SlideShare a Scribd company logo
1 of 15
Download to read offline
Pa#ern	
  Recogni-on	
  	
  
and	
  Applica-ons	
  Lab	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
	
  
University	
  
of	
  Cagliari,	
  Italy	
  
	
  
Department	
  of	
  
Electrical	
  and	
  Electronic	
  
Engineering	
  
Sparse Support Faces
Ba#sta	
  Biggio,	
  Marco	
  Melis,	
  Giorgio	
  Fumera,	
  Fabio	
  Roli	
  
	
  
	
  
	
  
Dept.	
  Of	
  Electrical	
  and	
  Electronic	
  Engineering	
  
University	
  of	
  Cagliari,	
  Italy	
  
Phuket,	
  Thailand,	
  May	
  19-­‐22,	
  2015	
  ICB	
  2015	
  
 
http://pralab.diee.unica.it
Template-based Face Verification
2	
  
gc ≥ϑc
genuine	
  
impostor	
  
true	
  
false	
  
s(x,tc
i
){ }i=1
p
Matcher	
  
	
  s(⋅,⋅)
Fusion	
  
rule	
  
gc (x)xFeature	
  
extrac-on	
  
Verifica-on	
  is	
  based	
  on	
  how	
  similar	
  the	
  submi#ed	
  image	
  is	
  to	
  the	
  client’s	
  templates	
  
Client-­‐specific	
  one-­‐class	
  classifica:on	
  
mean gc (x) =
1
p
s(x,tc
i
)
i=1
p
∑
gc (x) = max
i=1,…,p
s(x,tc
i
)max
Claimed	
  
Iden-ty	
  
tc
1
, …, tc
p
{ }
Claimed	
  iden-ty’s	
  templates	
  
 
http://pralab.diee.unica.it
Cohort-based Face Verification
3	
  
Verifica-on	
  is	
  based	
  on	
  how	
  similar	
  the	
  submi#ed	
  image	
  is	
  to	
  the	
  client’s	
  templates	
  
and	
  on	
  how	
  different	
  it	
  is	
  from	
  the	
  cohorts’	
  templates	
  
Client-­‐specific	
  two-­‐class	
  classifica:on	
  (one-­‐vs-­‐all)	
  
gc ≥ϑc
genuine	
  
impostor	
  
true	
  
false	
  
s(x,tc
i
){ }i=1
n
Matcher	
  
	
  s(⋅,⋅)
Fusion	
  
rule	
  
gc (x)xFeature	
  
extrac-on	
  
tc
1
, …, tc
p
{ }
Claimed	
  iden-ty’s	
  templates	
   Cohorts	
  
tc
p+1
, …, tc
n
{ }
Claimed	
  
Iden-ty	
  
 
http://pralab.diee.unica.it
Cohort-based Fusion Rules
•  Cohort selection is heuristically driven
–  e.g., selection of the closest cohorts to the client’s templates
•  Cohort-based fusion rules are also based on heuristics
–  Test-normalization
[Auckenthaler et al., DSP 2000]
–  Aggarwal’s max rule
[Aggarwal et al., CVPR-W 2006]
4	
  
gc (x) =
1
σc (x)
1
p
s(x,tc
i
)
i=1
p
∑ −µc (x)
#
$
%
&
'
(
gc (x) =
max
i=1,…,p
s(x,tc
i
)
max
j=p+1,…,n
s(x,tc
j
)
 
http://pralab.diee.unica.it
Open Issues
•  Fusion rules and cohort selection are based on heuristics
–  No guarantees of optimality in terms of verification error
•  Our goal: to design a procedure to optimally select the
reference templates and the fusion rule
–  Optimal in the sense that it minimizes verification error (FRR and FAR)
•  Underlying idea: to consider face verification as a two-class
classification problem in similarity space
5	
  
 
http://pralab.diee.unica.it
s(x, )
s(x, )
Face Verification in Similarity Space
•  The matching function maps faces onto a similarity space
–  How to design an optimal decision function in this space?
6	
  
