Pattern Recognition Letters

Size: px
Start display at page:

Download "Pattern Recognition Letters"

Transcription

1 Pattern Recognton Letters 31 (21) Contents lsts avalable at ScenceDrect Pattern Recognton Letters journal homepage: A hybrd bometrc cryptosystem for securng fngerprnt mnutae templates q Abhshek Nagar a, *, Karthk Nandakumar b, Anl K. Jan a,c a Mchgan State Unversty, East Lansng, MI, USA b Insttute for Infocomm Research, A*STAR, Fusonopols, Sngapore , Sngapore c Department of Bran and Cogntve Engneerng, Korea Unversty, Anam-dong, Seoul, , Korea artcle nfo abstract Artcle hstory: Avalable onlne 14 July 29 Keywords: Bometrcs Template securty Fuzzy vault Mnutae descrptors Securty concerns regardng the stored bometrc data s mpedng the wdespread publc acceptance of bometrc technology. Though a number of bo-crypto algorthms have been proposed, they have lmted practcal applcablty due to the trade-off between recognton performance and securty of the template. In ths paper, we mprove the recognton performance as well as the securty of a fngerprnt based bometrc cryptosystem, called fngerprnt fuzzy vault. We ncorporate mnutae descrptors, whch capture rdge orentaton and frequency nformaton n a mnuta s neghborhood, n the vault constructon usng the fuzzy commtment approach. Expermental results show that wth the use of mnutae descrptors, the fngerprnt matchng performance mproves from an FAR of.7% to.1% at a GAR of 95% wth some mprovement n securty as well. An analyss of securty whle consderng two dfferent attack scenaros s also presented. A prelmnary verson of ths paper appeared n the Internatonal Conference on Pattern Recognton, 28 and was selected as the Best Scentfc Paper n the bometrcs track. Ó 29 Elsever B.V. All rghts reserved. 1. Introducton Pervasve use of bometrcs s mmnent due to ts numerous advantages over the surrogate denttes, e.g. passwords and smart cards. Bometrc trats have very hgh dscrmnatve capablty to dentfy an ndvdual and at the same tme, unlke ID cards and passwords, one does not have to worry about losng them (Jan et al., 28a). However, protectng stored bometrc templates s mportant due to potental msuse of the stolen templates. Cappell et al. (27) and Ross et al. (27) have shown that commonly used templates, that are supposed to be compact, nformatve and usable representaton of bometrc trats, have not been desgned wth the objectve of ther secure storage. Thus f an adversary s able to access a template, he can create a spoof bometrc (e.g. gummy fnger) from the template (Cappell et al., 27) and present t to the system. Due to lmted lveness detecton capablty of current bometrc readers, the spoof may be accepted by the system provdng an llegtmate access to the adversary. Further, an adversary can cross lnk the stolen templates wth other bometrc databases, allowng hm to track the actvtes of an enrolled person, thereby compromsng hs prvacy. Most template protecton approaches can be categorzed nto followng two classes: () transformaton based approaches and () bometrc cryptosystems (Jan et al., 28b). Transformaton q Research supported by Army Research Offce Grant W911NF * Correspondng author. Tel.: E-mal addresses: nagarabh@cse.msu.edu (A. Nagar), knandakumar@2r.a-star. edu.sg (K. Nandakumar), jan@cse.msu.edu (A.K. Jan). based approaches transform the bometrc features usng a user specfc password such that the matchng can be performed n the transformed doman. Such a technque s secure snce at no tme the orgnal bometrc s explctly present n the database. Though a number of transformaton based schemes have been proposed (Teoh et al., 27; Ratha et al., 27; Savvdes and Vjaya Kumar, 24; Boult et al., 27), an optmal transformaton that s non-nvertble and at the same tme preserves the matchng accuracy to a large extent s yet to be found. Bometrc cryptosystems (Dods et al., 26; Hao et al., 26; Nandakumar et al., 27; Sutcu et al., 27), on the other hand, are technques that assocate an external key wth a user s bometrc to obtan helper data. The helper data should not reveal any sgnfcant nformaton about the template or the key and at the same tme t can be used to recover the key when the orgnal bometrc s presented. In ths paper we shall focus on mprovng the matchng performance and securty of a fngerprnt based bometrc cryptosystem, called fngerprnt fuzzy vault (Nandakumar et al., 27). A fuzzy vault s preferred to secure fngerprnts because of ts ablty to secure bometrc data that s represented as an unordered set of ponts; fngerprnt mnutae fall n ths category. In order to construct a fuzzy vault, the external key s converted nto a polynomal and the mnutae are evaluated on that polynomal. These evaluatons are stored along wth the orgnal mnutae as tuples. The bometrc nformaton s then secured by storng the tuples among a large number of randomly generated chaff ponts. Durng authentcaton, the query bometrc s used to dentfy the legtmate mnutae n the set contanng the mnutae as well as the chaff ponts. The evaluatons, or the ordnate values, correspondng /$ - see front matter Ó 29 Elsever B.V. All rghts reserved. do:1.116/j.patrec

