Secure Fuzzy Vault Based Fingerprint Verification System

Size: px
Start display at page:

Download "Secure Fuzzy Vault Based Fingerprint Verification System"

Transcription

1 Secure Fuzzy Vault ased Fngerprnt Verfcaton System Shengln Yang UCL Dept of EE Los ngeles, C shenglny@ee.ucla.edu bstract--ths paper descrbes a secure fngerprnt verfcaton system based on the fuzzy vault scheme, where the senstve bometrc template s not stored, but a transformed verson. e propose an adaptve algnment technque to reach the most relable reference pont, and a methodology to construct a set of rotaton and shftng nvarant features, actng as the loc set for the fuzzy vault. e nvestgate the parameters of the fuzzy vault and the number of the templates needed to obtan a relable reference pont, such that a hgh unloc complexty for attacers wth an acceptable unloc rate for the legal users s acheved. I. INTRODUCTION The authentcaton system based on bometrc nformaton offers greater securty and convenence than the tradtonal methods of personal recognton. long wth the rapd growng of ths emergng technology, the system performance, such as accuracy and speed, s contnuously mproved. One of the most sgnfcant dsadvantages of all the bometrc recognton systems s that the bometrc ey cannot be easly recalled. Therefore storng the bometrc template securely s becomng extremely mportant. One possble approach s to encrypt the template usng a secret ey before storng t. s soon as the nput sgnal comes, the matcher decrypts the template and performs the comparson. However, some dedcated attacs can stll extract the secure ey, and n turn, the template by tracng the revealed nformaton from the physcal mplementaton, such as varatons n tme, power consumpton and electromagnetc radaton. These types of attacs are called Sde Channel ttacs (SC), among whch the dfferental power analyss (DP) s the most powerful one. It reles on statstcal analyss and error correcton to extract nformaton from the power consumpton that s correlated to secret data [1]. One soluton to ths problem s to store a nonnvertble transformed verson, for nstance a hash, of the template on the embedded devce, and the comparson s performed n the transformed space. One man property of a cryptographc random hash functon s that the output hush value wll not gve any nformaton about even part of the nput [2]. Therefore, the smlarty n the nput wll not reflect n the output hash value. However, for most bometrcs, the exactness for dfferent captures s usually not avalable, and the match algorthms are normally based on the smlarty. To Ths wor s sponsored by the NSF, account no CCR and UC MICRO. Ingrd M. Verbauwhede UCL Dept of EE & K.U.Leuven Los ngeles, C ngrd@ee.ucla.edu address ths problem, we adopt the dea of fuzzy vault scheme [3] to conduct the fngerprnt authentcaton. Ths paper s organzed as followng: secton II brefly revews some related wor about the secure authentcaton methods as well as the fngerprnt matchng technques. Secton III presents the basc dea and the mplementaton of the fuzzy vault scheme. Secton IV dscusses the strategy used to algn the nput fngerprnt mages to mae the system automatc and adaptve. Secton V shows some expermental results. nd fnally Secton VI draws a concluson. II. RELTED ORK There have been many research efforts amng at the fngerprnt user dentfcaton. Recently, a novel cryptographc constructon called fuzzy commtment scheme has been proposed and employed n the feld of bometrc authentcaton.. Fngerprnt Fuzzy Vault The fuzzy commtment scheme s frst proposed n [4] to ntegrate well-nown error-control codng and cryptographc technques to construct a novel type of cryptographc system. Instead of an exact, unque decrypton ey, a reasonable close wtness can be accepted to decrypt the commtment. Ths characterstc maes t possble for protectng the bometrc data usng tradtonal cryptographc technques. However, snce the fuzzy vault used n ths scheme does not have the property of order nvarance, any elements mssng or addng wll result n the falure of matchng. To overcome ths problem, [3] proposed a new archtecture, whch possesses the advantage of order-nvarance. t the same tme, the authors suggested that one of the mportant applcatons of the fuzzy commtment s to secure bometrc systems. Followng ths drecton, [5] employed the fuzzy vault scheme on a secure smartcard system, where the fngerprnt authentcaton s used to protect the prvate ey. In the bometrc cryptosystem, the secret nformaton s hdden as coeffcents n a polynomal, whch acts as the frame of the fuzzy commtment. The fngerprnt vault constructon s based on the assumpton that the fngerprnt features are extracted and well algned n a blac box. Our wor wll address the algnment problem n a systematc way to mae the authentcaton system automatc and adaptve /04/$ IEEE 577

