Computer Vision Systems. Dean, Faculty of Technology Professor, Department of Technology University of Pune, Pune

Size: px
Start display at page:

Download "Computer Vision Systems. Dean, Faculty of Technology Professor, Department of Technology University of Pune, Pune"

Transcription

1 Improving Performance for Computer Vision Systems Dr. Aditya Abhyankar Dean, Faculty of Technology Professor, Department of Technology University of Pune, Pune

2 Homography based Hybrid Mixture Model for 3D Reconstruction True focal length gets converted into apparent focal length in digital camera In turn, the true depth information gets mapped to apparent depth information 2

3 Homography based Hybrid Mixture Model for 3D Reconstruction The reverse transformation needs to recover, that is to estimate the depth from focal length 3

4 Homography based Hybrid Mixture Model for 3D Reconstruction The projective transformation that relates the two camera views /images An invertible mapping of points or lines projective plane(p 2 ) to another plane (P 2 ) on one Also called as Collineation, aprojective transform or homography P Π Π P 1 Π 2 P Π O 1 P π = HP π O 2 4

5 Experimental Setup - Background plane P 2 P 1 P 3 Object Cam 1 FOV More than Cam 6 Cam 2 Cam 5 Cam3 Cam 4 5

6 Research Non-linear Adaptive Signal Processing Bio-informatics Biometrics Security Systems WORK Statistical Analysis of Signals Biomedical Signal Analysis Scalable Video Coders

7 Research: Biometrics Ideal and Non-Ideal Iris Recognition Fingerprint Liveness Detection Biometric Security Biometrics Iris Template Aging and Update Fingerprint Interoperability Wavelet Based Scalable Video Coders

8 Liveness Detection Algorithm Part (I) Wavelet Based Approach Part (II) Perspiration Pattern Characterization Part (III) Empirical Mode Decomposition Based Approach Part (IV) Fingerprint Ridge and Texture Analysis Approach

9 Liveness Detection Hypothesis Live fingers demonstrate a specific changing moisture pattern due to perspiration. Cadaver and spoof fingerprint images do not. Algorithm uses two fingerprint images over time Original algorithm: capacitive DC, 5-second time frame, small dataset

10 Liveness Detection Perspiration observed in live images after applying the threshold to the first difference of waveletenhanced images Cadaver Spoof Live

11 Iris Recognition

12 Iris Recognition- Segmentation Segments iris region from the rest of the eye image Performs maxima energy extraction Number of wavelet coefficients retained = 10, If iris region is not segmented correctly, it can not be used for doing personal identification

13 Iris Recognition- Segmentation Traditional iris segmentation uses model based transforms like Hough or circular canny Appropriate for on-angle images, but fails for off-axis images Goal: Develop segmentation which improve iris recognition performance, particularly for non-ideal iris images

14 Active Contour Deformation

15 ASM Segmentation

16 BWN (Bi-orthogonal Wavelet Network) The basic idea behind matching using BWNs BWN(y,w) optimized for a particular class of an iris BWN(y,w) specific for that particular class only Any other class is not well represented by the same BWN Each representation gets uniquely trained

17 Encryption Scheme (OTBT) Trained NN to generate representations Mixing Communication Channel Trained HMM Database of Biometric Representations Biometric Template Biometric Representations Encrypted Template Encrypted Template Iterative Blind Source Separation Fuzzy Matcher Acts like transformation and key No use of Raw template Continuously updated i.e. dynamic system stolen not stored Self generating dynamic keys Information No privacy threats

18 Statistical Testing The key stream generated using OTBT tested using the NIST Statistical Test Suite. (Only Reports Number of Streams Failed on average in 1000 independent tests with random keys)

19 Image Quality - Fuzzy c-means

20 CUDA!!!

21 Research Non-linear Adaptive Signal Processing Bio-informatics Biometrics Security Systems WORK Statistical Analysis of Signals Biomedical Signal Analysis Scalable Video Coders

22 Multi-Target Tracking (MTT) Multiple Human targets to be tracked Computationally complex process Applications are real-time

23 MATLAB GPU Computing MATLAB GPU Computing AcceLereYes Jacket Casting input data to Jacket s GPU data-structure To run native codes on the GPU

