International Journal of Computer Engineering and Applications, Volume XI, Issue VIII, August 17, ISSN

Size: px
Start display at page:

Download "International Journal of Computer Engineering and Applications, Volume XI, Issue VIII, August 17, ISSN"

Transcription

1 International Journal of Computer Engineering and Applications, Volume XI, Issue VIII, August 17, ISSN REDUCING FALSE ACCEPTANCE RATE IN OFFLINE WRITER INDEPENDENT SIGNATURE VERIFICATION SYSTEM THROUGH ENSEMBLE OF CLASSIFIERS Ashok Kumar 1, Karamjit Bhatia 2 1 Research Scholar, Department of Computer Science, Gurukula Kangri Vishwavidyalaya, Haridwar & Associate Professor, Department of Computer Applications, Invertis University, Bareilly, India 2 Professor, Department of Computer Science, Gurukula Kangri Vishwavidyalaya, Haridwar, India ABSTRACT: Handwritten signature verification is a very challenging and critical task. This work aims at proposing an efficient offline handwritten signature verification model using writer independent approach. The prime focus of this work is on reducing the false acceptance rate of genuine signatures of writers while letting false rejection rate at a satisfactory level through ensemble of classifiers. The k-fold cross validation technique is used to develop ensemble of classifiers. The performance of the ensemble of classifiers, the support vector machine with polynomial kernel, is analyzed using the signature database of writers. The efficacy of geometric and uniform rotation invariant local binary pattern features is investigated to build a reliable writer independent offline handwritten system. The experiments exhibit 0.00 %, 0.00 % and 1.00 % false acceptance rate for random, simple and skilled forgeries, respectively while allowing false rejection rate 5.00 %. Keywords: Writer Independent Offline Handwritten Signature Verification System, Geometric Features, Uniform Rotation Invariant Local Binary Pattern Descriptor, Support Vector Machine, Ensemble of Classifiers, False Acceptance Rate, False Rejection Rate [1] INTRODUCTION The signature of a person has tremendous significance as it is used not only for the identification of a person but also for establishing the authenticity of official documents. A Handwritten Signature Verification (HSV) system authenticates the signature of a person as genuine or forges. In previous few decades, several offline and online signature verification Ashok Kumar and Karamjit Bhatia 1

2 REDUCING FALSE ACCEPTANCE RATE IN OFFLINE WRITER INDEPENDENT SIGNATURE VERIFICATION SYSTEM THROUGH ENSEMBLE OF CLASSIFIERS systems have been proposed [1]. In online approach, optical pen is used by writer for signature and sensors are used to pick dynamic characteristics of handwriting like speed of writing, order of strokes, and pressure at various positions of the signature etc. On the other hand, in offline approach, white paper sheet is used to collect the signatures of writers and then optical scanner is used to convert these signatures into digital form. Due to unavailability of dynamic information, the development of an efficient and reliable offline signature verification system is supposed to be a tough task as compared to the development of its counterpart. Because of same reason, it is observed that the online signature verification systems outperform the offline signature verification systems. For developing a signature verification system, a forgery set is used which is divided into random, simple, and skilled forgeries subsets. The random forgery is a genuine signature sample of another writer. In simple (also known as unskilled) forgery the forger knows only the genuine writer s name whereas in case of skilled forgery (also known as simulated forgery) the forger knows genuine signature sample of writer very well and has practiced it many times [2]. The random, simple and skilled forgeries of genuine signature sample of a writer are shown in [Figure-1]. To measure the efficiency of HSV systems, two performance metrics are used by researchers namely- False Rejection Rate (FRR) and False Acceptance Rate (FAR). The False Rejection Rate (also known as Type I error) is the percentage of genuine signatures of writer rejected as forgery signature whereas the False Acceptance Rate (also known as Type II error) is the percentage of forgery signatures of writer accepted as genuine signature. Many researchers have reported the performance of a HSV system in terms of Average Error Rate (AER), sometimes called Mean Error Rate (MER), which is the average of FRR and FAR. Figure: 1. Genuine and forgery signatures Writer dependent (WD) and Writer independent (WI) are two approaches to develop an offline signature verification systems [3]. In WD approach, an individual model is built for every writer on the basis of two dissimilar pattern classes, C1 and C2, where C1 is a set of a specific writer genuine signature samples and class C2 contains the forgery signature samples. The writer dependent approach suffers from major problems- the requirement of the vast number of genuine signature samples and incapability to absorb new writer without generating new personal model. On the other hand, writer independent approach, also called global model, requires only one model to deal with all writers and is capable to absorb unknown writer without retraining the model. This global model approach perceives the signature verification problem as a two-class problem, where one class G1 contains genuine samples of all writers and other class G2 contains forgeries [Figure-2]. The improvement of 2

3 International Journal of Computer Engineering and Applications, Volume XI, Issue VIII, August 17, ISSN WI approach over WD is that one can build reliable model even when a few number of genuine signature samples are available. In writer independent HSV system, one of the prime challenge is reducing the FAR for random, simple and simulated forgeries as much as possible while keeping FRR at acceptable level. The present work aims at developing an offline writer independent handwritten signature verification system with major focus on reducing the false acceptance rate. For this work, a signature database of 260 writers is created. Two feature sets, geometric features and uniform rotation invariant local binary pattern features, are extracted from the signature samples for the performance evaluation of the ensemble of classifiers, the Support Vector Machine with Polynomial Kernel (SVM Poly). The classifiers of ensemble are trained with local and global geometric and uniform rotation invariant local binary pattern features using only genuine signature samples and random forgeries. Simple and simulated forgeries of genuine signature are not used in training process but used in the testing phase only. The prime aim of these classifiers is to classifying the handwritten signature as genuine or forge. The performance of proposed approach is evaluated and compared with existing approaches for writer independent signature verification system. Figure: 2. Global model signatures area for different authors The rest of the paper is intended as: Section 2 presents the literature survey related to writer independent offline HSV system. Section 3 describes the functioning of WI approach. Section 4 presents the detail of proposed method. Section 5 discusses results of experiments and finally the conclusion of this paper is given in section 6. [2] LITERATURE SURVEY Writer independent approach for HSV system is not a widely addressed research problem as compared to its counterpart, the writer dependent approach. This approach was initially proposed by Cesar Santos et al. [4]. Authors claimed AER 8.02% by using graphometric features and Neural Network (NN) classifier for their approach. To improve the performance of writer independent HSV system, D. Bertolini et al. [2] used ensemble of Support Vector Machine (SVM) classifiers and obtained AER 6.28% using graphometric features. Directional Probability Density Function (DPDF) and Extended Shadow Code Ashok Kumar and Karamjit Bhatia 3

