RAMAKRISHNA LANKA MSEE, UTA ADVISING PROFESSOR: DR. K. R. RAO

Size: px
Start display at page:

Download "RAMAKRISHNA LANKA MSEE, UTA ADVISING PROFESSOR: DR. K. R. RAO"

Transcription

1

2 RAMAKRISHNA LANKA MSEE, UTA ADVISING PROFESSOR: DR. K. R. RAO

3 Personal identity management 3 Exponential growth of population and migration of people is a challenge to person management. Risk of identity theft. Crucial societal applications are based on personal identity. Personal attributes define the unique identity.

4 Personal identity management 4 Aishwarya Rai Figure 1: Traditional schemes to validate individuals [1] Figure 2: Biometrics to validate individuals [1]

5 Need for biometrics 5 Traditional person recognition relies on surrogate representations of identity. Knowledge based person recognition mechanisms like PINs and passwords are not reliable. Biometric recognition, or simply biometrics, offers a natural and more reliable solution. Biometric identifiers are inherent.

6 Biometric Systems 6 The term biometrics is derived from the Greek words bio (life) and metric (to measure). Biometrics is the measurable biological and behavioral trait unique to a person. Examples: fingerprints, face, iris, voice, gait, or the Deoxyribonucleic acid (DNA).

7 Biometric Systems 7 There are 2 phases to a biometric system: Enrollment Recognition The biometric system consists of 4 basis components: Sensor Feature extractor Database Matcher

8 Biometric Systems 8 Figure 3: Block diagram of a biometric system [1]

9 The Fingerprint biometric 9 Finger-scan technology is a widely deployed biometric technology. The fingerprint biometric is highly accurate and versatile. Low-cost and small-size of fingerprint acquisition devices. Figure 4: Smooth skin [1] Figure 5: Friction ridge skin on the fingertips [1]

10 The Fingerprint biometric How it works Fingerprint recognition is feature-based. For optimal feature extraction, the image is enhanced and thinned to one pixel wide. 10 Figure 6: Grayscale fingerprint image [1] Figure 7: Thinned fingerprint image [1] Figure 8: Ridge ending and bifurcation [1]

11 The Fingerprint biometric How it works A minutiae set is an abstract representation of the ridge skeleton. The minutiae set is then matched with a template to compute the match score. 11 Figure 9: Minutiae matching process [1] Figure 10: A genuine pair with maximum matched minutiae [1] Figure 11: An imposter pair with very few matched minutiae [1]

12 The Fingerprint biometric Need for image enhancement Lack of robustness against image quality degradation. Several factors determine the quality of a fingerprint image. In an ideal fingerprint image, ridges and valleys alternate and flow in a locally constant direction. Poor quality images result in spurious and missed features. 12

13 The Fingerprint biometric Need for image enhancement 13 Figure 12: Examples of low quality fingerprint images: (a) dry finger, (b) wet finger, and (c) finger with many creases [1].

14 Fingerprint image enhancement 14 The image enhancement is carried out in either spatial or frequency domain. Spatial domain. g(x,y)=t[f(x,y)] Frequency domain. g(x,y)= τ^(-1) [H(u,v)F(u,v)] Figure 13: Fingerprint image enhancement process [14]

15 Tuned Gabor filtering 15 The state of the art fingerprint enhancement technique is employed by L. Hong et al. [16]. Principle: Convolution of the image with Gabor filter. The filter is tuned to the local ridge orientation and ridge frequency.

16 Tuned Gabor filtering 16 Figure 14: Flowchart of the L. Hong et al. fingerprint enhancement algorithm [13]

17 Tuned Gabor filtering - Normalization Normalization is used to standardize the intensity values in an image. Normalization does not change the ridge structures in a fingerprint. 17 Figure 15: The result of normalization. (a) Input image. (b) Normalized image [13]

18 Tuned Gabor filtering - Orientation image estimation 18 The orientation image is an intrinsic property of the fingerprint images. Figure 16: Orientation estimation at pixel (x,y) [13] Divide the image into blocks of size w x w. Compute gradients Vx(i,j) and Vy(i,j) at each pixel (i,j). Estimate the local orientation of each block centered at pixel (i,j)

19 Tuned Gabor filtering Frequency image estimation 19 Local ridge frequency is another intrinsic property of a fingerprint image. The gray levels along ridges and valleys are modeled as a sinusoidal wave along the local ridge orientation. The image is divided into blocks of size wxw. The x-signature X[0],X[1],,X[l-1] of the ridges and valleys within the window is computed. The frequency of ridges and valleys can be estimated from the x-signature.

20 Tuned Gabor filtering Frequency image estimation 20 w 1 X k = 1 w d=0 G u, v, k = 0,1,., l 1 u = i + ቇ ቆd w 2 coso i, j + ൭k l ൱ 2 sino i, j v = j + ቇ ቆd w 2 sino i, j + ቆ l ቇ 2 k coso i, j Figure 17: Oriented window method to estimate the ridge frequency [13]

21 Tuned Gabor filtering Filtering The estimated frequency and orientation in a fingerprint image provide useful information which helps in removing undesired noise. A bandpass filter that is tuned to the estimation can efficiently remove noise and preserve the true ridge and valley structures. Gabor filters have both frequencyselective and orientation-selective properties. 21

22 Tuned Gabor filtering Filtering The general form of a Gabor filter is: h x, y: φ, f = exp 1 2 x 2 2 δ2 + y x δ2 y cos 2πfx The enhanced image E is obtained by: E i, j = σ u= wg 2 wg σ 2 v= wg 2 h u, v: O i, j, F i, j G i u, j v wg 2 22 Tuned Gabor filtering Figure 18: Original scanned fingerprint [13] Figure 19: Enhanced fingerprint image [13]

23 Related work done 23 Ridge structures that are affected by unusual input contexts can be very complicated. Not all unrecoverable regions can be recovered, as it is difficult to accurately estimate filter parameters in bad sections. A two-stage scheme to enhance the lowquality fingerprint image in both the spatial domain and the frequency domain was proposed by J.Yang et al [9].

