrics systems are increasingly and manifestly having an impact on everyday life. Properly understood and sensitively applied, these can improve our security, increase our confidence in processes that are designed to dovetail into the way modern society works, and enhance the convenience and power of technology, for the benefit of everyone.
- Published
- 2018
- Full Text
- View/download PDF
19. 1. Are you who you say you are?
- Author
-
Michael Fairhurst
- Abstract
Many aspects of modern life raise questions about individual identity: how we prove that we are who we say we are, and how we can be sure that another person is who he or she claims to be. ‘Are you who you say you are?’ considers the different ways of establishing personal identity and the fundamentals of biometrics. In principle, any human characteristic can be used as a biometric data source provided it meets the following four basic criteria: universality, uniqueness, permanence, and collectability. The source of the measurement data used for identification—biometric modality—can be either physiological or behavioural. Some applications of biometric systems are also considered.
- Published
- 2018
- Full Text
- View/download PDF
20. 4. Enhancing biometric processing
- Author
-
Michael Fairhurst
- Subjects
Biometrics ,Computer science ,Speech recognition ,Data_MISCELLANEOUS - Abstract
‘Enhancing biometric processing’ explores how the field of biometrics is developing, and the main ideas promoting the improvement of the accuracy, reliability, and effectiveness of biometric systems. It is unlikely that any individual biometric modality operating alone will completely meet all the desirable criteria for a given task, especially when the variety of issues that are needed are considered in any practical situation. To improve system performance different systems can be used such as adding extra power using a multiclassifier configuration, increasing flexibility using multimodal systems, and using soft biometrics as additional identity evidence. Resistance to ‘spoofing’ attacks, biometric data integrity, and extending the application domains for biometrics-based processing are also considered.
- Published
- 2018
- Full Text
- View/download PDF
21. 5. Predictive biometrics
- Author
-
Michael Fairhurst
- Subjects
Biometrics ,Computer science ,business.industry ,Data_MISCELLANEOUS ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Artificial intelligence ,Machine learning ,computer.software_genre ,business ,computer - Abstract
Is there any reason why the data captured in a biometric system could not be used for other sorts of prediction too? ‘An introduction to predictive biometrics’ looks at how instead of supplementing conventional data with soft biometric data, conventional biometric data might be used to predict some soft biometric characteristics of an individual. Predictive biometrics has expanded considerably in recent years, with the two most frequently studied characteristics being age and gender using, for example, biometric iris data. Recent studies are taking predictive biometrics further still, aiming to predict so-called ‘higher level’ individual characteristics, such as those which reflect an individual’s mental or emotional state.
- Published
- 2018
- Full Text
- View/download PDF
22. 2. Biometrics: where should I start?
- Author
-
Michael Fairhurst
- Subjects
Biometrics ,Computer science ,Computer security ,computer.software_genre ,computer - Abstract
‘Biometrics: where should I start?’ considers what constitutes a practical biometric system. It looks at the principles on which such a system operates, builds up a picture of the components needed to construct such a system, and takes the first steps towards understanding how to implement a biometric system. It also looks at how, when, and why errors can arise and how the performance of a biometric system can be evaluated, both qualitatively and quantitatively, to understand more clearly the nature of the interaction between the user and the system itself, and to determine helpful ways of describing both basic system factors and user characteristics, which will ultimately influence system performance.
- Published
- 2018
- Full Text
- View/download PDF
23. Information Security : Foundations, Technologies and Applications
- Author
-
Ali Ismail Awad, Michael Fairhurst, Ali Ismail Awad, and Michael Fairhurst
- Subjects
- Data protection, Computer security, Security systems
- Abstract
The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security.
- Published
- 2018
24. Efficient performance-based design using parallel and cloud computing
- Author
-
Michael Fairhurst, Armin Bebamzadeh, and Carlos E. Ventura
- Subjects
Engineering ,Earthquake engineering ,business.industry ,Distributed computing ,Building model ,020101 civil engineering ,Cloud computing ,02 engineering and technology ,Building and Construction ,Supercomputer ,Incremental Dynamic Analysis ,0201 civil engineering ,Nonlinear system ,020204 information systems ,Server ,Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Fraction (mathematics) ,business ,Simulation ,Civil and Structural Engineering - Abstract
Summary Performance-based design offers a more direct, non-prescriptive and rational approach over more traditional approaches used for the design of buildings and other structures. However, performance-based design requires the use of extensive nonlinear analyses on three-dimensional building models and typically requires significant computational capabilities and/or time to conduct such analyses. A practical way to overcome these limitations is to utilize recent advantages in parallel computing using cloud-based servers to conduct the necessary analyses. This approach can be used as a cost-effective way to conduct structural analyses in a fraction of the time compared with traditional computational methods. This paper explores the use of parallel and cloud computing in the performance-based design and analysis of tall buildings. Two case studies are presented that highlight the application of high-performance computing for the nonlinear dynamic analysis of a detailed 52-story building model. These case studies highlight both the cost and time benefits provided by high-performance computing for performance-based earthquake engineering. Copyright © 2015 John Wiley & Sons, Ltd.