2 734 A. Nagar et al. / Pattern Recognton Letters 31 (21) to the secured polynomal are then used to reconstruct the polynomal thereby revealng the key. Though fuzzy vault s able to effectvely secure the fngerprnt templates, the recognton accuracy of the resultant system s sgnfcantly lower compared to the accuracy on the orgnal template. One reason for ths s the nablty of the fuzzy vault to effectvely utlze salent nformaton n a fngerprnt other than mnutae. We address ths lmtaton of fuzzy vault by ncorporatng mnutae descrptors n the vault constructon. Fgs. 1 and 4 show the fuzzy vault encodng and decodng procedures along wth the technque to ncorporate mnutae descrptors. Mnuta descrptors consst of the rdge frequency and rdge orentaton nformaton around a mnuta pont (Feng, 28). Note that storng the descrptors along wth mnutae n the vault s not recommended as the descrptors can be used to verfy whether two neghborng mnutae belong to the same fngerprnt or not. Thus, nstead of explctly storng the mnutae descrptors n the vault, we encrypt the ordnate values correspondng to the mnutae usng the assocated mnutae descrptors. Due to the ntra-user varatons n the mnutae descrptor values, standard cryptographc algorthms such as the Advanced Encrypton Standard (AES) cannot be used to encrypt the ordnate values. Therefore, another bo-crypto algorthm called the fuzzy commtment technque (Juels and Wattenberg, 1999) s used to assocate the ordnate value, whch serves as the key, wth a mnuta descrptor. Snce the actual matchng descrptors wll be able to decrypt the ordnate values, and hence decode the vault wth a hgher probablty than a non-matchng descrptor, the proposed hybrd cryptosystem mproves the matchng performance as well as securty of the vault. One lmtaton of a fuzzy commtment scheme desgned usng typcal algebrac codes [e.g. BCH codes (Reed and Chen, 1999)] s that these codes do not meet the Hammng bound (see Reed and Chen, 1999, p. 15). As a result, such codes may produce a decodng falure when one attempts to use a non-matchng descrptor to release the key. Consequently, an adversary can decrypt the ordnate values ndvdually by tryng all possble descrptors (whch s not dffcult gven the low dscrmnablty of descrptors). We expermentally show that such an attack s ndeed feasble when the dmensonalty of descrptor s hgh (see Secton 6). Further, we show that prncpal component analyss (Duda et al., 2) and sequental forward floatng search (Pudl et al., 1994) can be effectvely used to reduce the dmenson of the descrptors thereby reducng the chances of a successful attack. A technque for encryptng ordnate values usng just mnuta orentaton was also proposed by Mhalescu (27) but wthout any mplementaton. Secton 2 descrbes the helper data extracton procedure whch conssts of () fuzzy vault encodng and () securng ordnate values usng fuzzy commtment. Secton 3 descrbes the authentcaton procedure. In Secton 4, dfferent stages nvolved n obtanng a bnary vector from a mnuta descrptor are descrbed. Secton 5 provdes the expermental results correspondng to dfferent bnarzaton schemes used for descrptors. Secton 6 descrbes technques to measure the securty mprovement usng the proposed approach. In ths secton, we also dscuss some strateges that an adversary can use to compromse the system and the securty of our system aganst those strateges. Secton 7 summarzes our conclusons and the future enhancements. 2. Helper data extracton (enrollment) In the proposed fngerprnt cryptosystem, helper data extracton conssts of two man steps: () fuzzy vault encodng and () securng ordnate values (see Fg. 1). The frst step conssts of securng the mnutae locaton and drecton usng the fuzzy vault framework as descrbed n (Nandakumar et al., 27). In the second step, the ordnate values of the vault are secured usng the mnutae descrptors through the fuzzy commtment approach Fuzzy vault encoder Durng vault encodng a 16-bt Cyclc Redundancy Check (CRC) code s appended to a 16n-bt key K and dvded nto (n þ 1) blocks of 16 bts each. These (n þ 1) values serve as the coeffcents of a polynomal f of degree n n the Galos feld GFð2 16 Þ. The template mnutae are sorted accordng to ther qualty and well-separated mnutae (Nandakumar et al., 27) are selected for constructng the vault. If the desred number of well-separated mnutae (say r) cannot be obtaned, we count t as a Falure to Capture Error (FTCR). The locaton and orentaton of each mnuta s encoded as an element n GFð2 16 Þ. The mnutae x ; ¼ 1;...; r along wth ther correspondng polynomal evaluatons f ðx Þ; ¼ 1;...; r are stored n the vault V. A set of s chaff ponts fðy j ; z j Þ; j ¼ 1;...; sg s generated randomly such that y j x ; 8 ¼ 1;...; r; j ¼ 1;...s and z j f ðy j Þ; 8j ¼ 1;...; s. The chaff pont set s added to the vault V whch can now be represented as V ¼ðA; BÞ, where A and B are the sets of (r þ s) abscssa and ordnate values n the vault, respectvely. Ponts wth hgh rdge curvature are extracted from the fngerprnt and stored along wth the vault to be used for algnment durng authentcaton Securng ordnate values The securty of the vault descrbed n Secton 2.1 depends only on the dffculty n dentfyng the genune ponts n the set A. Once ðn þ 1Þ genune ponts are dentfed, Lagrange nterpolaton can be used to reconstruct the polynomal f, thereby revealng the key K. But f ordnate values correspondng to each pont n the vault are encrypted, an adversary wll not be able to reconstruct the polynomal even f he correctly guesses the genune ponts from the vault. We use mnutae descrptors (Feng, 28) n order to encrypt the ordnate values usng fuzzy commtment approach. Fg. 1. Helper data extracton n the proposed fngerprnt cryptosystem.