2 . Fngerprnt Matchng lgorthm For modern embedded fngerprnt recognton systems, the matchng algorthm s usually based on the mnutae feature. The reason s, on the one hand, the mnutae of the fngerprnt are wdely beleved the most dscrmnatng and relable feature, and on the other hand, the template sze of the mnutae s much smaller and the processng speed s hgher than that of graph-based matchng. These characterstcs are very mportant for savng memory and energy on the embedded devces. Reference [6] uses the local structure of the mnutae to descrbe the characterstcs of the mnutae set. Ths approach has hgher processng speed, and s robust to rotaton and partal prnts. However, the local structure usually has less dstnct features because t only represents parts of the whole mnutae set. lgnment-based matchng algorthms tae use of the shape of the rdge connected to the mnutae [7]. Ths mght mprove the system accuracy, but results n a larger template sze. Some other researches combne the local and global structures [8]. The local structure s used to fnd the correspondence of two mnutae sets and ncrease the relablty of the global matchng, whle the global structure relably determnes the unqueness of a fngerprnt. In our wor, the local-global nformaton ntegraton s employed to perform the fngerprnt mnutae algnment before the features are ported nto the fuzzy vault. To address the problem of SC, [9] dvdes the fngerprnt match engne nto two parts. Only the relatvely small secure part contanng the senstve bometrc nformaton s executed on a specalzed DP-proof logc bloc, whch does not reveal the power consumpton varatons durng operatons. In spte of the careful dvson, the secure part stll consumes large numbers of area and energy due to the specal desgn of the DP-proof logc as well as the frequent data exchange between the embedded processor and the DP-proof bloc. In ths wor we replace the bometrc template stored n the DP-proof bloc wth a randomly generated bt stream and only a one-tme comparson s needed for each attempt of the verfcaton algorthm. III. FUZZY VULT SCHEME. The basc dea of fuzzy vault Fuzzy vault scheme s a smple and novel cryptographc constructon. Suppose we have a secret, whch we want to share wth some specfc persons, but do not want to post t ndscrmnately on some untrusted places, such as a publc webste. One approach s to comple a set of elements wth the secret and publsh t n an encrypted form. To extract the secret nformaton, one needs to have an unloc set, whch s close to, to unloc the vault. Ths vault s a form of error-tolerant cryptographc algorthm and proved very useful n many crcumstances, such as fuzzy human factor based authentcaton systems, where exactness of the unloc ey s usually unavalable. Several examples are presented n [3] ncludng the bometrc applcatons, whch we plan to nvestgate n ths paper. Follow the dea n [5], the fuzzy encrypt ey conssts of a set of elements loc, 1,2,..., n, where n s the sze of loc set. The fuzzy vault contans all pars ( p loc ), where p x s a nown polynomal. esdes these true pars whch represent the characterstcs of the loc set, large number of mpostor pars ( mpostorj, p mpostor j ), where j 1,2,...,r and p x px, are also added to the fuzzy vault. p x s a random functon. For a legal user, a set of elements unloc, whch s reasonably close to loc, s avalable. lso we assume that the numbers of loc set and unloc set are larger than the degree of the polynomal, d. Therefore, the user can unloc ths fuzzy vault by tryng to reconstruct the polynomal usng the unloc set. If the overlap between the loc set and the unloc set satsfes the polynomal reconstructon condton, the verfcaton process successes. From an attacer s pont of vew, deally, the unloc set s a unformly dstrbuted random set. To successfully attac the fuzzy vault wthout any nowledge about the loc set, the attacer has to frst separate the true pars from the mpostor pars by brute force trals. Snce the number of the mpostor pars s far larger than that of the true pars, the separaton operaton s formdably dffcult.. Fngerprnt Fuzzy Vault s we mentoned before the securty requrement of the bometrc template storage s very strct snce the bometrc data are usually rreplaceable and the lost of these precous nformaton mght lead to serous securty problems. To address ths ssue, nstead of storng the bometrc template, we store a machne-generated bt stream as the secret. The way we present the secret s to hde t as the coeffcents for a polynomal, p x, whch s used as the frame to construct the fuzzy vault. Fngerprnt verfcaton s usually based on the pattern matchng of the feature extracted from the fngerprnt mages. Here we descrbe the mnutae feature of a fngerprnt mage as, 1,2,..., n, where n s the total number of the feature ponts. Thus the pars (, p ) form the loc set of the fngerprnt fuzzy vault. For the mpostor pars, we randomly choose and j, j 1,2,..., r, where j j p j. Note that the dstance between any and any must be greater than a mnmum dstance d mn. The value of d mn depends on the characterstc of the feature ponts as well as the performance requrement. e wll dscuss ths n secton V. There exts a X, to the set one-to-one projecton between the set j Y p, loc, j. Durng the unlocng procedure, the user s fngerprnt s captured and processed to get the mnutae feature set { }. Snce two bometrc readngs are rarely exactly the same, even though they are lely to be close, { } and { } are usually not dentcal. To perform the unlocng, for each, we search n the whole fuzzy vault to reach the closest element and t s correspondng,, 1,2,..., m, s the unloc set. Thus, the set 578

