Offline Signature Recognition and Verification System using Efficient Fuzzy Kohonen Clustering Network (EFKCN) Algorithm

Size: px
Start display at page:

Download "Offline Signature Recognition and Verification System using Efficient Fuzzy Kohonen Clustering Network (EFKCN) Algorithm"

Transcription

1 Available online at ScienceDirect Procedia Computer Science 116 (2017) nd International Conference on Computer Science and Computational Intelligence 2017, ICCSCI 2017, October 2017, Bali, Indonesia Offline Signature Recognition and Verification System using Efficient Fuzzy Kohonen Clustering Network (EFKCN) Algorithm Dewi Suryani, Edy Irwansyah, Ricki Chindra Computer Science Department, School of Computer Science, Bina Nusantara University, Jl. K. H. Syahdan No. 9, DKI Jakarta, 11480, Indonesia Abstract Research on offline signature recognition still has not shown satisfactory results as the results of recent research. Therefore this study aims to proposed an offline signature recognition and verification system which employed an efficient fuzzy Kohonen clustering networks (EFKCN) 1 algorithm. The proposed recognition system and signature verification system consist of five stages including data acquisition, image processing, data normalization, clustering, and evaluation. The recognition of signature patterns using the clustering method with the EFKCN algorithm shows relatively better result with 70% accuracy compared to the accuracy of previous research results 2 which is 53%, and a good signature recognition result can be developed to assist the verification system as well as the personal data verification system as made in this study The Authors. Published by Elsevier B.V. Peer-review under responsibility of the scientific committee of the 2nd International Conference on Computer Science and Computational Intelligence Keywords: Signature Recognition, Verification System, EFKCN 1. Introduction In the present, there are several ways to check the validity of one s personal data, starting from using signature to fingerprint. Signature is a sign as a symbol of the name written by the hand and by the person himself as a personal marker. Signatures are often used in data verification either in schools, banks, corporations, hospitals, government, and much more. Due to the importance of signature function, there are many parties who want to manipulate the signatures of others. Duplicate signatures can be detrimental and included in the criminal realm. Identifying signatures can be ascertained both online and offline. Online signature recognition is used by putting a signature on the pen tablet while offline signature recognition is done by using a scanner. Until now, research on offline signature recognition still has not shown satisfactory results as the results of recent research conducted by Ahmed et al. 3. In the other hand, Bezdek et al. 4, Yang et al. 1, and Irwansyah et al. 5 are developing a fuzzy Kohonen clustering networks (FKCN) 4 and an efficient fuzzy Kohonen clustering networks (EFKCN) 1 algorithms for data clustering which in its implementation Corresponding author. Tel.: ext 2188; fax: address: eirwansyah@binus.edu The Authors. Published by Elsevier B.V. Peer-review under responsibility of the scientific committee of the 2nd International Conference on Computer Science and Computational Intelligence /j.procs

2 622 Dewi Suryani et al. / Procedia Computer Science 116 (2017) can produce a correct rate up to 92.67%. In this paper, we proposed an offline signature recognition and verification system which employed the EFKCN algorithm. Like Chaudhari et al. 2, Salambue 6, and Ainun et al. 7, we also applied Hu s seven moment variant 8 as our preprocessing method. Unlike the others, we focus on EFKCN algorithm. 2. Related Work Signature is an important part of human life. Several tasks need a signature to be completed, especially for personal authentication and verification. Due to its significant function, sometimes is misused by other people. In order to prevent that problem, many researches were done in developing a system to automatically recognize the human signatures 2,3,6,7,9. Chaudhari et al. 2 are being part of it who proposed a signature recognition system by implementing fuzzy min-max algorithm 10 in a neural network framework. In their approach, the construction of the system is begun with preprocessing data and extracting its information using data acquisition and Hu s seven moment invariant. They reported a significant improvement in the accuracy which is nearly 53% and up to 92% when increasing the signatures per class. Moreover, the study of Ismail and team 9 successfully built another recognition and verification system using principal components analysis (PCA) 11 which focuses on offline signature. They separated the process into two different tasks, i.e., the recognition that used k-nearest neighbors (k-nn) classifier and the verification that used artificial neural network (ANN). However, before both tasks running, the image preprocessing and feature extractions were applied by PCA. Their result using PCA is rising approximately 5% in false recognition rate (FRR) compared to the experiment without PCA. Furthermore, the approach of Ahmed et al. 3 concentrated in feature extraction methods for offline signature recognition and verification system. Here, they employed the projection-based of Discrete Radon Transform (DRT) as the method that consists of horizontal, vertical, and the combination of both projections. However, they need a signature preprocessing, which is done by Otsu s threshold method 12. For training the signatures data, their work implemented dynamic time warping (DWT) algorithm using Euclidean distance. By taking the advantages of the projection-based DRT, they achieved optimal performances in processing time, memory storage, and results, particularly the combination of horizontal and vertical projections. The results are measured by false rejection rate (FRR), false acceptance rate (FAR), total error rate (TER) and equal error rate (EER), i.e., 8.49, 5.60, 14.09, and 7.60 respectively, which is impressive results as a new approach. Similar to Chaudhari et al. 2 approach, Salambue 6 and Ainun et al. 7 proposed the signature recognition system which preprocessed the data using Hu s moment invariant. However, their recognition methods are different. For Salambue 6, he used the Euclidean distance algorithm as the classification and recognition method while Ainun et al. 7 utilized the radial basis function (RBF) neural network. Based on their conducted experiments, Ainun and the team gain 12% of error rate for the classification task and 20% for the recognition task. 3. Methodology Five stages of the study were carried out consisting of (1) data acquisition, (2) image processing, (3) data normalization, (4) clustering, and (5) evaluation. Data acquisition was conducted for 80 samples of signatures obtained from 8 persons with 10 different conditions in both sitting, standing, silent, and fast conditions. 50 signatures were used as training data and another 30 were used as test data. Image processing stages consist of preprocessing and feature extraction sub-stages. The preprocessing sub-stages are a series of data scan processes to Red Green Blue (RGB) format, conversion to grayscale, convert to binary image, inverted binary image, border elimination, and bounding box extraction. Grayscale image is a blend of gray color variations. From black at the lowest intensity to white at the highest intensity. To get the intensity value by using the following formula: grayscale = R G B (1) Border elimination function to make the signatures look more unified and the bounding box extract works to remove unused backgrounds, so the signature pattern looks more clear. At the feature extraction stage will be used moment