4 REDUCING FALSE ACCEPTANCE RATE IN OFFLINE WRITER INDEPENDENT SIGNATURE VERIFICATION SYSTEM THROUGH ENSEMBLE OF CLASSIFIERS (ESC) grid based techniques to extract the information about the orientation of stroke and spatial distribution from signature image are used by D. Rivard et al. [5]. Authors claimed AER 5.19 % by using SVM classifier. George S. Eskander et al. [6] proposed a hybrid WI- WD system using SVM classifier to classify the signature as genuine or forge. Spatial distribution and orientation of stroke features are used in their approach and obtained average error rate 5.38%. R. Kumar et al. [7] examined SVM and NN using surroundedness property based features of a signature. Authors achieved accuracy of 86.24% for GPDS300 database. J. Swanepoel et al. [8] developed a better writer independent HSV than the existing systems by using discrete radon transform (DRT) and dynamic time warping (DTW) to extract the features from signature image and obtained AER 4.93%. S. George et al. [9] claimed the development of a less complex, more accurate and more secure WI-WD offline HSV system. Authors reported AER 7.24 % by using SVM classifier. A writer independent HSV system using reduced number of references and feature dissimilarity measures thresholding for classification has been proposed by A. Hamadene et al. [10]. Authors obtained 18.42% AER by using one class SVM classifier and Directional Code Co-occurrence Matrix (DCCM) and Contourlet Transform (CT) features. Luiz G. Hafemann [11] used Deep Convolutional Neural Networks (CNN) to learn features in their approach and obtained 3.96% average error rate using SVM RBF classifier. [3] WRITER INDEPENDENT APPROACH In writer independent approach, reference signature samples Ref k (k = 1, 2,, n) are compared with questioned signature sample Q to classify the questioned signature sample as genuine or forge. Extracted features from reference signature samples and questioned signature sample are used to form the dissimilarity feature vectors. E. Pekalska et. al. [12] introduced the concept of dissimilarity representation and the idea was that dissimilarities were supposed to be large for the objects belonging to different classes and small for objects of same class. To form dissimilarity feature vector def i = Ref i Q, the difference between feature vector of reference sample and feature vector of questioned sample is computed and is fed to classifier to take the partial decision. Finally, fusion strategies are used to obtain final decision from partial decisions. Writer independent approach is represented in [Figure-3]. [4] PROPOSED METHOD The major steps in the proposed method to develop a writer independent offline handwritten signature verification system include: creation of signature database, feature extraction from preprocessed signature images, creation of ensemble of classifiers and classification of the questioned signature images as forge or genuine using ensemble of classifiers. [4.1] SIGNATURE DATABASE In the present work, signature database of 260 writer s genuine, simple forgery and skilled forgery signature samples is used. The ensemble of classifiers are trained using signature samples of 160 writers and remaining 100 writers signature samples are used to test the performance of ensemble. To collect the signature samples of writers, A4 white paper 4

5 International Journal of Computer Engineering and Applications, Volume XI, Issue VIII, August 17, ISSN sheet is used and signature samples are collected from undergraduate and postgraduate students in two different sessions, once in fifteen days during one month and then scanned by a scanner at 600 dpi gray level to convert the signature samples into digital form. In each session, each writer is signed 10 genuine signatures. Four different students for each genuine writer are selected for making forgeries and each forger signed 5 signatures for simple forgeries and 5 signatures for simulated forgeries for assigned writer, i.e. total 20 simple forgeries and 20 simulated forgeries are collected per genuine writer. To produce simple forgeries the forger knew only the name of the writer whereas forgers practiced many times with genuine signatures of assigned writer to produce simulated forgeries. The dissimilarity-based approach is adopted in this study and the classifiers are trained with positive (genuine) and negative (forgery) samples. Positive samples are generated by computing the dissimilarity vectors among 6 genuine samples per writer, thus 15 distinct combinations are obtained. In this way, total 2400 positive samples are generated from 160 writers. To form the negative samples, dissimilarity vectors are computed from 4 genuine samples of the 5 writers and 4 genuine samples of randomly selected 140 writers from remaining training set. This resulted into 2800 negative samples. Thus, to train ensemble of SVM Poly classifiers total 5200 (2400 positive samples plus 2800 negative samples) dissimilarity vectors are used. The number of required genuine and forgery samples of signature is dependent on the number of references are used for questioned signature in the testing process. In present approach, forgery and genuine signature samples of those writers are used for testing which are not considered for the training process. Figure: 3. Writer independent approach for offline handwritten signature verification system. [4.2] FEATURE EXTRACTION Geometric and uniform rotation invariant local binary pattern feature vectors are used in the present work for developing writer independent HSV system. To extract the features, Ashok Kumar and Karamjit Bhatia 5

6 REDUCING FALSE ACCEPTANCE RATE IN OFFLINE WRITER INDEPENDENT SIGNATURE VERIFICATION SYSTEM THROUGH ENSEMBLE OF CLASSIFIERS preprocessed signature images are used. To remove the noise from signature image, median filter is used in preprocessing phase. After this, gray level signature image is transformed into binary image by calculating threshold value using Otsu s method [13]. The signature image is then cropped and resized to the image size 256 x 512. [4.2.1] GEOMETRIC FEATURES In the present study, ten features namely- signature area, mean, standard deviation, number of connected components, perimeter of signature image, number of horizontal edges, number of vertical edges, number of edge points, number of lines (horizontal and vertical), and number of branch points are adopted to constitute geometric feature vector. To extract the geometric feature vector from preprocessed signature image of size 256 x 512, following steps are performed: 1. Extracted ten features from whole signature image as global features. 2. The signature image is divided into four equal parts and again same ten features from each part of the signature image are extracted to get local features. Thus, in all 10 global and 40 local features are extracted from signature image to form geometric feature vector of length 50. [4.2.2] UNIFORM ROTATION INVARIANT LOCAL BINARY PATTERN FEATURES In the basic Local Binary Pattern (LBP), a binary code is generated corresponding to each pixel position in the image. The binary code is generated by using center pixel and other pixels in the neighborhood. Let circular neighborhood (A, B) where A denotes the number of sampling points and B denotes the radius of the neighborhood [14]. The coordinate value of neighborhood pixels, denoted as (m r, n r ), where r = 1, 2,, A, around pixel position (m, n) are obtained by the means of equation (1) and interpolation is used to convert the coordinate value into integer coordinates [15]. The label of LBP for the central pixel (m, n) of signature image IMG is obtained using equation (2). Equation (3) is used to find the value of threshold function th(z) used in equation (2). (1) (2) A local binary pattern which contains at most two transitions from binary bit 0 to 1 or binary 1 to 0 is known as uniform LBP (extension of LBP) [16]. For example, the patterns , and are uniform patterns whereas and are not uniform patterns. All non uniform LBP are assigned to a single histogram bin and a separate histogram bin is assigned to every uniform LBP in the histogram computation of (3) 6

