Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images
|
|
- Hector Dean
- 5 years ago
- Views:
Transcription
1 Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea Abstract. A common problem in fingerprint recognition is the existence of false minutiae which increase both FAR and FRR in fingerprint matching. In this paper, a robust minutiae postprocessing algorithm is proposed. Unlike most algorithms which use simple distance and connectivity criterions for postprocessing, we also used orientation and flow of ridges as the key factor for postprocessing to avoid eliminating true minutiae while postprocessing. It is shown by the experiments that our postprocessing algorithm improves the minutiae extraction accuracy and the performance of the matching process. 1 Introduction Most fingerprint recognition systems are based on minutiae matching [1]. Minutiae are local discontinuities of fingerprints and are restricted to two types : ridge ending and ridge bifurcation [2], [3]. A common problem in fingerprint recognition is the existence of false minutiae which increase both FAR and FRR in fingerprint matching. Therefore, the enhancement of the fingerprint image and the false minutiae elimination form an important part of the system. However, most of the researches emphasized on the fingerprint image enhancement and the false minutiae elimination process was based on simple distance and connectivity criteria [1], [2], [3], [4]. But the problem with such simple approaches is that it eliminates true minutiae while eliminating false minutiae. Xiao and Raafat proposed in [5], a minutiae postprocessing algorithm based on both statistical and structural information. However, their method relies heavily on connectivity which makes it complex and unreliable to bad quality fingerprints. Also, specific structural informations were not given. In this paper, we present an efficient minutiae postprocessing algorithm. The goal of our minutiae extraction algorithm is to remove as many false minutiae as possible while retaining true minutiae. The goal is achieved by postprocessing minutiae based on not only the minutiae distance and connectivity but also using the orientation and flow of ridges as the key factor. Rest of the paper is organized as follows. Section 2 briefly decribes the adopted preprocessing procedures. Section 3 decribes the proposed minutiae postprocessing procedures. The performance of the proposed algorithm is shown by experiments in Section 4. Finally, Section 5 contains conclusion.
2 2 Preprocessing and Minutiae Extraction 2.1 Preprocessing Preprocessing procedures necessary for minutiae extraction are shown in Fig.1. Fig. 1. Preprocessing Procedures The first preprocessing procedure is the calculation of the local ridge orientation. The least mean square orientation estimation algorithm[6] is used and the local ridge orientation is specified by blocks rather than every pixel. The calculated orientation is in the range between 0 and π After the ridge orientation calculation, ridge frequency is calculated[6]. Using the calculated orientations and frequencies, the input grayscale image is enhanced and binarized by Gabor filters which have both frequency-selective and orientation-selective properties[6]. The final preprocessing operation required before extracting minutiae is thinning. Thinning reduces the the widths of the binary ridges down to a single pixel to facilitate the job of detecting ridge endings and bifurcations. The Zhang-Seun thinning algorithm[7] is used in this paper. 2.2 Minutiae Extraction After a thinned fingerprint image is obtained, minutiae are directly extracted from the thinned image. To detect minutiae, a count of the pixel value transition at a point of interest in a 3 3 mask is used [4], [5]. If the count equals 2, then the point is an endpoint. If the count equals 6, then the point is a bifurcation. For each extracted minutia, the x & y coordinate and the orientation are recorded. The minutiae orientation is defined as the local ridge orientation of the associated ridge[2]. The minutiae orientation is in the range between 0 and π. 3 Proposed Minutiae Postprocessing Algorithm There are many false minutiae among the extracted minutiae. False minutiae will decrease the performance of the fingerprint identification system by increasing both FRR and FAR. Typical false minutiae structures are shown in Fig.2. In this section, minutiae postprocessing algorithm is proposed. To eliminate false minutiae without eliminating true minutiae, the proposed methods are based on the flow of ridges as well as the minutiae distance and connectivity.