- Published
- 2015
- Full Text
- View/download PDF
25. Study of automatic prediction of emotion from handwriting samples
- Author
-
Michael Fairhurst, Cheng Li, and Meryem Erbilek
- Subjects
Biometrics ,business.industry ,Computer science ,Intelligent character recognition ,Speech recognition ,Digital forensics ,Soft biometrics ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,computer.software_genre ,Handwriting ,Handwriting recognition ,Signal Processing ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Trait ,Computer Vision and Pattern Recognition ,Emotion recognition ,Artificial intelligence ,business ,computer ,Software ,Natural language processing - Abstract
Handwriting biometrics has a long history, especially when the handwritten signature is the target, but it has also proved possible to use handwriting as a basis for the prediction of various non-unique but forensically useful characteristics of the writer, generally considered to be examples of so-called ‘soft biometrics’. Most commonly, these are characteristics such as the age or gender of the writer, but the predictive capabilities arising in handwriting offer wider opportunities for trait prediction. This study presents a preliminary investigation of the use of handwriting to predict information about the writer relating specifically to higher level characteristics such as emotional state. The authors present an initial study to demonstrate that this is possible, and explore a number of factors particularly relevant to the use of such a capability in areas of forensic investigation.
- Published
- 2015
- Full Text
- View/download PDF
26. Selective Review and Analysis of Aging Effects in Biometric System Implementation
- Author
-
Marjory Da Costa-Abreu, Michael Fairhurst, and Meryem Erbilek
- Subjects
Biometrics ,Biometric system ,Computer Networks and Communications ,Computer science ,Iris recognition ,Human Factors and Ergonomics ,Computer security ,computer.software_genre ,Computer Science Applications ,Human-Computer Interaction ,Behavioral traits ,Identification (information) ,Risk analysis (engineering) ,Artificial Intelligence ,Control and Systems Engineering ,Signal Processing ,computer - Abstract
As biometric systems are deployed in increasingly diverse applications, it becomes correspondingly important to understand the impact which human aging has on system performance. Aging directly affects those physiological and behavioral traits which are characterized in biometric measurements, and a practical biometric system must be designed to account for age-induced changes. However, age can also have very positive implications, for example as a source of further identification information. This paper reviews research to understand how age factors impinge on biometric systems and uses this to synthesize a system infrastructure to unify implementation principles. We present new results to show how multiagent structures can provide an effective framework for this purpose, enhancing performance in both identification and predictive scenarios.
- Published
- 2015
- Full Text
- View/download PDF
27. Investigating Off-Angle Iris Recognition in Unconstrained Acquisition
- Author
-
Michael Fairhurst and Richard Bonner
- Subjects
Flexibility (engineering) ,Biometrics ,Relation (database) ,urogenital system ,business.industry ,Computer science ,fungi ,Iris recognition ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020206 networking & telecommunications ,02 engineering and technology ,urologic and male genital diseases ,Gaze ,female genital diseases and pregnancy complications ,Camera lens ,medicine.anatomical_structure ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,020201 artificial intelligence & image processing ,Computer vision ,Human eye ,cardiovascular diseases ,Artificial intelligence ,Iris (anatomy) ,business - Abstract
Iris-based biometric technologies have been widely adopted in recent years and implemented in many different scenarios. This has meant that increasing flexibility is now being sought in terms of how systems are configured to improve user-system interaction, while also producing a developing opportunity for applications in forensic analysis. Current typical iris biometric deployments, while generally expected to perform well, require a considerable level of co-operation from the system user. Specifically, the physical positioning of the human eye in relation to the iris capture device is a critical factor, which can substantially affect the performance of the overall iris biometric system. The work reported in this study will explore the acquisition of iris images captured at varying positions with respect to the capture device, and in particular presents a preliminary investigation of types of iris images captured when the gaze angle of a subject is not aligned with the axis of the camera lens.
- Published
- 2017
- Full Text
- View/download PDF
28. Age predictive biometrics: predicting age from iris characteristics
- Author
-
Marjory Da Costa-Abreu, Michael Fairhurst, and Meryem Erbilek
- Subjects
Authentication ,Modalities ,Biometrics ,Subject Age ,business.industry ,Computer science ,Age prediction ,Biometric templates ,Identity (social science) ,Machine learning ,computer.software_genre ,Identification (information) ,Artificial intelligence ,business ,computer - Abstract
As biometrics-based identity authentication systems have become more widely deployed, it has become evident that traditional identification and verification tasks are not the only application for such approaches. The prediction of individual, but non-unique, characteristics such as subject age is also an obvious option, since there are diverse situations in which information short of absolute identity is itself valuable. Physical ageing is an important issue for practical biometrics, since it is known that the associated physiological changes can impair performance for most modalities. Understanding the effects of ageing is necessary, therefore, both to optimise attainable performance but also to understand how to manage biometric templates, especially as the time elapsed between enrolment and use increases. Age prediction is relatively poorly represented in the literature. This chapter will explore applications of age prediction from iris biometrics and the implications for the underpinning computational structures.
