International Journal of Informative & Futuristic Research ISSN:
|
|
- Gwendoline Brown
- 5 years ago
- Views:
Transcription
1 Reviewed Paper Volume 3 Issue 6 February 2016 International Journal of Informative & Futuristic Research A Novel Method For Face Spoof Detection With Image Quality Distortion Parameters Paper ID IJIFR/ V3/ E6/ 056 Page No Research Area Keywords Digital Image Processing Face Detection, Spoof Detection, IDA, IQP, Neural Classifier, Cross database 1 st Chithra S Ravi 2 nd Deepa Thomas M.Tech. Student Department of Computer Science Engineering Musaliar College Of Engineering & Technology Pathanamthitta, Kerala-India Assistant Professor Department of Computer Science Engineering Musaliar College Of Engineering & Technology Pathanamthitta, Kerala-India Abstract Automatic face detection is used in many applications mainly for mobile payment. This popularity distress some face spoof attacks, which is a photo or video of an endorsed person face used to access the services. This work proposes an effective face spoof detection algorithm based on an Image Distortion Analysis (IDA) and Image Quality Parameters (IQP). Four features are used to form the IDA feature vector which is specular reflection, blurriness, chromatic moment, and color diversity. A Neural classifier can be used in an IDA and IQP, that could be trained each features of data for detect different face spoof attack. It helps as to differentiate between genuine and spoof faces and also detect the type of attack. This work can be used a face spoof data base, which is MSU Mobile Face Spoofing Database (MSU MFSD). Proposed solution overcomes the problems of an ensemble classifier, in the detection of spoof images. It separate genuine and spoof faces successfully on the basis of full reference method and clearly define the type of attack. 1. INTRODUCTION Automatic face recognition increases the attention in different access control applications. Face recognition does not need any further sensors, because all smartphone have a front camera. It is easy to acquire a person s face image or video than other biometric traits such as fingerprint, palm print, and iris. Face spoof attack mainly occur Available online through Published On: February 29,
2 as a printed photo or video frame form. An ensemble classifier face detection systems are not well designed to distinguish spoof faces from genuine live faces, which is not more than 70% of spoof faces are successfully matched to the gallery mates at rank-1. Proposed solution is IDA and IQP which is used for detecting spoof faces successfully with the help of a neural classifier. In spoof face attacks, mainly used to check the fragility of face recognition successfully Ivana [1]. 2. PRIOR WORK Face spoof detection was firstly reported in 2004, which is focus on the FP7 EU funded project and TABULA RASA are some spoofing attacks in the state of the art Commercial Off-The-Shelf(COTS). According to various types of cues used in face spoof detection, different methods can be categorized into four groups (i ) Motion based methods(ii) Texture based methods(iii) Method based on image quality analysis(iv) Method based on other cues. a b c Figure 1: (a) A genuine face image (b) Printed photo (c) Video frame. 2.1 Motion Based Methods These motion based methods, designed to count printed photo attacks, confine a very important cue for vitality, the intuitive motion of organs and muscles in a live face, such as eye blink, mouth movement and head rotation. The frequency of facial motion is limited by the human physiological rhythm, ranges from 0.2 to 0.5 Hz. Finally, it takes a comparatively long time usually greater than three seconds to acquire stable vitality features for face spoof detection. 2.2 Texture Based Methods To oppose the printed photo and replayed video attacks, texture based methods were suggested to remove image artifacts in spoof face images. In texture features are capable of distinguish artifacts in spoof faces from the genuine live faces. Texture based methods S. Marcel [3] have a success on the Idiap and CASIA databases. Generalization ability of texture based methods is to be poor. The half total error rate increased dramatically under the cross-database, where the training and testing sets came from dissimilar face spoof databases. 2.3 Image Quality Analysis Based Method There is no face specific information has been measured in designing informative features for face spoof detection. On the divergent, four features are designed exclusively for face feature representation in image quality analysis method, and the effectiveness of these features for spoof face detection. Idiap and CASIA databases, are two important public-domain databases. The training and testing of each modality were evaluated under intra-database. The proposed approach focus is to improve the 2114