?	
  
 
http://pralab.diee.unica.it
Support Face Machines (SFMs)
•  We learn a two-class SVM for each client
–  using the matching score as the kernel function
–  genuine client y=+1, impostors y=-1
•  SVM minimizes the classification error (optimal in that sense)
–  FRR and FAR in our case
•  The fusion rule is a linear combination of matching scores
•  The templates are automatically selected for each client
–  support vectors à support faces
7	
  
gc (x) = αis(x,tc
i
)
i
∑ − αjs(x,tc
j
)
j
∑ + b
 
http://pralab.diee.unica.it
Support Face Machines (SFMs)
8	
  
s(x, )
s(x, )
•  Maximum-margin classifiers
gc (x) = αis(x,tc
i
)
i
∑ − αjs(x,tc
j
)
j
∑ + b
 
http://pralab.diee.unica.it
Sparse Support Faces
•  Open issue: SFMs require too many support faces
–  Number of support faces scales linearly with training set size
•  Our goal: to learn a much sparser combination of match scores
•  by jointly optimizing the weighting coefficients and support faces:
9	
  
hc (x) = βis(x, zc
k
)+ b
k=1
m
∑ , m << n
min
β,z
Ω β, z( )=
1
n
uk gc (xk )− hc (xk )( )
2
+ λβT
β
i=1
n
∑
 
http://pralab.diee.unica.it
z-­‐step
Sparse Support Faces
10	
  
SFM with 12 support faces
−5 0 5
−5
0
5
−5
0
5
SSFM with 4 virtual faces
−5 0 5
−5
0
5
−5
0
5
β-­‐step	
  
Solu:on	
  algorithm	
  is	
  an	
  itera-ve	
  two-­‐step	
  procedure:	
  
If s(x,z) is not differentiable or
analytically given, gradient
can be approximated
	
  
	
  
 
http://pralab.diee.unica.it
0.5 1 2 5 10
0
5
10
15
20 AT&T − RBF Kernel
FAR (%)
FRR(%)
mean (5)
max (5)
t−norm (10)
aggarwal−max (10)
SFM (37.5 ± 3.8)
SFM−sel (10)
SFM−red (2)
SSFM (2)
Experiments
11	
  
Datasets:
AT&T (40 clients, 10
images each)
BioID (23 clients,
1,521 images)
Matcher:
PCA+RBF kernel
(exact gradient)
5 repetitions,
different clients in
TR/TS splits
TR: 5 images/client
0.5 1 2 5 10
0
10
20
30
40 BioID − RBF Kernel
FAR (%)
FRR(%)
mean (5)
max (5)
t−norm (10)
aggarwal−max (10)
SFM (23.9 ± 2.7)
SFM−sel (10)
SFM−red (2)
SSFM (2)
 
http://pralab.diee.unica.it
Experiments
12	
  0.5 1 2 5 10
0
10
20
30
40 BioID − EBGM
FAR (%)
FRR(%)
mean (5)
max (5)
t−norm (10)
aggarwal−max (10)
SFM (15.0 ± 2.6)
SFM−sel (5)
SFM−red (5)
SSFM (5)
0.5 1 2 5 10
0
5
10
15
20 AT&T − EBGM
FAR (%)
FRR(%)
mean (5)
max (5)
t−norm (10)
aggarwal−max (10)
SFM (19.5 ± 3.0)
SFM−sel (5)
SFM−red (5)
SSFM (5)
Datasets:
AT&T (40 clients, 10
images each)
BioID (23 clients,
1,521 images)
Matcher:
EBGM
(approx. gradient)
5 repetitions,
different clients in
TR/TS splits
TR: 5 images/client
 
http://pralab.diee.unica.it
From Support Faces to Sparse Support Faces
•  A client’s gallery of 17 support faces (and weights) reduced to 5
virtual templates by our sparse support face machine
–  Dataset: BioID
–  Matching algorithm: EBGM
13	
  
