Machine Learning for Biometrics: Concepts, Algorithms and Applications (Cognitive Data Science in Sustainable Computing) 1st Edition - eBook PDF download
Machine Learning for Biometrics: Concepts, Algorithms and Applications (Cognitive Data Science in Sustainable Computing) 1st Edition - eBook PDF download
Introduction to Algorithms for Data Mining and Machine Learning 1st edition
- eBook PDF
https://ebookluna.com/download/introduction-to-algorithms-for-data-mining-
and-machine-learning-ebook-pdf/
https://ebookluna.com/product/ebook-pdf-machine-learning-refined-
foundations-algorithms-and-applications/
https://ebookluna.com/download/cognitive-big-data-intelligence-with-a-
metaheuristic-approach-cognitive-data-science-in-sustainable-computing-
ebook-pdf/
https://ebookluna.com/download/machine-learning-for-planetary-science-
ebook-pdf/
Artificial Intelligence and Machine Learning for EDGE Computing 1st Edition
Rajiv Pandey - eBook PDF
https://ebookluna.com/download/artificial-intelligence-and-machine-
learning-for-edge-computing-ebook-pdf/
Machine Learning and Data Science in the Power Generation Industry: Best
Practices, Tools, and Case Studies 1st Edition - eBook PDF
https://ebookluna.com/download/machine-learning-and-data-science-in-the-
power-generation-industry-best-practices-tools-and-case-studies-ebook-pdf/
https://ebookluna.com/download/sustainable-developments-by-artificial-
intelligence-and-machine-learning-for-renewable-energies-ebook-pdf/
https://ebookluna.com/download/advances-in-subsurface-data-analytics-
traditional-and-physics-based-machine-learning-ebook-pdf/
https://ebookluna.com/download/big-data-analytics-introduction-to-hadoop-
spark-and-machine-learning-ebook-pdf/
Machine Learning for Biometrics
Concepts, Algorithms, and Applications
Cognitive Data Science in Sustainable Computing
Edited by
Madhumita Panda
Assistant Professor, Master in Computer Applications, Seemanta Engineering College,
Jharpokharia, Baripada, Odisha, India
Subhashree Mishra
Assistant Professor, School of Electronics Engineering, KIIT University, Bhubaneswar,
Odisha, India
Banshidhar Majhi
Director, IIITDM, Kancheepuram, Chennai, Tamil Nadu, India
Series Editor
Arun Kumar Sangaiah
School of Computing Science and Engineering,Vellore Institute of Technology (VIT),
Vellore, India
Academic Press is an imprint of Elsevier
125 London Wall, London EC2Y 5AS, United Kingdom
525 B Street, Suite 1650, San Diego, CA 92101, United States
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom
Copyright © 2022 Elsevier Inc. All rights reserved
No part of this publication may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or any information storage and
retrieval system, without permission in writing from the publisher. Details on how to seek
permission, further information about the Publisher’s permissions policies and our arrangements
with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can
be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the
Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience
broaden our understanding, changes in research methods, professional practices, or medical
treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating
and using any information, methods, compounds, or experiments described herein. In using such
information or methods they should be mindful of their own safety and the safety of others,
including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors,
assume any liability for any injury and/or damage to persons or property as a matter of products
liability, negligence or otherwise, or from any use or operation of any methods, products,
instructions, or ideas contained in the material herein.
Numbers in paraentheses indicate the pages on which the authors’ contributions begin.