- Published
- 2017
- Full Text
- View/download PDF
29. Multilocal Search and Adaptive Niching Based Memetic Algorithm With a Consensus Criterion for Data Clustering
- Author
-
Shengyong Chen, Gang Xiao, Jiafa Mao, Weiguo Sheng, and Michael Fairhurst
- Subjects
Computer science ,business.industry ,Population-based incremental learning ,Correlation clustering ,Constrained clustering ,Machine learning ,computer.software_genre ,Theoretical Computer Science ,Determining the number of clusters in a data set ,Computational Theory and Mathematics ,CURE data clustering algorithm ,Consensus clustering ,Canopy clustering algorithm ,Artificial intelligence ,Cluster analysis ,business ,computer ,Software - Abstract
Clustering is deemed one of the most difficult and challenging problems in machine learning. In this paper, we propose a multilocal search and adaptive niching-based genetic algorithm with a consensus criterion for automatic data clustering. The proposed algorithm employs three local searches of different features in a sophisticated manner to efficiently exploit the decision space. Furthermore, we develop an adaptive niching method, which can dynamically adjust its parameter value depending on the problem instance as well as the search progress, and incorporate it into the proposed algorithm. The adaptation strategy is based on a newly devised population diversity index, which can be used to promote both genetic diversity and fitness. Consequently, diverged niches of high fitness can be formed and maintained in the population, making the approach well-suited to effective exploration of the complex decision space of clustering problems. The resulting algorithm has been used to optimize a consensus clustering criterion, which is suggested with the purpose of achieving reliable solutions. To evaluate the proposed algorithm, we have conducted a series of experiments on both synthetic and real data and compared it with other reported methods. The results show that our proposed algorithm can achieve superior performance, outperforming related methods.
- Published
- 2014
- Full Text
- View/download PDF
30. An effective template protection method for face and voice cancellable identification
- Author
-
Michael Fairhurst, Fernando Pintro, and Anne M. P. Canuto
- Subjects
Authentication ,Identification (information) ,Transformation (function) ,Biometrics ,Computer science ,Face (geometry) ,Speech recognition ,Process (computing) ,Context (language use) ,TIMIT ,Data mining ,computer.software_genre ,computer - Abstract
Cancellable biometrics adopt an approach in which biometric templates can be cancelled and replaced if compromised, for example if they are lost or stolen, and can therefore overcome some of the security concerns about biometric-based authentication systems. This paper proposes a simple and effective template protection method (cancellable transformation) for providing cancellable data, called the double sum (DS) method, which performs a sum procedure over the attributes that makes the definition of the original data a hard (and almost impossible) process. In order to investigate the feasibility of the proposed method, an empirical analysis is conducted and we use as examples two different biometric modalities (face and voice) separately and in a multi-modal context (multi-biometric). The main aim of this paper is to provide greater security and improved performance in the biometric authentication process. The datasets used in this analysis were TIMIT for voice and the AR Face dataset for face. As a result of this analysis, we will observe that the proposed transformation offered higher performance to two existing cancellable transformations.
- Published
- 2014
- Full Text
- View/download PDF
31. FRONT MATTER
- Author
-
Giuseppe Pirlo, Donato Impedovo, and Michael Fairhurst
- Published
- 2014
- Full Text
- View/download PDF
32. Ensemble systems and cancellable transformations for multibiometric‐based identification
- Author
-
Fernando Pintro, Michael Fairhurst, and Anne M. P. Canuto
- Subjects
Biometrics ,Computer science ,business.industry ,Data_MISCELLANEOUS ,Feature extraction ,Fingerprint Verification Competition ,Context (language use) ,Feature selection ,computer.software_genre ,Machine learning ,Identification (information) ,ComputingMethodologies_PATTERNRECOGNITION ,Fingerprint ,Computer Science::Computer Vision and Pattern Recognition ,Signal Processing ,Data verification ,Computer Vision and Pattern Recognition ,Data mining ,Artificial intelligence ,business ,computer ,Software ,Computer Science::Cryptography and Security - Abstract
The concept of cancellable biometrics has been introduced as a way to overcome privacy concerns surrounding the management of biometric data. The goal is to transform a biometric trait into a new but revocable representation for enrolment and identification/verification. Thus, if compromised, a new representation of original biometric data can be generated. In addition, multi-biometric systems are increasingly being deployed in various biometric-based applications because of their advantages over uni-biometric systems. In this study, the authors specifically investigate the use of ensemble systems and cancellable transformations for the multi-biometric context, and the authors use as examples two different biometric modalities (fingerprint and handwritten signature) separately and in the multi-modal context (multi-biometric). The datasets to be used in this analysis were FVC2004 (fingerprint verification competition) for fingerprint and an in-house database for signature. To increase the effectiveness of the proposed ensemble systems, two feature selection (FS) methods will be used to distribute the attributes among the individual classifiers of an ensemble, increasing diversity and performance of such systems. As a result of this analysis, they will observe that the use of a cancellable transformation in the multi-biometric dataset increased accuracy level for the ensemble systems, mainly when using FS methods.