7 International Journal of Computer Engineering and Applications, Volume XI, Issue VIII, August 17, ISSN uniform LBP. Rotation invariant LBP operator finds the bit pattern of minimum value from all circularly rotated binary bit patterns. For example, the bit patterns , and diverse rotations of the same local pattern and all of these correspond to normalized bit pattern In nutshell, uniform rotation invariant LBP feature descriptor of length 256 is obtained by performing above procedure using 3 x 3 neighborhoods. [4.3] CREATION OF ENSEMBLE OF CLASSIFIERS Ensemble of classifiers is created using k-fold cross validation method [17]. The value of k is taken to be 25 to obtain 25 training sets by dividing the original training set into 25 partitions randomly. Support Vector Machine with Polynomial Kernel (SVM Poly) classifiers are trained using obtained training sets. In this way, 25 diverse SVM Poly classifiers are generated and all these classifiers are used to create the ensemble of 25 SVM Poly classifiers. [4.4] CLASSIFICATION THROUGH ENSEMBLE OF CLASSIFIERS In this proposed approach, Simple and skilled forgery signature samples of writers are included in the testing phase and the writers used in training process are not included in testing process. The ensemble of 25 SVM Poly classifiers is used to classify the questioned signature samples as genuine or forge. Different number of Reference Signatures (RS) (3, 5, 7, 9, 11, 13, and 15) is used against the questioned signature sample for classification. Performance metrics FRR, FAR and AER are used to evaluate the efficiency of ensemble. False acceptance rate is computed for random, simple and skilled forgeries of the genuine signatures. [5] EXPERIMENTAL RESULTS In this work, simple and simulated forgery signature samples are not included in the training of classifiers that means classifiers are trained using only genuine and random forgery signature samples. This is because the simple and skilled forgery samples may not be available at the development of the system for most of the applications. MATLAB 2013a is used to carry out the experiments using 260 writers database. Experiments are performed by using ensemble of SVM - Poly classifiers. The performance of ensemble SVM Poly classifiers is computed using geometric, uniform rotation invariant LBP and hybrid (geometric plus uniform rotation invariant LBP) feature sets. The classification performance of individual classifier of ensemble during training phase using geometric, uniform rotation invariant LBP and hybrid (geometric plus uniform rotation invariant LBP) features is represented in [Figure-4], [Figure-5], and [Figure-6], respectively. The performance of the ensemble of classifiers in testing phase is presented in [Table-1], [Table-2] and [Table-3] for geometric, uniform rotation invariant LBP and hybrid (geometric plus uniform rotation invariant LBP) features, respectively, in terms of FRR, FAR and AER using max fusion rule. The experiment using hybrid feature set along with ensemble of SVM Poly classifiers reported 5.00 FRR and 0.00, 0.00, and 1.00 FAR for random, simple and skilled forgeries of genuine signature, respectively. This employs that FAR 0.33% is obtained while keeping false rejection rate 5.00% through proposed approach. Ashok Kumar and Karamjit Bhatia 7

8 REDUCING FALSE ACCEPTANCE RATE IN OFFLINE WRITER INDEPENDENT SIGNATURE VERIFICATION SYSTEM THROUGH ENSEMBLE OF CLASSIFIERS Figure: 4. Performance of individual classifier of ensemble using geometric features Figure: 5. Performance of individual classifier of ensemble using uniform rotation invariant LBP features Figure: 6. Performance of individual classifier of ensemble using hybrid features 8

9 International Journal of Computer Engineering and Applications, Volume XI, Issue VIII, August 17, ISSN Table 1: Performance of ensemble of classifiers using geometric features RS FRR FAR Random Simple Skilled AER Table 2: Performance of ensemble of classifiers using uniform rotation invariant LBP features RS FRR FAR Random Simple Skilled AER Table 3: Performance of ensemble of classifiers using hybrid features RS FRR FAR Random Simple Skilled AER The comparison of the performance between the proposed writer independent HSV system and the existing writer independent HSV systems is presented in [Table-4]. [6] CONCLUSION In this work, the performance evaluation of ensemble of SVM Poly classifiers based on geometric and uniform rotation invariant local binary pattern feature sets is carried out using 260 writers signatures database. In the proposed approach, the writers used in training are not used in testing the performance of offline HSV system. That means offline HSV system is able to classify the signature sample of unknown writers as genuine or forge without retraining the ensemble of classifiers. It is observed from the experiments, the performance of hybrid (geometric plus uniform rotation invariant LBP) features is better than geometric and Ashok Kumar and Karamjit Bhatia 9

10 REDUCING FALSE ACCEPTANCE RATE IN OFFLINE WRITER INDEPENDENT SIGNATURE VERIFICATION SYSTEM THROUGH ENSEMBLE OF CLASSIFIERS uniform rotation invariant local binary pattern features. Comparative study of the proposed method with existing methods for writer independent HSV system reveals that the proposed method outperforms the existing methods. In nutshell, it is concluded that a robust writer independent offline handwritten signature verification system with reduced false acceptance rate can be developed using ensemble of SVM - Poly classifiers along with geometric and uniform rotation invariant local binary pattern feature sets. Table 4: Comparative results of proposed and existing writer independent HSV systems S.N Authors Classifier FRR FAR Random Simple Skilled AER 1 C. Santos et al. [4] (2004) N N D. Bertolini et al. [2] (2010) SVM D. Rivard et al. [5] (2011) SVM R. Kumar et al.[7] (2012) NN & SVM-RBF G. Eskander et al. [6] (2012) SVM J. Swanepoel et al. [8] (2012) LDF &QDF G. Eskander et al. [9] (2013) SVM Hamadene A. et al.[10] (2016) OC-SVM Luiz Hafemann [11] (2016) SVM-RBF Proposed Approach (2017) REFERENCES Ensemble of SVM-Poly [1] Luiz S. Oliveira, Edson Justino, and Robert Sabourin, Offline signature verification using writer independent approach, IEEE International Joint Conference on Neural Networks, Orlando, Florida, USA, pp , [2] Bertolini D., Oliveir L.S., Justino E. and Sabourin R., Reducing forgeries in writer independent offline signature verification through ensemble of classifiers, Elsevier Journal of Pattern Recognition, Volume 43, Issue 1, pp , [3] E. Justino, F. Bortolozzi, and R. Sabourin, Off-line signature verification using hmm for random, simple and skilled forgeries, 6th International Conference on Document Analysis and Recognition, Seattle, WA, USA, pp , [4] Cesar Santos, Edson J. R. Justino, Flávio Bortolozzi, and Robert Sabourin, An offline signature verification method based on the questioned document expert s approach and a neural network classifier, IEEE 9th Int l Workshop on Frontiers in Handwriting Recognition, Washington, DC, USA, pp , [5] Dominique Rivard, Eric Granger and Robert Sabourin, Multi-feature extraction and selection in writer indepen-dent offline signature verification, International Journal on Document Analysis and Recognition, Volume 16, Issue 1, pp. 1 21,

11 International Journal of Computer Engineering and Applications, Volume XI, Issue VIII, August 17, ISSN [6] George S. Eskander, Robert Sabourin and Eric Granger, Adaptation of writer independent systems for offline signature verification, International Conference on Frontiers in Handwriting Recognition, Bari, Italy, pp , [7] Kumar R., Sharma J., and Chanda B., Writer independent offline signature verification using surroundedness feature, Pattern Recognition Letters, Volume 33, Issue 3, pp , [8] Jacques Swanepoel and Johannes Coetzer, Writer specific dissimilarity normalisation for improved writer inde- pendent signature verification, IEEE International Conference on Frontiers in Handwriting Recognition, Bari, Italy, pp , [9] George S. Eskander, Robert Sabourin, and Eric Granger, Hybrid writer independent writer dependent offline signature verification system, IET Biometrics, Volume 2, Issue. 4, pp , [10] Assia Hamadene and Youcef Chiban, One class writer independent offline signature verification using feature dissimilarity thresholding, IEEE Transactions on Information Forensics and Security, Volume 11, No. 6, pp , [11] Luiz G. Hafemann, Robert Sabourin, and Luiz S. Oliveira, Writer independent feature learning for offline signature verification using deep convolutional neural networks, International Joint Conference on Neural Networks, Vancouver, Canada, pp , [12] E. Pekalska, and R.P.W. Duin, Dissimilarity Representations Allow for Building Good Classifiers, Pattern Recognition, Volume 23, Issue 8, pp , [13] Hetal J. Vala and Prof. Astha Baxi, A Review on Otsu Image Segmentation Algorithm, International Journal of Advanced Research in Computer Engineering & Technology, Volume 2, Issue 2, pp , 2013 [14] Namratha M, Dr. S. Natarajan, Illustration of Usage of Local Binary Patterns for Feature Extraction in Face Recognition, International Journal of Emerging Technology and Advanced Engineering Volume 3, Issue 6, pp , [15] Timo Ahonen, Jiri Matas, Chu He, and Matti Pietikiainen1, Rotation Invariant Image Description with Local Binary Pattern Histogram Fourier Features, 16th Scandinavian Conference, SCIA Oslo, Norway, pp , [16] H.R. Eghtesad Doost, and M. C. Amirani, Texture Classification with Local Binary Pattern Based on Continues Wavelet Transformation, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, Issue 10, pp , [17] P. Zhang, Model Selection via Multifold Cross Validation, Annals of Statistics, Volume 21, No. 1, pp , Author[s] brief Introduction Ashok Kumar has 15 years of teaching experience and has interest in the field of digital image processing. He is an Associate Professor in the Department of Computer Applications, Invertis University Bareilly, India. He is pursuing Ph.D. in Computer Science from Gurukula Kangri Vishwavidyalaya, Haridwar, India. Karamjit Bhatia received the M.Phil. (Computer Applications) in 1998 from University of Roorkee, Roorkee (now IIT Roorkee), India and Ph.D. (Computer Science) in 2001 from Gurukula Kangri Vishwavidyalaya, Haridwar, India. Currently, he is working asa Ashok Kumar and Karamjit Bhatia 11