24 Two-stage enhancement 24 Figure 20: Flowchart of the two-stage enhancement algorithm [9]

25 Two-stage enhancement Spatial Ridge Compensation 25 The first stage performs ridge compensation along the ridges in the spatial domain. This stage increases the ridge contrast. This stage consists of three steps: Local normalization Local orientation estimation Local ridge-compensation filtering

26 Two-stage enhancement Spatial Ridge Compensation The Local normalization and orientation estimation is similar to the Tuned Gabor filter algorithm [16]. With the orientation of each sub-image estimated, a oriented rectangular window h x w is created. The ridge compensated image is: F i, j = (σ (w 1)/2 m= (w 1)/2 (h 1)/2 σ n= (h 1)/2 (((w 1) β+α) h) N(i,j )) 26 i = i + m cos O i, j j = j m sin O i, j + n sin O i, j + n cos O i, j Figure 21: Window along the local ridge orientation [9]

27 Two-stage enhancement Spatial Ridge Compensation 27 Figure 22: Original fingerprint image [9]. Figure 23: normalized image[9]. Figure 24: First-stage enhanced image[9]

28 Two-stage enhancement Frequency Bandpass Filter The result of the first spatial filter increases the ridge contrast. 28 The frequency bandpass filters used are orientation and frequency selective. The Filter used is the Gabor Filter as in the state of the art approach [16]. Figure 25: Original fingerprint image [9]. Figure 26: First stage enhanced image [9]. Figure 27: Final enhanced image [9].

29 Image pyramids 29 The task Image pyramids or multiresolution processing is to decompose images into multiple information scales. The Laplacian Pyramid Decomposition and Reconstruction (LPD and LPR) are used. The Laplacian pyramid is relevant in this study as all the relevant information is concentrated within a few frequency bands.

30 Image pyramids 30 Image pyramid coding is to low-pass filter the original image go to obtain image g1, which is a reduced version in a way that both resolution and sample density are decreased. In a similar way form g2 as a reduced version of g1, and so on. The sequence g0,g1,,gn is called the Gaussian pyramid. The decomposition method in image pyramids is known as reduce function and reconstruction is known as expand.

31 Image pyramids 31 Take an image g0 with C x R dimensions and an equivalent weighing function h, then the reduced image gl = REDUCE(gl-1) C 2 g l i, j = R 2 m= C n= R 2 2 h l m, n g l 1 2i + m, 2j + n The reconstruction gl,n = EXPAND(g(l,n-1)) C 2 g l,n i, j = R 2 m= C n= R 2 2 h l m, n g l,n 1 i m 2, j n 2 Here, l is the number of pyramid levels 0 < l < n, and (i,j) are pixel values where 0 i < C and 0 j < R [32].

32 Image pyramids 32 Figure 28: First six levels of the Gaussian pyramid for the Lena image [32].

33 Image pyramids Laplacian Image Pyramid Laplacian pyramid representation is the error images which remain when consequent layers of Gaussian pyramid images are subtracted [32]. The LPD images L0,L1.. Ln are obtained by: 33 L l = g l EXPAND g l+1 The reconstruction (LPR) is obtained by: g l = L l + EXPAND g l+1

34 Image pyramids Laplacian Image Pyramid 34 Figure 29: First four levels of the Laplacian pyramid for the Lena image [32].

35 Proposed approach Laplacian pyramid applied to Two-Stage enhancement Enhance the novel two-stage enhancement[9] by adding a LPD stage prior and LPR after. The vital ridge features are present in the 1 st and 2 nd level of the Laplacian pyramid. The original image is decomposed into 2 levels of Laplacian pyramids and each will undergo the Normalization and Gabor filtering. 35

36 Proposed approach Laplacian pyramid decomposition 36 g0 L0 g1 L1 Figure 29: Generation of the Laplacian pyramid decomposed images. g2

37 Proposed approach Laplacian pyramid applied to Two-Stage enhancement 37 Original Image Laplacian Pyramid Decomposition L0 Two-Stage Enhancement Laplacian Pyramid Reconstruction Enhanc ed image L1 Two-Stage Enhancement Figure 30: Proposed Multi-stage enhancement scheme

38 Results 38 Figure 31: Input FVC2004DB1 102 image [18] Figure 32: Level 1 Laplacian Pyramid Image Figure 33: Level 2 Laplacian Pyramid Image Figure 34: Level 1 Laplacian Pyramid enhanced Image Figure 35: Level 2 Laplacian Pyramid enhanced Image Figure 36: Final enhanced image

39 Results 39 Figure 37: Input FVC2004 DB1 105 image [18] Figure 38: State of the art enhanced image Figure 39:Two stage enhanced image Figure 40: LPD based multi-stage enhancement image

40 Results 40 Figure 42: State of the art enhanced image with distortion highlighted Figure 41: Input FVC2004DB1 102 image [18] Figure 43: LPD based multi-stage enhanced less distortion highlighted

41 Results 41 Figure 44: Input image of very bad quality FVC2004DB1 101 [18] Figure 45: State of the art enhanced image Figure 46: LPD Multistage scheme enhanced image

42 Results - Thinning 42 Input image Input image Input image Thinned Image Thinned Image Thinned Image Figure 47: Input FVC2004DB2 101 and thinned image [18] Figure 48: State of the art enhanced and thinned image Figure 49: LPD Multistage scheme enhanced and thinned image

43 Results - Minutiae 43 Minutiae Minutiae Minutiae Figure 50: Original image minutiae[18] Figure 51: State of the art enhanced image minutiae Figure 52: LPD Multistage scheme enhanced image minutiae

44 Results Minutiae ratio and time 44

45 Results Minutiae ratio 45

46 Results - Minutiae 46

47 Conclusion and Future Work The fingerprint biometric is a feature based biometric system. The feature extraction heavily relies on optimal image enhancement. A novel multi-stage enhancement scheme has been proposed which by using LPD and LPR, gives better fidelity to the ridge-valley structure of the fingerprint images. Due to the multi-tier and multi-stage approach the performance time has increased which can be vital for a real time biometric system. Future work: Optimize the Bandpass filter for the frequency domain. Use an efficient multi-threaded programming language. 47

48 Test Conditions 48 The code was developed and executed using the Mathworks MATLAB R2013a tool which uses a proprietary programming language and has support for image processing using its image processing toolbox. The fingerprint recognition v2.2 software is used for true minutiae count [36] and the Fingerprint minutiae extraction matlab code [37] to compute the total minutiae count and, ratios TMR and FMR. All the work was done on a system with following configuration: Operating System: Windows 10 Home Edition Processor: Intel(R) Core(TM) i3-3120m 2.50GHz 2.50GHz RAM: 8.00 GB System type: 64-bit Operating System, x64-based processor

49 Acronyms 49 AFIS - Automated Fingerprint Identification Systems DNA - Deoxyribonucleic acid FMR - False minutiae ratio FVC - Fingerprint verification completion LPD - Laplacian pyramid decomposition LPR - Laplacian pyramid reconstruction PIN - Personal Identification Number TMR - True minutiae ratio