3 generated as the ey to the fuzzy vault, where m s the number of features extracted from the user s nput fngerprnt. Now the verfcaton s equvalent to the problem below: Gven m pars of ponts, F F, there exsts a polynomal p of degree at most d such that for all but values of,,, where d m p 2. ccordng to the erleamp-elch error correctng code theory, ths problem can be solved by fndng the soluton for a lnear constrant system N, 1,2,..., m, where deg and deg K d. fter all the unnowns are calculated out, p N / s the result polynomal [10]. In order to act as the loc set, the features extracted from the fngerprnt mages need to satsfy two condtons: (1) dstngushable from each other so that no more than one feature results n a same par n the loc set; (2) the dfference between several scans of prnt from a same fnger s acceptable small. In the followng sectons, we wll dscuss the selecton of the feature as well as the automatc feature algnment, whch wll be proven very mportant for automatc authentcaton systems. IV. FETURE SELECTION Fngerprnt mnutae are defned as the endngs of one rdge and the crossngs of two rdges. The most straghtforward way to construct the loc set s to use the x, y coordnates of each mnuta [5]. However, Fg. 1 shows that the effect of the fngerprnt shftng and rotaton on the poston of the mnutae features s not gnorable and wll result n dffculty of matchng. Therefore, ths feature depends on the poston and angle of the nput fngerprnts. In order to address ths problem, we propose a new feature r,, where r s the dstance between one mnuta and a specfc reference pont, and s the assocated drecton as shown n Fg. 2. oth r and are represented by 8 bts, and the concatenaton of, s an element of the fnte feld. If the specfc reference pont s correctly chosen, the these two values, r 8 16 GF 2 proposed feature wll be ndependent of the shftng and rotaton of the nput mages. Fg. 3 shows four algned sets of mnutae from a same fnger. In order to fnd the reference pont, we adopt the methodology proposed n [11]. smplfed rotaton and translaton nvarant local feature s constructed as: M d, 1 d2, 1, 2, 1, Fg. 2 ndcates the detals of ths local feature. ssume M j are the local feature vectors of the th M and th mnuta of the fngerprnt and the j mnuta of the fngerprnt, respectvely, the smlarty level of these two mnutae can be defned as: M sl, j 1 M j, f M 0, otherwse 2 M j r 1 1 r (a) (b) Fg. 2. Concept of the proposed feature (c) Fg. 1. The effect of shftng and rotaton on the feature poston. (a) and (b) are two prnts from a same fnger; (c) s the postons of the features. Fg. 3. Overlap of four mnutae feature sets algned based on the wellselected reference pont. 579