12 REDUCING FALSE ACCEPTANCE RATE IN OFFLINE WRITER INDEPENDENT SIGNATURE VERIFICATION SYSTEM THROUGH ENSEMBLE OF CLASSIFIERS Professor at Department of Computer Science, Gurukula Kangri Vishwavidyalaya, Haridwar, India. His research interests include Distributed Systems, Image Processing, and Mobile Adhoc Networks. He has published around 40 research papers in International Journals of repute and National/ International Conference proceedings. Fiveresearch scholars have been awarded Ph.D. degrees under his supervision. Corresponding Address: Ashok Kumar Invertis University, NH-24, Bareilly, Uttar Pradesh, India, Pin Code: Mobile Number:

Multiple Classifier System for Writer Independent Offline Handwritten Signature Verification using Elliptical Curve Paths for Feature Extraction

Multiple Classifier System for Writer Independent Offline Handwritten Signature Verification using Elliptical Curve Paths for Feature Extraction Multiple Classifier System for Writer Independent Offline Handwritten Signature Verification using Elliptical Curve Paths for Feature Extraction 1 Ashok Kumar and 2 Karamjit Bhatia 1 Research Scholar,

More information

Orientation Map Based Palmprint Recognition

Orientation Map Based Palmprint Recognition Orientation Map Based Palmprint Recognition (BM) 45 Orientation Map Based Palmprint Recognition B. H. Shekar, N. Harivinod bhshekar@gmail.com, harivinodn@gmail.com India, Mangalore University, Department

More information

SYMBOL RECOGNITION IN HANDWRITTEN MATHEMATI- CAL FORMULAS

SYMBOL RECOGNITION IN HANDWRITTEN MATHEMATI- CAL FORMULAS SYMBOL RECOGNITION IN HANDWRITTEN MATHEMATI- CAL FORMULAS Hans-Jürgen Winkler ABSTRACT In this paper an efficient on-line recognition system for handwritten mathematical formulas is proposed. After formula

More information

Role of Assembling Invariant Moments and SVM in Fingerprint Recognition

Role of Assembling Invariant Moments and SVM in Fingerprint Recognition 56 Role of Assembling Invariant Moments SVM in Fingerprint Recognition 1 Supriya Wable, 2 Chaitali Laulkar 1, 2 Department of Computer Engineering, University of Pune Sinhgad College of Engineering, Pune-411

More information

Biometric Hash based on Statistical Features of Online Signatures

Biometric Hash based on Statistical Features of Online Signatures Biometric Hash based on Statistical Features of Online Signatures Claus Vielhauer 1,2, Ralf Steinmetz 1, Astrid Mayerhöfer 3 1 Technical University Darmstadt Institute for Industrial Process- and System

More information

Characterizing and evaluating adversarial examples for Offline Handwritten Signature Verification

Characterizing and evaluating adversarial examples for Offline Handwritten Signature Verification 1 Characterizing and evaluating adversarial examples for Offline Handwritten Signature Verification Luiz G. Hafemann, Robert Sabourin, Member, IEEE, and Luiz S. Oliveira. arxiv:1901.03398v1 [cs.cv] 10

More information

Intelligent Handwritten Digit Recognition using Artificial Neural Network

Intelligent Handwritten Digit Recognition using Artificial Neural Network RESEARCH ARTICLE OPEN ACCESS Intelligent Handwritten Digit Recognition using Artificial Neural Networ Saeed AL-Mansoori Applications Development and Analysis Center (ADAC), Mohammed Bin Rashid Space Center

More information

Handwritten English Character Recognition using Pixel Density Gradient Method

Handwritten English Character Recognition using Pixel Density Gradient Method International Journal of Computer Science and Engineering Open Access Research Paper Volume-2, Issue-3 E-ISSN: 2347-2693 Handwritten English Character Recognition using Pixel Density Gradient Method Rakesh

More information

Biometrics: Introduction and Examples. Raymond Veldhuis

Biometrics: Introduction and Examples. Raymond Veldhuis Biometrics: Introduction and Examples Raymond Veldhuis 1 Overview Biometric recognition Face recognition Challenges Transparent face recognition Large-scale identification Watch list Anonymous biometrics

More information

Logarithmic quantisation of wavelet coefficients for improved texture classification performance

Logarithmic quantisation of wavelet coefficients for improved texture classification performance Logarithmic quantisation of wavelet coefficients for improved texture classification performance Author Busch, Andrew, W. Boles, Wageeh, Sridharan, Sridha Published 2004 Conference Title 2004 IEEE International

More information

A Novel Rejection Measurement in Handwritten Numeral Recognition Based on Linear Discriminant Analysis

A Novel Rejection Measurement in Handwritten Numeral Recognition Based on Linear Discriminant Analysis 009 0th International Conference on Document Analysis and Recognition A Novel Rejection easurement in Handwritten Numeral Recognition Based on Linear Discriminant Analysis Chun Lei He Louisa Lam Ching

More information

FARSI CHARACTER RECOGNITION USING NEW HYBRID FEATURE EXTRACTION METHODS

FARSI CHARACTER RECOGNITION USING NEW HYBRID FEATURE EXTRACTION METHODS FARSI CHARACTER RECOGNITION USING NEW HYBRID FEATURE EXTRACTION METHODS Fataneh Alavipour 1 and Ali Broumandnia 2 1 Department of Electrical, Computer and Biomedical Engineering, Qazvin branch, Islamic

More information

CHAPTER 1 STABILITY ANALYSIS OF ONLINE SIGNATURES IN THE GENERATION DOMAIN.

