Vision-Based Technologies for Security in Logistics. Alberto Isasi

Size: px
Start display at page:

Download "Vision-Based Technologies for Security in Logistics. Alberto Isasi"

Transcription

1 Vision-Based Technologies for Security in Logistics Alberto Isasi

2 INFOTECH is the Unit of ROBOTIKER-TECNALIA specialised in Research, Development and Application of Information and Communication Technologies (ICT), not only in the enterprise framework but also in the Digital Society. INFOTECH provides solutions to those Sectors in which ICT Technologies are the key for generation and/or exploitation of added value: Logistic and Industrial Sector Tourism and Entertainment. Pág. 2/67

3 Technological Areas Machine Vision. Semantic Technologies. Biometry. Voice Synthesis and Recognition. Trazability. Digital Ecosystems. Pág. 3/67

4 Application Areas Infrastructure Security Picking Access Control Industrial Control CA3 Voice based Services CA1 Image Processing Man-Machine Interfaces Audio Content Processing Visual Content Processsing CA2 Mobile Services CA4 Supply Chain Management Supply Chain Scheduling Location-based services Interoperability Unimodal & multimodal Scheduling Portable Device Services Trazability of people, machines and vehicles Pág. 4/67

5 Machine Vision Overview Machine Vision Overview 3D Image Processing Biometrics Pág. 5/67

6 Practical Machine Vision What is involved in a Machine Vision project?? Pág. 6

7 Practical Machine Vision So, machine vision is not just a matter of computer and image processing algorithms: Lighting and optics Acquisition system Mechanics Software Time Robustness Pág. 7

8 So, What is Computer Vision and Image Processing? Automatic or assisted process of information acquired by cameras Acquisition through visual resources: Hardware Tools Automatic process: Software Practical Machine Vision INFORMATION SCENE LIGHTS OPTICS HARDWARE IMAGE IN MEMORY IMAGE PROCESSING ANALYSIS RESULT Pág. 8

9 Practical Machine Vision Computers only see a set of numbers. It is necessary to interpret their meaning. RAW data Processing information Interpretation Pág. 9

10 Practical Machine Vision Colour Spaces: RGB: Colour cube. It is used by electronics devices to represent colours. HSL: Colour cone. Luminance (L) is independent from Chrominance (H+S) H Hue S Saturation L Luminance Pág. 10

11 Practical Machine Vision In those colour spaces (RGB, HSL ) it is no easy to measure colour similarities To create a color space that represents color information as humans see it the CIE Lab space was created 3 Parameters: Luminance, a and b Advantages: Color difference applying Euclidean Distance RGB_distance = (R1-R2)^2 + (G1-G2)^2 + (B1-B2)^2 It does not give a color similarity idea Lab_distance = (L1-L2)^2 + (a1-a2)^2 + (b1-b2)^2 It gives a color distance as humans perceive similar colors. Pág. 11

12 Practical Machine Vision It is possible to detect non visible characteristics for humans. Some animals as insects or deer have a ultraviolet vision that humans can t perceive Visible vs. UV Pág. 12

13 Near Infrared: It could be necessary an extra light source Great penetration Practical Machine Vision Mid Infrared Thermo graphic images T Beams Higher penetration Non ionizing Pág. 13

14 Practical Machine Vision X Beams, Gamma beams Here, it is not processed what material reflects, but what passes through the object and hits into a specific surface Due to their high energy and penetration capacity, they are ionizing Pág. 14

15 Spectrography: A diffraction net is used to split the light into its different wavelengths Each image pixel is defined by an N-dimension vector where each n-component represent a different wavelength. Uses: Materials, food, pathogens classification Health Aerial inspection Practical Machine Vision Spectrophotometer Hyper spectral cube One pixel spectrum Pág. 15

16 Image Types: Float point image Practical Machine Vision 3D Image Image sequence (video) Multidimensional image Pág. 16

17 Machine Vision Overview Machine Vision Overview 3D Image Processing Biometrics Pág. 17

18 3D Vision: Stereoscopic Stereoscopic Vision Systems: It uses 2 or more cameras. It needs that all the cameras watch the same scene Locating the same point (x, y) in each image it is possible to triangulate the 3D real Point (x, y, z) Epipolar points are calculated in calibration step Pág. 18

19 Stereoscopic Vision: Stereovision platforms needs to be calibrated A chessboard patter is used to calibrate the platform. It needs several images along the working area 3D Vision: Stereoscopic Stereovision platforms based in two cameras try to simulate the humans sight sense Pág. 19

20 Laser Beam Triangulation: 3D Vision: Laser triangulation A laser plane is projected into a region of interest The intersection between the laser and the surface of interest creates a shape This shape is shown from an external camera and is used to get the 3D information from one section of the object Pág. 20

21 3D Vision: Laser triangulation Laser Scan: There are differet ways to get a laser scan for surfaces: By movin the object or the set camera + laser By using a mirror to get and aditional degree of fredom moving the laser beam Pág. 21