3 A. Nagar et al. / Pattern Recognton Letters 31 (21) Orentaton Desc. Value Pont ndex (b) (a) Frequency Desc. Value Pont ndex (c) Fg. 2. Mnutae descrptor: (a) postons of 76 ponts around a mnutae; thckness of each lne and ts orentaton correspond to frequency and orentaton descrptors, (b) orentaton and (c) frequency descrptors. Fg. 3. Dfferent stages nvolved n obtanng a bnary vector of desred length from raw mnutae descrptors. A mnuta descrptor conssts of rdge orentaton and frequency at 76 equdstant ponts, unformly spaced on four concentrc crcles around a mnuta. The four concentrc crcles, wth radus 27, 45, 63 and 81 pxels, contan 1, 16, 22 and 28 ponts, respectvely (see Fg. 2). Ths confguraton of ponts s based on the crtera that the dfference between rad of two consecutve concentrc crcles and that between two sampled ponts on a crcle should be twce the rdge perod. Samplng the ponts n ths manner captures maxmum nformaton contaned n the neghborhood of a mnuta (Tco and Kuosmanen, 23). In order to use a mnuta descrptor n a fuzzy commtment scheme, the descrptor needs to be converted to an m-bt bnary vector, say D b. Length of D b s decded based on avalablty of an effcent error correctng code of the same length. The bnarzaton procedure conssts of four stages desgned to capture the maxmum possble dscrmnablty n the mnutae descrptors: () mssng value estmaton, () dmensonalty reducton, () bnary encodng usng Gray codes, and (v) dscrmnable bts selecton. We explan the above stages n detal n Secton 4. Next, the ordnate value for each mnuta s used to obtan a codeword from an error correctng code. If the dmenson of the code beng used s larger than the number of bts n the ordnate value, requred number of randomly generated bts are appended to the ordnate value. In case the dmenson of the code s smaller than the number of bts n ordnate value, frst k bts are used as the message, where k s the dmenson of the code. Let D b ; ¼ 1;...; ðr þ sþ be the descrptor n bnary format and C be a codeword generated from the correspondng 16-bt ordnate value B. Now, nstead of the ordnate value B, only the secure ordnate value, G ð¼ ðd b C ÞÞ, s stored n the vault. 1 Note that the 1 denotes the XOR operaton. descrptors for the chaff ponts are chosen at random from the set of all the descrptors n the database. The set of abscssa values A, the set of secure ordnate values G and the hgh curvature ponts together consttute the helper data n our fngerprnt cryptosystem. 3. Authentcaton Durng authentcaton (see Fg. 4), the query fngerprnt s frst algned usng the hgh curvature ponts of the template and query fngerprnts as descrbed n (Nandakumar et al., 27). Then, r well separated and good qualty mnutae are selected from the query and matched wth the ponts n the vault n order to flter out most of the chaff ponts. Further, the mnutae descrptors are extracted from the fngerprnt and are bnarzed usng the same procedure as n the enrollment stage. An XOR operaton s appled between the descrptor (say D b ) assocated wth each selected query mnuta and the correspondng secure ordnate value to obtan the correspondng word C. Ths word s then decoded to obtan the message, whch represents the ordnate value correspondng to that mnuta (see Fg. 5). If the ordnate value s correctly decoded for some mnmum number (n þ 1) of genune ponts n the vault, the polynomal f s correctly reconstructed ndcatng a successful match. 4. Descrptor bnarzaton The fuzzy commtment scheme requres the bometrc features to be n the form of bnary vectors. Further, t s desrable that the Hammng dstance between the matchng and non-matchng descrptors be as far apart as possble. In order to acheve ths, we follow a four stage bnarzaton scheme consstng of (see Fg. 3)

4 736 A. Nagar et al. / Pattern Recognton Letters 31 (21) Fg. 4. Authentcaton usng the proposed fngerprnt cryptosystem. Fg. 5. Fuzzy commtment and de-commtment procedure for securng ordnate values. () Mssng value estmaton () Dmensonalty reducton () Bnary encodng usng Gray codes (v) Dscrmnable bts selecton 4.1. Estmatng mssng values for mnutae descrptors The descrptors correspondng to mnutae near the fngerprnt boundary tend to have many mssng values because only a part of the neghborhood of such mnutae les wthn the fngerprnt regon (foreground). We estmate the mssng values from the k-nearest descrptors of a gven descrptor n the database. The nearest neghbor based approach s expected to provde realstc and relable estmates as t selects the mssng values from smlar descrptors. The mssng values n the descrptors are estmated n the followng manner. Frst, we fnd the k-nearest neghbors of the gven descrptor among a set of desred descrptors n the database. A set of desred descrptors s selected such that 75% of the values avalable n the gven descrptor are avalable n the selected descrptors as well. The mssng values are then estmated as the average of the avalable values n the k-nearest neghbors. The nearest neghbors and mssng values are computed separately for the orentaton values and the frequency values. In case of orentaton values, dstance between two descrptors s computed as the normalzed sum of the dstance between the ndvdual values. Let the set of orentaton values of two descrptors D 1 and D 2 beng matched be D 1 o ¼fd1 o1 ; d1 o2 ;...; d 1 om g and D2 o ¼fd2 o1 ; d2 o2 ;...; d2 omg. The dstance between two orentaton descrptors s gven by P m dðd 1 o ; D2 o Þ¼ ¼1 mnðjd1 o d2 o j; 18 jd1 o d2 o jþmask o P m ¼1 mask ; ð1þ o where mask o has a value 1 f both the d 1 o and d2 o are nsde the fngerprnt regon (foreground) and otherwse. If the k nearest neghbors of th descrptor are D ð1þ o ; Dð2Þ o ;...; DðkÞ o then the estmated orentaton descrptors are gven by: d oj ¼ 1 P k! 2 atan l¼1 snð2dðlþ oj ÞmaskðlÞ oj P k ; ð2þ l¼1 cosð2dðlþ oj ÞmaskðlÞ oj where mask ðlþ oj has value 1 f d ðlþ oj s n the foreground. The mssng values for the rdge frequency are also computed n a smlar way by changng the dstance measure between descrptors and the functon that combnes multple descrptors to estmate the mssng value. Dstance between two frequency descrptors s gven by dðd 1 f ; D1 f Þ¼ P m ¼1 jd1 f d2 f jmask f P m ¼1 mask f and frequency values estmated from the k neghbors of th descrptor are gven by P k d fj ¼ l¼1 dðlþ fj maskðlþ fj P k ; ð4þ l¼1 maskðlþ fj where mask ðlþ fj has value 1 f d ðlþ fj s n foreground. A small fracton of the descrptor values that could not be estmated usng the above procedure can be nterpolated as weghted average of the neghborng values. Fg. 6 compares the orentaton component of the descrptors where mssng values were estmated usng the nearest neghbor approach and the smple nterpolaton scheme. We observe that the values estmated usng the nearest neghbor based technque s more smlar to the real descrptor values n a matchng descrptor (obtaned from the same mnutae n a dfferent mpresson of the same fnger) compared to the smple nterpolaton scheme. ð3þ