50 References 50 [1] A. K. Jain, A. A. Ros, and K. NandaKumar, Introduction to Biometrics, Springer, [2] S. C. Lee, An Introduction to Identity Management, SANS Institute, March 2003 [3] Article by V.Maty aˇs and Z.R ıha on Biometric Authentication Security and Usability : [4] A. K. Jain, A. Ross, and S. Pankanti, Biometrics: A tool for information security, IEEE Trans. Info. Forensics Security, vol. 1, no. 2, pp , June [5] Article on the Overview of Biometrics: the- [6] Article on the future of Biometrics: [7] Article on types of Biometrics:

51 References 51 [8] D. Petrovska-Delacrétaz, G. Chollet, and B. Dorizzi, Guide to Biometric Reference Systems and Performance Evaluation, Springer- Verlag, [9] J.Yang, N. Xiong, and A. V. Vasilakos Two-stage enhancement scheme for lowquality fingerprint images by learning from the images IEEE transactions on Human-Machine Systems, vol. 43, no. 2, pp , Mar [10] A. K. Jain, Fundamentals of Digital Image Processing, Englewood Cliffs, NJ: Prentice Hall, [11] R.C. Gonzalez and R.E. Woods, Digital Image Processing, 3rd edition, Prentice Hall, [12] A. K. Jain, A. Ross, and S. Prabhakar, An Introduction to Biometric Recognition, IEEE Trans. Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4 20, Jan [13] L. Hong, Y. Wan, and A.K. Jain, Fingerprint image enhancement: Algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp , Aug

52 References 52 [14] D.K. Misra, S.P. Tripathi and D. Misra, A Review Report on Fingerprint Image Enhancement Techniques. International Journal of Emerging Trends & Technology in Computer Science, vol. 2, no. 2, pp , April [15] S. Greenberg, M. Aladjem, D. Kogan, and I. Dimitrov, Fingerprint image enhancement using filtering techniques, ICPR, Vol. 3, pp , Sep [16] L. Hong, A.K. Jain, S. Pankanti, and R. Bolle, Fingerprint Enhancement, Proc. First IEEE WACV, pp , Sarasota, Fla.,1996. [17] S. Chikkerur, A. N. Cartwright, and V. Govindaraju, Fingerprint enhancement using STFT analysis, IEEE Transactions on Pattern Recognition, vol. 40, no. 1, pp , Jan [18] Fingerprint Verification Competition database: [19] Article on Gabor filter: filter.html

53 References 53 [20] K.R.Rao, D.N.Kim and J.J.Hwang, Fast Fourier transform: Algorithms and applications, Heidelberg, Germany: Springer [21] MS thesis paper by S. Chakraborty on Fingerprint enhancement by directional filtering : 6.pdf [22] R.C. Gonzalez, R.E. Woods and S.L. Eddins, Digital Image Processing Using MATLAB, 2nd edition, McGraw Hill Education, [23] Z. Shi and V. Govindaraju, A chaincode based scheme for fingerprint feature extraction, IEEE Transactions on Pattern Recognition, vol. 27, no. 5, pp , Apr [24] K.G.Darpanis, Gabor Filters, York University, April [25] O. Marques, Practical Image and Video Processing Using MATLAB, 1st Edition, Wiley-IEEE Press, [26] Matlab:

54 References 54 [27] Multimedia processing course website: [28] Visual studio: [29] D. Kumar and Y. Ryu, A Brief Introduction of Biometrics and Fingerprint Payment Technology, International Journal of Advanced Science and Technology, vol. 4, pp , March [30] P.K. Shimna and B. Neethu, Fingerprint Image Enhancement Using STFT Analysis, IOSR Journal of Electronics and Communication Engineering, vol. 10, Issue 2, pp , Apr [31] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of fingerprint recognition. Springer, [32] P.J. Burt and E.H. Adelson, The Laplacian Pyramid as a Compact Image Code, IEEE Transactions on communications, vol. 31, no. 4, pp , Apr [33] H. F. D. Kunz, K. Eck, and T. Aach, "A Nonlinear Multi-Resolution Gradient- Adaptive Filter for Medical Images", In SPIE Medical Imaging, volume 5032, pages , May 2003.

55 References 55 [34] A. Jepson, Notes on Image Pyramids to attenuate noise : [35] H. Fronthaler, K. Kollreider, and J. Bigun, Local features for enhancement and minutiae extraction in fingerprints, IEEE Trans. Image Process., vol. 17, no. 3, pp , Mar [36] Fingerprint Recognition v2.2 software : Fingerprint-Verification. [37] PowerPoint presentation background image:

56

Role of Assembling Invariant Moments and SVM in Fingerprint Recognition

Role of Assembling Invariant Moments and SVM in Fingerprint Recognition 56 Role of Assembling Invariant Moments SVM in Fingerprint Recognition 1 Supriya Wable, 2 Chaitali Laulkar 1, 2 Department of Computer Engineering, University of Pune Sinhgad College of Engineering, Pune-411

More information

BIOMETRIC verification systems are used to verify the

BIOMETRIC verification systems are used to verify the 86 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 1, JANUARY 2004 Likelihood-Ratio-Based Biometric Verification Asker M. Bazen and Raymond N. J. Veldhuis Abstract This paper

More information

Likelihood Ratio-Based Biometric Verification

Likelihood Ratio-Based Biometric Verification Likelihood Ratio-Based Biometric Verification Asker M. Bazen and Raymond N.J. Veldhuis University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 27, 75 AE

More information

Fingerprint Individuality

Fingerprint Individuality Fingerprint Individuality On the Individuality of Fingerprints, Sharat Pankanti, Anil Jain and Salil Prabhakar, IEEE Transactions on PAMI, 2002 US DOJ, Office of the Inspector General, A Review of the

More information

A Minutiae-based Fingerprint Individuality Model

A Minutiae-based Fingerprint Individuality Model A Minutiae-based Fingerprint Individuality Model Jiansheng Chen Yiu-Sang Moon Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin N.T., Hong Kong {jschen, ysmoon}@cse.cuhk.edu.hk

More information

4038 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 10, OCTOBER 2005

4038 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 10, OCTOBER 2005 4038 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 10, OCTOBER 2005 On Orientation and Anisotropy Estimation for Online Fingerprint Authentication Xudong Jiang, Member, IEEE Abstract Local dominant

More information

Segmentation of Overlapped Region using Morphological Processing

Segmentation of Overlapped Region using Morphological Processing www.ijcsi.org 66 Segmentation of Overlapped Region using Morphological Processing Vidyadevi G Biradar, Sarojadevi H Department of ISE, Nitte Maanakshi institute of Technology Bangalore, India Department