4 1,2...p j 1,2... q where p and q are the total numbers of mnutae n fngerprnt and, respectvely. M M j s the weghed dstance between two local feature vectors. s a fxed threshold, whch s related to the weght vector. In ths paper, we set 1,1,8,8,8,8 and 55. y thoroughly searchng sl, j, mnutae pars M, M j can be ordered accordng to the assocated smlarty level. Intutvely, the par wth largest smlarty value can be taen as the reference par. To fnd the relable reference par, we use three fngerprnts (,, C ) from one fnger as the templates and the smlarty metrc we use s sl(, j) slc ( j, ). The largest value ndcates the most relable mnuta n three of these prnts. Fg. 4 presents the dstrbuton of the smlarty levels for all possble combnatons of the mnutae n three fngerprnts. fter fndng out the most relable reference pont, we algn the rest of the mnutae n polar system and also store the local structure of the reference mnuta. Then the next step s to fgure out the refer pont n the nput fngerprnt based on the stored local structure and convert the rest of the mnutae n a polar system. The polar coordnates of the nput fngerprnt mnutae s what we use as the unloc set n our fngerprnt fuzzy vault. V. RESULT e get ten prnts for each fnger, among whch three are randomly chosen to be the templates for reachng the relable reference mnuta. However, there are cases that from three templates, the relable par cannot be successfully acheved. In an automatc system, ths falure needs to be detected by ntroducng a threshold to lmt the mnmum smlarty for beng the reference feature pont. If the sum-up smlarty level sl(, j) slc ( j, ) s less than the threshold, t shows that the reference pont s not relable. In ths case, more templates are needed to perform the selecton. Fg. 5 shows the number of templates needed expermentally. From the result we fnd that four templates durng enrollment phase ((12,10), 9, ) can guarantee to acheve the relable reference pont wth a possblty hgher than 99%. The selecton of the fuzzy vault parameters s very mportant for the verfcaton performance. Frst we nvestgate the effect of the degree of the polynomal, d. ccordng to the erleamp-elch error correctng code theory, the condton nequaton s 2 d m. In other words, to successfully decode the fuzzy vault, the number of the mpostor ponts must satsfy: m d / 2, where m s the total number of the nput mnutae ponts. Intutvely, the maxmum acceptable mpostor pont number should depend on the total unloc set sze m. For fngerprnts wth larger number of mnutae, the degree of the underlyng polynomal needs to be larger, so that the maxmum value of ncreases accordngly. y ntroducng ths self-adaptve scheme, the fuzzy vault wll sut for fngerprnts wth dfferent sze of feature sets. Fg. 6 shows the relatonshp between the unlocng complextes of the fuzzy vault and the degree of the polynomal, where m 30 for a typcal case. From ths fgure, we can fnd that hgher degree polynomal provdes hgher complexty, n turn, hgher level of securty. However, from another pont of vew, for hgher degree polynomal, the maxmum acceptable mpostor pont sze becomes smaller, whch wll ncrease the False Reject Rate (FRR) for the verfcaton system. Therefore a sutable polynomal degree s needed to acheve the desrable tread-off between the securty and the matchng accuracy. Experments show that for m / d 3, the successful unlocng rate s about 83%, whch s acceptable n most of the realstc mplementatons. In ths d M / 3. paper, we choose Possblty of fndng relable reference Smlarty Level Number of templates Fg. 5. Relatonshp between the possblty of fndng relable reference and the number of templates (,j) Fg. 4. Dstrbuton of the smlarty for three fngerprnts. 580

