Skip to main content

Biometrics for Surveillance

  • Chapter
  • First Online:
Introduction to Intelligent Surveillance

Part of the book series: Texts in Computer Science ((TCS))

  • 1106 Accesses

Abstract

Our human always bring biometric information such as face, fingerprints, palms, and iris; no matter where we are, but biometric is discriminative from one to another which has essential and unique characteristics. In this chapter, we will introduce algorithms of surveillance data analytics, especially using biometric features, and critically compare and evaluate the major algorithms of biometrics for digital surveillance. At the end of this chapter, human privacy and ethics issues will be taken into consideration Adams, Ferryman (Secur J 28(3):272–289, 2012), Bowyer (IEEE Technol Soc 23(1):9–19, 2004).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 64.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adams A, Ferryman M (2012) The future of video analytics for surveillance and its ethical implications. Secur J 28(3):272–289

    Article  Google Scholar 

  2. Akhtar Z, Rattani A (2017) A face in any form: new challenges and opportunities for face recognition technology. Computer 50(4):80–90

    Article  Google Scholar 

  3. Aleksic PS (2009) Lip movement recognition. Encyclopedia of biometrics. Springer, New York, pp 904–908

    Google Scholar 

  4. Antoniou A, Angelov P (2016) A general purpose intelligent surveillance system for mobile devices using deep learning. In: International joint conference on neural networks (IJCNN)

    Google Scholar 

  5. Athitsos V, Wang H, Stefan A (2010) A database-based framework for gesture recognition. Pers Ubiquitous Comput 14(6):511–526

    Article  Google Scholar 

  6. Azad R, Ahmadzadeh E, Azad B (2015) Real-time human face detection in noisy images based on skin color fusion model and eye detection. Intelligent computing, communication and devices, vol 309. Springer, Berlin, pp 435–447

    Google Scholar 

  7. Bansal A, Agarwal R, Sharma RK (2012) FAR and FRR based analysis of iris recognition system. In: IEEE international conference on signal processing, computing and control, pp 1–6

    Google Scholar 

  8. Bartlett MS, Movellan JR, Sejnowski TJ (2002) Face recognition by independent component analysis. IEEE Trans Neural Netw 13(6):1450–1464

    Article  Google Scholar 

  9. Baym K (2009) A call for grounding in the face of blurred boundaries. J Comput-Mediat Commun 14(3):720–723

    Article  Google Scholar 

  10. Behravan H, Faez K (2013) Introducing a new multimodal database from twins’ biometric traits. In: Iranian conference on electrical engineering, pp 1–6

    Google Scholar 

  11. Billon R, Nedelec A, Tisseau J (2008) Gesture recognition in flow based on PCA analysis using multiagent system. In: Proceedings of the 2008 international conference on advances in computer entertainment technology, pp 139–146

    Google Scholar 

  12. Biswas S, Bowyer KW, Flynn PJ (2011) A study of face recognition of identical twins by humans. In: International workshop on information forensics and security, pp 1–6

    Google Scholar 

  13. Bowyer W (2004) Face recognition technology: security versus privacy. IEEE Technol Soc 23(1):9–19

    Article  Google Scholar 

  14. Bruce V, Young A (1986) Understanding face recognition. Br J Psychol 77:305–327

    Article  Google Scholar 

  15. Brunelli R, Falavigna D (1995) Person identification using multiple cues. IEEE Trans Pattern Anal Mach Intell 17(10):955966

    Article  Google Scholar 

  16. Bui H, Venkatesh S, West W (2001) Tracking and surveillance in wide-area spatial environments using the abstract Hidden Markov model. Pattern Recognit 15(1):177–195

    Article  Google Scholar 

  17. Burton DK (1987) Text-dependent speaker verification using vector quantization source-coding. IEEE Trans Acoust Speech Signal Process 35(2):133–143

    Article  Google Scholar 

  18. Calvel C, Ehrette T, Richard G (2005) Event detection for audio-based surveillance system. In: ICME, pp 1306–1309

    Google Scholar 

  19. Carrillo P, Kalva H, Magliveras S (2008) Compression independent object encryption for ensuring privacy in video surveillance. In: ICME, pp 273–276

    Google Scholar 

  20. Cavallaro A (2007) Privacy in video surveillance. IEEE Signal Process 24(2):168–169

    Article  Google Scholar 

  21. Chen C, Vijayan KA, Andrew DB (2015) Robust textural features for real time face recognition. In: Imaging and multimedia analytics in a web and mobile world (SPIE 9408)

    Google Scholar 

  22. Chen D, Chang Y, Yan R, Yang J (2007) Tools for protecting the privacy of specific individuals in video. EURASIP J Adv Signal Process 1(1):107–116

    Google Scholar 

  23. Chen T, Chen Y, Lee S, Huang F (1998) Discriminant analysis of principal components for face recognition. In: IEEE international conference on automatic face and gesture recognition, pp 336–341

    Google Scholar 

  24. Chen X, Koskela M (2013) Online RGB-D gesture recognition with extreme learning machines. In: ACM on international conference on multimodal interaction, pp 467–474

    Google Scholar 

  25. Cheng H, Luo J, Chen X (2014) A windowed dynamic time warping approach for 3D continuous hand gesture recognition. In: IEEE international conference on multimedia and expo, pp 1–6

    Google Scholar 

  26. Chinomi K, Nitta N, lto Y, Babaguchi N (2008) PriSurv: privacy protected video surveillance system using adaptive visual abstraction. Advances in multimedia modeling, vol 4903. Lecture Notes in Computer Science. Springer, Berlin, pp 144–154

    Chapter  Google Scholar 

  27. Cotton D, Uson M (2007) Image pixelization and dynamic range. Natl Radio Astron Obs 1(1):3–10

    Google Scholar 

  28. Cotton D, Uson M (2008) Pixelization and dynamic range in radio interferometry. Astron Instrum 490(1):455–460

    Google Scholar 

  29. Chan MT, Zhang Y, Huang TS (1998) Real-time lip tracking and bimodal continuous speech recognition. In: IEEE workshop on multimedia signal processing, pp 65–70

    Google Scholar 

  30. Chang K, Bowyer KW, Sarkar S, Victor B (2003) Comparison and combination of ear and face images in appearance-based biometrics. IEEE Trans Pattern Anal Mach Intell 25(9):1160–1165

    Article  Google Scholar 

  31. Delac K, Grgic M, Grgic S (2005) Statistics in face recognition: analyzing probability distributions of PCA, ICA and LDA performance results. In: International symposium on image and signal processing and analysis, pp 289–294

    Google Scholar 

  32. Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: CVPR, pp 886–893

    Google Scholar 

  33. Delac K, Grgic M, Grgic S (2005) Independent comparative study of PCA, ICA, and LDA on the FERET data set. Int J Imaging Syst Technol 15(5):252–260

    Article  Google Scholar 

  34. Dieckmann U, Plankensteiner P, Wagner T (1997) Sesam: a biometric person identification system using sensor fusion. Pattern Recognit Lett 18(9):827–833

    Article  Google Scholar 

  35. Dong Y, Liu Y, Lian S (2016) Automatic age estimation based on deep learning algorithm. Neurocomputing 187:4–10

    Article  Google Scholar 

  36. Draper BA, Baek K, Bartlett MS, Beveridge JR (2003) Recognizing faces with PCA and ICA. Comput Vis Image Underst 91(1–2):115–137

    Article  Google Scholar 

  37. Dufaux F, Ebrahimi T (2008) H.264/AVC video scrambling for privacy protection. In: IEEE ICIP, pp 1688–1691

    Google Scholar 

  38. Dufaux F, Ebrahimi T (2010) A framework for the validation of privacy protection solutions in video surveillance. In: IEEE ICME, pp 66–71

    Google Scholar 

  39. Enzweiler M, Gavrila D (2008) Monocular pedestrian detection: survey and experiments. IEEE Trans Pattern Anal Mach Intell 31(12):2179–2195

    Article  Google Scholar 

  40. Evermann J, Rehse J-R, Fettke P (2017) Predicting process behaviour using deep learning. Decis Support Syst 100:129–140

    Article  Google Scholar 

  41. Faraj M, Bigun J (2007) Lip biometrics for digit recognition. Computer analysis of images and patterns, vol 4673. Lecture Notes in Computer Science. Springer, Berlin, pp 360–365