More information

PIN-based cancelable biometrics

PIN-based cancelable biometrics PIN-based cancelable biometrics Patrick Lacharme, Aude Plateaux GREYC Research lab, Ensicaen - UCBN - CNRS 6 Boulevard Maréchal Juin, 14000 Caen, France. Aude Plateaux is also with BULL SAS, France. patrick.lacharme@ensicaen.fr,

More information

Securing BioEncoded IrisCodes Against Correlation Attacks

Securing BioEncoded IrisCodes Against Correlation Attacks Securing BioEncoded IrisCodes Against Correlation Attacks Osama Ouda a,b, Norimichi Tusmura b and Toshiya Nakaguchi b a Faculty of Computers and Information Sciences, Mansoura University, Mansoura 35516,

More information

Score Normalization in Multimodal Biometric Systems

Score Normalization in Multimodal Biometric Systems Score Normalization in Multimodal Biometric Systems Karthik Nandakumar and Anil K. Jain Michigan State University, East Lansing, MI Arun A. Ross West Virginia University, Morgantown, WV http://biometrics.cse.mse.edu

More information

Empirical Analysis of Invariance of Transform Coefficients under Rotation

Empirical Analysis of Invariance of Transform Coefficients under Rotation International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume, Issue 5 (May 25), PP.43-5 Empirical Analysis of Invariance of Transform Coefficients

More information

On the Individuality of Fingerprints: Models and Methods

On the Individuality of Fingerprints: Models and Methods On the Individuality of Fingerprints: Models and Methods Dass, S., Pankanti, S., Prabhakar, S., and Zhu, Y. Abstract Fingerprint individuality is the study of the extent of uniqueness of fingerprints and

More information

FINGERPRINT ENHANCEMENT Frequency Domain

FINGERPRINT ENHANCEMENT Frequency Domain FINGERPRINT ENHANCEMENT Frequency Domain Outline Fingerprint Image Enhancement Prior Related Work Proposed Algorithm: STFT Analysis Experimental Evaluation Need for Enhancement What you see What you think

More information

If you wish to cite this paper, please use the following reference:

If you wish to cite this paper, please use the following reference: This is an accepted version of a paper published in Proceedings of the st IEEE International Workshop on Information Forensics and Security (WIFS 2009). If you wish to cite this paper, please use the following

More information

Wavelet Packet Based Digital Image Watermarking

Wavelet Packet Based Digital Image Watermarking Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in

More information

Score calibration for optimal biometric identification

Score calibration for optimal biometric identification Score calibration for optimal biometric identification (see also NIST IBPC 2010 online proceedings: http://biometrics.nist.gov/ibpc2010) AI/GI/CRV 2010, Ottawa Dmitry O. Gorodnichy Head of Video Surveillance

More information

Application of hopfield network in improvement of fingerprint recognition process Mahmoud Alborzi 1, Abbas Toloie- Eshlaghy 1 and Dena Bazazian 2

Application of hopfield network in improvement of fingerprint recognition process Mahmoud Alborzi 1, Abbas Toloie- Eshlaghy 1 and Dena Bazazian 2 5797 Available online at www.elixirjournal.org Computer Science and Engineering Elixir Comp. Sci. & Engg. 41 (211) 5797-582 Application hopfield network in improvement recognition process Mahmoud Alborzi

More information

Classification of Hand-Written Digits Using Scattering Convolutional Network

Classification of Hand-Written Digits Using Scattering Convolutional Network Mid-year Progress Report Classification of Hand-Written Digits Using Scattering Convolutional Network Dongmian Zou Advisor: Professor Radu Balan Co-Advisor: Dr. Maneesh Singh (SRI) Background Overview

More information

Biometrics: Introduction and Examples. Raymond Veldhuis

Biometrics: Introduction and Examples. Raymond Veldhuis Biometrics: Introduction and Examples Raymond Veldhuis 1 Overview Biometric recognition Face recognition Challenges Transparent face recognition Large-scale identification Watch list Anonymous biometrics

More information

Multiscale Image Transforms

Multiscale Image Transforms Multiscale Image Transforms Goal: Develop filter-based representations to decompose images into component parts, to extract features/structures of interest, and to attenuate noise. Motivation: extract

More information

Reading. 3. Image processing. Pixel movement. Image processing Y R I G Q

Reading. 3. Image processing. Pixel movement. Image processing Y R I G Q Reading Jain, Kasturi, Schunck, Machine Vision. McGraw-Hill, 1995. Sections 4.-4.4, 4.5(intro), 4.5.5, 4.5.6, 5.1-5.4. 3. Image processing 1 Image processing An image processing operation typically defines

More information

Orientation Map Based Palmprint Recognition

Orientation Map Based Palmprint Recognition Orientation Map Based Palmprint Recognition (BM) 45 Orientation Map Based Palmprint Recognition B. H. Shekar, N. Harivinod bhshekar@gmail.com, harivinodn@gmail.com India, Mangalore University, Department

More information

Analytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System

Analytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System Volume Issue 8, November 4, ISSN No.: 348 89 3 Analytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System Divya Singhal, Ajay Kumar Yadav M.Tech, EC Department,

More information

COMPUTATIONAL ALGORITHMS FOR FINGERPRINT RECOGNITION

COMPUTATIONAL ALGORITHMS FOR FINGERPRINT RECOGNITION COMPUTATIONAL ALGORITHMS FOR FINGERPRINT RECOGNITION Kluwer International Series on Biometrics Professor David D. Zhang Consulting editor Department of Computer Science Hong Kong Polytechnic University

More information

The Detection Techniques for Several Different Types of Fiducial Markers

The Detection Techniques for Several Different Types of Fiducial Markers Vol. 1, No. 2, pp. 86-93(2013) The Detection Techniques for Several Different Types of Fiducial Markers Chuen-Horng Lin 1,*,Yu-Ching Lin 1,and Hau-Wei Lee 2 1 Department of Computer Science and Information

More information

Roadmap. Introduction to image analysis (computer vision) Theory of edge detection. Applications

Roadmap. Introduction to image analysis (computer vision) Theory of edge detection. Applications Edge Detection Roadmap Introduction to image analysis (computer vision) Its connection with psychology and neuroscience Why is image analysis difficult? Theory of edge detection Gradient operator Advanced

More information

A Hybrid Model of Wavelet and Neural Network for Short Term Load Forecasting

A Hybrid Model of Wavelet and Neural Network for Short Term Load Forecasting International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 4 (2014), pp. 387-394 International Research Publication House http://www.irphouse.com A Hybrid Model of

