[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1131355.1131357guideproceedingsArticle/Chapter ViewAbstractPublication PagesdateConference Proceedingsconference-collections
Article
Free access

Architectures for efficient face authentication in embedded systems

Published: 06 March 2006 Publication History

Abstract

Biometrics represent a promising approach for reliable and secure user authentication. However, they have not yet been widely adopted in embedded systems, particularly in resource-constrained devices such as cell phones and personal digital assistants (PDAs). In this paper, we investigate the challenges involved in using face-based biometrics for authenticating a user to an embedded system. To enable high authentication accuracy, we consider robust face verifiers based on principal component analysis/linear discriminant analysis (PCA-LDA) algorithms and Bayesian classifiers, and their combined use (multi-modal biometrics). Since embedded systems are severely constrained in their processing capabilities, algorithms that provide sufficient accuracy tend to be computationally expensive, leading to unacceptable authentication times. On the other hand, achieving acceptable performance often comes at the cost of degradation in the quality of results.Our work aims at developing embedded processing architectures that improve face verification speed with minimal hardware requirements, and without any compromise in verification accuracy. We analyze the computational characteristics of face verifiers when running on an embedded processor, and systematically identify opportunities for accelerating their execution. We then present a range of targeted hardware and software enhancements that include the use of fixed-point arithmetic, various code optimizations, application-specific custom instructions and co-processors, and parallel processing capabilities in multi-processor systems-on-chip (SoCs).We evaluated the proposed architectures in the context of open-source face verification algorithms running on a commercial embedded processor (Xtensa from Tensilica). Our work shows that fast, in-system verification is possible even in the context of many resource-constrained embedded systems. We also demonstrate that high authentication accuracy can be achieved with minimum hardware overheads, while requiring no modifications to the core face verification algorithms.

References

[1]
Intel(R) Wireless Trusted Platform: Security for Mobile Devices. Intel Corp., 2004.
[2]
S. Hattangady and C. Davis, Reducing the Security Threats to 2.5G and 3G Wireless Applications. Texas Instruments Inc., 2002.
[3]
R. York, A New Foundation for CPU Systems Security. ARM Limited, 2003.
[4]
P. Kocher, R. B. Lee, G. McGraw, A. Raghunathan, and S. Ravi, "Security as a new dimension in embedded system design," in Proc. Design Automation Conf., pp. 753--760, June 2004.
[5]
D. V. Klein, "Foiling the cracker: A survey of, and improvements to, password security," in Proc. Wksp. USENIX Security, pp. 5--14, July 1990.
[6]
I. Armstrong, "Passwords exposed: Users are the weakest link," in http://www.scmagazine.com, June 2003.
[7]
A. Jain, R. Bolle, and S. Pankanti, eds., Biometrics: Personal Identification in Networked Society. Boston, MA: Kluwer Academic, 2002.
[8]
Xtensa Application Specific Microprocessor Solutions - Overview Handbook. Tensilica Inc. (http://www.tensilica.com), 2001.
[9]
M. Turk and A. Pentland, "Face recognition using eigenfaces," in Proc. IEEE Conf. Computer Vision & Pattern Recognition, pp. 561--586, June 1991.
[10]
P. Belhumeur, J. Hespanha, and D. Kriegman, "Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection," IEEE Trans. Pattern Analysis & Machine Intelligence, vol. 19, pp. 711--720, July 1997.
[11]
Y. Li, J. Kitller, and J. Matas, "Face verification using client specific Fisherfaces," in Proc. Int. Conf. Statistics of Directions, Shapes & Images, pp. 63--66, Sept. 2000.
[12]
C. Havran, L. Hupet, and J. Czyz, "Independent component analysis for face authentication," in Proc. Knowledge-Based Intelligent Information & Engineering Systems, pp. 1207--1211, Sept. 2002.
[13]
L. Wiskott, J.-M. Fellous, and N. Krüger, "Face recognition by elastic bunch graph matching," Pattern Analysis & Machine Intelligence, vol. 19, pp. 775--779, July 1997.
[14]
B. Moghaddam, C. Nastar, and A. Pentland, "A Bayesian similarity measure for direct image matching," in Proc. Int. Conf. Pattern Recognition, pp. 350--358, Aug. 1996.
[15]
S. Z. Li and A. K. Jain, Handbook of Face Recognition. Springer, 2005.
[16]
W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld, "Face recognition: A literature survey," ACM Comput. Surv., vol. 35, pp. 399--458, Dec. 2003.
[17]
M. Borgatti, F. Lertora, B. Foret, and L. Cali, "A reconfigurable system featuring dynamically extensible embedded microprocessor, FPGA, and customizable I/O," IEEE J. Solid-State Circuits, vol. 38, pp. 521--529, Mar. 2003.
[18]
J. Yang, X. Chen, and W. Kunz, "A PDA-based face recognition system," in Proc. Wkshp. Applications of Computer Vision, pp. 19--23, Dec. 2002.
[19]
OKAO Vision Face Recognition Sensor. OMRON, 2005.
[20]
R. Naraine, Face Recognition, via Cell Phones. Internetnews.com, 2002.
[21]
T. Hazen, E. Weinstein, R. Kabir, A. Park, and B. Heisele, "Multi-modal face and speaker identification on a handheld device," in Proc. Wkshp. Multimodal User Authentication, pp. 120--132, Dec. 2003.
[22]
A. K. Jain, K. Nandakumar, and A. Ross, "Score normalization in multimodal biometric systems," to appear in Pattern Recognition.
[23]
"Evaluation of face recognition algorithms, http://www.cs.colostate.edu/evalfacerec."
[24]
"The FERET database, http://www.itl.nist.gov/iad/humanid/feret/."
[25]
"Xnview - free graphic viewer, http://www.xnview.com."
[26]
Y. Fei, S. Ravi, A. Raghunathan, and N. K. Jha, "Energy estimation for extensible processors," in Proc. Design Automation and Test in Europe Conf., pp. 10682--10687, Mar. 2003.

