|
|
Augmenting remote multimodal person verification by embedding voice characteristics into face images |
WANG Su1, HU Hao-ji1, YU Hui-min1, DAMPER R I 2 |
1. Department of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China; 2. Department of Electronics and Computer Science, University of Southampton, SO17 1BJ, UK |
|
|
Abstract A novel biometric watermarking algorithm was proposed to augment remote multimodal recognition by embedding voice characteristics into face images. Using the modified quantization index modulation(QIM) scheme proposed by reference [1], the algorithm embedded both a fragile watermark for tampering detection, and a robust watermark to represent the Gaussian mixture model (GMM) parameters extracted from voice. Using face, voice and multimodal recognition algorithms, the proposed watermarking scheme can detect tampering, and is robust to watermarking attacks such as resizing, Gaussian noise, blurring, Gamma correction and JPEG compression. On the XM2VTS database consisting of 295 persons, the multimodal system can obtain recognition rate of 95.93% for identification, and equal error rate of 3.19% for verification.Key words: face recognition| speaker recognition| digital watermarking| quantization index modulation(QIM)
|
Published: 06 June 2018
|
|
基于数字水印的人脸与声纹融合识别算法
提出远程多模态的生物特征数字水印算法,将声音特征作为水印加入到人脸图像中.运用文献[1]提出的改进型量化索引调制(QIM)方法,算法加入一个脆弱型的水印用于篡改检测,同时加入一个鲁棒型水印用于隐藏声音的高斯混合模型(GMM)参数.利用人脸、声纹和多模态识别算法,提出的方法能够实现对篡改的检测,对常见的攻击,例如图片缩放、高斯噪声、模糊化、伽马校正和JPEG压缩等具有鲁棒性.在由295人组成的XM2VTS数据库上,该多模态系统能够获得95.93%的识别率,同时获得3.19%的等错误率.
|
|
[1] MILLER B. Vital signs of identity biometrics [J]. Spectrum, IEEE, 1994, 31(2): 22-30.
[2] DONG J, TAN T. Effects of watermarking on iris recognition performance [C]∥Proceedings of the 10th International Conference on Control, Automation, Robotics and Vision. Hanoi, Vietnam: [s.n.], 2008: 1156-1161.
[3] JAIN A K, ULUDAG U. Hiding biometric data [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25 (11): 1494-1498.
[4] SATONAKA T. Biometric watermark authentication with multiple verification rule [C]∥Proceedings of the 12th IEEE Workshop on Neural Networks in Signal Processing. Martigny Valais: IEEE, 2002: 597-606.
[5] LI C, WANG Y, MA B, et al. Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme [J]. Computer Standards and Interfaces, 2012, 34(4): 367-379.
[6] ULUDAG U, PANKANTI S, PRABHAKAR S, et al. Biometric cryptosystems: issues and challenges [J]. Proceedings of the IEEE, 2004, 92(6): 948-960.
[7] RATHGEB C, UHL A. A survey on biometric cryptosystems and cancelable biometrics [J]. EURASIP Journal on Information Security, 2011, 2011(1): 125.
[8] REYNOLDS D A, ROSE R C. Robust text-independent speaker identification using Gaussian mixture speaker models [J]. IEEE Transactions on Speech and Audio Processing, 1995, 3(1): 72-83.
[9] LI Q, COX I J. Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(2): 127-139.
[10] CHEN B, WORNELL G W. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding [J]. IEEE Transactions on Information Theory, 2001, 47(4): 1423-1443.
[11] COX I J, MILLER M L, BLOOM J A. Digital watermarking and steganography [M]. Burlington: Morgan Kaufmann Publishers, 2008.
[12] LOWE D G. Object recognition from local scale-invariant features [C]∥Proceedings of the International Conference on Computer Vision. Corfu: [s. n.], 1999: 1150-1157.
[13] LOWE D G. Distinctive image features from scale invariant key points [J]. International Journal of Computer Vision, 2004, 60(2): 91-110.
[14] MESSER K, MATAS J, KITTLER J, et al. XM2VTSDB: the extended M2VTS database [C]∥Proceedings of the 2nd International Conference on Audio and Video-based Biometric Person Authentication. Washington, DC: [s. n.], 1999: 72-77.
[15] WANG Z, BOVIK A C. Image quality assessment: from error visibility to structural similarity [J]. IEEE Transactions on Image Processing, 2004, 13(4): 600-612.
[16] FAWCETT T. An introduction to ROC analysis [J]. Pattern Recognition Letters, 2006, 27(8): 861-874. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|