3 (a) (b) (c) (d) (e) (f) (g) Fig. 2. Typical false minutiae : (a)broken ridge, (b)bridge, (c)short ridge, (d)short ridge, (e) Short Ridge, (f) Hole, (g)triangle (a) (b) Fig. 3. False Minutiae Structures: (a)broken ridge, (b)bridge 3.1 Detecting Broken Ridge Structure Because of scars and insufficient finger pressure on the input device, a ridge may break into two ridges creating two endpoints. Obviously, these two endpoints are false minutiae and should be eliminated. Two endpoints are identified as a broken ridge structure by the following decision rules.(fig.3(a)) (1) (x1 x 2 ) 2 + (y 1 y 2 ) 2 < Dist 1 (1) (2) The line constructed by connecting two endpoints and two ridges connected with each minutia should all flow in the same direction tan 1 ( y 2 y 1 x 2 x 1 ) 1 2 (OR A + OR B ), (2) (3) Two ridges should be flowing to the opposite direction without being connected. For example(fig.3(a)), if ridge connected with minutia A flows downwards,the other ridge should flow upwards and minutia B should be placed above the minutia A. 3.2 Detecting Bridge Structure Due to excessive finger pressure or noise in the image, two separate ridges are sometimes connected by a short ridge to make a bridge structure. Based on the fact that ridges in fingerprint flow smooth and neighbor ridges flow in similar direction, method for detecting two false bifurcation associated with bridge structures is as follows. (Fig.3(b))
4 (1) Start tracking three ridges connected to a bifurcation(point A). (2) If one of the tracked ridges meet another bifurcation(point B), calculate orientation of the ridge connected by two bifurcations(or AB ) and the distance between two bifurcations(dist AB ). (3) If the Dist AB is less than a threshold value(dist 2 ) and the difference between the OR AB and the average orientation of two bifurcations(or A, OR B ) is larger than a specified angle( π 4 used in this dissertation),then two bifurcations are identified as a bridge structure. Note that by applying the described rule, false minutiae in triangular structures (Fig.2(g)) can also be detected efficiently. Two false minutiae and a true minutia are form a triangular structure. In the triangular structure, it is important to eliminate the two false minutiae while not eliminating the true minutia. By using the rule above, only two false minutiae are detected. 3.3 Detecting Short Ridge Structure All short ridges should be considered as false minutiae because they are usually artifacts introduced by image preprocessing procedure such as ridge segmentation and thinning. To detect this kind of false minutiae, we start tracking ridges from ridge endings. If a tracked ridge meets another endpoint or a bifurcation within a distance(dist 3 ), two minutiae are considered as false minutiae. Also if a bifurcation meets another bifurcation while traking ridges and two bifurcations flow in opposite direction(fig.2(e)), two bifurcations are considered false minutiae. 3.4 Detecting Hole Structure Hole structures occur due to pores and dirts on fingerprints. The hole structure can be detected by tracking three ridges connected to an extracted bifurcation. If two tracked ridges meet to form another bifurcation and two bifurcations are within a distance(dist 4 ), then both bifurcations are considered as false minutiae. 3.5 Thresholds and False Minutiae Elimination Because fingers are elasitic, distances between ridges change everytime due to different pressure a user puts on a input device. To cope with this problem, various thresholds used in this paper are made adaptive based on ridge frequency(table.1). Ridge frequency is already calculated in image enhancement process[6]. To efficiently eliminate false minutiae while retaining true minutiae, false minutiae are detected and eliminated in specific order as shown in Fig.4. Fig. 4. False Minutiae Elimination Order
5 Dist Description Threshold Dist 1 Broken Ridge 2/freq Dist 2 Bridge 1.5/freq Dist 3 Short Ridge 1.7/freq Dist 4 Hole 2/freq Table 1. Threshold Values : Freq indicates the ridge frequency at the minutia Method A Method B DMR(%) EMR(%) TMR(%) FMR(%) Table 2. Postprocessing performance: Method(A)- Raw Minutiae Extraction, Method(B)-Postprocessing adopted (DMR : Dropped Minutiae Ratio, EMR : Exchanged Minutiae Ratio, TMR : True Minutiae Ratio, FMR : False Minutiae Ratio) 4 Experimental Results In this section, the performance of the proposed minutiae postprocessing algorithm is evaluated. Fingerprint images were acquired through optic-based fingerprint sensor manufactured by Nitgen. The size of the image is with the resolution of 450 dpi and 1000 fingerprint images(10 fingerprints for 100 individuals) with various image qualities were used for experiments. Before showing the experimental results, we will describe some terms used to evaluate the performance. True Minutiae(TM) are minutiae picked by an expert. Paired Minutiae(PM) are minutiae extracted by the system which coincide with TM. False Minutiae(FM) are minutiae extracted by the system which do not coincide with TM. Dropped Minutiae(DM) are minutiae picked by an expert which are not extracted by the system. Finally, Exchanged Minutiae(EM) are minutiae extracted by the system which coincide with TM except the type. Table 2 shows the performance of our proposed minutiae postprocessing algorithm. The method A indicates the results of the raw minutiae extraction(without postprocessing) and the method B indicates the results when our postprocessing algorithm is adopted. It shows that the False Minutiae Ratio drops 33% while the True Minutiae Ratio only drops 2.2%. In addition, to see the effect of our postprocessing algorithm on actual fingerprint matching, we adopted matching procedure from [8]. Fig.5 shows matching results with ROC curves. It is clear from the results that the performance of the matching system is greatly improved by adopting the proposed postprocessing algorithm.