5 Fg. 6. The unloc complexty vares accordng to the degree of polynomal for dfferent sze of mpostor pont. The experments also show that the mnmum dstance between any mpostor ponts and any loc set ponts s another mportant parameter, whch affects the performance. hen we randomly generate the mpostor ponts, we need to mae sure the mnmum dstance s satsfed. The mnmum dstance needs to be at least twce as large as the acceptable dstance of a mnuta poston between dfferent scans. Fg. 7 shows the relatonshp between the mnmum dstance and the matchng accuracy. esdes the mnmum dstance, the number of the mpostor ponts also needs to be taen nto consderaton durng the fuzzy vault constructng. If the number of the mpostor ponts s set too small, accordng to the unlocng algorthm, the nput features are more lely to be closer to the loc set ponts, whch wll result n hgher False ccept Rate (FR). Smlarly, f the sze of mpostor ponts s too bg, a feature pont s more lely to be classfed as an mpostor pont. Ths wll lead to hgher False Reject Rate (FRR). VI. CONCLUSION e construct our database by 10 prnts per fnger from 10 dfferent fngers, formng a total 100 fngerprnt mages. Employng the automatc fuzzy vault constructon and unlocng algorthms wth the followng parameters: mpostor ponts sze r 200, polynomal degree d M /3, and mnmum dstance d mn 13, the successful unlocng rate s about 83%. The error rate s acceptable, whle relatvely hgher compared to the tradtonal fngerprnt verfcaton algorthm [2]. Ths degradaton can be explaned by the characterstc of the underlyng error-correct codng scheme we adopted for the fuzzy vault unlocng snce the condton for the erleamp-elch error correctng code theory s more strct compared to the exstng mnutae-based fngerprnt verfcaton algorthm. REFERENCES [1] Kocher, P., Jaffe, J., and Jun,., Dfferental power analyss, Proceedng of dvances n Cryptology Crypto th nnual Internatonal Cryptology Conference. 1999, pp erln, Germany. [2] nderson, R.J., Securty Engneerng, Gude to uldng Dependable Dstrbuted Systems, John ley & Sons, [3] Juels,. and Sudan, M., fuzzy vault scheme, Proceedngs 2002 IEEE Internatonal Symposum on Informaton Theory, 2002, pp.408. Pscataway, NJ. [4] Juels,. and attenberg, M., fuzzy commtment scheme. 6th CM Conference on Computer and Communcatons Securty, 1999, pp.28-36, New Yor, NY. [5] Clancy, T.C., Kyavash, N., and Ln, D.J., Secure smartcard-based fngerprnt authentcaton, CM orshop on ometrcs: Methods and pplcatons, Nov. 2003, pp , ereley, C. [6] Hrecha, K and McHugh, J. utomated fngerprnt recognton usng structural matchng, Pattern Recognton, vol.23, no.8, 1990, pp UK. [7] Jan,., Ln, H., and olle, R., On-lne fngerprnt verfcaton, IEEE Transactons on Pattern nalyss and Machne Intellgence, vol.19, no.4, prl 1997, pp [8] Jang, X. and Yau,., Fngerprnt mnutae matchng based on the local and global structures, Proceedngs 15th Internatonal Conference on Pattern Recognton. 2000, pp vol.2. Los lamtos, C. [9] Yang, S. and Verbauwhede, I., secure fngerprnt matchng technque, CM orshop on ometrcs: Methods and pplcatons, Nov pp , ereley, C. [10] Gemmell, P. and Sudan, M., Hghly reslent correctors for polynomals, Informaton Processng Letters, vol.43, no.4, Sept. 1992, pp , Netherlands. [11] Yang, S., Sayama, K. and Verbauwhede, I., Secure and Effcent Fngerprnt Verfcaton System for Embedded Systems, 37 th slomar Conference on Sgnal, Systems, and Computers, Nov. 2003, pp , Pacfc Grove, C. Fg. 7. The relatonshp between the possblty of successful matchng and the mnmum dstance of mpostor pont for dfferent mpostor sze. 581

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Secure and Fast Fingerprint Authentication on Smart Card