    Chapter  Google Scholar 

  42. Fraser T (2004) Privacy law and video surveillance: guidance from the ontario courts. Mcinnes Cooper 3(1):10–13

    Google Scholar 

  43. Frischholz R, Dieckmann U (2000) Bioid: a multimodal biometric identification system. IEEE Comput 33(2):6468

    Article  Google Scholar 

  44. Gadea C, Ionescu B, Ionescu D, Islam S, Solomon B (2012) Finger-based gesture control of a collaborative online workspace. In: IEEE international symposium on applied computational intelligence and informatics, pp 41–46

    Google Scholar 

  45. Gavrila M (1993) The analysis of human motion and its application for visual surveillance. Comput Vis Image Underst 73(1):82–98

    Article  Google Scholar 

  46. Georghiades AS, Belhumeur PN, Kriegman DJ (2001) From few to many: illumination cone models for face recognition under variable lighting and pose. IEEE Trans Pattern Anal Mach Intell 23(6):643–660

    Article  Google Scholar 

  47. Golfarelli M, Maio D, Maltoni D (1997) On the error-reject tradeoff in biometric verification systems. IEEE Trans Pattern Anal Mach Intell 19(7):786796

    Article  Google Scholar 

  48. Gong S, Xiang T (2003) Recognition of group activities using dynamic probabilistic networks. In: IEEE ICCV, pp 742–750

    Google Scholar 

  49. Gottumukkal R, Asari VK (2004) An improved face recognition technique based on modular PCA approach. Pattern Recognit Lett 25(4):429–436

    Article  Google Scholar 

  50. Gouaillier V (2009) Intelligent video surveillance: promises and challenges technological and commercial intelligence report. CRIM Technople Def Secur 3(2):9–68

    Google Scholar 

  51. Gu S, Han Q (2006) The application of chaos and DWT in image scrambling. In: Machine learning and cybernetics, pp 3729–3733

    Google Scholar 

  52. Gulzar N, Abbasi B, Wu E, Ozbal A, Yan W (2013) Surveillance privacy protection. Intelligent multimedia surveillance: current trends and research. Springer, Berlin, pp 83–105

    Chapter  Google Scholar 

  53. Guo H, Wu X, Feng W (2017) Multi-stream deep networks for human action classification with sequential tensor decomposition. Signal Process 140:198–206

    Article  Google Scholar 

  54. Hampapur A, Brown L, Connell J, Ekin A, Haas N, Lu M, Merkl H, Pankanti S (2005) Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking. IEEE Signal Process 22(2):38–51

    Article  Google Scholar 

  55. Hanmandlu M, Gupta D, Vasikarla S (2013) Face recognition using Elastic bunch graph matching. In: IEEE applied imagery pattern recognition workshop: sensing for control and augmentation, pp 1–7

    Google Scholar 

  56. Haritaoglu I, Harwood D, Davis LS (2000) W4: real-time surveillance of people and their activities. IEEE TPAMI 22(8):809–830

    Article  Google Scholar 

  57. Herath S, Harandi M, Porikli F (2017) Going deeper into action recognition: a survey. Image Vis Comput 60:4–21

    Article  Google Scholar 

  58. Hsieh CC, Liou DH, Lee D (2010) A real time hand gesture recognition system using motion history image. In: International conference on signal processing systems, vol 2, pp V2–394

    Google Scholar 

  59. Hu G, Gao Q (2011) Gesture analysis using 3D camera, shape features and particle filters. In: Canadian conference on computer and robot vision, pp 204–211

    Google Scholar 

  60. Iosifidis A, Tefas A (2012) View-invariant action recognition based on artificial neural networks. IEEE Trans Neural Netw Learn Syst 23(3):412–424

    Article  Google Scholar 

  61. Ivanov Y, Bobick A (2000) Recognition of visual activities and interaction by stochastic parsing. IEEE Trans Pattern Anal Mach Intell 22(8):852872

    Article  Google Scholar 

  62. Ishijima R, Ogawa K, Higuchi M, Komuro T (2014) Real-time typing action detection in a 3D pointing gesture interface. In: Augmented human international conference, pp 20

    Google Scholar 

  63. Jain AK (2007) Technology: biometric recognition. Nature 449(7158):38–40

    Article  Google Scholar 

  64. Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20

    Article  Google Scholar 

  65. Jian-wei Z, Shui-fa S, Xiao-li L, Bang-jun L (2009) Pitch in speaker recognition. In: International conference on hybrid intelligent systems, pp 33–36