3 Dewi Suryani et al. / Procedia Computer Science 116 (2017) invariant. This method is useful for normalizing an image that changes due to scale and rotation. The respondent s signature will be normalized to: 1. Regular moment: moments obtained from boundary shapes and interior areas, converted into functions to be implemented for digital imagery. M pq = x yx p y q f (x, y) (2) 2. Center moment: centroid image is used to normalize invariant translations in the image field. X = M 10 M 00, Ȳ = M 01 M 00 (3) Furthermore, the central moment can be determined discretely as follows: M pq = x y(x X) p (Y Ȳ) q (4) 3. Normalization of the central moment: to normalize the change. n pq = µ pq µ 00 γ (5) 4. Seven non-linear function: normalize the signature of scale change, translation, and rotation. Φ 1 = n 20 + n 02 Φ 2 = (n 20 + n 02 ) n Φ 3 = (n n 12 ) 2 + (n n 21 ) 2 Φ 4 = (n 30 + n 12 ) 2 (n n 21 ) 2 Φ 5 = (3n 30 3n 12 )(n 30 + n 12 )[(n 30 + n 12 ) 2 3(n n 03 ) 2 ](n 21 n 03 )(n 21 + n 03 )x[3(n 30 + n 12 ) 2 (n 21 + n 03 ) 2 ] Φ 6 = (n 20 n 02 )[(n 30 + n 12 ) 2 (n 21 + n 03 ) 2 ]4n 11 (n 30 n 12 )(n 21 + n 03 ) Φ 7 = (3n 21 n 03 )(n 30 + n 12 )[(n 30 + n 12 ) 2 3(n 21 + n 03 ) 2 ](3n 12 n 30 )(n 21 + n 03 )x[3(n 30 + n 12 ) 2 (n 21 + n 30 ) 2 ] Obtained results: Φ 1 = ; Φ 2 = ; Φ 3 = ; Φ 4 = ; Φ 5 = ; Φ 6 = ; Φ 7 = ; The invariant moment value is then normalized using min-max normalization in order to generate values in the range of 0 to 1. Having obtained the value of normalized invariant moment, then is clustering data with FKCN algorithm. This algorithm combines the learning rate of Fuzzy C-Mean (FCM) algorithm and KCN s all vector update. FKCN algorithm works with following stages: 1. Compute the learning rate: m t = m 0 t m, m = (m 0 1)/t max (6) u ik,t = ( ( Xk V i,t 1 ) 2 ) 1 m 1 (7) X k V j,t 1 2. Determination of FKCN learning rate: α ik,t = (u ik,t ) m t (8)

4 624 Dewi Suryani et al. / Procedia Computer Science 116 (2017) Update all weight vector: v i,t = v i,t 1 + n k=1 α ik,t(x k v i,t 1 ) nj=1 α ij,t (9) 4. Compute: E t = V t V t 1 (10) 5. If E t < E, else t = t + 1 then back to first step. After obtaining cluster center data invariant moment invited using Euclidean distance by using cluster center FKCN. In this study used EFKCN which update the learning rate can be adjusted based on fuzzy membership to produce optimal learning rate 1,5. EFKCN improved learning rate: tu = fuzzy membership upper limit and td = the lower limit of fuzzy membership. (u ik,t ) m u, u ik,t > tu α ik,t = (u ik,t ) m t, td u ik,t tu (u ik,t ) m d, u ik,t td tu = 0.7; td = 0.3; mu = 0.4; md = 3; The clustering results are then evaluated by testing 30 signatures. The data in the form of a signature will be identified by the range of distance to the cluster center, if it is within the specified Euclidean minimum distance, the data will be recognized as the original signature and vice versa, if the signature is beyond the specified range, it is considered not as an original signature. After believed the test results show good results, then developed an application that can be used to verify access to personal data. 4. Experiment and Result Signature Data Training Sample signatures in the process by means of a scan so that the format of RGB, which is then converted into grayscale format with the aim to more easily converted into binary image. The converted binary image has a pixel value 0 for the black signature pattern and 1 for the white background. The binary image is then converted into an inverted binary image so that the black background has a pixel value of 1 and the object becomes white with pixel value 0. Eliminating the border is meant for a more unified signature pattern which can then be extracted bounding box so that the unnecessary background will be removed and only take the signature pattern. The extracted results data are then normalized using Hu s moment invariant so that it is invariant to scale, rotation, and transformation changes. Data moment invariant then normalized using min-max normalization. The functionality of the training feature is intended to select the signature to be tested in order to determine the signature owner (Fig. 1). For training needs, signatures are performed in a variety of conditions whether sitting, standing, and fast conditions. The facts show that signatures under different conditions affect the shape of the signature. Training conducted on 50 signatures from 10 respondents, obtained training results in the form of a cluster center for each signature owner as Fig. 2. The signature to be tested will be processed in order to find the Euclidean distance value to determine the cluster data center of the tested signature. If the Euclidean distance can be within a predetermined distance then the signature will go into the cluster. Before entering, the process must be through the combination of data first as can be seen in Fig. 3.