3 generalization ability under cross-database which has often explored in the biometric community. 2.4 Methods Based On Other Cues Face spoof counter measures using cues which is derived from sources than 2D intensity image, such as 3D depth, IR image Zhang [2], spoofing context, and voice have been proposed. This work imposes additional necessities on the face recognition system. These four types of methods can also be collective to utilize multiple cues for face spoof detection. Thus motion magnification restricted by human physiological rhythm, cannot reach the reported performance F. Crete [6] without accumulate a large number of video frames (>200 frames), making these methods not suitable for real-time response. As a result cues derived from some image, spoofing image, and voice G. Chetty [4]. 3. FEATURES DERIVED FRON IDA A genuine face or a spoof face is presenting to a camera in the same imaging environment, the difference between genuine and spoof face images is due to their shape and characteristics of the facial surface in front of the camera. This work based on the Dichromatic Reflection Model, light reflectance I of an object at a specific location x can be decaying into the diffuse reflection (Id) and specular reflection (Is). In an IQP, contain three parameters (1) Mean Square Error (MSE) (2) Peak Signal to Noise Ratio (PSNR) and (3) Signal to Noise Ratio. This work includes MSE for checking high values in their gray scale range, in between This work use Gaussian Filter (GF) for image smoothing, which is a high frequency filter and it creating a filtered image from input image. Both of as compared and extract the values of MSE, PSNR, and SNR. = ( )/ = 2552 =. ^ / 3.1Printed Photo Attack In printed photo attack, light reflectance of an object in a specific location is first distorted to the printed ink intensity on the paper, and goes to the final image intensity from the paper surface through the refraction. During this transformation blurring the original face image and distorting color intensity are decided by the printer frequency and chromatic fidelity. For high resolution color printer, the distortion of blurring the original face image can be avoided, but not for distorting color intensity. Thus image distortion in printed photo attack can nearly by a contrast humiliating transformation. 3.2 Replay Video Attack Light reflectance of an object in a specific location is transmitting to the radiating intensity of pixels on the LCD screen. Frequency band width of the LCD panel is used for determine the original face image s blurriness. Distorting color intensity is related to 2115
4 the LCD color distortion and properties of intensity transformation. Based on the above analysis, the major distortions in a spoof face image (1) Specular reflection from the printed paper surface or LCD screen (2) Image blurriness (3) Image chromaticity and contrast distortion (4) Color diversity distortion. The video frame attack, identifying the pixel intensity of its background color. It may depend upon the light reflectance of that specific location. Color distortion calculated on different ways, on the basis of its signal to noise ratio and peak signal to noise ratio. Four different IDA features are extracted for each normalized face image. As the intensity of blurriness is high video attack occurs. Thus detect the type of attack successfully and get spoof image. The spoof face which is differentiate from its genuine face on another way, by the difference between the specular reflectance and diffuse reflectance. Figure 2: Face spoof detection using IDA and IQP with a neural classifier As indicated above figure, the diagram of the proposed spoof detection algorithm based on IDA and IQP with neural classifier. An input face image is aligned on two eyes locations which are normalized into pixels with an interpupillary distance (IPD) of 60 pixels. Experiments shows that face position and cropped face size are very important for spoof detection because they are extensively decrease the influence of facial and background variations that are inappropriate to spoof detection. Four different IDA features are extracted for each normalized face image which constitutes a 121-dimensional feature vector. This feature vector fed into a neural classifier, which act as multiple classifiers. Basically it is a single classifier, each trained on a different group of spoof training samples in the database. The classifier outputs are join to give the final binary decision which is genuine or spoof face and also give type of attack Specular Reflection Features To separate the specular reflection component Is from an input, which is used for an iterative method proposed ] R. T. Tan [5], which assumes that the illumination is i) from a particular source, ii) of unique color, and iii) not over-flooded Thus the scheming specular reflection component image Is, it signify the intensity distribution with three dimensional features: i) specular pixel percentage r, ii) mean intensity of specular pixels μ, and iii) variance of specular pixel intensities σ. 2116