4.040 2.854 −0.997 −3.525 −2.208
 
http://pralab.diee.unica.it
Conclusions and Future Research Directions
•  Sparse support face machines:
–  reduce computational time and storing requirements during
verification without affecting verification accuracy
–  by jointly learning an optimal combination of matching scores, and a
corresponding sparse set of virtual support faces
•  No explicit feature representation is required
–  Matching algorithm exploited as kernel function
–  Virtual templates created exploiting approximations of its gradient
•  Future work
–  Fingerprint verification
–  Identification setting
•  Joint reduction of virtual templates for each client-specific classifier
14	
  
 
http://pralab.diee.unica.it
?	
  Any questions
Thanks	
  for	
  your	
  a#en-on!	
  
15	
  
Code available at: http://pralab.diee.unica.it/en/SSFCodeProject

More Related Content

What's hot

A software fault localization technique based on program mutations
A software fault localization technique based on program mutationsA software fault localization technique based on program mutations
A software fault localization technique based on program mutations
Tao He
 
System Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataSystem Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed Automata
Lionel Briand
 

What's hot (17)

WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
adversarial robustness through local linearization
 adversarial robustness through local linearization adversarial robustness through local linearization
adversarial robustness through local linearization
 
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
 
On the Malware Detection Problem: Challenges & Novel Approaches
On the Malware Detection Problem: Challenges & Novel ApproachesOn the Malware Detection Problem: Challenges & Novel Approaches
On the Malware Detection Problem: Challenges & Novel Approaches
 
All You Need to Know to Win a Cybersecurity Adversarial Machine Learning Comp...
All You Need to Know to Win a Cybersecurity Adversarial Machine Learning Comp...All You Need to Know to Win a Cybersecurity Adversarial Machine Learning Comp...
All You Need to Know to Win a Cybersecurity Adversarial Machine Learning Comp...
 
Robustness in deep learning
Robustness in deep learningRobustness in deep learning
Robustness in deep learning
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
 
[Tho Quan] Fault Localization - Where is the root cause of a bug?
[Tho Quan] Fault Localization - Where is the root cause of a bug?[Tho Quan] Fault Localization - Where is the root cause of a bug?
[Tho Quan] Fault Localization - Where is the root cause of a bug?
 
Anomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-EncodersAnomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-Encoders
 
A software fault localization technique based on program mutations
A software fault localization technique based on program mutationsA software fault localization technique based on program mutations
A software fault localization technique based on program mutations
 
System Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataSystem Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed Automata
 
Galegalidou Christiana Thesis Presentation
Galegalidou Christiana Thesis PresentationGalegalidou Christiana Thesis Presentation
Galegalidou Christiana Thesis Presentation
 
Applications of Machine Learning and Metaheuristic Search to Security Testing
Applications of Machine Learning and Metaheuristic Search to Security TestingApplications of Machine Learning and Metaheuristic Search to Security Testing
Applications of Machine Learning and Metaheuristic Search to Security Testing
 
Icsoc12 tooldemo.ppt
Icsoc12 tooldemo.pptIcsoc12 tooldemo.ppt
Icsoc12 tooldemo.ppt
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 

Viewers also liked

Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Pluribus One
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Pluribus One
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 

Viewers also liked (13)

Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
 
Making neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursionMaking neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursion
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial Settings
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 

Similar to Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Phuket, Thailand, May 19-22, 2015

isabelle_webinar_jan..
isabelle_webinar_jan..isabelle_webinar_jan..
isabelle_webinar_jan..
butest
 
stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...
stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...
stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...
NETWAYS
 
Classification of voltage disturbance using machine learning
Classification of voltage disturbance using machine learning Classification of voltage disturbance using machine learning
Classification of voltage disturbance using machine learning
Mohan Kashyap
 

Similar to Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Phuket, Thailand, May 19-22, 2015 (20)

Two methods for optimising cognitive model parameters
Two methods for optimising cognitive model parametersTwo methods for optimising cognitive model parameters
Two methods for optimising cognitive model parameters
 
Lab 2: Classification and Regression Prediction Models, training and testing ...
Lab 2: Classification and Regression Prediction Models, training and testing ...Lab 2: Classification and Regression Prediction Models, training and testing ...
Lab 2: Classification and Regression Prediction Models, training and testing ...
 
Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
 
All projects
All projectsAll projects
All projects
 
Factorization Machines and Applications in Recommender Systems
Factorization Machines and Applications in Recommender SystemsFactorization Machines and Applications in Recommender Systems
Factorization Machines and Applications in Recommender Systems
 
SVD and the Netflix Dataset
SVD and the Netflix DatasetSVD and the Netflix Dataset
SVD and the Netflix Dataset
 
isabelle_webinar_jan..
isabelle_webinar_jan..isabelle_webinar_jan..
isabelle_webinar_jan..
 
My Postdoctoral Research
My Postdoctoral ResearchMy Postdoctoral Research
My Postdoctoral Research
 
[DOLAP2020] Towards Conversational OLAP
[DOLAP2020] Towards Conversational OLAP[DOLAP2020] Towards Conversational OLAP
[DOLAP2020] Towards Conversational OLAP
 
Dubai meetup 2016
Dubai meetup 2016Dubai meetup 2016
Dubai meetup 2016
 
Complex models in ecology: challenges and solutions
Complex models in ecology: challenges and solutionsComplex models in ecology: challenges and solutions
Complex models in ecology: challenges and solutions
 
TransmogrifAI - Automate Machine Learning Workflow with the power of Scala an...
TransmogrifAI - Automate Machine Learning Workflow with the power of Scala an...TransmogrifAI - Automate Machine Learning Workflow with the power of Scala an...
TransmogrifAI - Automate Machine Learning Workflow with the power of Scala an...
 
stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...
stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...
stackconf 2023 | How to reduce expenses on monitoring with VictoriaMetrics by...
 
Alex Smola, Professor in the Machine Learning Department, Carnegie Mellon Uni...
Alex Smola, Professor in the Machine Learning Department, Carnegie Mellon Uni...Alex Smola, Professor in the Machine Learning Department, Carnegie Mellon Uni...
Alex Smola, Professor in the Machine Learning Department, Carnegie Mellon Uni...
 
Heuristic design of experiments w meta gradient search
Heuristic design of experiments w meta gradient searchHeuristic design of experiments w meta gradient search
Heuristic design of experiments w meta gradient search
 
projectreport
projectreportprojectreport
projectreport
 
Improving Spam Mail Filtering Using Classification Algorithms With Partition ...
Improving Spam Mail Filtering Using Classification Algorithms With Partition ...Improving Spam Mail Filtering Using Classification Algorithms With Partition ...
Improving Spam Mail Filtering Using Classification Algorithms With Partition ...
 
Assessing the Reliability of a Human Estimator
Assessing the Reliability of a Human EstimatorAssessing the Reliability of a Human Estimator
Assessing the Reliability of a Human Estimator
 
Classification of voltage disturbance using machine learning
Classification of voltage disturbance using machine learning Classification of voltage disturbance using machine learning
Classification of voltage disturbance using machine learning
 

More from Pluribus One

Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
Pluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
Pluribus One
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
Pluribus One
 
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Pluribus One
 
Understanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsUnderstanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environments
Pluribus One
 
Amilab IJCB 2011 Poster
Amilab IJCB 2011 PosterAmilab IJCB 2011 Poster
Amilab IJCB 2011 Poster
Pluribus One
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011
Pluribus One
 
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterAriu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Pluribus One
 
Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011
Pluribus One
 
Ariu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern AnalysisAriu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern Analysis
Pluribus One
 
Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011
Pluribus One
 
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Pluribus One
 

More from Pluribus One (14)

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
 
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
 
Understanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsUnderstanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environments
 
