Computer Vision Systems. Dean, Faculty of Technology Professor, Department of Technology University of Pune, Pune
|
|
- Dorothy Casey
- 6 years ago
- Views:
Transcription
1 Improving Performance for Computer Vision Systems Dr. Aditya Abhyankar Dean, Faculty of Technology Professor, Department of Technology University of Pune, Pune
2 Homography based Hybrid Mixture Model for 3D Reconstruction True focal length gets converted into apparent focal length in digital camera In turn, the true depth information gets mapped to apparent depth information 2
3 Homography based Hybrid Mixture Model for 3D Reconstruction The reverse transformation needs to recover, that is to estimate the depth from focal length 3
4 Homography based Hybrid Mixture Model for 3D Reconstruction The projective transformation that relates the two camera views /images An invertible mapping of points or lines projective plane(p 2 ) to another plane (P 2 ) on one Also called as Collineation, aprojective transform or homography P Π Π P 1 Π 2 P Π O 1 P π = HP π O 2 4
5 Experimental Setup - Background plane P 2 P 1 P 3 Object Cam 1 FOV More than Cam 6 Cam 2 Cam 5 Cam3 Cam 4 5
6 Research Non-linear Adaptive Signal Processing Bio-informatics Biometrics Security Systems WORK Statistical Analysis of Signals Biomedical Signal Analysis Scalable Video Coders
7 Research: Biometrics Ideal and Non-Ideal Iris Recognition Fingerprint Liveness Detection Biometric Security Biometrics Iris Template Aging and Update Fingerprint Interoperability Wavelet Based Scalable Video Coders
8 Liveness Detection Algorithm Part (I) Wavelet Based Approach Part (II) Perspiration Pattern Characterization Part (III) Empirical Mode Decomposition Based Approach Part (IV) Fingerprint Ridge and Texture Analysis Approach
9 Liveness Detection Hypothesis Live fingers demonstrate a specific changing moisture pattern due to perspiration. Cadaver and spoof fingerprint images do not. Algorithm uses two fingerprint images over time Original algorithm: capacitive DC, 5-second time frame, small dataset
10 Liveness Detection Perspiration observed in live images after applying the threshold to the first difference of waveletenhanced images Cadaver Spoof Live
11 Iris Recognition
12 Iris Recognition- Segmentation Segments iris region from the rest of the eye image Performs maxima energy extraction Number of wavelet coefficients retained = 10, If iris region is not segmented correctly, it can not be used for doing personal identification
13 Iris Recognition- Segmentation Traditional iris segmentation uses model based transforms like Hough or circular canny Appropriate for on-angle images, but fails for off-axis images Goal: Develop segmentation which improve iris recognition performance, particularly for non-ideal iris images
14 Active Contour Deformation
15 ASM Segmentation
16 BWN (Bi-orthogonal Wavelet Network) The basic idea behind matching using BWNs BWN(y,w) optimized for a particular class of an iris BWN(y,w) specific for that particular class only Any other class is not well represented by the same BWN Each representation gets uniquely trained
17 Encryption Scheme (OTBT) Trained NN to generate representations Mixing Communication Channel Trained HMM Database of Biometric Representations Biometric Template Biometric Representations Encrypted Template Encrypted Template Iterative Blind Source Separation Fuzzy Matcher Acts like transformation and key No use of Raw template Continuously updated i.e. dynamic system stolen not stored Self generating dynamic keys Information No privacy threats
18 Statistical Testing The key stream generated using OTBT tested using the NIST Statistical Test Suite. (Only Reports Number of Streams Failed on average in 1000 independent tests with random keys)