CHAPTER 1 STABILITY ANALYSIS OF ONLINE SIGNATURES IN THE GENERATION DOMAIN. CHAPTER 1 STABILITY ANALYSIS OF ONLINE SIGNATURES IN THE GENERATION DOMAIN G. Pirlo 1, D. Impedovo 2, R. Plamondon 3, C. O'Reilly 3 (1) Dipartimento di Informatica, Università degli Studi di Bari, Italy

More information

Palmprint based Verification System Robust to Occlusion using Low-order Zernike Moments of Sub-images

Palmprint based Verification System Robust to Occlusion using Low-order Zernike Moments of Sub-images BADRINATH, NARESH, GUPTA: PALMPRINT BASED VERIFICATION SYSTEM 1 Palmprint based Verification System Robust to Occlusion using Low-order Zernike Moments of Sub-images Badrinath G. S. badri@cse.iitk.ac.in

More information

Group Discriminatory Power of Handwritten Characters

Group Discriminatory Power of Handwritten Characters Group Discriminatory Power of Handwritten Characters Catalin I. Tomai, Devika M. Kshirsagar, Sargur N. Srihari CEDAR, Computer Science and Engineering Department State University of New York at Buffalo,

More information

Selection of Classifiers based on Multiple Classifier Behaviour

Selection of Classifiers based on Multiple Classifier Behaviour Selection of Classifiers based on Multiple Classifier Behaviour Giorgio Giacinto, Fabio Roli, and Giorgio Fumera Dept. of Electrical and Electronic Eng. - University of Cagliari Piazza d Armi, 09123 Cagliari,

More information

Spectral and Spatial Methods for the Classification of Urban Remote Sensing Data

Spectral and Spatial Methods for the Classification of Urban Remote Sensing Data Spectral and Spatial Methods for the Classification of Urban Remote Sensing Data Mathieu Fauvel gipsa-lab/dis, Grenoble Institute of Technology - INPG - FRANCE Department of Electrical and Computer Engineering,

More information

A Contrario Detection of False Matches in Iris Recognition

A Contrario Detection of False Matches in Iris Recognition A Contrario Detection of False Matches in Iris Recognition Marcelo Mottalli, Mariano Tepper, and Marta Mejail Departamento de Computación, Universidad de Buenos Aires, Argentina Abstract. The pattern of

More information

Deep Convolutional Neural Networks for Pairwise Causality

Deep Convolutional Neural Networks for Pairwise Causality Deep Convolutional Neural Networks for Pairwise Causality Karamjit Singh, Garima Gupta, Lovekesh Vig, Gautam Shroff, and Puneet Agarwal TCS Research, Delhi Tata Consultancy Services Ltd. {karamjit.singh,

More information

A Robust Modular Wavelet Network Based Symbol Classifier

A Robust Modular Wavelet Network Based Symbol Classifier A Robust Modular Wavelet Network Based Symbol Classifier A.K. Mishra, P.W. Fieguth, D.A. Clausi University of Waterloo, Vision and Image Processing Group akmishra, pfieguth, dclausi@uwaterloo.ca Abstract.

More information

Introduction to Machine Learning

Introduction to Machine Learning Introduction to Machine Learning CS4731 Dr. Mihail Fall 2017 Slide content based on books by Bishop and Barber. https://www.microsoft.com/en-us/research/people/cmbishop/ http://web4.cs.ucl.ac.uk/staff/d.barber/pmwiki/pmwiki.php?n=brml.homepage

More information

Machine Learning using Bayesian Approaches

Machine Learning using Bayesian Approaches Machine Learning using Bayesian Approaches Sargur N. Srihari University at Buffalo, State University of New York 1 Outline 1. Progress in ML and PR 2. Fully Bayesian Approach 1. Probability theory Bayes

More information

AN INVESTIGATION ON EFFICIENT FEATURE EXTRACTION APPROACHES FOR ARABIC LETTER RECOGNITION

AN INVESTIGATION ON EFFICIENT FEATURE EXTRACTION APPROACHES FOR ARABIC LETTER RECOGNITION AN INVESTIGATION ON EFFICIENT FEATURE EXTRACTION APPROACHES FOR ARABIC LETTER RECOGNITION H. Aboaisha 1, Zhijie Xu 1, I. El-Feghi 2 z.xu@hud.ac.uk Idrisel@ee.edu.ly 1 School of Computing and Engineering,

More information

Science Insights: An International Journal

Science Insights: An International Journal Available online at http://www.urpjournals.com Science Insights: An International Journal Universal Research Publications. All rights reserved ISSN 2277 3835 Original Article Object Recognition using Zernike

More information

Wavelet Packet Based Digital Image Watermarking

Wavelet Packet Based Digital Image Watermarking Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in

More information

Application of hopfield network in improvement of fingerprint recognition process Mahmoud Alborzi 1, Abbas Toloie- Eshlaghy 1 and Dena Bazazian 2

Application of hopfield network in improvement of fingerprint recognition process Mahmoud Alborzi 1, Abbas Toloie- Eshlaghy 1 and Dena Bazazian 2 5797 Available online at www.elixirjournal.org Computer Science and Engineering Elixir Comp. Sci. & Engg. 41 (211) 5797-582 Application hopfield network in improvement recognition process Mahmoud Alborzi

More information

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY [Gaurav, 2(1): Jan., 2013] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Face Identification & Detection Using Eigenfaces Sachin.S.Gurav *1, K.R.Desai 2 *1

More information

Supervised locally linear embedding

Supervised locally linear embedding Supervised locally linear embedding Dick de Ridder 1, Olga Kouropteva 2, Oleg Okun 2, Matti Pietikäinen 2 and Robert P.W. Duin 1 1 Pattern Recognition Group, Department of Imaging Science and Technology,

More information

Aruna Bhat Research Scholar, Department of Electrical Engineering, IIT Delhi, India

Aruna Bhat Research Scholar, Department of Electrical Engineering, IIT Delhi, India International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Robust Face Recognition System using Non Additive

More information

Object Recognition Using Local Characterisation and Zernike Moments

Object Recognition Using Local Characterisation and Zernike Moments Object Recognition Using Local Characterisation and Zernike Moments A. Choksuriwong, H. Laurent, C. Rosenberger, and C. Maaoui Laboratoire Vision et Robotique - UPRES EA 2078, ENSI de Bourges - Université

More information

Supervised Learning. George Konidaris

Supervised Learning. George Konidaris Supervised Learning George Konidaris gdk@cs.brown.edu Fall 2017 Machine Learning Subfield of AI concerned with learning from data. Broadly, using: Experience To Improve Performance On Some Task (Tom Mitchell,

More information

Score calibration for optimal biometric identification

Score calibration for optimal biometric identification Score calibration for optimal biometric identification (see also NIST IBPC 2010 online proceedings: http://biometrics.nist.gov/ibpc2010) AI/GI/CRV 2010, Ottawa Dmitry O. Gorodnichy Head of Video Surveillance

More information

Enhanced Fourier Shape Descriptor Using Zero-Padding

Enhanced Fourier Shape Descriptor Using Zero-Padding Enhanced ourier Shape Descriptor Using Zero-Padding Iivari Kunttu, Leena Lepistö, and Ari Visa Tampere University of Technology, Institute of Signal Processing, P.O. Box 553, I-330 Tampere inland {Iivari.Kunttu,

More information

Final Examination CS540-2: Introduction to Artificial Intelligence

Final Examination CS540-2: Introduction to Artificial Intelligence Final Examination CS540-2: Introduction to Artificial Intelligence May 9, 2018 LAST NAME: SOLUTIONS FIRST NAME: Directions 1. This exam contains 33 questions worth a total of 100 points 2. Fill in your

More information

Blur Insensitive Texture Classification Using Local Phase Quantization

Blur Insensitive Texture Classification Using Local Phase Quantization Blur Insensitive Texture Classification Using Local Phase Quantization Ville Ojansivu and Janne Heikkilä Machine Vision Group, Department of Electrical and Information Engineering, University of Oulu,

More information

ARTIFICIAL NEURAL NETWORKS گروه مطالعاتي 17 بهار 92

ARTIFICIAL NEURAL NETWORKS گروه مطالعاتي 17 بهار 92 ARTIFICIAL NEURAL NETWORKS گروه مطالعاتي 17 بهار 92 BIOLOGICAL INSPIRATIONS Some numbers The human brain contains about 10 billion nerve cells (neurons) Each neuron is connected to the others through 10000

