Are Iris Crypts Useful in Identity Recognition?

Size: px
Start display at page:

Download "Are Iris Crypts Useful in Identity Recognition?"

Transcription

1 Are Iris Crypts Useful in Identity Recognition? Feng Shen Patrick J. Flynn Dept. of Computer Science and Engineering, University of Notre Dame 254 Fitzpatrick Hall, Notre Dame, IN Abstract We conducted an experiment in which participants were asked to annotate the crypts they see in iris images. The results were used to assess the utility of crypts in identity recognition for forensic applications. Although the inter-participant annotation consistency may be limited by crypts noticeability and the range of genuine similarity scores obtained by the adopted matcher is correlated to the number of crypt pixels in the given image, the intra-iris crypt perception is sufficiently consistent for nearly 95% of query images to be correctly identified. The performance is expected to be better for the professional examiners with comprehensive training. 1. Introduction The iris is claimed to be one of the best performing biometric modes. It rarely suffers damage and changes very slowly, if at all, during adulthood. The iris recognition systems developed by Daugman [1] are reported to find no false matches in about 20 billion cross-comparisons [2] and can perform about 100,000 full comparisons between different irises per second [1]. Despite its advantages in speed and accuracy over other biometric modes, the iris has not been examined in the domain of forensics. One important reason is that the feature representation in traditional iris techniques is not easily interpreted by humans. As a result, it is difficult to add manual inspection to verify the system output, which is essential to many law enforcement applications. Some iris techniques have been proposed to exploit features that are better associated with the human vision. The method in [6] uses an adjacent pair of local minimum and maximum of 1D dyadic wavelet transform outputs to locate the appearance and disappearance of dark irregular blocks on each row of the normalized iris. Yang et al. [11] suggests using multi-channel 2D Gabor filters to detect key points that represent local texture information most effectively. De Mira et al. [7] use morphological operators to highlight ridge-like patterns and match irises by the extracted nodes, end-points and branches. Sunder et al. [10] employ SIFT to characterize the macro-features on the iris and use them for template retrieval. Unfortunately, none of the foregoing methods conclusively correlate the extracted feature with any specific types of visible features. An iris recognition technique that parallels fingerprint techniques has been proposed in [8] and [9]. It uses crypts as the minutiae of iris, and measures the similarity between two irises by the shapes and locations of the extracted crypts and the number of common crypts identified between two irises. The advantage of this technique is that it makes it much more convenient for forensic examiners to supervise the identification process because the representative features of irises and the identification results are directly viewable to human eyes. However, this advantage is based on the assumption that experienced forensic examiners could consistently perceive iris crypts from the given images. The foundation of crypt-based identity recognition would be questionable if different forensic examiners drew totally different conclusions from the same iris pair. In this paper, we examine this assumption through an experiment in which human observers were asked to annotate the crypts they see in gray-scale iris images. The results are studied to determine how the human visual system performs in crypt identification. To our best knowledge, there has been no previous effort in collecting manual annotation data or evaluating the perceptual consistency of crypts. The study in this paper has two different purposes. The first one is to provide empirical evidence to support a human-in-theloop framework for crypt-based iris recognition. It also sets a baseline for evaluating the performance of automatic crypt detection and matching algorithms in the future. The paper is organized as follows. Section 2 introduces background knowledge of crypts and the crypt-based iris recognition framework. Section 3 describes our dataset, session plan and the annotation software. The analysis of the annotation results is presented in Section 4. Section 5 summarizes the paper and presents recommendations for future work.

2 2. Background According to [4], crypts are a sequence of openings located near either side of the collarette on the anterior layer of the iris. They play a role in keeping the stroma and tissues on the posterior layer lubricated. Crypts are significant visible features of the iris because their formation relates to both pigmentation and the surface structure [3]. When imaged in the near infrared, crypts appear as areas that are consistently darker than their surroundings. Figure 1 shows examples of iris images with multiple visible crypts. All images used in this paper are acquired under near infrared illumination. Figure 2: System framework with manual inspection (a) (b) (c) (d) Figure 1: Examples of visible crypts The major motivation to develop visible feature-based iris recognition is to aid the law enforcement applications that require human supervision in the process. Figure 2 shows the framework of a semi-automatic subject identification system where manual inspection is added. In this framework, the system retrieves a short list of matching candidates that have the highest similarity scores and automatically annotates common crypt features that contribute to the overall similarity. During manual inspection, the human examiners select the true matching image from the retrieved list or declare a new subject by visually evaluating the similarities between the annotated common feature pairs. Compared to the traditional fully-automatic iris recognition, the results of a human-supervised system are more reliable and more convincing to the general public if we can prove that the human perception of iris crypts are consistent enough to discriminate different irises. 3. Experiment 3.1. Data All the iris images are taken from the LG4000 iris camera under NIR lighting [5]. We considered using either the eye images directly or the iris strips that are segmented and normalized from eye images. The sizes of eyes and the amount of dilation vary in the acquired eye images. To reduce the complications incurred by these differences as much as possible, we use the normalized grey-scale iris strips as the input images for annotation. The regions occluded by eyelashes or eyelids are masked by solid yellow color, and the annotators are instructed to ignore them. We hand-selected a subset of images that are of good focus, decently accurate segmentation and relatively small occlusion area. Our study uses a total of 124 images from 62 different irises with 2 images for each iris. The images are presented to participants in 3 sessions by the noticeability of crypts and difficulties of annotation as explained in table 1. The test images are labeled as easy or challenging before experiments by the author to describe the noticeability of crypts in each image. As illustrated in figure 3(b), the challenging images contain border-case crypts whose occurrence or exact shapes are difficult to decide. The credibility of labeling is limited by the author s subjective observation, so in addition to the noticeability, the images are also selected by the annotation consistency measured from previous sessions. The images presented in multiple sessions help us observe the behavior changes between sessions Sessions The experiments were carried out in three sessions, each of which contained images and the time cost of each session varied between 1 and 2 hours for different partici-