19 Image Quality - Fuzzy c-means
20 CUDA!!!
21 Research Non-linear Adaptive Signal Processing Bio-informatics Biometrics Security Systems WORK Statistical Analysis of Signals Biomedical Signal Analysis Scalable Video Coders
22 Multi-Target Tracking (MTT) Multiple Human targets to be tracked Computationally complex process Applications are real-time
23 MATLAB GPU Computing MATLAB GPU Computing AcceLereYes Jacket Casting input data to Jacket s GPU data-structure To run native codes on the GPU
24 Efficient Multi-target Human Motion Tracking
25 Efficient Multi-target Human Motion Tracking
26 Efficient Multi-target Human Motion Tracking
27 Efficient Multi-target Human Motion Tracking
28 Efficient Multi-target Human Motion Tracking
29 Efficient Multi-target Human Motion Tracking
30 Efficient Multi-target Human Motion Tracking
31 Efficient Multi-target Human Motion Tracking
32 Efficient Multi-target Human Motion Tracking
33 Efficient Multi-target Human Motion Tracking
34 Efficient Multi-target Human Motion Tracking
35 Efficient Multi-target Human Motion Tracking
36 Efficient Multi-target Human Motion Tracking
37 Efficient Multi-target Human Motion Tracking
38 Efficient Multi-target Human Motion Tracking
39 Efficient Multi-target Human Motion Tracking
40 Efficient Multi-target Human Motion Tracking
41 Efficient Multi-target Human Motion Tracking
42 Efficient Multi-target Human Motion Tracking
43 Research Non-linear Adaptive Signal Processing Bio-informatics Biometrics Security Systems WORK Statistical Analysis of Signals Biomedical Signal Analysis Scalable Video Coders
44 Scalable Video Coders (SVCs) Produces bit-stream which can be decoded at different bit rates Encoder design crucial Decoding on less powerful platform possible Streaming Basketball Match Broadcast Channel User 1 ENCODER User n
45 Wavelet based SVC Spatio-temporal scalability Performs motion compensation Mesh based approach Computationally complex GPU-CUDA accelerates Effective implementation
46 Mesh Based MC
47 MATLAB GPU Computing MATLAB GPU Computing AcceLereYes Jacket Casting input data to Jacket s GPU data-structure To run native codes on the GPU
48 Results CPU Specifications GPU Specifications HP xw9400, AMD Dual core nvidia GF 9800 GX2 + AMD processor, 2.00 GHz, RAM 2 Dual Core GB CPU Time (VD-10) GPU Time (VD-10) sec sec Time Units CPU Processing Acceleration Achieved ~ 13x GPU Processing Video Depth
49 Research Non-linear Adaptive Signal Processing Bio-informatics Biometrics Security Systems WORK Statistical Analysis of Signals Biomedical Signal Analysis Scalable Video Coders
50 Research: Biometrics Ideal and Non-Ideal Iris Recognition Fingerprint Liveness Detection Biometric Security Biometrics Iris Template Aging and Update Fingerprint Interoperability Wavelet Based Scalable Video Coders
51 Research: Biometrics Fingerprint Orientations Ideal and Non-Ideal Iris Recognition Fingerprint Liveness Detection Biometric Security Biometrics Iris Template Aging and Update Fingerprint Interoperability Wavelet Based Scalable Video Coders
52 Fingerprint Orientations
53 Results CPU Specifications GPU Specifications HP xw9400, AMD Dual core nvidia GF 9800 GX2 + AMD processor, 2.00 GHz, RAM 2 Dual Core GB CPU Time (dpi-1000) GPU Time (dpi-1000) sec sec Time Units Acceleration Achieved ~ 7x CPU Processing Fingerprint Images dpi resolution GPU Processing
54 Results CPU Specifications GPU Specifications HP xw9400, AMD Dual core nvidia GF 9800 GX2 + AMD processor, 2.00 GHz, RAM 2 Dual Core GB CPU Time (dpi-1000) GPU Time (dpi-1000) sec sec Acceleration Achieved ~ 8x Time Units CPU Processing GPU Processing Facial Images dpi resolution
55 Research Non-linear Adaptive Signal Processing Bio-informatics Biometrics Security Systems WORK Statistical Analysis of Signals Biomedical Signal Analysis Scalable Video Coders
56 Results - CBIR CPU Specifications GPU Specifications HP xw9400, AMD Dual core nvidia GF 9800 GX2 + AMD processor, 2.00 GHz, RAM 2 Dual Core GB CPU Time (dpi-1000) GPU Time (dpi-1000) sec sec Time Units Acceleration Achieved ~ 10x CPU Processing Search Depth GPU Processing
57 Research Non-linear Adaptive Signal Processing Bio-informatics Biometrics Security Systems WORK Statistical Analysis of Signals Biomedical Signal Analysis Scalable Video Coders
58 Fuzzy c-means scatter plot
59 Results CPU Specifications GPU Specifications HP xw9400, AMD Dual core nvidia GF 9800 GX2 + AMD processor, 2.00 GHz, RAM 2 Dual Core GB CPU Time (Epochs-200) GPU Time (Epochs-200) sec 4.87 sec Acceleration Achieved ~ 8x Time Units CPU Processing GPU Processing Epochs
60 P1: Liveness Embedded Multimodal Biometric System Biometric System Security, Forensics LIVENESS Fusion: 1. Image Level 2. Feature Level 3. Score Level