Amilab IJCB 2011 Poster
Amilab IJCB 2011 PosterAmilab IJCB 2011 Poster
Amilab IJCB 2011 Poster
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011
 
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterAriu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
 
Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011
 
Ariu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern AnalysisAriu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern Analysis
 
Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011
 
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
 
Wiamis2010 poster
Wiamis2010 posterWiamis2010 poster
Wiamis2010 poster
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Phuket, Thailand, May 19-22, 2015

  • 1. Pa#ern  Recogni-on     and  Applica-ons  Lab                                     University   of  Cagliari,  Italy     Department  of   Electrical  and  Electronic   Engineering   Sparse Support Faces Ba#sta  Biggio,  Marco  Melis,  Giorgio  Fumera,  Fabio  Roli         Dept.  Of  Electrical  and  Electronic  Engineering   University  of  Cagliari,  Italy   Phuket,  Thailand,  May  19-­‐22,  2015  ICB  2015  
  • 2.   http://pralab.diee.unica.it Template-based Face Verification 2   gc ≥ϑc genuine   impostor   true   false   s(x,tc i ){ }i=1 p Matcher    s(⋅,⋅) Fusion   rule   gc (x)xFeature   extrac-on   Verifica-on  is  based  on  how  similar  the  submi#ed  image  is  to  the  client’s  templates   Client-­‐specific  one-­‐class  classifica:on   mean gc (x) = 1 p s(x,tc i ) i=1 p ∑ gc (x) = max i=1,…,p s(x,tc i )max Claimed   Iden-ty   tc 1 , …, tc p { } Claimed  iden-ty’s  templates  
  • 3.   http://pralab.diee.unica.it Cohort-based Face Verification 3   Verifica-on  is  based  on  how  similar  the  submi#ed  image  is  to  the  client’s  templates   and  on  how  different  it  is  from  the  cohorts’  templates   Client-­‐specific  two-­‐class  classifica:on  (one-­‐vs-­‐all)   gc ≥ϑc genuine   impostor   true   false   s(x,tc i ){ }i=1 n Matcher    s(⋅,⋅) Fusion   rule   gc (x)xFeature   extrac-on   tc 1 , …, tc p { } Claimed  iden-ty’s  templates   Cohorts   tc p+1 , …, tc n { } Claimed   Iden-ty  
  • 4.   http://pralab.diee.unica.it Cohort-based Fusion Rules •  Cohort selection is heuristically driven –  e.g., selection of the closest cohorts to the client’s templates •  Cohort-based fusion rules are also based on heuristics –  Test-normalization [Auckenthaler et al., DSP 2000] –  Aggarwal’s max rule [Aggarwal et al., CVPR-W 2006] 4   gc (x) = 1 σc (x) 1 p s(x,tc i ) i=1 p ∑ −µc (x) # $ % & ' ( gc (x) = max i=1,…,p s(x,tc i ) max j=p+1,…,n s(x,tc j )
  • 5.   http://pralab.diee.unica.it Open Issues •  Fusion rules and cohort selection are based on heuristics –  No guarantees of optimality in terms of verification error •  Our goal: to design a procedure to optimally select the reference templates and the fusion rule –  Optimal in the sense that it minimizes verification error (FRR and FAR) •  Underlying idea: to consider face verification as a two-class classification problem in similarity space 5  
  • 6.   http://pralab.diee.unica.it s(x, ) s(x, ) Face Verification in Similarity Space •  The matching function maps faces onto a similarity space –  How to design an optimal decision function in this space? 6   ?  