5 3.1.2 Blurriness Features Image blur due to defocus can be used as another cue for anti-spoofing. Mainly two types of blurriness features denoted as b1 and b2 that in F. Crete [6] and P. Marziliano [7]. In F. Crete [6], blurriness is the difference between the original input and its blurred version. The larger the difference, the lower the blurriness in the original image. In P. Marziliano [7], blurriness is measured based on the average edge width in the input image Chromatic Moment Features The absolute color distribution which is dependent on an illumination and camera variations that propose to invariant features to detect abnormality in spoof faces. Normalized facial images converted from the RGB space into the HSV, which is hue, saturation, and value. Calculate the mean, deviation, and skewness of each channel as a chromatic feature form. Since these three features are equivalent to the these statistical moments in each channel, they referred to as a chromatic moment features. Thus the dimensionality of the chromatic moment feature vector is 5 3 = Color Diversity Features Another difference between genuine and spoof faces is the color diversity. Genuine faces tend to have richer colors. Color quantization is performed on the normalized face image. Two measurements are used from the color distribution: i) the histogram bin counts of the top 100 most frequently appearing colors, and ii) the number of distinct colors which is appearing in the normalized face image. The dimensionality of the color diversity feature vector is 101, these features (specular reflection, blurriness, chromatic moment, and color diversity) are finally concatenated together to form an IDA feature vector with 121 dimensions. (a) Hue (b) Saturation (c) Value Figure. 4: Histograms of chromatic difference between a genuine face and a spoof face 4. CLASSIFICATION METHOD 4.1Neural Classifier A neural classifier which is proposed for modification of the given face detection method. Neural classifiers detect the type of attacks which is printed photo or replayed video. It detect it may spoof or not and also the type of attack. In an IQP, contain three parameters (1) Mean Square Error (MSE) (2) Peak Signal to Noise Ratio (PSNR) and(3) Signal to Noise Ratio. This work includes MSE for checking high values with their gray scale range, in between This work use Gaussian Filter (GF) for image smoothing, which is a high frequency filter and it create a filtered image from an input image. Both 2117
6 of as compared and extract the values of MSE, PSNR, and SNR. This work check, the database features of each training data. Proposed solution includes 21 features mainly. All the gray scale representation converted to their corresponding binary forms due to done one bit representing. Thus each feature is evaluated and stored their corresponding database feature array. Proposed solution using new probabilistic neural network classifier for smooth face detection. IQP include MSE, PSNR, and SNR. 5. EXPERIMENTAL OUTCOME Spoof detection feature vectors are IDA features, IQP features and IDA features used here. The Idiap REPLAY-ATTACK, CASIA FASD (H protocol), and MSU MFSD databases are used for this work. This paper which is used two best methods (IDA+IQP) with neural classifier. Proposed method can be achieving much lower error rate on the same database. It clearly identifies soopf and original image with their type of attack. 6. CONCLUSIONN This paper addresses the problem of face spoof detection, mainly in a cross-database scenario. Motion or texture based features are used some published methods, which propose to perform face spoof detection based on IDA and IQP. Four types of IDA features (specular reflection, blurriness, color moments, and color diversity) and IQP (MSE, PSNR, SNR) have been designed to acquire the image distortion in the spoof face images. A neural classifier consisting of IDA and IQP trained for different spoof attacks. Proposed solution suggest an effective and efficient features (example. through feature transformations C. Zhang [8] ) for using in case studies. Thus a neural classifier and image quality analysis method which is detect the type of attacks. The proposed approach performs much better than the ensemble classification method and significantly outperforms the baseline methods in cross-database scenario. 7. REFERENCES [1] Chingovska, Ivana, André Anjos, and Sébastien Marcel. "On the effectiveness of local binary patterns in face anti-spoofing." Biometrics Special Interest Group (BIOSIG), 2012 BIOSIG-Proceedings of the International Conference of the. IEEE, [2] Zhang, Zhiwei, et al. "Face liveness detection by learning multispectral reflectance distributions." Automatic Face & Gesture Recognition and Workshops (FG 2011), 2011 IEEE International Conference on. IEEE, [3] T. de Freitas Pereira, A. Anjos, J. M. De Martino, and S. Marcel, LBP TOP based countermeasure against face spoofing attacks, in Proc. ACCV Workshops, 2012, pp [4] G. Chetty, Biometric liveness checking using multimodal fuzzy fusion, in Proc. IEEE FUZZ, Jul. 2010, pp Software Developer Kit. Pittsburgh Pattern Recognition PittPatt.[Online]. Available: accessed Jan [5] R. T. Tan and K. Ikeuchi, Separating reflection components of textured surfaces using a single image, IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 2, pp , Feb
7 [6] F. Crete, T. Dolmiere, P. Ladret, and M. Nicolas, The blur effect: Perception and estimation with a new no-reference perceptual blur metric, Proc. SPIE, vol. 6492, p I, Feb [7] P. Marziliano, F. Dufaux, S. Winkler, and T. Ebrahimi, A no-reference perceptual blur metric, in Proc. ICIP, vol , pp. III-57 III-60. [8] C. Zhang, F. Nie, and S. Xiang, A general kernelization framework for learning algorithms based on kernel PCA, Neurocomputing, vol. 73, nos. 4 6, pp , Jan
TRANSACTIONS ON MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE. Face Spoofing and Counter-Spoofing: A Survey of State-of-the-art Algorithms