3 Session # of images Description 1 60 Easy images with relatively noticeable crypts easy images from session 1 with poor annotation consistency and 40 challenging images with low-quality crypts easy images randomly from session 1, 20 challenging images from session 2 with relatively high annotation consistency, and new images mixed of 8 easy and 16 challenging. image at the bottom. To annotate crypts, the participants hold down the mouse button and use it as a pen to paint the regions that exactly cover the crypts. The red boundaries in the iris image and the connected regions in the feature image are updated automatically with the annotators drawing. Small holes within donut-shaped annotations are automatically filled in post-processing. A good annotator is expected to be careful with the crypt boundaries so that the red boundaries perfectly overlap with the observed crypt boundaries. Table 1: Test images in three sessions (a) (b) Figure 4: User interface of the annotation software Figure 3: Image classification by crypts noticeability. (a) is an easy image. (b) is a challenging image. pants. To reduce the likelihood of fatigue and resulting poor annotations, participants were asked to complete each session in two separate time slots lasting less than 1 hour. We solicited volunteers from the students and staff on the Notre Dame campus to participate in our experiments. We had 23 volunteers in session of them continued to participate in session 2, and 20 of them finished all three. All participants were required to watch a 6-minute tutorial video about how to operate the annotation software. It also gave participants a high-level standard for identifying crypts: image regions that are consistently darker than their surroundings. Participants were instructed to ignore very small candidate regions and those located too close to the pupil or limbus boundary because they are either not discriminatory or not stable enough Software We implemented the annotation software, and the user interface is shown in figure 4. Participants make annotations on the grey-scale normalized iris image at the top, and the annotation results are recorded as a binary feature 4. Results 4.1. Inter-Participant Perceptual Consistency Inter-participant perceptual consistency measures the similarities between annotations from different annotators for the same image. For each image I we calculated a consensus image I c in which each bit is set if it receives votes from more than 50% of participants as a crypt pixel. The inter-participant consistency for the given image I is measured by the consistency ratio θ: θ = average # of set bits in (I k Ic ) average # of set bits in (I k I c ) Where I k is the annotation result from the kth participant, and symbols and denote the logic and and exclusive or respectively. Higher values of θ indicate better inter-participant perceptual consistency. Figure 5 plots the θ values calculated for all image at each session. The ideal value for θ is + when all annotations are identical. The maximum θ we obtained from the 124 testing images is Although it is difficult to identify a decision threshold above which the participants perception of iris crypts is sufficiently consistent for identity recognition, we found in figure 6 that the level of consistency is higher (1)

4 4.2. Inter-Iris Perceptual Discrimination In this section, we evaluate the discriminatory ability of the annotated crypts in spite of the inter-participant inconsistency we observed in the last section. An all-to-all matching is conducted to simulate the identity verification based on a single decision threshold. We also conducted one-to-all matching to simulate the identification scenario using each annotation image for identity query Verification We use the overlapping percentage η to measure the similarity between two crypt annotation images I k and I l : Figure 5: Average consistency ratios for each image for easy images, which are the ones containing easily noticeable crypts as in figure 3(a). η = # of set bits in (I k Il ) # of set bits in (I k Il ) The head tilt during image acquisition causes rotational horizontal shift in the normalized iris image, and other factors such as eye movement, pupil dilation and segmentation error may result in vertical shift. To accommodate the position shifts of crypts, in calculating η we move I k both horizontally and vertically to find the position where I k and I l have the maximum number of overlapping bits. Each annotation image is considered independently in matching. Two annotation images form a matching pair if they are from the same eye. Intuitively the similarity between matching pairs is higher than that of nonmatching pairs, so the value of η is higher for matching pairs. Figure 7 shows the matching score distribution obtained from 232,965 matching and 10,637,785 nonmatching pairs. Because we have many more nonmatching pairs in experiments, the distributions are normalized to the same height for the ease of comparison. (2) Figure 6: Consistency ratios of each noticeability category A major part of annotation inconsistency comes from crypt boundaries. Of all annotation images, we found a total of 4,821,598 pixels that are different from the consensus image I c, of which 2,992,173 (62.06%) are from regions connected to (and are thus very likely to be surrounding) the crypts in I c. The inconsistent decisions on crypt boundaries may be caused by lack of training and experience. The differences between over-conservative and over-aggressive labeling behavior around crypt boundaries contributes considerably to the overall inter-participant inconsistencies. Figure 7: The match and nonmatch score distributions for an all-to-all matching experiment A reliable identity verification system has an overlapping area as small as possible between the score distributions of