Cited By

View all
  • (2015)Pattern Recognition in Embedded SystemsProceedings, Part I, of the 26th International Conference on Database and Expert Systems Applications - Volume 926110.1007/978-3-319-22849-5_1(3-10)Online publication date: 1-Sep-2015
  • (2012)Magnetic signatures in air for mobile devicesProceedings of the 14th international conference on Human-computer interaction with mobile devices and services companion10.1145/2371664.2371705(185-188)Online publication date: 21-Sep-2012
  • (2009)Implicit User Re-authentication for Mobile DevicesProceedings of the 6th International Conference on Ubiquitous Intelligence and Computing10.1007/978-3-642-02830-4_25(325-339)Online publication date: 6-Jul-2009

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
DATE '06: Proceedings of the conference on Design, automation and test in Europe: Designers' forum
March 2006
262 pages
ISBN:3981080106

Sponsors

  • EDAA: European Design Automation Association
  • The EDA Consortium
  • IEEE-CS\DATC: The IEEE Computer Society

Publisher

European Design and Automation Association

Leuven, Belgium

Publication History

Published: 06 March 2006

Qualifiers

  • Article

Acceptance Rates

DATE '06 Paper Acceptance Rate 45 of 45 submissions, 100%;
Overall Acceptance Rate 518 of 1,794 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)29
  • Downloads (Last 6 weeks)5
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2015)Pattern Recognition in Embedded SystemsProceedings, Part I, of the 26th International Conference on Database and Expert Systems Applications - Volume 926110.1007/978-3-319-22849-5_1(3-10)Online publication date: 1-Sep-2015
  • (2012)Magnetic signatures in air for mobile devicesProceedings of the 14th international conference on Human-computer interaction with mobile devices and services companion10.1145/2371664.2371705(185-188)Online publication date: 21-Sep-2012
  • (2009)Implicit User Re-authentication for Mobile DevicesProceedings of the 6th International Conference on Ubiquitous Intelligence and Computing10.1007/978-3-642-02830-4_25(325-339)Online publication date: 6-Jul-2009

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media