TMLAI TRANSACTIONS ON MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE Face Spoofing and Counter-Spoofing: A Survey of State-of-the-art Algorithms SOCIETY FOR SCIENCE AND EDUCATION UNITED KINGDOM 1 Rinku Datta
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationMasked Face Detection based on Micro-Texture and Frequency Analysis
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Masked
More informationFace anti-spoofing using Image Quality Assessment
Face anti-spoofing using Image Quality Assessment Speakers Prisme Polytech Orléans Aladine Chetouani R&D Trusted Services Emna Fourati Outline Face spoofing attacks Image Quality Assessment Proposed method
More informationCountermeasure for the Protection of Face Recognition Systems Against Mask Attacks
Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks Neslihan Kose, Jean-Luc Dugelay Multimedia Department EURECOM Sophia-Antipolis, France {neslihan.kose, jean-luc.dugelay}@eurecom.fr
More informationSpoofing Face Recognition Using Neural Network with 3D Mask
Spoofing Face Recognition Using Neural Network with 3D Mask REKHA P.S M.E Department of Computer Science and Engineering, Gnanamani College of Technology, Pachal, Namakkal- 637018. rekhaps06@gmail.com
More informationBiometric Security System Using Palm print
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationIMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS. Kirthiga, M.E-Communication system, PREC, Thanjavur
IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS Kirthiga, M.E-Communication system, PREC, Thanjavur R.Kannan,Assistant professor,prec Abstract: Face Recognition is important
More informationFinger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation
Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Sowmya. A (Digital Electronics (MTech), BITM Ballari), Shiva kumar k.s (Associate Professor,
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationIris Recognition for Eyelash Detection Using Gabor Filter
Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition
More informationMulti-feature face liveness detection method combining motion information
Volume 04 - Issue 11 November 2018 PP. 36-40 Multi-feature face liveness detection method combining motion information Changlin LI (School of Computer Science and Technology, University of Science and
More informationLearning based face hallucination techniques: A survey
Vol. 3 (2014-15) pp. 37-45. : A survey Premitha Premnath K Department of Computer Science & Engineering Vidya Academy of Science & Technology Thrissur - 680501, Kerala, India (email: premithakpnath@gmail.com)
More informationFake Biometric System For Fingerprint, Iris, and face using QDA and SIFT
Fake Biometric System For Fingerprint, Iris, and face using QDA and SIFT 1 Gummadidala Ravi Babu, 2 Nagandla Prasad 1 (M.Tech),DECS, Sai Thirumala NVR engineering College, Narasaraopeta, AP, INDIA. 2 Asst
More informationOptimization of Human Finger Knuckle Print as a Neoteric Biometric Identifier
Optimization of Human Finger Knuckle Print as a Neoteric Biometric Identifier Mr.Vishal.B.Raskar 1, Ms. Sampada.H.Raut 2, 1Professor, dept. of E&TC, JSPM S Imperial college of engineering and Research,
More informationDetecting Digital Image Forgeries By Multi-illuminant Estimators
Research Paper Volume 2 Issue 8 April 2015 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Detecting Digital Image Forgeries By Multi-illuminant Estimators Paper ID
More informationAn overview of research activities in Biometrics
An overview of research activities in Biometrics at the Idiap Research Institute Dr Sébastien Marcel Senior research scientist www.idiap.ch/ marcel Idiap Research Institute Martigny, Switzerland www.idiap.ch
More informationColor Local Texture Features Based Face Recognition
Color Local Texture Features Based Face Recognition Priyanka V. Bankar Department of Electronics and Communication Engineering SKN Sinhgad College of Engineering, Korti, Pandharpur, Maharashtra, India
More informationA Novel Approach to Improve the Biometric Security using Liveness Detection
Volume 8, No. 5, May June 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 A Novel Approach to Improve the Biometric
More informationProcessing of Iris Video frames to Detect Blink and Blurred frames
Processing of Iris Video frames to Detect Blink and Blurred frames Asha latha.bandi Computer Science & Engineering S.R.K Institute of Technology Vijayawada, 521 108,Andhrapradesh India Latha009asha@gmail.com
More informationColor Content Based Image Classification
Color Content Based Image Classification Szabolcs Sergyán Budapest Tech sergyan.szabolcs@nik.bmf.hu Abstract: In content based image retrieval systems the most efficient and simple searches are the color
More informationFace Anti-Spoofing Based on General Image Quality Assessment
Face Anti-Spoofing Based on General Image Quality Assessment Javier Galbally Joint Research Centre, European Commission, Ispra, Italy Email: javier.galbally@jrc.ec.europa.eu Sébastien Marcel IDIAP Research
More informationA Novel Algorithm for Color Image matching using Wavelet-SIFT
International Journal of Scientific and Research Publications, Volume 5, Issue 1, January 2015 1 A Novel Algorithm for Color Image matching using Wavelet-SIFT Mupuri Prasanth Babu *, P. Ravi Shankar **