22 3D Vision: Structured Light Structured Light: Projects a pattern of light on the surface and look at the deformation of the pattern on it. The pattern may be one dimensional (line) or two dimensional (grid). Needs Calibration. The pattern is projected on a calibration object. Watching how the patter is projected on the surface and comparing it with the expected deformation the system is calibrated Pág. 22

23 Machine Vision Overview Machine Vision Overview 3D Image Processing Biometrics Pág. 23

24 Biometrics: Overview What s biometrics? A technology. Can make a Relationship between a Person and a previously extracted Pattern. Allows users to Authenticate. What does this mean? You need not know anything (Passwords) You need not have to anything (Tokens) All you have to do is BE there ROBOTIKER Pág. 24

25 Biometrics: Overview Identification Who am I?? Peter Authentication Am I Peter? Peter DataBase Mary Peter Peter John Am I Peter? Peter Template ROBOTIKER Pág. 25

26 Biometrics: Definitions Several terms are used FAR (False Acceptance Rate) % of the users accepted by the system when they should not have been accepted. FRR (False Rejection Rate) % of the users who are rejected by the system when they should have been accepted. ERR (Equal Error Rate) The point in which FAR and FRR have the same value We can work at different levels of security setting a threshold to accept or to reject the doubtful cases ROBOTIKER Pág. 26

27 Biometrics: Fingerprint It is based on the extraction of fingerprint characteristics Minutiaes Advantage: Constant in time Good precision Disadvantages: People associate fingerprint with police It is not the most robust biometric system Pág. 27

28 Biometrics: Retina Feature extraction from the bottom eye s circulatory structures Eye illumination through infrared light Optic complexity User profile based on arteries and veins distribution Advantage: Excellent robustness First commercial system Disadvantages: Intrusive (too much) Information acquired from the bottom eye Pág. 28

29 Biometrics: Iris Feature extraction from the iris texture Eye location User profile based on texture analysis. All the algorithms for image processing are valid. Advantage: Precision Several solutions on the market Disadvantages: Intrusive Could be non collaborative There exists the Iridology: medicine based on iris analysis Pág. 29

30 Application to Projects Biometrics Surveillance Hyperspectral based projects Pág. 30

31 Biometrics: Palmprint recognition Multimodal biometric profile : Several biometric features from one measure. Easy for user: only one authentication system More robust: Different biometric measures to authenticate for each user Pág. 31

32 Biometrics: Palmprint recognition Palmprint Recognition prototype Computer Scanner Remote DataBase Image adquisition system TCP/IP I/O card ROBOTIKER Pág. 32

33 Biometrics: 2D / 3D face recognition 3D Face Model Extracted Face Points Algorithm main steps: Face orientation detection Face Points Extraction 2D Face recognition algorithm Pág. 33

34 Application to Projects Biometrics Surveillance Hyperspectral based projects Pág. 34

35 Multiview worker tracking Multicamera: One camera for each view Object detector for each camera Surveillance: worker tracking Algorithm for data coherence: fusion of the multicamera objects detection. Non collaborative RFID readers: worker identification Space coordinates transform: from camera space (3D world) to plane (2D space) System features Restricted areas intrusion detector. Abandoned object detector. Morphological detector: Humans / Trucks / Others Pág. 35

36 Surveillance: worker tracking Each camera has its own object detector and planespace transform algorithm With the Plant Locator Viewer it is possible to combine the different camera data with the RFID information for worker identification Pág. 36

37 Application to Projects Biometrics Surveillance Hyperspectral based projects Pág. 37

38 Hyperspectral process Use of hyperspectral images for material classification. Distinguish from same colour materials Detection of hiden objects (λ ) L r Visible Spectrum Hyperspectral pixel Wavelength (nm) Pág. 38

39 Hyperspectral process Materials which seems to have the same colour can be easily distinguish analysing their hyperspectral response Pág. 39

40 CONCLUSIONS Pág. 40

41 Conclusions Image processing is a mature technology, not only a laboratory one. Biometric with image processing: It is a robust technology. It offers a high reliability. There are several different techniques. Security tasks Image processing can solve lots of surveillance issues. Image processing can be applied to a large number of applications Pág. 41

42 Conclusions Image Processing is more than algorithms. Optics, lights, mechanical system are at least as important as a good algorithm. Use the constrains of the application to simplify algorithms. ROBOTIKER Pág. 42

43 More information:

Color and Shading. Color. Shapiro and Stockman, Chapter 6. Color and Machine Vision. Color and Perception

Color and Shading. Color. Shapiro and Stockman, Chapter 6. Color and Machine Vision. Color and Perception Color and Shading Color Shapiro and Stockman, Chapter 6 Color is an important factor for for human perception for object and material identification, even time of day. Color perception depends upon both

More information

Biometrics Our Past, Present, and Future Identity

Biometrics Our Past, Present, and Future Identity Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

Advanced Biometric Access Control Training Course # :

