Please use this identifier to cite or link to this item:
https://doi.org/10.1109/WACV.2012.6163026
DC Field | Value | |
---|---|---|
dc.title | New hope for recognizing twins by using facial motion | |
dc.contributor.author | Zhang, L. | |
dc.contributor.author | Ye, N. | |
dc.contributor.author | Marroquin, E.M. | |
dc.contributor.author | Guo, D. | |
dc.contributor.author | Sim, T. | |
dc.date.accessioned | 2013-07-04T08:05:46Z | |
dc.date.available | 2013-07-04T08:05:46Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Zhang, L.,Ye, N.,Marroquin, E.M.,Guo, D.,Sim, T. (2012). New hope for recognizing twins by using facial motion. Proceedings of IEEE Workshop on Applications of Computer Vision : 209-214. ScholarBank@NUS Repository. <a href="https://doi.org/10.1109/WACV.2012.6163026" target="_blank">https://doi.org/10.1109/WACV.2012.6163026</a> | |
dc.identifier.isbn | 9781467302333 | |
dc.identifier.issn | 21583978 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/40501 | |
dc.description.abstract | Distinguishing between identical twins is the Holy Grail in face recognition because of the great similarity between the faces of a pair of twins. Most existing face recognition systems choose to simply ignore it. However, as the population of twins increases quickly, such an ostrich strategy is no longer acceptable. The biometric systems that overlook the twins problem are presenting a serious security hole. Inspired by recent advances in motion-based face recognition techniques, we propose to use facial motion to address the twins problem. We collect a twins facial expression database and conduct a series of experiments in two assumed scenarios: the Social Party Scenario and the Access Control Scenario. The experimental results show that facial motion ourperforms facial appearance in distinguishing between twins. Based on this finding, we propose a two-stage cascaded General Access Control System, which combines facial appearance with facial motion. The experimental results show that, compared with an appearance-based face recognition system, this cascaded system is much more secure against an "evil-twin" imposter attack, while performing as good for normal population. © 2012 IEEE. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/WACV.2012.6163026 | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1109/WACV.2012.6163026 | |
dc.description.sourcetitle | Proceedings of IEEE Workshop on Applications of Computer Vision | |
dc.description.page | 209-214 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.