- Published
- 2014
- Full Text
- View/download PDF
33. EMMEL: a framework for historical manuscript analysis and presentation
- Author
-
Richard Guest, Alexandre Burnett, Michael Fairhurst, Yiqing Liang, Stéphane Nicolas, Laurent Heutte, and T. Palfray
- Subjects
Information retrieval ,Computer Networks and Communications ,Computer science ,computer.internet_protocol ,media_common.quotation_subject ,Human-Computer Interaction ,World Wide Web ,Metadata ,Cultural heritage ,Presentation ,Data model ,Component (UML) ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Relational model ,computer ,Software ,Historical document ,XML ,Information Systems ,media_common - Abstract
In this paper, a generic framework for historical manuscript image and data processing, visualisation and analysis is introduced with a focus on the modelling of manuscript metadata underpinning the interaction. The goal of such a framework is to capture the requirements from three types of activities involving historical manuscripts: presentation, management and analysis. In addition to an overall text-based description of an historical manuscript, a central requirement of such a framework is to associate rich media information (e.g. video, flash component, etc.) to the manuscript or a specific region of the manuscript. A second requirement is to enable interchange of the manuscript data as well as the attached information between users. As a result of an extensive analysis of requirements collected across a wide range of target user groups, an XML-based metadata language derived from a relational database model is proposed to form an historical document data model, and a prototype system is developed to demonstrate some of the advanced functionalities enabled by this data model. Thus, the proposed framework provides an important tool in promoting access to historical documents on a wide and diverse basis, embracing the fundamental principles of universal access to a shared cultural heritage.
- Published
- 2013
- Full Text
- View/download PDF
34. Exploring gender prediction from digital handwriting
- Author
-
Meryem Erbilek, Cheng Li, and Michael Fairhurst
- Subjects
business.industry ,Computer science ,Intelligent character recognition ,Feature extraction ,Context (language use) ,02 engineering and technology ,computer.software_genre ,Support vector machine ,03 medical and health sciences ,Variable (computer science) ,0302 clinical medicine ,Handwriting ,0202 electrical engineering, electronic engineering, information engineering ,Feature (machine learning) ,020201 artificial intelligence & image processing ,Artificial intelligence ,Data mining ,business ,computer ,030217 neurology & neurosurgery ,Natural language processing - Abstract
This paper introduces an empirical investigation which directly addresses and explores gender prediction capacity from digitised handwriting data from several different perspectives - such as feature type (static/dynamic) and content (fixed/variable) types - in order to provide extensive experimental evidence and analysis to guide the development of a better understanding of the opportunities for and practical consequences of gender prediction from digital handwriting data.
- Published
- 2016
- Full Text
- View/download PDF
35. Ductility Estimation for a Novel Timber–Steel Hybrid System
- Author
-
Xiaoyue Zhang, Thomas Tannert, and Michael Fairhurst
- Subjects
Engineering ,business.industry ,Mechanical Engineering ,Structural system ,0211 other engineering and technologies ,020101 civil engineering ,02 engineering and technology ,Building and Construction ,Structural engineering ,Ductility factor ,0201 civil engineering ,Seismic analysis ,Shear (geology) ,Mechanics of Materials ,Hybrid system ,021105 building & construction ,Shear wall ,General Materials Science ,business ,Civil and Structural Engineering - Abstract
In current force-based seismic design procedures, structures are allowed to behave inelastically during significant seismic events. For this reason, the applied design base shear of a structure is calculated by reducing the elastic strength demand by a ductility factor that represents the ability of a structure or structural system to deform inelastically beyond yielding. Whereas North American building codes provide ductility factors for traditional structural systems, including timber-based or steel-based systems, there are currently no design provisions available for novel hybrid structural systems. Thus research is required to define the force reduction factors, and specifically the ductility factor, Rd, to safely and efficiently design novel systems within the existing seismic design provisions. One such novel system is the so-called finding the forest through the trees (FFTT), proposed in 2012, where mass-timber panels act as shear walls and are connected to each other and to perimeter frame...