More informationENHANCEMENT OF KERNEL DISCRIMINATIVE ANALYSIS (KDA) IN FACE. SPOOFING DETECTION METHOD S.Menaka, E.P.Prakash, V.Dhinakari
ENHANCEMENT OF KERNEL DISCRIMINATIVE ANALYSIS (KDA) IN FACE ABSTRACT SPOOFING DETECTION METHOD S.Menaka, E.P.Prakash, V.Dhinakari 1 PG Student, SNS College Of Engineering, Coimbatore 2 Assistant Professor,
More informationFace Liveness Detection with Component Dependent Descriptor
Face Liveness Detection with Component Dependent Descriptor Jianwei Yang Zhen Lei Shengcai Liao Stan Z. Li Center for Biometrics and Security Research & National Laboratory of Pattern Recognition Institute
More informationFace Liveness Detection for Biometric Antispoofing Applications using Color Texture and Distortion Analysis Features
Face Liveness Detection for Biometric Antispoofing Applications using Color Texture and Distortion Analysis Features Tazeen Anjum, Shrikant V Sonekar Dept of CSE JD College of Engg.&Management Nagpur,
More informationRESTORATION OF DEGRADED DOCUMENTS USING IMAGE BINARIZATION TECHNIQUE
RESTORATION OF DEGRADED DOCUMENTS USING IMAGE BINARIZATION TECHNIQUE K. Kaviya Selvi 1 and R. S. Sabeenian 2 1 Department of Electronics and Communication Engineering, Communication Systems, Sona College
More informationAN EXAMINING FACE RECOGNITION BY LOCAL DIRECTIONAL NUMBER PATTERN (Image Processing)
AN EXAMINING FACE RECOGNITION BY LOCAL DIRECTIONAL NUMBER PATTERN (Image Processing) J.Nithya 1, P.Sathyasutha2 1,2 Assistant Professor,Gnanamani College of Engineering, Namakkal, Tamil Nadu, India ABSTRACT
More informationFace Liveness Detection Using Euler Method Based On Diffusion Speed Calculation
Face Liveness Detection Using Euler Method Based On Diffusion Speed Calculation 1 Ms. Nishigandha S. Bondare, 2 Mr. P.S.Mohod 1 M.Tech Student, Department of CSE, G.H.Raisoni College of Engineering, Nagpur,
More informationContent Based Image Retrieval Using Combined Color & Texture Features
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 6 Ver. III (Nov. Dec. 2016), PP 01-05 www.iosrjournals.org Content Based Image Retrieval
More informationTechniques of Face Spoof Detection: A Review
Techniques of Face Spoof Detection: A Review Ramandeep Kaur MTech(CSE) D.A.V Institute of Engineering &Technology P. S. Mann Assistant Professor(CSE) D.A.V. Institue of Engineering &Technology ABSTRACT
More informationIMPLEMENTATION OF THE CONTRAST ENHANCEMENT AND WEIGHTED GUIDED IMAGE FILTERING ALGORITHM FOR EDGE PRESERVATION FOR BETTER PERCEPTION
IMPLEMENTATION OF THE CONTRAST ENHANCEMENT AND WEIGHTED GUIDED IMAGE FILTERING ALGORITHM FOR EDGE PRESERVATION FOR BETTER PERCEPTION Chiruvella Suresh Assistant professor, Department of Electronics & Communication
More informationFACE SPOOFING ATTACKS DETECTION IN BIOMETRIC SYSTEM.
FACE SPOOFING ATTACKS DETECTION IN BIOMETRIC SYSTEM. Mr. Kaustubh D. Vishnu 1, Dr. R.D.Raut 2, Dr. V. M. Thakare SGBAU, Amravati, Maharashtra, India ABSTRACT Biometric system have evolved very well in
More informationMULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION
MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION Panca Mudjirahardjo, Rahmadwati, Nanang Sulistiyanto and R. Arief Setyawan Department of Electrical Engineering, Faculty of
More informationFace Anti-Spoofing using Haralick Features
Face Anti-Spoofing using Haralick Features Akshay Agarwal, Richa Singh, and Mayank Vatsa IIIT-Delhi, India {akshaya, rsingh, mayank} @iiitd.ac.in Abstract Face spoofing can be performed in a variety of
More informationDETECTION OF SMOOTH TEXTURE IN FACIAL IMAGES FOR THE EVALUATION OF UNNATURAL CONTRAST ENHANCEMENT
DETECTION OF SMOOTH TEXTURE IN FACIAL IMAGES FOR THE EVALUATION OF UNNATURAL CONTRAST ENHANCEMENT 1 NUR HALILAH BINTI ISMAIL, 2 SOONG-DER CHEN 1, 2 Department of Graphics and Multimedia, College of Information
More information2D Face Based Security System for Fake Biometric Detection Using Image Quality Assessment
2D Face Based Security System for Fake Biometric Detection Using Image Quality Assessment Rinu Prakash T 1, Vipin Thomas 2 P.G. Student, Department of Electronics and Communication Engineering, Ilahia
More informationAdvance Shadow Edge Detection and Removal (ASEDR)
International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 2 (2017), pp. 253-259 Research India Publications http://www.ripublication.com Advance Shadow Edge Detection
More informationGraph Matching Iris Image Blocks with Local Binary Pattern
Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of
More informationAn Algorithm based on SURF and LBP approach for Facial Expression Recognition
ISSN: 2454-2377, An Algorithm based on SURF and LBP approach for Facial Expression Recognition Neha Sahu 1*, Chhavi Sharma 2, Hitesh Yadav 3 1 Assistant Professor, CSE/IT, The North Cap University, Gurgaon,
More informationAn ICA based Approach for Complex Color Scene Text Binarization
An ICA based Approach for Complex Color Scene Text Binarization Siddharth Kherada IIIT-Hyderabad, India siddharth.kherada@research.iiit.ac.in Anoop M. Namboodiri IIIT-Hyderabad, India anoop@iiit.ac.in
More informationA Study on Different Challenges in Facial Recognition Methods
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521
More informationFigure 1. Example sample for fabric mask. In the second column, the mask is worn on the face. The picture is taken from [5].