6 Fig. 5. ROC(Receiver Operating Characteristic) Curves 5 Conclusion A minutiae postprocessing algorithm was proposed in this paper. To avoid eliminating true minutiae while postprocessing, our proposed algorithm was based on the orientation and flow of ridges as well as minutiae distance and connectivity. Experimental results showed that our algorithm is indeed very effective; eliminating great deal of false minutiae while retaining most of true minutiae. It was also shown that the proposed algorithm improves the fingerprint matching performance. References [1] D. Maio, and D. Maltoni, Direct Gray-Scale Minutiae Detection in Fingerprints, IEEE Trans. Pattern Anal. Machine Intell., vol. 19, no. 1, pp , 1997 [2] A. K. Jain, L. Hong, and R. Bolle, On-Line Fingerprint Verification, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19, no. 4, pp , April [3] L. C. Jain, et al, Eds., Intelligent Biometric Techniques in Fingerprint and Face Recognition, CRC Press International Series on Computational Intelligence, [4] N. K. Ratha, S. Chen, and A. K. Jain, Adaptive Flow Orientation Based Feature Extraction in Fingerprint Images, Pattern Recognition, vol. 28, no. 11, pp. 1,657-1,672, 1995 [5] Q. Xiao, and H. Raafat, Fingerprint Image Postprocessing : A Combined Statistical and Structural Approach, Pattern Recognition, vol. 28, no. 11, pp. 1,657-1,672, 1995 [6] L. Hong, Y. Wan, and A. K. Jain, Fingerprint Image Enhancement: Algorithm and Performance Evaluation, IEEE Trans. Pattern Analysis and Machine Intelligence, vol.20, pp , Aug [7] J. R. Parker, Algorithms for Image Processing and Computer Vision, New York : Wiley Computer Publishing, [8] A. Wahab, S. H. Chin, E. C. Tain, Novel Approach to Automated Fingerprint Recognition, IEE Proc.- Vis. Image Signal Process, vol.145, no.3, pp , Jun
An Algorithm for Fingerprint Image Postprocessing
An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most
More informationEffective and Efficient Fingerprint Image Postprocessing
Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg
More informationPreprocessing and postprocessing for skeleton-based fingerprint minutiae extraction
Pattern Recognition 40 (2007) 1270 1281 www.elsevier.com/locate/pr Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction Feng Zhao, Xiaoou Tang Department of Information Engineering,
More informationCOMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL
COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL Department of Electronics and Telecommunication, V.V.P. Institute of Engg & Technology,Solapur University Solapur,
More informationTouchless Fingerprint Recognization System
e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph
More informationFingerprint Segmentation using the Phase of Multiscale Gabor Wavelets
CCV: The 5 th sian Conference on Computer Vision, 3-5 January, Melbourne, ustralia Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets Sylvain Bernard,, Nozha Boujemaa, David Vitale,
More informationAdaptive Fingerprint Binarization by Frequency Domain Analysis
Adaptive Fingerprint Binarization by Frequency Domain Analysis Josef Ström Bartůněk, Mikael Nilsson, Jörgen Nordberg, Ingvar Claesson Department of Signal Processing, School of Engineering, Blekinge Institute
More informationCHAPTER 4 MINUTIAE EXTRACTION
67 CHAPTER 4 MINUTIAE EXTRACTION Identifying an individual is precisely based on her or his unique physiological attributes such as fingerprints, face, retina and iris or behavioral attributes such as
More informationOn-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor
On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International
More informationDesigning and Implementation of an Efficient Fingerprint Recognition System Using Minutia Feature and KNN Classifier
Designing and Implementation of an Efficient Fingerprint System Using Minutia Feature and KNN Classifier Mayank Tripathy #1, Deepak Shrivastava *2 #1 M. Tech Scholar, Dept. of CSE, Disha Institute of Management
More informationAbstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.