24 Efficient Multi-target Human Motion Tracking

25 Efficient Multi-target Human Motion Tracking

26 Efficient Multi-target Human Motion Tracking

27 Efficient Multi-target Human Motion Tracking

28 Efficient Multi-target Human Motion Tracking

29 Efficient Multi-target Human Motion Tracking

30 Efficient Multi-target Human Motion Tracking

31 Efficient Multi-target Human Motion Tracking

32 Efficient Multi-target Human Motion Tracking

33 Efficient Multi-target Human Motion Tracking

34 Efficient Multi-target Human Motion Tracking

35 Efficient Multi-target Human Motion Tracking

36 Efficient Multi-target Human Motion Tracking

37 Efficient Multi-target Human Motion Tracking

38 Efficient Multi-target Human Motion Tracking

39 Efficient Multi-target Human Motion Tracking

40 Efficient Multi-target Human Motion Tracking

41 Efficient Multi-target Human Motion Tracking

42 Efficient Multi-target Human Motion Tracking

43 Research Non-linear Adaptive Signal Processing Bio-informatics Biometrics Security Systems WORK Statistical Analysis of Signals Biomedical Signal Analysis Scalable Video Coders

44 Scalable Video Coders (SVCs) Produces bit-stream which can be decoded at different bit rates Encoder design crucial Decoding on less powerful platform possible Streaming Basketball Match Broadcast Channel User 1 ENCODER User n

45 Wavelet based SVC Spatio-temporal scalability Performs motion compensation Mesh based approach Computationally complex GPU-CUDA accelerates Effective implementation

46 Mesh Based MC

47 MATLAB GPU Computing MATLAB GPU Computing AcceLereYes Jacket Casting input data to Jacket s GPU data-structure To run native codes on the GPU

48 Results CPU Specifications GPU Specifications HP xw9400, AMD Dual core nvidia GF 9800 GX2 + AMD processor, 2.00 GHz, RAM 2 Dual Core GB CPU Time (VD-10) GPU Time (VD-10) sec sec Time Units CPU Processing Acceleration Achieved ~ 13x GPU Processing Video Depth

49 Research Non-linear Adaptive Signal Processing Bio-informatics Biometrics Security Systems WORK Statistical Analysis of Signals Biomedical Signal Analysis Scalable Video Coders

50 Research: Biometrics Ideal and Non-Ideal Iris Recognition Fingerprint Liveness Detection Biometric Security Biometrics Iris Template Aging and Update Fingerprint Interoperability Wavelet Based Scalable Video Coders

51 Research: Biometrics Fingerprint Orientations Ideal and Non-Ideal Iris Recognition Fingerprint Liveness Detection Biometric Security Biometrics Iris Template Aging and Update Fingerprint Interoperability Wavelet Based Scalable Video Coders

52 Fingerprint Orientations

53 Results CPU Specifications GPU Specifications HP xw9400, AMD Dual core nvidia GF 9800 GX2 + AMD processor, 2.00 GHz, RAM 2 Dual Core GB CPU Time (dpi-1000) GPU Time (dpi-1000) sec sec Time Units Acceleration Achieved ~ 7x CPU Processing Fingerprint Images dpi resolution GPU Processing

54 Results CPU Specifications GPU Specifications HP xw9400, AMD Dual core nvidia GF 9800 GX2 + AMD processor, 2.00 GHz, RAM 2 Dual Core GB CPU Time (dpi-1000) GPU Time (dpi-1000) sec sec Acceleration Achieved ~ 8x Time Units CPU Processing GPU Processing Facial Images dpi resolution

55 Research Non-linear Adaptive Signal Processing Bio-informatics Biometrics Security Systems WORK Statistical Analysis of Signals Biomedical Signal Analysis Scalable Video Coders

56 Results - CBIR CPU Specifications GPU Specifications HP xw9400, AMD Dual core nvidia GF 9800 GX2 + AMD processor, 2.00 GHz, RAM 2 Dual Core GB CPU Time (dpi-1000) GPU Time (dpi-1000) sec sec Time Units Acceleration Achieved ~ 10x CPU Processing Search Depth GPU Processing

57 Research Non-linear Adaptive Signal Processing Bio-informatics Biometrics Security Systems WORK Statistical Analysis of Signals Biomedical Signal Analysis Scalable Video Coders

58 Fuzzy c-means scatter plot

59 Results CPU Specifications GPU Specifications HP xw9400, AMD Dual core nvidia GF 9800 GX2 + AMD processor, 2.00 GHz, RAM 2 Dual Core GB CPU Time (Epochs-200) GPU Time (Epochs-200) sec 4.87 sec Acceleration Achieved ~ 8x Time Units CPU Processing GPU Processing Epochs

60 P1: Liveness Embedded Multimodal Biometric System Biometric System Security, Forensics LIVENESS Fusion: 1. Image Level 2. Feature Level 3. Score Level

61 P2: Adaptive DPOAE design Dual Pulse Oto-Acoustic Emmissions

62 P3: Homography based 3D voxel mapping for Rehabilitation Engineering

63 P4: Evolutionary Framework for objective diagnosis of cancer

64 P4: Evolutionary Framework for objective diagnosis of Histo-paths Image Analysis Request Flash Viewer Report Generation Protein, Cell, Tissue, Diagnostics libraries Image Analysis Server Application Internet Image Server Application With caching readers / co onnectors image Image Storage 2D Gel scanner HCS Tissue scanner

