Please wait a minute...
JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE)
    
Augmenting remote multimodal person verification by embedding voice characteristics into face images
WANG Su1, HU Hao-ji1, YU Hui-min1, DAMPER R I 2
1. Department of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China; 2. Department of Electronics and Computer Science, University of Southampton, SO17 1BJ, UK
Download:   PDF(1678KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

A novel biometric watermarking algorithm was proposed to augment remote multimodal recognition by embedding voice characteristics into face images. Using the modified quantization index modulation(QIM) scheme proposed by reference [1], the algorithm embedded both a fragile watermark for tampering detection, and a robust watermark to represent the Gaussian mixture model (GMM) parameters extracted from voice. Using face, voice and multimodal recognition algorithms, the proposed watermarking scheme can detect tampering, and is robust to watermarking attacks such as resizing, Gaussian noise, blurring, Gamma correction and JPEG compression. On the XM2VTS database consisting of 295 persons, the multimodal system can obtain recognition rate of 95.93% for identification, and equal error rate of 3.19% for verification.Key words:  face recognition| speaker recognition| digital watermarking| quantization index modulation(QIM)



Published: 06 June 2018
CLC:  TP 391  
Cite this article:

WANG Su, HU Hao-ji, YU Hui-min, DAMPER R I. Augmenting remote multimodal person verification by embedding voice characteristics into face images. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2015, 49(1): 6-14.

URL:

http://www.zjujournals.com/eng/10.3785/j.issn.1008-973X.2015.01.002     OR     http://www.zjujournals.com/eng/Y2015/V49/I1/6


基于数字水印的人脸与声纹融合识别算法

提出远程多模态的生物特征数字水印算法,将声音特征作为水印加入到人脸图像中.运用文献[1]提出的改进型量化索引调制(QIM)方法,算法加入一个脆弱型的水印用于篡改检测,同时加入一个鲁棒型水印用于隐藏声音的高斯混合模型(GMM)参数.利用人脸、声纹和多模态识别算法,提出的方法能够实现对篡改的检测,对常见的攻击,例如图片缩放、高斯噪声、模糊化、伽马校正和JPEG压缩等具有鲁棒性.在由295人组成的XM2VTS数据库上,该多模态系统能够获得95.93%的识别率,同时获得3.19%的等错误率.

[1] MILLER B. Vital signs of identity biometrics [J]. Spectrum, IEEE, 1994, 31(2): 22-30.
[2] DONG J, TAN T. Effects of watermarking on iris recognition performance [C]∥Proceedings of the 10th International Conference on Control, Automation, Robotics and Vision. Hanoi, Vietnam: [s.n.], 2008: 1156-1161.
[3] JAIN A K, ULUDAG U. Hiding biometric data [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25 (11): 1494-1498.
[4] SATONAKA T. Biometric watermark authentication with multiple verification rule [C]∥Proceedings of the 12th IEEE Workshop on Neural Networks in Signal Processing. Martigny Valais: IEEE, 2002: 597-606.
[5] LI C, WANG Y, MA B, et al. Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme [J]. Computer Standards and Interfaces, 2012, 34(4): 367-379.
[6] ULUDAG U, PANKANTI S, PRABHAKAR S, et al. Biometric cryptosystems: issues and challenges [J]. Proceedings of the IEEE, 2004, 92(6): 948-960.
[7] RATHGEB C, UHL A. A survey on biometric cryptosystems and cancelable biometrics [J]. EURASIP Journal on Information Security, 2011, 2011(1): 125.
[8] REYNOLDS D A, ROSE R C. Robust text-independent speaker identification using Gaussian mixture speaker models [J]. IEEE Transactions on Speech and Audio Processing, 1995, 3(1): 72-83.
[9] LI Q, COX I J. Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(2): 127-139.
[10] CHEN B, WORNELL G W. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding [J]. IEEE Transactions on Information Theory, 2001, 47(4): 1423-1443.
[11] COX I J, MILLER M L, BLOOM J A. Digital watermarking and steganography [M]. Burlington: Morgan Kaufmann Publishers, 2008.
[12] LOWE D G. Object recognition from local scale-invariant features [C]∥Proceedings of the International Conference on Computer Vision. Corfu: [s. n.], 1999: 1150-1157.
[13] LOWE D G. Distinctive image features from scale invariant key points [J]. International Journal of Computer Vision, 2004, 60(2): 91-110.
[14] MESSER K, MATAS J, KITTLER J, et al. XM2VTSDB: the extended M2VTS database [C]∥Proceedings of the 2nd International Conference on Audio and Video-based Biometric Person Authentication. Washington, DC: [s. n.], 1999: 72-77.
[15] WANG Z, BOVIK A C. Image quality assessment: from error visibility to structural similarity [J]. IEEE Transactions on Image Processing, 2004, 13(4): 600-612.
[16] FAWCETT T. An introduction to ROC analysis [J]. Pattern Recognition Letters, 2006, 27(8): 861-874.

[1] HE Xue-jun, WANG Jin, LU Guo-dong, LIU Zhen-yu, CHEN Li, JIN Jing. 3D head portrait sculpture by industrial robot based on triangular mesh slicing and collision detection[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1104-1110.
[2] WANG Hua, HAN Tong-yang, ZHOU Ke. KeyGraph-based community detection algorithm for public security intelligence[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1173-1180.
[3] YOU Hai-hui, MA Zeng-yi, TANG Yi-jun, WANG Yue-lan, ZHENG Lin, YU Zhong, JI Cheng-jun. Soft measurement of heating value of burning municipal solid waste for circulating fluidized bed[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1163-1172.
[4] BI Xiao-jun, WANG Jia-hui. Teaching-learning-based optimization algorithm with hybrid learning strategy[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(5): 1024-1031.
[5] HUANG Zheng-yu, JIANG Xin-long, LIU Jun-fa, CHEN Yi-qiang, GU Yang. Fusion feature based semi-supervised manifold localization method[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 655-662.
[6] JIANG Xin-long, CHEN Yi-qiang, LIU Jun-fa, HU Li-sha, SHEN Jian-fei. Wearable system to support proximity awareness for people with autism[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 637-647.
[7] WANG Liang, YU Zhi-wen, GUO Bin. Moving trajectory prediction model based on double layer multi-granularity knowledge discovery[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 669-674.
[8] LIAO Miao, ZHAO Yu-qian, ZENG Ye-zhan, HUANG Zhong-chao, ZHANG Bing-kui, ZOU Bei-ji. Automatic segmentation for cell images based on support vector machine and ellipse fitting[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 722-728.
[9] MU Jing-jing, ZHAO Xin-yue, HE Zai-xing, ZHANG Shu-you. Contour reconstruction of overlapped bubbles based on concave-convex transformation and circle fitting[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 714-721.
[10] DAI Cai-yan, CHEN Ling, LI Bin, CHEN Bo-lun. Sampling-based link prediction in complex networks[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(3): 554-561.
[11] LIU Lei, YANG Peng, LIU Zuo-jun. Locomotion-Mode recognition using multiple kernel relevance vector machine[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(3): 562-571.
[12] GUO Meng-li, DA Fei-peng, DENG Xing, GAI Shao-yan. 3D face recognition based on keypoints and local feature[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(3): 584-589.
[13] WANG Hai jun, GE Hong juan, ZHANG Sheng yan. Fast object tracking algorithm via kernel collaborative presentation[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(2): 399-407.
[14] ZHANG Ya nan, CHEN De yun, WANG Ying jie, LIU Yu peng. Incremental graph pattern matching based dynamic recommendation method for cold-start user[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(2): 408-415.
[15] LIU Yu peng, QIAO Xiu ming, ZHAO Shi lei, MA Chun guang. Deep combination of large-scale features in statistical machine translation[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(1): 46-56.