An Approach To Extract Minutiae Points From Enhanced Fingerprint Image Annu Saini Apaji Institute of Mathematics & Applied Computer Technology Department of computer Science and Electronics, Banasthali
More informationFingerprint Recognition using Minutiae Extraction
Fingerprint Recognition using Minutiae Extraction Krishna Kumar 1, Basant Kumar 2, Dharmendra Kumar 3 and Rachna Shah 4 1 M.Tech (Student), Motilal Nehru NIT Allahabad, India, krishnanitald@gmail.com 2
More informationSegmentation of Fingerprint Images
Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands
More informationLearning ngerprint minutiae location and type
Pattern Recognition 36 (3) 1847 1857 www.elsevier.com/locate/patcog Learning ngerprint minutiae location and type Salil Prabhakar a;, Anil K. Jain b, Sharath Pankanti c a Digital Persona Inc., 805 Veterans
More informationFinger print Recognization. By M R Rahul Raj K Muralidhar A Papi Reddy
Finger print Recognization By M R Rahul Raj K Muralidhar A Papi Reddy Introduction Finger print recognization system is under biometric application used to increase the user security. Generally the biometric
More informationInformation hiding in fingerprint image
Information hiding in fingerprint image Abstract Prof. Dr. Tawfiq A. Al-Asadi a, MSC. Student Ali Abdul Azzez Mohammad Baker b a Information Technology collage, Babylon University b Department of computer
More informationBiometrics and Fingerprint Authentication Technical White Paper
Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical
More informationIris Recognition using Histogram Analysis
Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition
More informationAn Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi
An Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi Department of E&TC Engineering,PVPIT,Bavdhan,Pune ABSTRACT: In the last decades vehicle license plate recognition systems
More informationFingerprint Feature Extraction Dileep Sharma (Assistant Professor) Electronics and communication Eternal University Baru Sahib, HP India
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Shaifali Dogra
More informationA Novel Region Based Liveness Detection Approach for Fingerprint Scanners
A Novel Region Based Liveness Detection Approach for Fingerprint Scanners Brian DeCann, Bozhao Tan, and Stephanie Schuckers Clarkson University, Potsdam, NY 13699 USA {decannbm,tanb,sschucke}@clarkson.edu
More informationAutomatic Licenses Plate Recognition System
Automatic Licenses Plate Recognition System Garima R. Yadav Dept. of Electronics & Comm. Engineering Marathwada Institute of Technology, Aurangabad (Maharashtra), India yadavgarima08@gmail.com Prof. H.K.
More information3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India
Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,
More informationSegmentation of Fingerprint Images Using Linear Classifier
EURASIP Journal on Applied Signal Processing 24:4, 48 494 c 24 Hindawi Publishing Corporation Segmentation of Fingerprint Images Using Linear Classifier Xinjian Chen Intelligent Bioinformatics Systems
More informationZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION
ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION What are Finger Veins? Veins are blood vessels which present throughout the body as tubes that carry blood back to the heart. As its name implies,
More informationIris Recognition using Hamming Distance and Fragile Bit Distance
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik
More informationFingerprint Combination for Privacy Protection
Fingerprint Combination for Privacy Protection Mr. Bharat V Warude, Prof. S.K.Bhatia ME Student, Assistant Professor Department of Electronics and Telecommunication JSPM s ICOER, Wagholi, Pune India Abstract
More informationEdge Histogram Descriptor for Finger Vein Recognition
Edge Histogram Descriptor for Finger Vein Recognition Yu Lu 1, Sook Yoon 2, Daegyu Hwang 1, and Dong Sun Park 2 1 Division of Electronic and Information Engineering, Chonbuk National University, Jeonju,
More informationDistinguishing Identical Twins by Face Recognition
Distinguishing Identical Twins by Face Recognition P. Jonathon Phillips, Patrick J. Flynn, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick J. Grother, George W. Quinn, and Matthew Pruitt Abstract The
More informationFingerprint Image Enhancement via Raised Cosine Filtering
Fingerprint Image Enhancement via Raised Cosine Filtering Shing Chyi Chua 1a, Eng Kiong Wong 2, Alan Wee Chiat Tan 3 1,2,3 Faculty of Engineering and Technology, Multimedia University, Melaka, Malaysia.