    Google Scholar 

  66. Julie S (2000) High-tech surveillance tools and the fourth amendment: reasonable expectations of privacy in the technological age. Am Crim Law Rev 37(1):192–222

    Google Scholar 

  67. Kasabov N (1996) Foundations of neural networks, fuzzy systems, and knowledge engineering. The MIT Press, Boston

    MATH  Google Scholar 

  68. Kieran D, Yan W (2010) A Framework for an event driven video surveillance system. In: IEEE advanced video and signal based surveillance, Boston, pp 97–102

    Google Scholar 

  69. Kim P-S, Lee D-G, Lee S-W (2018) Discriminative context learning with gated recurrent unit for group activity recognition. Pattern Recognit 76:149–161

    Article  Google Scholar 

  70. Klare B, Paulino AA, Jain AK (2011) Analysis of facial features in identical twins. In: International joint conference on biometrics, pp 1–8

    Google Scholar 

  71. Klette R (2014) Concise computer vision. Springer, London

    Book  MATH  Google Scholar 

  72. Kovac J, Peer P, Solina F (2003) Human skin color clustering for face detection. In: IEEE EUROCON, pp 144–148

    Google Scholar 

  73. Kshirsagar VP, Baviskar MR, Gaikwad ME (2011) Face recognition using eigenfaces. In: IEEE computer research and development, pp 302–306

    Google Scholar 

  74. Kurakin A, Zhang Z, Liu Z (2012) A real time system for dynamic hand gesture recognition with a depth sensor. In: European signal processing conference, pp 1975–1979

    Google Scholar 

  75. Kurniawan F, Shafry M, Rahim M (2012) A review on 2D ear recognition. In: International colloquium on signal processing and its applications, pp 204–209

    Google Scholar 

  76. Langheinrich M (2001) Privacy by design - principles of privacy-aware ubiquitous systems. In: UbiComp, pp 273–291

    Google Scholar 

  77. Lawrence S, Giles CL, Tsoi AC, Back AD (1997) Face recognition: a convolutional neural-network approach. IEEE Trans Neural Netw 8(1):98–113

    Article  Google Scholar 

  78. Le THN, Luu K, Seshadri K, Savvides M (2012) A facial aging approach to identification of identical twins. In: International conference on biometrics: theory, applications and systems, pp 91–98

    Google Scholar 

  79. Lee U, Tanaka J (2013) Finger identification and hand gesture recognition techniques for natural user interface. In: Asia Pacific conference on computer human interaction, pp 274–279

    Google Scholar 

  80. Li C, Xie C, Zhang B, Chen C, Han J (2018) Deep Fisher discriminant learning for mobile hand gesture recognition. Pattern Recognit 77:276–288

    Article  Google Scholar 

  81. Li G, Ito Y, Yu X, Nitta N, Babaguchi N (2009) Recoverable privacy protection for video content distribution. EURASIP J Inf Secur 3(4):2–9

    Google Scholar 

  82. Li R, Nguyen M, Yan Q (2017) Morse codes enter using finger gesture recognition. In: IEEE digital image computing: techniques and applications, pp 1–8

    Google Scholar 

  83. Li R (2017) Vision-based Morse code recognition. Masters Thesis, Auckland University of Technology, Auckland, New Zealand

    Google Scholar 

  84. Li SZ, Lu JW (1999) Face recognition using the nearest feature line method. IEEE Trans Neural Netw 10(2):439–443

    Article  Google Scholar 

  85. Li Y, Yuan W, Sang H, Li X (2013) Combination recognition of face and ear based on two-dimensional fisher linear discriminant. In: International conference on software engineering and service science, pp 922–925

    Google Scholar 

  86. Liu C, Wechsler H (1999) Comparative assessment of independent component analysis (ICA) for face recognition. In: International conference on audio- and video-based biometrics person authentication, pp 211–216

    Google Scholar 

  87. Lu J (2016) Empirical approaches for human behavior analytics. Masters thesis, Auckland University of Technology, New Zealand

    Google Scholar 

  88. Mahalingam G, Ricanek K (2013) Investigating the effects of gender and age group based differences in identical twins. In: National conference on computer vision, pattern recognition, image processing and graphics, pp 1–4