- Published
- 2016
- Full Text
- View/download PDF
36. Investigating an objective measure of writer hesitation for forensic analysis of the handwritten signature
- Author
-
Michael Fairhurst and Tasmina Islam
- Subjects
Measure (data warehouse) ,Biometrics ,Computer science ,business.industry ,Speech recognition ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,02 engineering and technology ,computer.software_genre ,Signature (logic) ,Forensic science ,03 medical and health sciences ,ComputingMethodologies_PATTERNRECOGNITION ,0302 clinical medicine ,Biometrics access control ,Handwriting ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,030216 legal & forensic medicine ,Artificial intelligence ,business ,computer ,Natural language processing ,Reliability (statistics) - Abstract
The analysis of handwritten signatures is an area of ongoing and increasing interest for both biometrics and forensics researchers. Hesitation in writing execution, estimated (to a large degree) through human inspection, has been commonly used by Forensic Document Examiners (FDE) or Forensic Handwriting Experts (FHE) as one of the important features which may be used to distinguish between genuine signatures and imitations or forgeries. This paper introduces some simple objective measures of hesitation and investigates their reliability and efficacy in automating the analysis of handwritten signatures for forensic or biometric applications.
- Published
- 2016
- Full Text
- View/download PDF
37. A synthesised word approach to word retrieval in handwritten documents
- Author
-
Yiqing Liang, Richard Guest, and Michael Fairhurst
- Subjects
Computer science ,Character (computing) ,business.industry ,Search engine indexing ,Grapheme ,Context (language use) ,Lexicon ,computer.software_genre ,Domain (software engineering) ,Artificial Intelligence ,Handwriting recognition ,Signal Processing ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Computer Vision and Pattern Recognition ,Visual Word ,Artificial intelligence ,business ,computer ,Software ,Word (computer architecture) ,Text retrieval ,Natural language processing - Abstract
Recent technological advances have enhanced the computer-based indexing and searching of digitised printed books. The performance now achievable in this domain, however, does not at present extend to handwritten texts which inherently contain more significant letter-based variation within their content. Furthermore, in most studies that address the handwritten text retrieval problem, a large training dataset is required which, very often, influences the context and search lexicon. In this paper a novel method is described to overcome the training data problem using a character-based modelling (termed grapheme spectrum) approach and a word modelling technique (termed synthesised word) enabling the retrieval of keywords that have not explicitly been seen in the training set. When tested on an illustrative historical manuscript the performance of the proposed word retrieval technique shows a clear advantage over existing methods.
- Published
- 2012
- Full Text
- View/download PDF
38. Reliable and secure encryption key generation from fingerprints
- Author
-
Gareth Howells, Weiguo Sheng, Farzin Deravi, Shengyong Chen, and Michael Fairhurst
- Subjects
Key generation ,Authentication ,Biometrics ,business.industry ,Computer science ,Key space ,Fingerprint (computing) ,Data security ,Library and Information Sciences ,Management Science and Operations Research ,Encryption ,Computer security ,computer.software_genre ,Management Information Systems ,Key (cryptography) ,Business and International Management ,business ,computer - Abstract
PurposeBiometric authentication, which requires storage of biometric templates and/or encryption keys, raises a matter of serious concern, since the compromise of templates or keys necessarily compromises the information secured by those keys. To address such concerns, efforts based on dynamic key generation directly from the biometrics have recently emerged. However, previous methods often have quite unacceptable authentication performance and/or small key spaces and therefore are not viable in practice. The purpose of this paper is to propose a novel method which can reliably generate long keys while requires storage of neither biometric templates nor encryption keys.Design/methodology/approachThis proposition is achieved by devising the use of fingerprint orientation fields for key generation. Additionally, the keys produced are not permanently linked to the orientation fields, hence, allowing them to be replaced in the event of key compromise.FindingsThe evaluation demonstrates that the proposed method for dynamic key generation can offer both good reliability and security in practice, and outperforms other related methods.Originality/valueIn this paper, the authors propose a novel method which can reliably generate long keys while requires storage of neither biometric templates nor encryption keys. This is achieved by devising the use of fingerprint orientation fields for key generation. Additionally, the keys produced are not permanently linked to the orientation fields, hence, allowing them to be replaced in the event of key compromise.
- Published
- 2012
- Full Text
- View/download PDF
39. Enhancing Identity Prediction Using a Novel Approach to Combining Hard- and Soft-Biometric Information
- Author
-
Michael Fairhurst and M. C. Da Costa Abreu
- Subjects
Modality (human–computer interaction) ,Biometrics ,Computer science ,Process (engineering) ,Fingerprint recognition ,computer.software_genre ,Computer Science Applications ,Human-Computer Interaction ,Identification (information) ,Intelligent agent ,Control and Systems Engineering ,Identity (object-oriented programming) ,Data mining ,Electrical and Electronic Engineering ,computer ,Software ,Information Systems - Abstract
The effectiveness with which individual identity can be predicted in, for example, an antiterrorist scenario can benefit from seeking a broad base of identity evidence. The issue of improving performance can be addressed in a number of ways, but system configurations based on integrating different information sources (often involving more than one biometric modality) are a widely adopted means of achieving this. This paper presents a new approach to improving identification performance, where both direct biometric samples and “soft-biometric” knowledge are combined. Specifically, however, we propose a strategy based on an intelligent agent-based decision-making process, which predicts both absolute identity and also other individual characteristics from biometric samples, as a basis for a more refined and enhanced overall identification decision based on flexible negotiation among class-related agents.
- Published
- 2011
- Full Text
- View/download PDF
40. Classifier ensembles and optimization techniques to improve the performance of cancellable fingerprint
- Author
-
Luis Marcos G. Gonçalves, Michael Fairhurst, Antonino Feitosa Neto, Anne M. P. Canuto, João C. Xavier Junior, and Fernando Pintro
- Subjects
Biometrics ,Computer science ,business.industry ,Biometric templates ,Data_MISCELLANEOUS ,Feature selection ,computer.software_genre ,Machine learning ,Identity protection ,Ensemble systems ,Biometric trait ,Artificial intelligence ,Data mining ,Public acceptance ,business ,Classifier (UML) ,computer - Abstract
The main aim of biometric-based identification systems is to automatically recognize individuals based on their physiological and/or behavioural characteristics such as fingerprint, face, hand-geometry, among others. These systems offer several advantages over traditional forms of identity protection. However, there are still some important aspects that need to be addressed in these systems. The main questions are concerned with the security of biometric authentication systems since it is important to ensure the integrity and public acceptance of these systems. In order to avoid the problems arising from compromised biometric templates, the concept of cancellable biometrics has recently been introduced. The concept is to transform a biometric trait into a new representation for enrolment and matching. Although cancellable biometrics were proposed to solve privacy concerns, the concept raises new issues, since they make the authentication problem more complex and difficult to solve. Thus, more effective authentication structures are needed to perform these tasks. In this paper, we investigate the use of ensemble systems in cancellable biometrics, using fingerprint-based identification to illustrate the possible benefits accruing. In order to increase the effectiveness of the proposed ensemble systems, three feature selection methods will be used to distribute the attributes among the individual classifiers of an ensemble. The main aim of this paper is to analyse the performance of such well-established structures on transformed biometric data to determine whether they have a positive effect on the performance of this complex and difficult task.
- Published
- 2011
- Full Text
- View/download PDF
41. BACK MATTER
- Author
-
Giuseppe Pirlo, Donato Impedovo, and Michael Fairhurst
- Published
- 2014
- Full Text
- View/download PDF
42. Multiple Condensation filters for road detection and tracking
- Author
-
Michael Fairhurst, Li Bai, and Yan Wang
- Subjects
Geographic information system ,Computer science ,BitTorrent tracker ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Tracking system ,STRIPS ,Hyperbola ,law.invention ,Artificial Intelligence ,law ,Robustness (computer science) ,ComputerSystemsOrganization_MISCELLANEOUS ,Clutter ,Computer vision ,Computer Vision and Pattern Recognition ,Artificial intelligence ,Vanishing point ,business - Abstract
In this paper, we present a novel and robust road tracking system for vision-based personal navigation. Novelty of the work includes the use of multiple Condensation filters to track the road of arbitrary shape and automatic switching between trackers according to road conditions. The approach allows the road to be represented as a simple hyperbola. It also supports the representation of the road as a sequence of connected arcs/segments so that information from a digital map can be integrated into tracking. The parameters of the hyperbola road model are estimated using multiple vanishing points located in image strips. The road tracking method is robust in dealing with complex road shapes, background clutters, shadows, and road markings. Experiments using real videos demonstrate the robustness of our approach.
- Published
- 2010
- Full Text
- View/download PDF
43. Analyzing the Benefits of a Novel Multiagent Approach in a Multimodal Biometrics Identification Task
- Author
-
M. C. Da Costa Abreu and Michael Fairhurst
- Subjects
Structure (mathematical logic) ,Engineering ,Biometrics ,Computer Networks and Communications ,business.industry ,Multi-agent system ,Principal (computer security) ,Machine learning ,computer.software_genre ,Computer Science Applications ,Task (project management) ,Set (abstract data type) ,Identification (information) ,Control and Systems Engineering ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Hand geometry ,computer ,Simulation ,Information Systems - Abstract
Many approaches to the implementation of biometrics-based identification systems are possible, and different configurations are likely to generate significantly different operational characteristics. The choice of implementational structure is therefore very dependent on the performance criteria which are most important in any particular task scenario. In this paper we evaluate the merits of using multimodal structures, and we investigate how fundamentally different strategies for implementation can increase the degree of choice available in achieving particular performance criteria. In particular, we illustrate the merits of an implementation based on a multiagent computational architecture as a means of achieving high performance levels when recognition accuracy is a principal criterion. We also set out the relative merits of this strategy in comparison with other commonly adopted approaches to practical system realization. In particular we propose and evaluate a novel approach to implementation of a multimodal system based on negotiating agents.