5 matching and nonmatching pairs. Larger overlapping area means higher possibilities of false accept or false reject errors. Although the two peaks in figure 7 are separate, the overlapping area prevents it from being a reliable biometric mode in automatic identity verification when a single decision threshold is used to determine a positive or negative response for the identity claim. In observation we found that images with fewer crypt pixels are more likely to yield low genuine matching score η compared to those with more crypt pixels. Figures 8 plots the joint distribution between the number of crypt pixels and the average genuine matching score for each image. The number of crypt pixel of I is estimated as the average of all annotations {I k }, and the average genuine matching score is obtained by matching all images in {I k } against {I k } {I k } where {I k } are the annotations of the other image of the same iris. We tested the statistical independence between the matching score η and the number of crypt pixels in figure 8. The null hypothesis is that the matching score for a given image is independent of the number of crypt pixels in it. The p-value obtained from Pearsons chi-squared test of independence is , which is well below 0.05, so the null hypothesis is rejected, which proves the existence of correlation between the number of crypt pixels in an image and the scale of matching scores it could yield against other images of the same iris. The correlation coefficient between them is with p-value at Given the noise induced by annotation inconsistencies, the correlation is significant. The number of crypt pixels is an intrinsic property that varies in a wide range for different iris images, so it explains why using a single decision threshold for using the overlapping percentage as the matching score did not produce satisfying performance for identity verifications. It is part of our future work to model the correlation between the number of crypt pixels and matching scores to develop a more discriminatory similarity metric Identification In this section, we measure the crypts inter-iris perceptual discrimination independently for each image by conducting the closed-set identification where the identity of a query image is determined by the retrieved candidates who have the highest matching scores. Unlike identity verification, the identification decision of the given image is not affected by the range of similarity scores for other query images that are likely to have different numbers of crypt pixels. The system provides a correct identification as long as the query image generates a higher similarity score η with genuine matching images in the database than those generated with nonmatching images, even if the values of genuine matching scores are very small or the imposter matching scores are large. Although open-set identification is more popular in practice, the goal of this paper is to study the human perception of crypts, and the close-set identification serves this purpose well. Figure 8: Scatter plot of average genuine matching score and the number of crypt pixels in images Figure 9: CMC of identification by crypt annotations We conducted one-to-all matching using each crypt annotation image as the query image and match it against all other annotation images from all participants for all iris images. The performance of the closed-set identification is measured by the cumulative match characteristics (CMC), which plots how often a genuine matching template appears in the top rank candidate lists as the number of retrieved candidates increases. Although there are inter-participant

6 perceptual differences for each iris image as discussed in section 4.1, figure 9 shows that the identification achieves an overall identification rate of 89% at rank 1 and nearly 95% at rank 10 for all 4088 query attempts against the database composed of all other annotation images. We expect this performance to be considerably improved if the participants receive formal training before the annotation task. A comprehensive training process is likely to reduce the inconsistent opinions about border-case crypts and crypt boundaries. It would also help if annotators were more detailoriented about crypt boundaries in annotation, which is the major source of inter-participant inconsistency. Figure 10: Identification fail rate at rank 10 of each noticeability category Similar to the case of consistency ratio θ, figure 10 shows that the noticeability of crypts also affects the performance of identification. We compared the fail rate at rank 10 for each image calculated by using all annotations of the given image as the query input. According to the results, 171 of the 210 (81.43%) failed queries at rank 10 are from challenging images while the number of queries from easy images is 968 more than that of challenging images. 5. Conclusion and Future Work This paper studied human perception of iris crypts by analyzing the annotation data we collected from 23 volunteers. The experiments are carried out in three sessions with 124 images pre-labeled as easy and challenging by the noticeability of crypts. The human perception of crypts is evaluated in two aspects, namely inter-participant consistency and inter-iris discrimination. The inter-participant consistency measures the similarities between different annotations of the same iris image. We found that the interparticipant consistency is higher for images with easily noticeable crypts and that the boundary areas of crypts are the major source of inconsistency in annotations. Despite the existence of perceptual differences, we found through the simulation of closed-set identification that the intra-iris difference is sufficiently small for nearly 95% of query images to retrieve genuine matching irises at top ranks. Because the range of similarity scores generated from the current matcher is statistically significantly correlated with the number of crypt pixels in the image, a better matcher that produces a consistent range of scores needs to be developed before iris crypts be applied reliably in identity verification. Also we suggest developing a training process focusing on the decision of crypt boundaries in the future to reduce the dispute over boundary locations. The experiments showed considerable differences in consistency and discrimination between the two noticeability classes. We suggest that it is possible for some irises to naturally have shallower crypts than others, which makes them less reliable for crypt-based recognition. We have attempted to find the correlation between the noticeability and some properties such as image intensity and gradient, but these features are proved to be nondiscriminatory in experiments. We will continue working on an automatic noticeability evaluation in our future work. If challenging images could be automatically identified at acquisition, we may be able to increase the accuracy by applying pre-processing techniques or merging the results of multiple recognition methods. References [1] J. Daugman. How iris recognition works. IEEE Trans. on Circuits and Systems for Video Technology, 14(1):21 30, January [2] J. Daugman. Results from 200 billion iris cross-comparisons. Technical report, University of Cambridge, [3] L. Flom and A. Safir. Iris recognition system. US Patent 4,641,349, [4] D. H. Gold and R. Lewis. Clinical eye atlas. Oxford University Press, [5] LG. Iris access [6] L. Ma, T. Tan, Y. Wang, and D. Zhang. Efficient iris recognition by characterizing key local variations. IEEE Trans. on Image Processing, 13(6): , [7] J. D. Mira and J. Mayer. Image freature extraction for application of biometric identification of iris - a morphological approach. Proc. of SIBGRAPI, , [8] F. Shen and P. J. Flynn. Iris matching by crypts and anticrypts. Proc. of IEEE Converence on Technologies for Homeland Security, pages , November [9] F. Shen and P. J. Flynn. Using crypts as iris minutiae. Proc. SPIE, 8712, May [10] M. S. Sunder and A. Ross. Iris image retrieval based on macro-features. Proc. of ICPR, , [11] W. Yang, L. Yu, and K. Wang. Iris recognition based on location of key points. Proc. ICBA, pages , July 2004.