Secure and Fast Fingerprint Authentication on Smart Card SETIT 2005 3 rd Internatonal Conference: Scences of Electronc, Technologes of Informaton and Telecommuncatons March 27-31, 2005 TUNISIA Secure and Fast Fngerprnt Authentcaton on Smart Card Y. S. Moon*,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Face Recognition Based on SVM and 2DPCA

Face Recognition Based on SVM and 2DPCA Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Palmprint Feature Extraction Using 2-D Gabor Filters

Palmprint Feature Extraction Using 2-D Gabor Filters Palmprnt Feature Extracton Usng 2-D Gabor Flters Wa Kn Kong Davd Zhang and Wenxn L Bometrcs Research Centre Department of Computng The Hong Kong Polytechnc Unversty Kowloon Hong Kong Correspondng author:

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Lecture 4: Principal components

Lecture 4: Principal components /3/6 Lecture 4: Prncpal components 3..6 Multvarate lnear regresson MLR s optmal for the estmaton data...but poor for handlng collnear data Covarance matrx s not nvertble (large condton number) Robustness

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

A MINUTIAE-BASED MATCHING ALGORITHMS IN FINGERPRINT RECOGNITION SYSTEMS 1. INTRODUCTION

A MINUTIAE-BASED MATCHING ALGORITHMS IN FINGERPRINT RECOGNITION SYSTEMS 1. INTRODUCTION JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/2009, ISSN 1642-6037 Łukasz WIĘCŁAW mnutae ponts, matchng score, fngerprnt matchng A MINUTIAE-BASED MATCHING ALGORITHMS IN FINGERPRINT RECOGNITION

More information

Collaboratively Regularized Nearest Points for Set Based Recognition

Collaboratively Regularized Nearest Points for Set Based Recognition Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,

More information

A Fingerprint Matching Model using Unsupervised Learning Approach

A Fingerprint Matching Model using Unsupervised Learning Approach A Fngerprnt Matchng Model usng Unsupervsed Learnng Approach Nasser S. Abouzakhar and Muhammed Bello Abdulazeez School of Computer Scence, The Unversty of Hertfordshre, College Lane, Hatfeld AL 10 9AB,

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Palmprint Minutia Point Matching Algorithmand GPU Application

Palmprint Minutia Point Matching Algorithmand GPU Application Palmprnt Mnuta Pont Matchng Algorthmand GPU Applcaton 1 Beng Crmnal Scence Insttuton, Beng, 100054,Chna E-mal: wucs@sccas.cn Zhgang Lu 2 Publc Securty Bureau of Beng s Dongcheng, Beng, 100061, Chna Cagang

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

A Novel Fingerprint Matching Method Combining Geometric and Texture Features

A Novel Fingerprint Matching Method Combining Geometric and Texture Features A Novel ngerprnt Matchng Method Combnng Geometrc and Texture eatures Me Xe, Chengpu Yu and Jn Q Unversty of Electronc Scence and Technology of Chna. Chengdu,P.R.Chna xeme@ee.uestc.edu.cn Post Code:6154

More information

Machine Learning 9. week

Machine Learning 9. week Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below

More information

Review of approximation techniques

Review of approximation techniques CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Face Recognition using 3D Directional Corner Points

Face Recognition using 3D Directional Corner Points 2014 22nd Internatonal Conference on Pattern Recognton Face Recognton usng 3D Drectonal Corner Ponts Xun Yu, Yongsheng Gao School of Engneerng Grffth Unversty Nathan, QLD, Australa xun.yu@grffthun.edu.au,

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Sixth Indian Conference on Computer Vision, Graphics & Image Processing

Sixth Indian Conference on Computer Vision, Graphics & Image Processing Sxth Indan Conference on Computer Vson, Graphcs & Image Processng Incorporatng Cohort Informaton for Relable Palmprnt Authentcaton Ajay Kumar Bometrcs Research Laboratory, Department of Electrcal Engneerng