65 References (selected):

66 Questions?? Thank you!

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

Keywords Palmprint recognition, patterns, features

Keywords Palmprint recognition, patterns, features Volume 7, Issue 3, March 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on Palm

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

MRT based Fixed Block size Transform Coding

MRT based Fixed Block size Transform Coding 3 MRT based Fixed Block size Transform Coding Contents 3.1 Transform Coding..64 3.1.1 Transform Selection...65 3.1.2 Sub-image size selection... 66 3.1.3 Bit Allocation.....67 3.2 Transform coding using

More information

A biometric iris recognition system based on principal components analysis, genetic algorithms and cosine-distance

A biometric iris recognition system based on principal components analysis, genetic algorithms and cosine-distance Safety and Security Engineering VI 203 A biometric iris recognition system based on principal components analysis, genetic algorithms and cosine-distance V. Nosso 1, F. Garzia 1,2 & R. Cusani 1 1 Department

More information

IRIS SEGMENTATION OF NON-IDEAL IMAGES

IRIS SEGMENTATION OF NON-IDEAL IMAGES IRIS SEGMENTATION OF NON-IDEAL IMAGES William S. Weld St. Lawrence University Computer Science Department Canton, NY 13617 Xiaojun Qi, Ph.D Utah State University Computer Science Department Logan, UT 84322

More information

Bio-FactsFigures.docx Page 1

Bio-FactsFigures.docx Page 1 Above shows the G6-BIO-B (Beige case) and the G6-BIO-G (Grey case). Bio-FactsFigures.docx Page 1 Table of Contents 1. Biometric Concepts... 3 1.1. Is it possible to trick the sensor?... 3 1.2. Would a

More information

Biorthogonal wavelets based Iris Recognition

Biorthogonal wavelets based Iris Recognition Biorthogonal wavelets based Iris Recognition Aditya Abhyankar a, Lawrence Hornak b and Stephanie Schuckers a,b a Department of Electrical and Computer Engineering, Clarkson University, Potsdam, NY 13676,

More information

Chapter 5. Effective Segmentation Technique for Personal Authentication on Noisy Iris Images

Chapter 5. Effective Segmentation Technique for Personal Authentication on Noisy Iris Images 110 Chapter 5 Effective Segmentation Technique for Personal Authentication on Noisy Iris Images Automated authentication is a prominent goal in computer vision for personal identification. The demand of

More information

A wavelet based approach to detecting liveness in fingerprint scanners

A wavelet based approach to detecting liveness in fingerprint scanners A wavelet based approach to detecting liveness in fingerprint scanners Aditya Abhyankar a and Stephanie Schuckers a,b a Department of Electrical and Computer Engineering, Clarkson University, Potsdam,

More information

A Framework for Efficient Fingerprint Identification using a Minutiae Tree

A Framework for Efficient Fingerprint Identification using a Minutiae Tree A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a

More information

Biometrics Our Past, Present, and Future Identity

Biometrics Our Past, Present, and Future Identity Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti

More information

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online RESEARCH ARTICLE ISSN: 2321-7758 FACE RECOGNITION SYSTEM USING HMM-BASED TECHNIQUE WITH SVD PARAMETER SUNNY SHAHDADPURI 1, BHAGWAT KAKDE 2 1 PG Research Scholar, 2 Assistant Professor Department of Electronics

More information

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION * Prof. Dr. Ban Ahmed Mitras ** Ammar Saad Abdul-Jabbar * Dept. of Operation Research & Intelligent Techniques ** Dept. of Mathematics. College

More information

AUTHENTICATION SYSTEM USING IRIS RECOGNITION

AUTHENTICATION SYSTEM USING IRIS RECOGNITION AUTHENTICATION SYSTEM USING IRIS RECOGNITION A. Shruti Kambli; B. Ankita Malap; C. Punam Naik; D. Pooja Tupe; E. Dr. (Mrs.) Saylee Gharge Abstract Biometric system provides automatic identification of

More information

DIGITAL IMAGE PROCESSING

DIGITAL IMAGE PROCESSING The image part with relationship ID rid2 was not found in the file. DIGITAL IMAGE PROCESSING Lecture 6 Wavelets (cont), Lines and edges Tammy Riklin Raviv Electrical and Computer Engineering Ben-Gurion

More information

FINGERPRINT MATCHING BASED ON STATISTICAL TEXTURE FEATURES

FINGERPRINT MATCHING BASED ON STATISTICAL TEXTURE FEATURES Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY Volume 119 No. 15 2018, 1557-1564 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY S. EsaiPuvanesh

More information

Biometric quality for error suppression

Biometric quality for error suppression Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?

