Abstract
In this paper, we propose a re-weighted elastic net (REN) model for biometric recognition. The new model is applied to data separated into geometric and color spatial components. The geometric information is extracted using a fast cartoon - texture decomposition model based on a dual formulation of the total variation norm allowing us to carry information about the overall geometry of images. Color components are defined using linear and nonlinear color spaces, namely the red-green-blue (RGB), chromaticity-brightness (CB) and hue-saturation-value (HSV). Next, according to a Bayesian fusion-scheme, sparse representations for classification purposes are obtained. The scheme is numerically solved using a gradient projection (GP) algorithm. In the empirical validation of the proposed model, we have chosen the periocular region, which is an emerging trait known for its robustness against low quality data. Our results were obtained in the publicly available FRGC and UBIRIS.v2 data sets and show consistent improvements in recognition effectiveness when compared to related state-of-the-art techniques.
Similar content being viewed by others
References
Adams, J., Woodard, D.L., Dozier, G., Miller, P., Bryant, K., & Glenn, G. (2010). Genetic-based type ii feature extraction for periocular biometric recognition: Less is more. In Pattern Recognition (ICPR), 2010 20th International Conference on (pp. 205–208).
Bharadwaj, S., Bhatt, H.S., Vatsa, M., & Singh, R. (2010). Periocular biometrics: When iris recognition fails. In IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS) (pp. 1–6).
Bresson, X., Esedoglu, S., Vandergheynst, P., Thiran, J., & Osher, S. (2007). Fast global minimization of the active contour/snake model. Journal of Mathematical Imaging and Vision, 28(2), 151–167.
Candès, E., Romberg, J., & Tao, T. (2006). Stable signal recovery from incomplete and inaccurate measurements. Communications on Pure and Applied Mathematics, 59(8), 1207–1223.
Candes, E., & Tao, T. (2005). Decoding by linear programming. IEEE Transactions on Information Theory, 51(12), 4203–4215.
Candes, E., & Tao, T. (2007). The Dantzig selector: statistical estimation when p is much larger than n. The Annals of Statistics, 35(6), 2392–2404.
Candès, E., Wakin, M., & Boyd, S.P. (2008). Enhancing sparsity by reweighted ℓ 1− minimization. Journal of Fourier Analysis and Applications, 14(5), 877–905.
Chartrand, R., & Yin, W. (2008). Iteratively reweighted algorithms for compressive sensing. In IEEE International Conference on Acoustics, Speech, and Signal Processing (pp. 3869–3872).
Chen, S., Donoho, D., & Saunders, M. (1998). Atomic decomposition by basis pursuit. SIAM Journal on Scientific Computing, 20(1), 33–61.
Dalal, N., & Triggs, B. (2005). Histograms of oriented gradients for human detection. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 886–893).
Daugman, J. (1993). High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence, 15(11), 1148–1161.
Donoho, D. (2006). For most large underdetermined systems of equations, the minimal ℓ 1-norm near-solution approximates the sparsest near-solution. Communications on Pure and Applied Mathematics, 59(7), 907–934.
Fan, J., & Lv, J. (2008). Sure indepedence screening for ultrahigh dimensional feature space. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 70(5), 849–911.
Fazel, M., Hindi, H., & Boyd, S. (2003). Log-det heuristic for matrix rank minimization with applications to Hankel and Euclidean distance matrices. In Proceedings of the American Control Conference (pp. 2156–2162).
Figueiredo, M., Nowak, R., & Wright, S. (2007). Gradient projection for sparse reconstruction: Application to compressed sensing and other inverse problem. IEEE Journal of Selected Topics in Signal Processing, 1(4), 586–597.
Fuchs, J. J. (1999). Multipath time-delay detection and stimation. IEEE Transactions on Signal Processing, 47(1), 237–243.
Hong, D., & Zhang, F. (2010). Weigthed elastic net model for mass spectrometry image processing. Mathematical Modelling of Natural Phenomena, 5(3), 115–133.
Jain, A.K., Flynn, P., & Ross, A. (Eds.) (2007). Handbook of biometrics. New York, USA: Springer-Verlag.
Jia, J., & Yu, B. (2010). On model salection consistency of the elastic net when p≫n. Statistica Sinica, 20, 595–611.
Jiang, R., Crookes, D., & Lie, N. (2010). Face recognition in global harmonic subspace. IEEE Transactions on Information Forensics and Security, 5(3), 416–424.
Juefei-Xu, F., Cha, M., Heyman, J.L., Venugopalan, S., Abiantun, R., & Savvides, M. (2010). Robust local binary pattern feature sets for periocular biometric identification. In IEEE International Conference on Biometrics: Theory Applications and Systems (pp. 1–8).
Juefei-Xu, F., Luu, K., Savvides, M., Bui, T.D., & Suen, C.Y. (2011). Investigating age invariant face recognition based on periocular biometrics. In International Joint Conference on Biometrics (pp. 1–7).
Kang, S., & March, R. (2007). Variational models for image colorization via chromaticity and brightness decomposition. IEEE Transactions on Image Processing, 16(9), 2251–2261.
Lange, K. (2004). Optimization. Springer Text in Stadistic. New York: Springer.
Lowe, D.G. (2004). Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision, 60(2), 91–110.
Miller, P.E., Rawls, A.W., Pundlik, S.J., & Woodard, D.L. (2010). Personal identification using periocular skin texture. In ACM Symposium on Applied Computing, SAC’10 (pp. 1496–1500).
Moreno, J.C. (2014). Texture image segmentation by weighted image gradient norm terms based on local histogram and active contours. In Di Giamberardino, P., Iacoviello, D., Jorge, R.N., & Tavares, J.M.R.S. (Eds.) Computational Modeling of Objects Presented in Images (pp. 225–243). New York: Springer.
Moreno, J.C., Prasath, V.B.S., & Proenca, H. (2013). Robust periocular recognition by fusing local to holistic sparse representations. In Sixth International Conference on Security of Information and Networks (pp. 160–164). Aksaray, Turkey: Proceedings ACM Digital Library.
Moreno, J.C., Prasath, V.B.S., Vorotnikov, D., & Proenca, H. (2013). Adaptive diffusion constrained total variation scheme with application to cartoon + texture + edge image decomposition. Technical Report 1354. Portugal: University of Coimbra.
Ojala, T., Pietikainen, M., & Harwood, D. (1994). Performance evaluation of texture measures with classification based on Kullback discrimination of distributions. In International Conference on Pattern Recognition (ICPR), (Vol. 1 pp. 582–585).
Ojala, T., Pietikainen, M., & Maenpaa, T. (2002). Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(7), 971–987.
Oliva, A., & Torralba, A. (2001). Modeling the shape of the scene: A holistic representation of the spatial envelope. International Journal of Computer Vision, 42, 145–175.
Park, U., & Jain, A.K. (2010). Face matching and retrieval using soft biometrics. IEEE Transactions on Information Forensics and Security, 5(3), 406–415.
Park, U., Jillela, R.R., Ross, A., & Jain, A.K. (2011). Periocular biometrics in the visible spectrum. IEEE Transactions on Information Forensics and Security, 6(1), 96–106.
Park, U., Ross, A., & Jain, A.K. (2009). Periocular bimetrics in the visible spectrum: A feasibility study. In IEEE International Conference on Biometrics: Theory, Applications, and Systems (pp. 153–158).
Philips, P., Flynn, P., Scruggs, T., Bowyer, K., Chang, J., Hoffman, K., Marques, J., Min, J., & Worek, W. (2005). Overview on the face recognition gran challenge. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 947– 954).
Pillai, J.K., Patel, V.M., Chellappa, R., & Ratha, N.K. (2011). Secure and robust iris recognition using random projections and sparse representations. IEEE Transactions on Pattern Analysis and Machine Intelligence, 33(9), 1877–1893.
Prasath, V.B.S., Palaniappan, K., & Seetharaman, G. (2012). Multichannel texture image segmentation using weighted feature fitting based variational active contours. In Eighth Indian Conference on Vision, Graphics and Image Processing (ICVGIP) (p. 6).
Proença, H., & Alexandre, L. (2012). Toward covert iris biometric recognition: experimental results from the NICE contests. IEEE Transactions on Information Forensics and Security, 7(2), 798–808.
Proença, H., Filipe, S., Santos, R., Oliveira, J., & Alexandre, L.A. (2010). The UBIRIS.v2: A database of visible wavelength iris images captured on-the-move and at-a-distance. IEEE Transactions on Pattern Analysis and Machine Intelligence, 32(8), 1529–1535.
Rudin, L., Osher, S., & Fatemi, E. (1992). Nonlinear total variation based noise removal algorithms. Physica D, 60(1–4), 259– 268.
Santos, G., & Proença, H. (2013). Periocular biometrics: An emerging technology for unconstrained scenarios. In IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM) (pp. 14–21).
Serafini, T., Zanghirati, G., & Zanni, L. (2003). Gradient projection methods for large quadratic programs and applications in training support vector machines. Optimization Methods and Software, 20(2-3), 353–378.