More information

Discriminative Dictionary Learning with Pairwise Constraints

Discriminative Dictionary Learning with Pairwise Constraints Dscrmnatve Dctonary Learnng wth Parwse Constrants Humn Guo Zhuoln Jang LARRY S. DAVIS UNIVERSITY OF MARYLAND Nov. 6 th, Outlne Introducton/motvaton Dctonary Learnng Dscrmnatve Dctonary Learnng wth Parwse

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition

Novel Pattern-based Fingerprint Recognition Technique Using 2D Wavelet Decomposition Mathematcal Methods for Informaton Scence and Economcs Novel Pattern-based Fngerprnt Recognton Technque Usng D Wavelet Decomposton TUDOR BARBU Insttute of Computer Scence of the Romanan Academy T. Codrescu,,

More information

A Fuzzy Image Matching Algorithm with Linguistic Spatial Queries

A Fuzzy Image Matching Algorithm with Linguistic Spatial Queries Fuzzy Matchng lgorthm wth Lngustc Spatal Queres TZUNG-PEI HONG, SZU-PO WNG, TIEN-HIN WNG, EEN-HIN HIEN epartment of Electrcal Engneerng, Natonal Unversty of Kaohsung Insttute of Informaton Management,

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification Introducton to Artfcal Intellgence V22.0472-001 Fall 2009 Lecture 24: Nearest-Neghbors & Support Vector Machnes Rob Fergus Dept of Computer Scence, Courant Insttute, NYU Sldes from Danel Yeung, John DeNero

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

AUTOMATED personal identification using biometrics

AUTOMATED personal identification using biometrics A 3D Feature Descrptor Recovered from a Sngle 2D Palmprnt Image Qan Zheng,2, Ajay Kumar, and Gang Pan 2 Abstract Desgn and development of effcent and accurate feature descrptors s crtcal for the success

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Fingerprint matching based on weighting method and SVM

Fingerprint matching based on weighting method and SVM Fngerprnt matchng based on weghtng method and SVM Ja Ja, Lanhong Ca, Pnyan Lu, Xuhu Lu Key Laboratory of Pervasve Computng (Tsnghua Unversty), Mnstry of Educaton Bejng 100084, P.R.Chna {jaja}@mals.tsnghua.edu.cn

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of

More information

A Robust Method for Estimating the Fundamental Matrix

A Robust Method for Estimating the Fundamental Matrix Proc. VIIth Dgtal Image Computng: Technques and Applcatons, Sun C., Talbot H., Ourseln S. and Adraansen T. (Eds.), 0- Dec. 003, Sydney A Robust Method for Estmatng the Fundamental Matrx C.L. Feng and Y.S.

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Image Alignment CSC 767

Image Alignment CSC 767 Image Algnment CSC 767 Image algnment Image from http://graphcs.cs.cmu.edu/courses/15-463/2010_fall/ Image algnment: Applcatons Panorama sttchng Image algnment: Applcatons Recognton of object nstances

More information

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Alignment Results of SOBOM for OAEI 2010

Alignment Results of SOBOM for OAEI 2010 Algnment Results of SOBOM for OAEI 2010 Pegang Xu, Yadong Wang, Lang Cheng, Tany Zang School of Computer Scence and Technology Harbn Insttute of Technology, Harbn, Chna pegang.xu@gmal.com, ydwang@ht.edu.cn,

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

An efficient method to build panoramic image mosaics

An efficient method to build panoramic image mosaics An effcent method to buld panoramc mage mosacs Pattern Recognton Letters vol. 4 003 Dae-Hyun Km Yong-In Yoon Jong-Soo Cho School of Electrcal Engneerng and Computer Scence Kyungpook Natonal Unv. Abstract

More information

Distance Calculation from Single Optical Image

Distance Calculation from Single Optical Image 17 Internatonal Conference on Mathematcs, Modellng and Smulaton Technologes and Applcatons (MMSTA 17) ISBN: 978-1-6595-53-8 Dstance Calculaton from Sngle Optcal Image Xao-yng DUAN 1,, Yang-je WEI 1,,*