More information

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:

More information

CUDA and OpenCL Implementations of 3D CT Reconstruction for Biomedical Imaging

CUDA and OpenCL Implementations of 3D CT Reconstruction for Biomedical Imaging CUDA and OpenCL Implementations of 3D CT Reconstruction for Biomedical Imaging Saoni Mukherjee, Nicholas Moore, James Brock and Miriam Leeser September 12, 2012 1 Outline Introduction to CT Scan, 3D reconstruction

More information

An introduction on several biometric modalities. Yuning Xu

An introduction on several biometric modalities. Yuning Xu An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11

More information

OpenCL Implementation Of A Heterogeneous Computing System For Real-time Rendering And Dynamic Updating Of Dense 3-d Volumetric Data

OpenCL Implementation Of A Heterogeneous Computing System For Real-time Rendering And Dynamic Updating Of Dense 3-d Volumetric Data OpenCL Implementation Of A Heterogeneous Computing System For Real-time Rendering And Dynamic Updating Of Dense 3-d Volumetric Data Andrew Miller Computer Vision Group Research Developer 3-D TERRAIN RECONSTRUCTION

More information

A Novel Identification System Using Fusion of Score of Iris as a Biometrics

A Novel Identification System Using Fusion of Score of Iris as a Biometrics A Novel Identification System Using Fusion of Score of Iris as a Biometrics Raj Kumar Singh 1, Braj Bihari Soni 2 1 M. Tech Scholar, NIIST, RGTU, raj_orai@rediffmail.com, Bhopal (M.P.) India; 2 Assistant

More information

CHAPTER 3 RETINAL OPTIC DISC SEGMENTATION

CHAPTER 3 RETINAL OPTIC DISC SEGMENTATION 60 CHAPTER 3 RETINAL OPTIC DISC SEGMENTATION 3.1 IMPORTANCE OF OPTIC DISC Ocular fundus images provide information about ophthalmic, retinal and even systemic diseases such as hypertension, diabetes, macular

More information

Multi-View Image Coding in 3-D Space Based on 3-D Reconstruction

Multi-View Image Coding in 3-D Space Based on 3-D Reconstruction Multi-View Image Coding in 3-D Space Based on 3-D Reconstruction Yongying Gao and Hayder Radha Department of Electrical and Computer Engineering, Michigan State University, East Lansing, MI 48823 email:

More information

Comparison of High-Speed Ray Casting on GPU

Comparison of High-Speed Ray Casting on GPU Comparison of High-Speed Ray Casting on GPU using CUDA and OpenGL November 8, 2008 NVIDIA 1,2, Andreas Weinlich 1, Holger Scherl 2, Markus Kowarschik 2 and Joachim Hornegger 1 1 Chair of Pattern Recognition

More information

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK Large-scale AFIS and multi-biometric identification MegaMatcher SDK MegaMatcher SDK Large-scale AFIS and multi-biometric identification Document updated on September 21, 2017 Contents MegaMatcher algorithm

More information

Progress Report (July05-Dec05)

Progress Report (July05-Dec05) Progress Report (July05-Dec05) Project Title: Development of Independent Component Analysis Based Blind Source Separation Algorithms for Audio /Image Separation Principal Investigator Prem K Kalra Department

More information

Fingerprint Matching using Gabor Filters

Fingerprint Matching using Gabor Filters Fingerprint Matching using Gabor Filters Muhammad Umer Munir and Dr. Muhammad Younas Javed College of Electrical and Mechanical Engineering, National University of Sciences and Technology Rawalpindi, Pakistan.

More information

Face identification and movement tracking for video surveillance systems. SentiVeillance SDK

Face identification and movement tracking for video surveillance systems. SentiVeillance SDK Face identification and movement tracking for video surveillance systems Face identification and movement tracking for video surveillance systems Document updated on May 3, 2017 CONTENTS Features and capabilities.......................................

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

MDR-1 Mobile Document Reader

MDR-1 Mobile Document Reader MDR-1 Mobile Document Reader SPC_MDR-1 1/7 Mobile Document Reader MDR-1 Security Printing Consulting AG The new MDR-1 document reader fulfill the needs for fast and reliable reading, verification and authentication

More information

Towards Securing Biometric Templates using Self Generated Dynamic Helper Data

Towards Securing Biometric Templates using Self Generated Dynamic Helper Data , June 30 - July 2, 2010, London, U.K. Towards Securing s using Self Generated Dynamic Helper Data Aditya Abhyankar and Stephanie Schuckers Abstract information is irrevokable and hence cannot be compromised.