61 P2: Adaptive DPOAE design Dual Pulse Oto-Acoustic Emmissions
62 P3: Homography based 3D voxel mapping for Rehabilitation Engineering
63 P4: Evolutionary Framework for objective diagnosis of cancer
64 P4: Evolutionary Framework for objective diagnosis of Histo-paths Image Analysis Request Flash Viewer Report Generation Protein, Cell, Tissue, Diagnostics libraries Image Analysis Server Application Internet Image Server Application With caching readers / co onnectors image Image Storage 2D Gel scanner HCS Tissue scanner
65 References (selected):
66 Questions?? Thank you!
6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationKeywords Palmprint recognition, patterns, features
Volume 7, Issue 3, March 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on Palm
More informationBIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal
BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION
More informationMRT based Fixed Block size Transform Coding
3 MRT based Fixed Block size Transform Coding Contents 3.1 Transform Coding..64 3.1.1 Transform Selection...65 3.1.2 Sub-image size selection... 66 3.1.3 Bit Allocation.....67 3.2 Transform coding using
More informationA biometric iris recognition system based on principal components analysis, genetic algorithms and cosine-distance
Safety and Security Engineering VI 203 A biometric iris recognition system based on principal components analysis, genetic algorithms and cosine-distance V. Nosso 1, F. Garzia 1,2 & R. Cusani 1 1 Department
More informationIRIS SEGMENTATION OF NON-IDEAL IMAGES
IRIS SEGMENTATION OF NON-IDEAL IMAGES William S. Weld St. Lawrence University Computer Science Department Canton, NY 13617 Xiaojun Qi, Ph.D Utah State University Computer Science Department Logan, UT 84322
More informationBio-FactsFigures.docx Page 1
Above shows the G6-BIO-B (Beige case) and the G6-BIO-G (Grey case). Bio-FactsFigures.docx Page 1 Table of Contents 1. Biometric Concepts... 3 1.1. Is it possible to trick the sensor?... 3 1.2. Would a
More informationBiorthogonal wavelets based Iris Recognition
Biorthogonal wavelets based Iris Recognition Aditya Abhyankar a, Lawrence Hornak b and Stephanie Schuckers a,b a Department of Electrical and Computer Engineering, Clarkson University, Potsdam, NY 13676,
More informationChapter 5. Effective Segmentation Technique for Personal Authentication on Noisy Iris Images
110 Chapter 5 Effective Segmentation Technique for Personal Authentication on Noisy Iris Images Automated authentication is a prominent goal in computer vision for personal identification. The demand of
More informationA wavelet based approach to detecting liveness in fingerprint scanners
A wavelet based approach to detecting liveness in fingerprint scanners Aditya Abhyankar a and Stephanie Schuckers a,b a Department of Electrical and Computer Engineering, Clarkson University, Potsdam,
More informationA Framework for Efficient Fingerprint Identification using a Minutiae Tree
A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a
More informationBiometrics Our Past, Present, and Future Identity
Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti
More informationInternational Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online
RESEARCH ARTICLE ISSN: 2321-7758 FACE RECOGNITION SYSTEM USING HMM-BASED TECHNIQUE WITH SVD PARAMETER SUNNY SHAHDADPURI 1, BHAGWAT KAKDE 2 1 PG Research Scholar, 2 Assistant Professor Department of Electronics
More informationNOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION
NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION * Prof. Dr. Ban Ahmed Mitras ** Ammar Saad Abdul-Jabbar * Dept. of Operation Research & Intelligent Techniques ** Dept. of Mathematics. College
More informationAUTHENTICATION SYSTEM USING IRIS RECOGNITION
AUTHENTICATION SYSTEM USING IRIS RECOGNITION A. Shruti Kambli; B. Ankita Malap; C. Punam Naik; D. Pooja Tupe; E. Dr. (Mrs.) Saylee Gharge Abstract Biometric system provides automatic identification of
More informationDIGITAL IMAGE PROCESSING
The image part with relationship ID rid2 was not found in the file. DIGITAL IMAGE PROCESSING Lecture 6 Wavelets (cont), Lines and edges Tammy Riklin Raviv Electrical and Computer Engineering Ben-Gurion
More informationFINGERPRINT MATCHING BASED ON STATISTICAL TEXTURE FEATURES
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationSECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY
Volume 119 No. 15 2018, 1557-1564 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY S. EsaiPuvanesh
More informationBiometric quality for error suppression
Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?