Critique: Efficient Iris Recognition by Characterizing Key Local Variations

Critique: Efficient Iris Recognition by Characterizing Key Local Variations Critique: Efficient Iris Recognition by Characterizing Key Local Variations Authors: L. Ma, T. Tan, Y. Wang, D. Zhang Published: IEEE Transactions on Image Processing, Vol. 13, No. 6 Critique By: Christopher

More information

The Impact of Diffuse Illumination on Iris Recognition

The Impact of Diffuse Illumination on Iris Recognition The Impact of Diffuse Illumination on Iris Recognition Amanda Sgroi, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame asgroi kwb flynn @nd.edu Abstract Iris illumination typically causes

More information

A New Encoding of Iris Images Employing Eight Quantization Levels

A New Encoding of Iris Images Employing Eight Quantization Levels A New Encoding of Iris Images Employing Eight Quantization Levels Oktay Koçand Arban Uka Computer Engineering Department, Epoka University, Tirana, Albania Email: {okoc12, auka}@epoka.edu.al different

More information

IRIS recognition II. Eduard Bakštein,

IRIS recognition II. Eduard Bakštein, IRIS recognition II. Eduard Bakštein, edurard.bakstein@fel.cvut.cz 22.10.2013 acknowledgement: Andrzej Drygajlo, EPFL Switzerland Iris recognition process Input: image of the eye Iris Segmentation Projection

More information

Graph Matching Iris Image Blocks with Local Binary Pattern

Graph Matching Iris Image Blocks with Local Binary Pattern Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of

More information

IRIS SEGMENTATION OF NON-IDEAL IMAGES

IRIS SEGMENTATION OF NON-IDEAL IMAGES IRIS SEGMENTATION OF NON-IDEAL IMAGES William S. Weld St. Lawrence University Computer Science Department Canton, NY 13617 Xiaojun Qi, Ph.D Utah State University Computer Science Department Logan, UT 84322

More information

Tutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication

Tutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication Tutorial 8 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication March 30, 2017 Table of Contents Problems Problem 1: Answer The Questions Problem 2: Daugman s Method Problem

More information

A Method for the Identification of Inaccuracies in Pupil Segmentation

A Method for the Identification of Inaccuracies in Pupil Segmentation A Method for the Identification of Inaccuracies in Pupil Segmentation Hugo Proença and Luís A. Alexandre Dep. Informatics, IT - Networks and Multimedia Group Universidade da Beira Interior, Covilhã, Portugal

More information

Enhanced Iris Recognition System an Integrated Approach to Person Identification

Enhanced Iris Recognition System an Integrated Approach to Person Identification Enhanced Iris Recognition an Integrated Approach to Person Identification Gaganpreet Kaur Research Scholar, GNDEC, Ludhiana. Akshay Girdhar Associate Professor, GNDEC. Ludhiana. Manvjeet Kaur Lecturer,

More information

Spatial Frequency Domain Methods for Face and Iris Recognition

Spatial Frequency Domain Methods for Face and Iris Recognition Spatial Frequency Domain Methods for Face and Iris Recognition Dept. of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh, PA 15213 e-mail: Kumar@ece.cmu.edu Tel.: (412) 268-3026

More information

Dilation Aware Multi-Image Enrollment for Iris Biometrics

Dilation Aware Multi-Image Enrollment for Iris Biometrics Dilation Aware Multi-Image Enrollment for Iris Biometrics Estefan Ortiz 1 and Kevin W. Bowyer 1 1 Abstract Current iris biometric systems enroll a person based on the best eye image taken at the time of

More information

Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms

Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms Andreas Uhl Department of Computer Sciences University of Salzburg, Austria uhl@cosy.sbg.ac.at

More information

A Novel Identification System Using Fusion of Score of Iris as a Biometrics

A Novel Identification System Using Fusion of Score of Iris as a Biometrics A Novel Identification System Using Fusion of Score of Iris as a Biometrics Raj Kumar Singh 1, Braj Bihari Soni 2 1 M. Tech Scholar, NIIST, RGTU, raj_orai@rediffmail.com, Bhopal (M.P.) India; 2 Assistant

More information

Shifting Score Fusion: On Exploiting Shifting Variation in Iris Recognition

Shifting Score Fusion: On Exploiting Shifting Variation in Iris Recognition Preprocessing c 211 ACM This is the author s version of the work It is posted here by permission of ACM for your personal use Not for redistribution The definitive version was published in: C Rathgeb,

More information

An Efficient Iris Recognition Using Correlation Method

An Efficient Iris Recognition Using Correlation Method , pp. 31-40 An Efficient Iris Recognition Using Correlation Method S.S. Kulkarni 1, G.H. Pandey 2, A.S.Pethkar 3, V.K. Soni 4, &P.Rathod 5 Department of Electronics and Telecommunication Engineering, Thakur

More information

Iris Recognition for Eyelash Detection Using Gabor Filter

Iris Recognition for Eyelash Detection Using Gabor Filter Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition

More information

A Fast and Accurate Eyelids and Eyelashes Detection Approach for Iris Segmentation

A Fast and Accurate Eyelids and Eyelashes Detection Approach for Iris Segmentation A Fast and Accurate Eyelids and Eyelashes Detection Approach for Iris Segmentation Walid Aydi, Lotfi Kamoun, Nouri Masmoudi Department of Electrical National Engineering School of Sfax Sfax University

More information

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Sowmya. A (Digital Electronics (MTech), BITM Ballari), Shiva kumar k.s (Associate Professor,

More information

Towards Online Iris and Periocular Recognition under Relaxed Imaging Constraints

Towards Online Iris and Periocular Recognition under Relaxed Imaging Constraints IEEE Trans. Image Processing, 2013 Towards Online Iris and Periocular Recognition under Relaxed Imaging Constraints Chun-Wei Tan, Ajay Kumar Abstract: Online iris recognition using distantly acquired images

More information

A Minimum Number of Features with Full-Accuracy Iris Recognition

A Minimum Number of Features with Full-Accuracy Iris Recognition Vol. 6, No. 3, 205 A Minimum Number of Features with Full-Accuracy Iris Recognition Ibrahim E. Ziedan Dept. of computers and systems Faculty of Engineering Zagazig University Zagazig, Egypt Mira Magdy

More information

Comparison of ROC-based and likelihood methods for fingerprint verification

Comparison of ROC-based and likelihood methods for fingerprint verification Comparison of ROC-based and likelihood methods for fingerprint verification Sargur Srihari, Harish Srinivasan, Matthew Beal, Prasad Phatak and Gang Fang Department of Computer Science and Engineering University