Shekhar, S., Patel, V.M., Nasrabadi, N.M., & Chellappa, R. (2013). Joint sparse representation for robust multimodal biometrics recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 36(1), 113–126.
Sznitman, R., & Jedynak, B. (2010). Active testing for face detection and localization. IEEE Transactions on Pattern Analysis and Machine Inteligence, 32(10), 1914–1920.
Tang, B., Sapiro, G., & Caselles, V. (2001). Color image enhancement via chromaticity diffusion. IEEE Transactions on Image Processing, 10(5), 701–707.
Tibshirani, R. (1996). Regression shrinkage and selection via the LASSO. Journal of the Royal Statistical Society B, 58(1), 267–288.
Wainwright, M. (2009). Sharp thresholds for high-dimensional and noisy sparsity recovery using ℓ 1−constrained quadratic programming (Lasso). IEEE Transactions on Information Theory, 55(5), 2183–2202.
Wipf, D., & Nagarajan, S. (2010). Iterative reweighted ℓ 1 and ℓ 2 methods for finding sparse solutions. IEEE Journal of Selected Topics in Signal Processing, 4(2), 317–329.
Woodard, D.L., Pundlik, S., Miller, P., Jillela, R., & Ross, A. (2010). On the fusion of periocular and iris biometrics in non-ideal imagery. In IEEE International Conference on Pattern Recognition (pp. 201–204). Istanbul, Turkey.
Wright, J., Yang, A.Y., Ganesh, A., Sastry, S., & Ma, Y. (2009). Robust face recognition via sparse representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 31(2), 210–227.
Wyszecki, G., & Stiles, W. (1982). Color Science: Concepts and Methods, Quantitative Data and Formulas. New York: Wiley.
Zou, H. (2006). The adaptive lasso and its oracle properties. Journal of the American Statistical Association, 101(476), 1418–1429.
Zou, H., & Hastie, T. (2005). Regularization and variable selection via the elastic net. Journal of the Royal Statistical Society: Series B, 67(2), 301–320.
Zou, H., & Zhang, H. (2009). On the adaptive elastic-net with a diverging number of parameters. The Annals of Statistics, 37(4), 1733–175.
Author information
Authors and Affiliations
Corresponding author
Appendices
Appendix A: Existence of Solution
We state necessary and sufficient conditions for the existence of a solution for the proposed model (7). We follow the notations and similar arguments to those used in [19, 48]. Suppose that \(A_{i}=(A_{1i},\dots ,A_{mi})^{T}\), i=1,⋯ ,n are the linear independent predictors and y=(y 1,⋯ ,y m )T is the response vector. Let A=[A 1,⋯ ,A n ] be the predictor matrix. In terms of ℓ 1 and ℓ 2 norms, we rewrite the minimization problem in Eq. (7) as,
Let us denote by x ∗ and \(\hat {\mathbf {x}}\) the real and estimated solution of Eq. 13 respectively. Given \(\mathcal {I}=supp(\mathbf {x}^{\ast })=\{i:\,x^{\ast }_{i}\neq 0\}\), we define the block-wise form matrix
where \(A_{\mathcal {I}}\) (\(A_{\mathcal {I}^{c}}\)) is a \(m\times \#\mathcal {I}\) (\(m\times \#\mathcal {I}^{c}\)) matrix formed by concatenating the columns \(\{A_{i}:\,i\in \mathcal {I}\}\) (\(\{A_{i}:\,i\in \mathcal {I}^{c}\}\)) and \(A^{T}_{\mathcal {I}}A_{\mathcal {I}}\) is assumed to be invertible.
First we assume that there exist \(v\mathbf {x}\in \mathbb {R}^{n}\) satisfying (13) and \(sign(\hat {\mathbf {x}})=sign(\mathbf {x}^{\ast })\). Lets define \(\mathbf {b}=W_{\mathcal {I}}sign(\mathbf {x}_{\mathcal {I}}^{\ast })\) together with the set,
From the Kauush-Kuhn-Tucker (KKT) conditions we obtain
which can be rewritten as,
for some \(\mathbf {d}\in \mathcal {D}\) with components d i , \(i=1,\dots ,n\). By substituting the equality y=A x ∗+κ. From the above (14) the following two equations arise:
Solving for \(\mathbf {x}_{\mathcal {I}}\) in Eq. 15 and replacing in Eq. 16 to get b in terms of \(\mathbf {x}_{\mathcal {I}}\) leave us with
From Eqs. 17 and 18, we finally get the next two equations:
and
for \(i\in \mathcal {I}^{c}\).