- Published
- 2009
- Full Text
- View/download PDF
44. A computer-based quantitative assessment of visuo-spatial neglect using regression and data transformation
- Author
-
Yiqing Liang, Richard Guest, Michael Fairhurst, and Jonathan Potter
- Subjects
business.industry ,Process (engineering) ,Computer science ,media_common.quotation_subject ,Data transformation (statistics) ,Regression analysis ,Machine learning ,computer.software_genre ,Neglect ,Artificial Intelligence ,Pattern recognition (psychology) ,Benchmark (computing) ,Computer Vision and Pattern Recognition ,Artificial intelligence ,Medical diagnosis ,Set (psychology) ,business ,computer ,media_common - Abstract
Computer-based assessment systems analysing the drawing responses from a test subject have been widely explored within the area of neuropsychological dysfunction diagnosis and rehabilitation monitoring. This study reports on the development of a quantitative marking system for the automated assessment of visuo-spatial neglect. Using a clinically established pencil-and-paper based method as a marking benchmark, a set of features are extracted and selected from a battery of computer-captured drawing tasks. Through the application of linear regression and data transformation, the novel system is shown to be effective in correlating against a clinically recognised scale, while simultaneously improving the efficiency of the testing process.
- Published
- 2009
- Full Text
- View/download PDF
45. Consensus fingerprint matching with genetically optimised approach
- Author
-
K. Harmer, Weiguo Sheng, Gareth Howells, Farzin Deravi, and Michael Fairhurst
- Subjects
Matching (statistics) ,Optimal matching ,Biometrics ,business.industry ,Computer science ,Pattern recognition ,Function (mathematics) ,Machine learning ,computer.software_genre ,Artificial Intelligence ,Fingerprint ,Signal Processing ,Pattern recognition (psychology) ,Computer Vision and Pattern Recognition ,Artificial intelligence ,business ,computer ,Software - Abstract
Fingerprint matching has been approached using various criteria based on different extracted features. However, robust and accurate fingerprint matching is still a challenging problem. In this paper, we propose an improved integrated method which operates by first suggesting a consensus matching function, which combines different matching criteria based on heterogeneous features. We then devise a genetically guided approach to optimise the consensus matching function for simultaneous fingerprint alignment and verification. Since different features usually offer complementary information about the matching task, the consensus function is expected to improve the reliability of fingerprint matching. A related motivation for proposing such a function is to build a robust criterion that can perform well over a variety of different fingerprint matching instances. Additionally, by employing the global search functionality of a genetic algorithm along with a local matching operation for population initialisation, we aim to identify the optimal or near optimal global alignment between two fingerprints. The proposed algorithm is evaluated by means of a series of experiments conducted on public domain collections of fingerprint images and compared with previous work. Experimental results show that the consensus function can lead to a substantial improvement in performance while the local matching operation helps to identify promising initial alignment configurations, thereby speeding up the verification process. The resulting algorithm is more accurate than several other proposed methods which have been implemented for comparison.
- Published
- 2009
- Full Text
- View/download PDF
46. Robust Road Modeling and Tracking Using Condensation
- Author
-
Li Bai, Yan Wang, and Michael Fairhurst
- Subjects
business.industry ,Computer science ,Mechanical Engineering ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Tracking system ,Kalman filter ,Image segmentation ,Object detection ,Computer Science Applications ,Robustness (computer science) ,Computer Science::Computer Vision and Pattern Recognition ,Automotive Engineering ,Computer vision ,Artificial intelligence ,Vanishing point ,Image sensor ,business ,Particle filter - Abstract
In this paper, we present a robust road detection and tracking method based on a condensation particle filter for real-time video-based navigation applications. The image is divided into horizontal strips, and vanishing point (VP) detection is performed on each image strip. We propose a method for estimating the density of road boundary line segments in the image so that VP detection in an image strip takes into account the detection results in the neighboring image strips. This use of contextual information for VP detection leads to more accurate detection results. The estimated road parameters are then used to initialize the condensation tracker. Experiments using real road videos demonstrate the robustness of our method to difficult road conditions due to the presence of partial occlusion, shadows, and road signs.
- Published
- 2008
- Full Text
- View/download PDF
47. A Niching Memetic Algorithm for Simultaneous Clustering and Feature Selection
- Author
-
Weiguo Sheng, Michael Fairhurst, and Xiaohui Liu
- Subjects
business.industry ,Computer science ,Feature extraction ,Correlation clustering ,Feature selection ,Pattern recognition ,Computer Science Applications ,Computational Theory and Mathematics ,Search algorithm ,Genetic algorithm ,Memetic algorithm ,Unsupervised learning ,Local search (optimization) ,Artificial intelligence ,business ,Cluster analysis ,Selection (genetic algorithm) ,Information Systems ,Premature convergence - Abstract
Clustering is inherently a difficult task, and is made even more difficult when the selection of relevant features is also an issue. In this paper we propose an approach for simultaneous clustering and feature selection using a niching memetic algorithm. Our approach (which we call NMA_CFS) makes feature selection an integral part of the global clustering search procedure and attempts to overcome the problem of identifying less promising locally optimal solutions in both clustering and feature selection, without making any a priori assumption about the number of clusters. Within the NMA_CFS procedure, a variable composite representation is devised to encode both feature selection and cluster centers with different numbers of clusters. Further, local search operations are introduced to refine feature selection and cluster centers encoded in the chromosomes. Finally, a niching method is integrated to preserve the population diversity and prevent premature convergence. In an experimental evaluation we demonstrate the effectiveness of the proposed approach and compare it with other related approaches, using both synthetic and real data.