Advanced Biometric Access Control Training Course # : Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic

More information

Digital Image Processing. Introduction

Digital Image Processing. Introduction Digital Image Processing Introduction Digital Image Definition An image can be defined as a twodimensional function f(x,y) x,y: Spatial coordinate F: the amplitude of any pair of coordinate x,y, which

More information

Hybrid Biometric Person Authentication Using Face and Voice Features

Hybrid Biometric Person Authentication Using Face and Voice Features Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person

More information

Making Machines See. Roberto Cipolla Department of Engineering. Research team

Making Machines See. Roberto Cipolla Department of Engineering. Research team Making Machines See Roberto Cipolla Department of Engineering Research team http://www.eng.cam.ac.uk/~cipolla/people.html Cognitive Systems Engineering Cognitive Systems Engineering Introduction Making

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science

More information

Access Control Biometrics User Guide

Access Control Biometrics User Guide Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This

More information

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) Human Face Detection By YCbCr Technique

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)   Human Face Detection By YCbCr Technique International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

Digital Vision Face recognition

Digital Vision Face recognition Ulrik Söderström ulrik.soderstrom@tfe.umu.se 27 May 2007 Digital Vision Face recognition 1 Faces Faces are integral to human interaction Manual facial recognition is already used in everyday authentication

More information

12/3/2009. What is Computer Vision? Applications. Application: Assisted driving Pedestrian and car detection. Application: Improving online search

12/3/2009. What is Computer Vision? Applications. Application: Assisted driving Pedestrian and car detection. Application: Improving online search Introduction to Artificial Intelligence V22.0472-001 Fall 2009 Lecture 26: Computer Vision Rob Fergus Dept of Computer Science, Courant Institute, NYU Slides from Andrew Zisserman What is Computer Vision?

More information

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:

More information

L2 Data Acquisition. Mechanical measurement (CMM) Structured light Range images Shape from shading Other methods

L2 Data Acquisition. Mechanical measurement (CMM) Structured light Range images Shape from shading Other methods L2 Data Acquisition Mechanical measurement (CMM) Structured light Range images Shape from shading Other methods 1 Coordinate Measurement Machine Touch based Slow Sparse Data Complex planning Accurate 2

More information

Overview of Computer Vision. CS308 Data Structures

Overview of Computer Vision. CS308 Data Structures Overview of Computer Vision CS308 Data Structures What is Computer Vision? Deals with the development of the theoretical and algorithmic basis by which useful information about the 3D world can be automatically

More information

Ulrik Söderström 17 Jan Image Processing. Introduction

Ulrik Söderström 17 Jan Image Processing. Introduction Ulrik Söderström ulrik.soderstrom@tfe.umu.se 17 Jan 2017 Image Processing Introduction Image Processsing Typical goals: Improve images for human interpretation Image processing Processing of images for

More information

An adaptive hyperspectral imager: design, control, processing and applications

An adaptive hyperspectral imager: design, control, processing and applications An adaptive hyperspectral imager: design, control, processing and applications Simon Lacroix LAAS/Robotics Antoine Monmayrant LAAS/Photonics Hervé Carfantan IRAP/Signal & Image LAAS-CNRS / Laboratoire

More information

ENY-C2005 Geoinformation in Environmental Modeling Lecture 4b: Laser scanning

ENY-C2005 Geoinformation in Environmental Modeling Lecture 4b: Laser scanning 1 ENY-C2005 Geoinformation in Environmental Modeling Lecture 4b: Laser scanning Petri Rönnholm Aalto University 2 Learning objectives To recognize applications of laser scanning To understand principles

More information

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CIS 4360 Secure Computer Systems Biometrics (Something You Are) CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INTELLEGENT APPROACH FOR OFFLINE SIGNATURE VERIFICATION USING CHAINCODE AND ENERGY FEATURE EXTRACTION ON MULTICORE PROCESSOR Raju

More information

Lecture 1 Image Formation.

Lecture 1 Image Formation. Lecture 1 Image Formation peimt@bit.edu.cn 1 Part 3 Color 2 Color v The light coming out of sources or reflected from surfaces has more or less energy at different wavelengths v The visual system responds

More information

Neue Verfahren der Bildverarbeitung auch zur Erfassung von Schäden in Abwasserkanälen?

Neue Verfahren der Bildverarbeitung auch zur Erfassung von Schäden in Abwasserkanälen? Neue Verfahren der Bildverarbeitung auch zur Erfassung von Schäden in Abwasserkanälen? Fraunhofer HHI 13.07.2017 1 Fraunhofer-Gesellschaft Fraunhofer is Europe s largest organization for applied research.