More information

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric; Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints

More information

Matching Gait Image Sequences in the Frequency Domain for Tracking People at a Distance

Matching Gait Image Sequences in the Frequency Domain for Tracking People at a Distance Matching Gait Image Sequences in the Frequency Domain for Tracking People at a Distance Ryusuke Sagawa, Yasushi Makihara, Tomio Echigo, and Yasushi Yagi Institute of Scientific and Industrial Research,

More information

A Minimum Number of Features with Full-Accuracy Iris Recognition

A Minimum Number of Features with Full-Accuracy Iris Recognition Vol. 6, No. 3, 205 A Minimum Number of Features with Full-Accuracy Iris Recognition Ibrahim E. Ziedan Dept. of computers and systems Faculty of Engineering Zagazig University Zagazig, Egypt Mira Magdy

More information

Accurate 3D Face and Body Modeling from a Single Fixed Kinect

Accurate 3D Face and Body Modeling from a Single Fixed Kinect Accurate 3D Face and Body Modeling from a Single Fixed Kinect Ruizhe Wang*, Matthias Hernandez*, Jongmoo Choi, Gérard Medioni Computer Vision Lab, IRIS University of Southern California Abstract In this

More information

In the name of Allah. the compassionate, the merciful

In the name of Allah. the compassionate, the merciful In the name of Allah the compassionate, the merciful Digital Video Systems S. Kasaei Room: CE 315 Department of Computer Engineering Sharif University of Technology E-Mail: skasaei@sharif.edu Webpage:

More information

Static Scene Reconstruction

Static Scene Reconstruction GPU supported Real-Time Scene Reconstruction with a Single Camera Jan-Michael Frahm, 3D Computer Vision group, University of North Carolina at Chapel Hill Static Scene Reconstruction 1 Capture on campus

More information

Information Security Identification and authentication. Advanced User Authentication III

Information Security Identification and authentication. Advanced User Authentication III Information Security Identification and authentication Advanced User Authentication III 2016-02-02 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture II within this part of the course Background

More information

CHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS

CHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS CHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS 8.1 Introduction The recognition systems developed so far were for simple characters comprising of consonants and vowels. But there is one

More information

Milestone Systems. XProtect Smart Client 2017 R3. Hardware acceleration guide

Milestone Systems. XProtect Smart Client 2017 R3. Hardware acceleration guide Milestone Systems XProtect Smart Client 2017 R3 Hardware acceleration guide Contents Hardware acceleration (explained)... 3 Verify your operating system... 4 Check CPU Quick Sync support... 4 Examine the

More information

Projected Texture for Hand Geometry based Authentication

Projected Texture for Hand Geometry based Authentication Projected Texture for Hand Geometry based Authentication Avinash Sharma Nishant Shobhit Anoop Namboodiri Center for Visual Information Technology International Institute of Information Technology, Hyderabad,

More information

Implementation of the finite-difference method for solving Maxwell`s equations in MATLAB language on a GPU

Implementation of the finite-difference method for solving Maxwell`s equations in MATLAB language on a GPU Implementation of the finite-difference method for solving Maxwell`s equations in MATLAB language on a GPU 1 1 Samara National Research University, Moskovskoe Shosse 34, Samara, Russia, 443086 Abstract.

More information

7.1 INTRODUCTION Wavelet Transform is a popular multiresolution analysis tool in image processing and

7.1 INTRODUCTION Wavelet Transform is a popular multiresolution analysis tool in image processing and Chapter 7 FACE RECOGNITION USING CURVELET 7.1 INTRODUCTION Wavelet Transform is a popular multiresolution analysis tool in image processing and computer vision, because of its ability to capture localized

More information

IRIS Recognition System Based On DCT - Matrix Coefficient Lokesh Sharma 1

IRIS Recognition System Based On DCT - Matrix Coefficient Lokesh Sharma 1 Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Iris Recognition for Eyelash Detection Using Gabor Filter

Iris Recognition for Eyelash Detection Using Gabor Filter Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition

More information

To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique with feature Extraction & Matching

To Improve the Recognition Rate with High Security with Ear/Iris Biometric Recognition Technique with feature Extraction & Matching IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 84-88 To Improve the Recognition Rate with High Security with Ear/Iris Biometric

More information

Computational Foundations of Cognitive Science

Computational Foundations of Cognitive Science Computational Foundations of Cognitive Science Lecture 16: Models of Object Recognition Frank Keller School of Informatics University of Edinburgh keller@inf.ed.ac.uk February 23, 2010 Frank Keller Computational

More information

Dr. Enrique Cabello Pardos July

Dr. Enrique Cabello Pardos July Dr. Enrique Cabello Pardos July 20 2011 Dr. Enrique Cabello Pardos July 20 2011 ONCE UPON A TIME, AT THE LABORATORY Research Center Contract Make it possible. (as fast as possible) Use the best equipment.