5 A. Nagar et al. / Pattern Recognton Letters 31 (21) Fg. 6. Estmatng mssng values n descrptors: (a) orentaton of two matchng descrptors overlad where mssng values were estmated usng the nearest neghbor approach; (b) orentaton of the same descrptors when smple nterpolaton s used for estmatng the mssng values. It can be observed that there are very few nconsstent orentaton values n case nearest neghbor approach s used Dmensonalty reducton for mnutae descrptors As noted n (Nagar et al., 28), use of long bnary mnutae descrptors degrade the system securty. Ths s because the error correctng codes compatble wth such descrptors are more lkely to produce decodng falures when an adversary attempts to decrypt an ordnate value usng a non-matchng descrptor (see Secton 6). A decodng falure occurs when the dstance between the corrupted word and any codeword s larger than the error correcton capablty of the code. To mtgate ths problem, we reduce the dmensonalty of the mnutae descrptor usng prncpal component analyss (PCA) (Duda et al., 2) and sequental forward floatng search (Pudl et al., 1994) n order to detect the most nformatve components. One of the motvatons for usng PCA s the fact that the dfferent elements of mnutae descrptors are hghly correlated resultng n strongly correlated bts n the bnarzed descrptor. The use of PCA s expected to lead to uncorrelated bts n the bnarzed descrptor. Snce the orentaton values do not belong to Eucldean space, drect applcaton of PCA s not expected to produce meanngful components. Thus, orentaton descrptor s now represented as: D o ¼ ½cosð2d o1 Þsnð2d o1 Þcosð2d o2 Þsnð2d o2 Þ...cosð2d om Þsnð2d om ÞŠ: ð5þ The complete descrptor thus becomes D ¼ ½cosð2d o1 Þ snð2d o1 Þ cosð2d o2 Þ snð2d o2 Þ...cosð2d om Þ snð2d om Þd f 1 d f 2...d fm : PCA s now appled to the descrptor represented n Eq. (6) to obtan the uncorrelated components. Further, snce certan components mght be very nosy, we apply a supervsed feature selecton. Among the varous feature selecton algorthms avalable (Peng et al., 25; Jan and Zongker, 1997), sequental forward floatng selecton algorthm (SFFS) (Pudl et al., 1994) s smple to mplement and provdes good performance. We use the False Accept Rate (FAR) at the 98% Genune Accept Rate (GAR) as the objectve functon for selectng salent features usng SFFS. The descrptors are matched usng the Eucldean dstance. Once the desred number of features are selected, they are bnarzed usng the scheme descrbed n Secton Bnarzng mnutae descrptors The man objectve of a mnuta descrptor bnarzaton scheme s to generate bnary descrptors havng small dmensonalty that ð6þ retan the maxmum possble dscrmnablty. Large dscrmnablty wll allow correct decodng of ordnate values usng descrptors for genune matches and at the same tme lmt the correct decodng for an mpostor par. Small dmensonalty on the other hand wll lmt the decodng falures leadng to greater securty aganst mpostor attacks. Bnarzaton of a contnuous value feature conssts of two parts: () quantzaton, and () bt assgnment. We perform unform quantzaton for the descrptor values based on ther maxmum and mnmum values. The number of bns used for quantzaton s of the form 2 a where a s a postve nteger. Due to the ntra-user varaton n the mnutae descrptors, t s desrable that the number of bt dfferences among the representatons of the adjacent quanta should be mnmum. That s, f a value les close to the boundary of a quantum and due to ntra class varaton, t shfts to the next quantum n the matchng descrptor, the penalty pad n terms of the Hammng dstance of the bnarzed descrptors should be mnmum.e. only 1 bt. Gray codes (Gray, 1953) are well known codes desgned specfcally for ths purpose. Table 1 shows a 3-bt Gray code. A notceable fact about the gray codes s that the frst and the last quanta also have only a sngle bt dfference. Ths fact s benefcal n case the relatve orentaton values are drectly bnarzed wthout dmensonalty reducton snce the relatve orentaton value of 9 s the same as the orentaton value of 9. Snce the total number of bts generated from a mnuta descrptor may not be the same as the length of a desrable error correctng code, t s desrable to approprately select certan bts. To ths end, we employ a supervsed bt selecton procedure. Ths procedure selects a set of bts such that they have mnmum varaton among the matchng descrptors and maxmum varaton among the non-matchng descrptors. In order to obtan a measure of the ntra-class and nter-class varatons of a partcular bt, we frst obtan the genune and mpostor matchng mnutae from the database. The varaton n genune matchng descrptors corresponds to the fracton of genune matches that have dfferent values for the partcular bt n consderaton. The varaton n mpostor matchng descrptors thus corresponds to the fracton that have dfferent bt values for the mpostor matches. Let the ntra-class varaton of the th bt be r G and nter-class varaton be r I. The dscrmnablty ndex for each bt s gven by C ¼ a d r I ð1 a d Þr G ; ð7þ where a d 2f; 1g s constant. A total of c bts havng the largest dscrmnablty ndex are selected to consttute the bnary descrptor. 5. Experments We used the FVC22 DB2 fngerprnt database to compare the fuzzy vault performance wth and wthout mnutae descrptors. As n (Nandakumar et al., 27), only the frst two mpressons of the 1 dfferent fngers the database were used n the experments, one as the template and the other as the query. Durng both Table 1 3-Bt Gray code. Note that adjacent quanta dffer n only a sngle bt. Quantum ndex Gray code