More informationA Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation
A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:
More informationCUDA and OpenCL Implementations of 3D CT Reconstruction for Biomedical Imaging
CUDA and OpenCL Implementations of 3D CT Reconstruction for Biomedical Imaging Saoni Mukherjee, Nicholas Moore, James Brock and Miriam Leeser September 12, 2012 1 Outline Introduction to CT Scan, 3D reconstruction
More informationAn introduction on several biometric modalities. Yuning Xu
An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11
More informationOpenCL Implementation Of A Heterogeneous Computing System For Real-time Rendering And Dynamic Updating Of Dense 3-d Volumetric Data
OpenCL Implementation Of A Heterogeneous Computing System For Real-time Rendering And Dynamic Updating Of Dense 3-d Volumetric Data Andrew Miller Computer Vision Group Research Developer 3-D TERRAIN RECONSTRUCTION
More informationA Novel Identification System Using Fusion of Score of Iris as a Biometrics
A Novel Identification System Using Fusion of Score of Iris as a Biometrics Raj Kumar Singh 1, Braj Bihari Soni 2 1 M. Tech Scholar, NIIST, RGTU, raj_orai@rediffmail.com, Bhopal (M.P.) India; 2 Assistant
More informationCHAPTER 3 RETINAL OPTIC DISC SEGMENTATION
60 CHAPTER 3 RETINAL OPTIC DISC SEGMENTATION 3.1 IMPORTANCE OF OPTIC DISC Ocular fundus images provide information about ophthalmic, retinal and even systemic diseases such as hypertension, diabetes, macular
More informationMulti-View Image Coding in 3-D Space Based on 3-D Reconstruction
Multi-View Image Coding in 3-D Space Based on 3-D Reconstruction Yongying Gao and Hayder Radha Department of Electrical and Computer Engineering, Michigan State University, East Lansing, MI 48823 email:
More informationComparison of High-Speed Ray Casting on GPU
Comparison of High-Speed Ray Casting on GPU using CUDA and OpenGL November 8, 2008 NVIDIA 1,2, Andreas Weinlich 1, Holger Scherl 2, Markus Kowarschik 2 and Joachim Hornegger 1 1 Chair of Pattern Recognition
More informationLarge-scale AFIS and multi-biometric identification. MegaMatcher SDK
Large-scale AFIS and multi-biometric identification MegaMatcher SDK MegaMatcher SDK Large-scale AFIS and multi-biometric identification Document updated on September 21, 2017 Contents MegaMatcher algorithm
More informationProgress Report (July05-Dec05)
Progress Report (July05-Dec05) Project Title: Development of Independent Component Analysis Based Blind Source Separation Algorithms for Audio /Image Separation Principal Investigator Prem K Kalra Department
More informationFingerprint Matching using Gabor Filters
Fingerprint Matching using Gabor Filters Muhammad Umer Munir and Dr. Muhammad Younas Javed College of Electrical and Mechanical Engineering, National University of Sciences and Technology Rawalpindi, Pakistan.