More information

A biometric iris recognition system based on principal components analysis, genetic algorithms and cosine-distance

A biometric iris recognition system based on principal components analysis, genetic algorithms and cosine-distance Safety and Security Engineering VI 203 A biometric iris recognition system based on principal components analysis, genetic algorithms and cosine-distance V. Nosso 1, F. Garzia 1,2 & R. Cusani 1 1 Department

More information

Algorithms for Recognition of Low Quality Iris Images. Li Peng Xie University of Ottawa

Algorithms for Recognition of Low Quality Iris Images. Li Peng Xie University of Ottawa Algorithms for Recognition of Low Quality Iris Images Li Peng Xie University of Ottawa Overview Iris Recognition Eyelash detection Accurate circular localization Covariance feature with LDA Fourier magnitude

More information

Feature-level Fusion for Effective Palmprint Authentication

Feature-level Fusion for Effective Palmprint Authentication Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,

More information

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

Medical images, segmentation and analysis

Medical images, segmentation and analysis Medical images, segmentation and analysis ImageLab group http://imagelab.ing.unimo.it Università degli Studi di Modena e Reggio Emilia Medical Images Macroscopic Dermoscopic ELM enhance the features of

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 International

More information

Personal Identification with Human Iris Recognition Based on EMD

Personal Identification with Human Iris Recognition Based on EMD Personal Identification with Human Iris Recognition Based on EMD Abstract: Shubhangi D C 1, Nageshwari Anakal 2 1( Professor, Department of studies in Computer Science & Engineering,) 2( P.G.Student, Department

More information

Color Local Texture Features Based Face Recognition

Color Local Texture Features Based Face Recognition Color Local Texture Features Based Face Recognition Priyanka V. Bankar Department of Electronics and Communication Engineering SKN Sinhgad College of Engineering, Korti, Pandharpur, Maharashtra, India

More information

Image Enhancement Techniques for Fingerprint Identification

Image Enhancement Techniques for Fingerprint Identification March 2013 1 Image Enhancement Techniques for Fingerprint Identification Pankaj Deshmukh, Siraj Pathan, Riyaz Pathan Abstract The aim of this paper is to propose a new method in fingerprint enhancement

More information

Improved Iris Segmentation Algorithm without Normalization Phase

Improved Iris Segmentation Algorithm without Normalization Phase Improved Iris Segmentation Algorithm without Normalization Phase R. P. Ramkumar #1, Dr. S. Arumugam *2 # Assistant Professor, Mahendra Institute of Technology Namakkal District, Tamilnadu, India 1 rprkvishnu@gmail.com

More information

A Framework for Efficient Fingerprint Identification using a Minutiae Tree

A Framework for Efficient Fingerprint Identification using a Minutiae Tree A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a

More information

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:

More information

Efficient Iris Identification with Improved Segmentation Techniques

Efficient Iris Identification with Improved Segmentation Techniques Efficient Iris Identification with Improved Segmentation Techniques Abhishek Verma and Chengjun Liu Department of Computer Science New Jersey Institute of Technology Newark, NJ 07102, USA {av56, chengjun.liu}@njit.edu

More information

Chapter 5. Effective Segmentation Technique for Personal Authentication on Noisy Iris Images

Chapter 5. Effective Segmentation Technique for Personal Authentication on Noisy Iris Images 110 Chapter 5 Effective Segmentation Technique for Personal Authentication on Noisy Iris Images Automated authentication is a prominent goal in computer vision for personal identification. The demand of

More information

Mobile Human Detection Systems based on Sliding Windows Approach-A Review

Mobile Human Detection Systems based on Sliding Windows Approach-A Review Mobile Human Detection Systems based on Sliding Windows Approach-A Review Seminar: Mobile Human detection systems Njieutcheu Tassi cedrique Rovile Department of Computer Engineering University of Heidelberg

More information

Technical Report. Cross-Sensor Comparison: LG4000-to-LG2200

Technical Report. Cross-Sensor Comparison: LG4000-to-LG2200 Technical Report Cross-Sensor Comparison: LG4000-to-LG2200 Professors: PhD. Nicolaie Popescu-Bodorin, PhD. Lucian Grigore, PhD. Valentina Balas Students: MSc. Cristina M. Noaica, BSc. Ionut Axenie, BSc

More information

WITH AN increasing emphasis on security, automated

WITH AN increasing emphasis on security, automated IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 6, JUNE 2004 739 Efficient Iris Recognition by Characterizing Key Local Variations Li Ma, Tieniu Tan, Fellow, IEEE, Yunhong Wang, Member, IEEE, and Dexin

More information

Finger Print Enhancement Using Minutiae Based Algorithm

Finger Print Enhancement Using Minutiae Based Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

A Survey of Light Source Detection Methods

A Survey of Light Source Detection Methods A Survey of Light Source Detection Methods Nathan Funk University of Alberta Mini-Project for CMPUT 603 November 30, 2003 Abstract This paper provides an overview of the most prominent techniques for light

More information

Advanced IRIS Segmentation and Detection System for Human Identification

Advanced IRIS Segmentation and Detection System for Human Identification International Journal of Modern Communication Technologies & Research (IJMCTR) ISSN: 2321-0850, Volume-6, Issue-5, May 2018 Advanced IRIS Segmentation and Detection System for Human Identification Saumitra

More information

Thermal Face Recognition Matching Algorithms Performance

Thermal Face Recognition Matching Algorithms Performance Thermal Face Recognition Matching Algorithms Performance Jan Váňa, Martin Drahanský, Radim Dvořák ivanajan@fit.vutbr.cz, drahan@fit.vutbr.cz, idvorak@fit.vutbr.cz Faculty of Information Technology Brno

