RAMAKRISHNA LANKA MSEE, UTA ADVISING PROFESSOR: DR. K. R. RAO
|
|
- Ambrose Lloyd
- 5 years ago
- Views:
Transcription
1
2 RAMAKRISHNA LANKA MSEE, UTA ADVISING PROFESSOR: DR. K. R. RAO
3 Personal identity management 3 Exponential growth of population and migration of people is a challenge to person management. Risk of identity theft. Crucial societal applications are based on personal identity. Personal attributes define the unique identity.
4 Personal identity management 4 Aishwarya Rai Figure 1: Traditional schemes to validate individuals [1] Figure 2: Biometrics to validate individuals [1]
5 Need for biometrics 5 Traditional person recognition relies on surrogate representations of identity. Knowledge based person recognition mechanisms like PINs and passwords are not reliable. Biometric recognition, or simply biometrics, offers a natural and more reliable solution. Biometric identifiers are inherent.
6 Biometric Systems 6 The term biometrics is derived from the Greek words bio (life) and metric (to measure). Biometrics is the measurable biological and behavioral trait unique to a person. Examples: fingerprints, face, iris, voice, gait, or the Deoxyribonucleic acid (DNA).
7 Biometric Systems 7 There are 2 phases to a biometric system: Enrollment Recognition The biometric system consists of 4 basis components: Sensor Feature extractor Database Matcher
8 Biometric Systems 8 Figure 3: Block diagram of a biometric system [1]
9 The Fingerprint biometric 9 Finger-scan technology is a widely deployed biometric technology. The fingerprint biometric is highly accurate and versatile. Low-cost and small-size of fingerprint acquisition devices. Figure 4: Smooth skin [1] Figure 5: Friction ridge skin on the fingertips [1]
10 The Fingerprint biometric How it works Fingerprint recognition is feature-based. For optimal feature extraction, the image is enhanced and thinned to one pixel wide. 10 Figure 6: Grayscale fingerprint image [1] Figure 7: Thinned fingerprint image [1] Figure 8: Ridge ending and bifurcation [1]
11 The Fingerprint biometric How it works A minutiae set is an abstract representation of the ridge skeleton. The minutiae set is then matched with a template to compute the match score. 11 Figure 9: Minutiae matching process [1] Figure 10: A genuine pair with maximum matched minutiae [1] Figure 11: An imposter pair with very few matched minutiae [1]
12 The Fingerprint biometric Need for image enhancement Lack of robustness against image quality degradation. Several factors determine the quality of a fingerprint image. In an ideal fingerprint image, ridges and valleys alternate and flow in a locally constant direction. Poor quality images result in spurious and missed features. 12
13 The Fingerprint biometric Need for image enhancement 13 Figure 12: Examples of low quality fingerprint images: (a) dry finger, (b) wet finger, and (c) finger with many creases [1].
14 Fingerprint image enhancement 14 The image enhancement is carried out in either spatial or frequency domain. Spatial domain. g(x,y)=t[f(x,y)] Frequency domain. g(x,y)= τ^(-1) [H(u,v)F(u,v)] Figure 13: Fingerprint image enhancement process [14]
15 Tuned Gabor filtering 15 The state of the art fingerprint enhancement technique is employed by L. Hong et al. [16]. Principle: Convolution of the image with Gabor filter. The filter is tuned to the local ridge orientation and ridge frequency.
16 Tuned Gabor filtering 16 Figure 14: Flowchart of the L. Hong et al. fingerprint enhancement algorithm [13]
17 Tuned Gabor filtering - Normalization Normalization is used to standardize the intensity values in an image. Normalization does not change the ridge structures in a fingerprint. 17 Figure 15: The result of normalization. (a) Input image. (b) Normalized image [13]
18 Tuned Gabor filtering - Orientation image estimation 18 The orientation image is an intrinsic property of the fingerprint images. Figure 16: Orientation estimation at pixel (x,y) [13] Divide the image into blocks of size w x w. Compute gradients Vx(i,j) and Vy(i,j) at each pixel (i,j). Estimate the local orientation of each block centered at pixel (i,j)
19 Tuned Gabor filtering Frequency image estimation 19 Local ridge frequency is another intrinsic property of a fingerprint image. The gray levels along ridges and valleys are modeled as a sinusoidal wave along the local ridge orientation. The image is divided into blocks of size wxw. The x-signature X[0],X[1],,X[l-1] of the ridges and valleys within the window is computed. The frequency of ridges and valleys can be estimated from the x-signature.
20 Tuned Gabor filtering Frequency image estimation 20 w 1 X k = 1 w d=0 G u, v, k = 0,1,., l 1 u = i + ቇ ቆd w 2 coso i, j + ൭k l ൱ 2 sino i, j v = j + ቇ ቆd w 2 sino i, j + ቆ l ቇ 2 k coso i, j Figure 17: Oriented window method to estimate the ridge frequency [13]
21 Tuned Gabor filtering Filtering The estimated frequency and orientation in a fingerprint image provide useful information which helps in removing undesired noise. A bandpass filter that is tuned to the estimation can efficiently remove noise and preserve the true ridge and valley structures. Gabor filters have both frequencyselective and orientation-selective properties. 21
22 Tuned Gabor filtering Filtering The general form of a Gabor filter is: h x, y: φ, f = exp 1 2 x 2 2 δ2 + y x δ2 y cos 2πfx The enhanced image E is obtained by: E i, j = σ u= wg 2 wg σ 2 v= wg 2 h u, v: O i, j, F i, j G i u, j v wg 2 22 Tuned Gabor filtering Figure 18: Original scanned fingerprint [13] Figure 19: Enhanced fingerprint image [13]
23 Related work done 23 Ridge structures that are affected by unusual input contexts can be very complicated. Not all unrecoverable regions can be recovered, as it is difficult to accurately estimate filter parameters in bad sections. A two-stage scheme to enhance the lowquality fingerprint image in both the spatial domain and the frequency domain was proposed by J.Yang et al [9].
24 Two-stage enhancement 24 Figure 20: Flowchart of the two-stage enhancement algorithm [9]
25 Two-stage enhancement Spatial Ridge Compensation 25 The first stage performs ridge compensation along the ridges in the spatial domain. This stage increases the ridge contrast. This stage consists of three steps: Local normalization Local orientation estimation Local ridge-compensation filtering
26 Two-stage enhancement Spatial Ridge Compensation The Local normalization and orientation estimation is similar to the Tuned Gabor filter algorithm [16]. With the orientation of each sub-image estimated, a oriented rectangular window h x w is created. The ridge compensated image is: F i, j = (σ (w 1)/2 m= (w 1)/2 (h 1)/2 σ n= (h 1)/2 (((w 1) β+α) h) N(i,j )) 26 i = i + m cos O i, j j = j m sin O i, j + n sin O i, j + n cos O i, j Figure 21: Window along the local ridge orientation [9]
27 Two-stage enhancement Spatial Ridge Compensation 27 Figure 22: Original fingerprint image [9]. Figure 23: normalized image[9]. Figure 24: First-stage enhanced image[9]
28 Two-stage enhancement Frequency Bandpass Filter The result of the first spatial filter increases the ridge contrast. 28 The frequency bandpass filters used are orientation and frequency selective. The Filter used is the Gabor Filter as in the state of the art approach [16]. Figure 25: Original fingerprint image [9]. Figure 26: First stage enhanced image [9]. Figure 27: Final enhanced image [9].
29 Image pyramids 29 The task Image pyramids or multiresolution processing is to decompose images into multiple information scales. The Laplacian Pyramid Decomposition and Reconstruction (LPD and LPR) are used. The Laplacian pyramid is relevant in this study as all the relevant information is concentrated within a few frequency bands.
30 Image pyramids 30 Image pyramid coding is to low-pass filter the original image go to obtain image g1, which is a reduced version in a way that both resolution and sample density are decreased. In a similar way form g2 as a reduced version of g1, and so on. The sequence g0,g1,,gn is called the Gaussian pyramid. The decomposition method in image pyramids is known as reduce function and reconstruction is known as expand.
31 Image pyramids 31 Take an image g0 with C x R dimensions and an equivalent weighing function h, then the reduced image gl = REDUCE(gl-1) C 2 g l i, j = R 2 m= C n= R 2 2 h l m, n g l 1 2i + m, 2j + n The reconstruction gl,n = EXPAND(g(l,n-1)) C 2 g l,n i, j = R 2 m= C n= R 2 2 h l m, n g l,n 1 i m 2, j n 2 Here, l is the number of pyramid levels 0 < l < n, and (i,j) are pixel values where 0 i < C and 0 j < R [32].
32 Image pyramids 32 Figure 28: First six levels of the Gaussian pyramid for the Lena image [32].
33 Image pyramids Laplacian Image Pyramid Laplacian pyramid representation is the error images which remain when consequent layers of Gaussian pyramid images are subtracted [32]. The LPD images L0,L1.. Ln are obtained by: 33 L l = g l EXPAND g l+1 The reconstruction (LPR) is obtained by: g l = L l + EXPAND g l+1
34 Image pyramids Laplacian Image Pyramid 34 Figure 29: First four levels of the Laplacian pyramid for the Lena image [32].
35 Proposed approach Laplacian pyramid applied to Two-Stage enhancement Enhance the novel two-stage enhancement[9] by adding a LPD stage prior and LPR after. The vital ridge features are present in the 1 st and 2 nd level of the Laplacian pyramid. The original image is decomposed into 2 levels of Laplacian pyramids and each will undergo the Normalization and Gabor filtering. 35
36 Proposed approach Laplacian pyramid decomposition 36 g0 L0 g1 L1 Figure 29: Generation of the Laplacian pyramid decomposed images. g2
37 Proposed approach Laplacian pyramid applied to Two-Stage enhancement 37 Original Image Laplacian Pyramid Decomposition L0 Two-Stage Enhancement Laplacian Pyramid Reconstruction Enhanc ed image L1 Two-Stage Enhancement Figure 30: Proposed Multi-stage enhancement scheme
38 Results 38 Figure 31: Input FVC2004DB1 102 image [18] Figure 32: Level 1 Laplacian Pyramid Image Figure 33: Level 2 Laplacian Pyramid Image Figure 34: Level 1 Laplacian Pyramid enhanced Image Figure 35: Level 2 Laplacian Pyramid enhanced Image Figure 36: Final enhanced image
39 Results 39 Figure 37: Input FVC2004 DB1 105 image [18] Figure 38: State of the art enhanced image Figure 39:Two stage enhanced image Figure 40: LPD based multi-stage enhancement image
40 Results 40 Figure 42: State of the art enhanced image with distortion highlighted Figure 41: Input FVC2004DB1 102 image [18] Figure 43: LPD based multi-stage enhanced less distortion highlighted
41 Results 41 Figure 44: Input image of very bad quality FVC2004DB1 101 [18] Figure 45: State of the art enhanced image Figure 46: LPD Multistage scheme enhanced image
42 Results - Thinning 42 Input image Input image Input image Thinned Image Thinned Image Thinned Image Figure 47: Input FVC2004DB2 101 and thinned image [18] Figure 48: State of the art enhanced and thinned image Figure 49: LPD Multistage scheme enhanced and thinned image
43 Results - Minutiae 43 Minutiae Minutiae Minutiae Figure 50: Original image minutiae[18] Figure 51: State of the art enhanced image minutiae Figure 52: LPD Multistage scheme enhanced image minutiae
44 Results Minutiae ratio and time 44
45 Results Minutiae ratio 45
46 Results - Minutiae 46
47 Conclusion and Future Work The fingerprint biometric is a feature based biometric system. The feature extraction heavily relies on optimal image enhancement. A novel multi-stage enhancement scheme has been proposed which by using LPD and LPR, gives better fidelity to the ridge-valley structure of the fingerprint images. Due to the multi-tier and multi-stage approach the performance time has increased which can be vital for a real time biometric system. Future work: Optimize the Bandpass filter for the frequency domain. Use an efficient multi-threaded programming language. 47
48 Test Conditions 48 The code was developed and executed using the Mathworks MATLAB R2013a tool which uses a proprietary programming language and has support for image processing using its image processing toolbox. The fingerprint recognition v2.2 software is used for true minutiae count [36] and the Fingerprint minutiae extraction matlab code [37] to compute the total minutiae count and, ratios TMR and FMR. All the work was done on a system with following configuration: Operating System: Windows 10 Home Edition Processor: Intel(R) Core(TM) i3-3120m 2.50GHz 2.50GHz RAM: 8.00 GB System type: 64-bit Operating System, x64-based processor
49 Acronyms 49 AFIS - Automated Fingerprint Identification Systems DNA - Deoxyribonucleic acid FMR - False minutiae ratio FVC - Fingerprint verification completion LPD - Laplacian pyramid decomposition LPR - Laplacian pyramid reconstruction PIN - Personal Identification Number TMR - True minutiae ratio
50 References 50 [1] A. K. Jain, A. A. Ros, and K. NandaKumar, Introduction to Biometrics, Springer, [2] S. C. Lee, An Introduction to Identity Management, SANS Institute, March 2003 [3] Article by V.Maty aˇs and Z.R ıha on Biometric Authentication Security and Usability : [4] A. K. Jain, A. Ross, and S. Pankanti, Biometrics: A tool for information security, IEEE Trans. Info. Forensics Security, vol. 1, no. 2, pp , June [5] Article on the Overview of Biometrics: the- [6] Article on the future of Biometrics: [7] Article on types of Biometrics:
51 References 51 [8] D. Petrovska-Delacrétaz, G. Chollet, and B. Dorizzi, Guide to Biometric Reference Systems and Performance Evaluation, Springer- Verlag, [9] J.Yang, N. Xiong, and A. V. Vasilakos Two-stage enhancement scheme for lowquality fingerprint images by learning from the images IEEE transactions on Human-Machine Systems, vol. 43, no. 2, pp , Mar [10] A. K. Jain, Fundamentals of Digital Image Processing, Englewood Cliffs, NJ: Prentice Hall, [11] R.C. Gonzalez and R.E. Woods, Digital Image Processing, 3rd edition, Prentice Hall, [12] A. K. Jain, A. Ross, and S. Prabhakar, An Introduction to Biometric Recognition, IEEE Trans. Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4 20, Jan [13] L. Hong, Y. Wan, and A.K. Jain, Fingerprint image enhancement: Algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp , Aug
52 References 52 [14] D.K. Misra, S.P. Tripathi and D. Misra, A Review Report on Fingerprint Image Enhancement Techniques. International Journal of Emerging Trends & Technology in Computer Science, vol. 2, no. 2, pp , April [15] S. Greenberg, M. Aladjem, D. Kogan, and I. Dimitrov, Fingerprint image enhancement using filtering techniques, ICPR, Vol. 3, pp , Sep [16] L. Hong, A.K. Jain, S. Pankanti, and R. Bolle, Fingerprint Enhancement, Proc. First IEEE WACV, pp , Sarasota, Fla.,1996. [17] S. Chikkerur, A. N. Cartwright, and V. Govindaraju, Fingerprint enhancement using STFT analysis, IEEE Transactions on Pattern Recognition, vol. 40, no. 1, pp , Jan [18] Fingerprint Verification Competition database: [19] Article on Gabor filter: filter.html
53 References 53 [20] K.R.Rao, D.N.Kim and J.J.Hwang, Fast Fourier transform: Algorithms and applications, Heidelberg, Germany: Springer [21] MS thesis paper by S. Chakraborty on Fingerprint enhancement by directional filtering : 6.pdf [22] R.C. Gonzalez, R.E. Woods and S.L. Eddins, Digital Image Processing Using MATLAB, 2nd edition, McGraw Hill Education, [23] Z. Shi and V. Govindaraju, A chaincode based scheme for fingerprint feature extraction, IEEE Transactions on Pattern Recognition, vol. 27, no. 5, pp , Apr [24] K.G.Darpanis, Gabor Filters, York University, April [25] O. Marques, Practical Image and Video Processing Using MATLAB, 1st Edition, Wiley-IEEE Press, [26] Matlab:
54 References 54 [27] Multimedia processing course website: [28] Visual studio: [29] D. Kumar and Y. Ryu, A Brief Introduction of Biometrics and Fingerprint Payment Technology, International Journal of Advanced Science and Technology, vol. 4, pp , March [30] P.K. Shimna and B. Neethu, Fingerprint Image Enhancement Using STFT Analysis, IOSR Journal of Electronics and Communication Engineering, vol. 10, Issue 2, pp , Apr [31] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of fingerprint recognition. Springer, [32] P.J. Burt and E.H. Adelson, The Laplacian Pyramid as a Compact Image Code, IEEE Transactions on communications, vol. 31, no. 4, pp , Apr [33] H. F. D. Kunz, K. Eck, and T. Aach, "A Nonlinear Multi-Resolution Gradient- Adaptive Filter for Medical Images", In SPIE Medical Imaging, volume 5032, pages , May 2003.
55 References 55 [34] A. Jepson, Notes on Image Pyramids to attenuate noise : [35] H. Fronthaler, K. Kollreider, and J. Bigun, Local features for enhancement and minutiae extraction in fingerprints, IEEE Trans. Image Process., vol. 17, no. 3, pp , Mar [36] Fingerprint Recognition v2.2 software : Fingerprint-Verification. [37] PowerPoint presentation background image:
56
Role of Assembling Invariant Moments and SVM in Fingerprint Recognition
56 Role of Assembling Invariant Moments SVM in Fingerprint Recognition 1 Supriya Wable, 2 Chaitali Laulkar 1, 2 Department of Computer Engineering, University of Pune Sinhgad College of Engineering, Pune-411
More informationBIOMETRIC verification systems are used to verify the
86 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 1, JANUARY 2004 Likelihood-Ratio-Based Biometric Verification Asker M. Bazen and Raymond N. J. Veldhuis Abstract This paper
More informationLikelihood Ratio-Based Biometric Verification
Likelihood Ratio-Based Biometric Verification Asker M. Bazen and Raymond N.J. Veldhuis University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 27, 75 AE
More informationFingerprint Individuality
Fingerprint Individuality On the Individuality of Fingerprints, Sharat Pankanti, Anil Jain and Salil Prabhakar, IEEE Transactions on PAMI, 2002 US DOJ, Office of the Inspector General, A Review of the
More informationA Minutiae-based Fingerprint Individuality Model
A Minutiae-based Fingerprint Individuality Model Jiansheng Chen Yiu-Sang Moon Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin N.T., Hong Kong {jschen, ysmoon}@cse.cuhk.edu.hk
More information4038 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 10, OCTOBER 2005
4038 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 10, OCTOBER 2005 On Orientation and Anisotropy Estimation for Online Fingerprint Authentication Xudong Jiang, Member, IEEE Abstract Local dominant
More informationSegmentation of Overlapped Region using Morphological Processing
www.ijcsi.org 66 Segmentation of Overlapped Region using Morphological Processing Vidyadevi G Biradar, Sarojadevi H Department of ISE, Nitte Maanakshi institute of Technology Bangalore, India Department
More informationPIN-based cancelable biometrics
PIN-based cancelable biometrics Patrick Lacharme, Aude Plateaux GREYC Research lab, Ensicaen - UCBN - CNRS 6 Boulevard Maréchal Juin, 14000 Caen, France. Aude Plateaux is also with BULL SAS, France. patrick.lacharme@ensicaen.fr,
More informationSecuring BioEncoded IrisCodes Against Correlation Attacks
Securing BioEncoded IrisCodes Against Correlation Attacks Osama Ouda a,b, Norimichi Tusmura b and Toshiya Nakaguchi b a Faculty of Computers and Information Sciences, Mansoura University, Mansoura 35516,
More informationScore Normalization in Multimodal Biometric Systems
Score Normalization in Multimodal Biometric Systems Karthik Nandakumar and Anil K. Jain Michigan State University, East Lansing, MI Arun A. Ross West Virginia University, Morgantown, WV http://biometrics.cse.mse.edu
More informationEmpirical Analysis of Invariance of Transform Coefficients under Rotation
International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume, Issue 5 (May 25), PP.43-5 Empirical Analysis of Invariance of Transform Coefficients
More informationOn the Individuality of Fingerprints: Models and Methods
On the Individuality of Fingerprints: Models and Methods Dass, S., Pankanti, S., Prabhakar, S., and Zhu, Y. Abstract Fingerprint individuality is the study of the extent of uniqueness of fingerprints and
More informationFINGERPRINT ENHANCEMENT Frequency Domain
FINGERPRINT ENHANCEMENT Frequency Domain Outline Fingerprint Image Enhancement Prior Related Work Proposed Algorithm: STFT Analysis Experimental Evaluation Need for Enhancement What you see What you think
More informationIf you wish to cite this paper, please use the following reference:
This is an accepted version of a paper published in Proceedings of the st IEEE International Workshop on Information Forensics and Security (WIFS 2009). If you wish to cite this paper, please use the following
More informationWavelet Packet Based Digital Image Watermarking
Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in
More informationScore calibration for optimal biometric identification
Score calibration for optimal biometric identification (see also NIST IBPC 2010 online proceedings: http://biometrics.nist.gov/ibpc2010) AI/GI/CRV 2010, Ottawa Dmitry O. Gorodnichy Head of Video Surveillance
More informationApplication of hopfield network in improvement of fingerprint recognition process Mahmoud Alborzi 1, Abbas Toloie- Eshlaghy 1 and Dena Bazazian 2
5797 Available online at www.elixirjournal.org Computer Science and Engineering Elixir Comp. Sci. & Engg. 41 (211) 5797-582 Application hopfield network in improvement recognition process Mahmoud Alborzi
More informationClassification of Hand-Written Digits Using Scattering Convolutional Network
Mid-year Progress Report Classification of Hand-Written Digits Using Scattering Convolutional Network Dongmian Zou Advisor: Professor Radu Balan Co-Advisor: Dr. Maneesh Singh (SRI) Background Overview
More informationBiometrics: Introduction and Examples. Raymond Veldhuis
Biometrics: Introduction and Examples Raymond Veldhuis 1 Overview Biometric recognition Face recognition Challenges Transparent face recognition Large-scale identification Watch list Anonymous biometrics
More informationMultiscale Image Transforms
Multiscale Image Transforms Goal: Develop filter-based representations to decompose images into component parts, to extract features/structures of interest, and to attenuate noise. Motivation: extract
More informationReading. 3. Image processing. Pixel movement. Image processing Y R I G Q
Reading Jain, Kasturi, Schunck, Machine Vision. McGraw-Hill, 1995. Sections 4.-4.4, 4.5(intro), 4.5.5, 4.5.6, 5.1-5.4. 3. Image processing 1 Image processing An image processing operation typically defines
More informationOrientation Map Based Palmprint Recognition
Orientation Map Based Palmprint Recognition (BM) 45 Orientation Map Based Palmprint Recognition B. H. Shekar, N. Harivinod bhshekar@gmail.com, harivinodn@gmail.com India, Mangalore University, Department
More informationAnalytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System
Volume Issue 8, November 4, ISSN No.: 348 89 3 Analytical Study of Biometrics Normalization and Fusion Techniques For Designing a Multimodal System Divya Singhal, Ajay Kumar Yadav M.Tech, EC Department,
More informationCOMPUTATIONAL ALGORITHMS FOR FINGERPRINT RECOGNITION
COMPUTATIONAL ALGORITHMS FOR FINGERPRINT RECOGNITION Kluwer International Series on Biometrics Professor David D. Zhang Consulting editor Department of Computer Science Hong Kong Polytechnic University
More informationThe Detection Techniques for Several Different Types of Fiducial Markers
Vol. 1, No. 2, pp. 86-93(2013) The Detection Techniques for Several Different Types of Fiducial Markers Chuen-Horng Lin 1,*,Yu-Ching Lin 1,and Hau-Wei Lee 2 1 Department of Computer Science and Information
More informationRoadmap. Introduction to image analysis (computer vision) Theory of edge detection. Applications
Edge Detection Roadmap Introduction to image analysis (computer vision) Its connection with psychology and neuroscience Why is image analysis difficult? Theory of edge detection Gradient operator Advanced
More informationA Hybrid Model of Wavelet and Neural Network for Short Term Load Forecasting
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 4 (2014), pp. 387-394 International Research Publication House http://www.irphouse.com A Hybrid Model of
More informationA Contrario Detection of False Matches in Iris Recognition
A Contrario Detection of False Matches in Iris Recognition Marcelo Mottalli, Mariano Tepper, and Marta Mejail Departamento de Computación, Universidad de Buenos Aires, Argentina Abstract. The pattern of
More informationDigital Image Watermarking Algorithm Based on Wavelet Packet
www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department
More informationEXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMAL AREA UNDER THE FRR CURVE FOR THE HAMMING DISTANCE CLASSIFIER
17th European Signal Processing Conference (EUSIPCO 29) Glasgow, Scotland, August 24-28, 29 EXTRACTING BIOMETRIC BINARY STRINGS WITH MINIMA AREA UNER THE CURVE FOR THE HAMMING ISTANCE CASSIFIER Chun Chen,
More informationArticle (peer-reviewed)
Title Author(s) Influence of noise intensity on the spectrum of an oscillator Swain, Rabi Sankar; Gleeson, James P.; Kennedy, Michael Peter Publication date 2005-11 Original citation Type of publication
More informationSemi-parametric Distributional Models for Biometric Fusion
Semi-parametric Distributional Models for Biometric Fusion Wenmei Huang and Sarat C. Dass Department of Statistics and Probability, Michigan State University, East Lansing, MI, 48824, USA Abstract The
More informationH Optimal Nonparametric Density Estimation from Quantized Samples
H Optimal Nonparametric Density Estimation from Quantized Samples M. Nagahara 1, K. I. Sato 2, and Y. Yamamoto 1 1 Graduate School of Informatics, Kyoto University, 2 Graduate School of Economics, Kyoto
More informationRounding Transform. and Its Application for Lossless Pyramid Structured Coding ABSTRACT
Rounding Transform and Its Application for Lossless Pyramid Structured Coding ABSTRACT A new transform, called the rounding transform (RT), is introduced in this paper. This transform maps an integer vector
More informationThe New Graphic Description of the Haar Wavelet Transform
he New Graphic Description of the Haar Wavelet ransform Piotr Porwik and Agnieszka Lisowska Institute of Informatics, Silesian University, ul.b dzi ska 39, 4-00 Sosnowiec, Poland porwik@us.edu.pl Institute
More informationBiometric Security Based on ECG
Biometric Security Based on ECG Lingni Ma, J.A. de Groot and Jean-Paul Linnartz Eindhoven University of Technology Signal Processing Systems, Electrical Engineering l.ma.1@student.tue.nl j.a.d.groot@tue.nl
More informationA Modified Moment-Based Image Watermarking Method Robust to Cropping Attack
A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia
More informationPalmprint based Verification System Robust to Occlusion using Low-order Zernike Moments of Sub-images
BADRINATH, NARESH, GUPTA: PALMPRINT BASED VERIFICATION SYSTEM 1 Palmprint based Verification System Robust to Occlusion using Low-order Zernike Moments of Sub-images Badrinath G. S. badri@cse.iitk.ac.in
More informationConvolution Spatial Aliasing Frequency domain filtering fundamentals Applications Image smoothing Image sharpening
Frequency Domain Filtering Correspondence between Spatial and Frequency Filtering Fourier Transform Brief Introduction Sampling Theory 2 D Discrete Fourier Transform Convolution Spatial Aliasing Frequency
More informationResearch Article Binary Biometric Representation through Pairwise Adaptive Phase Quantization
Hindawi Publishing Corporation EURASIP Journal on Information Security Volume, Article ID 5436, 6 pages doi:.55//5436 Research Article Binary Biometric Representation through Pairwise Adaptive Phase Quantization
More informationTemplates, Image Pyramids, and Filter Banks
Templates, Image Pyramids, and Filter Banks 09/9/ Computer Vision James Hays, Brown Slides: Hoiem and others Review. Match the spatial domain image to the Fourier magnitude image 2 3 4 5 B A C D E Slide:
More informationECE533 Digital Image Processing. Embedded Zerotree Wavelet Image Codec
University of Wisconsin Madison Electrical Computer Engineering ECE533 Digital Image Processing Embedded Zerotree Wavelet Image Codec Team members Hongyu Sun Yi Zhang December 12, 2003 Table of Contents
More informationResearch Article Multimodal Personal Verification Using Likelihood Ratio for the Match Score Fusion
Hindawi Computational Intelligence and Neuroscience Volume 2017, Article ID 9345969, 9 pages https://doi.org/10.1155/2017/9345969 Research Article Multimodal Personal Verification Using Likelihood Ratio
More informationFace Recognition Using Global Gabor Filter in Small Sample Case *
ISSN 1673-9418 CODEN JKYTA8 E-mail: fcst@public2.bta.net.cn Journal of Frontiers of Computer Science and Technology http://www.ceaj.org 1673-9418/2010/04(05)-0420-06 Tel: +86-10-51616056 DOI: 10.3778/j.issn.1673-9418.2010.05.004
More informationA Modular NMF Matching Algorithm for Radiation Spectra
A Modular NMF Matching Algorithm for Radiation Spectra Melissa L. Koudelka Sensor Exploitation Applications Sandia National Laboratories mlkoude@sandia.gov Daniel J. Dorsey Systems Technologies Sandia
More informationTennis player segmentation for semantic behavior analysis
Proposta di Tennis player segmentation for semantic behavior analysis Architettura Software per Robot Mobili Vito Renò, Nicola Mosca, Massimiliano Nitti, Tiziana D Orazio, Donato Campagnoli, Andrea Prati,
More informationwhere =0,, 1, () is the sample at time index and is the imaginary number 1. Then, () is a vector of values at frequency index corresponding to the mag
Efficient Discrete Tchebichef on Spectrum Analysis of Speech Recognition Ferda Ernawan and Nur Azman Abu Abstract Speech recognition is still a growing field of importance. The growth in computing power
More informationLikelihood Ratio Based Biometric Score Fusion
1 To appear in IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007 Based Biometric Score Fusion Karthik Nandakumar, Student Member, IEEE, Yi Chen, Student Member, IEEE, Sarat C. Dass,
More informationInvariant Feature Extraction from Fingerprint Biometric Using Pseudo Zernike Moments
Invariant Feature Extraction from Biometric Using Pseudo Zernike Moments C.Lakshmi Deepika 1, Dr. A Kandaswamy 2, C. Vimal 3, and B. Sathish 4 1,2,3,4 Department of Biomedical Engineering, PSG College
More informationEvolution of Uncorrelated and Correlated Noise in Gaussian and Laplacian Image Pyramids
Proceedings of the 6th WSEAS International Conference on Signal Processing, Robotics and Automation, Corfu Island, Greece, February 16-19, 007 71 Evolution of Uncorrelated and Correlated Noise in Gaussian
More informationImage Alignment and Mosaicing
Image Alignment and Mosaicing Image Alignment Applications Local alignment: Tracking Stereo Global alignment: Camera jitter elimination Image enhancement Panoramic mosaicing Image Enhancement Original
More informationSIMPLE GABOR FEATURE SPACE FOR INVARIANT OBJECT RECOGNITION
SIMPLE GABOR FEATURE SPACE FOR INVARIANT OBJECT RECOGNITION Ville Kyrki Joni-Kristian Kamarainen Laboratory of Information Processing, Department of Information Technology, Lappeenranta University of Technology,
More informationGaussian-Shaped Circularly-Symmetric 2D Filter Banks
Gaussian-Shaped Circularly-Symmetric D Filter Bans ADU MATEI Faculty of Electronics and Telecommunications Technical University of Iasi Bldv. Carol I no.11, Iasi 756 OMAIA Abstract: - In this paper we
More informationBlur Insensitive Texture Classification Using Local Phase Quantization
Blur Insensitive Texture Classification Using Local Phase Quantization Ville Ojansivu and Janne Heikkilä Machine Vision Group, Department of Electrical and Information Engineering, University of Oulu,
More informationStudy of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking
Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,
More informationFault Tolerance Technique in Huffman Coding applies to Baseline JPEG
Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Cung Nguyen and Robert G. Redinbo Department of Electrical and Computer Engineering University of California, Davis, CA email: cunguyen,
More informationUsing Entropy and 2-D Correlation Coefficient as Measuring Indices for Impulsive Noise Reduction Techniques
Using Entropy and 2-D Correlation Coefficient as Measuring Indices for Impulsive Noise Reduction Techniques Zayed M. Ramadan Department of Electronics and Communications Engineering, Faculty of Engineering,
More informationECE 3800 Probabilistic Methods of Signal and System Analysis
ECE 3800 Probabilistic Methods of Signal and System Analysis Dr. Bradley J. Bazuin Western Michigan University College of Engineering and Applied Sciences Department of Electrical and Computer Engineering
More informationBiometric Fusion: Does Modeling Correlation Really Matter?
To appear in Proc. of IEEE 3rd Intl. Conf. on Biometrics: Theory, Applications and Systems BTAS 9), Washington DC, September 9 Biometric Fusion: Does Modeling Correlation Really Matter? Karthik Nandakumar,
More informationOriginal Article Design Approach for Content-Based Image Retrieval Using Gabor-Zernike Features
International Archive of Applied Sciences and Technology Volume 3 [2] June 2012: 42-46 ISSN: 0976-4828 Society of Education, India Website: www.soeagra.com/iaast/iaast.htm Original Article Design Approach
More informationIBM Research Report. The Relation between the ROC Curve and the CMC
RC23885 (W0602-49) February 7, 2006 Mathematics IBM Research Report The Relation between the ROC Curve and the CMC R. M. Bolle, J. H. Connell, S. Pankanti, N. K. Ratha, A. W. Senior IBM Research Division
More informationIntensity Transformations and Spatial Filtering: WHICH ONE LOOKS BETTER? Intensity Transformations and Spatial Filtering: WHICH ONE LOOKS BETTER?
: WHICH ONE LOOKS BETTER? 3.1 : WHICH ONE LOOKS BETTER? 3.2 1 Goal: Image enhancement seeks to improve the visual appearance of an image, or convert it to a form suited for analysis by a human or a machine.
More informationOver-enhancement Reduction in Local Histogram Equalization using its Degrees of Freedom. Alireza Avanaki
Over-enhancement Reduction in Local Histogram Equalization using its Degrees of Freedom Alireza Avanaki ABSTRACT A well-known issue of local (adaptive) histogram equalization (LHE) is over-enhancement
More informationHas this Person Been Encountered Before? : Modeling an Anonymous Identification System
A version of this paper appears in the IEEE Computer Society Workshop on Biometrics at the Computer Vision and Pattern Recognition Conference (CVPR 1, Providence, RI, USA, June 1 Has this Person Been Encountered
More informationBiometric Hash based on Statistical Features of Online Signatures
Biometric Hash based on Statistical Features of Online Signatures Claus Vielhauer 1,2, Ralf Steinmetz 1, Astrid Mayerhöfer 3 1 Technical University Darmstadt Institute for Industrial Process- and System
More informationGaussian Process Based Image Segmentation and Object Detection in Pathology Slides
Gaussian Process Based Image Segmentation and Object Detection in Pathology Slides CS 229 Final Project, Autumn 213 Jenny Hong Email: jyunhong@stanford.edu I. INTRODUCTION In medical imaging, recognizing
More informationEEL 851: Biometrics. An Overview of Statistical Pattern Recognition EEL 851 1
EEL 851: Biometrics An Overview of Statistical Pattern Recognition EEL 851 1 Outline Introduction Pattern Feature Noise Example Problem Analysis Segmentation Feature Extraction Classification Design Cycle
More informationEfficient Algorithms for Pulse Parameter Estimation, Pulse Peak Localization And Pileup Reduction in Gamma Ray Spectroscopy M.W.Raad 1, L.
Efficient Algorithms for Pulse Parameter Estimation, Pulse Peak Localization And Pileup Reduction in Gamma Ray Spectroscopy M.W.Raad 1, L. Cheded 2 1 Computer Engineering Department, 2 Systems Engineering
More informationWhen enough is enough: early stopping of biometrics error rate testing
When enough is enough: early stopping of biometrics error rate testing Michael E. Schuckers Department of Mathematics, Computer Science and Statistics St. Lawrence University and Center for Identification
More informationPredicting large population data cumulative match characteristic performance from small population data
Predicting large population data cumulative match characteristic performance from small population data Amos Y. Johnson, Jie Sun, and Aaron F. Bobick GVU Center / College of Computing Georgia Tech, Atlanta,
More informationConstrained Optimization and Support Vector Machines
Constrained Optimization and Support Vector Machines Man-Wai MAK Dept. of Electronic and Information Engineering, The Hong Kong Polytechnic University enmwmak@polyu.edu.hk http://www.eie.polyu.edu.hk/
More informationarxiv: v1 [cs.cv] 10 Feb 2016
GABOR WAVELETS IN IMAGE PROCESSING David Bařina Doctoral Degree Programme (2), FIT BUT E-mail: xbarin2@stud.fit.vutbr.cz Supervised by: Pavel Zemčík E-mail: zemcik@fit.vutbr.cz arxiv:162.338v1 [cs.cv]
More informationA Neural Network learning Relative Distances
A Neural Network learning Relative Distances Alfred Ultsch, Dept. of Computer Science, University of Marburg, Germany. ultsch@informatik.uni-marburg.de Data Mining and Knowledge Discovery aim at the detection
More informationHybrid Multi-Biometric Person Authentication System
, October 24-26, 2012, San Francisco, USA Hybrid Multi-Biometric Person Authentication System Tran Binh Long, Le Hoang Thai Abstract In this paper, the authors present a hybrid multibiometric authentication
More informationMANY digital speech communication applications, e.g.,
406 IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 15, NO. 2, FEBRUARY 2007 An MMSE Estimator for Speech Enhancement Under a Combined Stochastic Deterministic Speech Model Richard C.
More informationSINGLE CHANNEL SPEECH MUSIC SEPARATION USING NONNEGATIVE MATRIX FACTORIZATION AND SPECTRAL MASKS. Emad M. Grais and Hakan Erdogan
SINGLE CHANNEL SPEECH MUSIC SEPARATION USING NONNEGATIVE MATRIX FACTORIZATION AND SPECTRAL MASKS Emad M. Grais and Hakan Erdogan Faculty of Engineering and Natural Sciences, Sabanci University, Orhanli
More informationCase Studies of Logical Computation on Stochastic Bit Streams
Case Studies of Logical Computation on Stochastic Bit Streams Peng Li 1, Weikang Qian 2, David J. Lilja 1, Kia Bazargan 1, and Marc D. Riedel 1 1 Electrical and Computer Engineering, University of Minnesota,
More informationNew image-quality measure based on wavelets
Journal of Electronic Imaging 19(1), 118 (Jan Mar 2) New image-quality measure based on wavelets Emil Dumic Sonja Grgic Mislav Grgic University of Zagreb Faculty of Electrical Engineering and Computing
More informationStatistical Filters for Crowd Image Analysis
Statistical Filters for Crowd Image Analysis Ákos Utasi, Ákos Kiss and Tamás Szirányi Distributed Events Analysis Research Group, Computer and Automation Research Institute H-1111 Budapest, Kende utca
More informationWhat is Image Deblurring?
What is Image Deblurring? When we use a camera, we want the recorded image to be a faithful representation of the scene that we see but every image is more or less blurry, depending on the circumstances.
More informationOpen Access Measuring Method for Diameter of Bearings Based on the Edge Detection Using Zernike Moment
Send Orders for Reprints to reprints@benthamscience.ae 114 The Open Automation and Control Systems Journal, 2015, 7, 114-119 Open Access Measuring Method for Diameter of Bearings Based on the Edge Detection
More informationA Laplacian of Gaussian-based Approach for Spot Detection in Two-Dimensional Gel Electrophoresis Images
A Laplacian of Gaussian-based Approach for Spot Detection in Two-Dimensional Gel Electrophoresis Images Feng He 1, Bangshu Xiong 1, Chengli Sun 1, Xiaobin Xia 1 1 Key Laboratory of Nondestructive Test
More informationHST.582J / 6.555J / J Biomedical Signal and Image Processing Spring 2007
MIT OpenCourseWare http://ocw.mit.edu HST.582J / 6.555J / 16.456J Biomedical Signal and Image Processing Spring 2007 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
More informationWavelet Decomposition in Laplacian Pyramid for Image Fusion
International Journal of Signal Processing Systems Vol. 4, No., February 06 Wavelet Decomposition in Laplacian Pyramid for Image Fusion I. S. Wahyuni Laboratory Lei, University of Burgundy, Dijon, France
More informationSimultaneous Multi-frame MAP Super-Resolution Video Enhancement using Spatio-temporal Priors
Simultaneous Multi-frame MAP Super-Resolution Video Enhancement using Spatio-temporal Priors Sean Borman and Robert L. Stevenson Department of Electrical Engineering, University of Notre Dame Notre Dame,
More informationARTIFICIAL NEURAL NETWORK WITH HYBRID TAGUCHI-GENETIC ALGORITHM FOR NONLINEAR MIMO MODEL OF MACHINING PROCESSES
International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 4, April 2013 pp. 1455 1475 ARTIFICIAL NEURAL NETWORK WITH HYBRID TAGUCHI-GENETIC
More informationFeature Extraction Using Zernike Moments
Feature Extraction Using Zernike Moments P. Bhaskara Rao Department of Electronics and Communication Engineering ST.Peter's Engineeing college,hyderabad,andhra Pradesh,India D.Vara Prasad Department of
More informationEcho cancellation by deforming sound waves through inverse convolution R. Ay 1 ward DeywrfmzMf o/ D/g 0001, Gauteng, South Africa
Echo cancellation by deforming sound waves through inverse convolution R. Ay 1 ward DeywrfmzMf o/ D/g 0001, Gauteng, South Africa Abstract This study concerns the mathematical modelling of speech related
More informationLinear Diffusion and Image Processing. Outline
Outline Linear Diffusion and Image Processing Fourier Transform Convolution Image Restoration: Linear Filtering Diffusion Processes for Noise Filtering linear scale space theory Gauss-Laplace pyramid for
More informationMixture Models and EM
Mixture Models and EM Goal: Introduction to probabilistic mixture models and the expectationmaximization (EM) algorithm. Motivation: simultaneous fitting of multiple model instances unsupervised clustering
More informationA Statistical Study of the Effectiveness of BIST Jitter Measurement Techniques
A Statistical Study of the Effectiveness of BIST Jitter Measurement Techniques David Bordoley, Hieu guyen, Mani Soma Department of Electrical Engineering, University of Washington, Seattle WA {bordoley,
More informationEdge Detection in Gray Level Images Based on Non-Shannon Entropy
Edge Detection in Gray Level Images Based on Non-Shannon Entropy El-Owny, Hassan Badry Mohamed A. Department of Mathematics, Faculty of Science,Aswan University, 81528 Aswan, Egypt. Current: CIT College,
More informationA New Efficient Method for Producing Global Affine Invariants
A New Efficient Method for Producing Global Affine Invariants Esa Rahtu, Mikko Salo 2, and Janne Heikkilä Machine Vision Group, Department of Electrical and Information Engineering, P.O. Box 45, 94 University
More informationImage Stitching II. Linda Shapiro EE/CSE 576
Image Stitching II Linda Shapiro EE/CSE 576 RANSAC for Homography Initial Matched Points RANSAC for Homography Final Matched Points RANSAC for Homography Image Blending What s wrong? Feathering + 1 0 ramp
More informationImage Compression using DPCM with LMS Algorithm
Image Compression using DPCM with LMS Algorithm Reenu Sharma, Abhay Khedkar SRCEM, Banmore -----------------------------------------------------------------****---------------------------------------------------------------
More informationImage Contrast Enhancement and Quantitative Measuring of Information Flow
6th WSEAS International Conference on Information Security and Privacy, Tenerife, Spain, December 14-16, 007 17 Contrast Enhancement and Quantitative Measuring of Information Flow ZHENGMAO YE 1, HABIB
More informationImage Stitching II. Linda Shapiro CSE 455
Image Stitching II Linda Shapiro CSE 455 RANSAC for Homography Initial Matched Points RANSAC for Homography Final Matched Points RANSAC for Homography Image Blending What s wrong? Feathering + 1 0 1 0
More informationImage Filtering. Slides, adapted from. Steve Seitz and Rick Szeliski, U.Washington
Image Filtering Slides, adapted from Steve Seitz and Rick Szeliski, U.Washington The power of blur All is Vanity by Charles Allen Gillbert (1873-1929) Harmon LD & JuleszB (1973) The recognition of faces.
More informationModeling Multiscale Differential Pixel Statistics
Modeling Multiscale Differential Pixel Statistics David Odom a and Peyman Milanfar a a Electrical Engineering Department, University of California, Santa Cruz CA. 95064 USA ABSTRACT The statistics of natural
More informationA Confidence-Based Late Fusion Framework For Audio-Visual Biometric Identification
Pattern Recognition Letters journal homepage: www.elsevier.com A Confidence-Based Late Fusion Framework For Audio-Visual Biometric Identification Mohammad Rafiqul Alam a,, Mohammed Bennamoun a, Roberto
More information