More informationFace identification and movement tracking for video surveillance systems. SentiVeillance SDK
Face identification and movement tracking for video surveillance systems Face identification and movement tracking for video surveillance systems Document updated on May 3, 2017 CONTENTS Features and capabilities.......................................
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationMDR-1 Mobile Document Reader
MDR-1 Mobile Document Reader SPC_MDR-1 1/7 Mobile Document Reader MDR-1 Security Printing Consulting AG The new MDR-1 document reader fulfill the needs for fast and reliable reading, verification and authentication
More informationTowards Securing Biometric Templates using Self Generated Dynamic Helper Data
, June 30 - July 2, 2010, London, U.K. Towards Securing s using Self Generated Dynamic Helper Data Aditya Abhyankar and Stephanie Schuckers Abstract information is irrevokable and hence cannot be compromised.
More informationAbstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;
Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints
More informationMatching Gait Image Sequences in the Frequency Domain for Tracking People at a Distance
Matching Gait Image Sequences in the Frequency Domain for Tracking People at a Distance Ryusuke Sagawa, Yasushi Makihara, Tomio Echigo, and Yasushi Yagi Institute of Scientific and Industrial Research,
More informationA Minimum Number of Features with Full-Accuracy Iris Recognition
Vol. 6, No. 3, 205 A Minimum Number of Features with Full-Accuracy Iris Recognition Ibrahim E. Ziedan Dept. of computers and systems Faculty of Engineering Zagazig University Zagazig, Egypt Mira Magdy
More informationAccurate 3D Face and Body Modeling from a Single Fixed Kinect
Accurate 3D Face and Body Modeling from a Single Fixed Kinect Ruizhe Wang*, Matthias Hernandez*, Jongmoo Choi, Gérard Medioni Computer Vision Lab, IRIS University of Southern California Abstract In this
More informationIn the name of Allah. the compassionate, the merciful
In the name of Allah the compassionate, the merciful Digital Video Systems S. Kasaei Room: CE 315 Department of Computer Engineering Sharif University of Technology E-Mail: skasaei@sharif.edu Webpage:
More informationStatic Scene Reconstruction
GPU supported Real-Time Scene Reconstruction with a Single Camera Jan-Michael Frahm, 3D Computer Vision group, University of North Carolina at Chapel Hill Static Scene Reconstruction 1 Capture on campus
More informationInformation Security Identification and authentication. Advanced User Authentication III
Information Security Identification and authentication Advanced User Authentication III 2016-02-02 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture II within this part of the course Background
More informationCHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS
CHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS 8.1 Introduction The recognition systems developed so far were for simple characters comprising of consonants and vowels. But there is one
More informationMilestone Systems. XProtect Smart Client 2017 R3. Hardware acceleration guide
Milestone Systems XProtect Smart Client 2017 R3 Hardware acceleration guide Contents Hardware acceleration (explained)... 3 Verify your operating system... 4 Check CPU Quick Sync support... 4 Examine the
More informationProjected Texture for Hand Geometry based Authentication
Projected Texture for Hand Geometry based Authentication Avinash Sharma Nishant Shobhit Anoop Namboodiri Center for Visual Information Technology International Institute of Information Technology, Hyderabad,
More informationImplementation of the finite-difference method for solving Maxwell`s equations in MATLAB language on a GPU
Implementation of the finite-difference method for solving Maxwell`s equations in MATLAB language on a GPU 1 1 Samara National Research University, Moskovskoe Shosse 34, Samara, Russia, 443086 Abstract.
More information7.1 INTRODUCTION Wavelet Transform is a popular multiresolution analysis tool in image processing and
Chapter 7 FACE RECOGNITION USING CURVELET 7.1 INTRODUCTION Wavelet Transform is a popular multiresolution analysis tool in image processing and computer vision, because of its ability to capture localized
More informationIRIS Recognition System Based On DCT - Matrix Coefficient Lokesh Sharma 1
Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationIris Recognition for Eyelash Detection Using Gabor Filter
Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition
More informationTo Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique with feature Extraction & Matching
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 84-88 To Improve the Recognition Rate with High Security with Ear/Iris Biometric
More informationComputational Foundations of Cognitive Science
Computational Foundations of Cognitive Science Lecture 16: Models of Object Recognition Frank Keller School of Informatics University of Edinburgh keller@inf.ed.ac.uk February 23, 2010 Frank Keller Computational
More informationDr. Enrique Cabello Pardos July
Dr. Enrique Cabello Pardos July 20 2011 Dr. Enrique Cabello Pardos July 20 2011 ONCE UPON A TIME, AT THE LABORATORY Research Center Contract Make it possible. (as fast as possible) Use the best equipment.