More information

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova CPSC 695 Geometric Algorithms in Biometrics Dr. Marina L. Gavrilova Biometric goals Verify users Identify users Synthesis - recently Biometric identifiers Courtesy of Bromba GmbH Classification of identifiers

More information

Using Mobile LiDAR To Efficiently Collect Roadway Asset and Condition Data. Pierre-Paul Grondin, B.Sc. Surveying

Using Mobile LiDAR To Efficiently Collect Roadway Asset and Condition Data. Pierre-Paul Grondin, B.Sc. Surveying Using Mobile LiDAR To Efficiently Collect Roadway Asset and Condition Data Pierre-Paul Grondin, B.Sc. Surveying LIDAR (Light Detection and Ranging) The prevalent method to determine distance to an object

More information

Illumination and Shading

Illumination and Shading Illumination and Shading Light sources emit intensity: assigns intensity to each wavelength of light Humans perceive as a colour - navy blue, light green, etc. Exeriments show that there are distinct I

More information

Biometrics: The Password You ll Never Forget

Biometrics: The Password You ll Never Forget 1 Biometrics: The Password You ll Never Forget R.D. McDowall, McDowall Consulting, Bromley, Kent, UK. In the last Pharmaceutical File (1) we discussed electronic signatures and logical security within

More information

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 10. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Biometrics Identify a person based on physical or behavioral characteristics scanned_fingerprint = capture();

More information

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski Distributed Systems Smart Cards, Biometrics, & CAPTCHA Paul Krzyzanowski pxk@cs.rutgers.edu Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution

More information

3D Scanning. Qixing Huang Feb. 9 th Slide Credit: Yasutaka Furukawa

3D Scanning. Qixing Huang Feb. 9 th Slide Credit: Yasutaka Furukawa 3D Scanning Qixing Huang Feb. 9 th 2017 Slide Credit: Yasutaka Furukawa Geometry Reconstruction Pipeline This Lecture Depth Sensing ICP for Pair-wise Alignment Next Lecture Global Alignment Pairwise Multiple

More information

Computer Security 4/15/18

Computer Security 4/15/18 Biometrics Identify a person based on physical or behavioral characteristics Computer Security 10. Biometric authentication scanned_fingerprint = capture(); if (scanned_fingerprint == stored_fingerprint)

More information

Online Signature Verification Technique

Online Signature Verification Technique Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,

More information

Visualisatie BMT. Rendering. Arjan Kok

Visualisatie BMT. Rendering. Arjan Kok Visualisatie BMT Rendering Arjan Kok a.j.f.kok@tue.nl 1 Lecture overview Color Rendering Illumination 2 Visualization pipeline Raw Data Data Enrichment/Enhancement Derived Data Visualization Mapping Abstract

More information

SNC 2PI Optics Unit Review /95 Name:

SNC 2PI Optics Unit Review /95 Name: SNC 2PI Optics Unit Review /95 Name: Part 1: True or False Indicate in the space provided if the statement is true (T) or false(f) [15] 1. Light is a form of energy 2. Shadows are proof that light travels

More information

(0, 1, 1) (0, 1, 1) (0, 1, 0) What is light? What is color? Terminology

(0, 1, 1) (0, 1, 1) (0, 1, 0) What is light? What is color? Terminology lecture 23 (0, 1, 1) (0, 0, 0) (0, 0, 1) (0, 1, 1) (1, 1, 1) (1, 1, 0) (0, 1, 0) hue - which ''? saturation - how pure? luminance (value) - intensity What is light? What is? Light consists of electromagnetic

More information

CSE 167: Lecture #6: Color. Jürgen P. Schulze, Ph.D. University of California, San Diego Fall Quarter 2011

CSE 167: Lecture #6: Color. Jürgen P. Schulze, Ph.D. University of California, San Diego Fall Quarter 2011 CSE 167: Introduction to Computer Graphics Lecture #6: Color Jürgen P. Schulze, Ph.D. University of California, San Diego Fall Quarter 2011 Announcements Homework project #3 due this Friday, October 14

More information

Carmen Alonso Montes 23rd-27th November 2015

Carmen Alonso Montes 23rd-27th November 2015 Practical Computer Vision: Theory & Applications 23rd-27th November 2015 Wrap up Today, we are here 2 Learned concepts Hough Transform Distance mapping Watershed Active contours 3 Contents Wrap up Object

More information

P recise Eye. High resolution, diffraction-limited f/4.5 optical quality for high precision measurement and inspection.

P recise Eye. High resolution, diffraction-limited f/4.5 optical quality for high precision measurement and inspection. High resolution, diffraction-limited f/4.5 optical quality for high precision measurement and inspection. Long working distance makes lighting and handling easier. Compact size. Coaxial lighting available

More information

Palm Vein Technology

Palm Vein Technology Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of

More information

Flexible Visual Inspection. IAS-13 Industrial Forum Horizon 2020 Dr. Eng. Stefano Tonello - CEO

Flexible Visual Inspection. IAS-13 Industrial Forum Horizon 2020 Dr. Eng. Stefano Tonello - CEO Flexible Visual Inspection IAS-13 Industrial Forum Horizon 2020 Dr. Eng. Stefano Tonello - CEO IT+Robotics Spin-off of University of Padua founded in 2005 Strong relationship with IAS-LAB (Intelligent

