Vous êtes sur la page 1sur 4

In the News

Features Editor:
Rebecca L. Deuel
rdeuel@computer.org

ALSO FEATURED THIS ISSUE

COGNITIVE RADIOS WILL ADAPT TO USERS

complicate the recognition process. The


Face Recognition Technology mesh can be subsampled to decrease the
amount of data. The choice of the number of
subsamples is a trade-off between accuracy
By Danna Voth and computational complexity. At the third
stage, the system computes a canonical form

F acial recognition is an important


human ability—an infant innately
responds to face shapes at birth and can
difficult problem for most face recognition
systems. “The fact that my brother and I are
twins was inspiration for this invention,”
of the facial surface. This representation is
practically insensitive to head orientations
and facial expressions, significantly simpli-
says Alexander. fying the recognition procedure. The system
discriminate his or her mother’s face from The team developed a system that treats performs the recognition itself on the canon-
the face as a deformable object, as opposed ical surfaces.
a stranger’s at the tender age of 45 hours. to a rigid surface, and uses a range camera How is this new system better than oth-
Recognizing and identifying people is a and a computer. The 3D system maps rather ers? Alex says that their 3D method gives
vital survival skill, as is reading faces for than photographs the face, capturing facial more information about the face, is less vul-
evidence of ill-health or deception. geometry as a canonical form, which it can nerable to makeup and illumination condi-
Improving significantly in the last several then compare to other canonical forms con- tions, and fares better than other face recog-
years, technologies that can mimic or im- tained in a database. The system can com- nition systems. Michael points out that other
prove human abilities to recognize and read pare surfaces with a high fidelity level, in- systems are more sensitive to facial expres-
faces are now maturing for use in medical dependent of surface deformations resulting sions, while their 3D system can handle
and security applications. The 2002 Face from facial expressions. facial deformations. They tested a classical
Recognition Vendor Test (FRVT 2002) dem- Kimmel and his former student, Asi Elad, 2D face recognition algorithm (eigenfaces),
onstrated a significant improvement in face invented the idea of bending invariant canon- a 3D face recognition algorithm, and a re-
recognition capabilities, and researchers ical forms about three years ago. Michael cently proposed combination of 2D and 3D
have developed systems to tackle some of explains Elad’s work as “a generalization of recognition, and their system fared best.
face recognition’s more interesting chal- the work of Eric Schwartz, who proposed the “On a database of 157 subjects, we obtained
lenges. These systems include one that can use of a mathematical method known as zero error, even when we were comparing
distinguish between identical twins. multidimensional scaling for analysis of the two twins,” Michael says. “Obviously, a
brain cortex. A smart use of fast numeric al- larger database is required for more accurate
3D face recognition system gorithms (joint work of Kimmel and James statistics, yet by extrapolation we can pre-
This spring, researchers at the Technion, Sethian) resulted in a very elegant algorithm, dict results significantly outperforming
Israel Institute of Technology in Haifa, pre- which Elad tested on surface recognition other algorithms.”
sented a new twist to face recognition tech- problems.” Kimmel suggested using bending
nology—a 3D system based on “bending invariant canonical forms in face recognition FRVT 2002
invariant canonical representation.” Michael a year ago, Michael says. Certainly security is one of the chief uses
and Alexander Bronstein are electrical engi- The process of capturing canonical forms of face recognition technology, and under-
neering graduate students and twin brothers. occurs in three stages (see Figure 1). At the standing the state of the art in biometrics is
While working on a project headed by their first stage, the system acquires the face’s key to designing effective applications. The
professor, Ron Kimmel, and with the help of range image and texture. At the second National Institute of Standards and Technol-
lab engineer Eyal Gordon, the brothers de- stage, it converts the range image to a trian- ogy (NIST), together with DARPA, the
cided to try to create a face recognition sys- gulated surface and preprocesses it by re- National Institute of Justice, and several
tem that could distinguish identical twins, a moving certain parts such as hair, which can other federal agencies, sponsored FRVT

4 1094-7167/03/$17.00 © 2003 IEEE IEEE INTELLIGENT SYSTEMS


Published by the IEEE Computer Society
(a) (b) (c)

Figure 1. Three stages of facial recognition: (a) the range image and texture; (b) the preprocessed surface; (c) the canonical form.

