Title :
Recognizing Surgically Altered Face Images Using Multiobjective Evolutionary Algorithm
Author :
Bhatt, Himanshu S. ; Bharadwaj, Samarth ; Singh, Richa ; Vatsa, Mayank
Author_Institution :
Indraprastha Inst. of Inf. Technol. (IIIT), Delhi, India
Abstract :
Widespread acceptability and use of biometrics for person authentication has instigated several techniques for evading identification. One such technique is altering facial appearance using surgical procedures that has raised a challenge for face recognition algorithms. Increasing popularity of plastic surgery and its effect on automatic face recognition has attracted attention from the research community. However, the nonlinear variations introduced by plastic surgery remain difficult to be modeled by existing face recognition systems. In this research, a multiobjective evolutionary granular algorithm is proposed to match face images before and after plastic surgery. The algorithm first generates non-disjoint face granules at multiple levels of granularity. The granular information is assimilated using a multiobjective genetic approach that simultaneously optimizes the selection of feature extractor for each face granule along with the weights of individual granules. On the plastic surgery face database, the proposed algorithm yields high identification accuracy as compared to existing algorithms and a commercial face recognition system.
Keywords :
face recognition; feature extraction; genetic algorithms; granular computing; image matching; medical image processing; surgery; automatic face recognition; biometrics; face image matching; facial appearance; feature extractor; multiobjective evolutionary granular algorithm; multiobjective genetic approach; nondisjoint face granules; nonlinear variations; person authentication; plastic surgery; surgically altered face image recognition; Biological cells; Data mining; Face; Face recognition; Facial features; Feature extraction; Surgery; Face recognition; genetic algorithm; granular computing; plastic surgery;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2012.2223684