More information

Structured Light II. Guido Gerig CS 6320, Spring (thanks: slides Prof. S. Narasimhan, CMU, Marc Pollefeys, UNC)

Structured Light II. Guido Gerig CS 6320, Spring (thanks: slides Prof. S. Narasimhan, CMU, Marc Pollefeys, UNC) Structured Light II Guido Gerig CS 6320, Spring 2013 (thanks: slides Prof. S. Narasimhan, CMU, Marc Pollefeys, UNC) http://www.cs.cmu.edu/afs/cs/academic/class/15385- s06/lectures/ppts/lec-17.ppt Variant

More information

Introduction to color science

Introduction to color science Introduction to color science Trichromacy Spectral matching functions CIE XYZ color system xy-chromaticity diagram Color gamut Color temperature Color balancing algorithms Digital Image Processing: Bernd

More information

NAME :... Signature :... Desk no. :... Question Answer

NAME :... Signature :... Desk no. :... Question Answer Written test Tuesday 19th of December 2000. Aids allowed : All usual aids Weighting : All questions are equally weighted. NAME :................................................... Signature :...................................................

More information

Stereo. 11/02/2012 CS129, Brown James Hays. Slides by Kristen Grauman

Stereo. 11/02/2012 CS129, Brown James Hays. Slides by Kristen Grauman Stereo 11/02/2012 CS129, Brown James Hays Slides by Kristen Grauman Multiple views Multi-view geometry, matching, invariant features, stereo vision Lowe Hartley and Zisserman Why multiple views? Structure

More information

An introduction on several biometric modalities. Yuning Xu

An introduction on several biometric modalities. Yuning Xu An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11

More information

COMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai

COMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai COMPUTER VISION Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai 600036. Email: sdas@iitm.ac.in URL: //www.cs.iitm.ernet.in/~sdas 1 INTRODUCTION 2 Human Vision System (HVS) Vs.

More information

Ch 22 Inspection Technologies

Ch 22 Inspection Technologies Ch 22 Inspection Technologies Sections: 1. Inspection Metrology 2. Contact vs. Noncontact Inspection Techniques 3. Conventional Measuring and Gaging Techniques 4. Coordinate Measuring Machines 5. Surface

More information

Tegra Goes Industry: Embedded Hyperspectral Imaging

Tegra Goes Industry: Embedded Hyperspectral Imaging Tegra Goes Industry: Embedded Hyperspectral Imaging GPU Technology Conference Munich, 11 October 2017 Michael Schoeffmann Session Id: 23161 Embedded Hyperspectral Imaging Introduction What is Hyperspectral

More information

Introduction to Computer Graphics with WebGL

Introduction to Computer Graphics with WebGL Introduction to Computer Graphics with WebGL Ed Angel Professor Emeritus of Computer Science Founding Director, Arts, Research, Technology and Science Laboratory University of New Mexico Image Formation

More information

VISOR vision sensors and the Eyesight vision systems

VISOR vision sensors and the Eyesight vision systems VISOR vision sensors and the Eyesight vision systems Image processing made simple! VISOR Object Sensor VISOR Color VISOR Solar Sensor Eyesight Vision Systems from Page 112 from Page 62 from Page 80 from

More information

Computer Vision. The image formation process

Computer Vision. The image formation process Computer Vision The image formation process Filippo Bergamasco (filippo.bergamasco@unive.it) http://www.dais.unive.it/~bergamasco DAIS, Ca Foscari University of Venice Academic year 2016/2017 The image

More information

Chapter 5 Extraction of color and texture Comunicação Visual Interactiva. image labeled by cluster index

Chapter 5 Extraction of color and texture Comunicação Visual Interactiva. image labeled by cluster index Chapter 5 Extraction of color and texture Comunicação Visual Interactiva image labeled by cluster index Color images Many images obtained with CCD are in color. This issue raises the following issue ->

More information

Color Local Texture Features Based Face Recognition

Color Local Texture Features Based Face Recognition Color Local Texture Features Based Face Recognition Priyanka V. Bankar Department of Electronics and Communication Engineering SKN Sinhgad College of Engineering, Korti, Pandharpur, Maharashtra, India

More information

Image Formation. Ed Angel Professor of Computer Science, Electrical and Computer Engineering, and Media Arts University of New Mexico

Image Formation. Ed Angel Professor of Computer Science, Electrical and Computer Engineering, and Media Arts University of New Mexico Image Formation Ed Angel Professor of Computer Science, Electrical and Computer Engineering, and Media Arts University of New Mexico 1 Objectives Fundamental imaging notions Physical basis for image formation

More information

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski Distributed Systems Smart Cards, Biometrics, & CAPTCHA Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Except as otherwise noted, the content of this presentation is licensed under the Creative Commons

More information

The Elements of Colour

The Elements of Colour Color science 1 The Elements of Colour Perceived light of different wavelengths is in approximately equal weights achromatic.