More informationMilestone Systems. XProtect Smart Client 2018 R1. Hardware acceleration guide
Milestone Systems XProtect Smart Client 2018 R1 Hardware acceleration guide Contents Hardware acceleration (explained)... 4 Check hardware acceleration settings... 5 Verify your operating system... 6 Check
More informationINTEGRATING COMPUTER VISION SENSOR INNOVATIONS INTO MOBILE DEVICES. Eli Savransky Principal Architect - CTO Office Mobile BU NVIDIA corp.
INTEGRATING COMPUTER VISION SENSOR INNOVATIONS INTO MOBILE DEVICES Eli Savransky Principal Architect - CTO Office Mobile BU NVIDIA corp. Computer Vision in Mobile Tegra K1 It s time! AGENDA Use cases categories
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationCryptosystem based Multimodal Biometrics Template Security
Cryptosystem based Multimodal Biometrics Template Security Ashish P. Palandurkar Student M.E. WCC, AGPCE, Pragati N. Patil Asst. Prof. AGPCE, Yogesh C. Bhute Asst. Prof, AGPCE, ABSTRACT As we all know
More informationSolution for large-scale AFIS or multi-biometric systems. MegaMatcher Accelerator
Solution for large-scale AFIS or multi-biometric systems MegaMatcher Accelerator MegaMatcher Accelerator Solution for large-scale AFIS or multi-biometric systems Document updated on September 28, 2017
More informationA FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING
A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING Author1: Author2: K.Raghu Ram K.Krishna Chaitanya 4 th E.C.E 4 th E.C.E raghuram.kolipaka@gmail.com chaitu_kolluri@yahoo.com Newton s Institute
More informationTEGRA K1 AND THE AUTOMOTIVE INDUSTRY. Gernot Ziegler, Timo Stich
TEGRA K1 AND THE AUTOMOTIVE INDUSTRY Gernot Ziegler, Timo Stich Previously: Tegra in Automotive Infotainment / Navigation Digital Instrument Cluster Passenger Entertainment TEGRA K1 with Kepler GPU GPU:
More informationCSE / 60537: Biometrics
CSE 40537 / 60537: Biometrics * ** * * ** * * Template Protection 3 62 The Course Instructor Feedback (CIF) survey window for biometrics opens tomorrow December 1st - 13th https://cif.nd.edu/ How'm I doin'?
More informationRobust and Secure Iris Recognition
Robust and Secure Iris Recognition Vishal M. Patel University of Maryland, UMIACS pvishalm@umiacs.umd.edu IJCB 2011 Tutorial Sparse Representation and Low-Rank Representation for Biometrics Outline Iris
More informationMultimodal Biometric System in Secure e- Transaction in Smart Phone
Multimodal Biometric System in Secure e- Transaction in Smart Phone Amit Kumar PG Student Department of computer science.,sssist, Sehore Kailash Patidar Professor Department of computer science,sssist,
More informationTHE TRANSFORM AND DATA COMPRESSION HANDBOOK
THE TRANSFORM AND DATA COMPRESSION HANDBOOK Edited by K.R. RAO University of Texas at Arlington AND RC. YIP McMaster University CRC Press Boca Raton London New York Washington, D.C. Contents 1 Karhunen-Loeve
More informationSingle-view 3D Reconstruction
Single-view 3D Reconstruction 10/12/17 Computational Photography Derek Hoiem, University of Illinois Some slides from Alyosha Efros, Steve Seitz Notes about Project 4 (Image-based Lighting) You can work
More informationImage Processing and Segmentation of Human Eye for Prediction of IRIS
Image Processing and Segmentation of Human Eye for Prediction of IRIS Dr.P.Suresh 1, N.Subramani 2, J.Anish Jafrin Thilak 3, S.Sathishkumar 4, V.V.Arunsankar 5 Professor, Department of Mechanical Engineering,
More informationZ CAM WonderStitch User Guide
Z CAM WonderStitch User Guide Version 0.54 TABLE OF CONTENTS 1. General Information 1 2. Computer Requirements 1 3. Setup Procedures 2 4. WonderStitch Introduction 3 4.1 Enter WonderStitch panel 3 4.2
More informationSpatio-Temporal Registration of Biomedical Images by Computational Methods
Spatio-Temporal Registration of Biomedical Images by Computational Methods Francisco P. M. Oliveira, João Manuel R. S. Tavares tavares@fe.up.pt, www.fe.up.pt/~tavares Outline 1. Introduction 2. Spatial
More informationCombined Fingerprint Minutiae Template Generation
Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of
More informationALGORITHM FOR BIOMETRIC DETECTION APPLICATION TO IRIS