More information

A Contrario Detection of False Matches in Iris Recognition

A Contrario Detection of False Matches in Iris Recognition A Contrario Detection of False Matches in Iris Recognition Marcelo Mottalli, Mariano Tepper, and Marta Mejail Departamento de Computación, Universidad de Buenos Aires, Argentina Abstract. The pattern of

More information

Digital Image Watermarking Algorithm Based on Wavelet Packet

Digital Image Watermarking Algorithm Based on Wavelet Packet www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department

More information

EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER

EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER 17th European Signal Processing Conference (EUSIPCO 29) Glasgow, Scotland, August 24-28, 29 EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMA AREA UNER THE CURVE FOR THE HAMMING ISTANCE CASSIFIER Chun Chen,

More information

Article (peer-reviewed)

Article (peer-reviewed) Title Author(s) Influence of noise intensity on the spectrum of an oscillator Swain, Rabi Sankar; Gleeson, James P.; Kennedy, Michael Peter Publication date 2005-11 Original citation Type of publication

More information

Semi-parametric Distributional Models for Biometric Fusion

Semi-parametric Distributional Models for Biometric Fusion Semi-parametric Distributional Models for Biometric Fusion Wenmei Huang and Sarat C. Dass Department of Statistics and Probability, Michigan State University, East Lansing, MI, 48824, USA Abstract The

More information

H Optimal Nonparametric Density Estimation from Quantized Samples

H Optimal Nonparametric Density Estimation from Quantized Samples H Optimal Nonparametric Density Estimation from Quantized Samples M. Nagahara 1, K. I. Sato 2, and Y. Yamamoto 1 1 Graduate School of Informatics, Kyoto University, 2 Graduate School of Economics, Kyoto

More information

Rounding Transform. and Its Application for Lossless Pyramid Structured Coding ABSTRACT

Rounding Transform. and Its Application for Lossless Pyramid Structured Coding ABSTRACT Rounding Transform and Its Application for Lossless Pyramid Structured Coding ABSTRACT A new transform, called the rounding transform (RT), is introduced in this paper. This transform maps an integer vector

More information

The New Graphic Description of the Haar Wavelet Transform

The New Graphic Description of the Haar Wavelet Transform he New Graphic Description of the Haar Wavelet ransform Piotr Porwik and Agnieszka Lisowska Institute of Informatics, Silesian University, ul.b dzi ska 39, 4-00 Sosnowiec, Poland porwik@us.edu.pl Institute

More information

Biometric Security Based on ECG

Biometric Security Based on ECG Biometric Security Based on ECG Lingni Ma, J.A. de Groot and Jean-Paul Linnartz Eindhoven University of Technology Signal Processing Systems, Electrical Engineering l.ma.1@student.tue.nl j.a.d.groot@tue.nl

More information

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia

More information

Palmprint based Verification System Robust to Occlusion using Low-order Zernike Moments of Sub-images

Palmprint based Verification System Robust to Occlusion using Low-order Zernike Moments of Sub-images BADRINATH, NARESH, GUPTA: PALMPRINT BASED VERIFICATION SYSTEM 1 Palmprint based Verification System Robust to Occlusion using Low-order Zernike Moments of Sub-images Badrinath G. S. badri@cse.iitk.ac.in

More information

Convolution Spatial Aliasing Frequency domain filtering fundamentals Applications Image smoothing Image sharpening

Convolution Spatial Aliasing Frequency domain filtering fundamentals Applications Image smoothing Image sharpening Frequency Domain Filtering Correspondence between Spatial and Frequency Filtering Fourier Transform Brief Introduction Sampling Theory 2 D Discrete Fourier Transform Convolution Spatial Aliasing Frequency

More information

Research Article Binary Biometric Representation through Pairwise Adaptive Phase Quantization

Research Article Binary Biometric Representation through Pairwise Adaptive Phase Quantization Hindawi Publishing Corporation EURASIP Journal on Information Security Volume, Article ID 5436, 6 pages doi:.55//5436 Research Article Binary Biometric Representation through Pairwise Adaptive Phase Quantization

More information

Templates, Image Pyramids, and Filter Banks

Templates, Image Pyramids, and Filter Banks Templates, Image Pyramids, and Filter Banks 09/9/ Computer Vision James Hays, Brown Slides: Hoiem and others Review. Match the spatial domain image to the Fourier magnitude image 2 3 4 5 B A C D E Slide:

More information

ECE533 Digital Image Processing. Embedded Zerotree Wavelet Image Codec

ECE533 Digital Image Processing. Embedded Zerotree Wavelet Image Codec University of Wisconsin Madison Electrical Computer Engineering ECE533 Digital Image Processing Embedded Zerotree Wavelet Image Codec Team members Hongyu Sun Yi Zhang December 12, 2003 Table of Contents

More information

Research Article Multimodal Personal Verification Using Likelihood Ratio for the Match Score Fusion

Research Article Multimodal Personal Verification Using Likelihood Ratio for the Match Score Fusion Hindawi Computational Intelligence and Neuroscience Volume 2017, Article ID 9345969, 9 pages https://doi.org/10.1155/2017/9345969 Research Article Multimodal Personal Verification Using Likelihood Ratio

More information

Face Recognition Using Global Gabor Filter in Small Sample Case *

Face Recognition Using Global Gabor Filter in Small Sample Case * ISSN 1673-9418 CODEN JKYTA8 E-mail: fcst@public2.bta.net.cn Journal of Frontiers of Computer Science and Technology http://www.ceaj.org 1673-9418/2010/04(05)-0420-06 Tel: +86-10-51616056 DOI: 10.3778/j.issn.1673-9418.2010.05.004

More information

A Modular NMF Matching Algorithm for Radiation Spectra

A Modular NMF Matching Algorithm for Radiation Spectra A Modular NMF Matching Algorithm for Radiation Spectra Melissa L. Koudelka Sensor Exploitation Applications Sandia National Laboratories mlkoude@sandia.gov Daniel J. Dorsey Systems Technologies Sandia

More information

Tennis player segmentation for semantic behavior analysis

Tennis player segmentation for semantic behavior analysis Proposta di Tennis player segmentation for semantic behavior analysis Architettura Software per Robot Mobili Vito Renò, Nicola Mosca, Massimiliano Nitti, Tiziana D Orazio, Donato Campagnoli, Andrea Prati,

More information

where =0,, 1, () is the sample at time index and is the imaginary number 1. Then, () is a vector of values at frequency index corresponding to the mag

where =0,, 1, () is the sample at time index and is the imaginary number 1. Then, () is a vector of values at frequency index corresponding to the mag Efficient Discrete Tchebichef on Spectrum Analysis of Speech Recognition Ferda Ernawan and Nur Azman Abu Abstract Speech recognition is still a growing field of importance. The growth in computing power

More information

Likelihood Ratio Based Biometric Score Fusion

Likelihood Ratio Based Biometric Score Fusion 1 To appear in IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007 Based Biometric Score Fusion Karthik Nandakumar, Student Member, IEEE, Yi Chen, Student Member, IEEE, Sarat C. Dass,

More information

Invariant Feature Extraction from Fingerprint Biometric Using Pseudo Zernike Moments

Invariant Feature Extraction from Fingerprint Biometric Using Pseudo Zernike Moments Invariant Feature Extraction from Biometric Using Pseudo Zernike Moments C.Lakshmi Deepika 1, Dr. A Kandaswamy 2, C. Vimal 3, and B. Sathish 4 1,2,3,4 Department of Biomedical Engineering, PSG College

More information

Evolution of Uncorrelated and Correlated Noise in Gaussian and Laplacian Image Pyramids

Evolution of Uncorrelated and Correlated Noise in Gaussian and Laplacian Image Pyramids Proceedings of the 6th WSEAS International Conference on Signal Processing, Robotics and Automation, Corfu Island, Greece, February 16-19, 007 71 Evolution of Uncorrelated and Correlated Noise in Gaussian

More information

Image Alignment and Mosaicing

Image Alignment and Mosaicing Image Alignment and Mosaicing Image Alignment Applications Local alignment: Tracking Stereo Global alignment: Camera jitter elimination Image enhancement Panoramic mosaicing Image Enhancement Original

More information

SIMPLE GABOR FEATURE SPACE FOR INVARIANT OBJECT RECOGNITION

SIMPLE GABOR FEATURE SPACE FOR INVARIANT OBJECT RECOGNITION SIMPLE GABOR FEATURE SPACE FOR INVARIANT OBJECT RECOGNITION Ville Kyrki Joni-Kristian Kamarainen Laboratory of Information Processing, Department of Information Technology, Lappeenranta University of Technology,

More information

Gaussian-Shaped Circularly-Symmetric 2D Filter Banks

Gaussian-Shaped Circularly-Symmetric 2D Filter Banks Gaussian-Shaped Circularly-Symmetric D Filter Bans ADU MATEI Faculty of Electronics and Telecommunications Technical University of Iasi Bldv. Carol I no.11, Iasi 756 OMAIA Abstract: - In this paper we

More information

Blur Insensitive Texture Classification Using Local Phase Quantization

Blur Insensitive Texture Classification Using Local Phase Quantization Blur Insensitive Texture Classification Using Local Phase Quantization Ville Ojansivu and Janne Heikkilä Machine Vision Group, Department of Electrical and Information Engineering, University of Oulu,

More information

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,

More information

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Cung Nguyen and Robert G. Redinbo Department of Electrical and Computer Engineering University of California, Davis, CA email: cunguyen,

More information

Using Entropy and 2-D Correlation Coefficient as Measuring Indices for Impulsive Noise Reduction Techniques

Using Entropy and 2-D Correlation Coefficient as Measuring Indices for Impulsive Noise Reduction Techniques Using Entropy and 2-D Correlation Coefficient as Measuring Indices for Impulsive Noise Reduction Techniques Zayed M. Ramadan Department of Electronics and Communications Engineering, Faculty of Engineering,

More information

ECE 3800 Probabilistic Methods of Signal and System Analysis

ECE 3800 Probabilistic Methods of Signal and System Analysis ECE 3800 Probabilistic Methods of Signal and System Analysis Dr. Bradley J. Bazuin Western Michigan University College of Engineering and Applied Sciences Department of Electrical and Computer Engineering

More information

Biometric Fusion: Does Modeling Correlation Really Matter?

Biometric Fusion: Does Modeling Correlation Really Matter? To appear in Proc. of IEEE 3rd Intl. Conf. on Biometrics: Theory, Applications and Systems BTAS 9), Washington DC, September 9 Biometric Fusion: Does Modeling Correlation Really Matter? Karthik Nandakumar,

More information

Original Article Design Approach for Content-Based Image Retrieval Using Gabor-Zernike Features

Original Article Design Approach for Content-Based Image Retrieval Using Gabor-Zernike Features International Archive of Applied Sciences and Technology Volume 3 [2] June 2012: 42-46 ISSN: 0976-4828 Society of Education, India Website: www.soeagra.com/iaast/iaast.htm Original Article Design Approach

More information

IBM Research Report. The Relation between the ROC Curve and the CMC

IBM Research Report. The Relation between the ROC Curve and the CMC RC23885 (W0602-49) February 7, 2006 Mathematics IBM Research Report The Relation between the ROC Curve and the CMC R. M. Bolle, J. H. Connell, S. Pankanti, N. K. Ratha, A. W. Senior IBM Research Division

More information

Intensity Transformations and Spatial Filtering: WHICH ONE LOOKS BETTER? Intensity Transformations and Spatial Filtering: WHICH ONE LOOKS BETTER?

Intensity Transformations and Spatial Filtering: WHICH ONE LOOKS BETTER? Intensity Transformations and Spatial Filtering: WHICH ONE LOOKS BETTER? : WHICH ONE LOOKS BETTER? 3.1 : WHICH ONE LOOKS BETTER? 3.2 1 Goal: Image enhancement seeks to improve the visual appearance of an image, or convert it to a form suited for analysis by a human or a machine.

More information

Over-enhancement Reduction in Local Histogram Equalization using its Degrees of Freedom. Alireza Avanaki

Over-enhancement Reduction in Local Histogram Equalization using its Degrees of Freedom. Alireza Avanaki Over-enhancement Reduction in Local Histogram Equalization using its Degrees of Freedom Alireza Avanaki ABSTRACT A well-known issue of local (adaptive) histogram equalization (LHE) is over-enhancement

More information

Has this Person Been Encountered Before? : Modeling an Anonymous Identification System

Has this Person Been Encountered Before? : Modeling an Anonymous Identification System A version of this paper appears in the IEEE Computer Society Workshop on Biometrics at the Computer Vision and Pattern Recognition Conference (CVPR 1, Providence, RI, USA, June 1 Has this Person Been Encountered

More information

Biometric Hash based on Statistical Features of Online Signatures

Biometric Hash based on Statistical Features of Online Signatures Biometric Hash based on Statistical Features of Online Signatures Claus Vielhauer 1,2, Ralf Steinmetz 1, Astrid Mayerhöfer 3 1 Technical University Darmstadt Institute for Industrial Process- and System