More information

Comparing Binary Iris Biometric Templates based on Counting Bloom Filters

Comparing Binary Iris Biometric Templates based on Counting Bloom Filters Christian Rathgeb, Christoph Busch, Comparing Binary Iris Biometric Templates based on Counting Bloom Filters, In Proceedings of the 18th Iberoamerican Congress on Pattern Recognition (CIARP 13), LNCS

More information

Local Correlation-based Fingerprint Matching

Local Correlation-based Fingerprint Matching Local Correlation-based Fingerprint Matching Karthik Nandakumar Department of Computer Science and Engineering Michigan State University, MI 48824, U.S.A. nandakum@cse.msu.edu Anil K. Jain Department of

More information

International Journal of Advance Engineering and Research Development. Iris Recognition and Automated Eye Tracking

International Journal of Advance Engineering and Research Development. Iris Recognition and Automated Eye Tracking International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 Special Issue SIEICON-2017,April -2017 e-issn : 2348-4470 p-issn : 2348-6406 Iris

More information

Fusion of Hand Geometry and Palmprint Biometrics

Fusion of Hand Geometry and Palmprint Biometrics (Working Paper, Dec. 2003) Fusion of Hand Geometry and Palmprint Biometrics D.C.M. Wong, C. Poon and H.C. Shen * Department of Computer Science, Hong Kong University of Science and Technology, Clear Water

More information

Incremental Iris Recognition: A Single-algorithm Serial Fusion Strategy to Optimize Time Complexity

Incremental Iris Recognition: A Single-algorithm Serial Fusion Strategy to Optimize Time Complexity C Rathgeb, A Uhl, and P Wild Iris Recognition: A Single-algorithm Serial Fusion Strategy to Optimize Time Complexity In Proceedings of the IEEE 4th International Conference on Biometrics: Theory, Applications,

More information

Indexing Fingerprints using Minutiae Quadruplets

Indexing Fingerprints using Minutiae Quadruplets Indexing Fingerprints using Minutiae Quadruplets Ogechukwu Iloanusi University of Nigeria, Nsukka oniloanusi@gmail.com Aglika Gyaourova and Arun Ross West Virginia University http://www.csee.wvu.edu/~ross

More information

Development of an Automated Fingerprint Verification System

Development of an Automated Fingerprint Verification System Development of an Automated Development of an Automated Fingerprint Verification System Fingerprint Verification System Martin Saveski 18 May 2010 Introduction Biometrics the use of distinctive anatomical

More information

N.Priya. Keywords Compass mask, Threshold, Morphological Operators, Statistical Measures, Text extraction

N.Priya. Keywords Compass mask, Threshold, Morphological Operators, Statistical Measures, Text extraction Volume, Issue 8, August ISSN: 77 8X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Combined Edge-Based Text

More information

Tutorial 7: Automated Peak Picking in Skyline

Tutorial 7: Automated Peak Picking in Skyline Tutorial 7: Automated Peak Picking in Skyline Skyline now supports the ability to create custom advanced peak picking and scoring models for both selected reaction monitoring (SRM) and data-independent

More information

Implementation of Reliable Open Source IRIS Recognition System

Implementation of Reliable Open Source IRIS Recognition System Implementation of Reliable Open Source IRIS Recognition System Dhananjay Ikhar 1, Vishwas Deshpande & Sachin Untawale 3 1&3 Dept. of Mechanical Engineering, Datta Meghe Institute of Engineering, Technology

More information

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre

More information

Fingerprint Matching using Gabor Filters

Fingerprint Matching using Gabor Filters Fingerprint Matching using Gabor Filters Muhammad Umer Munir and Dr. Muhammad Younas Javed College of Electrical and Mechanical Engineering, National University of Sciences and Technology Rawalpindi, Pakistan.

More information

Texture Segmentation by Windowed Projection

Texture Segmentation by Windowed Projection Texture Segmentation by Windowed Projection 1, 2 Fan-Chen Tseng, 2 Ching-Chi Hsu, 2 Chiou-Shann Fuh 1 Department of Electronic Engineering National I-Lan Institute of Technology e-mail : fctseng@ccmail.ilantech.edu.tw

More information

Iris Segmentation and Recognition System

Iris Segmentation and Recognition System Iris Segmentation and Recognition System M. Karpaga Kani, Dr.T. Arumuga MariaDevi Abstract-- The richness and apparent stability of the iris texture make it a robust bio-metric trait for personal authentication.

More information

TEXT DETECTION AND RECOGNITION IN CAMERA BASED IMAGES

TEXT DETECTION AND RECOGNITION IN CAMERA BASED IMAGES TEXT DETECTION AND RECOGNITION IN CAMERA BASED IMAGES Mr. Vishal A Kanjariya*, Mrs. Bhavika N Patel Lecturer, Computer Engineering Department, B & B Institute of Technology, Anand, Gujarat, India. ABSTRACT:

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system

More information

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

An Introduction to Content Based Image Retrieval

An Introduction to Content Based Image Retrieval CHAPTER -1 An Introduction to Content Based Image Retrieval 1.1 Introduction With the advancement in internet and multimedia technologies, a huge amount of multimedia data in the form of audio, video and

More information

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric; Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints

More information

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova CPSC 695 Geometric Algorithms in Biometrics Dr. Marina L. Gavrilova Biometric goals Verify users Identify users Synthesis - recently Biometric identifiers Courtesy of Bromba GmbH Classification of identifiers

More information

An efficient face recognition algorithm based on multi-kernel regularization learning

An efficient face recognition algorithm based on multi-kernel regularization learning Acta Technica 61, No. 4A/2016, 75 84 c 2017 Institute of Thermomechanics CAS, v.v.i. An efficient face recognition algorithm based on multi-kernel regularization learning Bi Rongrong 1 Abstract. A novel

More information

Fabric Defect Detection Based on Computer Vision

Fabric Defect Detection Based on Computer Vision Fabric Defect Detection Based on Computer Vision Jing Sun and Zhiyu Zhou College of Information and Electronics, Zhejiang Sci-Tech University, Hangzhou, China {jings531,zhouzhiyu1993}@163.com Abstract.