6 738 A. Nagar et al. / Pattern Recognton Letters 31 (21) enrollment as well as authentcaton, the mssng descrptor values are estmated usng the 1-nearest neghbor approach as descrbed n Secton 4.1. The nearest neghbors are found among the descrptors correspondng to all the mnutae extracted from all mages n FVC2 DB2; there are around 27, descrptors n all. The orentaton and frequency values of the descrptors are quantzed separately nto 2 5 and 2 4 values, respectvely, and bnarzed usng Gray codes as descrbed n Secton 4.3 to obtan 684 bts. From these 684 bts, 511 bts are selected usng the bt selecton scheme as descrbed n Secton 4.3. The BCH(511,19) error correctng scheme s used for generatng the fuzzy commtment that can correct up to 119 errors. Fg. 7 shows the GAR and FAR values correspondng to the fuzzy vault mplementaton n (Nandakumar et al., 27) (wthout descrptors) and the proposed mplementaton where mnutae descrptors are used (Desc (511,19)). Falure to capture rate n both cases s 2%. We observe that the use of mnutae descrptors reduces the FAR of the system sgnfcantly, whle the GAR remans nearly the same. For nstance, when the degree of the polynomal s 6, the GAR s 95% for both the scenaros. However, the FAR s.7% when the descrptors are not used and.1% when the proposed cryptosystem s used. These estmates of GAR and FAR are based on 1 genune matches and 99 mpostor matches. The prncpal component analyss (PCA) s further used to reduce the dmensonalty of the descrptors as descrbed n Secton (a) Genune Accept Rate (b) False Accept Rate Desc (511,19) PCADesc (31,6) PCADesc (15,5) Wthout Descrptor Degree of polynomal (n) Desc (511,19) PCADesc (31,6) PCADesc (15,5) Wthout Descrptor Degree of polynomal (n) Fg. 7. GAR (a) and FAR (b) for the fuzzy vault wth and wthout descrptors. Desc (511,19) corresponds to case when orentaton values are quantzed nto 2 5 quanta, rdge frequency values are quantzed nto 2 4 quanta and 511 bts are extracted from them. Here the fuzzy commtment scheme s constructed usng BCH(511,19) code. PCADesc (31,6) and PCADesc (15,5) correspond to cases when 1 prncpal components are extracted and each value s dvded nto 2 7 quanta. In PCADesc (31,6), 31 bts are extracted and BCH(31,6) code s used for fuzzy commtment whereas n PCADesc (15,5) 15 bts are extracted and BCH(15,5) code s used. BCH(511,19) corrects up to 119 errors, BCH(31,6) corrects up to seven errors and BCH(15,5) corrects up to three errors The covarance matrx of the descrptors values, that s requred for computng the prncpal components, s computed usng the descrptors avalable n the database. Frst 1 prncpal components are retaned and each one s quantzed nto 2 7 bns. A 7-bt Gray code s used to bnarze each of the 1 components. Note that PCA and the desred components can be computed off-lne once for all. Fg. 7 shows the FAR as well as the GAR correspondng to 31-bt as well as 15-bt descrptors obtaned by selectng 31 and 15 bts, respectvely, from the avalable 7bts. It can be seen there s slght degradaton n the GAR because of dmensonalty reducton from 95% to 94% and 93%, respectvely, for 31 and 15 bts descrptors. However, as descrbed n Secton 6, the securty s ncreased by around 1 bts n case a 15-bt descrptor s used. 6. Securty analyss Nandakumar (28) showed that the mn-entropy (Dods et al., 26) of the mnutae template M T gven the vault V can be computed as 1 r H 1 ðm T nþ1 jvþ ¼ A; ð8þ rþs nþ1 where r, n and s have the same meanng as n Secton 2.1. Ths dervaton s based on the assumpton that both the mnutae locaton and mnutae orentaton are unformly dstrbuted. The fuzzy vault mplementaton n (Nandakumar et al., 27) uses the values of r ¼ 24, s ¼ 2 and n ¼ 8 for the typcal vault constructon. Based on the above analyss, the securty of the fngerprnt fuzzy vault mplementaton n (Nandakumar et al., 27) s approxmately 31 bts. Ths s equvalent to a randomly chosen four character password whch requres around a bllon trals on average to break the system. In the proposed fngerprnt fuzzy vault the true ordnate values can be obtaned n two ways: () drectly guessng the 16-bt ordnate values and () guessng the descrptors assocated wth each mnuta. Snce the ordnate values of the genune ponts are obtaned through an evaluaton of a randomly generated secure polynomal, t s reasonable to assume that the dffculty of drectly guessng an ordnate value s approxmately 16 bts (assumng there are more than 16 nformaton bts n the error correctng code, otherwse t s the number of nformaton bts of the code). Also snce the adversary has to smultaneously guess ðn þ 1Þ ordnate values correctly, ths corresponds to approxmately 16ðn þ 1Þ bts of securty. In order to estmate securty aganst guessng the descrptor, let the entropy of a mnuta descrptor D be I D bts and say q bts out of these should be corrected. As shown by Hao et al. (26), the dffculty n guessng a mnutae descrptor s approxmately. R ¼ logð2 I D I D Þ bts. Snce the adversary has to smultaneously dqe guess ðn þ 1Þ mnutae descrptors correctly, usng mnutae descrptors provdes approxmately ðn þ 1ÞR bts of securty. Although the length of descrptor s N bts, there s a strong correlaton between the descrptor bts leadng to reducton n effectve entropy of the descrptor bts.e. I D. We emprcally determne that approxmately N=4 bt errors need to be corrected n order to preserve the GAR to a large extent. Thus q can be approxmated as I D =4. Thus, f n ¼ 8 and I D ¼ 6 bts, then R 2 bts. In ths scenaro, the proposed scheme ncreases the securty of the fuzzy vault by approxmately 18 bts so the overall securty now becomes 49ð31 þ 18Þ bts. Ths s equvalent to a sx character password. The above securty analyss assumes the use of a perfect error correcton codng scheme (a w-error correctng bnary code of sze 2 N s sad to be perfect f for every word C, there s a unque

7 A. Nagar et al. / Pattern Recognton Letters 31 (21) Table 2 The values correspondng to p df, p, max ðp Þ and T a for the dfferent representatons of descrptors consdered. Descrptor format Mn Max Medan p df Desc (511,19) PCADesc (31,6) PCADesc (15,5) p Desc (511,19) PCADesc (31,6) PCADesc (15,5) max ðp Þ Desc (511,19) PCADesc (31,6) PCADesc (15,5) codeword C such that the Hammng dstance between C and C s at most w bts). It has, however, been proven that any non-trval perfect code over a prme-power alphabet has the parameters of a Hammng code or a Golay code (Hll, 1988). Note that Hammng codes correct only sngle error whereas Golay codes correct only up to three errors n code of length 24 bts and thus would not be applcable to the current problem. If the codng scheme s not perfect, some of the words may result n a decodng falure whch would ndcate an ncorrect mnuta descrptor beng used to de-commt the ordnate value. Due to unknown dstrbuton of bometrc features, t s mportant to emprcally estmate the number of decodng falure and ncorrect decodngs whle usng a partcular error correctng code. Note that even f all the ncorrect descrptors lead to decodng falure, the securty s at least as good as the securty of the orgnal fuzzy vault. When an adversary apples a descrptor to decode the secure ordnate value, followng stuatons can arse: T a Desc (511,19) PCADesc (31,6) PCADesc (15,5) () () () a decodng falure s detected, the correct codeword c s obtaned and an ncorrect codeword c ð cþ s obtaned. We are nterested n estmatng the relatve frequency of these three events as they provde an estmate of ambguty about the Fg. 8. Varaton of bts of securty nduced by descrptors as u ¼ tð1 p df Þ ncreases for PCADesc (15,5). Here u s the number of descrptors tred and p df s the fracton of descrptors leadng to decodng falure. Abscssae represents u and the ordnates represents the number of bts of securty. The 2 dfferent graphs show the varaton for the 2 dfferent randomly selected descrptors. In many cases a mnmum securty of around 1 bts can be mparted to the system leadng to a total securty of 41 (31 + 1) bts.