    Google Scholar 

  89. Maltoni D, Maio D, Jain A, Prabhakar S (2003) Handbook of fingerprint recognition. Springer, New York

    MATH  Google Scholar 

  90. Martin K, Plataniotis N (2008) Privacy protected surveillance using secure visual object coding. IEEE Trans Circuits Syst Video Technol 18(8):1152–1162

    Article  Google Scholar 

  91. Milan P, Jonker W (2007) Security, privacy, and trust in modern data management. Springer, New York

    MATH  Google Scholar 

  92. Mozaffari S, Behravan H (2011) Twins facial similarity impact on conventional face recognition systems. In: Iranian conference on electrical engineering, pp 1–6

    Google Scholar 

  93. Muda L, Begam M, Elamvazuthi I (2010) Voice recognition algorithms using mel frequency cepstral coefficient (MFCC) and dynamic time warping (DTW) techniques. J Comput 2(3)

    Google Scholar 

  94. Murthy R, Jadon RS (2010) Hand gesture recognition using neural networks. In: International advance computing conference, pp 134–138

    Google Scholar 

  95. Nandakumar K, Wan KW, Chan SMA, Ng WZT, Wang JG, Yau WY (2013) A multi-modal gesture recognition system using audio, video, and skeletal joint data. In: ACM international conference on multimodal interaction, pp 475–482

    Google Scholar 

  96. Nefian AV, Hayes MH (1999) An embedded HMM-based approach for face detection and recognition. In: International conference on acoustics, speech, and signal processing, pp 3553–3556

    Google Scholar 

  97. Newton M, Sweeney L, Malin B (2005) Preserving privacy by de-identifying face images. IEEE Trans Knowl Data Eng 17(2):232–243

    Article  Google Scholar 

  98. Nguyen NT, Bui HH, Venkatesh S, West G (2003) Recognizing and monitoring high-level behavior in complex spatial environments. In: IEEE CVPR, pp 1–6

    Google Scholar 

  99. Niikura T, Watanabe Y, Komuro T, Ishikawa M (2012) In-air typing interface: realizing 3D operation for mobile devices. In: IEEE global conference on consumer electronics, pp 223–227

    Google Scholar 

  100. Nikhil S, Mohan S, Ramya B, Kadambi GR (2010) Design and development of a DSP processor based reconfigurable hand gesture recognition system for real time applications. In: International conference on signal and image processing, pp 39–44

    Google Scholar 

  101. Orwell G (2002) Go on, watch me: people are voluntarily surrendering their privacy. The Economist 75(4):1125–1192

    Google Scholar 

  102. Osuna E, Freund R, Girosi F (1997) Training support vector machines: an application to face detection. In: IEEE conference on computer vision and pattern recognition, pp 130–136

    Google Scholar 

  103. Pankanti S, Hampapur A, Brown L, Tian L, Ekin A, Connell J, Shu F, Lu M (2005) Enabling video privacy through computer vision. IEEE Secur Priv 3(3):50–57

    Article  Google Scholar 

  104. Panwar M (2012) Hand gesture recognition based on shape parameters. In: International conference on computing communication and applications, pp 1–6

    Google Scholar 

  105. Paruchuri K, Cheung S, Hail W (2009) Video data hiding for managing privacy information in surveillance systems. EURASIP J Inf Secur 8(3):18

    Google Scholar 

  106. Pentland A (1991) Face recognition using eigenfaces. In: IEEE CVPR, pp 586–591

    Google Scholar 

  107. Pentland A, Moghaddam B, Starner T (1994) View-based and modular eigenspaces for face recognition. In: IEEE conference on computer vision and pattern recognition, pp 84–91

    Google Scholar 

  108. Phillips J, Moon H, Rauss J, Rizvi A (2000) The FERET evaluation methodology for face recognition algorithms. IEEE Trans Pattern Anal Mach Intell 22(10):252–274

    Article  Google Scholar 

  109. Pollock A (2002) Method of electronic audio surveillance. Law J Libr 5(12):380–385

    Google Scholar 

  110. Prabhakar S, Jain A (2002) Decision-level fusion in fingerprint verification. Pattern Recognit 35(4):861874

    Article  MATH  Google Scholar 

  111. Prabhakar S, Pankanti S, Jain A (2003) Biometric recognition: security and privacy concerns. IEEE Secur Priv 1(2):3342