More information

Gaussian Process Based Image Segmentation and Object Detection in Pathology Slides

Gaussian Process Based Image Segmentation and Object Detection in Pathology Slides Gaussian Process Based Image Segmentation and Object Detection in Pathology Slides CS 229 Final Project, Autumn 213 Jenny Hong Email: jyunhong@stanford.edu I. INTRODUCTION In medical imaging, recognizing

More information

EEL 851: Biometrics. An Overview of Statistical Pattern Recognition EEL 851 1

EEL 851: Biometrics. An Overview of Statistical Pattern Recognition EEL 851 1 EEL 851: Biometrics An Overview of Statistical Pattern Recognition EEL 851 1 Outline Introduction Pattern Feature Noise Example Problem Analysis Segmentation Feature Extraction Classification Design Cycle

More information

Efficient Algorithms for Pulse Parameter Estimation, Pulse Peak Localization And Pileup Reduction in Gamma Ray Spectroscopy M.W.Raad 1, L.

Efficient Algorithms for Pulse Parameter Estimation, Pulse Peak Localization And Pileup Reduction in Gamma Ray Spectroscopy M.W.Raad 1, L. Efficient Algorithms for Pulse Parameter Estimation, Pulse Peak Localization And Pileup Reduction in Gamma Ray Spectroscopy M.W.Raad 1, L. Cheded 2 1 Computer Engineering Department, 2 Systems Engineering

More information

When enough is enough: early stopping of biometrics error rate testing

When enough is enough: early stopping of biometrics error rate testing When enough is enough: early stopping of biometrics error rate testing Michael E. Schuckers Department of Mathematics, Computer Science and Statistics St. Lawrence University and Center for Identification

More information

Predicting large population data cumulative match characteristic performance from small population data

Predicting large population data cumulative match characteristic performance from small population data Predicting large population data cumulative match characteristic performance from small population data Amos Y. Johnson, Jie Sun, and Aaron F. Bobick GVU Center / College of Computing Georgia Tech, Atlanta,

More information

Constrained Optimization and Support Vector Machines

Constrained Optimization and Support Vector Machines Constrained Optimization and Support Vector Machines Man-Wai MAK Dept. of Electronic and Information Engineering, The Hong Kong Polytechnic University enmwmak@polyu.edu.hk http://www.eie.polyu.edu.hk/

More information

arxiv: v1 [cs.cv] 10 Feb 2016

arxiv: v1 [cs.cv] 10 Feb 2016 GABOR WAVELETS IN IMAGE PROCESSING David Bařina Doctoral Degree Programme (2), FIT BUT E-mail: xbarin2@stud.fit.vutbr.cz Supervised by: Pavel Zemčík E-mail: zemcik@fit.vutbr.cz arxiv:162.338v1 [cs.cv]

More information

A Neural Network learning Relative Distances

A Neural Network learning Relative Distances A Neural Network learning Relative Distances Alfred Ultsch, Dept. of Computer Science, University of Marburg, Germany. ultsch@informatik.uni-marburg.de Data Mining and Knowledge Discovery aim at the detection

More information

Hybrid Multi-Biometric Person Authentication System

Hybrid Multi-Biometric Person Authentication System , October 24-26, 2012, San Francisco, USA Hybrid Multi-Biometric Person Authentication System Tran Binh Long, Le Hoang Thai Abstract In this paper, the authors present a hybrid multibiometric authentication

More information

MANY digital speech communication applications, e.g.,

MANY digital speech communication applications, e.g., 406 IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 15, NO. 2, FEBRUARY 2007 An MMSE Estimator for Speech Enhancement Under a Combined Stochastic Deterministic Speech Model Richard C.

More information

SINGLE CHANNEL SPEECH MUSIC SEPARATION USING NONNEGATIVE MATRIX FACTORIZATION AND SPECTRAL MASKS. Emad M. Grais and Hakan Erdogan

SINGLE CHANNEL SPEECH MUSIC SEPARATION USING NONNEGATIVE MATRIX FACTORIZATION AND SPECTRAL MASKS. Emad M. Grais and Hakan Erdogan SINGLE CHANNEL SPEECH MUSIC SEPARATION USING NONNEGATIVE MATRIX FACTORIZATION AND SPECTRAL MASKS Emad M. Grais and Hakan Erdogan Faculty of Engineering and Natural Sciences, Sabanci University, Orhanli

More information

Case Studies of Logical Computation on Stochastic Bit Streams

Case Studies of Logical Computation on Stochastic Bit Streams Case Studies of Logical Computation on Stochastic Bit Streams Peng Li 1, Weikang Qian 2, David J. Lilja 1, Kia Bazargan 1, and Marc D. Riedel 1 1 Electrical and Computer Engineering, University of Minnesota,

More information

New image-quality measure based on wavelets

New image-quality measure based on wavelets Journal of Electronic Imaging 19(1), 118 (Jan Mar 2) New image-quality measure based on wavelets Emil Dumic Sonja Grgic Mislav Grgic University of Zagreb Faculty of Electrical Engineering and Computing

More information

Statistical Filters for Crowd Image Analysis

Statistical Filters for Crowd Image Analysis Statistical Filters for Crowd Image Analysis Ákos Utasi, Ákos Kiss and Tamás Szirányi Distributed Events Analysis Research Group, Computer and Automation Research Institute H-1111 Budapest, Kende utca

More information

What is Image Deblurring?

What is Image Deblurring? What is Image Deblurring? When we use a camera, we want the recorded image to be a faithful representation of the scene that we see but every image is more or less blurry, depending on the circumstances.

More information

Open Access Measuring Method for Diameter of Bearings Based on the Edge Detection Using Zernike Moment

Open Access Measuring Method for Diameter of Bearings Based on the Edge Detection Using Zernike Moment Send Orders for Reprints to reprints@benthamscience.ae 114 The Open Automation and Control Systems Journal, 2015, 7, 114-119 Open Access Measuring Method for Diameter of Bearings Based on the Edge Detection

More information

A Laplacian of Gaussian-based Approach for Spot Detection in Two-Dimensional Gel Electrophoresis Images

A Laplacian of Gaussian-based Approach for Spot Detection in Two-Dimensional Gel Electrophoresis Images A Laplacian of Gaussian-based Approach for Spot Detection in Two-Dimensional Gel Electrophoresis Images Feng He 1, Bangshu Xiong 1, Chengli Sun 1, Xiaobin Xia 1 1 Key Laboratory of Nondestructive Test

More information

HST.582J / 6.555J / J Biomedical Signal and Image Processing Spring 2007

HST.582J / 6.555J / J Biomedical Signal and Image Processing Spring 2007 MIT OpenCourseWare http://ocw.mit.edu HST.582J / 6.555J / 16.456J Biomedical Signal and Image Processing Spring 2007 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.