8 74 A. Nagar et al. / Pattern Recognton Letters 31 (21) true codeword. Let the relatve frequency of the three events be: p df, p, and p ; ¼ 1; 2;... n order. One strategy an adversary mght employ would be to try decodng the ordnate value wth a large number of descrptors one by one and select the frst ordnate value decoded. Here the adversary would be successful wth probablty p ðnþ1þ p a ¼ P ¼ p p ðnþ1þ ; ð9þ where p ¼ P p p. Thus the number of bts of securty added would be equal to T a ¼ log 2 p a. In order to estmate p df ; p and p, we randomly selected 2 dfferent descrptors and tred to decode those usng the database contanng 27, descrptors. Table 2 shows the values correspondng to p df, p, max p and T a for the dfferent representatons of descrptors consdered. It can be seen that BCH(31,6) provdes around 7 bts of securty on average whereas that BCH(15,5) provdes around 28 bts. In our experments wth the mperfect codes havng hgh dmenson e.g. BCH(511,19) or BCH(31,5), t has been observed that p p. Ths can be explaned by the fact that f the dfference between two matchng descrptors s less than the error correcton capacty of the code, whch s often the case, there are an acceptable number of errors ntroduced n the codeword leadng to correct decodng. On the other hand, when a randomly selected descrptor s used to decode the fuzzy commtment, a large number of errors beyond the error correctng capacty are ntroduced nto the codeword. Due to ths the codeword s shfted to a nondecodable regon wth hgh probablty leadng to a decodng falure. Note that n case of BCH(511,19), theoretcal estmate of the fracton of space that s not decodable s , that for BCH(31,6) s :9 and for BCH(15,5), t s :44 whch s consstent wth the probabltes of decodng falure reported n Table 2. Also no ncorrect decodng was detected n case of usng BCH(511,19) due to large fracton of non-decodable regon. Another strategy that an adversary can employ s to apply t dfferent descrptors for decodng each secure ordnate value and get the ordnate value that occurred maxmum number of tmes. Note that, on average, there would be u ¼ tð1 p df Þ dfferent descrptors that wll not produce decodng falures. Thus the adversary wll succeed f there are more than up max correctly decoded ordnate values among the set of u decoded values, where p max ( ) maxfp ; ¼ 1; 2;...g ¼ : ð1þ P p Thus the probablty of successful attack s gven by p a ¼ ðnþ1þ p #ðcorrect codewordsþ > dupmaxe ; ð11þ where p ð#ðcorrect codewordsþ > lþ ¼ Xu ¼lþ1 u p l ð1 p Þ u : ð12þ Note that the securty n terms of number of bts s gven by T a ¼ log 2p a. Fg. 8 shows the varaton of bts of securty as u ncreases correspondng to the case when the descrptor s represented as a 15- bt vector. It s noted that n more than half of the cases around 1 bts of securty can be mparted to the fuzzy vault n case the degree of polynomal secured by the fuzzy vault,.e. n, s 8. The sawtooth shape of the curves s due to the fact that n Eq. 11, dup max e remans the same even f u ncreases and that change n dup max e leads to larger reducton n the probablty of attack as compared to the effect of ncreasng u. Note that the curves correspondng to descrptors that have larger values of p max have sharper teeth and have hgh chances of leadng to greater securty. Although, the securty depends on p as well. The ncrease n the number of descrptors tred by the adversary,.e. t, also leads to ncreased computatonal complexty of the attack. Thus even though no addtonal nformaton theoretc securty s mparted n case of BCH(511,19), there s sgnfcant computatonal cost to the adversary n order to compromse the system due to large p df leadng to mprovement n securty to a certan extent. Note that gven u, t s drectly proportonal to p df. 7. Conclusons Template securty s crtcal to the ntegrty of a bometrc system. In ths paper we have shown that both the matchng performance and securty of a fngerprnt fuzzy vault can be mproved by ncorporatng mnutae descrptors. Experments on a publc doman fngerprnt database demonstrates that the use of mnutae descrptors leads to an order of magntude reducton n the False Accept Rate wthout sgnfcantly affectng the Genune Accept Rate. Further, the vault securty measured n terms of number of tres an adversary has to make n order to guess the secure key s ncreased. As future work, we plan to nvestgate nearest neghbor decodng mplementatons of certan error correctng codes n order to reduce the decodng falures. Snce the descrptors correspondng to neghborng mnutae are correlated, we plan to nvestgate f an adversary can leverage such nformaton to ncrease hs chances of a successful attack and to what extent. References Boult, T.E., Scherer, W.J., Woodworth, R., 27. Fngerprnt revocable botokens: Accuracy and securty analyss. In: Proc. CVPR. Mnneapols, pp Cappell, R., Lumn, A., Mao, D., Malton, D., 27. Fngerprnt mage reconstructon from standard templates. IEEE Trans. Pattern Anal. Machne Intell. 29 (9), Dods, Y., Ostrovsky, R., Reyzn, L., Smth, A., 26. Fuzzy extractors: How to generate strong keys from bometrcs and other nosy data. Tech. Rep. 235, Cryptology eprnt Archve. Duda, R.O., Hart, P.E., Stork, D.G., 2. Pattern Classfcaton. Wley-Interscence. Feng, J., 28. Combnng mnutae descrptors for fngerprnt matchng. Pattern Recognton 41 (1), Gray, F., Pulse code communcaton. US Patent 2,632,58. Hao, F., Anderson, R., Daugman, J., 26. Combnng crypto wth bometrcs effectvely. IEEE Trans. Comput. 55 (9), Hll, R., A Frst Course n Codng Theory. Oxford Unversty Press, p. 12. Jan, A.K., Flynn, P., Ross, A.A., 28a. Handbook of Bometrcs. Sprnger. Jan, A.K., Nandakumar, K., Nagar, A., 28b. Bometrc template securty. EURASIP J. Adv. Sgnal Process. 28, Artcle ID , 17pp. Jan, A.K., Zongker, D., Feature selecton: Evaluaton, applcaton, and small sample performance. IEEE Trans. Pattern Anal. Machne Intell. 19 (2), Juels, A., Wattenberg, M., A fuzzy commtment scheme. In: Proc. 6th ACM Conf. on Computer and Comm. Securty, Sngapore, pp Mhalescu, P., 27. The Fuzzy Vault for Fngerprnts s Vulnerable to Brute Force Attack. Avalable at: Nagar, A., Nandakumar, K., Jan, A.K., 28. Securng fngerprnt template: Fuzzy vault wth mnutae descrptors. In: Internat. Conf. for Pattern Recognton, Tampa. Nandakumar, K., 28. Multbometrc systems: Fuson strateges and template securty. Ph.D. Thess, Department of Computer Scence and Engneerng, Mchgan State Unversty. Nandakumar, K., Jan, A.K., Pankant, S., 27. Fngerprnt-based fuzzy vault: Implementaton and performance. IEEE Trans. Inform. Forenscs Securty 2 (4), Peng, H.C., Long, F., Dng, C., 25. Feature selecton based on mutual nformaton: Crtera of max-dependency, max-relevance, and mn-redundancy. IEEE Trans. Pattern Anal. Mach. Intell. 27 (8), Pudl, P., Novovcova, J., Kttler, J., Floatng search methods n feature selecton. Pattern Recognton Lett. 15, Ratha, N.K., Chkkerur, S., Connell, J.H., Bolle, R.M., 27. Generatng cancelable fngerprnt templates. IEEE Trans. PAMI 29 (4),