More information

Milestone Systems. XProtect Smart Client 2018 R1. Hardware acceleration guide

Milestone Systems. XProtect Smart Client 2018 R1. Hardware acceleration guide Milestone Systems XProtect Smart Client 2018 R1 Hardware acceleration guide Contents Hardware acceleration (explained)... 4 Check hardware acceleration settings... 5 Verify your operating system... 6 Check

More information

INTEGRATING COMPUTER VISION SENSOR INNOVATIONS INTO MOBILE DEVICES. Eli Savransky Principal Architect - CTO Office Mobile BU NVIDIA corp.

INTEGRATING COMPUTER VISION SENSOR INNOVATIONS INTO MOBILE DEVICES. Eli Savransky Principal Architect - CTO Office Mobile BU NVIDIA corp. INTEGRATING COMPUTER VISION SENSOR INNOVATIONS INTO MOBILE DEVICES Eli Savransky Principal Architect - CTO Office Mobile BU NVIDIA corp. Computer Vision in Mobile Tegra K1 It s time! AGENDA Use cases categories

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

Cryptosystem based Multimodal Biometrics Template Security

Cryptosystem based Multimodal Biometrics Template Security Cryptosystem based Multimodal Biometrics Template Security Ashish P. Palandurkar Student M.E. WCC, AGPCE, Pragati N. Patil Asst. Prof. AGPCE, Yogesh C. Bhute Asst. Prof, AGPCE, ABSTRACT As we all know

More information

Solution for large-scale AFIS or multi-biometric systems. MegaMatcher Accelerator

Solution for large-scale AFIS or multi-biometric systems. MegaMatcher Accelerator Solution for large-scale AFIS or multi-biometric systems MegaMatcher Accelerator MegaMatcher Accelerator Solution for large-scale AFIS or multi-biometric systems Document updated on September 28, 2017

More information

A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING

A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING Author1: Author2: K.Raghu Ram K.Krishna Chaitanya 4 th E.C.E 4 th E.C.E raghuram.kolipaka@gmail.com chaitu_kolluri@yahoo.com Newton s Institute

More information

TEGRA K1 AND THE AUTOMOTIVE INDUSTRY. Gernot Ziegler, Timo Stich

TEGRA K1 AND THE AUTOMOTIVE INDUSTRY. Gernot Ziegler, Timo Stich TEGRA K1 AND THE AUTOMOTIVE INDUSTRY Gernot Ziegler, Timo Stich Previously: Tegra in Automotive Infotainment / Navigation Digital Instrument Cluster Passenger Entertainment TEGRA K1 with Kepler GPU GPU:

More information

CSE / 60537: Biometrics

CSE / 60537: Biometrics CSE 40537 / 60537: Biometrics * ** * * ** * * Template Protection 3 62 The Course Instructor Feedback (CIF) survey window for biometrics opens tomorrow December 1st - 13th https://cif.nd.edu/ How'm I doin'?

More information

Robust and Secure Iris Recognition

Robust and Secure Iris Recognition Robust and Secure Iris Recognition Vishal M. Patel University of Maryland, UMIACS pvishalm@umiacs.umd.edu IJCB 2011 Tutorial Sparse Representation and Low-Rank Representation for Biometrics Outline Iris

More information

Multimodal Biometric System in Secure e- Transaction in Smart Phone

Multimodal Biometric System in Secure e- Transaction in Smart Phone Multimodal Biometric System in Secure e- Transaction in Smart Phone Amit Kumar PG Student Department of computer science.,sssist, Sehore Kailash Patidar Professor Department of computer science,sssist,

More information

THE TRANSFORM AND DATA COMPRESSION HANDBOOK

THE TRANSFORM AND DATA COMPRESSION HANDBOOK THE TRANSFORM AND DATA COMPRESSION HANDBOOK Edited by K.R. RAO University of Texas at Arlington AND RC. YIP McMaster University CRC Press Boca Raton London New York Washington, D.C. Contents 1 Karhunen-Loeve

More information

Single-view 3D Reconstruction

Single-view 3D Reconstruction Single-view 3D Reconstruction 10/12/17 Computational Photography Derek Hoiem, University of Illinois Some slides from Alyosha Efros, Steve Seitz Notes about Project 4 (Image-based Lighting) You can work

More information

Image Processing and Segmentation of Human Eye for Prediction of IRIS

Image Processing and Segmentation of Human Eye for Prediction of IRIS Image Processing and Segmentation of Human Eye for Prediction of IRIS Dr.P.Suresh 1, N.Subramani 2, J.Anish Jafrin Thilak 3, S.Sathishkumar 4, V.V.Arunsankar 5 Professor, Department of Mechanical Engineering,