ON THE VULNERABILITY OF FACE RECOGNITION SYSTEMS TO SPOOFING MASK ATTACKS Neslihan Kose, Jean-Luc Dugelay Multimedia Department, EURECOM, Sophia-Antipolis, France {neslihan.kose, jean-luc.dugelay}@eurecom.fr
More informationFingerprint Image Enhancement Algorithm and Performance Evaluation
Fingerprint Image Enhancement Algorithm and Performance Evaluation Naja M I, Rajesh R M Tech Student, College of Engineering, Perumon, Perinad, Kerala, India Project Manager, NEST GROUP, Techno Park, TVM,
More informationAn Approach for Reduction of Rain Streaks from a Single Image
An Approach for Reduction of Rain Streaks from a Single Image Vijayakumar Majjagi 1, Netravati U M 2 1 4 th Semester, M. Tech, Digital Electronics, Department of Electronics and Communication G M Institute
More informationComputationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms
Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms Andreas Uhl Department of Computer Sciences University of Salzburg, Austria uhl@cosy.sbg.ac.at
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 5, May ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 5, May-2016 320 MULTIMEDIA SECURITY SPOOFING OF DIGITAL IMAGE FORENSICS -3D FACE MASK Merlin Livingston L.M. Associate Professor,
More informationTEXTURE CLASSIFICATION METHODS: A REVIEW
TEXTURE CLASSIFICATION METHODS: A REVIEW Ms. Sonal B. Bhandare Prof. Dr. S. M. Kamalapur M.E. Student Associate Professor Deparment of Computer Engineering, Deparment of Computer Engineering, K. K. Wagh
More informationImproving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationShape and Texture Based Countermeasure to Protect Face Recognition Systems Against Mask Attacks
2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops Shape and Texture Based Countermeasure to Protect Face Recognition Systems Against Mask Attacks Neslihan Kose and Jean-Luc Dugelay
More informationAn Improved Approach For Mixed Noise Removal In Color Images
An Improved Approach For Mixed Noise Removal In Color Images Ancy Mariam Thomas 1, Dr. Deepa J 2, Rijo Sam 3 1P.G. student, College of Engineering, Chengannur, Kerala, India. 2Associate Professor, Electronics
More informationIMAGE DENOISING TO ESTIMATE THE GRADIENT HISTOGRAM PRESERVATION USING VARIOUS ALGORITHMS
IMAGE DENOISING TO ESTIMATE THE GRADIENT HISTOGRAM PRESERVATION USING VARIOUS ALGORITHMS P.Mahalakshmi 1, J.Muthulakshmi 2, S.Kannadhasan 3 1,2 U.G Student, 3 Assistant Professor, Department of Electronics
More informationEFFECTIVE METHODOLOGY FOR DETECTING AND PREVENTING FACE SPOOFING ATTACKS
EFFECTIVE METHODOLOGY FOR DETECTING AND PREVENTING FACE SPOOFING ATTACKS 1 Mr. Kaustubh D.Vishnu, 2 Dr. R.D. Raut, 3 Dr. V. M. Thakare 1,2,3 SGBAU, Amravati,Maharashtra, (India) ABSTRACT Biometric system
More informationDigital Image Forgery Detection Based on GLCM and HOG Features
Digital Image Forgery Detection Based on GLCM and HOG Features Liya Baby 1, Ann Jose 2 Department of Electronics and Communication, Ilahia College of Engineering and Technology, Muvattupuzha, Ernakulam,
More informationMultimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More informationTexture Image Segmentation using FCM
Proceedings of 2012 4th International Conference on Machine Learning and Computing IPCSIT vol. 25 (2012) (2012) IACSIT Press, Singapore Texture Image Segmentation using FCM Kanchan S. Deshmukh + M.G.M
More informationApproach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion
Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant
More informationFace spoofing detection using Multi-Level Local Phase Quantization (ML-LPQ)
Face spoofing detection using Multi-Level Local Phase Quantization (ML-LPQ) A. Benlamoudi, D. Samai, A. Ouafi, SE. Bekhouche, A. Taleb-Ahmed, and A. Hadid Universit Kasdi Merbah Ouargla, Laboratoire de
More informationDetecting Sensor Level Spoof Attacks Using Joint Encoding of Temporal and Spatial Features
Detecting Sensor Level Spoof Attacs Using Joint Encoding of Temporal and Spatial Features Jun Liu, Ajay umar Department of Computing, The Hong ong Polytechnic University, Hong ong Abstract Automated detection
More informationCOMS W4735: Visual Interfaces To Computers. Final Project (Finger Mouse) Submitted by: Tarandeep Singh Uni: ts2379
COMS W4735: Visual Interfaces To Computers Final Project (Finger Mouse) Submitted by: Tarandeep Singh Uni: ts2379 FINGER MOUSE (Fingertip tracking to control mouse pointer) Abstract. This report discusses
More informationFace Spoofing Detection from a Single Image using Diffusion Speed Model
2018 IJSRST Volume 4 Issue 2 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Science and Technology Face Spoofing Detection from a Single Image using Diffusion Speed Model K. Sreenivasulu
More informationBiometric Security System for Fake Detection using image Quality Assessment Techniques
Biometric Security System for Fake Detection using image Quality Assessment Techniques Rinu Prakash T, PG Scholar Department of Electronics & Communication Engineering Ilahia College of Engineering & Technology