2002, which tested commercial face recog- vide accuracy comparable with fingerprints. examined the use of morphable models—a
nition accuracy and identified numerous For facial recognition, the best packages technique of taking a facial image from any
characteristics for optimizing face recogni- available provide a 90 percent probability of angle and projecting what the subject might
tion technologies’ performance, as well as true verification with a 1 percent probability look like facing forward. There was a dra-
areas for future research. of false verification. This is a helpful find- matic improvement in performance using the
Looking at 10 mature face-recognition ing: The November 2002 report “Summary morphable models. One of the top three sys-
systems, FRVT 2002 tested them on three of NIST Standards for Biometric Accuracy, tems increased its performance from 26 per-
basic tasks: identification, verification, and Tamper Resistance, and Interoperability” cent on nonprocessed, nonfrontal images to
watch-list screening. Identification involves notes that, “within the intelligence commu- 84 percent on morphed images.
matching a biometric record from a single nity, facial data is often the only biometric The size of the database used for iden-
subject probe against an entire database of data that has been and is currently being tification or watch-list screening signifi-
similar biometric records to determine the captured. Face data is one key source for cantly impacted results. The experiments
record owner’s identity—a one-to-many watch lists, and in many situations finger- showed that identification performance
comparison. The verification process con- print data cannot even be captured to use in decreases linearly with respect to the log-
firms that a person is who he or she claims constructing a watch list.” arithm of the database size. NIST reports
to be by matching the biometric record FRVT 2002 showed that facial recogni- a similar effect for the watch-list task—
against that of his or her claimed identity—a tion accuracy varies according to different as the watch list size increases, perfor-
one-to-one comparison. Verification rates factors, which might help in planning better mance decreases. The FRVT 2002 over-
are offset with false accept rates, and verifi- applications and designing future research. view states that, “In general, a watch list
cation performance is described by the two Several image characteristics affected re- with 25 to 50 people will perform better
statistics. Watch-list screening is typically sults. First, as you’d expect, accuracy drops than a larger size watch list.”
the most demanding task, involving two as time increases between the acquisition of For the first time, the test covered the
steps. First, a system must detect if an indi- the database image and the presentation of effects of demographics. The results re-
vidual is even on the watch list, then, if so, the newest image because people age and ported that males are easier to recognize
correctly identify the individual. change in appearance over time. NIST than females and that older people are
Compared with similar tests performed reported that performance degraded at ap- easier to identify than younger people.
two years earlier in FRVT 2000, the FRVT proximately 5 percentage points per year. In For the top systems, identification rates
2002 results show a significant improvement addition, the study found that indoor light- for males were 6 percent to 9 percent
in face recognition systems’ verification ca- ing changes didn’t make an appreciable higher than for females. For every 10
pabilities, indicated by a 50 percent reduc- difference to the top systems’ accuracy, al- years increase in age, on average identifi-
tion in error rates. For the best systems tested though face recognition from outdoor im- cation performance increases approxi-
in FRVT 2002, the top-rank identification agery showed a considerable drop in perfor- mately 5 percentage points.
rate was 85 percent on a database of 800 mance, with the best performing systems
people. With a false accept rate of 10 per- turning in a recognition rate of 50 percent. Reading faces
cent, the top two systems turned in a verifica- The FRVT 2002 also compared the rates Although recognizing faces is important
tion rate of 96 percent. For the best system for still and video images and found, contrary to such security applications as financial
using a watch list of 25 people, the detection to expectations, that recognition performance verification (ATM and credit cards), biomet-
and identification rate was 77 percent. using video sequences was similar to the ric locks, and passport or visa control, read-
FRVT 2002 found that facial recognition performance using still images. For images ing faces has important uses in medicine and
systems attempting verification tasks pro- with nonfrontal presentation, FRVT 2002 security as well. A team of scientists at the