More information

Multiple Wavelet Coefficients Fusion in Deep Residual Networks for Fault Diagnosis

Multiple Wavelet Coefficients Fusion in Deep Residual Networks for Fault Diagnosis Multiple Wavelet Coefficients Fusion in Deep Residual Networks for Fault Diagnosis Minghang Zhao, Myeongsu Kang, Baoping Tang, Michael Pecht 1 Backgrounds Accurate fault diagnosis is important to ensure

More information

Subcellular Localisation of Proteins in Living Cells Using a Genetic Algorithm and an Incremental Neural Network

Subcellular Localisation of Proteins in Living Cells Using a Genetic Algorithm and an Incremental Neural Network Subcellular Localisation of Proteins in Living Cells Using a Genetic Algorithm and an Incremental Neural Network Marko Tscherepanow and Franz Kummert Applied Computer Science, Faculty of Technology, Bielefeld

More information

Constrained Optimization and Support Vector Machines

Constrained Optimization and Support Vector Machines Constrained Optimization and Support Vector Machines Man-Wai MAK Dept. of Electronic and Information Engineering, The Hong Kong Polytechnic University enmwmak@polyu.edu.hk http://www.eie.polyu.edu.hk/

More information

Reducing Multiclass to Binary: A Unifying Approach for Margin Classifiers

Reducing Multiclass to Binary: A Unifying Approach for Margin Classifiers Reducing Multiclass to Binary: A Unifying Approach for Margin Classifiers Erin Allwein, Robert Schapire and Yoram Singer Journal of Machine Learning Research, 1:113-141, 000 CSE 54: Seminar on Learning

More information

EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER

EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER 17th European Signal Processing Conference (EUSIPCO 29) Glasgow, Scotland, August 24-28, 29 EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMA AREA UNER THE CURVE FOR THE HAMMING ISTANCE CASSIFIER Chun Chen,

More information

Image Recognition Using Modified Zernike Moments

Image Recognition Using Modified Zernike Moments Sensors & Transducers 204 by IFSA Publishing S. L. http://www.sensorsportal.com Image Recognition Using Modified ernike Moments Min HUANG Yaqiong MA and Qiuping GONG School of Computer and Communication

More information

Riemannian Metric Learning for Symmetric Positive Definite Matrices

Riemannian Metric Learning for Symmetric Positive Definite Matrices CMSC 88J: Linear Subspaces and Manifolds for Computer Vision and Machine Learning Riemannian Metric Learning for Symmetric Positive Definite Matrices Raviteja Vemulapalli Guide: Professor David W. Jacobs

More information

UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2013

UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2013 UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2013 Exam policy: This exam allows two one-page, two-sided cheat sheets; No other materials. Time: 2 hours. Be sure to write your name and

More information

Analytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System

Analytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System Volume Issue 8, November 4, ISSN No.: 348 89 3 Analytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System Divya Singhal, Ajay Kumar Yadav M.Tech, EC Department,

More information

Classification of handwritten digits using supervised locally linear embedding algorithm and support vector machine

Classification of handwritten digits using supervised locally linear embedding algorithm and support vector machine Classification of handwritten digits using supervised locally linear embedding algorithm and support vector machine Olga Kouropteva, Oleg Okun, Matti Pietikäinen Machine Vision Group, Infotech Oulu and

More information

Introduction to Support Vector Machines

Introduction to Support Vector Machines Introduction to Support Vector Machines Hsuan-Tien Lin Learning Systems Group, California Institute of Technology Talk in NTU EE/CS Speech Lab, November 16, 2005 H.-T. Lin (Learning Systems Group) Introduction

More information

ABC-LogitBoost for Multi-Class Classification

ABC-LogitBoost for Multi-Class Classification Ping Li, Cornell University ABC-Boost BTRY 6520 Fall 2012 1 ABC-LogitBoost for Multi-Class Classification Ping Li Department of Statistical Science Cornell University 2 4 6 8 10 12 14 16 2 4 6 8 10 12

More information

Dynamic Data Modeling, Recognition, and Synthesis. Rui Zhao Thesis Defense Advisor: Professor Qiang Ji

Dynamic Data Modeling, Recognition, and Synthesis. Rui Zhao Thesis Defense Advisor: Professor Qiang Ji Dynamic Data Modeling, Recognition, and Synthesis Rui Zhao Thesis Defense Advisor: Professor Qiang Ji Contents Introduction Related Work Dynamic Data Modeling & Analysis Temporal localization Insufficient

More information

Real-time image-based parking occupancy detection using deep learning. Debaditya Acharya, Weilin Yan & Kourosh Khoshelham The University of Melbourne

Real-time image-based parking occupancy detection using deep learning. Debaditya Acharya, Weilin Yan & Kourosh Khoshelham The University of Melbourne Real-time image-based parking occupancy detection using deep learning Debaditya Acharya, Weilin Yan & Kourosh Khoshelham The University of Melbourne Slide 1/20 Prologue People spend on Does average that

More information

Classification of Hand-Written Digits Using Scattering Convolutional Network

Classification of Hand-Written Digits Using Scattering Convolutional Network Mid-year Progress Report Classification of Hand-Written Digits Using Scattering Convolutional Network Dongmian Zou Advisor: Professor Radu Balan Co-Advisor: Dr. Maneesh Singh (SRI) Background Overview

More information

Roadmap. Introduction to image analysis (computer vision) Theory of edge detection. Applications

Roadmap. Introduction to image analysis (computer vision) Theory of edge detection. Applications Edge Detection Roadmap Introduction to image analysis (computer vision) Its connection with psychology and neuroscience Why is image analysis difficult? Theory of edge detection Gradient operator Advanced

More information

Persian Handwritten Word Recognition Using Zernike and Fourier Mellin Moments

Persian Handwritten Word Recognition Using Zernike and Fourier Mellin Moments SETIT 009 5 th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March -6, 009 TUNISIA Persian Handwritten Word Recognition Using Zernike and Fourier

More information

UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2014

UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2014 UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2014 Exam policy: This exam allows two one-page, two-sided cheat sheets (i.e. 4 sides); No other materials. Time: 2 hours. Be sure to write

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18,   ISSN International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18, www.ijcea.com ISSN 2321-3469 CONTENT-BASED IMAGE RETRIEVAL USING ZERNIKE MOMENTS AND SURF Priyanka

More information

Machine Learning on temporal data

Machine Learning on temporal data Machine Learning on temporal data Classification rees for ime Series Ahlame Douzal (Ahlame.Douzal@imag.fr) AMA, LIG, Université Joseph Fourier Master 2R - MOSIG (2011) Plan ime Series classification approaches

More information

CITS 4402 Computer Vision

CITS 4402 Computer Vision CITS 4402 Computer Vision A/Prof Ajmal Mian Adj/A/Prof Mehdi Ravanbakhsh Lecture 06 Object Recognition Objectives To understand the concept of image based object recognition To learn how to match images

More information

ECE 661: Homework 10 Fall 2014

ECE 661: Homework 10 Fall 2014 ECE 661: Homework 10 Fall 2014 This homework consists of the following two parts: (1) Face recognition with PCA and LDA for dimensionality reduction and the nearest-neighborhood rule for classification;

More information

Background. Adaptive Filters and Machine Learning. Bootstrap. Combining models. Boosting and Bagging. Poltayev Rassulzhan