    Article  Google Scholar 

  112. Prasad JS, Saxena A, Javar N, Kaushik KB, Chakraborty P, Nandi GC (2010) Gesture recognition by stereo vision. In: International conference on intelligent interactive technologies and multimedia, pp 155–162

    Google Scholar 

  113. Promyarut I, Suvonvorn N, Limsiroratana S (2011) Video scrambling for privacy protection in surveillance system. In: International conference on circuits, system and simulation, pp 177–182

    Google Scholar 

  114. Qi YY, Hunt BR (1994) Signature verification using global and grid features. Pattern Recognit 27(12):1621–1629

    Article  Google Scholar 

  115. Raheja JL, Shyam R, Kumar U, Prasad PB (2010) Real-time robotic hand control using hand gestures. In: International conference on machine learning and computing, pp 12–16

    Google Scholar 

  116. Remagnino P, Baumberg A, Grove T, Hogg D, Tan T, Worral A, Baker K (1997) An integrated traffic and pedestrian model-based vision system. In: BMVC, pp 380–389

    Google Scholar 

  117. Saini M, Atrey K, Mehrota S, Kankanhalli S (2012) \(W^3\)-privacy: understanding What, When and where inference channels in multi-camera surveillance video. Springer Multimed Tools Appl 68:135–158

    Article  Google Scholar 

  118. Sagheer AE, Tsuruta N, Taniguchi R (2004) Arabic lip-reading system: a combination of hypercolumn neural network model with hidden Markov model. In: International conference on artificial intelligence and soft computing, pp 311–316

    Google Scholar 

  119. SanMiguel JC, Martinez JM, Garcia A (2009) An ontology for event detection and its application in surveillance video. In: IEEE AVSS, pp 220–225

    Google Scholar 

  120. Senior A (2009) Protecting privacy in video surveillance. Springer, London

    Book  Google Scholar 

  121. Shailaja D, Gupta P (2006) A simple geometric approach for ear recognition. In: International conference on information technology, pp 164–167

    Google Scholar 

  122. Sigal L, Balan O, Black J (2010) Synchronized video and motion capture dataset and baseline algorithm for evaluation of articulated human motion. IJCV 87(1–2):4–27

    Article  Google Scholar 

  123. Socek D, Kalva H, Magliveras S, Marques O, Culibrk D, Furht B (2007) New approaches to encryption and steganography for digital videos. Multimed Syst 13(3):191–204

    Article  Google Scholar 

  124. Sohn H, AnzaKu E, Neve W, Ro M, Plataniotis K (2009) Privacy protection in video surveillance systems using scalable video coding. In: IEEE AVSS, pp 424–429

    Google Scholar 

  125. Song Y, Demirdjian D, Davis R (2012) Continuous body and hand gesture recognition for natural human-computer interaction. ACM Trans Interact Intell Syst 2(1)

    Article  Google Scholar 

  126. Srinivas N, Aggarwal G, Flynn PJ, Vorder Bruegge RW (2012) Analysis of facial marks to distinguish between identical twins. IEEE Trans Inf Forensics Secur 7(5):1536–1550

    Article  Google Scholar 

  127. Stergiopoulou E, Papamarkos N (2009) Hand gesture recognition using a neural network shape fitting technique. Eng Appl Artif Intell 22(8):1141–1158

    Article  Google Scholar 

  128. Suarez J, Murphy RR (2012) Hand gesture recognition with depth images: a review. In: RO-MAN, pp 411–417

    Google Scholar 

  129. Sun Z, Paulino AA, Feng J, Chai Z, Tan T, Jain AK (2010) A study of multi biometric traits of identical twins. In: SPIE biometric technology for human identification, vol 7667. Orlando, USA

    Google Scholar 

  130. Suo J, Chen X, Shan S, Gao W, Dai Q (2012) A concatenational graph evolution aging model. IEEE Trans Pattern Anal Mach Intell 34(11):2083–2096

    Article  Google Scholar 

  131. Swain M, Dash SK, Dash S, Mohapatra A (2012) An approach for iris plant classification using neural network. Int J Soft Comput 3(1):79

    Article  Google Scholar 

  132. Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In: IEEE conference on computer vision and pattern recognition, pp 586–591