ALGORITHM FOR BIOMETRIC DETECTION APPLICATION TO IRIS Amulya Varshney 1, Dr. Asha Rani 2, Prof Vijander Singh 3 1 PG Scholar, Instrumentation and Control Engineering Division NSIT Sec-3, Dwarka, New Delhi,
More informationCHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM
109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such
More informationA Multimodal Approach to Biometric Recognition
ISSN:0975-9646 A Multimodal Approach to Biometric Recognition Richie M. Varghese Department of Electronics and Telecommunication, Maharashtra Institute of Technology, University of Pune Pune, Maharashtra,
More informationImage Enhancement Techniques for Fingerprint Identification
March 2013 1 Image Enhancement Techniques for Fingerprint Identification Pankaj Deshmukh, Siraj Pathan, Riyaz Pathan Abstract The aim of this paper is to propose a new method in fingerprint enhancement
More informationUjma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved
Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system
More informationApproach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion
Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant
More informationAge and Gender Determination from Finger Prints using RVA and dct Coefficients
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V5 PP 05-09 Age and Gender Determination from Finger Prints using RVA and dct Coefficients Ravi
More informationCIS 580, Machine Perception, Spring 2015 Homework 1 Due: :59AM
CIS 580, Machine Perception, Spring 2015 Homework 1 Due: 2015.02.09. 11:59AM Instructions. Submit your answers in PDF form to Canvas. This is an individual assignment. 1 Camera Model, Focal Length and
More informationA Survey on Security in Palmprint Recognition: A Biometric Trait
A Survey on Security in Palmprint Recognition: A Biometric Trait Dhaneshwar Prasad Dewangan 1, Abhishek Pandey 2 Abstract Biometric based authentication and recognition, the science of using physical or
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor(SJIF): 3.134 e-issn(o): 2348-4470 p-issn(p): 2348-6406 International Journal of Advance Engineering and Research Development Volume 2,Issue 7, July -2015 Estimation
More informationIMPROVING SENSOR NOISE ANALYSIS FOR CT-SCANNER IDENTIFICATION
IMPROVING SENSOR NOISE ANALYSIS FOR CT-SCANNER IDENTIFICATION Anas Kharboutly, William Puech, Gérard Subsol, Denis Hoa ICAR Research Team, LIRMM, University of Montpellier/CNRS, Montpellier, France IMAIOS,
More informationThe Essential Guide to Video Processing
The Essential Guide to Video Processing Second Edition EDITOR Al Bovik Department of Electrical and Computer Engineering The University of Texas at Austin Austin, Texas AMSTERDAM BOSTON HEIDELBERG LONDON
More informationGeorgios Tziritas Computer Science Department
New Video Coding standards MPEG-4, HEVC Georgios Tziritas Computer Science Department http://www.csd.uoc.gr/~tziritas 1 MPEG-4 : introduction Motion Picture Expert Group Publication 1998 (Intern. Standardization
More informationHybrid Biometric Person Authentication Using Face and Voice Features
Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person
More informationBioEnable Iris Recognition Solutions
BioEnable Iris Recognition Solutions Dual Iris Scanner Dual Iris Scanner is a compact USB biometric device used to Iris capture and Iris recognition. Scans 2 eyes at a time in split second Exceed industry
More informationFingerprint Authentication for SIS-based Healthcare Systems
Fingerprint Authentication for SIS-based Healthcare Systems Project Report Introduction In many applications there is need for access control on certain sensitive data. This is especially true when it
More informationRole of Biometrics in Cybersecurity. Sam Youness
Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday
More informationMultimodal Belief Fusion for Face and Ear Biometrics
Intelligent Information Management, 2009, 1, 166-171 doi:10.4236/iim.2009.13024 Published Online December 2009 (http://www.scirp.org/journal/iim) Multimodal Belief Fusion for Face and Ear Biometrics Dakshina
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationLeading Innovation in Biometrics & Security SUPREMA. Biometric Solutions for Mobile. a Whe. Contact: Suprema.