More information

Z CAM WonderStitch User Guide

Z CAM WonderStitch User Guide Z CAM WonderStitch User Guide Version 0.54 TABLE OF CONTENTS 1. General Information 1 2. Computer Requirements 1 3. Setup Procedures 2 4. WonderStitch Introduction 3 4.1 Enter WonderStitch panel 3 4.2

More information

Spatio-Temporal Registration of Biomedical Images by Computational Methods

Spatio-Temporal Registration of Biomedical Images by Computational Methods Spatio-Temporal Registration of Biomedical Images by Computational Methods Francisco P. M. Oliveira, João Manuel R. S. Tavares tavares@fe.up.pt, www.fe.up.pt/~tavares Outline 1. Introduction 2. Spatial

More information

Combined Fingerprint Minutiae Template Generation

Combined Fingerprint Minutiae Template Generation Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of

More information

ALGORITHM FOR BIOMETRIC DETECTION APPLICATION TO IRIS

ALGORITHM FOR BIOMETRIC DETECTION APPLICATION TO IRIS ALGORITHM FOR BIOMETRIC DETECTION APPLICATION TO IRIS Amulya Varshney 1, Dr. Asha Rani 2, Prof Vijander Singh 3 1 PG Scholar, Instrumentation and Control Engineering Division NSIT Sec-3, Dwarka, New Delhi,

More information

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM 109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such

More information

A Multimodal Approach to Biometric Recognition

A Multimodal Approach to Biometric Recognition ISSN:0975-9646 A Multimodal Approach to Biometric Recognition Richie M. Varghese Department of Electronics and Telecommunication, Maharashtra Institute of Technology, University of Pune Pune, Maharashtra,

More information

Image Enhancement Techniques for Fingerprint Identification

Image Enhancement Techniques for Fingerprint Identification March 2013 1 Image Enhancement Techniques for Fingerprint Identification Pankaj Deshmukh, Siraj Pathan, Riyaz Pathan Abstract The aim of this paper is to propose a new method in fingerprint enhancement

More information

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system

More information

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant

More information

Age and Gender Determination from Finger Prints using RVA and dct Coefficients

Age and Gender Determination from Finger Prints using RVA and dct Coefficients IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V5 PP 05-09 Age and Gender Determination from Finger Prints using RVA and dct Coefficients Ravi

More information

CIS 580, Machine Perception, Spring 2015 Homework 1 Due: :59AM

CIS 580, Machine Perception, Spring 2015 Homework 1 Due: :59AM CIS 580, Machine Perception, Spring 2015 Homework 1 Due: 2015.02.09. 11:59AM Instructions. Submit your answers in PDF form to Canvas. This is an individual assignment. 1 Camera Model, Focal Length and

More information

A Survey on Security in Palmprint Recognition: A Biometric Trait

A Survey on Security in Palmprint Recognition: A Biometric Trait A Survey on Security in Palmprint Recognition: A Biometric Trait Dhaneshwar Prasad Dewangan 1, Abhishek Pandey 2 Abstract Biometric based authentication and recognition, the science of using physical or

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor(SJIF): 3.134 e-issn(o): 2348-4470 p-issn(p): 2348-6406 International Journal of Advance Engineering and Research Development Volume 2,Issue 7, July -2015 Estimation

More information

IMPROVING SENSOR NOISE ANALYSIS FOR CT-SCANNER IDENTIFICATION

IMPROVING SENSOR NOISE ANALYSIS FOR CT-SCANNER IDENTIFICATION IMPROVING SENSOR NOISE ANALYSIS FOR CT-SCANNER IDENTIFICATION Anas Kharboutly, William Puech, Gérard Subsol, Denis Hoa ICAR Research Team, LIRMM, University of Montpellier/CNRS, Montpellier, France IMAIOS,

More information

The Essential Guide to Video Processing

The Essential Guide to Video Processing The Essential Guide to Video Processing Second Edition EDITOR Al Bovik Department of Electrical and Computer Engineering The University of Texas at Austin Austin, Texas AMSTERDAM BOSTON HEIDELBERG LONDON

More information

Georgios Tziritas Computer Science Department

Georgios Tziritas Computer Science Department New Video Coding standards MPEG-4, HEVC Georgios Tziritas Computer Science Department http://www.csd.uoc.gr/~tziritas 1 MPEG-4 : introduction Motion Picture Expert Group Publication 1998 (Intern. Standardization

More information

Hybrid Biometric Person Authentication Using Face and Voice Features

Hybrid Biometric Person Authentication Using Face and Voice Features Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person

More information

BioEnable Iris Recognition Solutions

BioEnable Iris Recognition Solutions BioEnable Iris Recognition Solutions Dual Iris Scanner Dual Iris Scanner is a compact USB biometric device used to Iris capture and Iris recognition. Scans 2 eyes at a time in split second Exceed industry

More information

Fingerprint Authentication for SIS-based Healthcare Systems

Fingerprint Authentication for SIS-based Healthcare Systems Fingerprint Authentication for SIS-based Healthcare Systems Project Report Introduction In many applications there is need for access control on certain sensitive data. This is especially true when it

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

Multimodal Belief Fusion for Face and Ear Biometrics

Multimodal Belief Fusion for Face and Ear Biometrics Intelligent Information Management, 2009, 1, 166-171 doi:10.4236/iim.2009.13024 Published Online December 2009 (http://www.scirp.org/journal/iim) Multimodal Belief Fusion for Face and Ear Biometrics Dakshina

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Leading Innovation in Biometrics & Security SUPREMA. Biometric Solutions for Mobile. a Whe. Contact: Suprema.