Background. Adaptive Filters and Machine Learning. Bootstrap. Combining models. Boosting and Bagging. Poltayev Rassulzhan Adaptive Filters and Machine Learning Boosting and Bagging Background Poltayev Rassulzhan rasulzhan@gmail.com Resampling Bootstrap We are using training set and different subsets in order to validate results

More information

Robotics 2 AdaBoost for People and Place Detection

Robotics 2 AdaBoost for People and Place Detection Robotics 2 AdaBoost for People and Place Detection Giorgio Grisetti, Cyrill Stachniss, Kai Arras, Wolfram Burgard v.1.0, Kai Arras, Oct 09, including material by Luciano Spinello and Oscar Martinez Mozos

More information

Holdout and Cross-Validation Methods Overfitting Avoidance

Holdout and Cross-Validation Methods Overfitting Avoidance Holdout and Cross-Validation Methods Overfitting Avoidance Decision Trees Reduce error pruning Cost-complexity pruning Neural Networks Early stopping Adjusting Regularizers via Cross-Validation Nearest

More information

Automatic detection and of dipoles in large area SQUID magnetometry

Automatic detection and of dipoles in large area SQUID magnetometry Automatic detection and of dipoles in large area SQUID magnetometry Lisa Qian December 4, Introduction. Scanning SQUID magnetometry Scanning SQUID magnetometry is a powerful tool for metrology of individual

More information

Hand Written Digit Recognition using Kalman Filter

Hand Written Digit Recognition using Kalman Filter International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 5, Number 4 (2012), pp. 425-434 International Research Publication House http://www.irphouse.com Hand Written Digit

More information

Invariant Scattering Convolution Networks

Invariant Scattering Convolution Networks Invariant Scattering Convolution Networks Joan Bruna and Stephane Mallat Submitted to PAMI, Feb. 2012 Presented by Bo Chen Other important related papers: [1] S. Mallat, A Theory for Multiresolution Signal

More information

Robotics 2. AdaBoost for People and Place Detection. Kai Arras, Cyrill Stachniss, Maren Bennewitz, Wolfram Burgard

Robotics 2. AdaBoost for People and Place Detection. Kai Arras, Cyrill Stachniss, Maren Bennewitz, Wolfram Burgard Robotics 2 AdaBoost for People and Place Detection Kai Arras, Cyrill Stachniss, Maren Bennewitz, Wolfram Burgard v.1.1, Kai Arras, Jan 12, including material by Luciano Spinello and Oscar Martinez Mozos

More information

Issues and Techniques in Pattern Classification

Issues and Techniques in Pattern Classification Issues and Techniques in Pattern Classification Carlotta Domeniconi www.ise.gmu.edu/~carlotta Machine Learning Given a collection of data, a machine learner eplains the underlying process that generated

More information

OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS, CIRCULARITY PROPERTY AND NEURAL NETWORK

OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS, CIRCULARITY PROPERTY AND NEURAL NETWORK OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS, CIRCULARITY PROPERTY AND NEURAL NETWORK Ashok Kumar. D 1, Dhandapani. S 2 1 Department of Computer Science and Applications

More information

Time Series Classification

Time Series Classification Distance Measures Classifiers DTW vs. ED Further Work Questions August 31, 2017 Distance Measures Classifiers DTW vs. ED Further Work Questions Outline 1 2 Distance Measures 3 Classifiers 4 DTW vs. ED

More information

Digital Image Watermarking Algorithm Based on Wavelet Packet

Digital Image Watermarking Algorithm Based on Wavelet Packet www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department

More information

DYNAMIC TEXTURE RECOGNITION USING ENHANCED LBP FEATURES

DYNAMIC TEXTURE RECOGNITION USING ENHANCED LBP FEATURES DYNAMIC TEXTURE RECOGNITION USING ENHANCED FEATURES Jianfeng Ren BeingThere Centre Institute of Media Innovation Nanyang Technological University 50 Nanyang Drive, Singapore 637553. Xudong Jiang, Junsong

More information

arxiv: v1 [cs.lg] 3 Jan 2017

arxiv: v1 [cs.lg] 3 Jan 2017 Deep Convolutional Neural Networks for Pairwise Causality Karamjit Singh, Garima Gupta, Lovekesh Vig, Gautam Shroff, and Puneet Agarwal TCS Research, New-Delhi, India January 4, 2017 arxiv:1701.00597v1

More information

An Algorithm for Pre-Processing of Satellite Images of Cyclone Clouds

An Algorithm for Pre-Processing of Satellite Images of Cyclone Clouds An Algorithm for Pre-Processing of Satellite Images of Cyclone Clouds Ishita Dutta West Bengal University of Technology BF-142 Sector I Salt Lake Kolkata 700064, India Mallika De University of Kalyani

More information

Face Recognition Using Eigenfaces

Face Recognition Using Eigenfaces Face Recognition Using Eigenfaces Prof. V.P. Kshirsagar, M.R.Baviskar, M.E.Gaikwad, Dept. of CSE, Govt. Engineering College, Aurangabad (MS), India. vkshirsagar@gmail.com, madhumita_baviskar@yahoo.co.in,

More information

SVM based on personal identification system using Electrocardiograms

SVM based on personal identification system using Electrocardiograms SVM based on personal identification system using Electrocardiograms Emna Rabhi #1, Zied Lachiri * # University of Tunis El Manar National School of Engineers of Tunis, LR11ES17 Signal, Image and Information

More information

Very Deep Residual Networks with Maxout for Plant Identification in the Wild Milan Šulc, Dmytro Mishkin, Jiří Matas

Very Deep Residual Networks with Maxout for Plant Identification in the Wild Milan Šulc, Dmytro Mishkin, Jiří Matas Very Deep Residual Networks with Maxout for Plant Identification in the Wild Milan Šulc, Dmytro Mishkin, Jiří Matas Center for Machine Perception Department of Cybernetics Faculty of Electrical Engineering

More information

arxiv: v1 [cs.lg] 13 Aug 2014

arxiv: v1 [cs.lg] 13 Aug 2014 A Classifier-free Ensemble Selection Method based on Data Diversity in Random Subspaces Technical Report arxiv:1408.889v1 [cs.lg] 13 Aug 014 Albert H.R. Ko École de technologie supérieure (ÉTS), Université

More information

Rapid Object Recognition from Discriminative Regions of Interest

Rapid Object Recognition from Discriminative Regions of Interest Rapid Object Recognition from Discriminative Regions of Interest Gerald Fritz, Christin Seifert, Lucas Paletta JOANNEUM RESEARCH Institute of Digital Image Processing Wastiangasse 6, A-81 Graz, Austria

More information

Problem Session #5. EE368/CS232 Digital Image Processing

Problem Session #5. EE368/CS232 Digital Image Processing Problem Session #5 EE368/CS232 Digital Image Processing 1. Solving a Jigsaw Puzzle Please download the image hw5_puzzle_pieces.jpg from the handouts webpage, which shows the pieces of a jigsaw puzzle.