S a Whe en identification matters s Leading Innovation in Biometrics & Security SUPREMA Biometric Solutions for Mobile Contact: C t t Sales@supremainc.com 2016 a Rightsreserved Reserved 2016 a Inc. Inc.
More informationPeg-Free Hand Geometry Verification System
Peg-Free Hand Geometry Verification System Pavan K Rudravaram Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA. {pkr, govind} @cedar.buffalo.edu http://www.cubs.buffalo.edu
More informationOverview. Videos are everywhere. But can take up large amounts of resources. Exploit redundancy to reduce file size
Overview Videos are everywhere But can take up large amounts of resources Disk space Memory Network bandwidth Exploit redundancy to reduce file size Spatial Temporal General lossless compression Huffman
More informationAn Improved Iris Segmentation Technique Using Circular Hough Transform
An Improved Iris Segmentation Technique Using Circular Hough Transform Kennedy Okokpujie (&), Etinosa Noma-Osaghae, Samuel John, and Akachukwu Ajulibe Department of Electrical and Information Engineering,
More informationAdvances in Forensic Anthropology
Advances in Forensic Anthropology Technology Transition Workshop Improving Forensic Facial Reproduction Using Empirical Modeling During this session, attendees will learn of an approach for forensic facial
More informationProduct information. Hi-Tech Electronics Pte Ltd
Product information Introduction TEMA Motion is the world leading software for advanced motion analysis. Starting with digital image sequences the operator uses TEMA Motion to track objects in images,
More informationCHAPTER - 2 LITERATURE REVIEW. In this section of literature survey, the following topics are discussed:
15 CHAPTER - 2 LITERATURE REVIEW In this section of literature survey, the following topics are discussed: Biometrics, Biometric limitations, secured biometrics, biometric performance analysis, accurate
More informationAUTOMATED BALL TRACKING IN TENNIS VIDEO
AUTOMATED BALL TRACKING IN TENNIS VIDEO Tayeba Qazi*, Prerana Mukherjee~, Siddharth Srivastava~, Brejesh Lall~, Nathi Ram Chauhan* *Indira Gandhi Delhi Technical University for Women, Delhi ~Indian Institute
More informationSpoof Detection of Fingerprint Biometrics using PHOG Descriptor
I J C T A, 9(3), 2016, pp. 269-275 International Science Press Spoof Detection of Fingerprint Biometrics using PHOG Descriptor Arunalatha G.* and M. Ezhilarasan** Abstract: Biometrics are used for authentication.
More informationBIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre
More informationFace recognition using Singular Value Decomposition and Hidden Markov Models
Face recognition using Singular Value Decomposition and Hidden Markov Models PETYA DINKOVA 1, PETIA GEORGIEVA 2, MARIOFANNA MILANOVA 3 1 Technical University of Sofia, Bulgaria 2 DETI, University of Aveiro,
More informationUse of Extreme Value Statistics in Modeling Biometric Systems
Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision
More informationA Computationally Efficient Framework for Large-scale Distributed Fingerprint Matching
A Computationally Efficient Framework for Large-scale Distributed Fingerprint Matching Atif Muhammad School of Computer Science and Applied Mathematics University of the Witwatersrand Supervised by: Prof.
More information