MAY/JUNE 2003 computer.org/intelligent 5


IEEE

IEEE Computer Society


Publications Office
10662 Los Vaqueros Circle, PO Box 3014
Los Alamitos, CA 90720-1314
STAFF
Associate Lead Editor
Dennis Taylor
dtaylor@computer.org
Group Managing Editor
Crystal R. Shif
cshif@computer.org
Senior Editor
Dale Strok
Associate Editor Figure 2. A subject onscreen undergoes scrutiny from Zuhair Bandar’s Silent Talker.
Shani Murray
Assistant Editors Centre for Adaptive Psychological Profiling the frame. “We chose artificial neural net-
Rebecca Deuel and Denise Kano at Manchester Metropolitan University is works (ANNs) because they are ideal for
Editorial Assistant developing technology that can help doctors the image processing used in the early
Joan Hong study the autonomic nervous system and a stages and highly suited to the type of clas-
Magazine Assistant patient’s psychological state or help inter- sification task involved in the later stages,”
Pauline Hosillos rogators detect deception. Zuhair Bandar, says O’Shea. At the same time, the team
Janet Rothwell, Jim O’Shea, David McLean, was reproducing a well-defined psycholog-
Production Assistant
Monette Velasco
and D.J. McCormick have developed, after ical experiment to observe and classify
five years of work, a system they have dubbed deception with 40 subjects.
Contributing Editors the Silent Talker, which observes and classi- The team digitized videos of the inter-
Cheryl Baltes fies a subject’s nonverbal behavior during an views from these experiments to provide
Design Director interview and detects deception. training, validation, and testing data for the
Toni Van Buskirk Inspired by a challenge to monitor audi- system (see Figure 2). They developed fur-
Layout/Technical Illustrations ence reaction in sales presentations, Bandar ther neural networks to locate particular
Carmen Flores-Garvey and Alex Torres realized it should be possible to make infer- features such as the eye and classify their
ences about people’s psychological and state (for example, “eye shut”). Finally,
Publisher
emotional states by analyzing their outward they developed neural networks to combine
Angela Burgess
behavior with AI. “This stimulated a series all the information earlier stages provided
Assistant Publisher of discussions with psychologists, which and classify the subject’s behavior.
Dick Price revealed the full potential for psychological Combining the practice of psychological
Membership/Circulation Marketing Manager profiling,” O’Shea says. profiling with the power of AI, the Silent
Georgann Carter The team developed a system that ob- Talker has demonstrated approximately 87
Business Development Manager served 24 behavioral channels, such as eye percent accuracy in classifying complete
Sandra Brown contact events, gaze, or body movements interviews as truthful or deceptive and over
that occurred as a subject was interviewed. 70 percent accuracy in classifying periods
Assistant Advertising Coordinator
Debbie Sims
Using many channels makes it more possible of deceptive demeanor during the interview,
to discover meaningful patterns, and it is O’Shea says. “This is vastly superior to
Submissions: Submit a PDF or MS Word file of all articles impossible for a human to control so many humans and superior to most of the quoted
and track proposals to IEEE Intelligent Systems, Magazine behaviors simultaneously. Able to handle figures for other systems.”
Assistant, 10662 Los Vaqueros Circle, Los Alamitos, multichannel data, the Silent Talker’s AI The team plans to further develop the
CA 90720-1314, phone +1 714 821 8380, isystems@
component decides which data is redundant, technology. “It is a very effective, but not
computer.org. Manuscripts should be approximately 5,000
words long, preferably not exceeding 10 references. Visit noisy, or important and detects patterns infallible technology,” O’Shea says. “The
http://computer.org/intelligent for editorial guidelines. across the channels to provide classification system inherits the generally perceived
accuracies. weakness of ANNs—that they cannot ex-
Editorial: Unless otherwise stated, bylined articles as well as The project involved evaluating and de- plain how they reach their decision.” Plans
products and services reflect the author’s or firm’s opinion; veloping the neural networks for image to improve the system include tuning the
inclusion does not necessarily constitute endorsement by the IEEE processing, such as locating the subject in code to implement real-time operation,
Computer Society or the IEEE.

computer.org/intelligent IEEE INTELLIGENT SYSTEMS


IEEE
producing a wider range of neural networks changes, performance in larger databases,
to look at culture-specific, nonverbal be- and comparisons of different expressions
havior, and producing systems that can will improve, as will our capabilities to de-
explain how they reached the classification. tect deception and other emotional states.
It will be interesting to see where face
recognition technology will take us next.
This will bring advances in medicine and
security as we automate our vital faculty of
How to Reach Us
Outdoor image analysis, projection of age recognizing and reading faces.
Writers
For detailed information on submitting
articles, write for our Editorial Guidelines
(isystems@computer.org) or access
Cognitive Radios Will http://computer.org/intelligent/author.htm.

