This Article 
 Bibliographic References 
 Add to: 
Open Set Face Recognition Using Transduction
November 2005 (vol. 27 no. 11)
pp. 1686-1697
This paper motivates and describes a novel realization of transductive inference that can address the Open Set face recognition task. Open Set operates under the assumption that not all the test probes have mates in the gallery. It either detects the presence of some biometric signature within the gallery and finds its identity or rejects it, i.e., it provides for the "none of the above” answer. The main contribution of the paper is Open Set TCM-kNN (Transduction Confidence Machine-k Nearest Neighbors), which is suitable for multiclass authentication operational scenarios that have to include a rejection option for classes never enrolled in the gallery. Open Set TCM-kNN, driven by the relation between transduction and Kolmogorov complexity, provides a local estimation of the likelihood ratio needed for detection tasks. We provide extensive experimental data to show the feasibility, robustness, and comparative advantages of Open Set TCM-kNN on Open Set identification and watch list (surveillance) tasks using challenging FERET data. Last, we analyze the error structure driven by the fact that most of the errors in identification are due to a relatively small number of face patterns. Open Set TCM-kNN is shown to be suitable for PSEI (pattern specific error inhomogeneities) error analysis in order to identify difficult to recognize faces. PSEI analysis improves biometric performance by removing a small number of those difficult to recognize faces responsible for much of the original error in performance and/or by using data fusion.

[1] E. Bailly-Bailliere et al. “The BANCA Database and Evaluation Protocol,” Proc. Fourth Audio-Video Based Person Authentication, pp. 625-638, 2003.
[2] S. Bengio, J. Mariethoz, and S. Marcel, “Evaluation of Biometric Technology on XM2VTS,” Technical Report IDIAP-RR 01-21, European Project BANCA Deliverable D71, 2001.
[3] A. Blum and T. Mitchell, “Combining Labeled and Unlabeled Data with Co-Training,” Proc. Conf. Computational Learning Theory, pp. 92-100, 1998.
[4] R.M. Bolle, J.H. Connell, S. Pankanti, N.K. Ratha, and A.W. Senior, Guide to Biometrics. Springer, 2004.
[5] R. Chellappa, C.L. Wilson, and S. Sirohey, “Human and Machine Recognition of Faces: A Survey,” Proc. IEEE, vol. 83, no. 5, pp. 705-740, 1995.
[6] T.M. Cover and P.E. Hart, “Nearest Neighbor Pattern Classification,” IEEE Trans. Information Theory, vol. 13, pp. 21-27, 1967.
[7] P. Grother, “Face Recognition Vendor Test 2002,” Supplemental Report-NISTIR 7083, 2004.
[8] J. Daugman, “Face and Gesture Recognition: Overview,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 675-676, July 1997.
[9] G.R. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds, “Sheep, Goats, Lambs and Wolves: A Statistical Analysis of Speaker Performance,” Proc. Fifth Int'l Conf. Spoken Language Processing, pp. 1351-1354, 1998.
[10] S. Furui, “Recent Advances in Speaker Recognition,” Pattern Recognition Letters, vol. 18, pp. 859-872, 1997.
[11] A. Gammerman, V. Vovk, and V. Vapnik, “Learning by Transduction,” Uncertainty in Artificial Intelligence, pp. 148-155, 1998.
[12] BIOMETRICS— Personal Identification in Networked Society, A. Jain, R. Bolle, and S. Pankanti, eds. Kluwer, 1999.
[13] A. Jain and A. Ross, “Multibiometric Systems,” Comm. ACM, vol. 47, no. 1, pp. 34-40, 2004.
[14] T. Joachims, “Transductive Inference for Text Classification Using Support Vector Machines,” Proc. 16th Int'l Conf. Machine Learning, I. Bratko and S. Dzeroski, eds., pp. 200-209, 1999.
[15] P. Juszczak and R.P.W. Duin, “Selective Sampling Based on the Variation in Label Assignment,” Proc. 17th Int'l Conf. Pattern Recognition, 2004.
[16] M.A. Krogel and T. Scheffer, “Multi-Relational Learning, Text Mining, and Semi-Supervised Learning from Functional Genomics,” Machine Learning, vol. 57, pp. 61-81, 2004.
[17] M. Kukar and I. Kononenko, “Reliable Classifications with Machine Learning,” Proc. 13th European Conf. Machine Learning, 2002.
[18] M. Li and P. Vitanyi, An Introduction to Kolmogorov Complexity and Its Applications, second ed. Springer-Verlag, 1997.
[19] C. Liu and H. Wechsler, “Gabor Feature Based Classification Using the Enhanced Fisher Linear Discriminant Model for Face Recognition,” IEEE Trans. Image Processing, vol. 11, no. 4, pp. 467-476, 2002.
[20] C. Liu and H. Wechsler, “Facial Recognition,” Biometric Authentication: Technologies, Systems, Evaluations and Legal Issues, J.L. Wayman, A. Jain, D. Maltoni, and D. Maio, eds. Springer-Verlag, 2004.
[21] M.W. Mak, W.D. Zhang, and M.X. He, “A New Two-Stage Scoring Normalization Approach to Speaker Verification,” Proc. Int'l Symp. Intelligent Multimedia, Video, and Speech Processing, pp. 107-110, 2001.
[22] T. Melluish, C. Suanders, I. Nouretdinov, and V. Vovk, “The Typicalness Framework: A Comparison with the Bayesian Approach,” technical report, Dept. of Computer Science, Royal Holloway, Univ. of London,, 2001.
[23] T. Mitchell, “The Role of Unlabelled Data in Supervised Learning,” Proc. Sixth Int'l Colloquium Cognitive Sciences, 1999.
[24] K. Nigam, A.K. McCallum, S. Thrun, and T.M. Mitchell, “Text Classification from Labeled and Unlabeled Documents Using EM,” Machine Learning, vol. 39, nos. 2/3, pp. 103-134, 2000.
[25] S. Pankanti, N.K. Ratha, and R.M. Bolle, “Structure in Errors: A Case Study in Fingerprint Verification,” Proc. 16th Int'l Conf. Pattern Recognition, 2002.
[26] P.J. Phillips, H. Wechsler, J. Huang, and P. Rauss, “The FERET Database and Evaluation Procedure for Face Recognition Algorithms,” Image and Vision Computing, vol. 16, no. 5, pp. 295-306, 1998.
[27] P.J. Phillips, P. Grother, R.J. Micheals, D.M. Blackburn, E. Tabassi, and M. Bone, “Face Recognition Vendor Test 2002— Overview and Summary,” 2003.
[28] K. Proedrou, I. Nouretdinov, V. Vovk, and A. Gammerman, “Transductive Confidence Machines for Pattern Recognition,” Technical Report CLRC-TR-01-02, Royal Holloway, Univ. of London, 2001.
[29] D.A. Reynolds, T.F. Quatieri, and R.B. Dunn, “Speaker Verification Using Adapted Gaussian Mixture Models,” Digital Signal Processing, vol. 10, pp. 19-41, 2000.
[30] A. Ross and A. Jain, “Information fusion in Biometrics,” Pattern Recognition Letters, vol. 24, pp. 2115-2125, 2004.
[31] C. Saunders, A. Gammerman, and V. Vovk, “Transduction with Confidence and Credibility,” Proc. 16th Int'l Joint Conf. Artificial Intelligence, 1999.
[32] R. Snelick, M. Indovina, J. Yen, and A. Mink, “Multimodal Biometrics: Issues in Design and Testing,” Proc. Fifth Int'l Conf. Multimodal Interfaces, 2003.
[33] S. Tong and D. Koller, “Support Vector Machines Active Learning with Applications to Text Classification,” J. Machine Learning Research, vol. 2, pp. 45-66, 2001.
[34] V.N. Vapnik, Statistical Learning Theory. Wiley, 1998
[35] V.N. Vapnik, The Nature of Statistical Learning Theory, second ed. Springer-Verlag, 2000.
[36] W.J. Conover, Practical Nonparametric Statistics. John Wiley & Sons, 1980.
[37] V. Vovk, A. Gammerman, and C. Saunders, “Machine-Learning Application of Algorithmic Randomness,” Proc. 16th Int'l Conf. Machine Learning, 1999.
[38] W. Zhao, R. Chellappa, P.J. Phillips, and A. Rosenfeld, “Face Recognition: A Literature Survey,” Computing Surveys, vol. 35, no. 4, pp. 399-458, 2003.

Index Terms:
Index Terms- Biometrics, confidence, credibility, data fusion, information quality, Kolmogorov complexity, face recognition, open set recognition, performance evaluation, PSEI (pattern specific error inhomogeneities), randomness deficiency, strangeness, face surveillance, (multiclass) transduction, watch list, clustering, outlier detection.
Fayin Li, Harry Wechsler, "Open Set Face Recognition Using Transduction," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 11, pp. 1686-1697, Nov. 2005, doi:10.1109/TPAMI.2005.224
Usage of this product signifies your acceptance of the Terms of Use.