More informationFUZZY FOREST LEARNING BASED ONLINE FACIAL BIOMETRIC VERIFICATION FOR PRIVACY PROTECTION
FUZZY FOREST LEARNING BASED ONLINE FACIAL BIOMETRIC VERIFICATION FOR PRIVACY PROTECTION Supritha G M 1, Shivanand R D 2 1 P.G. Student, Dept. of Computer Science and Engineering, B.I.E.T College, Karnataka,
More informationSpatial Frequency Domain Methods for Face and Iris Recognition
Spatial Frequency Domain Methods for Face and Iris Recognition Dept. of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh, PA 15213 e-mail: Kumar@ece.cmu.edu Tel.: (412) 268-3026
More informationImage retrieval based on bag of images
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Image retrieval based on bag of images Jun Zhang University of Wollongong
More informationImproved LBP and K-Nearest Neighbors Algorithm
Image-Splicing Forgery Detection Based On Improved LBP and K-Nearest Neighbors Algorithm Fahime Hakimi, Department of Electrical and Computer engineering. Zanjan branch, Islamic Azad University. Zanjan,
More informationOn the generalization of color texture-based face anti-spoofing
On the generalization of color texture-based face anti-spoofing Zinelabidine Boulkenafet a,, Jukka Komulainen a, Abdenour Hadid a,b a Center for Machine Vision and Signal Analysis, University of Oulu,
More informationRobust Shape Retrieval Using Maximum Likelihood Theory
Robust Shape Retrieval Using Maximum Likelihood Theory Naif Alajlan 1, Paul Fieguth 2, and Mohamed Kamel 1 1 PAMI Lab, E & CE Dept., UW, Waterloo, ON, N2L 3G1, Canada. naif, mkamel@pami.uwaterloo.ca 2
More informationAdaptive Skin Color Classifier for Face Outline Models
Adaptive Skin Color Classifier for Face Outline Models M. Wimmer, B. Radig, M. Beetz Informatik IX, Technische Universität München, Germany Boltzmannstr. 3, 87548 Garching, Germany [wimmerm, radig, beetz]@informatik.tu-muenchen.de
More informationIRIS SEGMENTATION AND RECOGNITION FOR HUMAN IDENTIFICATION
IRIS SEGMENTATION AND RECOGNITION FOR HUMAN IDENTIFICATION Sangini Shah, Ankita Mandowara, Mitesh Patel Computer Engineering Department Silver Oak College Of Engineering and Technology, Ahmedabad Abstract:
More informationFast and Efficient Automated Iris Segmentation by Region Growing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 6, June 2013, pg.325
More informationA Study on Similarity Computations in Template Matching Technique for Identity Verification
A Study on Similarity Computations in Template Matching Technique for Identity Verification Lam, S. K., Yeong, C. Y., Yew, C. T., Chai, W. S., Suandi, S. A. Intelligent Biometric Group, School of Electrical
More informationBiometric Detection in Fingerprint, Iris, and 2D face using hybrid of IQA and SIFT
International Journal of Innovative Research in Electronics and Communications (IJIREC) Volume 2, Issue 8, 2015, PP 1-8 ISSN 2349-4042 (Print) & ISSN 2349-4050 (Online) www.arcjournals.org Biometric Detection
More informationCritique: Efficient Iris Recognition by Characterizing Key Local Variations
Critique: Efficient Iris Recognition by Characterizing Key Local Variations Authors: L. Ma, T. Tan, Y. Wang, D. Zhang Published: IEEE Transactions on Image Processing, Vol. 13, No. 6 Critique By: Christopher
More information[2006] IEEE. Reprinted, with permission, from [Wenjing Jia, Huaifeng Zhang, Xiangjian He, and Qiang Wu, A Comparison on Histogram Based Image
[6] IEEE. Reprinted, with permission, from [Wenjing Jia, Huaifeng Zhang, Xiangjian He, and Qiang Wu, A Comparison on Histogram Based Image Matching Methods, Video and Signal Based Surveillance, 6. AVSS
More informationThe Novel Approach for 3D Face Recognition Using Simple Preprocessing Method
The Novel Approach for 3D Face Recognition Using Simple Preprocessing Method Parvin Aminnejad 1, Ahmad Ayatollahi 2, Siamak Aminnejad 3, Reihaneh Asghari Abstract In this work, we presented a novel approach
More informationImage enhancement for face recognition using color segmentation and Edge detection algorithm
Image enhancement for face recognition using color segmentation and Edge detection algorithm 1 Dr. K Perumal and 2 N Saravana Perumal 1 Computer Centre, Madurai Kamaraj University, Madurai-625021, Tamilnadu,
More informationFace Recognition under varying illumination with Local binary pattern
Face Recognition under varying illumination with Local binary pattern Ms.S.S.Ghatge 1, Prof V.V.Dixit 2 Department of E&TC, Sinhgad College of Engineering, University of Pune, India 1 Department of E&TC,
More informationwavelet packet transform
Research Journal of Engineering Sciences ISSN 2278 9472 Combining left and right palmprint for enhanced security using discrete wavelet packet transform Abstract Komal Kashyap * and Ekta Tamrakar Department
More informationFace Recognition Based On Granular Computing Approach and Hybrid Spatial Features
Face Recognition Based On Granular Computing Approach and Hybrid Spatial Features S.Sankara vadivu 1, K. Aravind Kumar 2 Final Year Student of M.E, Department of Computer Science and Engineering, Manonmaniam
More informationComparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio
Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio M. M. Kazi A. V. Mane R. R. Manza, K. V. Kale, Professor and Head, Abstract In the fingerprint
More informationContent based Image Retrieval Using Multichannel Feature Extraction Techniques
ISSN 2395-1621 Content based Image Retrieval Using Multichannel Feature Extraction Techniques #1 Pooja P. Patil1, #2 Prof. B.H. Thombare 1 patilpoojapandit@gmail.com #1 M.E. Student, Computer Engineering
More informationA NOVEL APPROACH TO ACCESS CONTROL BASED ON FACE RECOGNITION
A NOVEL APPROACH TO ACCESS CONTROL BASED ON FACE RECOGNITION A. Hadid, M. Heikkilä, T. Ahonen, and M. Pietikäinen Machine Vision Group Infotech Oulu and Department of Electrical and Information Engineering
More informationHybrid Biometric Person Authentication Using Face and Voice Features
Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person
More informationFace Quality Assessment System in Video Sequences
Face Quality Assessment System in Video Sequences Kamal Nasrollahi, Thomas B. Moeslund Laboratory of Computer Vision and Media Technology, Aalborg University Niels Jernes Vej 14, 9220 Aalborg Øst, Denmark
More informationNon-Linear Masking based Contrast Enhancement via Illumination Estimation
https://doi.org/10.2352/issn.2470-1173.2018.13.ipas-389 2018, Society for Imaging Science and Technology Non-Linear Masking based Contrast Enhancement via Illumination Estimation Soonyoung Hong, Minsub
More informationFace Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) Face Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian Hebei Engineering and
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017
RESEARCH ARTICLE OPEN ACCESS Iris and Palmprint Decision Fusion to Enhance Human Ali M Mayya [1], Mariam Saii [2] PhD student [1], Professor Assistance [2] Computer Engineering Tishreen University Syria
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationK-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion
K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion Dhriti PEC University of Technology Chandigarh India Manvjeet Kaur PEC University of Technology Chandigarh India
More informationAn Adaptive Threshold LBP Algorithm for Face Recognition
An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent
More informationMORPH-II: Feature Vector Documentation
MORPH-II: Feature Vector Documentation Troy P. Kling NSF-REU Site at UNC Wilmington, Summer 2017 1 MORPH-II Subsets Four different subsets of the MORPH-II database were selected for a wide range of purposes,
More informationFeature-level Fusion for Effective Palmprint Authentication
Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,
More informationImage Classification based on Saliency Driven Nonlinear Diffusion and Multi-scale Information Fusion Ms. Swapna R. Kharche 1, Prof.B.K.
Image Classification based on Saliency Driven Nonlinear Diffusion and Multi-scale Information Fusion Ms. Swapna R. Kharche 1, Prof.B.K.Chaudhari 2 1M.E. student, Department of Computer Engg, VBKCOE, Malkapur
More informationA Nondestructive Bump Inspection in Flip Chip Component using Fuzzy Filtering and Image Processing
A Nondestructive Bump Inspection in Flip Chip Component using Fuzzy Filtering and Image Processing 103 A Nondestructive Bump Inspection in Flip Chip Component using Fuzzy Filtering and Image Processing
More informationA Survey on Feature Extraction Techniques for Palmprint Identification
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 03 Issue. 12 A Survey on Feature Extraction Techniques for Palmprint Identification Sincy John 1, Kumudha Raimond 2 1
More informationComputationally Efficient Face Spoofing Detection with Motion Magnification
Computationally Efficient Face Spoofing Detection with Motion Samarth Bharadwaj, Tejas I. Dhamecha, Mayank Vatsa and Richa Singh IIIT-Delhi, India {samarthb, tejasd, mayank, rsingh}@iiitd.ac.in Abstract
More informationEdge Histogram Descriptor, Geometric Moment and Sobel Edge Detector Combined Features Based Object Recognition and Retrieval System
Edge Histogram Descriptor, Geometric Moment and Sobel Edge Detector Combined Features Based Object Recognition and Retrieval System Neetesh Prajapati M. Tech Scholar VNS college,bhopal Amit Kumar Nandanwar
More informationFast Image Matching Using Multi-level Texture Descriptor
Fast Image Matching Using Multi-level Texture Descriptor Hui-Fuang Ng *, Chih-Yang Lin #, and Tatenda Muindisi * Department of Computer Science, Universiti Tunku Abdul Rahman, Malaysia. E-mail: nghf@utar.edu.my
More informationDetection of Rooftop Regions in Rural Areas Using Support Vector Machine
549 Detection of Rooftop Regions in Rural Areas Using Support Vector Machine Liya Joseph 1, Laya Devadas 2 1 (M Tech Scholar, Department of Computer Science, College of Engineering Munnar, Kerala) 2 (Associate
More information