9 A. Nagar et al. / Pattern Recognton Letters 31 (21) Reed, I.S., Chen, X., Error-Control Codng for Data Networks. Kluwer Academc Publshers. Ross, A.K., Shah, J., Jan, A.K., 27. From templates to mages: Reconstructng fngerprnts from mnutae ponts. IEEE Trans. Pattern Anal. Machne Intell. 29 (4), Savvdes, M., Vjaya Kumar, B.V.K., 24. Cancellable bometrc flters for face recognton. In: Proc. ICPR, vol. 3, Cambrdge, pp Sutcu, Y., L, Q., Memon, N., 27. Protectng bometrc templates wth sketch: Theory and practce. IEEE Trans. Inform. Forenscs Securty 2 (3), Teoh, A.B.J., Toh, K.-A., Yp, W.K., N dscretsaton of bophasor n cancellable bometrcs. In: Proc. ICB, Seoul, pp Tco, M., Kuosmanen, P., 23. Fngerprnt matchng usng an orentaton-based mnuta descrptor. IEEE Trans. Pattern Anal. Mach. Intell. 25 (8),

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Face Recognition University at Buffalo CSE666 Lecture Slides Resources: Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Sixth Indian Conference on Computer Vision, Graphics & Image Processing

Sixth Indian Conference on Computer Vision, Graphics & Image Processing Sxth Indan Conference on Computer Vson, Graphcs & Image Processng Incorporatng Cohort Informaton for Relable Palmprnt Authentcaton Ajay Kumar Bometrcs Research Laboratory, Department of Electrcal Engneerng

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Secure Fuzzy Vault Based Fingerprint Verification System

Secure Fuzzy Vault Based Fingerprint Verification System Secure Fuzzy Vault ased Fngerprnt Verfcaton System Shengln Yang UCL Dept of EE Los ngeles, C 90095 +1-310-267-4940 shenglny@ee.ucla.edu bstract--ths paper descrbes a secure fngerprnt verfcaton system based

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Secure and Fast Fingerprint Authentication on Smart Card

Secure and Fast Fingerprint Authentication on Smart Card SETIT 2005 3 rd Internatonal Conference: Scences of Electronc, Technologes of Informaton and Telecommuncatons March 27-31, 2005 TUNISIA Secure and Fast Fngerprnt Authentcaton on Smart Card Y. S. Moon*,

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

Fingerprint matching based on weighting method and SVM

Fingerprint matching based on weighting method and SVM Fngerprnt matchng based on weghtng method and SVM Ja Ja, Lanhong Ca, Pnyan Lu, Xuhu Lu Key Laboratory of Pervasve Computng (Tsnghua Unversty), Mnstry of Educaton Bejng 100084, P.R.Chna {jaja}@mals.tsnghua.edu.cn

More information

AUTOMATED personal identification using biometrics

AUTOMATED personal identification using biometrics A 3D Feature Descrptor Recovered from a Sngle 2D Palmprnt Image Qan Zheng,2, Ajay Kumar, and Gang Pan 2 Abstract Desgn and development of effcent and accurate feature descrptors s crtcal for the success

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS XUNYU PAN

MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS XUNYU PAN MOTION PANORAMA CONSTRUCTION FROM STREAMING VIDEO FOR POWER- CONSTRAINED MOBILE MULTIMEDIA ENVIRONMENTS by XUNYU PAN (Under the Drecton of Suchendra M. Bhandarkar) ABSTRACT In modern tmes, more and more

More information

A Robust Method for Estimating the Fundamental Matrix

A Robust Method for Estimating the Fundamental Matrix Proc. VIIth Dgtal Image Computng: Technques and Applcatons, Sun C., Talbot H., Ourseln S. and Adraansen T. (Eds.), 0- Dec. 003, Sydney A Robust Method for Estmatng the Fundamental Matrx C.L. Feng and Y.S.

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information

Recognizing Faces. Outline

Recognizing Faces. Outline Recognzng Faces Drk Colbry Outlne Introducton and Motvaton Defnng a feature vector Prncpal Component Analyss Lnear Dscrmnate Analyss !"" #$""% http://www.nfotech.oulu.f/annual/2004 + &'()*) '+)* 2 ! &

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Automated System for Criminal Identification Using Fingerprint Clue Found at Crime Scene

Automated System for Criminal Identification Using Fingerprint Clue Found at Crime Scene Volume 2, Issue 11, November 213 ISSN 2319-4847 Automated System for Crmnal Identfcaton Usng Fngerprnt Clue Found at Crme Scene Mansh P.Deshmukh 1, Prof (Dr) Pradeep M.Patl 2 1 Assocate Professor, E&TC

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Fitting & Matching. Lecture 4 Prof. Bregler. Slides from: S. Lazebnik, S. Seitz, M. Pollefeys, A. Effros.

Fitting & Matching. Lecture 4 Prof. Bregler. Slides from: S. Lazebnik, S. Seitz, M. Pollefeys, A. Effros. Fttng & Matchng Lecture 4 Prof. Bregler Sldes from: S. Lazebnk, S. Setz, M. Pollefeys, A. Effros. How do we buld panorama? We need to match (algn) mages Matchng wth Features Detect feature ponts n both

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

A Novel Fingerprint Matching Method Combining Geometric and Texture Features

A Novel Fingerprint Matching Method Combining Geometric and Texture Features A Novel ngerprnt Matchng Method Combnng Geometrc and Texture eatures Me Xe, Chengpu Yu and Jn Q Unversty of Electronc Scence and Technology of Chna. Chengdu,P.R.Chna xeme@ee.uestc.edu.cn Post Code:6154

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Feature Extractions for Iris Recognition

Feature Extractions for Iris Recognition Feature Extractons for Irs Recognton Jnwook Go, Jan Jang, Yllbyung Lee, and Chulhee Lee Department of Electrcal and Electronc Engneerng, Yonse Unversty 134 Shnchon-Dong, Seodaemoon-Gu, Seoul, KOREA Emal:

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

PCA Based Gait Segmentation

PCA Based Gait Segmentation Honggu L, Cupng Sh & Xngguo L PCA Based Gat Segmentaton PCA Based Gat Segmentaton Honggu L, Cupng Sh, and Xngguo L 2 Electronc Department, Physcs College, Yangzhou Unversty, 225002 Yangzhou, Chna 2 Department

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Improved SIFT-Features Matching for Object Recognition

Improved SIFT-Features Matching for Object Recognition Improved SIFT-Features Matchng for Obect Recognton Fara Alhwarn, Chao Wang, Danela Rstć-Durrant, Axel Gräser Insttute of Automaton, Unversty of Bremen, FB / NW Otto-Hahn-Allee D-8359 Bremen Emals: {alhwarn,wang,rstc,ag}@at.un-bremen.de

More information

Intelligent Information Acquisition for Improved Clustering

Intelligent Information Acquisition for Improved Clustering Intellgent Informaton Acquston for Improved Clusterng Duy Vu Unversty of Texas at Austn duyvu@cs.utexas.edu Mkhal Blenko Mcrosoft Research mblenko@mcrosoft.com Prem Melvlle IBM T.J. Watson Research Center

More information

A Secure Biometric Authentication Scheme Based on Robust Hashing

A Secure Biometric Authentication Scheme Based on Robust Hashing A Secure Bometrc Authentcaton Scheme Based on Robust Hashng Yagz Sutcu Polytechnc Unversty Sx Metrotech Center Brooklyn, NY 11201 ysutcu01@utopa.poly.edu Husrev Taha Sencar Polytechnc Unversty Sx Metrotech

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

COMPLEX WAVELET TRANSFORM-BASED COLOR INDEXING FOR CONTENT-BASED IMAGE RETRIEVAL

COMPLEX WAVELET TRANSFORM-BASED COLOR INDEXING FOR CONTENT-BASED IMAGE RETRIEVAL COMPLEX WAVELET TRANSFORM-BASED COLOR INDEXING FOR CONTENT-BASED IMAGE RETRIEVAL Nader Safavan and Shohreh Kasae Department of Computer Engneerng Sharf Unversty of Technology Tehran, Iran skasae@sharf.edu

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Collaboratively Regularized Nearest Points for Set Based Recognition

Collaboratively Regularized Nearest Points for Set Based Recognition Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,

More information

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract

More information

Lecture #15 Lecture Notes

Lecture #15 Lecture Notes Lecture #15 Lecture Notes The ocean water column s very much a 3-D spatal entt and we need to represent that structure n an economcal way to deal wth t n calculatons. We wll dscuss one way to do so, emprcal

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION 1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Image Matching Algorithm based on Feature-point and DAISY Descriptor

Image Matching Algorithm based on Feature-point and DAISY Descriptor JOURNAL OF MULTIMEDIA, VOL. 9, NO. 6, JUNE 2014 829 Image Matchng Algorthm based on Feature-pont and DAISY Descrptor L L School of Busness, Schuan Agrcultural Unversty, Schuan Dujanyan 611830, Chna Abstract

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

Lecture 13: High-dimensional Images

Lecture 13: High-dimensional Images Lec : Hgh-dmensonal Images Grayscale Images Lecture : Hgh-dmensonal Images Math 90 Prof. Todd Wttman The Ctadel A grayscale mage s an nteger-valued D matrx. An 8-bt mage takes on values between 0 and 55.

More information

Classification Based Mode Decisions for Video over Networks

Classification Based Mode Decisions for Video over Networks Classfcaton Based Mode Decsons for Vdeo over Networks Deepak S. Turaga and Tsuhan Chen Advanced Multmeda Processng Lab Tranng data for Inter-Intra Decson Inter-Intra Decson Regons pdf 6 5 6 5 Energy 4

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Shape Representaton Robust to the Sketchng Order Usng Dstance Map and Drecton Hstogram Department of Computer Scence Yonse Unversty Kwon Yun CONTENTS Revew Topc Proposed Method System Overvew Sketch Normalzaton

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information