    Google Scholar 

  133. Valenzise G, Gerosa L, Tagliasacchi M, Antonacci F, Sarti A (2007) Scream and gunshot detection and localization for audio surveillance. In: IEEE AVSS, pp 21–26

    Google Scholar 

  134. Vijayan V, Bowyer KW, Flynn PJ, Huang D, Chen L, Hansen M, Kakadiaris IA (2011) Twins 3D face recognition challenge. In: International joint conference on biometrics, pp 1–7

    Google Scholar 

  135. Viola P, Jones M (2004) Robust real-time face detection. Int J Comput Vis 57(2):137–154

    Article  Google Scholar 

  136. Wang S, Chen L, Zhou Z, Sun X, Dong J (2016) Human fall detection in surveillance video based on PCANet. Multimed Tools Appl 75(19):11603–11613

    Article  Google Scholar 

  137. Wei J, Huang DS, Zhang D (2008) Palmprint verification based on robust line orientation code. Pattern Recognit 41(5):1504–1513

    Article  MATH  Google Scholar 

  138. Wren C, Azarbayejani A, Darrell T, Pentland A (1997) Pfinder: realtime tracking of the human body. IEEE PAMI 19(7):780785

    Article  Google Scholar 

  139. Wu J, Cheng J, Zhao C, Lu H (2013) Fusing multi-modal features for gesture recognition. In: ACM on international conference on multimodal interaction, pp 453–460

    Google Scholar 

  140. Wu J, Pan G, Zhang D, Qi G, Li S (2009) Gesture recognition with a 3D accelerometer. In: Ubiquitous intelligence and computing, pp 25–38

    Chapter  Google Scholar 

  141. Xu C, Liu Q, Ye M (2017) Age invariant face recognition and retrieval by coupled auto-encoder networks. Neurocomputing 222:62–71

    Article  Google Scholar 

  142. Xu D (2006) A neural network approach for hand gesture recognition in virtual reality driving training system of SPG. In: International conference on pattern recognition, vol 3, pp 519–522

    Google Scholar 

  143. Yan W, Kankanhalli M (2008) Progressive audio scrambling in compressed domain. IEEE Trans Multimed 10(6):960–968

    Article  Google Scholar 

  144. Yan W, Wu X, Liu F, Jain R (2018) Progressive scrambling for social media. IJDCF 10(2):1–13

    Google Scholar 

  145. Yuan Q, Gao W, Yao HX (2002) Robust frontal face detection in complex environment. In: IEEE international conference on pattern recognition, pp 25–28

    Google Scholar 

  146. Zhang B, Li W, Qing P, Zhang D (2013) Palm-print classification by global features. IEEE Trans Syst Man Cybern Syst 43(2):370–378

    Article  Google Scholar 

  147. Zhang D, Shu W (1999) Two novel characteristic in palmprint verification: datum point invariance and line feature matching. Pattern Recognit 32(4):691702

    Article  Google Scholar 

  148. Zhang Y (2016) Virtual keyboard based on single finger recognition. Master thesis, Auckland University of Technology, Auckland, New Zealand

    Google Scholar 

  149. Zhao W, Chellappa R, Krishnaswamy A, Wen J (1998) Discriminant analysis of principal components for face recognition. In: IEEE international conference on automatic face and gesture recognition, pp 336–341

    Google Scholar 

  150. Zhao ZQ, Huang DS, Sun BY (2004) Human face recognition based on multi-features using neural networks committee. Pattern Recognit Lett 25(12):1351–1358

    Article  Google Scholar 

  151. Zhang L, Li L, Yang A, Shen Y, Yang M (2017) Towards contactless palmprint recognition: a novel device, a new benchmark, and a collaborative representation based identification approach. Pattern Recognit 69:199–212

    Article  Google Scholar 

  152. Zhang T, Feng Z (2013) Dynamic gesture recognition based on fusing frame images. In: International conference on intelligent systems design and engineering applications, pp 280–283

    Google Scholar 

  153. Zhu C, Peng Y (2017) Discriminative latent semantic feature learning for pedestrian detection. Neurocomputing 238:126–138

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Qi Yan .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Yan, W.Q. (2019). Biometrics for Surveillance. In: Introduction to Intelligent Surveillance. Texts in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-10713-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-10713-0_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-10712-3

  • Online ISBN: 978-3-030-10713-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics