Palmprint authentication using fusion of wavelet and contourlet features

Size: px
Start display at page:

Download "Palmprint authentication using fusion of wavelet and contourlet features"

Transcription

1 SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2011; 4: Published online 22 October 2010 in Wiley Online Library (wileyonlinelibrary.com)..234 SPECIAL ISSUE PAPER Palmprint authentication using fusion of wavelet and contourlet features S. M. Prasad 1, V. K. Govindan 1 and P. S. Sathidevi 2 1 Department of CSE, National Institute of Technology Calicut, Kerala , India 2 Department of ECE, National Institute of Technology Calicut, Kerala , India ABSTRACT Low resolution palmprint images consist of discriminative multisized and multidirectional principal lines and wrinkles. Intuitively, discrete wavelet transform (DWT) is a good choice to extract such patterns due to its space-frequency localization, multiresolution analysis (MRA) capability, and computational efficiency. However, most of the DWT-based palmprint recognition systems fail to report low equal error rate (EER) due to inherent limitations of DWT and shift-rotational variations in the intraclass palmprint images. This paper proposes the techniques for shift and rotation invariant feature extraction using DWT extension. The effectiveness of these techniques is tested on deliberately shifted and rotated palmprints. Further, limited directionality due to DWT is overcome by augmenting with features of contourlet transform. Contourlet transform can extract curve singularities effectively with multidirectional decomposition capability; wavelets are good in extracting point singularities. The different views of contourlet transform and DWT on palmprints motivate us to extract contourlet and wavelet features, and examine them for their individual and combined verification performances. The combined mode is found to perform well over their individual performances. The average EER (0.41%), obtained on PolyU-Online-Palmprint- Database-II (PolyU), is better than the existing wavelets/transform-based palmprint recognition approaches and comparable to the other state of the art palmprint recognition approaches. The computational burden on feature extraction and matching is substantially low thereby making the approach suitable for resource constrained environments. Copyright 2010 John Wiley & Sons, Ltd. KEYWORDS feature extraction; fusion; wavelets; contourlets; palmprint; biometrics * Correspondence S. M. Prasad, Department of CSE, National Institute of Technology Calicut, Kerala , India prasad sm@rediff.com 1. INTRODUCTION The security is emerging as a main concern of today s world. Among the various security issues, personal security is becoming prominent in the applications such as banking, visa issue, access control, and mobile computing devices. Biometric authentication, as compared to the conventional methods, is gaining prominence due to its inherent presentabality and increasing reliability. Biometrics is the measurement of physiological traits such as palmprints, finger prints and iris, and/or behavioral traits such as gait and keystroke of an individual person for personal recognition [1]. Researchers are working on most of these traits and their combinations to enhance the performance: reliability, accuracy, and speed. Palmprint has unique and stable patterns consisting of thick principal lines, moderate sized wrinkles, thin ridges, and minutiae. Moreover, discriminative principal lines and wrinkles can be extracted even from the low resolution images. In brief, palmprint has favorable set of biometric characteristics: user acceptance, distinctiveness, universality, easy to capture, and inexpensiveness [2,3]. The existing feature extraction techniques for palmprint recognition are broadly classified based on lines, appearance, texture, and other features [4,5]. Accuracy and speed are two critical factors in biometric recognition applications. These factors are traded off in most of the palmprint recognition methods. The main objective of this paper is to enhance the accuracy using inherently fast wavelet-based feature extraction. DWT has excellent space-frequency localization and MRA capability apart from the availability of excellent theoretical frame work and fast implementing algorithms [6,7]. Its usefulness in texture classification is well known. Multidirectional and multisized principal lines and wrinkles are prominent features in the low resolution palmprint images. Intuitively, DWT can be a good choice to extract such Copyright 2010 John Wiley & Sons, Ltd. 577

2 Palmprint authentication using fusion of wavelet and contourlet features S. M. Prasad, V. K. Govindan and P. S. Sathidevi patterns. Many researchers demonstrated the usefulness of DWT in palmprint recognition; most of them reported moderate accuracies [8--11]. The major drawbacks of most of the wavelet-based palmprint feature extraction methods are that they are not invariant to translational and rotational changes of the palmprint images. This is due to the inherent shift and rotation variant properties of DWT and palmprint alignment errors. Also, the limited directional decomposition of DWT may not be effective in extracting the multidirectional contour/curve like line structure in palmprints [12]. Contourlet transform is an extension to 2D DWT; recently developed by Do and Vetterli [12]. Multidirectionality, multiresolution, and anisotropy are the important properties of contourlet transform. Contourlets can effectively extract curves/contours. Contourlets see smoothness along the curves/contours; wavelets see smoothness along straight horizontal, vertical, and diagonal (HVD) lines which are seldom present in palmprints [12]. Moreover, contourlet transform is less computationally complex due to the elongated bases with flexible aspect ratio and inherent nonseperability. Despite the usage of effective alignment method to extract the palmprint regions of interest (ROIs), small Rotations and translations, particularly in the intraclass palmprints, cannot be ruled out. This leads to significant reduction in recognition accuracy. This necessitates a robust approach invariant to translations and rotations. The proposed work is an attempt in this direction. We identify two types of translational problems, that cause variations in subband energy distribution, in the DWT-based palmprint recognition systems. Firstly, subsampling causes coefficient perturbations locally even for small variations in ROI [6,13]. Secondly, shift in the corresponding coefficients (singularities) in spatial domain due to positional shift in the line structure (due to alignment errors) in the palmprint ROI [6]. The former problem can be addressed by using computationally efficient shift invariant over complete discrete wavelet transform (OCDWT) [14]. The latter problem is addressed by the proposed nonuniform partition of the detailed subbands, based on the distribution of principal lines, in the spatial domain. HVD detailed subbands emphasize HVD edges/lines, respectively [7]. Integration of HVD subbands would collectively represent edge patterns of palmprint line structure thus preserving global energy. Slightly rotated intraclass palms are likely to have same global energy. Based on this heuristic, rotation problem is addressed by the proposed integration of the intrascale detailed subbands. Further, minimization of the loss of information, in the subsampling process of DWT stage of OCDWT, is proposed to preserve the discriminating ability of the wavelet features. This is termed as modified OCDWT (MOCDWT). Principal lines are thick, smooth, and curved with a few branches. Wrinkles are smooth, short, and medium sized [2]. Many wrinkles intersect principal lines. Wavelets are effective in extracting the point singularities (large change in the adjacent pixel intensities), and piecewise straight edges, especially, when they are exactly horizontal or vertical or diagonal. DWT is used to extract these features in the form of energies. Contourlets can extract curve/contour singularities (smooth curves) with multidirectional and multiscale decomposition of ROI. The different views of wavelets and contourlets on palmprints motivate us to investigate their feature extraction and matching capability under combined mode. The present work proposes an enhanced technique for palmprint authentication incorporating: (i) minimization of information loss due to subsampling in DWT stage of OCDWT, (ii) translation (TI) and rotation invariance (RI), and (iii) fusion of wavelet and contourlet features. The experimental results on PolyU database demonstrate the effectiveness of the proposed techniques in performance enhancement. Also, the experimental results on deliberately translated and rotated ROIs demonstrate the effectiveness of the proposed invariant techniques in minimizing the errors. The remainder of the paper is organized as follows. A brief review of the related work on palmprint recognition approaches is given in Section 2. Section 3 provides an overview of the proposed system. OCDWT and contourlet transform are briefly introduced in Sections 4 and 5, respectively. Feature extraction using OCDWT and contourlet transform, and the process of fusion are described in Section 6. Experiments, results, related discussion, and comparative performance characteristics are presented in Section 7. Finally, Section 8 concludes the work. 2. RELATED WORK Palmprint feature extraction methods may be broadly classified based on lines [15--17], appearance [18--21] and texture [8--11,22--26] feature extraction, and others [5,27--30]. Prominent works in line based methods employ exclusive principal lines and wrinkles extraction using directional masks and edge detectors [15,16], and modified Radon transform [17]. Line feature extraction and matching is a difficult task and often inaccurate [21]. Appearance based or subspace methods include usage of principal component analysis (PCA), independent component analysis (ICA), linear discriminant analysis (LDA), and combination of their variants. These techniques are mostly based on projection of the high dimensional palmprint data onto the low dimensional subspace; resulting subspace coefficients are treated as features. Some researchers embed wavelets [11,20], discrete cosine transform (DCT) [19], and locality preservation [21] into the appearance-based methods in their works. They are all mostly dimensionality reduction techniques. Gabor filters and 2D Gabor phase coding were used to extract texture information for matching in [29]. Hennings et al. [28] used advanced correlation filter-based palm specific classifiers. Kong et al. [27] employed elliptical Gabor filters in different orientations to extract Fusion code. Kumar and Zhang [5] extracted texture, line, and PCA features from the same ROI; fused based on different fusion strategies. Jia et al. [30] employed modified finite 578 Security Comm. Networks 2011; 4: John Wiley & Sons, Ltd.

3 S. M. Prasad, V. K. Govindan and P. S. Sathidevi Palmprint authentication using fusion of wavelet and contourlet features Radon transform for robust line orientation code extraction; computationally complex pixel to area comparison for matching. Accuracy and speed are traded off in most of these methods. The detailed analysis of these methods is beyond the purview of this paper. This paper emphasizes wavelet-based feature extraction. Texture feature extraction methods generally transform the palmprints onto the frequency domain; features are then extracted and represented, generally, using statistical measures. Such methods, also known as transform-based methods, are computationally simple and suitable for real time applications. The proposed method falls under this category. Li et al. [23] applied discrete Fourier transform (DFT) to extract energy features in frequency domain to classify the palmprints. Kumar and Zhang [24] used DCT to extract the texture features in the form of localized DCT coefficients. DCT and DFT-based methods reported poor accuracies due to lack of space-frequency localization and MRA capabilities. Zhang and Zhang [9] used shift invariant Overcomplete wavelet expansion (OWE) to extract the principal line features in the form of wavelet coefficients. They also used wavelet coefficient context modeling to extract the line features; defined a set of wavelet-based statistical signatures for feature representation. Their work considers only global features, mostly ignoring wrinkles, and hence reported low accuracy even on a small sized database. Wu et al. [10] employed DWT and partitioned the subbands to extract wavelet energy features. In Reference [10], the detailed subbands are partitioned into non-overlapping equal sized square blocks which can reduce intraclass errors. However, due to oversize of the block, interclass errors are likely to increase. This is due to the possible overlapping of energies corresponding to the lines of interclass palms on the same block region. Undersize of the block, on the other hand, increases the intraclass errors. Chen and Xie [25] applied approximately shift invariant dual tree complex wavelet transform (DTCWT) and 2D DFT on decomposed subbands for feature extraction; SVM for classification. Chen and Kegl [26] attempted to use contourlet transform and Fourier transform to classify the palmprints. Dong et al. [31] used digital curvelet transform, which is combination of wavelet transform and ridgelet transform, for feature extraction. Butt et al. [32] applied contourlet transform for feature extraction and reported low EER using very large training set, different preprocessing, and unusual experimenting procedure. The prominent DWT-based works ignored translation and rotational problems in their works. This prompted us to propose the translation and RI techniques for palmprint recognition system to enhance the robustness. EER is reduced by minimizing the loss of information due to subsampling, which was hitherto ignored in the previous works. The EER is further reduced by fusing the wavelet and contourlet features at different levels. 3. OVERVIEW OF THE PROPOSED SYSTEM The schematic diagram of the proposed approach is shown in Figure 1. It includes preprocessing, feature extraction, matching, and classification stages. Preprocessing includes segmentation, location of invariant points, alignment, ROI extraction, lowpass filtering, and equalization. Even the good ROI extraction algorithm [29] employed may not prevent translations and rotations in ROIs. Feature extraction stage uses the proposed method to create feature templates of palmprints. That is, the palmprint template is created by combining the normalized palmprint features extracted using MOCDWT with the proposed translation and rotation invariant techniques (MOCDWT(TI + RI)) and contourlet Figure 1. Block diagram of the proposed approach. Security Comm. Networks 2011; 4: John Wiley & Sons, Ltd. 579

4 Palmprint authentication using fusion of wavelet and contourlet features S. M. Prasad, V. K. Govindan and P. S. Sathidevi transform. In the enrolment stage, registered database containing palmprint templates is created and threshold for classification is determined using the training templates. In the verification stage, the test template is compared (matching) with the registered template of claimed identity to decide on the claimed identity (classification). The match scores are generated for MOCDWT(TI + RI) and contourlet (CNT mode) features individually and in combined mode. Feature level and score level fusion schemes are employed to classify the image as genuine or impostor. M 0. { ( ) Aj h x 2 hy 2 if j<m A j+1 = ( A j h j M x ) h j M y otherwise { ( ) W H j+1 = Aj h x 2 gy 2 if j<m ( A j h j M x ) g j M y otherwise { ( ) W V j+1 = Aj g x 2 hy 2 if j<m ( A j g j M x ) h j M y otherwise (1) (2) (3) 4. OVER COMPLETE DISCRETE WAVELET TRANSFORM (OCDWT) DWT is inherently translation variant mainly due to subsampling at every scale [13]. DWT is also not rotation invariant. This leads to perturbations in detail coefficients locally even for a small shift in the input signal/image [6,13]. There are various techniques to minimize the shift variance of DWT. Among them, stationary wavelet transform (a trous algorithm) is efficient but computationally complex. Other shift invariant techniques include DTCWT [13] and OCDWT [14]. We choose OCDWT that has the computational efficiency and sparse representation inherent in the critically sampled Mallat algorithm and the shift invariance inherent in the fully sampled a trous algorithm [14]. The approach used in the proposed work is to apply the Mallat algorithm to the first M levels of an L level decomposition and then apply the a trous algorithm to the remaining (L-- M) levels. OCDWT can be seen as a generalization of the DWT, that produces the conventional DWT when M = L and produces the fully sampled a trous algorithm when M = 0. The following convolution formulae (1--4) are iterated to compute the dyadic OCDWT for 2D signals with j 0, { ( ) W D j+1 = Aj g x 2 gy 2 ( A j g j M x ) g j M y if j<m otherwise where 2 and * denote subsampling by 2 and convolution operation, respectively. j indicates decomposition scale. h x, h y, and g y, g x are lowpass and high pass analysis filters, respectively (x-row, y-column). The subbands labeled A, W, H, V, and D represent approximate, detail, HVD subbands, respectively. Note that for j M, 2 j- M --1 zeros must be padded between the jth scale filter coefficients in order to dilate the mother wavelet to restore the filter bandwidth. This is denoted as superscript (j--m) in the filter transfer functions. The functional diagram of the OCDWT is shown in Figure CONTOURLET TRANSFORM Do and Vetterli [12] recently developed the contourlet transform to overcome some of the limitations of wavelets: anisotropy, directionality, and capturing of smooth curves. Contourlet transform is implemented using double filter bank structure for obtaining sparse expansions for typical images having smooth curves/contours. In this double filter (4) Figure 2. Functional block diagram of OCDWT. 580 Security Comm. Networks 2011; 4: John Wiley & Sons, Ltd.

5 S. M. Prasad, V. K. Govindan and P. S. Sathidevi Palmprint authentication using fusion of wavelet and contourlet features Figure 3. Functional block diagram of contourlet decomposition. bank, the Laplacian pyramid (LP) is first used to capture the point discontinuities, and then followed by a directional filter bank (DFB) to link point discontinuities into linear structures. The over all result is an image expansion using basic elements like contour segments, and, thus named as contourlets. Also, contourlets have elongated supports at various scales, directions, and aspect ratios. This allows contourlets to efficiently approximate a smooth contour at multiple resolutions. Figure 3 shows a multiscale and directional decomposition using a combination of an LP and DFB. Bandpass images from the LP are fed into DFB so that directional information can be captured and this scheme can be iterated on lowpass coarse image resulting directional subbands at multiple scales. Specifically, let a 0 [n] bethe input image. The output after the LP stage is J bandpass images, b j [n], j = 1, 2...J (fine to coarse order) and a lowpass image. That means, the jth level of the LP decomposes the image a j 1 [n] into a coarser image a j [n] and a detail image b j [n]. Each bandpass image b j [n] is further decomposed by an l j level DFB into 2 lj bandpass directional images. More on this is available in [12]. Figure 4 shows the decomposition of ROI using DWT and contourlet transform. 6. FEATURE EXTRACTION AND FUSION The feature extraction and fusion process involves the following stages (1) Feature extraction: using OCDWT, (2) Feature extraction: using contourlet transform, and (3) Fusion: feature level and match score level fusion of these features.these are explained in Sections Figure 4. (a) Palmprint ROI. (b) 3 level DWT decomposition of (a). (c) 3 level (8, 4, and 2 direction (fine to coarse levels, respectively)) contourlet decomposition of (a). Security Comm. Networks 2011; 4: John Wiley & Sons, Ltd. 581

6 Palmprint authentication using fusion of wavelet and contourlet features S. M. Prasad, V. K. Govindan and P. S. Sathidevi 6.1. Feature extraction: Using OCDWT The feature extraction using OCDWT involves the following steps (1) Modification of detailed subband coefficients (MOCDWT). (2) Non-uniform partition of detailed subbands: Translation invariant feature vector formation (F TI ). (3) Integrated subband (ISB) formation: Rotation invariant feature vector formation (F RI ).These are described briefly in the following Sections Modification of detailed subband coefficients (MOCDWT). Palmprint ROI is decomposed using OCDWT with M = 2; subsampling exists for j < M. Subsampling is a process of discarding the alternative samples of analysis filters output in DWT stage. Sampling theorem allows the reconstruction of the original signal using inverse transformation. In the proposed feature extraction application, where the question of inverse transformation does not arise, subsampling can be treated as loss of information in the spatial domain. We propose to minimize this loss by averaging the two consecutive samples instead of discarding one of them outrightly. This is depicted in Figure 5 and expressed using (5--7). The averaging is done along columns, and not along rows, to avoid changes in the coefficient values for column level convolution. ( y h j+1 [n, k] = gj [2n, k] + ygj h [2n + 1,k]) 2 W Hm (5) ( g y W Vm j+1 [n, k] = hj [2n, k] + yg hj [2n + 1,k]) 2 ( g y W Dm j+1 [n, k] = gj [2n, k] + y g gj [2n + 1,k] ) 2 where Wj+1 Hm Dm [n, k],wvm j+1 [n, k], and Wj+1 [n, k] represent modified HVD subband coefficients, respectively. yh h [2n, k] and yh h [2n + 1,k] are two consecutive coefficients. h and g represent lowpass and high pass analysis filters, respectively, and j denotes the decomposition scale. Superscript indicates filter type of prior (row) decomposition; subscript indicates column decomposition filter. The detailed subbands thus obtained are termed as modified detailed subbands (MDSB) and the corresponding transform is referred as MOCDWT Non-uniform partition of HVD subbands: translation invariant feature vector formation (F TI ). Spatial partition of subbands considers the spatialfrequency distribution of energies. In Reference [10], the subbands are partitioned into uniform sized square blocks. We found that the performance was optimum in [10] for the partition of each subband into 16 equal sized blocks; each of pixels in the first scale and proportionally in the subsequent scales. In Reference [10], we identified that the block size is over estimation as translations in ROIs, generally, do not exceed by 6--7 pixels in ROI. This large sized block minimizes intraclass errors. However, it increases the interclass errors due to the possible overlapping of energies of lines of different palms in the same block region. The palmprint line structure is non-uniformly distributed; horizontal head and heart lines are likely to lie in (6) (7) Figure 5. MOCDWT: modification of detailed subband coefficients in DWT stage of OCDWT. 582 Security Comm. Networks 2011; 4: John Wiley & Sons, Ltd.

7 S. M. Prasad, V. K. Govindan and P. S. Sathidevi Palmprint authentication using fusion of wavelet and contourlet features subbands at different scales. Integration of HVD subbands, using (11), would collectively represent edge patterns of palmprint line structure thus preserving the global energy. The subband thus formed is termed as ISB. W ISBm j [m, n] = ( W Hm j [m, n] +Wj Vm [m, n] +Wj Dm [m, n] ) 3 (11) Figure 6. Non-uniform partition. (a) ROI. (b) Intensity enhanced first level horizontal subband of (a). upper half of ROI in most of the palmprints; diagonal or vertical life line is likely to lie in the middle of the lower half of ROI. Based on this observation, we propose to have the block size to be non-uniform in its size and orientation: small-horizontal blocks in the upper half of ROI; smallvertical blocks in the middle of the lower half of ROI; and large-square blocks in the rest of the ROI. This is termed as non-uniform partition and is shown in Figure 6. Normalized energies of all the blocks of all MDSBs at different scales are computed using (8--10) and represented as F TI : translation invariant feature vector. Further, the normalized energies of all the blocks of over complete subbands are also appended to F TI. In the following equations, m and n are dimensions of the partitioned block that vary based on the orientation and size of the block and decomposition scale. E Hm ij = E Vm ij = E Dm ij = m,n m,n m,n ( W Hm ij [m, n] ) 2 ( W Vm ij [m, n] ) 2 ( W Dm ij [m, n] ) 2 (8) (9) (10) where E ij and W ij are ith block jth scale energy and subband coefficients, respectively Integrated subband (ISB) formation: rotation invariant feature vector formation (F RI ). The HVD subbands emphasize HVD line energies, respectively [7]. Perfect HVD line structure will be captured in the respective subbands. Capturing of other lines will be shared among all the subbands depending on the extent of changes/singularities in different directions. The line structure in palmprints is multidirectional and multisized; unlikely to have straight lines. The energies corresponding to these lines will be shared among different intrascale where Wj ISBm [m, n] is ISB. Rotation in the image leads to change in the distribution of coefficient energies corresponding to line structure in different subbands at the same scale. Slightly rotated intraclass palms are likely to have same global energy and hence the energy in the corresponding ISB remains almost invariant (see Figure 7). The ISBs of different scales are further non-uniformly partitioned into blocks to compute the rotation invariant normalized energy features using (12) and are represented by feature vector F RI. F TI and F RI are combined to form the wavelet based feature vector F w. E ISBm ij = To summarize: m,n ( W ISBm ij [m, n] ) 2 (12) (1) Decompose the ROI using OCDWT, with M = 2 and L = 5, and modify the detailed subband coefficients (along columns) at each scale in DWT stage to obtain MDSBs. (2) Form the ISB by averaging the intrascale HVD subbands in DWT stages. (3) Non-uniformly partition each subband (including ISB, overcomplete stage HVD subbands and second scale approximate subband) into blocks. (4) Form the feature vector containing the normalized energies of all the blocks of all MDSBs, subbands of over complete decomposition and ISBs: F W = [F TI, F RI ]. (5) This feature vector is used for training and testing (MOCDWT (TI + RI) mode) Feature extraction: using contourlet transform The ROI image is decomposed using the suitable Laplacian and directional filters into multiple levels. At each level the subbands are partitioned into blocks with the similar procedure used in partitioning subbands of OCDWT (Section 6.1.2). The normalized energy of each block is considered as a feature. A feature vector is constructed comprising of the energies of all the blocks of all levels and directions. To summarize: (6) Decompose the ROI using contourlet transform with suitable scale and directions. Security Comm. Networks 2011; 4: John Wiley & Sons, Ltd. 583

8 Palmprint authentication using fusion of wavelet and contourlet features S. M. Prasad, V. K. Govindan and P. S. Sathidevi Figure 7. ROI rotated by (a) 0, (b) 3, (c) 6, and (d) 9, and the corresponding first level ISBs (lower row). (7) Partition the each directional subband at every level into blocks. (8) Form the feature vector containing the normalized energies of all the blocks of all subbands of all levels and directions: F CT. (9) This feature vector is used for training and testing (CNT mode) Fusion DWT and contourlet transform view palmprints differently; wavelets extract point singularities while contourlets extract curve singularities effectively. Moreover, at every scale, contourlet transform provides image details in multiple directions while wavelets provide only in three directions. We employ feature level and score level fusion techniques. Under score level fusion mode, we employ both sum rule; suitable for fusion of correlated features, and product rule; suitable for complementary/weakly correlated features [5]. To summarize: (10) Feature level fusion: normalize and concatenate F W and F CT ; F COM = [F NW, F NCT ], where F COM, F NW, and F NCT are fused, normalized wavelet and contourlet feature vectors, respectively. (11) Score level fusion: the match scores obtained in the step 5 and 9 are normalized and fused using product and weighted sum rule for classification. 7. EXPERIMENTS, RESULTS, DISCUSSION, AND COMPARISON 7.1. Experiments: database and performance metrics Experiments were performed on well-known PolyU-onlinepalmprint-II database [34]. This database contains low resolution (75 dpi) palmprints from 386 classes captured using CCD camera. Every class has approximately 10 images captured from each of two sessions. False rejection ratio (FRR), false acceptance ratio (FAR), equal error rate (EER), and receiver operating characteristics (ROC) are the four important performance metrics in recognition systems. FRR is the frequency with which genuine person is rejected. FAR is the frequency with which the impostor is accepted. ERR is the error rate at which FAR and FRR become equal. ROC is the plot of FRR versus FAR. Recognition rate or accuracy (approximately equal to 1--EER) is the ratio of number of correct matches (comparisons) to total number of matches at EER in the verification systems. We use EER to interpret the performance of the proposed system. The experiments were conducted on Intel P-IV, 1.6 GHz, 512MB RAM, Windows2000, Matlab 2006a platform Verification experiments Verification is comparing a particular palmprint against the claimed identity; also known as one to one comparison. All the images of first session were considered for experimentation. The 10 images per class are further partitioned into four different training and testing datasets (or trials): (a) 3 image/class for training and remaining 7 images/class for testing; (b) 4 image/class for training and remaining 6 images/class for testing; (c) 5 image/class for training and remaining 5 images/class for testing; and (d) 6 image/class for training and remaining 4 images/class for testing. The feature vectors are formed using the proposed feature extraction techniques (OCDWT: five level decomposition with M = 2 using Haar wavelet. Contourlet transform: 9--7 and pkva filters in LP and DFB stages, respectively). Feature vectors of training set are compared with that of test set in every trail. There are comparisons (match scores) out of which 9650 are genuine comparisons and the rest are impostors in trial (c). 584 Security Comm. Networks 2011; 4: John Wiley & Sons, Ltd.

9 S. M. Prasad, V. K. Govindan and P. S. Sathidevi Palmprint authentication using fusion of wavelet and contourlet features Table I. Average EER and feature extraction time of various modes of the proposed approach and DWT [10] approach. DWT MOCDWT MOCDWT MOCDWT Method (Wu et al.[10]) OCDWT MOCDWT (TI) (RI) (TI + RI) CNT Average EER (%) Average feature extraction time (ms) The match score is said to be genuine if the comparison is between test and training feature vectors of the same class, otherwise impostor. Similarity score (1-normalized Euclidean distance) is used as match score. The average EER and average feature extraction time obtained for various OCDWT based and contourlet based feature extraction techniques are given in Table I; corresponding ROC plots are shown in Figure Invariance testing experiments The proposed translation and RI techniques are experimented with deliberately translated, rotated, and translatedrotated versions of the palmprints. First three samples (three trials) of each of the 50 palmprint classes are considered for this purpose. During ROI extraction stage, each of the 50 palmprint samples was altered according to the following patterns (for each sample). (a) Translation or shift: no translation, left alone, right alone, up alone, down alone, left-up, right-up, left-down, and right-up by 0, 4, and 8 pixels (all combinations) giving 5 5 = 25 (left-right loop [ 8:4:8] and up-down loop [ 8:4:8]) ROIs per class; totally 1250 translated ROIs. (b) Rotation: By 0, ±1, ±2, ±3... ± 9 giving ( ) = 19 (rotation loop [ 9:1:9]) ROIs per class; totally 950 rotated ROIs. (c) Translation-rotation: {(rotation loop [ 4:4:4]) (translation: left-right loop [ 4:4:4]) (translation: up-down loop [ 4:4:4])} giving 27 ROIs per class; totally 1350 translated-rotated ROIs. Verification experiments are conducted on these altered datasets with and without the proposed translation and RI techniques. The average EERs obtained over three trails are given in Table II; corresponding ROC plots are shown in Figure 9. The average EER of rotated ROIs is more as we considered wide range of rotation angles. The average EER of translated-rotated ROIs obtained is low due to smaller extent of translations and rotations. proposed invariant techniques show consistent reduction in the EER irrespective of the extent of rotations and translations Fusion The CNT and MOCDWT (TI + RI) features were examined for their individual and combined performance. Under combined performance test, feature level fusion and score level fusion strategies were used to classify the palmprint as genuine or impostor. In feature level fusion, the CNT and MOCDWT (TI + RI) features were normalized in order to maintain the common range. The min--max normalization rule, considered as simple and efficient normalization rule [33], was employed in our approach and it is given in (13). f = f min(f) max(f) min(f) (13) Figure 8. ROC plots for various modes. (a) DWT, OCDWT, MOCDWT, MOCDWT (TI + RI), and CNT. (b) MOCDWT with the proposed invariant techniques. Security Comm. Networks 2011; 4: John Wiley & Sons, Ltd. 585

10 Palmprint authentication using fusion of wavelet and contourlet features S. M. Prasad, V. K. Govindan and P. S. Sathidevi Table II. Average EER: translated, rotated, and translated-rotated ROIs. ROIs Translated ROIs Rotated ROIs Translated -rotated ROIs Feature extraction technique used MOCDWT(TI) MOCDWT(RI) MOCDWT (TI + RI) Average EER (%) Without the proposed invariance technique With the proposed invariance technique Table III. Average EER: MOCDWT, CNT, and combined modes. Method MOCDWT (average EER (%)) CNT (average EER (%)) Combined mode (average EER (%)) Score level fusion Feature level fusion Sum rule Product rule Without TI and RI With the proposed TI and RI techniques where, f, f, and F are feature, normalized feature and feature vector, respectively. We also investigated the combined mode performance using score level fusion as it is considered as effective for correlated features [5]. Both weighted sum and product rules were employed. Product rule performed better with the lowest average EER for eight orientations/directions in each contourlet decomposition level. With fewer (less than eight) contourlet orientations, sum rule had shown slightly better performance. The EERs of combined mode are given in Table III and the corresponding ROC plots are shown in Figures 10 and 11. Figure 9. ROC plots of deliberately altered ROIs with and without the proposed invariant techniques: (a) translated ROIs, (b) rotated ROIs, and (c) translated -rotated ROIs. 586 Security Comm. Networks 2011; 4: John Wiley & Sons, Ltd.

11 S. M. Prasad, V. K. Govindan and P. S. Sathidevi Palmprint authentication using fusion of wavelet and contourlet features Figure 10. ROC plots of combined (fusion) mode. (a) Fusion of CNT and MODCWT (without TI and RI) features. (b) Fusion of CNT and MOCDWT (RI + TI) features Results An attempt is made to overcome the limitations of the DWTbased palmprint verification approaches in three stages. Firstly, translation and rotation invariant feature extraction techniques are proposed to enhance the robustness and hence the accuracy. Translation invariance is achieved using translation invariant OCDWT and non-uniform partition of ROIs. Approximate RI is achieved through the proposed integration of the intrascale HVD subbands at all scales of DWT. The individual and combined effect of these techniques is tested on deliberately translated and rotated ROIs. The translation and RI techniques could reduce the average EER by and 9.84%, respectively. Incorporating both the techniques could reduce the average EER by 9.02% with negligible computational burden (Table II). The important observation is that the reduction is consistent (Figure 9). Employing the invariant techniques on the actual datasets could reduce the average EERs: 10.97% by translation invariant technique; 3.48% by rotation invariant technique; and 16.30% by both (Table I and Figure 8). The relative improvement in the overall performance on actual datasets could be due to non-uniform and lower degree of translations and rotations caused by the good alignment technique. From the ROC plots (Figures 8 and 9(a) and (b)), it is evident that the translation invariance technique is more effective than RI technique. Nevertheless, the combination of these techniques is effective in reducing the average EER (Figures 8 and 9(c)) irrespective of the datasets. Secondly, presence of DWT stages in OCDWT allows us to average the consecutive samples, instead of subsampling, to minimize the loss of information. This is effective and could reduce the average EER: 6.83% without translation and RI techniques; and 22.02% with translation and RI techniques (Table I and Figure 8). Thirdly, by fusing the wavelet and contourlet features. It is observed that match score fusion under sum rule performed slightly better for fewer contourlet directional decompositions (results are not reported). This can be attributed to the correlation nature of the wavelet and contourlet features when the number of directional decompositions is approximately same, and suitability of sum rule for correlated features [5]. However, performance of the product rule is superior for more number of contourlet directional decompositions. This can be attributed to the weak correlation/complementariness of contourlet features with Figure 11. (a) Impostor and genuine score distribution plot of score fusion: Product rule (MOCDWT (TI + RI)CNT)) (lowest EER). (b) ROC plot of MOCDWT (TI + RI), CNT, PROPOSED (score fusion: product rule of (MOCDWT (TI + RI)CNT) (lowest EER)), and Wu et al.[10] approach. Security Comm. Networks 2011; 4: John Wiley & Sons, Ltd. 587

12 Palmprint authentication using fusion of wavelet and contourlet features S. M. Prasad, V. K. Govindan and P. S. Sathidevi Table IV. Comparison of the proposed method with various palmprint recognition approaches. Sl. no Category Researchers Method EER (%) Accuracy (%) Number of classes (database) and palmprint image resolution 1 Wavelet Based Zhang and Zhang [9] OWE FRR = 0 FIR = (65 dpi) Methods (2004) 2 Wu et al. [10] (2005) DWT (75 dpi) 3 Nanni and Lumini [11] DWT, PCA, ICA, 2.68 NR 72 (2008) LEM 4 Other Methods Pan and Ruan [21] ocality NR (72 dpi) (2008) preservation, PCA 5 Pan and Ruan [22] Gabor-based local NR (72 dpi) (2009) invariant features 6 Proposed OCDWT and Contourlet Transform (75 dpi) Note: NR, not reported; FIR, false identification rate; LEM, Laplacian eigen maps. wavelet features and suitability of product rule [5]. Feature fusion is always inferior to score fusion: product rule. Nevertheless, consistent reduction in the average EER is observed due to fusion in all the cases (including invariant cases): 32.00% in feature fusion; 30.63% in sum rule and 37.09% in product rule. The verification time in feature fusion, product rule and sum rule were found to be approximately 40, 60, and 88 µs, respectively, thus making the system very much suitable for fast identification applications also Discussion and comparison Table IV provides the summary of the comparison of the proposed approach with the prominent wavelet based and other state of the art approaches. For fair comparison, the approaches experimented using the databases containing the palmprint images captured in a single session and comparable resolution are considered. Further, the reported results from the competent approaches are chosen so as to avoid the possible unfairness in the comparison due to implementation uncertainties. Our approach is better among the wavelet based approaches with respect to EER. Wu et al. [10] reported 0.76% verification EER on 320 palmprint classes of the same session. Our implementation of Wu s approach, on the datasets we used, yielded an average EER of 1.99%. The higher EER of Wu s approach, in our implementation, could be due to more number of classes and different ROI extraction algorithm. In Zhang and Zhang [9], the reported classification accuracy (98%), even on a small sized dataset (50 classes), is lower than that of our approach. Nanni and Lumini [11] reported higher EER (2.68%) on 100 classes using dimensionality reduction feature extraction and feature selection algorithm. We choose prominent other state of the art approaches [21,22], and reported results thereon, to compare the performance of our approach. The researchers in [21,22] used the images captured in one session to experimentally validate their methods. Pan and Ruan [21] reported lower accuracies despite using the computationally complex dimensionality reduction technique. In Reference [22], the ROIs were filtered using Gabor filters before extracting the local invariant features and reported lower accuracy (Table IV). A few state of the art approaches reported better EER on polyu palmprint database using images of both the sessions. Such methods are likely to perform better than our approach [17,30]. However, the feature extraction and matching time of such methods [17,30] are expensive than that of our approach. Feature extraction time is more in [17,30] due to the application of Radon transform, and matching time is more in [30] due to pixel to area matching. In Reference [17], the reported feature extraction time is 430 ms, and in [30], the reported matching time is 3.9 ms (on a relatively high speed machine). The performance of our approach is likely to degrade when images of two different sessions are used due to non-uniform illumination between images of the first session and second session. This could be due to energies of false singularity points that separate normal regions and abnormally illuminated (bright/shadow) regions on ROIs. 8. CONCLUSIONS In this paper, approximately translation and rotation invariant palmprint feature extraction approach, based on DWT extension, is proposed. It is experimentally shown that non-uniform partition of HVD subbands in spatial domain provides translation invariance; integration of 588 Security Comm. Networks 2011; 4: John Wiley & Sons, Ltd.

13 S. M. Prasad, V. K. Govindan and P. S. Sathidevi Palmprint authentication using fusion of wavelet and contourlet features intrascale HVD subbands provides rotational invariance. The effectiveness of these invariant techniques is tested on deliberately translated-rotated ROIs. Minimization of information loss due to the subsampling in DWT stage is effective in reducing EER even when translation and rotation invariant techniques are employed. Further, fusion of wavelet features and contourlet features, under feature level and score level, improves EER and hence the accuracy of the system. The improvement in EER is relatively better in score fusion: product rule for more contourlet directional decompositions. The proposed approach is better than the prominent state of the art wavelet-based approaches. Also, in terms of EER, it is better than some of the state of the art computationally complex approaches. When compared to other state of the art palmprint verification approaches that reported comparable EER, our method performs better in terms of feature extraction and matching time. ACKNOWLEDGEMENTS The authors are thankful to Biometrics Research Centre, The Hong Kong Polytechnic University, for providing the PolyU Palmprint Database. REFERENCES 1. Pankanti S, Bolle RM, Jain AK. Biometrics: the future of identification. IEEE Computer 2000; 33(2): Zhang D. Palmprint Authentication. Kluwer Academic Publishers: Dordrecht, the Netherlands, 2004; Jain AK, Ross A, Pankanti S. Biometrics: a tool for information security. IEEE Transactions on Information Forensics and Security 2006; 1(2): Kong A, Zhang D, Kamel M. A survey of palmprint recognition. Pattern Recognition 2009; 42: Kumar A, Zhang D. Personal authentication using multiple palmprint representation. Pattern Recognition 2005; 38: Mallat S. Zero-crossings of a wavelet transform. IEEE Transactions on Information Theory 1991; 37(4): Daubechies I. Ten Lectures on Wavelets. SIAM: PA, 1992; Wu XQ, Wang KQ, Zhang D. Wavelet based palmprint recognition. Proceedings of the First International Conference on Machine Learning and Cybernetics, 2002; Zhang L, Zhang D. Characterization of palmprints by wavelet signatures via directional context modeling. IEEE Transactions on Systems, Man, and Cybernetics- Part B: Cybernetics 2004; 34(3): Wu XQ, Wang KQ, Zhang D. Wavelet energy feature extraction and matching for palmprint recognition. Journal of Computer Science and Technology 2005; 20(3): Nanni L, Lumini A. Wavelet decomposition tree selection for palm and face authentication. Pattern Recognition Letters 2008; 29: Do MN, Vetterli M. The contourlet transform: an efficient directional multiresolution image representation. IEEE Transactions Image on Processing 2005; 14(12): Selesnick IW, Baraniuk RG, Kingsbury NC. The dualtree complex wavelet transform. IEEE Signal Processing Magazine 2005; 22(6): Bradley AP. Shift-invariance in the discrete wavelet transform. Proceedings of VIIth Digital Image Computing: Techniques and Applications, 2003; Wu X, Wang K, Zhang D. Line feature extraction and matching in palmprint. Proceeding of the Second International Conference on Image and Graphics, 2002; Wu X, Wang K, Zhang D. A novel approach of palm-line extraction. Proceeding of the Third International Conference on Image and Graphics, 2004; Huang D, Jia W, Zhang D. Palmprint verification based on principal lines. Pattern Recognition 2008; 41: Lu G, Zhang D, Wang K. Palmprint recognition using eigenpalms features. Pattern Recognition letters 2003; 24: Jing XY, Zhang D. A face and palmprint recognition approach based on discriminant DCT feature extraction. IEEE Transactions on Systems, Man, and Cybernetics- Part B: Cybernetics 2004; 34(6): Lu GM, Wang KQ, Zhang D. Wavelet based independent component analysis for palmprint identification. IEEE Proceedings of International Conference on Machine Learning and Cybernetics 2004; 6: Pan X, Ruan Q. Palmprint recognition with improved two-dimensional locality preserving projections. Image and Vision Computing 2008; 26: Pan X, Ruan Q. Palmprint recognition using Gaborbased local invariant features. Neurocomputing 2009; 72: Li W, Zhang D, Xu Z. Palmprint identification by Fourier transform. International Journal of Pattern Recognition and Artificial Intelligence 2002; 16(4): Kumar A, Zhang D. Personal recognition using hand shape and texture. IEEE Transactions on Image Processing 2006; 15(8): Chen GY, Xie WF. Pattern recognition with SVM and dual-tree complex wavelets. Image and Vision Computing 2007; 25: Security Comm. Networks 2011; 4: John Wiley & Sons, Ltd. 589

14 Palmprint authentication using fusion of wavelet and contourlet features S. M. Prasad, V. K. Govindan and P. S. Sathidevi 26. Chen GY, Kegl B. Palmprint classification using contourlets. IEEE International Conference on Systems, Man and Cybernetics, 2007; Kong A, Zhang D, Kamel M. Palmprint identification using feature-level fusion. Pattern Recognition 2006; 39: Hennings PH, Kumar BVKV, Savvides M. Palmprint classification using multiple advanced correlation filters and palm-specific segmentation. IEEE Transactions on Information Forensics and Security 2007; 2(3): Zhang D, Kong WK, You J, Wong M. On-line palmprint identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 2003; 25(9): Jia W, Huang D, Zhang D. Palmprint verification based on robust line orientation code. Pattern Recognition 2008; 41: Dong K, Feng G, Hu D. Digital curvelet transform for palmprint recognition. Sinobiometrics LNCS 2004; Butt M, Masood H, Mumtaz M, Mansoor AB, Khan SA. Palmprint identification using contourlet transform. Second IEEE International Conference on Biometrics: Theory, Applications and System, 2008; Ross A, Nandakumar K, Jain AK. Handbook of Multibiometrics. Springer: New York, 2006; PolyU Palmprint Database, Available at: polyu.edu.hk/ biometrics 590 Security Comm. Networks 2011; 4: John Wiley & Sons, Ltd.

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:

More information

A Survey on Feature Extraction Techniques for Palmprint Identification

A Survey on Feature Extraction Techniques for Palmprint Identification International Journal Of Computational Engineering Research (ijceronline.com) Vol. 03 Issue. 12 A Survey on Feature Extraction Techniques for Palmprint Identification Sincy John 1, Kumudha Raimond 2 1

More information

CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT

CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT 145 CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT 5.1 INTRODUCTION This chapter discusses the application of enhancement technique in palmprint recognition system. Section 5.2 describes image sharpening

More information

Feature-level Fusion for Effective Palmprint Authentication

Feature-level Fusion for Effective Palmprint Authentication Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,

More information

Biometric Security System Using Palm print

Biometric Security System Using Palm print ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

7.1 INTRODUCTION Wavelet Transform is a popular multiresolution analysis tool in image processing and

7.1 INTRODUCTION Wavelet Transform is a popular multiresolution analysis tool in image processing and Chapter 7 FACE RECOGNITION USING CURVELET 7.1 INTRODUCTION Wavelet Transform is a popular multiresolution analysis tool in image processing and computer vision, because of its ability to capture localized

More information

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science

More information

Fusion of Hand Geometry and Palmprint Biometrics

Fusion of Hand Geometry and Palmprint Biometrics (Working Paper, Dec. 2003) Fusion of Hand Geometry and Palmprint Biometrics D.C.M. Wong, C. Poon and H.C. Shen * Department of Computer Science, Hong Kong University of Science and Technology, Clear Water

More information

Image Enhancement Techniques for Fingerprint Identification

Image Enhancement Techniques for Fingerprint Identification March 2013 1 Image Enhancement Techniques for Fingerprint Identification Pankaj Deshmukh, Siraj Pathan, Riyaz Pathan Abstract The aim of this paper is to propose a new method in fingerprint enhancement

More information

CHAPTER 6 RESULTS AND DISCUSSIONS

CHAPTER 6 RESULTS AND DISCUSSIONS 151 CHAPTER 6 RESULTS AND DISCUSSIONS In this chapter the performance of the personal identification system on the PolyU database is presented. The database for both Palmprint and Finger Knuckle Print

More information

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover 38 CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING Digital image watermarking can be done in both spatial domain and transform domain. In spatial domain the watermark bits directly added to the pixels of the

More information

中国科技论文在线.

中国科技论文在线. May 2005, Vol.20, No.3, pp.4 48 J. Comput. Sci. & Technol. Wavelet Energy Feature Extraction and Matching for Palmprint Recognition Xiang-Qian Wu, Kuan-Quan Wang, and David Zhang 2 School of Computer Science

More information

Palmprint Recognition in Eigen-space

Palmprint Recognition in Eigen-space Palmprint Recognition in Eigen-space Ashutosh Kumar School of Education Technology Jadavpur University Kolkata, India ashutosh_3206@yahoo.co.in Ranjan Parekh School of Education Technology Jadavpur University

More information

A Survey on Security in Palmprint Recognition: A Biometric Trait

A Survey on Security in Palmprint Recognition: A Biometric Trait A Survey on Security in Palmprint Recognition: A Biometric Trait Dhaneshwar Prasad Dewangan 1, Abhishek Pandey 2 Abstract Biometric based authentication and recognition, the science of using physical or

More information

Keywords Palmprint recognition, patterns, features

Keywords Palmprint recognition, patterns, features Volume 7, Issue 3, March 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on Palm

More information

Local Correlation-based Fingerprint Matching

Local Correlation-based Fingerprint Matching Local Correlation-based Fingerprint Matching Karthik Nandakumar Department of Computer Science and Engineering Michigan State University, MI 48824, U.S.A. nandakum@cse.msu.edu Anil K. Jain Department of

More information

A Wavelet-based Feature Selection Scheme for Palm-print Recognition

A Wavelet-based Feature Selection Scheme for Palm-print Recognition Vol.1, Issue.2, pp-278-287 ISSN: 2249-6645 A Wavelet-based Feature Selection Scheme for Palm-print Recognition Hafiz Imtiaz, Shaikh Anowarul Fattah (Department of Electrical and Electronic Engineering

More information

wavelet packet transform

wavelet packet transform Research Journal of Engineering Sciences ISSN 2278 9472 Combining left and right palmprint for enhanced security using discrete wavelet packet transform Abstract Komal Kashyap * and Ekta Tamrakar Department

More information

Palmprint recognition by using enhanced completed local binary pattern (CLBP) for personal recognition

Palmprint recognition by using enhanced completed local binary pattern (CLBP) for personal recognition Palmprint recognition by using enhanced completed local binary pattern (CLBP) for personal recognition Dr. K.N. Prakash 1, M. Satya sri lakshmi 2 1 Professor, Department of Electronics & Communication

More information

An Acceleration Scheme to The Local Directional Pattern

An Acceleration Scheme to The Local Directional Pattern An Acceleration Scheme to The Local Directional Pattern Y.M. Ayami Durban University of Technology Department of Information Technology, Ritson Campus, Durban, South Africa ayamlearning@gmail.com A. Shabat

More information

Fingerprint Matching Incorporating Ridge Features Using Contourlet Transforms

Fingerprint Matching Incorporating Ridge Features Using Contourlet Transforms Fingerprint Matching Incorporating Ridge Features Using Contourlet Transforms M.S. Keerthana 1 Student,Department of CSE, K.S.Rangasamy College Of Technology,Tiruchengode,TamilNadu, India 1 ABSTRACT: This

More information

Graph Matching Iris Image Blocks with Local Binary Pattern

Graph Matching Iris Image Blocks with Local Binary Pattern Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of

More information

Real-Time Model-Based Hand Localization for Unsupervised Palmar Image Acquisition

Real-Time Model-Based Hand Localization for Unsupervised Palmar Image Acquisition Real-Time Model-Based Hand Localization for Unsupervised Palmar Image Acquisition Ivan Fratric 1, Slobodan Ribaric 1 1 University of Zagreb, Faculty of Electrical Engineering and Computing, Unska 3, 10000

More information

Performance Analysis of Fingerprint Identification Using Different Levels of DTCWT

Performance Analysis of Fingerprint Identification Using Different Levels of DTCWT 2012 International Conference on Information and Computer Applications (ICICA 2012) IPCSIT vol. 24 (2012) (2012) IACSIT Press, Singapore Performance Analysis of Fingerprint Identification Using Different

More information

Gaussian Mixture Model Coupled with Independent Component Analysis for Palmprint Verification

Gaussian Mixture Model Coupled with Independent Component Analysis for Palmprint Verification Gaussian Mixture Model Coupled with Independent Component Analysis for Palmprint Verification Raghavendra.R, Bernadette Dorizzi, Ashok Rao, Hemantha Kumar G Abstract In this paper we present a new scheme

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

Image Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi

Image Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi Image Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi 1. Introduction The choice of a particular transform in a given application depends on the amount of

More information

234 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 2, FEBRUARY 2004

234 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 2, FEBRUARY 2004 234 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 2, FEBRUARY 2004 On Hierarchical Palmprint Coding With Multiple Features for Personal Identification in Large Databases

More information

Integrating Palmprint and Fingerprint for Identity Verification

Integrating Palmprint and Fingerprint for Identity Verification 2009 Third nternational Conference on Network and System Security ntegrating Palmprint and Fingerprint for dentity Verification Yong Jian Chin, Thian Song Ong, Michael K.O. Goh and Bee Yan Hiew Faculty

More information

Rotation Invariant Finger Vein Recognition *

Rotation Invariant Finger Vein Recognition * Rotation Invariant Finger Vein Recognition * Shaohua Pang, Yilong Yin **, Gongping Yang, and Yanan Li School of Computer Science and Technology, Shandong University, Jinan, China pangshaohua11271987@126.com,

More information

An Effective Multi-Focus Medical Image Fusion Using Dual Tree Compactly Supported Shear-let Transform Based on Local Energy Means

An Effective Multi-Focus Medical Image Fusion Using Dual Tree Compactly Supported Shear-let Transform Based on Local Energy Means An Effective Multi-Focus Medical Image Fusion Using Dual Tree Compactly Supported Shear-let Based on Local Energy Means K. L. Naga Kishore 1, N. Nagaraju 2, A.V. Vinod Kumar 3 1Dept. of. ECE, Vardhaman

More information

Palmprint Based Identification Using Principal Line Approach

Palmprint Based Identification Using Principal Line Approach Palmprint Based Identification Using Principal Line Approach Ms. Bhagyashri K. Mane, Prof. Pravin P. Kalyankar Abstract A principal line approach is used for identify accurate person based on palmprint

More information

Finger Print Enhancement Using Minutiae Based Algorithm

Finger Print Enhancement Using Minutiae Based Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and

More information

Fingerprint Matching using Gabor Filters

Fingerprint Matching using Gabor Filters Fingerprint Matching using Gabor Filters Muhammad Umer Munir and Dr. Muhammad Younas Javed College of Electrical and Mechanical Engineering, National University of Sciences and Technology Rawalpindi, Pakistan.

More information

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of

More information

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)

More information

Texture Segmentation by Windowed Projection

Texture Segmentation by Windowed Projection Texture Segmentation by Windowed Projection 1, 2 Fan-Chen Tseng, 2 Ching-Chi Hsu, 2 Chiou-Shann Fuh 1 Department of Electronic Engineering National I-Lan Institute of Technology e-mail : fctseng@ccmail.ilantech.edu.tw

More information

Robust biometric image watermarking for fingerprint and face template protection

Robust biometric image watermarking for fingerprint and face template protection Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,

More information

Ripplet: a New Transform for Feature Extraction and Image Representation

Ripplet: a New Transform for Feature Extraction and Image Representation Ripplet: a New Transform for Feature Extraction and Image Representation Dr. Dapeng Oliver Wu Joint work with Jun Xu Department of Electrical and Computer Engineering University of Florida Outline Motivation

More information

IMAGE ENHANCEMENT USING NONSUBSAMPLED CONTOURLET TRANSFORM

IMAGE ENHANCEMENT USING NONSUBSAMPLED CONTOURLET TRANSFORM IMAGE ENHANCEMENT USING NONSUBSAMPLED CONTOURLET TRANSFORM Rafia Mumtaz 1, Raja Iqbal 2 and Dr.Shoab A.Khan 3 1,2 MCS, National Unioversity of Sciences and Technology, Rawalpindi, Pakistan: 3 EME, National

More information

Verifying Fingerprint Match by Local Correlation Methods

Verifying Fingerprint Match by Local Correlation Methods Verifying Fingerprint Match by Local Correlation Methods Jiang Li, Sergey Tulyakov and Venu Govindaraju Abstract Most fingerprint matching algorithms are based on finding correspondences between minutiae

More information

A Comparative Study of Palm Print Recognition Systems

A Comparative Study of Palm Print Recognition Systems A Comparative Study of Palm Print Recognition Systems Akash Patel akash.patel@somaiya.edu Chinmayi Tidke chinmayi.t@somaiya.edu Chirag Dhamecha Mumbai India chirag.d@somaiya.edu Kavisha Shah kavisha.shah@somaiya.edu

More information

Advanced Palm Print Recognition Using Curve Let And Recursive Histogram Equalization

Advanced Palm Print Recognition Using Curve Let And Recursive Histogram Equalization African Journal of Basic & Applied Sciences 9 (4): 09-15, 017 ISSN 079-034 IDOSI Publications, 017 DOI: 10.589/idosi.ajbas.017.09.15 Advanced Palm Print Recognition Using Curve Let And Recursive Histogram

More information

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre

More information

Combined Fingerprint Minutiae Template Generation

Combined Fingerprint Minutiae Template Generation Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of

More information

Embedded Palmprint Recognition System on Mobile Devices

Embedded Palmprint Recognition System on Mobile Devices Embedded Palmprint Recognition System on Mobile Devices Yufei Han, Tieniu Tan, Zhenan Sun, and Ying Hao Center for Biometrics and Security Research National Labrotory of Pattern Recognition,Institue of

More information

FACE RECOGNITION USING FUZZY NEURAL NETWORK

FACE RECOGNITION USING FUZZY NEURAL NETWORK FACE RECOGNITION USING FUZZY NEURAL NETWORK TADI.CHANDRASEKHAR Research Scholar, Dept. of ECE, GITAM University, Vishakapatnam, AndraPradesh Assoc. Prof., Dept. of. ECE, GIET Engineering College, Vishakapatnam,

More information

Query by Fax for Content-Based Image Retrieval

Query by Fax for Content-Based Image Retrieval Query by Fax for Content-Based Image Retrieval Mohammad F. A. Fauzi and Paul H. Lewis Intelligence, Agents and Multimedia Group, Department of Electronics and Computer Science, University of Southampton,

More information

Reference Point Detection for Arch Type Fingerprints

Reference Point Detection for Arch Type Fingerprints Reference Point Detection for Arch Type Fingerprints H.K. Lam 1, Z. Hou 1, W.Y. Yau 1, T.P. Chen 1, J. Li 2, and K.Y. Sim 2 1 Computer Vision and Image Understanding Department Institute for Infocomm Research,

More information

IRIS Recognition System Based On DCT - Matrix Coefficient Lokesh Sharma 1

IRIS Recognition System Based On DCT - Matrix Coefficient Lokesh Sharma 1 Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

ICICS-2011 Beijing, China

ICICS-2011 Beijing, China An Efficient Finger-knuckle-print based Recognition System Fusing SIFT and SURF Matching Scores G S Badrinath, Aditya Nigam and Phalguni Gupta Indian Institute of Technology Kanpur INDIA ICICS-2011 Beijing,

More information

Fingerprint-Iris Fusion Based Multimodal Biometric System Using Single Hamming Distance Matcher

Fingerprint-Iris Fusion Based Multimodal Biometric System Using Single Hamming Distance Matcher International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 2, Issue 4 (February 2013) PP: 54-61 Fingerprint-Iris Fusion Based Multimodal Biometric System Using Single Hamming

More information

Linear Discriminant Analysis for 3D Face Recognition System

Linear Discriminant Analysis for 3D Face Recognition System Linear Discriminant Analysis for 3D Face Recognition System 3.1 Introduction Face recognition and verification have been at the top of the research agenda of the computer vision community in recent times.

More information

A Novel NSCT Based Medical Image Fusion Technique

A Novel NSCT Based Medical Image Fusion Technique International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 3 Issue 5ǁ May 2014 ǁ PP.73-79 A Novel NSCT Based Medical Image Fusion Technique P. Ambika

More information

Wavelet-based Contourlet Coding Using an SPIHT-like Algorithm

Wavelet-based Contourlet Coding Using an SPIHT-like Algorithm Wavelet-based Contourlet Coding Using an SPIHT-like Algorithm Ramin Eslami and Hayder Radha ECE Department, Michigan State University, East Lansing, MI 4884, USA Emails: {eslamira, radha}@egr.msu.edu Abstract

More information

FACE RECOGNITION USING INDEPENDENT COMPONENT

FACE RECOGNITION USING INDEPENDENT COMPONENT Chapter 5 FACE RECOGNITION USING INDEPENDENT COMPONENT ANALYSIS OF GABORJET (GABORJET-ICA) 5.1 INTRODUCTION PCA is probably the most widely used subspace projection technique for face recognition. A major

More information

Face Recognition using Eigenfaces SMAI Course Project

Face Recognition using Eigenfaces SMAI Course Project Face Recognition using Eigenfaces SMAI Course Project Satarupa Guha IIIT Hyderabad 201307566 satarupa.guha@research.iiit.ac.in Ayushi Dalmia IIIT Hyderabad 201307565 ayushi.dalmia@research.iiit.ac.in Abstract

More information

A Laplacian Based Novel Approach to Efficient Text Localization in Grayscale Images

A Laplacian Based Novel Approach to Efficient Text Localization in Grayscale Images A Laplacian Based Novel Approach to Efficient Text Localization in Grayscale Images Karthik Ram K.V & Mahantesh K Department of Electronics and Communication Engineering, SJB Institute of Technology, Bangalore,

More information

A COMPARISON OF WAVELET-BASED AND RIDGELET- BASED TEXTURE CLASSIFICATION OF TISSUES IN COMPUTED TOMOGRAPHY

A COMPARISON OF WAVELET-BASED AND RIDGELET- BASED TEXTURE CLASSIFICATION OF TISSUES IN COMPUTED TOMOGRAPHY A COMPARISON OF WAVELET-BASED AND RIDGELET- BASED TEXTURE CLASSIFICATION OF TISSUES IN COMPUTED TOMOGRAPHY Lindsay Semler Lucia Dettori Intelligent Multimedia Processing Laboratory School of Computer Scienve,

More information

Graph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System

Graph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System _ Graph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System K.Ramaraj 1, T.Ummal Sariba Begum 2 Research scholar, Assistant Professor in Computer Science, Thanthai Hans

More information

Image De-noising using Contoulets (A Comparative Study with Wavelets)

Image De-noising using Contoulets (A Comparative Study with Wavelets) Int. J. Advanced Networking and Applications 1210 Image De-noising using Contoulets (A Comparative Study with Wavelets) Abhay P. Singh Institute of Engineering and Technology, MIA, Alwar University of

More information

Projected Texture for Hand Geometry based Authentication

Projected Texture for Hand Geometry based Authentication Projected Texture for Hand Geometry based Authentication Avinash Sharma Nishant Shobhit Anoop Namboodiri Center for Visual Information Technology International Institute of Information Technology, Hyderabad,

More information

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Sowmya. A (Digital Electronics (MTech), BITM Ballari), Shiva kumar k.s (Associate Professor,

More information

Advanced Authentication Scheme using Multimodal Biometric Scheme

Advanced Authentication Scheme using Multimodal Biometric Scheme Advanced Authentication Scheme using Multimodal Biometric Scheme Shreya Mohan Karunya University Coimbatore, India Ephin M Karunya University Coimbatore, India Abstract: Fingerprint recognition has attracted

More information

An efficient face recognition algorithm based on multi-kernel regularization learning

An efficient face recognition algorithm based on multi-kernel regularization learning Acta Technica 61, No. 4A/2016, 75 84 c 2017 Institute of Thermomechanics CAS, v.v.i. An efficient face recognition algorithm based on multi-kernel regularization learning Bi Rongrong 1 Abstract. A novel

More information

A GENERIC FACE REPRESENTATION APPROACH FOR LOCAL APPEARANCE BASED FACE VERIFICATION

A GENERIC FACE REPRESENTATION APPROACH FOR LOCAL APPEARANCE BASED FACE VERIFICATION A GENERIC FACE REPRESENTATION APPROACH FOR LOCAL APPEARANCE BASED FACE VERIFICATION Hazim Kemal Ekenel, Rainer Stiefelhagen Interactive Systems Labs, Universität Karlsruhe (TH) 76131 Karlsruhe, Germany

More information

FILTERBANK-BASED FINGERPRINT MATCHING. Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239)

FILTERBANK-BASED FINGERPRINT MATCHING. Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239) FILTERBANK-BASED FINGERPRINT MATCHING Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239) Papers Selected FINGERPRINT MATCHING USING MINUTIAE AND TEXTURE FEATURES By Anil

More information

Palmprint Feature Extraction Based on Curvelet Transform

Palmprint Feature Extraction Based on Curvelet Transform Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 1, January 2015 Palmprint Feature Extraction Based on Curvelet Transform Feifei

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

Comparative Study of Dual-Tree Complex Wavelet Transform and Double Density Complex Wavelet Transform for Image Denoising Using Wavelet-Domain

Comparative Study of Dual-Tree Complex Wavelet Transform and Double Density Complex Wavelet Transform for Image Denoising Using Wavelet-Domain International Journal of Scientific and Research Publications, Volume 2, Issue 7, July 2012 1 Comparative Study of Dual-Tree Complex Wavelet Transform and Double Density Complex Wavelet Transform for Image

More information

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**

More information

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience Incorporating Biometric Quality In Multi-Biometrics FUSION QUALITY Julian Fierrez-Aguilar, Javier Ortega-Garcia Biometrics Research Lab. - ATVS Universidad Autónoma de Madrid, SPAIN Loris Nanni, Raffaele

More information

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 694-0784 ISSN (Print): 694-084 49 An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image Nageshkumar.M,

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017 RESEARCH ARTICLE OPEN ACCESS Iris and Palmprint Decision Fusion to Enhance Human Ali M Mayya [1], Mariam Saii [2] PhD student [1], Professor Assistance [2] Computer Engineering Tishreen University Syria

More information

Multidirectional 2DPCA Based Face Recognition System

Multidirectional 2DPCA Based Face Recognition System Multidirectional 2DPCA Based Face Recognition System Shilpi Soni 1, Raj Kumar Sahu 2 1 M.E. Scholar, Department of E&Tc Engg, CSIT, Durg 2 Associate Professor, Department of E&Tc Engg, CSIT, Durg Email:

More information

Critique: Efficient Iris Recognition by Characterizing Key Local Variations

Critique: Efficient Iris Recognition by Characterizing Key Local Variations Critique: Efficient Iris Recognition by Characterizing Key Local Variations Authors: L. Ma, T. Tan, Y. Wang, D. Zhang Published: IEEE Transactions on Image Processing, Vol. 13, No. 6 Critique By: Christopher

More information

Ordinal Palmprint Represention for Personal Identification

Ordinal Palmprint Represention for Personal Identification Ordinal Palmprint Represention for Personal Identification Zhenan Sun, Tieniu Tan, Yunhong Wang and Stan Z. Li {znsun, tnt, wangyh, szli}@nlpr.ia.ac.cn Center for Biometrics and Security Research National

More information

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric; Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints

More information

PERSONAL identification and verification both play an

PERSONAL identification and verification both play an 1 Multimodal Palmprint Biometric System using SPIHT and Radial Basis Function Djamel Samai 1, Abdallah Meraoumia 1, Salim Chitroub 2 and Noureddine Doghmane 3 1 Université Kasdi Merbah Ouargla, Laboratoire

More information

CHAPTER 5 GLOBAL AND LOCAL FEATURES FOR FACE RECOGNITION

CHAPTER 5 GLOBAL AND LOCAL FEATURES FOR FACE RECOGNITION 122 CHAPTER 5 GLOBAL AND LOCAL FEATURES FOR FACE RECOGNITION 5.1 INTRODUCTION Face recognition, means checking for the presence of a face from a database that contains many faces and could be performed

More information

Content Based Image Retrieval Using Curvelet Transform

Content Based Image Retrieval Using Curvelet Transform Content Based Image Retrieval Using Curvelet Transform Ishrat Jahan Sumana, Md. Monirul Islam, Dengsheng Zhang and Guojun Lu Gippsland School of Information Technology, Monash University Churchill, Victoria

More information

Decision Level Fusion of Face and Palmprint Images for User Identification

Decision Level Fusion of Face and Palmprint Images for User Identification XI Biennial Conference of the International Biometric Society (Indian Region) on Computational Statistics and Bio-Sciences, March 8-9, 2012 83 Decision Level Fusion of Face and Palmprint Images for User

More information

Eye Detection by Haar wavelets and cascaded Support Vector Machine

Eye Detection by Haar wavelets and cascaded Support Vector Machine Eye Detection by Haar wavelets and cascaded Support Vector Machine Vishal Agrawal B.Tech 4th Year Guide: Simant Dubey / Amitabha Mukherjee Dept of Computer Science and Engineering IIT Kanpur - 208 016

More information

An Improved CBIR Method Using Color and Texture Properties with Relevance Feedback

An Improved CBIR Method Using Color and Texture Properties with Relevance Feedback An Improved CBIR Method Using Color and Texture Properties with Relevance Feedback MS. R. Janani 1, Sebhakumar.P 2 Assistant Professor, Department of CSE, Park College of Engineering and Technology, Coimbatore-

More information

Document Text Extraction from Document Images Using Haar Discrete Wavelet Transform

Document Text Extraction from Document Images Using Haar Discrete Wavelet Transform European Journal of Scientific Research ISSN 1450-216X Vol.36 No.4 (2009), pp.502-512 EuroJournals Publishing, Inc. 2009 http://www.eurojournals.com/ejsr.htm Document Text Extraction from Document Images

More information

Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms

Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms Andreas Uhl Department of Computer Sciences University of Salzburg, Austria uhl@cosy.sbg.ac.at

More information

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ)

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) 5 MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) Contents 5.1 Introduction.128 5.2 Vector Quantization in MRT Domain Using Isometric Transformations and Scaling.130 5.2.1

More information

ADVANCED IMAGE PROCESSING METHODS FOR ULTRASONIC NDE RESEARCH C. H. Chen, University of Massachusetts Dartmouth, N.

ADVANCED IMAGE PROCESSING METHODS FOR ULTRASONIC NDE RESEARCH C. H. Chen, University of Massachusetts Dartmouth, N. ADVANCED IMAGE PROCESSING METHODS FOR ULTRASONIC NDE RESEARCH C. H. Chen, University of Massachusetts Dartmouth, N. Dartmouth, MA USA Abstract: The significant progress in ultrasonic NDE systems has now

More information

Enhanced Iris Recognition System an Integrated Approach to Person Identification

Enhanced Iris Recognition System an Integrated Approach to Person Identification Enhanced Iris Recognition an Integrated Approach to Person Identification Gaganpreet Kaur Research Scholar, GNDEC, Ludhiana. Akshay Girdhar Associate Professor, GNDEC. Ludhiana. Manvjeet Kaur Lecturer,

More information

Color and Texture Feature For Content Based Image Retrieval

Color and Texture Feature For Content Based Image Retrieval International Journal of Digital Content Technology and its Applications Color and Texture Feature For Content Based Image Retrieval 1 Jianhua Wu, 2 Zhaorong Wei, 3 Youli Chang 1, First Author.*2,3Corresponding

More information

Spatial Frequency Domain Methods for Face and Iris Recognition

Spatial Frequency Domain Methods for Face and Iris Recognition Spatial Frequency Domain Methods for Face and Iris Recognition Dept. of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh, PA 15213 e-mail: Kumar@ece.cmu.edu Tel.: (412) 268-3026

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

A Combined Method for On-Line Signature Verification

A Combined Method for On-Line Signature Verification BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0022 A Combined Method for On-Line

More information

Iris Recognition for Eyelash Detection Using Gabor Filter

Iris Recognition for Eyelash Detection Using Gabor Filter Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition

More information

A Survey Paper on Palm Prints Based Biometric Authentication System

A Survey Paper on Palm Prints Based Biometric Authentication System A Survey Paper on Palm Prints Based Biometric Authentication System Swati Verma & Pomona Mishra CSIT Durg, C.G., INDIA E-mail : swatiiverma09@gmail.com, poonampandey@csitdurg.in Abstract - In this paper

More information

Three-Dimensional Face Recognition: A Fishersurface Approach

Three-Dimensional Face Recognition: A Fishersurface Approach Three-Dimensional Face Recognition: A Fishersurface Approach Thomas Heseltine, Nick Pears, Jim Austin Department of Computer Science, The University of York, United Kingdom Abstract. Previous work has

More information

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition RESEARCH ARTICLE OPEN ACCESS Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition Manisha Sharma *, Deepa Verma** * (Department Of Electronics and Communication

More information

Digital Image Processing

Digital Image Processing Digital Image Processing Third Edition Rafael C. Gonzalez University of Tennessee Richard E. Woods MedData Interactive PEARSON Prentice Hall Pearson Education International Contents Preface xv Acknowledgments

More information