More information

Tecnologie per la ricostruzione di modelli 3D da immagini. Marco Callieri ISTI-CNR, Pisa, Italy

Tecnologie per la ricostruzione di modelli 3D da immagini. Marco Callieri ISTI-CNR, Pisa, Italy Tecnologie per la ricostruzione di modelli 3D da immagini Marco Callieri ISTI-CNR, Pisa, Italy Who am I? Marco Callieri PhD in computer science Always had the like for 3D graphics... Researcher at the

More information

3D scanning. 3D scanning is a family of technologies created as a means of automatic measurement of geometric properties of objects.

3D scanning. 3D scanning is a family of technologies created as a means of automatic measurement of geometric properties of objects. Acquiring 3D shape 3D scanning 3D scanning is a family of technologies created as a means of automatic measurement of geometric properties of objects. The produced digital model is formed by geometric

More information

Thermal and Optical Cameras. By Philip Smerkovitz TeleEye South Africa

Thermal and Optical Cameras. By Philip Smerkovitz TeleEye South Africa Thermal and Optical Cameras By Philip Smerkovitz TeleEye South Africa phil@teleeye.co.za OPTICAL CAMERAS OVERVIEW Traditional CCTV Camera s (IP and Analog, many form factors). Colour and Black and White

More information

Peg-Free Hand Geometry Verification System

Peg-Free Hand Geometry Verification System Peg-Free Hand Geometry Verification System Pavan K Rudravaram Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA. {pkr, govind} @cedar.buffalo.edu http://www.cubs.buffalo.edu

More information

Reading. 2. Color. Emission spectra. The radiant energy spectrum. Watt, Chapter 15.

Reading. 2. Color. Emission spectra. The radiant energy spectrum. Watt, Chapter 15. Reading Watt, Chapter 15. Brian Wandell. Foundations of Vision. Chapter 4. Sinauer Associates, Sunderland, MA, pp. 69-97, 1995. 2. Color 1 2 The radiant energy spectrum We can think of light as waves,

More information

Real Time Motion Detection Using Background Subtraction Method and Frame Difference

Real Time Motion Detection Using Background Subtraction Method and Frame Difference Real Time Motion Detection Using Background Subtraction Method and Frame Difference Lavanya M P PG Scholar, Department of ECE, Channabasaveshwara Institute of Technology, Gubbi, Tumkur Abstract: In today

More information

CHAPTER 6 RESULTS AND DISCUSSIONS

CHAPTER 6 RESULTS AND DISCUSSIONS 151 CHAPTER 6 RESULTS AND DISCUSSIONS In this chapter the performance of the personal identification system on the PolyU database is presented. The database for both Palmprint and Finger Knuckle Print

More information

Computer Graphics. Bing-Yu Chen National Taiwan University The University of Tokyo

Computer Graphics. Bing-Yu Chen National Taiwan University The University of Tokyo Computer Graphics Bing-Yu Chen National Taiwan University The University of Tokyo Introduction The Graphics Process Color Models Triangle Meshes The Rendering Pipeline 1 What is Computer Graphics? modeling

More information

A PHOTOGRAMMETRIC METHOD FOR ENHANCING THE DETECTION OF BONE FRAGMENTS AND OTHER HAZARD MATERIALS IN CHICKEN FILETS

A PHOTOGRAMMETRIC METHOD FOR ENHANCING THE DETECTION OF BONE FRAGMENTS AND OTHER HAZARD MATERIALS IN CHICKEN FILETS A PHOTOGRAMMETRIC METHOD FOR ENHANCING THE DETECTION OF BONE FRAGMENTS AND OTHER HAZARD MATERIALS IN CHICKEN FILETS S. Barnea a,* V. Alchanatis b H. Stern a a Dept. of Industrial Engineering and Management,

More information

Computer Vision Course Lecture 02. Image Formation Light and Color. Ceyhun Burak Akgül, PhD cba-research.com. Spring 2015 Last updated 04/03/2015

Computer Vision Course Lecture 02. Image Formation Light and Color. Ceyhun Burak Akgül, PhD cba-research.com. Spring 2015 Last updated 04/03/2015 Computer Vision Course Lecture 02 Image Formation Light and Color Ceyhun Burak Akgül, PhD cba-research.com Spring 2015 Last updated 04/03/2015 Photo credit: Olivier Teboul vision.mas.ecp.fr/personnel/teboul

More information

Lecture 16 Color. October 20, 2016

Lecture 16 Color. October 20, 2016 Lecture 16 Color October 20, 2016 Where are we? You can intersect rays surfaces You can use RGB triples You can calculate illumination: Ambient, Lambertian and Specular But what about color, is there more

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

Colour computer vision: fundamentals, applications and challenges. Dr. Ignacio Molina-Conde Depto. Tecnología Electrónica Univ.