  • 7.   http://pralab.diee.unica.it Support Face Machines (SFMs) •  We learn a two-class SVM for each client –  using the matching score as the kernel function –  genuine client y=+1, impostors y=-1 •  SVM minimizes the classification error (optimal in that sense) –  FRR and FAR in our case •  The fusion rule is a linear combination of matching scores •  The templates are automatically selected for each client –  support vectors à support faces 7   gc (x) = αis(x,tc i ) i ∑ − αjs(x,tc j ) j ∑ + b
  • 8.   http://pralab.diee.unica.it Support Face Machines (SFMs) 8   s(x, ) s(x, ) •  Maximum-margin classifiers gc (x) = αis(x,tc i ) i ∑ − αjs(x,tc j ) j ∑ + b
  • 9.   http://pralab.diee.unica.it Sparse Support Faces •  Open issue: SFMs require too many support faces –  Number of support faces scales linearly with training set size •  Our goal: to learn a much sparser combination of match scores •  by jointly optimizing the weighting coefficients and support faces: 9   hc (x) = βis(x, zc k )+ b k=1 m ∑ , m << n min β,z Ω β, z( )= 1 n uk gc (xk )− hc (xk )( ) 2 + λβT β i=1 n ∑
  • 10.   http://pralab.diee.unica.it z-­‐step Sparse Support Faces 10   SFM with 12 support faces −5 0 5 −5 0 5 −5 0 5 SSFM with 4 virtual faces −5 0 5 −5 0 5 −5 0 5 β-­‐step   Solu:on  algorithm  is  an  itera-ve  two-­‐step  procedure:   If s(x,z) is not differentiable or analytically given, gradient can be approximated    
  • 11.   http://pralab.diee.unica.it 0.5 1 2 5 10 0 5 10 15 20 AT&T − RBF Kernel FAR (%) FRR(%) mean (5) max (5) t−norm (10) aggarwal−max (10) SFM (37.5 ± 3.8) SFM−sel (10) SFM−red (2) SSFM (2) Experiments 11   Datasets: AT&T (40 clients, 10 images each) BioID (23 clients, 1,521 images) Matcher: PCA+RBF kernel (exact gradient) 5 repetitions, different clients in TR/TS splits TR: 5 images/client 0.5 1 2 5 10 0 10 20 30 40 BioID − RBF Kernel FAR (%) FRR(%) mean (5) max (5) t−norm (10) aggarwal−max (10) SFM (23.9 ± 2.7) SFM−sel (10) SFM−red (2) SSFM (2)
  • 12.   http://pralab.diee.unica.it Experiments 12  0.5 1 2 5 10 0 10 20 30 40 BioID − EBGM FAR (%) FRR(%) mean (5) max (5) t−norm (10) aggarwal−max (10) SFM (15.0 ± 2.6) SFM−sel (5) SFM−red (5) SSFM (5) 0.5 1 2 5 10 0 5 10 15 20 AT&T − EBGM FAR (%) FRR(%) mean (5) max (5) t−norm (10) aggarwal−max (10) SFM (19.5 ± 3.0) SFM−sel (5) SFM−red (5) SSFM (5) Datasets: AT&T (40 clients, 10 images each) BioID (23 clients, 1,521 images) Matcher: EBGM (approx. gradient) 5 repetitions, different clients in TR/TS splits TR: 5 images/client
  • 13.   http://pralab.diee.unica.it From Support Faces to Sparse Support Faces •  A client’s gallery of 17 support faces (and weights) reduced to 5 virtual templates by our sparse support face machine –  Dataset: BioID –  Matching algorithm: EBGM 13   4.040 2.854 −0.997 −3.525 −2.208
  • 14.   http://pralab.diee.unica.it Conclusions and Future Research Directions •  Sparse support face machines: –  reduce computational time and storing requirements during verification without affecting verification accuracy –  by jointly learning an optimal combination of matching scores, and a corresponding sparse set of virtual support faces •  No explicit feature representation is required –  Matching algorithm exploited as kernel function –  Virtual templates created exploiting approximations of its gradient •  Future work –  Fingerprint verification –  Identification setting •  Joint reduction of virtual templates for each client-specific classifier 14  
  • 15.   http://pralab.diee.unica.it ?  Any questions Thanks  for  your  a#en-on!   15   Code available at: http://pralab.diee.unica.it/en/SSFCodeProject