More information

Effects of Iris Surface Curvature on Iris Recognition

Effects of Iris Surface Curvature on Iris Recognition Effects of Iris Surface Curvature on Iris Recognition Joseph Thompson University of Notre Dame jthomp11@nd.edu Patrick Flynn University of Notre Dame flynn@nd.edu Hector Santos-Villalobos Oak Ridge National

More information

SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS

SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS Cognitive Robotics Original: David G. Lowe, 004 Summary: Coen van Leeuwen, s1460919 Abstract: This article presents a method to extract

More information

Periocular Biometrics: When Iris Recognition Fails

Periocular Biometrics: When Iris Recognition Fails Periocular Biometrics: When Iris Recognition Fails Samarth Bharadwaj, Himanshu S. Bhatt, Mayank Vatsa and Richa Singh Abstract The performance of iris recognition is affected if iris is captured at a distance.

More information

Logical Templates for Feature Extraction in Fingerprint Images

Logical Templates for Feature Extraction in Fingerprint Images Logical Templates for Feature Extraction in Fingerprint Images Bir Bhanu, Michael Boshra and Xuejun Tan Center for Research in Intelligent Systems University of Califomia, Riverside, CA 9252 1, USA Email:

More information

Robust Iris Recognition based on Orientation Field

Robust Iris Recognition based on Orientation Field Robust Iris Recognition based on Orientation Field Pravin S.Patil Department of Electronics and Communication S. S. V. P. S s B. S. Deore College of Engineering, Dhule, (M.S.), India ABSTRACT Recently,

More information

International Journal of Advance Engineering and Research Development. Iris Image Categorization for Efficient Large-Scale Iris Classification

International Journal of Advance Engineering and Research Development. Iris Image Categorization for Efficient Large-Scale Iris Classification Scientific Journal of Impact Factor(SJIF): 3.134 International Journal of Advance Engineering and Research Development Volume 2,Issue 7, July -2015 e-issn(o): 2348-4470 p-issn(p): 2348-6406 Iris Image

More information

Video-based Iris Recognition by Quasi-Dynamic Texture Analysis

Video-based Iris Recognition by Quasi-Dynamic Texture Analysis Video-based Iris Recognition by Quasi-Dynamic Texture Analysis Raissa Tavares Vieira, Virgílio de Melo Langoni, Adilson Gonzaga Department of Electrical Engineering - EESC/USP University of São Paulo Av.

More information

www.worldconferences.org Implementation of IRIS Recognition System using Phase Based Image Matching Algorithm N. MURALI KRISHNA 1, DR. P. CHANDRA SEKHAR REDDY 2 1 Assoc Prof, Dept of ECE, Dhruva Institute

More information

Combining Appearance and Topology for Wide

Combining Appearance and Topology for Wide Combining Appearance and Topology for Wide Baseline Matching Dennis Tell and Stefan Carlsson Presented by: Josh Wills Image Point Correspondences Critical foundation for many vision applications 3-D reconstruction,

More information

COMPUTATIONALLY EFFICIENT SERIAL COMBINATION OF ROTATION-INVARIANT AND ROTATION COMPENSATING IRIS RECOGNITION ALGORITHMS

COMPUTATIONALLY EFFICIENT SERIAL COMBINATION OF ROTATION-INVARIANT AND ROTATION COMPENSATING IRIS RECOGNITION ALGORITHMS COMPUTATIONALLY EFFICIENT SERIAL COMBINATION OF ROTATION-INVARIANT AND ROTATION COMPENSATING IRIS RECOGNITION ALGORITHMS Mario Konrad, Herbert Stögner School of Communication Engineering for IT, Carinthia

More information

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of

More information

CS443: Digital Imaging and Multimedia Binary Image Analysis. Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University

CS443: Digital Imaging and Multimedia Binary Image Analysis. Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University CS443: Digital Imaging and Multimedia Binary Image Analysis Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University Outlines A Simple Machine Vision System Image segmentation by thresholding

More information

Using surface markings to enhance accuracy and stability of object perception in graphic displays

Using surface markings to enhance accuracy and stability of object perception in graphic displays Using surface markings to enhance accuracy and stability of object perception in graphic displays Roger A. Browse a,b, James C. Rodger a, and Robert A. Adderley a a Department of Computing and Information

More information

Chapter-2 LITERATURE REVIEW ON IRIS RECOGNITION SYTSEM

Chapter-2 LITERATURE REVIEW ON IRIS RECOGNITION SYTSEM Chapter-2 LITERATURE REVIEW ON IRIS RECOGNITION SYTSEM This chapter presents a literature review of iris recognition system. The chapter is divided mainly into the six sections. Overview of prominent iris

More information

A Coding Scheme for Indexing Multimodal Biometric Databases

A Coding Scheme for Indexing Multimodal Biometric Databases A Coding Scheme for Indexing Multimodal Biometric Databases Aglika Gyaourova West Virginia University Morgantown WV 26506, USA agyaouro@csee.wvu.edu Arun Ross West Virginia University Morgantown WV 26506,

More information

IRIS SEGMENTATION AND RECOGNITION FOR HUMAN IDENTIFICATION

IRIS SEGMENTATION AND RECOGNITION FOR HUMAN IDENTIFICATION IRIS SEGMENTATION AND RECOGNITION FOR HUMAN IDENTIFICATION Sangini Shah, Ankita Mandowara, Mitesh Patel Computer Engineering Department Silver Oak College Of Engineering and Technology, Ahmedabad Abstract:

More information

Online Signature Verification Technique

Online Signature Verification Technique Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,