Colour computer vision: fundamentals, applications and challenges. Dr. Ignacio Molina-Conde Depto. Tecnología Electrónica Univ. Colour computer vision: fundamentals, applications and challenges Dr. Ignacio Molina-Conde Depto. Tecnología Electrónica Univ. of Málaga (Spain) Outline Part 1: colorimetry and colour perception: What

More information

The Display pipeline. The fast forward version. The Display Pipeline The order may vary somewhat. The Graphics Pipeline. To draw images.

The Display pipeline. The fast forward version. The Display Pipeline The order may vary somewhat. The Graphics Pipeline. To draw images. View volume The fast forward version The Display pipeline Computer Graphics 1, Fall 2004 Lecture 3 Chapter 1.4, 1.8, 2.5, 8.2, 8.13 Lightsource Hidden surface 3D Projection View plane 2D Rasterization

More information

Announcements. Recognition. Recognition. Recognition. Recognition. Homework 3 is due May 18, 11:59 PM Reading: Computer Vision I CSE 152 Lecture 14

Announcements. Recognition. Recognition. Recognition. Recognition. Homework 3 is due May 18, 11:59 PM Reading: Computer Vision I CSE 152 Lecture 14 Announcements Computer Vision I CSE 152 Lecture 14 Homework 3 is due May 18, 11:59 PM Reading: Chapter 15: Learning to Classify Chapter 16: Classifying Images Chapter 17: Detecting Objects in Images Given

More information

Announcements. Lighting. Camera s sensor. HW1 has been posted See links on web page for readings on color. Intro Computer Vision.

Announcements. Lighting. Camera s sensor. HW1 has been posted See links on web page for readings on color. Intro Computer Vision. Announcements HW1 has been posted See links on web page for readings on color. Introduction to Computer Vision CSE 152 Lecture 6 Deviations from the lens model Deviations from this ideal are aberrations

More information

HIGHLY PARALLEL COMPUTING IN PHYSICS-BASED RENDERING OpenCL Raytracing Based. Thibaut PRADOS OPTIS Real-Time & Virtual Reality Manager

HIGHLY PARALLEL COMPUTING IN PHYSICS-BASED RENDERING OpenCL Raytracing Based. Thibaut PRADOS OPTIS Real-Time & Virtual Reality Manager HIGHLY PARALLEL COMPUTING IN PHYSICS-BASED RENDERING OpenCL Raytracing Based Thibaut PRADOS OPTIS Real-Time & Virtual Reality Manager INTRODUCTION WHO WE ARE 3 Highly Parallel Computing in Physics-based

More information

The Kinect Sensor. Luís Carriço FCUL 2014/15

The Kinect Sensor. Luís Carriço FCUL 2014/15 Advanced Interaction Techniques The Kinect Sensor Luís Carriço FCUL 2014/15 Sources: MS Kinect for Xbox 360 John C. Tang. Using Kinect to explore NUI, Ms Research, From Stanford CS247 Shotton et al. Real-Time

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

Computer and Machine Vision

Computer and Machine Vision Computer and Machine Vision Lecture Week 4 Part-2 February 5, 2014 Sam Siewert Outline of Week 4 Practical Methods for Dealing with Camera Streams, Frame by Frame and De-coding/Re-encoding for Analysis

More information

Game Programming. Bing-Yu Chen National Taiwan University

Game Programming. Bing-Yu Chen National Taiwan University Game Programming Bing-Yu Chen National Taiwan University What is Computer Graphics? Definition the pictorial synthesis of real or imaginary objects from their computer-based models descriptions OUTPUT

More information

A Novel Approach to Improve the Biometric Security using Liveness Detection

A Novel Approach to Improve the Biometric Security using Liveness Detection Volume 8, No. 5, May June 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 A Novel Approach to Improve the Biometric

More information

Iris Recognition for Eyelash Detection Using Gabor Filter

Iris Recognition for Eyelash Detection Using Gabor Filter Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition

More information

Computational color Lecture 1. Ville Heikkinen

Computational color Lecture 1. Ville Heikkinen Computational color Lecture 1 Ville Heikkinen 1. Introduction - Course context - Application examples (UEF research) 2 Course Standard lecture course: - 2 lectures per week (see schedule from Weboodi)

More information

A quick guide to iris recognition. Click on blue squares to navigate

A quick guide to iris recognition. Click on blue squares to navigate Click on blue squares to navigate Safe Accurate Fast Stable Scalable Reliable Non-invasive Personal identification... is key Identity authentication... is key Identity authentication... you are the key

More information

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22)

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22) Digital Image Processing Prof. P. K. Biswas Department of Electronics and Electrical Communications Engineering Indian Institute of Technology, Kharagpur Module Number 01 Lecture Number 02 Application

More information

CSE 4392/5369. Dr. Gian Luca Mariottini, Ph.D.