More information

A New Efficient Method for Producing Global Affine Invariants

A New Efficient Method for Producing Global Affine Invariants A New Efficient Method for Producing Global Affine Invariants Esa Rahtu, Mikko Salo 2, and Janne Heikkilä Machine Vision Group, Department of Electrical and Information Engineering, P.O. Box 45, 94 University

More information

Iterative Laplacian Score for Feature Selection

Iterative Laplacian Score for Feature Selection Iterative Laplacian Score for Feature Selection Linling Zhu, Linsong Miao, and Daoqiang Zhang College of Computer Science and echnology, Nanjing University of Aeronautics and Astronautics, Nanjing 2006,

More information

SUPERVISED LEARNING: INTRODUCTION TO CLASSIFICATION

SUPERVISED LEARNING: INTRODUCTION TO CLASSIFICATION SUPERVISED LEARNING: INTRODUCTION TO CLASSIFICATION 1 Outline Basic terminology Features Training and validation Model selection Error and loss measures Statistical comparison Evaluation measures 2 Terminology

More information

Accurate Orthogonal Circular Moment Invariants of Gray-Level Images

Accurate Orthogonal Circular Moment Invariants of Gray-Level Images Journal of Computer Science 7 (5): 75-722, 20 ISSN 549-3636 20 Science Publications Accurate Orthogonal Circular Moment Invariants of Gray-Level Images Khalid Mohamed Hosny Department of Computer Science,

More information

Palmprint Verification with Moments

Palmprint Verification with Moments Palmprint Verification with Moments Ying-Han Pang Andrew T.B.J David N.C.L Hiew Fu San Faculty of Information Science and Technology Multimedia University Jalan Ayer Keroh Lama 75450, Melaka, Malaysia.

More information

WRITER IDENTIFICATION BASED ON OFFLINE HANDWRITTEN DOCUMENT IN KANNADA LANGUAGE

WRITER IDENTIFICATION BASED ON OFFLINE HANDWRITTEN DOCUMENT IN KANNADA LANGUAGE CHAPTER 5 WRITER IDENTIFICATION BASED ON OFFLINE HANDWRITTEN DOCUMENT IN KANNADA LANGUAGE 5.1 Introduction In earlier days it was a notion of the people who were using computers for their work have to

More information

Multi-scale Geometric Summaries for Similarity-based Upstream S

Multi-scale Geometric Summaries for Similarity-based Upstream S Multi-scale Geometric Summaries for Similarity-based Upstream Sensor Fusion Duke University, ECE / Math 3/6/2019 Overall Goals / Design Choices Leverage multiple, heterogeneous modalities in identification

More information

Mathematical symbol hypothesis recognition with rejection option

Mathematical symbol hypothesis recognition with rejection option Mathematical symbol hypothesis recognition with rejection option Frank Julca-Aguilar, Nina Hirata, Christian Viard-Gaudin, Harold Mouchère, Sofiane Medjkoune To cite this version: Frank Julca-Aguilar,

More information

Boosting: Algorithms and Applications

Boosting: Algorithms and Applications Boosting: Algorithms and Applications Lecture 11, ENGN 4522/6520, Statistical Pattern Recognition and Its Applications in Computer Vision ANU 2 nd Semester, 2008 Chunhua Shen, NICTA/RSISE Boosting Definition

More information

Robust Speaker Identification

Robust Speaker Identification Robust Speaker Identification by Smarajit Bose Interdisciplinary Statistical Research Unit Indian Statistical Institute, Kolkata Joint work with Amita Pal and Ayanendranath Basu Overview } } } } } } }

More information

DETECTING HUMAN ACTIVITIES IN THE ARCTIC OCEAN BY CONSTRUCTING AND ANALYZING SUPER-RESOLUTION IMAGES FROM MODIS DATA INTRODUCTION

DETECTING HUMAN ACTIVITIES IN THE ARCTIC OCEAN BY CONSTRUCTING AND ANALYZING SUPER-RESOLUTION IMAGES FROM MODIS DATA INTRODUCTION DETECTING HUMAN ACTIVITIES IN THE ARCTIC OCEAN BY CONSTRUCTING AND ANALYZING SUPER-RESOLUTION IMAGES FROM MODIS DATA Shizhi Chen and YingLi Tian Department of Electrical Engineering The City College of

More information

Brief Introduction of Machine Learning Techniques for Content Analysis

Brief Introduction of Machine Learning Techniques for Content Analysis 1 Brief Introduction of Machine Learning Techniques for Content Analysis Wei-Ta Chu 2008/11/20 Outline 2 Overview Gaussian Mixture Model (GMM) Hidden Markov Model (HMM) Support Vector Machine (SVM) Overview

More information

Inference with the Universum

Inference with the Universum Jason Weston NEC Labs America, Princeton NJ, USA. Ronan Collobert NEC Labs America, Princeton NJ, USA. Fabian Sinz NEC Labs America, Princeton NJ, USA; and Max Planck Insitute for Biological Cybernetics,

More information

MIRA, SVM, k-nn. Lirong Xia

MIRA, SVM, k-nn. Lirong Xia MIRA, SVM, k-nn Lirong Xia Linear Classifiers (perceptrons) Inputs are feature values Each feature has a weight Sum is the activation activation w If the activation is: Positive: output +1 Negative, output

More information

Finding Increment Statistics on various types of Wavelets under 1-D Fractional Brownian Motion Synthesis

Finding Increment Statistics on various types of Wavelets under 1-D Fractional Brownian Motion Synthesis Finding Increment Statistics on various types of Wavelets under 1-D Fractional Brownian Motion Synthesis Abhishek Sharma 1, Bhubneshwar Sharma 2 1 M.Tech student, Department of ECE Eternal University,

More information

Final Examination CS 540-2: Introduction to Artificial Intelligence

Final Examination CS 540-2: Introduction to Artificial Intelligence Final Examination CS 540-2: Introduction to Artificial Intelligence May 7, 2017 LAST NAME: SOLUTIONS FIRST NAME: Problem Score Max Score 1 14 2 10 3 6 4 10 5 11 6 9 7 8 9 10 8 12 12 8 Total 100 1 of 11

More information

Invariant and Zernike Based Offline Handwritten Character Recognition

Invariant and Zernike Based Offline Handwritten Character Recognition International Journal of Advanced Research in Computer Engineering & Technology (IJARCET Volume 3 Issue 5, May 014 Invariant and Zernike Based Offline Handwritten Character Recognition S.Sangeetha Devi

More information

Spatial Transformer Networks

Spatial Transformer Networks BIL722 - Deep Learning for Computer Vision Spatial Transformer Networks Max Jaderberg Andrew Zisserman Karen Simonyan Koray Kavukcuoglu Contents Introduction to Spatial Transformers Related Works Spatial

More information

Various Shape Descriptors in Image Processing A Review

Various Shape Descriptors in Image Processing A Review Various Shape Descriptors in Image Processing A Review Preetika D Silva 1, P. Bhuvaneswari 2 1 PG Student, Department of Electronics and Communication, Rajarajeswari College of Engineering, Bangalore,

More information

Pattern Recognition and Machine Learning

Pattern Recognition and Machine Learning Christopher M. Bishop Pattern Recognition and Machine Learning ÖSpri inger Contents Preface Mathematical notation Contents vii xi xiii 1 Introduction 1 1.1 Example: Polynomial Curve Fitting 4 1.2 Probability

More information

Recent advances in Time Series Classification

Recent advances in Time Series Classification Distance Shapelet BoW Kernels CCL Recent advances in Time Series Classification Simon Malinowski, LinkMedia Research Team Classification day #3 S. Malinowski Time Series Classification 21/06/17 1 / 55

More information

International Journal of Research in Computer and Communication Technology, Vol 3, Issue 7, July

International Journal of Research in Computer and Communication Technology, Vol 3, Issue 7, July Hybrid SVM Data mining Techniques for Weather Data Analysis of Krishna District of Andhra Region N.Rajasekhar 1, Dr. T. V. Rajini Kanth 2 1 (Assistant Professor, Department of Computer Science & Engineering,

More information