5 Dewi Suryani et al. / Procedia Computer Science 116 (2017) Fig. 1: Screen display data and training results where the left side is the results of the right side data Fig. 2: Signatures of 10 respondents used in the training. The label of each signature is attached on top of the image Table 1: Rule combination after normalization Data 1 with data 2. Data 2 with data 3. Data 3 with data 4. Data 1 with data 3. Data 2 with data 4. Data 3 with data 5. Data 1 with data 4. Data 2 with data 5. Data 3 with data 6. Data 1 with data 5. Data 2 with data 6. Data 3 with data 7. Data 1 with data 6. Data 2 with data 7. Data 1 with data 7. Data 4 with data 5. Data 5 with data 6. Data 6 with data 7. Data 4 with data 6. Data 5 with data 7. Data 4 with data 7. Seven data moment invariant that has been normalized with min-max normalization will be combined with the rules as described in Table 1. The combination rules are divided into six variants where the first rule is the merging of data 1 to data 7, then the data 2 collaborates with the data 3 to data 7 as the second rules, and so on.

6 626 Dewi Suryani et al. / Procedia Computer Science 116 (2017) Fig. 3: Screen display data clustering and training results Table 2: Accuracy signature testing data using EFKCN algorithm Cluster Signature of Respondent to- Accuracy Respondent (%) % % % % % % % % % % Accuracy Average 70% Signature Data Clustering The results of the training data are then used to test the results of signature identifiers by the clustering method. The result of clustering test with EFKCN algorithm is as can be seen in Table 2 as follows. The test results show that EFKCN is able to recognize the signatures as much as 70% with the other 30% leading to the signatures of other respondents. In the training and test data, there are 3 data that have low accuracy of 1, 3, and 8 person signatures respectively with 33.3% and 0% accuracy (based on Table 2). Although the signatures generated by each person are different but the value of feature extraction uses the person invariant moments of 1.3 and 8 are almost identical with others causing the classification of the signature to point to different clusters. The 1st person has similarity with the invariant moment value of the 6th and 9th persons, the 3rd person is similar to the 5th and 8th persons invariant value, and the 8th person has the same invariant moment with the 4th person. In Table 2, the accuracy of the training data is smaller than the accuracy of the test data. Where should the value of test accuracy is smaller than the value of training accuracy. This is because a person s signature may not always be exactly the same between one signature with another signature so, it does not rule out that the accuracy of the test results is greater than the accuracy of the training.

7 Dewi Suryani et al. / Procedia Computer Science 116 (2017) Signature Recognition for Personal Data Verification A signature recognition system with better accuracy than the previous research is then developed into an application for verification of personal data in order to limit access to personal data. The appearance of the created application is depicted in Fig. 4. Fig. 4: The application appearance with Otnel s signature as an example that does not match with the recognition result Testing of forged signatures in the case of this study is actually the property of Otnel s signature as the example. The signature does not match the personal data of each person. The signature shows the clusters of others. And the invariant moment obtained from the signature is much different. The comparison can be seen in the Fig. 4 and 5. Fig. 5: Moment invariant of Otnel s signature As we can see in Fig. 5, the comparison between invariant moments of the original signatures and the forged signature of Otnel respondents is as follows: Otnel: ; ; ; ; ; ; Forged Otnel: ; ; ; ; ; ;

8 628 Dewi Suryani et al. / Procedia Computer Science 116 (2017) Conclussion The same signature pattern of respondents may differ depending on the condition of the signature so as to allow an error in the recognition of the signature pattern. The recognition of signature patterns using the clustering method with the EFKCN algorithm shows relatively better results with 70% accuracy compared to the accuracy of previous research results 2 which is 53%. A good signature pattern recognition can be developed to assist the verification system as well as the personal data verification system made in this study. References 1. Yang, Y., Jia, Z., Chang, C., Qin, X., Li, T., Wang, H., et al. An efficient fuzzy kohonen clustering network algorithm. In: Fuzzy Systems and Knowledge Discovery, FSKD 08. Fifth International Conference on; vol. 1. IEEE; 2008, p Chaudhari, B.M., Barhate, A.A., Bhole, A.A.. Signature recognition using fuzzy min-max neural network. In: Communication and Energy Conservation 2009 International Conference on Control, Automation. 2009, p Ahmed, H., Shukla, S., Rai, H.M.. Static Handwritten Signature Recognition Using Discrete Random Transform and Combined Projection Based Technique. In: 2014 Fourth International Conference on Advanced Computing Communication Technologies. 2014, p doi: /ACCT Bezdek, J.C., Tsao, E.C.K., Pal, N.R.. Fuzzy Kohonen clustering networks. In: [1992 Proceedings] IEEE International Conference on Fuzzy Systems. 1992, p doi: /fuzzy IRWANSYAH, E., FAISAL, M., PRIMADINI, A.. Does efficient fuzzy kohonen clustering network algorithm really improves clustering data result? Journal of Theoretical & Applied Information Technology 2015;71(1). 6. Salambue, R.. Pengenalan Pola Tanda Tangan dengan Metode Momennt Invariant dan Euclidean Distance. Prosiding SEMIRATA ; 1(1). URL 7. Ainun, J., Mohammad Isa, I., Imam, M.. PENGENALAN POLA TANDA TANGAN MENGGUNAKAN METODE MOMENT INVARIANT DAN JARINGAN SYARAF RADIAL BASIS FUNCTION (RBF). Pemantapan Keprofesionalan Peneliti, Pendidik, dan Praktisi MIPA Untuk Mendukung Pembangunan Karakter Bangsa 2011;URL 8. Hu, M.K.. Visual pattern recognition by moment invariants. IRE Transactions on Information Theory 1962;8(2): doi: /TIT Ismail, I.A., Ramadan, M.A., Danf, T.E., Samak, A.H.. Automatic Signature Recognition and Verification Using Principal Components Analysis. In: Imaging and Visualisation 2008 Fifth International Conference on Computer Graphics. 2008, p doi: /cgiv Simpson, P.K.. Fuzzy min-max neural networks. I. Classification. IEEE Transactions on Neural Networks 1992;3(5): doi: / Wold, S., Esbensen, K., Geladi, P.. Principal component analysis. Chemometrics and intelligent laboratory systems 1987;2(1-3): Otsu, N.. A Threshold Selection Method from Gray-Level Histograms. IEEE Transactions on Systems, Man, and Cybernetics 1979;9(1): doi: /tsmc

Available online at ScienceDirect. Procedia Computer Science 59 (2015 )

Available online at  ScienceDirect. Procedia Computer Science 59 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 59 (2015 ) 550 558 International Conference on Computer Science and Computational Intelligence (ICCSCI 2015) The Implementation

More information

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INTELLEGENT APPROACH FOR OFFLINE SIGNATURE VERIFICATION USING CHAINCODE AND ENERGY FEATURE EXTRACTION ON MULTICORE PROCESSOR Raju

More information

A Computer Vision System for Graphical Pattern Recognition and Semantic Object Detection

A Computer Vision System for Graphical Pattern Recognition and Semantic Object Detection A Computer Vision System for Graphical Pattern Recognition and Semantic Object Detection Tudor Barbu Institute of Computer Science, Iaşi, Romania Abstract We have focused on a set of problems related to

More information

MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION

MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION Panca Mudjirahardjo, Rahmadwati, Nanang Sulistiyanto and R. Arief Setyawan Department of Electrical Engineering, Faculty of

More information

OCR For Handwritten Marathi Script

OCR For Handwritten Marathi Script International Journal of Scientific & Engineering Research Volume 3, Issue 8, August-2012 1 OCR For Handwritten Marathi Script Mrs.Vinaya. S. Tapkir 1, Mrs.Sushma.D.Shelke 2 1 Maharashtra Academy Of Engineering,

More information

Offline Signature verification and recognition using ART 1

Offline Signature verification and recognition using ART 1 Offline Signature verification and recognition using ART 1 R. Sukanya K.Malathy M.E Infant Jesus College of Engineering And Technology Abstract: The main objective of this project is signature verification

More information

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**

More information

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Utkarsh Dwivedi 1, Pranjal Rajput 2, Manish Kumar Sharma 3 1UG Scholar, Dept. of CSE, GCET, Greater Noida,

More information

Keywords Binary Linked Object, Binary silhouette, Fingertip Detection, Hand Gesture Recognition, k-nn algorithm.

Keywords Binary Linked Object, Binary silhouette, Fingertip Detection, Hand Gesture Recognition, k-nn algorithm. Volume 7, Issue 5, May 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hand Gestures Recognition

More information

Handwritten Devanagari Character Recognition Model Using Neural Network

Handwritten Devanagari Character Recognition Model Using Neural Network Handwritten Devanagari Character Recognition Model Using Neural Network Gaurav Jaiswal M.Sc. (Computer Science) Department of Computer Science Banaras Hindu University, Varanasi. India gauravjais88@gmail.com

More information

HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH

HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH http:// HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH Shalu Saraswat 1, Prof. Sitesh Kumar Sinha 2, Prof. Mukesh Kumar 3 1,2,3 Department of Computer Science, AISECT University

More information

Automatic Recognition and Verification of Handwritten Legal and Courtesy Amounts in English Language Present on Bank Cheques

Automatic Recognition and Verification of Handwritten Legal and Courtesy Amounts in English Language Present on Bank Cheques Automatic Recognition and Verification of Handwritten Legal and Courtesy Amounts in English Language Present on Bank Cheques Ajay K. Talele Department of Electronics Dr..B.A.T.U. Lonere. Sanjay L Nalbalwar

More information

Online Signature Verification Technique

Online Signature Verification Technique Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,

More information

OFFLINE SIGNATURE VERIFICATION

OFFLINE SIGNATURE VERIFICATION International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 8, Issue 2, March - April 2017, pp. 120 128, Article ID: IJECET_08_02_016 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=8&itype=2

More information

Plate Recognition Using Backpropagation Neural Network and Genetic Algorithm

Plate Recognition Using Backpropagation Neural Network and Genetic Algorithm Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 116 (2017) 365 372 2nd International Conference on Computer Science and Computational Intelligence 2017, ICCSCI 2017, 13-14

More information

Indian Currency Recognition Based on ORB

Indian Currency Recognition Based on ORB Indian Currency Recognition Based on ORB Sonali P. Bhagat 1, Sarika B. Patil 2 P.G. Student (Digital Systems), Department of ENTC, Sinhagad College of Engineering, Pune, India 1 Assistant Professor, Department

More information

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015 Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET

More information

Off-line Signature Verification Using Neural Network

Off-line Signature Verification Using Neural Network International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February-2012 1 Off-line Signature Verification Using Neural Network Ashwini Pansare, Shalini Bhatia Abstract a number of

More information

Fine Classification of Unconstrained Handwritten Persian/Arabic Numerals by Removing Confusion amongst Similar Classes

Fine Classification of Unconstrained Handwritten Persian/Arabic Numerals by Removing Confusion amongst Similar Classes 2009 10th International Conference on Document Analysis and Recognition Fine Classification of Unconstrained Handwritten Persian/Arabic Numerals by Removing Confusion amongst Similar Classes Alireza Alaei

More information

Performance analysis of robust road sign identification

Performance analysis of robust road sign identification IOP Conference Series: Materials Science and Engineering OPEN ACCESS Performance analysis of robust road sign identification To cite this article: Nursabillilah M Ali et al 2013 IOP Conf. Ser.: Mater.