More information

Iris Recognition System with Accurate Eyelash Segmentation & Improved FAR, FRR using Textural & Topological Features

Iris Recognition System with Accurate Eyelash Segmentation & Improved FAR, FRR using Textural & Topological Features Iris Recognition System with Accurate Eyelash Segmentation & Improved FAR, FRR using Textural & Topological Features Archana V Mire Asst Prof dept of IT,Bapurao Deshmukh College of Engineering, Sevagram

More information

An introduction on several biometric modalities. Yuning Xu

An introduction on several biometric modalities. Yuning Xu An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11

More information

Sampling-Based Ensemble Segmentation against Inter-operator Variability

Sampling-Based Ensemble Segmentation against Inter-operator Variability Sampling-Based Ensemble Segmentation against Inter-operator Variability Jing Huo 1, Kazunori Okada, Whitney Pope 1, Matthew Brown 1 1 Center for Computer vision and Imaging Biomarkers, Department of Radiological

More information

An Automated Video-Based System for Iris Recognition

An Automated Video-Based System for Iris Recognition An Automated Video-Based System for Iris Recognition Yooyoung Lee 1,2, P. Jonathon Phillips 1, and Ross J. Micheals 1 1 NIST, 100 Bureau Drive, Gaithersburg, MD 20899, USA {yooyoung,jonathon,rossm}@nist.gov

More information

Robust Shape Retrieval Using Maximum Likelihood Theory

Robust Shape Retrieval Using Maximum Likelihood Theory Robust Shape Retrieval Using Maximum Likelihood Theory Naif Alajlan 1, Paul Fieguth 2, and Mohamed Kamel 1 1 PAMI Lab, E & CE Dept., UW, Waterloo, ON, N2L 3G1, Canada. naif, mkamel@pami.uwaterloo.ca 2

More information

Image Segmentation for Image Object Extraction

Image Segmentation for Image Object Extraction Image Segmentation for Image Object Extraction Rohit Kamble, Keshav Kaul # Computer Department, Vishwakarma Institute of Information Technology, Pune kamble.rohit@hotmail.com, kaul.keshav@gmail.com ABSTRACT

More information

Keywords: Thresholding, Morphological operations, Image filtering, Adaptive histogram equalization, Ceramic tile.

Keywords: Thresholding, Morphological operations, Image filtering, Adaptive histogram equalization, Ceramic tile. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Blobs and Cracks

More information

Image Processing Fundamentals. Nicolas Vazquez Principal Software Engineer National Instruments

Image Processing Fundamentals. Nicolas Vazquez Principal Software Engineer National Instruments Image Processing Fundamentals Nicolas Vazquez Principal Software Engineer National Instruments Agenda Objectives and Motivations Enhancing Images Checking for Presence Locating Parts Measuring Features

More information

Biorthogonal wavelets based Iris Recognition

Biorthogonal wavelets based Iris Recognition Biorthogonal wavelets based Iris Recognition Aditya Abhyankar a, Lawrence Hornak b and Stephanie Schuckers a,b a Department of Electrical and Computer Engineering, Clarkson University, Potsdam, NY 13676,

More information

Fundamentals of Stereo Vision Michael Bleyer LVA Stereo Vision

Fundamentals of Stereo Vision Michael Bleyer LVA Stereo Vision Fundamentals of Stereo Vision Michael Bleyer LVA Stereo Vision What Happened Last Time? Human 3D perception (3D cinema) Computational stereo Intuitive explanation of what is meant by disparity Stereo matching

More information

Sketch Based Image Retrieval Approach Using Gray Level Co-Occurrence Matrix

Sketch Based Image Retrieval Approach Using Gray Level Co-Occurrence Matrix Sketch Based Image Retrieval Approach Using Gray Level Co-Occurrence Matrix K... Nagarjuna Reddy P. Prasanna Kumari JNT University, JNT University, LIET, Himayatsagar, Hyderabad-8, LIET, Himayatsagar,

More information

Saliency Detection for Videos Using 3D FFT Local Spectra

Saliency Detection for Videos Using 3D FFT Local Spectra Saliency Detection for Videos Using 3D FFT Local Spectra Zhiling Long and Ghassan AlRegib School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA ABSTRACT

More information

Accelerating Pattern Matching or HowMuchCanYouSlide?

Accelerating Pattern Matching or HowMuchCanYouSlide? Accelerating Pattern Matching or HowMuchCanYouSlide? Ofir Pele and Michael Werman School of Computer Science and Engineering The Hebrew University of Jerusalem {ofirpele,werman}@cs.huji.ac.il Abstract.

More information

Combined Fingerprint Minutiae Template Generation

Combined Fingerprint Minutiae Template Generation Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of

More information

CS 4758: Automated Semantic Mapping of Environment

CS 4758: Automated Semantic Mapping of Environment CS 4758: Automated Semantic Mapping of Environment Dongsu Lee, ECE, M.Eng., dl624@cornell.edu Aperahama Parangi, CS, 2013, alp75@cornell.edu Abstract The purpose of this project is to program an Erratic

More information

Automatic Video Caption Detection and Extraction in the DCT Compressed Domain

Automatic Video Caption Detection and Extraction in the DCT Compressed Domain Automatic Video Caption Detection and Extraction in the DCT Compressed Domain Chin-Fu Tsao 1, Yu-Hao Chen 1, Jin-Hau Kuo 1, Chia-wei Lin 1, and Ja-Ling Wu 1,2 1 Communication and Multimedia Laboratory,

More information

Software Tools for Recording Image Inspection Processes

Software Tools for Recording Image Inspection Processes Technical Report: alg04-xx December 12, 2004 Young-Jin Lee, yjlee@ncsa.uiuc.edu Peter Bajcsy, pbajcsy@ncsa.uiuc.edu Automated Learning Group National Center for Supercomputing Applications 605 East Springfield

More information