More informationInternational Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ISSN
International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 289 Fingerprint Minutiae Extraction and Orientation Detection using ROI (Region of interest) for fingerprint
More informationA Study of Distortion Effects on Fingerprint Matching
A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department
More informationCard IEEE Symposium Series on Computational Intelligence
2015 IEEE Symposium Series on Computational Intelligence Cynthia Sthembile Mlambo Council for Scientific and Industrial Research Information Security Pretoria, South Africa smlambo@csir.co.za Distortion
More informationLicense Plate Localisation based on Morphological Operations
License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract
More informationCombined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 9 (September 2014), PP.57-68 Combined Approach for Face Detection, Eye
More informationImage Compression Algorithms for Fingerprint System Preeti Pathak CSE Department, Faculty of Engineering, JBKP, Faridabad, Haryana,121001, India
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 9, May 2010 45 Image Compression Algorithms for Fingerprint System Preeti Pathak CSE Department, Faculty of Engineering, JBKP,
More informationFeature Extraction of Human Lip Prints
Journal of Current Computer Science and Technology Vol. 2 Issue 1 [2012] 01-08 Corresponding Author: Samir Kumar Bandyopadhyay, Department of Computer Science, Calcutta University, India. Email: skb1@vsnl.com
More informationComparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners
Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,
More informationIntelligent Identification System Research
2016 International Conference on Manufacturing Construction and Energy Engineering (MCEE) ISBN: 978-1-60595-374-8 Intelligent Identification System Research Zi-Min Wang and Bai-Qing He Abstract: From the
More informationPreprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition
Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad Road, Rajkot Gujarat, India C. K. Kumbharana,
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Conf. on Biometrics: Theory, Applications and Systems, BTAS, Washington DC, USA, 27-29 Sept., 27. Citation
More informationAutomatic Crack Detection on Pressed panels using camera image Processing
8th European Workshop On Structural Health Monitoring (EWSHM 2016), 5-8 July 2016, Spain, Bilbao www.ndt.net/app.ewshm2016 Automatic Crack Detection on Pressed panels using camera image Processing More
More informationFingerprint Biometrics via Low-cost Sensors and Webcams
Fingerprint Biometrics via Low-cost Sensors and Webcams Vincenzo Piuri, Fellow, IEEE, Fabio Scotti, Member, IEEE Abstract The diffusion of mobile cameras and webcams is rapidly growing. Unfortunately,
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationNOVEL APPROACH OF ACCURATE IRIS LOCALISATION FORM HIGH RESOLUTION EYE IMAGES SUITABLE FOR FAKE IRIS DETECTION
International Journal of Information Technology and Knowledge Management July-December 2010, Volume 3, No. 2, pp. 685-690 NOVEL APPROACH OF ACCURATE IRIS LOCALISATION FORM HIGH RESOLUTION EYE IMAGES SUITABLE
More informationBiometrics Technology: Finger Prints
References: Biometrics Technology: Finger Prints [FP1] L. Hong, Y. Wan and A.K. Jain, "Fingerprint Image Enhancement: Algorithms and Performance Evaluation", IEEE Trans. on PAMI, Vol. 20, No. 8, pp.777-789,
More informationA Generative Model for Fingerprint Minutiae
A Generative Model for Fingerprint Minutiae Qijun Zhao, Yi Zhang Sichuan University {qjzhao, yi.zhang}@scu.edu.cn Anil K. Jain Michigan State University jain@cse.msu.edu Nicholas G. Paulter Jr., Melissa
More informationDetection of License Plates of Vehicles
13 W. K. I. L Wanniarachchi 1, D. U. J. Sonnadara 2 and M. K. Jayananda 2 1 Faculty of Science and Technology, Uva Wellassa University, Sri Lanka 2 Department of Physics, University of Colombo, Sri Lanka
More informationPHASE PRESERVING DENOISING AND BINARIZATION OF ANCIENT DOCUMENT IMAGE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 7, July 2015, pg.16
More informationQuantitative Assessment of the Individuality of Friction Ridge Patterns
Quantitative Assessment of the Individuality of Friction Ridge Patterns Sargur N. Srihari with H. Srinivasan, G. Fang, P. Phatak, V. Krishnaswamy Department of Computer Science and Engineering University
More informationExperiments with An Improved Iris Segmentation Algorithm
Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.
More informationVein and Fingerprint Identification Multi Biometric System: A Novel Approach
Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor
More informationACCURACY FINGERPRINT MATCHING FOR ALTERED FINGERPRINT USING DIVIDE AND CONQUER AND MINUTIAE MATCHING MECHANISM
ACCURACY FINGERPRINT MATCHING FOR ALTERED FINGERPRINT USING DIVIDE AND CONQUER AND MINUTIAE MATCHING MECHANISM A. Vinoth 1 and S. Saravanakumar 2 1 Department of Computer Science, Bharathiar University,
More informationAutomatics Vehicle License Plate Recognition using MATLAB
Automatics Vehicle License Plate Recognition using MATLAB Alhamzawi Hussein Ali mezher Faculty of Informatics/University of Debrecen Kassai ut 26, 4028 Debrecen, Hungary. Abstract - The objective of this
More informationKeyword: Morphological operation, template matching, license plate localization, character recognition.
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automatic
More informationIris Segmentation & Recognition in Unconstrained Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT
More informationhttp://www.diva-portal.org This is the published version of a paper presented at SAI Annual Conference on Areas of Intelligent Systems and Artificial Intelligence and their Applications to the Real World
More informationAn Improved Binarization Method for Degraded Document Seema Pardhi 1, Dr. G. U. Kharat 2
An Improved Binarization Method for Degraded Document Seema Pardhi 1, Dr. G. U. Kharat 2 1, Student, SPCOE, Department of E&TC Engineering, Dumbarwadi, Otur 2, Professor, SPCOE, Department of E&TC Engineering,
More informationOn The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems
On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge
More informationNumber Plate Recognition System using OCR for Automatic Toll Collection
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Number Plate Recognition System using OCR for Automatic Toll Collection Mohini S.Karande
More informationboth background modeling and foreground classification
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 21, NO. 3, MARCH 2011 365 Mixture of Gaussians-Based Background Subtraction for Bayer-Pattern Image Sequences Jae Kyu Suhr, Student
More informationAutomatic Locating the Centromere on Human Chromosome Pictures
Automatic Locating the Centromere on Human Chromosome Pictures M. Moradi Electrical and Computer Engineering Department, Faculty of Engineering, University of Tehran, Tehran, Iran moradi@iranbme.net S.
More informationENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION
ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,
More informationStudy and Analysis of various preprocessing approaches to enhance Offline Handwritten Gujarati Numerals for feature extraction
International Journal of Scientific and Research Publications, Volume 4, Issue 7, July 2014 1 Study and Analysis of various preprocessing approaches to enhance Offline Handwritten Gujarati Numerals for
More informationAn Improved Bernsen Algorithm Approaches For License Plate Recognition
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 78-834, ISBN: 78-8735. Volume 3, Issue 4 (Sep-Oct. 01), PP 01-05 An Improved Bernsen Algorithm Approaches For License Plate Recognition
More information3D Face Recognition System in Time Critical Security Applications
Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications
More informationA Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation
Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition
More informationIris Recognition based on Local Mean Decomposition
Appl. Math. Inf. Sci. 8, No. 1L, 217-222 (2014) 217 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/081l27 Iris Recognition based on Local Mean Decomposition
More informationANALYSIS OF PARTIAL IRIS RECOGNITION
ANALYSIS OF PARTIAL IRIS RECOGNITION Yingzi Du, Robert Ives, Bradford Bonney, Delores Etter Electrical Engineering Department, U.S. Naval Academy, Annapolis, MD, USA 21402 ABSTRACT In this paper, we investigate
More informationBiometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics
CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used
More informationFeature Level Two Dimensional Arrays Based Fusion in the Personal Authentication system using Physiological Biometric traits
1 Biological and Applied Sciences Vol.59: e16161074, January-December 2016 http://dx.doi.org/10.1590/1678-4324-2016161074 ISSN 1678-4324 Online Edition BRAZILIAN ARCHIVES OF BIOLOGY AND TECHNOLOGY A N
More informationIRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area
More informationRecursive Text Segmentation for Color Images for Indonesian Automated Document Reader
Recursive Text Segmentation for Color Images for Indonesian Automated Document Reader Teresa Vania Tjahja 1, Anto Satriyo Nugroho #2, Nur Aziza Azis #, Rose Maulidiyatul Hikmah #, James Purnama Faculty