More information

Optical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network

Optical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 91-95 Optical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network Raghuraj

More information

Research of Traffic Flow Based on SVM Method. Deng-hong YIN, Jian WANG and Bo LI *

Research of Traffic Flow Based on SVM Method. Deng-hong YIN, Jian WANG and Bo LI * 2017 2nd International onference on Artificial Intelligence: Techniques and Applications (AITA 2017) ISBN: 978-1-60595-491-2 Research of Traffic Flow Based on SVM Method Deng-hong YIN, Jian WANG and Bo

More information

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:

More information

EE 584 MACHINE VISION

EE 584 MACHINE VISION EE 584 MACHINE VISION Binary Images Analysis Geometrical & Topological Properties Connectedness Binary Algorithms Morphology Binary Images Binary (two-valued; black/white) images gives better efficiency

More information

A Real-Time Hand Gesture Recognition for Dynamic Applications

A Real-Time Hand Gesture Recognition for Dynamic Applications e-issn 2455 1392 Volume 2 Issue 2, February 2016 pp. 41-45 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com A Real-Time Hand Gesture Recognition for Dynamic Applications Aishwarya Mandlik

More information

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science

More information

Comparative Study of Hand Gesture Recognition Techniques

Comparative Study of Hand Gesture Recognition Techniques Reg. No.:20140316 DOI:V2I4P16 Comparative Study of Hand Gesture Recognition Techniques Ann Abraham Babu Information Technology Department University of Mumbai Pillai Institute of Information Technology

More information

Invarianceness for Character Recognition Using Geo-Discretization Features

Invarianceness for Character Recognition Using Geo-Discretization Features Computer and Information Science; Vol. 9, No. 2; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education Invarianceness for Character Recognition Using Geo-Discretization

More information

HANDWRITTEN GURMUKHI CHARACTER RECOGNITION USING WAVELET TRANSFORMS

HANDWRITTEN GURMUKHI CHARACTER RECOGNITION USING WAVELET TRANSFORMS International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol.2, Issue 3 Sep 2012 27-37 TJPRC Pvt. Ltd., HANDWRITTEN GURMUKHI

More information

NOWADAYS, there are many human jobs that can. Face Recognition Performance in Facing Pose Variation

NOWADAYS, there are many human jobs that can. Face Recognition Performance in Facing Pose Variation CommIT (Communication & Information Technology) Journal 11(1), 1 7, 2017 Face Recognition Performance in Facing Pose Variation Alexander A. S. Gunawan 1 and Reza A. Prasetyo 2 1,2 School of Computer Science,

More information

Automatic Static Signature Verification Systems: A Review

Automatic Static Signature Verification Systems: A Review Automatic Static Signature Verification Systems: A Review 1 Vitthal K. Bhosale1 Dr. Anil R. Karwankar2 1 PG Student, Government College of Engineering, Aurangabad (M.S.), 2 Assistant Professor, Dept. Of

More information

INTERNATIONAL RESEARCH JOURNAL OF MULTIDISCIPLINARY STUDIES

INTERNATIONAL RESEARCH JOURNAL OF MULTIDISCIPLINARY STUDIES STUDIES & SPPP's, Karmayogi Engineering College, Pandharpur Organize National Conference Special Issue March 2016 Neuro-Fuzzy System based Handwritten Marathi System Numerals Recognition 1 Jayashri H Patil(Madane),

More information

Blood Microscopic Image Analysis for Acute Leukemia Detection

Blood Microscopic Image Analysis for Acute Leukemia Detection I J C T A, 9(9), 2016, pp. 3731-3735 International Science Press Blood Microscopic Image Analysis for Acute Leukemia Detection V. Renuga, J. Sivaraman, S. Vinuraj Kumar, S. Sathish, P. Padmapriya and R.

More information

Spatial Topology of Equitemporal Points on Signatures for Retrieval

Spatial Topology of Equitemporal Points on Signatures for Retrieval Spatial Topology of Equitemporal Points on Signatures for Retrieval D.S. Guru, H.N. Prakash, and T.N. Vikram Dept of Studies in Computer Science,University of Mysore, Mysore - 570 006, India dsg@compsci.uni-mysore.ac.in,

More information

Available online at ScienceDirect. Procedia Computer Science 59 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 59 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 59 (2015 ) 419 426 International Conference on Computer Science and Computational Intelligence (ICCSCI 2015) Degree Centrality

More information

The combination of palm print and hand geometry for biometrics palm recognition

The combination of palm print and hand geometry for biometrics palm recognition International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 2 No: 0 The combination of palm print and hand geometry for biometrics palm recognition Dewi Yanti Liliana, Eries

More information

Available online at ScienceDirect. Procedia Computer Science 45 (2015 )

Available online at  ScienceDirect. Procedia Computer Science 45 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 45 (2015 ) 205 214 International Conference on Advanced Computing Technologies and Applications (ICACTA- 2015) Automatic

More information

Texture Image Segmentation using FCM

Texture Image Segmentation using FCM Proceedings of 2012 4th International Conference on Machine Learning and Computing IPCSIT vol. 25 (2012) (2012) IACSIT Press, Singapore Texture Image Segmentation using FCM Kanchan S. Deshmukh + M.G.M

More information

An Efficient Character Segmentation Based on VNP Algorithm

An Efficient Character Segmentation Based on VNP Algorithm Research Journal of Applied Sciences, Engineering and Technology 4(24): 5438-5442, 2012 ISSN: 2040-7467 Maxwell Scientific organization, 2012 Submitted: March 18, 2012 Accepted: April 14, 2012 Published:

More information

AUTOMATIC LOGO EXTRACTION FROM DOCUMENT IMAGES

AUTOMATIC LOGO EXTRACTION FROM DOCUMENT IMAGES AUTOMATIC LOGO EXTRACTION FROM DOCUMENT IMAGES Umesh D. Dixit 1 and M. S. Shirdhonkar 2 1 Department of Electronics & Communication Engineering, B.L.D.E.A s CET, Bijapur. 2 Department of Computer Science

More information

Tumor Detection and classification of Medical MRI UsingAdvance ROIPropANN Algorithm

Tumor Detection and classification of Medical MRI UsingAdvance ROIPropANN Algorithm International Journal of Engineering Research and Advanced Technology (IJERAT) DOI:http://dx.doi.org/10.31695/IJERAT.2018.3273 E-ISSN : 2454-6135 Volume.4, Issue 6 June -2018 Tumor Detection and classification

More information

A Combined Method for On-Line Signature Verification

A Combined Method for On-Line Signature Verification BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0022 A Combined Method for On-Line

More information

HCR Using K-Means Clustering Algorithm

HCR Using K-Means Clustering Algorithm HCR Using K-Means Clustering Algorithm Meha Mathur 1, Anil Saroliya 2 Amity School of Engineering & Technology Amity University Rajasthan, India Abstract: Hindi is a national language of India, there are

More information

Processing of binary images

Processing of binary images Binary Image Processing Tuesday, 14/02/2017 ntonis rgyros e-mail: argyros@csd.uoc.gr 1 Today From gray level to binary images Processing of binary images Mathematical morphology 2 Computer Vision, Spring

More information

A Hand Gesture Recognition Method Based on Multi-Feature Fusion and Template Matching

A Hand Gesture Recognition Method Based on Multi-Feature Fusion and Template Matching Available online at www.sciencedirect.com Procedia Engineering 9 (01) 1678 1684 01 International Workshop on Information and Electronics Engineering (IWIEE) A Hand Gesture Recognition Method Based on Multi-Feature

More information

A Study on the Consistency of Features for On-line Signature Verification

A Study on the Consistency of Features for On-line Signature Verification A Study on the Consistency of Features for On-line Signature Verification Center for Unified Biometrics and Sensors State University of New York at Buffalo Amherst, NY 14260 {hlei,govind}@cse.buffalo.edu

More information

3D Object Recognition using Multiclass SVM-KNN

3D Object Recognition using Multiclass SVM-KNN 3D Object Recognition using Multiclass SVM-KNN R. Muralidharan, C. Chandradekar April 29, 2014 Presented by: Tasadduk Chowdhury Problem We address the problem of recognizing 3D objects based on various

More information

Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong)

Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong) Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong) References: [1] http://homepages.inf.ed.ac.uk/rbf/hipr2/index.htm [2] http://www.cs.wisc.edu/~dyer/cs540/notes/vision.html

More information

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Sowmya. A (Digital Electronics (MTech), BITM Ballari), Shiva kumar k.s (Associate Professor,

More information

A Survey on Feature Extraction Techniques for Palmprint Identification

A Survey on Feature Extraction Techniques for Palmprint Identification International Journal Of Computational Engineering Research (ijceronline.com) Vol. 03 Issue. 12 A Survey on Feature Extraction Techniques for Palmprint Identification Sincy John 1, Kumudha Raimond 2 1

More information

A New Algorithm for Shape Detection

A New Algorithm for Shape Detection IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 3, Ver. I (May.-June. 2017), PP 71-76 www.iosrjournals.org A New Algorithm for Shape Detection Hewa

More information

Extract an Essential Skeleton of a Character as a Graph from a Character Image

Extract an Essential Skeleton of a Character as a Graph from a Character Image Extract an Essential Skeleton of a Character as a Graph from a Character Image Kazuhisa Fujita University of Electro-Communications 1-5-1 Chofugaoka, Chofu, Tokyo, 182-8585 Japan k-z@nerve.pc.uec.ac.jp

More information

Computer Science Faculty, Bandar Lampung University, Bandar Lampung, Indonesia

Computer Science Faculty, Bandar Lampung University, Bandar Lampung, Indonesia Application Object Detection Using Histogram of Oriented Gradient For Artificial Intelegence System Module of Nao Robot (Control System Laboratory (LSKK) Bandung Institute of Technology) A K Saputra 1.,

More information

Implementation of Dynamic Time Warping Method for the Vehicle Number License Recognition

Implementation of Dynamic Time Warping Method for the Vehicle Number License Recognition International Journal of Electrical and Computer Engineering (IJECE) Vol. 4, No. 2, April 2014, pp. 278~284 ISSN: 2088-8708 278 Implementation of Dynamic Time Warping Method for the Vehicle Number License

More information

Identifying and Reading Visual Code Markers

Identifying and Reading Visual Code Markers O. Feinstein, EE368 Digital Image Processing Final Report 1 Identifying and Reading Visual Code Markers Oren Feinstein, Electrical Engineering Department, Stanford University Abstract A visual code marker

More information

Classification of Printed Chinese Characters by Using Neural Network

Classification of Printed Chinese Characters by Using Neural Network Classification of Printed Chinese Characters by Using Neural Network ATTAULLAH KHAWAJA Ph.D. Student, Department of Electronics engineering, Beijing Institute of Technology, 100081 Beijing, P.R.CHINA ABDUL

More information

Footprint Recognition using Modified Sequential Haar Energy Transform (MSHET)

Footprint Recognition using Modified Sequential Haar Energy Transform (MSHET) 47 Footprint Recognition using Modified Sequential Haar Energy Transform (MSHET) V. D. Ambeth Kumar 1 M. Ramakrishnan 2 1 Research scholar in sathyabamauniversity, Chennai, Tamil Nadu- 600 119, India.

More information

A Novel Automated Approach for Offline Signature Verification Based on Shape Matrix

A Novel Automated Approach for Offline Signature Verification Based on Shape Matrix A Novel Automated Approach for Offline Signature Verification Based on Shape Matrix Sumbal Iqbal Ahmed Peshawar Pakistan Rashid Jalal Qureshi Emirates Aviation University Dubai,UAE Imran Khan Peshawar,

More information

Prototype Selection for Handwritten Connected Digits Classification

Prototype Selection for Handwritten Connected Digits Classification 2009 0th International Conference on Document Analysis and Recognition Prototype Selection for Handwritten Connected Digits Classification Cristiano de Santana Pereira and George D. C. Cavalcanti 2 Federal

More information

Recognition of Unconstrained Malayalam Handwritten Numeral

Recognition of Unconstrained Malayalam Handwritten Numeral Recognition of Unconstrained Malayalam Handwritten Numeral U. Pal, S. Kundu, Y. Ali, H. Islam and N. Tripathy C VPR Unit, Indian Statistical Institute, Kolkata-108, India Email: umapada@isical.ac.in Abstract

More information

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Ritika Luthra Research Scholar Chandigarh University Gulshan Goyal Associate Professor Chandigarh University ABSTRACT Image Skeletonization

