Abstract
The recent growth in CCTV systems and the challenges of automatically identifying humans under the adverse visual conditions of surveillance have increased the interest in soft biometrics, which are physical attributes that can be used to describe people semantically. Soft biometrics enable human identification based on verbal descriptions, and they can be captured in conditions where it is impossible to acquire traditional biometrics such as iris and fingerprint. The research on facial soft biometrics has tended to focus on identification using categorical attributes, whereas comparative attributes have shown a better accuracy. Nevertheless, the research in comparative facial soft biometrics has been limited to small constrained databases, while identification in surveillance systems involves unconstrained large databases. In this chapter, we explore human identification through comparative facial soft biometrics in large unconstrained databases using the Labelled Faces in the Wild (LFW) database. We propose a novel set of attributes and investigate their significance. Also, we analyse the reliability of comparative facial soft biometrics for realistic databases and explore identification and verification using comparative facial soft biometrics. The results of the performance analysis show that by comparing an unknown subject to a line up of ten subjects only; a correct match will be found in the top 2.08% retrieved subjects from a database of 4038 subjects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Davis JP, Valentine T (2015) Human verification of identity from photographic images. In: Forensic facial identification: theory and practice of identification from eyewitnesses, composites and CCTV, pp 209–238
Crawford TAM, Evans K (2016) Crime prevention and community safety. Oxford University Press
Valentine T, Davis JP (2015) Forensic facial identification. In: Forensic facial identification: theory and practice of identification from eyewitnesses, composites and CCTV, pp 323–347
Kemp R, White D (2016) Face identification 3. In: An introduction to applied cognitive psychology, pp 39
Gerrard G, Thompson R (2011) Two million cameras in the UK. CCTV Image 42(10):e2
Barrett D (2013) One surveillance camera for every 11 people in Britain, says CCTV survey. The Telegraph 10
Samangooei S, Guo B, Nixon MS (2008) The use of semantic human description as a soft biometric. In: 2008 2nd IEEE international conference on biometrics: theory, applications and systems, BTAS 2008. IEEE, pp 1–7
Reid D, Samangooei S, Chen C, Nixon M, Ross A (2013) Soft biometrics for surveillance: an overview. Mach Learn Theory Appl 327–352
Nixon MS, Correia PL, Nasrollahi K, Moeslund TB, Hadid A, Tistarelli M (2015) On soft biometrics. Pattern Recognit Lett 68:218–230
Reid DA, Nixon MS, Stevenage SV (2014) Soft biometrics; human identification using comparative descriptions. IEEE Trans Pattern Anal Mach Intell 36(6):1216–1228
Seely RD, Samangooei S, Lee M, Carter JN, Nixon MS (2008) The University of Southampton multi-biometric tunnel and introducing a novel 3d gait dataset. In 2008 2nd IEEE international conference on biometrics: theory, applications and systems, BTAS 2008. IEEE, pp 1–6
Reid DA, Nixon MS (2011) Using comparative human descriptions for soft biometrics. In: 2011 international joint conference on biometrics (IJCB). IEEE, pp 1–6
Ryder H, Smith HMJ, Flowe HD (2015) Estimator variables and memory for faces. In: Forensic facial identification: theory and practice of identification from eyewitnesses, composites and CCTV, pp 159–183
Robbins R, McKone E (2007) No face-like processing for objects-of-expertise in three behavioural tasks. Cognition 103(1):34–79
Sinha P, Balas B, Ostrovsky Y, Russell R (2006) Face recognition by humans: nineteen results all computer vision researchers should know about. Proc IEEE 94(11):1948–1962
Jonathon P (2014) Phillips and Alice J O’Toole. Comparison of human and computer performance across face recognition experiments. Image Vis Comput 32(1):74–85
Bruce V, Young A (1986) Understanding face recognition. Br J Psychol 77(3):305–327
Hancock PJB, Bruce V, Burton AM (2000) Recognition of unfamiliar faces. Trends Cogn Sci 4(9):330–337
O’Toole AJ (2005) Psychological and neural perspectives on human face recognition. In: Handbook of face recognition. Springer, pp 349–369
Tsao DY, Livingstone MS (2008) Mechanisms of face perception. Annu Rev Neurosci 31:411–437
Nigel D (1986) Haig. Exploring recognition with interchanged facial features. Perception 15(3):235–247
Davies G, Ellis H, Shepherd J (1977) Cue saliency in faces as assessed by the ’Photofit’ technique. Perception 6(3):263–269
Sadr J, Jarudi I, Sinha P (2003) The role of eyebrows in face recognition. Perception 32(3):285–293
Lowell L (1974) Kuehn. Looking down a gun barrel: Person perception and violent crime. Percept Mot Skills 39(3):1159–1164
Sporer SL (1992) An archival analysis of person descriptions. In: Biennial meeting of the American Psychology-Law Society in San Diego, California
PJ van Koppen, Lochun SK (1997) Portraying perpetrators: The validity of offender descriptions by witnesses. Law Hum Behav 21(6):661
Burton MA, Wilson S, Cowan M, Bruce V (1999) Face recognition in poor-quality video: Evidence from security surveillance. Psychol Sci 10(3):243–248
Meissner CA, Sporer SL, Schooler JW (2013) Person descriptions as eyewitness evidence. In: Handbook of eyewitness psychology: memory for people, pp 1–34
Lee E, Whalen T, Sakalauskas J, Baigent G, Bisesar C, McCarthy A, Reid G, Wotton C (2004) Suspect identification by facial features. Ergonomics 47(7):719–747
Tome P, Fierrez J, Vera-Rodriguez R, Nixon MS (2014) Soft biometrics and their application in person recognition at a distance. IEEE Trans Inf Forensics Secur 9(3):464–475
O’Toole A, Jonathon Phillips P (2015) Evaluating automatic face recognition systems with human benchmarks. In: Forensic facial identification: theory and practice of identification from eyewitnesses, composites and CCTV, p 263
Arigbabu OA, Ahmad SM, Adnan WA, Yussof S (2015) Sharifah Mumtazah Ahmad, Wan Azizun Adnan, and Salman Yussof. (2015) Recent advances in facial soft biometrics. Vis Comput Int J Comput Graph 31(5):513–525
Kumar N, Berg AC, Belhumeur PN, Nayar SK (2009) Attribute and simile classifiers for face verification. In: 2009 IEEE 12th International Conference on Computer Vision, IEEE, pp 365–372
Huang GB, Ramesh M, Berg T, Learned-Miller E (2007) Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical report, Technical report 07–49, University of Massachusetts, Amherst
Park U, Jain AK (2010) Face matching and retrieval using soft biometrics. IEEE Trans Inform Forensics Secur 5(3):406–415
Phillips JP, Moon H, Rizvi SA, Rauss PJ (2000) The feret evaluation methodology for face-recognition algorithms. IEEE Trans Pattern Anal Mach Intell 22(10):1090–1104
Reid DA, Nixon MS (2013) Human identification using facial comparative descriptions. In: 2013 International Conference on Biometrics (ICB). IEEE, pp 1–7
Shutler JD, Grant MG, Nixon MS, Carter JN (2004) On a large sequence-based human gait database. In: Applications and science in soft computing. Springer, pp 339–346
Klare BF, Klum S, Klontz JC, Taborsky E, Akgul T, Jain AK (2014) Suspect identification based on descriptive facial attributes. In: 2014 IEEE International Joint Conference on Biometrics (IJCB). IEEE, pp 1–8
Tome P, Vera-Rodriguez R, Fierrez J, Ortega-Garcia J (2015) Facial soft biometric features for forensic face recognition. Forensic Sci Int 257:271–284
Ricanek K, Tesafaye T (2006) Morph: a longitudinal image database of normal adult age-progression. In: 2006 7th international conference on automatic face and gesture recognition, FGR 2006. IEEE, pp 341–345
Samangouei P, Patel VM, Chellappa R (2017) Facial attributes for active authentication on mobile devices. Image Vis Comput 58:181–192
McCool C, Marcel S, Hadid A, Pietikäinen M, Matejka P, Cernockỳ J, Poh N, Kittler J, Larcher A, Levy C et al (2012) Bi-modal person recognition on a mobile phone: using mobile phone data. In: 2012 IEEE International Conference on Multimedia and Expo Workshops (ICMEW). IEEE, pp 635–640
Fathy ME Patel VM, Chellappa R (2015) Face-based active authentication on mobile devices. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 1687–1691
Jain AK, Park U (2009) Facial marks: soft biometric for face recognition. In: 2009 16th IEEE International Conference on Image Processing (ICIP). IEEE, pp 37–40
Parikh D, Grauman K (2011) Relative attributes. In: 2011 IEEE International conference on computer vision (ICCV). IEEE, pp 503–510
Huang G, Mattar M, Lee H, Learned-Miller EG (2012) Learning to align from scratch. In: Advances in neural information processing systems, pp 764–772
Glickman ME (1995) A comprehensive guide to chess ratings. Am Chess J 3:59–102
Elo AE (1978) The rating of chessplayers, past and present. Arco Publishing
Joachims T (2002) Optimizing search engines using clickthrough data. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 133–142
Jaha ES, Nixon MS (2014) Soft biometrics for subject identification using clothing attributes. In: 2014 IEEE international joint conference on biometrics (IJCB). IEEE, pp 1–6
Martinho-Corbishley D, Nixon MS, Carter JN (2016) Soft biometric recognition from comparative crowdsourced annotations. IET Biometrics 1–16
Han H, Jain AK (2014) Age, gender and race estimation from unconstrained face images. Department of Computer Science Engineering, Michigan State University, East Lansing, MI, USA, MSU Technical Report (MSU-CSE-14-5)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Almudhahka, N.Y., Nixon, M.S., Hare, J.S. (2018). Comparative Face Soft Biometrics for Human Identification. In: Karampelas, P., Bourlai, T. (eds) Surveillance in Action. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-68533-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-68533-5_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68532-8
Online ISBN: 978-3-319-68533-5
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)