CSE 4392/5369. Dr. Gian Luca Mariottini, Ph.D. University of Texas at Arlington CSE 4392/5369 Introduction to Vision Sensing Dr. Gian Luca Mariottini, Ph.D. Department of Computer Science and Engineering University of Texas at Arlington WEB : http://ranger.uta.edu/~gianluca

More information

An Introduction to Content Based Image Retrieval

An Introduction to Content Based Image Retrieval CHAPTER -1 An Introduction to Content Based Image Retrieval 1.1 Introduction With the advancement in internet and multimedia technologies, a huge amount of multimedia data in the form of audio, video and

More information

Face authentication for low-power mobile devices

Face authentication for low-power mobile devices Face authentication for low-power mobile devices Jean-Luc Nagel, CSEM SA, Microelectronics Division, Neuchâtel, Switzerland Patrick Stadelmann, University of Neuchâtel, IMT, Neuchâtel, Switzerland Conference

More information

Tutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication

Tutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication Tutorial 8 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication March 30, 2017 Table of Contents Problems Problem 1: Answer The Questions Problem 2: Daugman s Method Problem

More information

An input device is a piece of hardware that is used to enter data into a computer.

An input device is a piece of hardware that is used to enter data into a computer. O level Computer Science (2210) Compiled By: Engr. Fahad Khan Input Devices An input device is a piece of hardware that is used to enter data into a computer. There are many different kinds of input devices.

More information

Remote Sensing Introduction to the course

Remote Sensing Introduction to the course Remote Sensing Introduction to the course Remote Sensing (Prof. L. Biagi) Exploitation of remotely assessed data for information retrieval Data: Digital images of the Earth, obtained by sensors recording

More information

AAM Based Facial Feature Tracking with Kinect

AAM Based Facial Feature Tracking with Kinect BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 3 Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0046 AAM Based Facial Feature Tracking

More information

SINGLE IMAGE ORIENTATION USING LINEAR FEATURES AUTOMATICALLY EXTRACTED FROM DIGITAL IMAGES

SINGLE IMAGE ORIENTATION USING LINEAR FEATURES AUTOMATICALLY EXTRACTED FROM DIGITAL IMAGES SINGLE IMAGE ORIENTATION USING LINEAR FEATURES AUTOMATICALLY EXTRACTED FROM DIGITAL IMAGES Nadine Meierhold a, Armin Schmich b a Technical University of Dresden, Institute of Photogrammetry and Remote

More information

Biometric Cryptosystems: for User Authentication

Biometric Cryptosystems: for User Authentication Biometric Cryptosystems: for User Authentication Shobha. D Assistant Professor, Department of Studies in Computer Science, Pooja Bhagavat Memorial Mahajana Post Graduate Centre, K.R.S. Road, Metagalli,

More information

Chapter 4. Chapter 4. Computer Graphics 2006/2007 Chapter 4. Introduction to 3D 1

Chapter 4. Chapter 4. Computer Graphics 2006/2007 Chapter 4. Introduction to 3D 1 Chapter 4 Chapter 4 Chapter 4. Introduction to 3D graphics 4.1 Scene traversal 4.2 Modeling transformation 4.3 Viewing transformation 4.4 Clipping 4.5 Hidden faces removal 4.6 Projection 4.7 Lighting 4.8

More information

Color, Edge and Texture

Color, Edge and Texture EECS 432-Advanced Computer Vision Notes Series 4 Color, Edge and Texture Ying Wu Electrical Engineering & Computer Science Northwestern University Evanston, IL 628 yingwu@ece.northwestern.edu Contents

More information

3D Object Representations. COS 526, Fall 2016 Princeton University

3D Object Representations. COS 526, Fall 2016 Princeton University 3D Object Representations COS 526, Fall 2016 Princeton University 3D Object Representations How do we... Represent 3D objects in a computer? Acquire computer representations of 3D objects? Manipulate computer

More information

Fingerprint Authentication for SIS-based Healthcare Systems

Fingerprint Authentication for SIS-based Healthcare Systems Fingerprint Authentication for SIS-based Healthcare Systems Project Report Introduction In many applications there is need for access control on certain sensitive data. This is especially true when it

More information

Digital Image Processing COSC 6380/4393. Lecture 19 Mar 26 th, 2019 Pranav Mantini

Digital Image Processing COSC 6380/4393. Lecture 19 Mar 26 th, 2019 Pranav Mantini Digital Image Processing COSC 6380/4393 Lecture 19 Mar 26 th, 2019 Pranav Mantini What is color? Color is a psychological property of our visual experiences when we look at objects and lights, not a physical

More information

Image-Based Modeling and Rendering. Image-Based Modeling and Rendering. Final projects IBMR. What we have learnt so far. What IBMR is about

Image-Based Modeling and Rendering. Image-Based Modeling and Rendering. Final projects IBMR. What we have learnt so far. What IBMR is about Image-Based Modeling and Rendering Image-Based Modeling and Rendering MIT EECS 6.837 Frédo Durand and Seth Teller 1 Some slides courtesy of Leonard McMillan, Wojciech Matusik, Byong Mok Oh, Max Chen 2

More information