Now, let us assume that Eqs. 19 and 20 both hold. It will be proved there exist \(\hat {\mathbf {x}}\in \mathbb {R}^{n}\) satisfying \(sing(\hat {\mathbf {x}})=sign(\mathbf {x}^{\ast })\). Setting \(\hat {\mathbf {x}}\in \mathbb {R}^{n}\) satisfying \(\hat {\mathbf {x}}_{\mathcal {I}^{c}}=\mathbf {x}^{\ast }_{\mathcal {I}^{c}}=0\) and
which guarantees the equality \(sign(\hat {\mathbf {x}}_{\mathcal {I}})=sign(\mathbf {x}^{\ast }_{\mathcal {I}})\) due to Eq. 19. In the same manner, we define \(\mathbf {d}\in \mathbb {R}^{n}\) satisfying \(\mathbf {d}_{\mathcal {I}}=\mathbf {b}\) and
implying from Eq. 20 the inequality |d i |≤w i for \(i\in \mathcal {I}^{c}\) and therefore \(\mathbf {d}\in \mathcal {D}\). From previous, we have found a point a point \(\hat {mathbf{x}}\in \mathbb {R}^{n}\) and \(\mathbf {d}\in \mathcal {D}\) satisfying (15) and (16) respectively or equivalently (14). Moreover, we also have the equality \(sign(\hat {\mathbf {x}})=sign(\mathbf {x}^{\ast })\). Under these assertions we can prove the sign recovery property of our model as illustrated next.
Appendix B: Sign Recovery Property
Under some regularity conditions on the proposed REN model, we intend to give an estimation for which the event \(sign(\hat {\mathbf {x}})=sign(\mathbf {x}^{\ast })\) is true. Following similar notations and arguments to those used in [53, 55], we intend to prove that our model enjoys the following probabilistic property:
For theoretical analysis purposes, the problem (7) is written as
The following regularity conditions are also assumed:
-
1.
Denoting with \(\Lambda _{\min }(S)\) and \(\Lambda _{\max }(S)\) the minimum and maximum eigenvalues of a symmetric matrix S, we assume the following inequalities hold:
$$ \theta_{1}\leq\Lambda_{\min}\left( \frac{1}{m}A^{T}A\right)\leq\Lambda_{\max}\left( \frac{1}{m}A^{T}A\right)\leq\theta_{2}, $$where 𝜃 1 and 𝜃 2 are two positive constants.
-
2.
\(\lim _{m\rightarrow \infty }\frac {\log (n)}{\log (m)}=\nu \) for some 0≤ν<1
-
3.
\(\lim \limits _{m\rightarrow \infty }\sqrt {\frac {m}{n}}\frac {1}{\max _{i\in \mathcal {I}}w_{i}}=\infty \).
Let
By using the definitions of \(\hat {\mathbf {x}}\) and \(\tilde {\mathbf {x}}\), the next two inequalities arise
and
The combination of Eqs. 23 and 24 give
On the other hand
By combining Eqs. 25 and 26 we get
which together with the identity
allow us to prove
Let us notice that
From Eqs. 27 and 28 we conclude that
Let \(\eta =\min _{i\in \mathcal {I}}|x_{i}^{\ast }|\) and \(\hat {\eta }=\max _{i\in \mathcal {I}}w_{i}\). Because of Eq. 27,
Then
Now, we notice that
Since
and \(\eta ^{2}m/n\rightarrow \infty \) as long as \(m\rightarrow \infty \), it follows that
By using Eq. 29, we derive
Substituting Eq. 31 and 32 in Eq. 30 allow us to conclude that
Then Eq. 21 holds.
Remark 2
There is special interest in applying the REN model in the case the data satisfies the condition n≫m. For the LASSO model it was suggested in [6] to make use of the Dantzig selector which can achieve the ideal estimation up to a l o g(n) factor. In [13] a performing of the Dantzig selector called the Sure Independence Screening (SIS) was introduced in order to reduce the ultra-high dimensionality. We remark that the SIS technique can be combined with the REN model (7) for dealing the case n≫m. Then previous computations can be still applied to reach the sign recovery property.
Rights and permissions
About this article
Cite this article
Moreno, J.C., Surya Prasath, V.B., Santos, G. et al. Robust Periocular Recognition by Fusing Sparse Representations of Color and Geometry Information. J Sign Process Syst 82, 403–417 (2016). https://doi.org/10.1007/s11265-015-1023-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11265-015-1023-3