Adapt to Users Letters to the Editor


Send letters to
By Terry Costlow Dennis Taylor
Associate Lead Editor
Software radios have emerged in recent years, providing a level of programmability so that
communications products, such as cell phones, can automatically switch from one frequency
IEEE Intelligent Systems
or transmission scheme to another when the primary technique is unavailable. Now that they 10662 Los Vaqueros Circle
are moving into the marketplace, a few long-term planners are already looking at the second Los Alamitos, CA 90720
or third generation of software radios, a concept that’s known as cognitive radio. dtaylor@computer.org
Cognitive radios are adaptive and extremely programmable, learning users’ preferences Please provide an email address or
and automatically adjusting to changes in the operating environment. Military researchers daytime phone number with your letter.
want the security and versatility these techniques can provide, while consumers could be-
nefit by having cellular phones that relay the cheapest way to send a message.
On the Web
One of the better-known proponents of this concept is Joe Mitola, a consulting scientist
Access http://computer.org/intelligent for
at MITRE, a nonprofit research group in Bedford, Mass. He’s been working with researchers
information about IEEE Intelligent Systems.
at MIT, DARPA, Sweden’s Royal Institute of Technology, and multiple IEEE committees
to set the stage for cognitive radios.
One of the first tasks is creating an ontology, a set of terms ensuring that researchers Subscription Change of Address
from various disciplines are using the same terms for the same operations and equipment. Send change-of-address requests for maga-
“This will truly take an interdisciplinary effort,” Mitola says, noting that different users of zine subscriptions to address.change@ieee.
radio spectrum will use different terminology. org. Be sure to specify IEEE Intelligent
A big part of the work to be done using that common language centers on ways that Systems.
cognitive radios program themselves. To be successful, these radios must passively learn
user preferences and do many things without forcing users to program them. Mitola ex-
plains that if the user tunes to a certain radio station in the morning, the system must auto- Membership Change of Address
matically remember that station and time of day. Send change-of-address requests for
“The word passive is key. If we make the user program all the nodes, you’ll see this end the membership directory to directory.
up with 12 blinking lights just like a VCR,” he says. updates@computer.org.
One application will be cell phones that determine the best way to transmit messages.
He cites an example where communicating on a home campus can be cheaper than from
a remote site. “If you’re on the way to work and want to send a message with a 10-Mbyte Missing or Damaged Copies
attachment, the radio might suggest waiting four minutes until you’re in the building, If you are missing an issue or you received
where it could be sent for free,” Mitola says. a damaged copy, contact membership@
Another potential application is in the military, where finding the best communica- computer.org.
tions scheme and security or encryption level can be critical. DARPA is already supply-
ing some funding, and Mitola predicts that defense funding will increase, which could
Reprints of Articles
catalyze the technology’s adoption.
Because the radios will do many things automatically, Mitola says that the system will
For price information or to order reprints,
need a certain degree of security. He’s therefore thinking about biometric identifiers that send email to isystems@computer.org or
would ensure the radio isn’t being used by someone else when it sends a message to cer- fax +1 714 821 4010.
tain people or on certain frequencies.
Mitola, who is credited with helping create the foundations for software radio, does- Reprint Permission
n’t expect to see a big market for cognitive radios in the near future. “It may be a decade To obtain permission to reprint an article,
away,” he says. contact William Hagen, IEEE Copyrights and
Trademarks Manager, at whagen@ieee.org.
MAY/JUNE 2003 computer.org/intelligent

Vous aimerez peut-être aussi