More information

Available online at ScienceDirect. Energy Procedia 69 (2015 )

Available online at   ScienceDirect. Energy Procedia 69 (2015 ) Available online at www.sciencedirect.com ScienceDirect Energy Procedia 69 (2015 ) 1885 1894 International Conference on Concentrating Solar Power and Chemical Energy Systems, SolarPACES 2014 Heliostat

More information

Polar Harmonic Transform for Fingerprint Recognition

Polar Harmonic Transform for Fingerprint Recognition International Journal Of Engineering Research And Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 11 (November 2017), PP.50-55 Polar Harmonic Transform for Fingerprint

More information

2 Proposed Methodology

2 Proposed Methodology 3rd International Conference on Multimedia Technology(ICMT 2013) Object Detection in Image with Complex Background Dong Li, Yali Li, Fei He, Shengjin Wang 1 State Key Laboratory of Intelligent Technology

More information

Feature Extractors. CS 188: Artificial Intelligence Fall Nearest-Neighbor Classification. The Perceptron Update Rule.

Feature Extractors. CS 188: Artificial Intelligence Fall Nearest-Neighbor Classification. The Perceptron Update Rule. CS 188: Artificial Intelligence Fall 2007 Lecture 26: Kernels 11/29/2007 Dan Klein UC Berkeley Feature Extractors A feature extractor maps inputs to feature vectors Dear Sir. First, I must solicit your

More information

Skew Detection and Correction of Document Image using Hough Transform Method

Skew Detection and Correction of Document Image using Hough Transform Method Skew Detection and Correction of Document Image using Hough Transform Method [1] Neerugatti Varipally Vishwanath, [2] Dr.T. Pearson, [3] K.Chaitanya, [4] MG JaswanthSagar, [5] M.Rupesh [1] Asst.Professor,

More information

Texture Segmentation by Windowed Projection

Texture Segmentation by Windowed Projection Texture Segmentation by Windowed Projection 1, 2 Fan-Chen Tseng, 2 Ching-Chi Hsu, 2 Chiou-Shann Fuh 1 Department of Electronic Engineering National I-Lan Institute of Technology e-mail : fctseng@ccmail.ilantech.edu.tw

More information

Handwritten Signature Verification And Recognition Using ANN

Handwritten Signature Verification And Recognition Using ANN Handwritten Signature Verification And Recognition Using ANN Mohan Mandaogade Saurabh Vishal Mhaske ABSTRACT Automatic person identification is one of the major concerns in this era of automation. However,

More information

A Study of Medical Image Analysis System

A Study of Medical Image Analysis System Indian Journal of Science and Technology, Vol 8(25), DOI: 10.17485/ijst/2015/v8i25/80492, October 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A Study of Medical Image Analysis System Kim Tae-Eun

More information

COMBINING NEURAL NETWORKS FOR SKIN DETECTION

COMBINING NEURAL NETWORKS FOR SKIN DETECTION COMBINING NEURAL NETWORKS FOR SKIN DETECTION Chelsia Amy Doukim 1, Jamal Ahmad Dargham 1, Ali Chekima 1 and Sigeru Omatu 2 1 School of Engineering and Information Technology, Universiti Malaysia Sabah,

More information

Multi prototype fuzzy pattern matching for handwritten character recognition

Multi prototype fuzzy pattern matching for handwritten character recognition Multi prototype fuzzy pattern matching for handwritten character recognition MILIND E. RANE, DHABE P. S AND J. B. PATIL Dept. of Electronics and Computer, R.C. Patel Institute of Technology, Shirpur, Dist.

More information

Biometric Security System Using Palm print

Biometric Security System Using Palm print ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

Human Gait Recognition using All Pair Shortest Path

Human Gait Recognition using All Pair Shortest Path 2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore Human Gait Recognition using All Pair Shortest Path Jyoti Bharti 1+, M.K Gupta 2 1

More information

A Generalized Method to Solve Text-Based CAPTCHAs

A Generalized Method to Solve Text-Based CAPTCHAs A Generalized Method to Solve Text-Based CAPTCHAs Jason Ma, Bilal Badaoui, Emile Chamoun December 11, 2009 1 Abstract We present work in progress on the automated solving of text-based CAPTCHAs. Our method

More information

Topic 6 Representation and Description

Topic 6 Representation and Description Topic 6 Representation and Description Background Segmentation divides the image into regions Each region should be represented and described in a form suitable for further processing/decision-making Representation

More information

Hand Geometry Verification based on Chain Code and Dynamic Time Warping

Hand Geometry Verification based on Chain Code and Dynamic Time Warping Hand Geometry Verification based on Chain Code and Dynamic Time Warping I Ketut Gede Darma Putra Department of Electrical Engineering Udayana University, Bali, Indonesia Made Ari Sentosa Alumni of Department

More information

AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES

AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES K. P. M. L. P. Weerasinghe 149235H Faculty of Information Technology University of Moratuwa June 2017 AUTOMATED STUDENT S

More information

Journal of Applied Research and Technology ISSN: Centro de Ciencias Aplicadas y Desarrollo Tecnológico.

