Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chris McCool is active.

Publication


Featured researches published by Chris McCool.


international conference on multimedia and expo | 2012

Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data

Chris McCool; Sébastien Marcel; Abdenour Hadid; Matti Pietikäinen; Pavel Matejka; Jan Cernock ; x Fd; Norman Poh; Josef Kittler; Anthony Larcher; Christophe Lévy; Driss Matrouf; Jean-François Bonastre; Phil Tresadern; Timothy F. Cootes

This paper presents a novel fully automatic bi-modal, face and speaker, recognition system which runs in real-time on a mobile phone. The implemented system runs in real-time on a Nokia N900 and demonstrates the feasibility of performing both automatic face and speaker recognition on a mobile phone. We evaluate this recognition system on a novel publicly-available mobile phone database and provide a well defined evaluation protocol. This database was captured almost exclusively using mobile phones and aims to improve research into deploying biometric techniques to mobile devices. We show, on this mobile phone database, that face and speaker recognition can be performed in a mobile environment and using score fusion can improve the performance by more than 25% in terms of error rates.


acm multimedia | 2012

Bob: a free signal processing and machine learning toolbox for researchers

André Anjos; Laurent El-Shafey; Roy Wallace; Manuel Günther; Chris McCool; Sébastien Marcel

Bob is a free signal processing and machine learning toolbox originally developed by the Biometrics group at Idiap Research Institute, Switzerland. The toolbox is designed to meet the needs of researchers by reducing development time and efficiently processing data. Firstly, Bob provides a researcher-friendly Python environment for rapid development. Secondly, efficient processing of large amounts of multimedia data is provided by fast C++ implementations of identified bottlenecks. The Python environment is integrated seamlessly with the C++ library, which ensures the library is easy to use and extensible. Thirdly, Bob supports reproducible research through its integrated experimental protocols for several databases. Finally, a strong emphasis is placed on code clarity, documentation, and thorough unit testing. Bob is thus an attractive resource for researchers due to this unique combination of ease of use, efficiency, extensibility and transparency. Bob is an open-source library and an ongoing community effort.


Pattern Recognition | 2010

On the vulnerability of face verification systems to hill-climbing attacks

Javier Galbally; Chris McCool; Julian Fierrez; Sébastien Marcel; Javier Ortega-Garcia

In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking technique uses the scores provided by the matcher to adapt a global distribution computed from an independent set of users, to the local specificities of the client being attacked. The proposed attack is evaluated on an eigenface-based and a parts-based face verification system using the XM2VTS database. Experimental results demonstrate that the hill-climbing algorithm is very efficient and is able to bypass over 85% of the attacked accounts (for both face recognition systems). The security flaws of the analyzed systems are pointed out and possible countermeasures to avoid them are also proposed.


IEEE Transactions on Pattern Analysis and Machine Intelligence | 2013

A Scalable Formulation of Probabilistic Linear Discriminant Analysis: Applied to Face Recognition

L. El Shafey; Chris McCool; Roy Wallace; Sébastien Marcel

In this paper, we present a scalable and exact solution for probabilistic linear discriminant analysis (PLDA). PLDA is a probabilistic model that has been shown to provide state-of-the-art performance for both face and speaker recognition. However, it has one major drawback: At training time estimating the latent variables requires the inversion and storage of a matrix whose size grows quadratically with the number of samples for the identity (class). To date, two approaches have been taken to deal with this problem, to 1) use an exact solution that calculates this large matrix and is obviously not scalable with the number of samples or 2) derive a variational approximation to the problem. We present a scalable derivation which is theoretically equivalent to the previous nonscalable solution and thus obviates the need for a variational approximation. Experimentally, we demonstrate the efficacy of our approach in two ways. First, on labeled faces in the wild, we illustrate the equivalence of our scalable implementation with previously published work. Second, on the large Multi-PIE database, we illustrate the gain in performance when using more training samples per identity (class), which is made possible by the proposed scalable formulation of PLDA.


IEEE Pervasive Computing | 2013

Mobile Biometrics: Combined Face and Voice Verification for a Mobile Platform

Philip A. Tresadern; Timothy F. Cootes; Norman Poh; Pavel Matejka; Abdenour Hadid; Christophe Lévy; Chris McCool; Sébastien Marcel

The Mobile Biometrics (MoBio) project combines real-time face and voice verification for better security of personal data stored on, or accessible from, a mobile platform.


International Journal of Central Banking | 2011

Inter-session variability modelling and joint factor analysis for face authentication

Roy Wallace; Mitchell McLaren; Chris McCool; Sébastien Marcel

This paper applies inter-session variability modelling and joint factor analysis to face authentication using Gaussian mixture models. These techniques, originally developed for speaker authentication, aim to explicitly model and remove detrimental within-client (inter-session) variation from client models. We apply the techniques to face authentication on the publicly-available BANCA, SCface and MOBIO databases. We propose a face authentication protocol for the challenging SCface database, and provide the first results on the MOBIO still face protocol. The techniques provide relative reductions in error rate of up to 44%, using only limited training data. On the BANCA database, our results represent a 31% reduction in error rate when benchmarked against previous work.


IEEE Transactions on Information Forensics and Security | 2010

An Evaluation of Video-to-Video Face Verification

Norman Poh; Chi-Ho Chan; Josef Kittler; Sébastien Marcel; Chris McCool; Enrique Argones Rúa; José A. Castro; Mauricio Villegas; Roberto Paredes; Vitomir Struc; Nikola Pavesic; Albert Ali Salah; Hui Fang; Nicholas Costen

Person recognition using facial features, e.g., mug-shot images, has long been used in identity documents. However, due to the widespread use of web-cams and mobile devices embedded with a camera, it is now possible to realize facial video recognition, rather than resorting to just still images. In fact, facial video recognition offers many advantages over still image recognition; these include the potential of boosting the system accuracy and deterring spoof attacks. This paper presents an evaluation of person identity verification using facial video data, organized in conjunction with the International Conference on Biometrics (ICB 2009). It involves 18 systems submitted by seven academic institutes. These systems provide for a diverse set of assumptions, including feature representation and preprocessing variations, allowing us to assess the effect of adverse conditions, usage of quality information, query selection, and template construction for video-to-video face authentication.


IEEE Transactions on Information Forensics and Security | 2012

Cross-Pollination of Normalization Techniques From Speaker to Face Authentication Using Gaussian Mixture Models

Roy Wallace; Mitchell McLaren; Chris McCool; Sébastien Marcel

This paper applies score and feature normalization techniques to parts-based Gaussian mixture model (GMM) face authentication. In particular, we propose to utilize techniques that are well established in state-of-the-art speaker authentication, and apply them to the face authentication task. For score normalization, T-, Z- and ZT-norm techniques are evaluated. For feature normalization, we propose a generalization of feature warping to 2D images, which is applied to discrete cosine transform (DCT) features prior to modeling. Evaluation is performed on a range of challenging databases relevant to forensics and security, including surveillance and access control scenarios. The normalization techniques are shown to generalize well to the face authentication task, resulting in relative improvements in half total error rate (HTER) of between 17% and 62%.


international conference on pattern recognition | 2010

On the results of the first mobile biometry (MOBIO) face and speaker verification evaluation

Sébastien Marcel; Chris McCool; Pavel Matějka; Timo Ahonen; Jan Cernocký; Shayok Chakraborty; Vineeth Nallure Balasubramanian; Sethuraman Panchanathan; Chi-Ho Chan; Josef Kittler; Norman Poh; Benoit G. B. Fauve; Ondřej Glembek; Oldřich Plchot; Zdeněk Jančík; Anthony Larcher; Christophe Lévy; Driss Matrouf; Jean-François Bonastre; Ping Han Lee; Jui Yu Hung; Si Wei Wu; Yi-Ping Hung; Lukáš Machlica; John S. D. Mason; Sandra Mau; Conrad Sanderson; David Monzo; Antonio Albiol; Hieu V. Nguyen

This paper evaluates the performance of face and speaker verification techniques in the context of a mobile environment. The mobile environment was chosen as it provides a realistic and challenging test-bed for biometric person verification techniques to operate. For instance the audio environment is quite noisy and there is limited control over the illumination conditions and the pose of the subject for the video. To conduct this evaluation, a part of a database captured during the Mobile Biometry (MOBIO) European Project was used. In total there were nine participants to the evaluation who submitted a face verification system and five participants who submitted speaker verification systems. The results have shown that the best performing face and speaker verification systems obtained the same level of performance, respectively 10.9% and 10.6% of HTER.


international conference on biometrics | 2009

Hill-climbing attack to an Eigenface-based face verification system

Javier Galbally; Julian Fierrez; Javier Ortega-Garcia; Chris McCool; Sébastien Marcel

We use a general hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of an Eigenface-based approach for face recognition against indirect attacks. The attacking technique uses the scores provided by the matcher to adapt a global distribution, computed from a development set of users, to the local specificities of the client being attacked. The proposed attack is evaluated on an Eigenface-based verification system using the XM2VTS database. The results show a very high efficiency of the hill-climbing algorithm, which successfully bypassed the system for over 85% of the attacked accounts.

Collaboration


Dive into the Chris McCool's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Roy Wallace

Idiap Research Institute

View shared research outputs
Top Co-Authors

Avatar

Norman Poh

Idiap Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Peter Corke

University of Adelaide

View shared research outputs
Top Co-Authors

Avatar

ZongYuan Ge

University of Adelaide

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge