Joshua Adams
North Carolina Agricultural and Technical State University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Joshua Adams.
international conference on pattern recognition | 2010
Joshua Adams; Damon L. Woodard; Philip E. Miller; Kelvin S. Bryant; George Glenn
Given an image from a biometric sensor, it is important for the feature extraction module to extract an original set of features that can be used for identity recognition. This form of feature extraction has been referred to as Type I feature extraction. For some biometric systems, Type I feature extraction is used exclusively. However, a second form of feature extraction does exist and is concerned with optimizing/minimizing the original feature set given by a Type I feature extraction method. This second form of feature extraction has been referred to as Type II feature extraction (feature selection). In this paper, we present a genetic-based Type II feature extraction system, referred to as GEFE (Genetic & Evolutionary Feature Extraction), for optimizing the feature sets returned by Loocal Binary Pattern Type I feature extraction for periocular biometric recognition. Our results show that not only does GEFE dramatically reduce the number of features needed but the evolved features sets also have higher recognition rates.
acm southeast regional conference | 2011
Joseph Shelton; Kelvin S. Bryant; Joshua Adams; Khary Popplewell; Tamirat Abegaz; Kamilah Purrington; Damon L. Woodard; Karl Ricanek
This paper presents a novel approach to LBP feature extraction. Unlike other LBP feature extraction methods, we evolve the number, position, and the size of the areas of feature extraction. The approach described in this paper also attempts to minimize the number of areas as well as the size in an effort to reduce the total number of features needed for LBP-based face recognition. In addition to reducing the number of features by 63%, our approach also increases recognition accuracy from an average of 99.04% to 99.84%.
acm southeast regional conference | 2010
Joshua Adams; Damon L. Woodard; Philip E. Miller; George Glenn; Kelvin S. Bryant
Personal identification using an individuals periocular skin texture (e.g. the texture of the skin around the eye) is a promising and exciting new biometric modality [11]. For the application presented in this paper, local binary patterns (LBPs) are used to extract 1416 features from the periocular regions of images within the Face Recognition Grand Challenge (FRGC) dataset. GEFE (Genetic & Evolutionary Feature Extraction) is then used to evolve optimized subsets of the original feature set. Our results show that not only do the evolved subsets consist of approximately 50% fewer features but they also have higher recognition rates.
Procedia Computer Science | 2012
Joseph Shelton; Kelvin S. Bryant; Sheldon Abrams; Lasanio Small; Joshua Adams; Derrick Leflore; Aniesha Alford; Karl Ricanek
Abstract Biometric-based access control systems (BACSs) are vulnerable to replay attacks. Replay attacks occur when a biometric template is intercepted and maliciously used to gain unauthorized access to a system. In this paper, we introduce a Genetic and Evolutionary Biometric Security (GEBS) application which uses a Genetic and Evolutionary Computation to develop disposable Feature Extractors (FEs) in an effort to mitigate replay attacks. We describe how a previously developed system known as GEFE (Genetic and Evolutionary Feature Extraction) can be used to evolve unique and disposable FEs for users of BACS. Furthermore, we propose two access control protocols based on the use of disposable FEs and/or their resulting templates (also referred to as feature vectors (FVs)). In our proposed protocols, FEs/FVs are used to authenticate the identity of individuals and are then discarded. Our results show that this GEBS application can be successfully used to mitigate biometric replay attacks.
2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM) | 2011
Tamirat Abegaz; Kelvin S. Bryant; Joshua Adams; Khary Popplewell; Joseph Shelton; Karl Ricanek; Damon L. Woodard
In this paper, we have performed an evaluation of genetic-based feature selection and weighting on the PCA-based face recognition. This work highlights the first attempt of applying Genetic Algorithm (GA) based feature selection on the Eigenface method. The results show that genetic-based feature selection reduces the number of features needed by approximately 50% while improving the identification accuracy over the baseline. Genetic-based feature weighting significantly improves the accuracy from an 87.14% to a 92.5% correct recognition rate.
acm southeast regional conference | 2011
Khary Popplewell; Aniesha Alford; Kelvin S. Bryant; John C. Kelly; Joshua Adams; Tamirat Abegaz; Kamilah Purrington; Joseph Shelton
In this paper, we compare genetic-based feature selection (GEFeS) and weighting (GEFeW) techniques for multi-biometric recognition using face and periocular biometric modalities. Our results show that fusing face and periocular features outperforms face-only and periocular-only biometric recognition. Of the two genetic-based approaches, GEFeW outperforms GEFeS.
congress on evolutionary computation | 2012
Joseph Shelton; Joshua Adams; Aniesha Alford
A biometric replay attack occurs when a victims biometric information (in the form of a template) is stolen by a hacker as it is transmitted over a network and used by the hacker to impersonate the victim to gain unauthorized access. Biometric replay attacks can be particularly devastating because the victims of these attacks cannot easily alter their biometrics or the templates associated with their biometrics [1]. In an effort to mitigate biometric replay attacks, the authors of [2] proposed two biometric authentication protocols. These protocols are based on two principles: (a) it is possible to evolve a set of distinct feature extractors (FEs) and (b) distinct FEs produce distinct templates. These principles gave rise to the concept of disposable FEs (and templates). In this paper, we introduce two additional protocols based on disposable FEs and templates. Our results show that these new protocols can be used more efficiently than the two proposed in [2].
congress on evolutionary computation | 2010
Lamar Simpson; Joshua Adams; Damon L. Woodard; Philip E. Miller; Kelvin S. Bryant; George Glenn
One of the most important modules of any bio-metric system is the feature extraction module. Given a sample it is important for the feature extraction method to extract a rich set of features that can be used for identity recognition. This form of feature extraction has been referred to as Type I feature extraction and for some biometric systems it is used exclusively. However, a second form of feature extraction does exist and is concerned with optimizing/minimizing the original feature set given by a Type I feature extraction method. This second form of feature extraction has been referred to as Type II feature extraction (also known as feature selection). In this paper, we compare two GEC-based Type II feature extraction methods as applied to periocular-based recognition, an exciting new area of research within the Biometric research community that to date has used Type I feature extraction exclusively. Our results show that GEC-based Type II feature extraction is effective in optimizing recognition accuracy as well as minimizing the overall feature set size.
southeastcon | 2013
Joseph Shelton; Joshua Adams; Derrick Leflore
In this paper, we introduce a mouse movement behavioral biometric that involves image feature extraction using Genetic and Evolutionary Computations (GECs). This technique is referred to as Genetic and Evolutionary Feature Extraction (GEFE), and has been successfully used on a number of different biometrics. The data collector used in this paper is one where a user moves the mouse in an attempt to bring up a username/password dialog interface. This data collector traces the users mouse movement to waken the dialog and represents that as an image. Our results suggest that mouse movement can be used to successfully distinguish between users.
congress on evolutionary computation | 2011
Aniesha Alford; Khary Popplewell; Kelvin S. Bryant; John C. Kelly; Joshua Adams; Tamirat Abegaz; Joseph Shelton; Karl Ricanek; Damon L. Woodard
In this paper, we compare the performance of a Steady-State Genetic Algorithm (SSGA) and an Estimation of Distribution Algorithm (EDA) for multi-biometric feature selection and weighting. Our results show that when fusing face and periocular modalities, SSGA-based feature weighting (GEFeWSSGA) produces higher average recognition accuracies, while EDA-based feature selection (GEFeSEDA) performs better at reducing the number of features needed for recognition.
Collaboration
Dive into the Joshua Adams's collaboration.
North Carolina Agricultural and Technical State University
View shared research outputsNorth Carolina Agricultural and Technical State University
View shared research outputsNorth Carolina Agricultural and Technical State University
View shared research outputsNorth Carolina Agricultural and Technical State University
View shared research outputsNorth Carolina Agricultural and Technical State University
View shared research outputsNorth Carolina Agricultural and Technical State University
View shared research outputs