More information

Wavelet Decomposition in Laplacian Pyramid for Image Fusion

Wavelet Decomposition in Laplacian Pyramid for Image Fusion International Journal of Signal Processing Systems Vol. 4, No., February 06 Wavelet Decomposition in Laplacian Pyramid for Image Fusion I. S. Wahyuni Laboratory Lei, University of Burgundy, Dijon, France

More information

Simultaneous Multi-frame MAP Super-Resolution Video Enhancement using Spatio-temporal Priors

Simultaneous Multi-frame MAP Super-Resolution Video Enhancement using Spatio-temporal Priors Simultaneous Multi-frame MAP Super-Resolution Video Enhancement using Spatio-temporal Priors Sean Borman and Robert L. Stevenson Department of Electrical Engineering, University of Notre Dame Notre Dame,

More information

ARTIFICIAL NEURAL NETWORK WITH HYBRID TAGUCHI-GENETIC ALGORITHM FOR NONLINEAR MIMO MODEL OF MACHINING PROCESSES

ARTIFICIAL NEURAL NETWORK WITH HYBRID TAGUCHI-GENETIC ALGORITHM FOR NONLINEAR MIMO MODEL OF MACHINING PROCESSES International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 4, April 2013 pp. 1455 1475 ARTIFICIAL NEURAL NETWORK WITH HYBRID TAGUCHI-GENETIC

More information

Feature Extraction Using Zernike Moments

Feature Extraction Using Zernike Moments Feature Extraction Using Zernike Moments P. Bhaskara Rao Department of Electronics and Communication Engineering ST.Peter's Engineeing college,hyderabad,andhra Pradesh,India D.Vara Prasad Department of

More information

Echo cancellation by deforming sound waves through inverse convolution R. Ay 1 ward DeywrfmzMf o/ D/g 0001, Gauteng, South Africa

Echo cancellation by deforming sound waves through inverse convolution R. Ay 1 ward DeywrfmzMf o/ D/g 0001, Gauteng, South Africa Echo cancellation by deforming sound waves through inverse convolution R. Ay 1 ward DeywrfmzMf o/ D/g 0001, Gauteng, South Africa Abstract This study concerns the mathematical modelling of speech related

More information

Linear Diffusion and Image Processing. Outline

Linear Diffusion and Image Processing. Outline Outline Linear Diffusion and Image Processing Fourier Transform Convolution Image Restoration: Linear Filtering Diffusion Processes for Noise Filtering linear scale space theory Gauss-Laplace pyramid for

More information

Mixture Models and EM

Mixture Models and EM Mixture Models and EM Goal: Introduction to probabilistic mixture models and the expectationmaximization (EM) algorithm. Motivation: simultaneous fitting of multiple model instances unsupervised clustering

More information

A Statistical Study of the Effectiveness of BIST Jitter Measurement Techniques

A Statistical Study of the Effectiveness of BIST Jitter Measurement Techniques A Statistical Study of the Effectiveness of BIST Jitter Measurement Techniques David Bordoley, Hieu guyen, Mani Soma Department of Electrical Engineering, University of Washington, Seattle WA {bordoley,

More information

Edge Detection in Gray Level Images Based on Non-Shannon Entropy

Edge Detection in Gray Level Images Based on Non-Shannon Entropy Edge Detection in Gray Level Images Based on Non-Shannon Entropy El-Owny, Hassan Badry Mohamed A. Department of Mathematics, Faculty of Science,Aswan University, 81528 Aswan, Egypt. Current: CIT College,

More information

A New Efficient Method for Producing Global Affine Invariants

A New Efficient Method for Producing Global Affine Invariants A New Efficient Method for Producing Global Affine Invariants Esa Rahtu, Mikko Salo 2, and Janne Heikkilä Machine Vision Group, Department of Electrical and Information Engineering, P.O. Box 45, 94 University

More information

Image Stitching II. Linda Shapiro EE/CSE 576

Image Stitching II. Linda Shapiro EE/CSE 576 Image Stitching II Linda Shapiro EE/CSE 576 RANSAC for Homography Initial Matched Points RANSAC for Homography Final Matched Points RANSAC for Homography Image Blending What s wrong? Feathering + 1 0 ramp

More information

Image Compression using DPCM with LMS Algorithm

Image Compression using DPCM with LMS Algorithm Image Compression using DPCM with LMS Algorithm Reenu Sharma, Abhay Khedkar SRCEM, Banmore -----------------------------------------------------------------****---------------------------------------------------------------

More information

Image Contrast Enhancement and Quantitative Measuring of Information Flow

Image Contrast Enhancement and Quantitative Measuring of Information Flow 6th WSEAS International Conference on Information Security and Privacy, Tenerife, Spain, December 14-16, 007 17 Contrast Enhancement and Quantitative Measuring of Information Flow ZHENGMAO YE 1, HABIB

More information

Image Stitching II. Linda Shapiro CSE 455

Image Stitching II. Linda Shapiro CSE 455 Image Stitching II Linda Shapiro CSE 455 RANSAC for Homography Initial Matched Points RANSAC for Homography Final Matched Points RANSAC for Homography Image Blending What s wrong? Feathering + 1 0 1 0

More information

Image Filtering. Slides, adapted from. Steve Seitz and Rick Szeliski, U.Washington

Image Filtering. Slides, adapted from. Steve Seitz and Rick Szeliski, U.Washington Image Filtering Slides, adapted from Steve Seitz and Rick Szeliski, U.Washington The power of blur All is Vanity by Charles Allen Gillbert (1873-1929) Harmon LD & JuleszB (1973) The recognition of faces.

More information

Modeling Multiscale Differential Pixel Statistics

Modeling Multiscale Differential Pixel Statistics Modeling Multiscale Differential Pixel Statistics David Odom a and Peyman Milanfar a a Electrical Engineering Department, University of California, Santa Cruz CA. 95064 USA ABSTRACT The statistics of natural

More information

A Confidence-Based Late Fusion Framework For Audio-Visual Biometric Identification

A Confidence-Based Late Fusion Framework For Audio-Visual Biometric Identification Pattern Recognition Letters journal homepage: www.elsevier.com A Confidence-Based Late Fusion Framework For Audio-Visual Biometric Identification Mohammad Rafiqul Alam a,, Mohammed Bennamoun a, Roberto

More information