- Published
- 2008
- Full Text
- View/download PDF
48. A New Method for the Synthesis of Signature Data With Natural Variability
- Author
-
Michael Fairhurst, C. Rabasse, and Richard Guest
- Subjects
Handwriting ,Source data ,Databases, Factual ,Biometrics ,Computer science ,System testing ,computer.software_genre ,Sensitivity and Specificity ,Synthetic data ,Pattern Recognition, Automated ,Artificial Intelligence ,Biomimetics ,Image Interpretation, Computer-Assisted ,Electrical and Electronic Engineering ,Modality (human–computer interaction) ,business.industry ,Reproducibility of Results ,Pattern recognition ,General Medicine ,Computer Science Applications ,Human-Computer Interaction ,Statistical classification ,Control and Systems Engineering ,Handwriting recognition ,Data mining ,Artificial intelligence ,business ,computer ,Algorithms ,Software ,Information Systems ,Test data - Abstract
The collection of human biometric test data for system development and evaluation within any chosen modality generally requires significant time and effort if data are to be obtained in workable quantities. To overcome this problem, techniques to generate synthetic data have been developed. This paper describes a novel technique for the automatic synthesis of human handwritten-signature images, which introduces modeled variability within the generated output based on positional variation that is naturally found within genuine source data. The synthesized data were found to generate similar verification rates to those obtained using genuine data with the use of a commercial verification engine, thereby indicating the suitability of the data synthesized by using this method for a wide range of application scenarios.
- Published
- 2008
- Full Text
- View/download PDF
49. Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering
- Author
-
Farzin Deravi, Michael Fairhurst, Gareth Howells, and Weiguo Sheng
- Subjects
Key generation ,Biometrics ,Computer Networks and Communications ,Computer science ,business.industry ,Fuzzy set ,Feature extraction ,Cryptography ,Encryption ,computer.software_genre ,Feature (computer vision) ,Data mining ,Safety, Risk, Reliability and Quality ,Cluster analysis ,business ,computer - Abstract
Biometric authentication is increasingly gaining popularity in a wide range of applications. However, the storage of the biometric templates and/or encryption keys that are necessary for such applications is a matter of serious concern, as the compromise of templates or keys necessarily compromises the information secured by those keys. In this paper, we propose a novel method, which requires storage of neither biometric templates nor encryption keys, by directly generating the keys from statistical features of biometric data. An outline of the process is as follows: given biometric samples, a set of statistical features is first extracted from each sample. On each feature subset or single feature, we model the intra and interuser variation by clustering the data into natural clusters using a fuzzy genetic clustering algorithm. Based on the modelling results, we subsequently quantify the consistency of each feature subset or single feature for each user. By selecting the most consistent feature subsets and/or single features for each user individually, we generate the key reliably without compromising its relative security. The proposed method is evaluated on handwritten signature data and compared with related methods, and the results are very promising.
- Published
- 2008
- Full Text
- View/download PDF
50. An extended hyperbola model for road tracking for video-based personal navigation
- Author
-
Yan Wang, Michael Fairhurst, and Li Bai
- Subjects
Physics::Physics and Society ,Information Systems and Management ,business.industry ,Computer science ,Tracking system ,Kalman filter ,Management Information Systems ,Hyperbola ,Artificial Intelligence ,Robustness (computer science) ,Curve fitting ,Eye tracking ,Computer vision ,Artificial intelligence ,Vanishing point ,business ,Software - Abstract
We present a robust road detection and tracking method using multiple vanishing points and the condensation filter. We represent the road using an extended hyperbola model with an added non-linear term to handle transitions between straight and curved road segments. The parameters of the road model are estimated using multiple vanishing points located in road segments. A vanishing line is then determined using a robust iterative curve fitting technique to recover parameters of the road model. These are then fed into a robust condensation tracker [M. Isard, A. Blake, Condensation: conditional density propagation for visual tracking, Int. J. Comput. Vision, 1998] to track the road. The tracker is able to deal with difficult road conditions. Experiments using real road videos demonstrate the suitability of our approach for real-time applications. A comparison with the Kalman filtering technique demonstrates the robustness of our approach.
- Published
- 2008
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.