Leading Innovation in Biometrics & Security SUPREMA. Biometric Solutions for Mobile. a Whe. Contact: Suprema. S a Whe en identification matters s Leading Innovation in Biometrics & Security SUPREMA Biometric Solutions for Mobile Contact: C t t Sales@supremainc.com 2016 a Rightsreserved Reserved 2016 a Inc. Inc.

More information

Peg-Free Hand Geometry Verification System

Peg-Free Hand Geometry Verification System Peg-Free Hand Geometry Verification System Pavan K Rudravaram Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA. {pkr, govind} @cedar.buffalo.edu http://www.cubs.buffalo.edu

More information

Overview. Videos are everywhere. But can take up large amounts of resources. Exploit redundancy to reduce file size

Overview. Videos are everywhere. But can take up large amounts of resources. Exploit redundancy to reduce file size Overview Videos are everywhere But can take up large amounts of resources Disk space Memory Network bandwidth Exploit redundancy to reduce file size Spatial Temporal General lossless compression Huffman

More information

An Improved Iris Segmentation Technique Using Circular Hough Transform

An Improved Iris Segmentation Technique Using Circular Hough Transform An Improved Iris Segmentation Technique Using Circular Hough Transform Kennedy Okokpujie (&), Etinosa Noma-Osaghae, Samuel John, and Akachukwu Ajulibe Department of Electrical and Information Engineering,

More information

Advances in Forensic Anthropology

Advances in Forensic Anthropology Advances in Forensic Anthropology Technology Transition Workshop Improving Forensic Facial Reproduction Using Empirical Modeling During this session, attendees will learn of an approach for forensic facial

More information

Product information. Hi-Tech Electronics Pte Ltd

Product information. Hi-Tech Electronics Pte Ltd Product information Introduction TEMA Motion is the world leading software for advanced motion analysis. Starting with digital image sequences the operator uses TEMA Motion to track objects in images,

More information

CHAPTER - 2 LITERATURE REVIEW. In this section of literature survey, the following topics are discussed:

CHAPTER - 2 LITERATURE REVIEW. In this section of literature survey, the following topics are discussed: 15 CHAPTER - 2 LITERATURE REVIEW In this section of literature survey, the following topics are discussed: Biometrics, Biometric limitations, secured biometrics, biometric performance analysis, accurate

More information

AUTOMATED BALL TRACKING IN TENNIS VIDEO

AUTOMATED BALL TRACKING IN TENNIS VIDEO AUTOMATED BALL TRACKING IN TENNIS VIDEO Tayeba Qazi*, Prerana Mukherjee~, Siddharth Srivastava~, Brejesh Lall~, Nathi Ram Chauhan* *Indira Gandhi Delhi Technical University for Women, Delhi ~Indian Institute

More information

Spoof Detection of Fingerprint Biometrics using PHOG Descriptor

Spoof Detection of Fingerprint Biometrics using PHOG Descriptor I J C T A, 9(3), 2016, pp. 269-275 International Science Press Spoof Detection of Fingerprint Biometrics using PHOG Descriptor Arunalatha G.* and M. Ezhilarasan** Abstract: Biometrics are used for authentication.

More information

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre

More information

Face recognition using Singular Value Decomposition and Hidden Markov Models

Face recognition using Singular Value Decomposition and Hidden Markov Models Face recognition using Singular Value Decomposition and Hidden Markov Models PETYA DINKOVA 1, PETIA GEORGIEVA 2, MARIOFANNA MILANOVA 3 1 Technical University of Sofia, Bulgaria 2 DETI, University of Aveiro,

More information

Use of Extreme Value Statistics in Modeling Biometric Systems

Use of Extreme Value Statistics in Modeling Biometric Systems Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision

More information

A Computationally Efficient Framework for Large-scale Distributed Fingerprint Matching

A Computationally Efficient Framework for Large-scale Distributed Fingerprint Matching A Computationally Efficient Framework for Large-scale Distributed Fingerprint Matching Atif Muhammad School of Computer Science and Applied Mathematics University of the Witwatersrand Supervised by: Prof.

More information