Sumitav Acharya (143), Department of Computer Science and Engineering, National
Institute of Science and Technology, Berhampur, India
A. Anandh (105), Department of Computer Science and Engineering, Kamaraj College
of Engineering and Technology, Madurai, India
Saurabh Bilgaiyan (155), School of Computer Engineering, KIIT Deemed to be
University, Bhubaneswar, Odisha, India
P.V.S.S.R. Chandra Mouli (65), Department of Computer Science, Central University
of Tamil Nadu, Thiruvarur, India
Manisha P. Dale (1), MES College of Engineering, Savitribai Phule Pune University,
Pune, India
Rupam Das (155), School of Electronics Engineering, KIIT, Deemed to be University,
Bhubaneswar, India
K. Devendran (87), Computer Science and Engineering, Kongu Engineering College,
Erode, Tamil Nadu, India
Sachit Dhamija (155), School of Electronics Engineering, KIIT, Deemed to be
University, Bhubaneswar, India
R. Jai Ganesh (129), K. Ramakrishnan College of Technology, Trichy, India
G.K. Kamalam (177), Department of Information Technology, Kongu Engineering
College, Erode, Tamil Nadu, India
Vaishali H. Kamble (1), AISSMS IOIT, Savitribai Phule Pune University, Pune, India
M. Kavitha (129), K. Ramakrishnan College of Technology, Trichy, India
P. Keerthika (87,177), Department of Computer Science and Engineering, Kongu
Engineering College, Erode, Tamil Nadu, India
Chirag Kyal (29), Department of Computer Science and Engineering, National Institute
of Science and Technology, Berhampur, India
K. Logeswaran (177), Department of Information Technology, Kongu Engineering
College, Erode, Tamil Nadu, India
V.M. Manikandan (201), Computer Science and Engineering, SRM University-AP,
Amaravati, Andhra Pradesh, India
R. Manjula Devi (87,177), Department of Computer Science and Engineering, Kongu
Engineering College, Erode, Tamil Nadu, India
xiii
xiv Contributors
xv
xvi Preface
The editors would like to gratefully acknowledge all of the contributors for con-
tinuous effort and timely submission of their chapters. This book would not
have been feasible without the cooperation of the chapter authors. All the chap-
ters have been reviewed for several rounds to facilitate the selection of final
chapters in our book. Valuable suggestions and guidance from the reviewers
helped the authors in refining individual chapters. Thanks also go to the
reviewers in enhancing the quality of the chapters of this book.
The editors would like to extend gratitude to Sonnini Ruiz Yura from
Elsevier for inspiration over the year. We would like to gratefully acknowledge
Andrae Akeh and Judith Clarisse Punzalan (Elsevier) for their patience during
the preparation of this book. In addition, we shall thank Swapna Srinivasan at
Elsevier for her sincere help and patience during the final preparation of this
book. Finally, we shall extend gratefulness to our family members and friends
for all their support.
xix
Chapter 1
1 Introduction
Face of an individual is a popular and well-accepted biometric trait that can be
used to perform identity recognition of adults as well as children. Children are
the most valuable and jeopardy group in society; hence they should be under
supervision continuously. Security and healthcare of children is an important
aspect of all countries [1]. Automatic recognition of children using their face
is a useful investigative tool to help identify missing children. Though the
development of the face of a child starts in the mother’s womb from 3 months,
it is not proportional to the development of other parts of the body. Therefore,
recognition of children below 6 years is still an open research problem. Children
recognition using different modalities needs to be studied to solve the problems
related to security and healthcare. As per the literature survey, still there is not
even one commercial biometric system in use for recognition of toddlers. Var-
ious researchers have discussed about biometric recognition of adults; however,
very few papers on toddlers are available. A meager amount of work has been
traced in biometric identification of toddlers or children. It is most challenging
to recognize a toddler from his own single photograph after a few months. But,
in some instances, such as missing children, we have only the face image. So,
the recognition of children from their face image is very important. Facial
images can be acquired without users’ active involvement using ordinary cam-
eras from a distance. Also in survey, we noted that that most of the toddler’s
biometric recognition is in verification mode.
Sahar Siddique studied longitudinal face recognition using the Extended
Newborn Database and Children Multimodal Biometric Database. Identifica-
tion accuracy achieved using CNN is 62.7% and 85.1% on both the databases,
respectively [2]. Rowden et al. studied the longitudinal face recognition of chil-
dren between 0 and 4 years of age. The same-session accuracy they achieved is
93% and cross-session accuracy 43% after 6 months [3]. Local Binary Pattern
(LBP) is widely used texture-based method for recognition of face biometrics
[4]. This method is also used for children face recognition [5,6].
This chapter is presenting a machine learning and deep learning approach
for face recognition of children. As per the literature review, the study of chil-
dren recognition with the help of their face modality started in 2010 in India
[5,6]. Most of the papers studied same-session face recognition. The meager
amount of work is carried out longitudinally, that is, images of the same subject
taken over a period of time. There are very few readily available databases for
newborns like FG-NET [7]. There are very few images of children below
5 years in these datasets. CMBD database of IIIT Delhi (India) [8] is one of
the children longitudinal face recognition databases, but due to security reasons
the face database is not publicly available [9]. Therefore, database collection is
the major task in infants and toddler’s recognition. For this study, the database
of 81 subjects for the same session and 48 subjects for the cross session is col-
lected. The span between the data acquisition sessions is 3–6 months. The major
stages of the proposed work are preprocessing of face images, which include
manually cropping of face images of size 120 120 and converting it into gray
scale. Feature extraction is based on principal component analysis and linear
discriminant analysis, and CNN is proposed. The classification of subjects is
done using machine learning classifiers on the children database of the same
session and cross session. Further, the work is extended using convolutional
neural network (CNN) in which we have proposed our own optimized model
with data augmentation used to compare the machine learning and deep learn-
ing classifiers on our database.
The major contributions of the proposed work are as follows.
1. Due to the nonavailability of reference databases for children below 6 years,
the collection of longitudinal databases of children faces itself is a great
challenge. In the proposed work, we have captured the face images of tod-
dlers with the mobile camera of resolution 20 MP, with consent from their
parents in two sessions. Time period between two sessions is 2 months to
1 year. In the same session, 730 images of 81 toddlers are taken. In the sec-
ond session, 485 images of 48 toddlers are captured.
2. In this chapter, we are proposing feature extraction using PCA, LDA, and
CNN approaches on the facial images and their comparative study. In PCA
and LDA approaches, we have applied different machine learning tech-
niques for classification of subjects, such as Support Vector Machine
(SVM), Logistic Regression (LR), Gaussian Naive Bayes, K-Nearest
Neighbors (KNN), Decision Tree, and Random Forest. In CNN, feature
extraction is done by convolution layers and classification is done by dense
layers.
Machine learning approach Chapter 1 3
54.8
27.8 80.5
307.4
Fingerprint Recognition
Facial Authentication
IRIS Recognition
Voice Recognition
Palm Recognition
Others
448.2
1679.4
useful in the case of missing children. Therefore, we are using face biometrics
for recognition of children. An example of different biometrics of children from
our database is shown in Fig. 2.
Human face is a 3D model, we can recognize it by its features such as eyes,
shape of face, and color. Automatic face recognition is based on 2D photo-
graphs of a person. In 1964 and 1965, Woody Bledsoe, along with Helen Chan
and Charles Bisson, recognized human faces using computers for the first time.
Nowadays adult face recognition achieves very high accuracy in the range of
99.63% [11]. Face recognition of children is still an open challenge. All face
recognition algorithms evaluate on false negative identification rate (FNIR)
which is dependent on age. The FNIR of children is higher as compared to
adults or seniors. The comparison of FNIR and false positive identification rate
(FPIR) is given in Table 1 for various stages of child age.
Child face development: Studies from the paper by Farkas discuss that in
the first 2 years of a child face development, mouth width of child increases
whereas mouth height decreases. Mouth shape alters from “rosebud-like” to
a more adult type. Growth of facial features is very fast in the first year, less
rapid in the second year. Subsequent changes were slow and irregular from
the age of 3 to 9 years [12].
[Listen]
[Listen]
Act II. Part I. Three years have elapsed. It is a long time since
Pinkerton has left Butterfly with the promise to return to her "when
the robins nest." When the curtain rises, after an introduction, in
which another Japanese theme is employed, Suzuki, although
convinced that Pinkerton has deserted her mistress, is praying for his
return. Butterfly is full of faith and trust. In chiding her devoted maid
for doubting that Pinkerton will return, she draws in language and
song a vivid picture of his home-coming and of their mutual joy
therein:—"Un bel dì vedremo" (Some day he'll come).
[Listen]
[Listen]
Butterfly adorns herself and the baby boy. Then with her fingers she
pierces three holes in the paper wall of the dwelling. She, Suzuki,
and the baby peer through these, watching for Pinkerton's arrival.
Night falls. Suzuki and the boy drop off to sleep. Butterfly rigid,
motionless, waits and watches, her faith still unshaken, for the
return of the man who has forsaken her. The pathos of the scene is
profound; the music, with the hum of voices, borne upon the night
from the distant harbour, exquisite.
Act II. Part II. When the curtain rises, night has passed, dawn is
breaking. Suzuki and the baby are fast asleep, but Butterfly still is
watching. Again Puccini employs a Japanese melody (the "vigil"
theme).
[Listen]
LA RONDINE
THE SWALLOW
The opera begins in Paris during the Second Empire. Magda, the
heroine, is a demi-mondaine living under the protection of the rich
banker Rambaldo. Satisfied with the luxuries he lavishes upon her,
she longs for true affection, and is unable to stifle the remembrance
of her first love, a poor young student. She meets Ruggero, who like
her earlier love, is young and poor, and a student. At Bouilliers, the
rendezvous of the gay life of Paris, Ruggero declares his love for
Magda. They leave Paris for Nice, where they hope to lead an idyllic
existence.
Ruggero looks forward to a life of perfect happiness. He writes to his
parents asking their consent to his marriage with Magda. The reply
is that if she is virtuous and honourable, she will be received with
open arms. Magda now considers herself (like Violetta in "La
Traviata") unworthy of Ruggero's love and lest she shall bring
dishonour upon the man she loves, she parts with him. Other
principal rôles are Lisetta and Prunia, and there are numerous
second parts requiring first-rate artists.
In the second act of "La Rondine" is a quartet which, it is said,
Puccini believes will rival that at the end of the third act in "La
Bohème." "I have let my pen run," he is reported to have said, "and
no other method suffices to obtain good results, in my opinion. No
matter what marvellous technical effects may be worked up by
lengthy meditation, I believe in heart in preference to head."
The opera was produced in March, 1917, in Monte Carlo, and during
the summer of the same year, in Buenos Aires. Puccini intended to
compose it with dialogue as a genuine opéra comique, but finally
substituted recitative. The work is said to approach opéra comique in
style. Reports regarding its success vary.
After the first Italian performance, San Carlo Theatre, Naples,
February 26, 1918, Puccini, according to report, decided to revise
"La Rondine." Revision, as in the case of "Madama Butterfly," may
make a great success of it.
ONE-ACT OPERAS
Three one-act operas by Puccini have been composed for
performance at one sitting. They are "Suor Angelica" (Sister
Angelica), "Il Tabarro" (The Cloak), and "Gianni Schicchi." The motifs
of these operas are sentiment, tragedy, and humour.
The scene of "Suor Angelica" is laid within the walls of a mountain
convent, whither she has retired to expiate an unfortunate past. Her
first contact with the outer world is through a visit from an aunt,
who needs her signature to a document. Timidly she asks about the
tiny mite, whom she was constrained to abandon before she entered
the convent. Harshly the aunt replies that the child is dead. Sister
Angelica decides to make an end to her life amid the flowers she
loves. Dying, she appeals for pardon for her act of self-destruction.
The doors of the convent church open, and a dazzling light pours
forth revealing the Virgin Mary on the threshold surrounded by
angels, who, intoning a sweet chorus, bear the poor, penitent, and
weary soul to eternal peace. This little work is entirely for female
voices.
The libretto of "Il Tabarro" is tragic. The great scene is between a
husband and his wife. The husband has killed her lover, whose body
he shows to his unfaithful wife, lifting from the ground the cloak (il
tabarro) under which it is hidden.
The scene of "Il Tabarro" is laid on the deck of a Seine barge at
sunset, when the day's work is over, and after dark. The husband is
Michele, the wife Giorgetta, the lover, Luigi, and there are two other
bargemen. These latter go off after the day's work. Luigi lingers in
the cabin. He persuades Giorgetta that, when all is quiet on the
barge, and it will be safe for him to return to her, she shall strike a
match as a signal. He then goes.
Michele has suspected his wife. He reminds her of their early love,
when he sheltered her under his cloak. Giorgetta, however, receives
these reminiscences coldly, feigns weariness, and retires to the
cabin.
It has grown dark. Michele lights his pipe. Luigi, thinking it is
Giorgetta's signal, clambers up the side of the barge, where he is
seized and choked to death by Michele, who takes his cloak and
covers the corpse with it.
Giorgetta has heard sounds of a struggle. She comes on deck in
alarm, but is somewhat reassured, when she sees Michele sitting
alone and quietly smoking. Still somewhat nervous, however, she
endeavours to atone for her frigidity toward him, but a short time
before, by "making up" to him, telling him, among other things, that
she well recalls their early love and wishes she could again find
shelter in the folds of his big cloak. For reply, he raises the cloak,
and lets her see Luigi's corpse.
I have read another synopsis of this plot, in which Michele forces his
wife's face close to that of her dead lover. At the same moment, one
of the other bargemen, whose wife also had betrayed him, returns
brandishing the bloody knife, with which he has slain her. The
simpler version surely is more dramatic than the one of cumulative
horrors.
When the action of "Gianni Schicchi" opens one Donati has been
dead for two hours. His relations are thinking of the will. A young
man of the house hands it to his mother but exacts the promise that
he shall marry the daughter of neighbour Schicchi. When the will is
read, it is found that Donati has left his all to charity. Schicchi is
called in, and consulted. He plans a ruse. So far only those in the
room know of Donati's demise. The corpse is hidden. Schicchi gets
into bed, and, when the Doctor calls, imitates the dead man's voice
and pretends he wants to sleep. The lawyer is sent for. Schicchi
dictates a new will—in favour of himself, and becomes the heir, in
spite of the anger of the others.
Riccardo Zandonai
FRANCESCA DA RIMINI
FRANCESCA OF RIMINI
Opera in four acts, by Riccardo Zandonai; words by
Tito Ricordi, after the drama of the same title by
Gabriele d'Annunzio. English version from Arthur
Symons's translation of the drama. Produced, Reggio
Theatre, Turin, February 1, 1914. Covent Garden
Theatre, London, July 16, 1914. Metropolitan Opera
House, New York, December 22, 1916, with Alda
(Francesca), Martinelli (Paolo), and Amato (Giovanni).
Characters
Giovanni, the
} { Baritone
lame
sons of
Paolo, the
} Malatesta da { Tenor
beautiful
Verrucchio
Malatestino, the
} { Tenor
one-eyed
Ostasio, son of Guido Minore da
Baritone
Polenta
Ser Toldo Berardengo, a notary Tenor
A Jester Bass
A Bowman Tenor
Tower Warden Baritone
Francesca, daughter of Guido and
Soprano
sister of Ostasio
Samaritana, sister of Francesca and
Soprano
Ostasio
Biancofiore } { Soprano
Garsenda } women of { Soprano
Francesca Mezzo-
Altichiara } {
Soprano
Mezzo-
Donella
Soprano
Smaradi, a slave Contralto
Bowmen, archers, and musicians.
Time—Thirteenth century.
Place—First act, Ravenna, then Rimini.
The act is largely lyric in its musical effect. Much charm is given to it
by the quartette of women who attend upon Francesca. Almost at
the outset the composer creates what might be called the necessary
love mood, by a playful scene between Francesca's women and a
strolling jester, who chants for them the story of "Tristan und
Isolde." The setting of the scene is most picturesque. In fact
everything in this act tends to create "atmosphere," and were the
rest of the opera as successful, it would be one of the finest works
of its kind to have come out of modern Italy.
Act II. The scene is the interior of a round tower in the fortified
castle of the Malatestas. The summit of the tower is crowned with
engines of war and arms. There are heavy cross-bows, ballistas, a
catapult, and other mediæval machinery of battle. The castle is a
stronghold of the Guelfs. In the distance, beyond the city of Rimini,
are seen the battlements of the highest Ghibelline Tower. A narrow
fortified window looks out on the Adriatic.
Soon after the act opens, an attack takes place. The battle rages.
Amid all this distracting, and therefore futile tumult, occurs the first
meeting between Francesca and Paolo, since the marriage into
which she was tricked. Their love is obvious enough. Paolo
despairingly seeks death, to which Francesca also exposes herself by
remaining on the platform of the tower during the combat. The
relation between these two principal characters of the opera is
clearly enough set forth, and the impression made by it would be
forcible, were not attention distracted by the fiercely raging
mediæval combat.
The Malatestas are victorious. The attacking foes are driven off.
Gianciotto comes upon the platform and brings news to Paolo of his
election as Captain of the people and Commune of Florence, for
which city Paolo departs.
Photo by White
[Listen]
The women dance and sing, until on a whispered word from her
slave, Francesca dismisses them. Paolo has returned. The greeting
from her to him is simple enough: "Benvenuto, signore mio cognato"
(Welcome my lord and kinsman), but the music is charged with
deeper significance.
[Listen]
Together they read the story which Francesca had begun reading to
her women. Their heads come close together over the book. Their
white faces bend over it until their cheeks almost touch; and when
in the ancient love tale, the queen and her lover kiss, Francesca's
and Paolo's lips meet and linger in an ecstasy of passion.
Act IV. This act is divided into two parts. The scene of the first part
is an octagonal hall of gray stone. A grated door leads to a
subterranean prison. Cries of a prisoner from there have disturbed
Francesca. When she complains of this to the youngest brother of
Gianciotto, Malatestino, he goes down into the prison and kills the
captive. The introduction to this act is, appropriately enough, based
on an abrupt phrase.
[Listen]
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookluna.com