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Resolving Ambiguity in Depth Extraction for Motion Capture using Genetic Algorithm

Resolving Ambiguity in Depth Extraction for Motion Capture using Genetic Algorithm Resolvng Ambguty n Depth Extracton for Moton Capture usng Genetc Algorthm Yn Yee Wa, Ch Kn Chow, Tong Lee Computer Vson and Image Processng Laboratory Dept. of Electronc Engneerng The Chnese Unversty of

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Fault Detection in Rule-Based Software Systems

Fault Detection in Rule-Based Software Systems Fault Detecton n Rule-Based Software Systems Dong Wang, Rubng Hao and Davd Lee Bell Labs Research Chna Bejng, Chna, 100080 {wangd, rbhao, leedavd}@lucent.com Abstract Motvated by packet flterng of frewall

More information

Fuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval

Fuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval Fuzzy -Means Intalzed by Fxed Threshold lusterng for Improvng Image Retreval NAWARA HANSIRI, SIRIPORN SUPRATID,HOM KIMPAN 3 Faculty of Informaton Technology Rangst Unversty Muang-Ake, Paholyotn Road, Patumtan,

More information

Unsupervised Learning and Clustering

Unsupervised Learning and Clustering Unsupervsed Learnng and Clusterng Supervsed vs. Unsupervsed Learnng Up to now we consdered supervsed learnng scenaro, where we are gven 1. samples 1,, n 2. class labels for all samples 1,, n Ths s also

More information

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Face Recognition University at Buffalo CSE666 Lecture Slides Resources: Face Recognton Unversty at Buffalo CSE666 Lecture Sldes Resources: http://www.face-rec.org/algorthms/ Overvew of face recognton algorthms Correlaton - Pxel based correspondence between two face mages Structural

More information

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints TPL-ware Dsplacement-drven Detaled Placement Refnement wth Colorng Constrants Tao Ln Iowa State Unversty tln@astate.edu Chrs Chu Iowa State Unversty cnchu@astate.edu BSTRCT To mnmze the effect of process

More information

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Electrical analysis of light-weight, triangular weave reflector antennas

Electrical analysis of light-weight, triangular weave reflector antennas Electrcal analyss of lght-weght, trangular weave reflector antennas Knud Pontoppdan TICRA Laederstraede 34 DK-121 Copenhagen K Denmark Emal: kp@tcra.com INTRODUCTION The new lght-weght reflector antenna

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Pattern Recognition Letters

Pattern Recognition Letters Pattern Recognton Letters 31 (21) 733 741 Contents lsts avalable at ScenceDrect Pattern Recognton Letters journal homepage: www.elsever.com/locate/patrec A hybrd bometrc cryptosystem for securng fngerprnt

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

Signature and Lexicon Pruning Techniques

Signature and Lexicon Pruning Techniques Sgnature and Lexcon Prunng Technques Srnvas Palla, Hansheng Le, Venu Govndaraju Centre for Unfed Bometrcs and Sensors Unversty at Buffalo {spalla2, hle, govnd}@cedar.buffalo.edu Abstract Handwrtten word

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Real-Time View Recognition and Event Detection for Sports Video

Real-Time View Recognition and Event Detection for Sports Video Real-Tme Vew Recognton and Event Detecton for Sports Vdeo Authors: D Zhong and Shh-Fu Chang {dzhong, sfchang@ee.columba.edu} Department of Electrcal Engneerng, Columba Unversty For specal ssue on Multmeda

More information

The Comparison of Calibration Method of Binocular Stereo Vision System Ke Zhang a *, Zhao Gao b

The Comparison of Calibration Method of Binocular Stereo Vision System Ke Zhang a *, Zhao Gao b 3rd Internatonal Conference on Materal, Mechancal and Manufacturng Engneerng (IC3ME 2015) The Comparson of Calbraton Method of Bnocular Stereo Vson System Ke Zhang a *, Zhao Gao b College of Engneerng,

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information