Journal of Applied Research and Technology ISSN: Centro de Ciencias Aplicadas y Desarrollo Tecnológico. Journal of Applied Research and Technology ISSN: 1665-6423 jart@aleph.cinstrum.unam.mx Centro de Ciencias Aplicadas y Desarrollo Tecnológico México Singla, S. K.; Yadav, R. K. Optical Character Recognition

More information

A Comparison of Color Models for Color Face Segmentation

A Comparison of Color Models for Color Face Segmentation Available online at www.sciencedirect.com Procedia Technology 7 ( 2013 ) 134 141 A Comparison of Color Models for Color Face Segmentation Manuel C. Sanchez-Cuevas, Ruth M. Aguilar-Ponce, J. Luis Tecpanecatl-Xihuitl

More information

SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT

SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT ABSTRACT Rupak Bhattacharyya et al. (Eds) : ACER 2013, pp. 11 24, 2013. CS & IT-CSCP 2013 Fakruddin Ali Ahmed Department of Computer

More information

Offline Signature Verification using Grid based and Centroid based Approach

Offline Signature Verification using Grid based and Centroid based Approach Offline Signature Verification using Grid based and Centroid based Approach Sayantan Roy Department of Computer Science Engineering ISM Dhanbad Jharkhand ABSTRACT Now a day s Signature verification is

More information

Toward Part-based Document Image Decoding

Toward Part-based Document Image Decoding 2012 10th IAPR International Workshop on Document Analysis Systems Toward Part-based Document Image Decoding Wang Song, Seiichi Uchida Kyushu University, Fukuoka, Japan wangsong@human.ait.kyushu-u.ac.jp,

More information

Image enhancement for face recognition using color segmentation and Edge detection algorithm

Image enhancement for face recognition using color segmentation and Edge detection algorithm Image enhancement for face recognition using color segmentation and Edge detection algorithm 1 Dr. K Perumal and 2 N Saravana Perumal 1 Computer Centre, Madurai Kamaraj University, Madurai-625021, Tamilnadu,

More information

Texture Feature Extraction Using Improved Completed Robust Local Binary Pattern for Batik Image Retrieval

Texture Feature Extraction Using Improved Completed Robust Local Binary Pattern for Batik Image Retrieval Texture Feature Extraction Using Improved Completed Robust Local Binary Pattern for Batik Image Retrieval 1 Arrie Kurniawardhani, 2 Nanik Suciati, 3 Isye Arieshanti 1, Institut Teknologi Sepuluh Nopember,

More information

RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION

RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION M. Hanmandlu Multimedia University Jalan Multimedia 63100, Cyberjaya Selangor, Malaysia E-mail:madasu.hanmandlu@mmu.edu.my M. Vamsi Krishna Dept.

More information

Online Feature Extraction Technique for Optical Character Recognition System

Online Feature Extraction Technique for Optical Character Recognition System Online Feature Extraction Technique for Optical Character Recognition System Khairun Saddami 1,2, Khairul Munadi 1,2,3 and Fitri Arnia 1,2,3,* 1 Doctoral Program of Engineering, Faculty of Engineering,

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Introduction Pattern recognition is a set of mathematical, statistical and heuristic techniques used in executing `man-like' tasks on computers. Pattern recognition plays an

More information

Available online at ScienceDirect. Procedia Computer Science 58 (2015 )

Available online at  ScienceDirect. Procedia Computer Science 58 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 58 (2015 ) 552 557 Second International Symposium on Computer Vision and the Internet (VisionNet 15) Fingerprint Recognition

More information

Object Classification Using Tripod Operators

Object Classification Using Tripod Operators Object Classification Using Tripod Operators David Bonanno, Frank Pipitone, G. Charmaine Gilbreath, Kristen Nock, Carlos A. Font, and Chadwick T. Hawley US Naval Research Laboratory, 4555 Overlook Ave.

More information

Application of fuzzy set theory in image analysis. Nataša Sladoje Centre for Image Analysis

Application of fuzzy set theory in image analysis. Nataša Sladoje Centre for Image Analysis Application of fuzzy set theory in image analysis Nataša Sladoje Centre for Image Analysis Our topics for today Crisp vs fuzzy Fuzzy sets and fuzzy membership functions Fuzzy set operators Approximate

More information

Face Detection using Hierarchical SVM

Face Detection using Hierarchical SVM Face Detection using Hierarchical SVM ECE 795 Pattern Recognition Christos Kyrkou Fall Semester 2010 1. Introduction Face detection in video is the process of detecting and classifying small images extracted

More information

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of

More information

Handwritten Character Recognition with Feedback Neural Network

Handwritten Character Recognition with Feedback Neural Network Apash Roy et al / International Journal of Computer Science & Engineering Technology (IJCSET) Handwritten Character Recognition with Feedback Neural Network Apash Roy* 1, N R Manna* *Department of Computer

More information

OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN

OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN P.Vickram, Dr. A. Sri Krishna and D.Swapna Department of Computer Science & Engineering, R.V. R & J.C College of Engineering, Guntur ABSTRACT

More information

Image Segmentation Based on Watershed and Edge Detection Techniques

Image Segmentation Based on Watershed and Edge Detection Techniques 0 The International Arab Journal of Information Technology, Vol., No., April 00 Image Segmentation Based on Watershed and Edge Detection Techniques Nassir Salman Computer Science Department, Zarqa Private

More information

Adaptive Neuro-Fuzzy Inference System for Texture Image Classification

Adaptive Neuro-Fuzzy Inference System for Texture Image Classification 2015 International Conference on Automation, Cognitive Science, Optics, Micro Electro-Mechanical System, and Information Technology (ICACOMIT), Bandung, Indonesia, October 29 30, 2015 Adaptive Neuro-Fuzzy

More information

The Institute of Telecommunications and Computer Sciences, UTP University of Science and Technology, Bydgoszcz , Poland

The Institute of Telecommunications and Computer Sciences, UTP University of Science and Technology, Bydgoszcz , Poland Computer Technology and Application 6 (2015) 64-69 doi: 10.17265/1934-7332/2015.02.002 D DAVID PUBLISHIN An Image Analysis of Breast Thermograms Ryszard S. Choras The Institute of Telecommunications and

More information

5 Database of Shoe marks

5 Database of Shoe marks 5 Database of Shoe marks This chapter has been derived from: Geradts Z; Keijzer J; The image-database REBEZO for shoe marks with developments on automatic classification of shoe outsole designs, Forensic

More information

Short Survey on Static Hand Gesture Recognition

Short Survey on Static Hand Gesture Recognition Short Survey on Static Hand Gesture Recognition Huu-Hung Huynh University of Science and Technology The University of Danang, Vietnam Duc-Hoang Vo University of Science and Technology The University of

More information