More informationFeature Extraction Technique Based On Circular Strip for Palmprint Recognition
Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam
More informationSoftware Development Kit to Verify Quality Iris Images
Software Development Kit to Verify Quality Iris Images Isaac Mateos, Gualberto Aguilar, Gina Gallegos Sección de Estudios de Posgrado e Investigación Culhuacan, Instituto Politécnico Nacional, México D.F.,
More informationAn Analysis of Image Denoising and Restoration of Handwritten Degraded Document Images
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationEFFICIENT CONTRAST ENHANCEMENT USING GAMMA CORRECTION WITH MULTILEVEL THRESHOLDING AND PROBABILITY BASED ENTROPY
EFFICIENT CONTRAST ENHANCEMENT USING GAMMA CORRECTION WITH MULTILEVEL THRESHOLDING AND PROBABILITY BASED ENTROPY S.Gayathri 1, N.Mohanapriya 2, B.Kalaavathi 3 1 PG student, Computer Science and Engineering,
More informationBiometric Authentication Using Fast Correlation of Near Infrared Hand Vein Patterns
Biometric Authentication Using Fast Correlation of Near Infrared Hand Vein Patterns Mohamed Shahin, Ahmed Badawi, and Mohamed Kamel Abstract This paper presents a hand vein authentication system using
More informationHand Vein Biometric Verification Prototype: A Testing Performance and Patterns Similarity
Hand Vein Biometric Verification Prototype: A Testing Performance and Patterns Similarity Ahmed M. Badawi Biomedical Engineering Department University of Tennessee, Knoxville, TN, USA Abstract - The shape
More informationDemosaicing Algorithm for Color Filter Arrays Based on SVMs
www.ijcsi.org 212 Demosaicing Algorithm for Color Filter Arrays Based on SVMs Xiao-fen JIA, Bai-ting Zhao School of Electrical and Information Engineering, Anhui University of Science & Technology Huainan
More informationMalaysian Car Number Plate Detection System Based on Template Matching and Colour Information
Malaysian Car Number Plate Detection System Based on Template Matching and Colour Information Mohd Firdaus Zakaria, Shahrel A. Suandi Intelligent Biometric Group, School of Electrical and Electronics Engineering,
More informationCoE4TN4 Image Processing. Chapter 3: Intensity Transformation and Spatial Filtering
CoE4TN4 Image Processing Chapter 3: Intensity Transformation and Spatial Filtering Image Enhancement Enhancement techniques: to process an image so that the result is more suitable than the original image
More informationBiometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More informationIdentification of Fake Currency Based on HSV Feature Extraction of Currency Note
Identification of Fake Currency Based on HSV Feature Extraction of Currency Note Neetu 1, Kiran Narang 2 1 Department of Computer Science Hindu College of Engineering (HCE), Deenbandhu Chhotu Ram University
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha
More informationA new seal verification for Chinese color seal
Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558
More informationCOLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee
COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES Do-Guk Kim, Heung-Kyu Lee Graduate School of Information Security, KAIST Department of Computer Science, KAIST ABSTRACT Due to the
More informationTraffic Sign Recognition Senior Project Final Report
Traffic Sign Recognition Senior Project Final Report Jacob Carlson and Sean St. Onge Advisor: Dr. Thomas L. Stewart Bradley University May 12th, 2008 Abstract - Image processing has a wide range of real-world
More informationResearch on Friction Ridge Pattern Analysis
Research on Friction Ridge Pattern Analysis Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York Research Supported by National Institute
More informationImage Measurement of Roller Chain Board Based on CCD Qingmin Liu 1,a, Zhikui Liu 1,b, Qionghong Lei 2,c and Kui Zhang 1,d
Applied Mechanics and Materials Online: 2010-11-11 ISSN: 1662-7482, Vols. 37-38, pp 513-516 doi:10.4028/www.scientific.net/amm.37-38.513 2010 Trans Tech Publications, Switzerland Image Measurement of Roller
More informationReal Time Word to Picture Translation for Chinese Restaurant Menus
Real Time Word to Picture Translation for Chinese Restaurant Menus Michelle Jin, Ling Xiao Wang, Boyang Zhang Email: mzjin12, lx2wang, boyangz @stanford.edu EE268 Project Report, Spring 2014 Abstract--We
More informationAutomatic Morphological Segmentation and Region Growing Method of Diagnosing Medical Images
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 3 (2012), pp. 173-180 International Research Publications House http://www. irphouse.com Automatic Morphological
More informationMethod for Real Time Text Extraction of Digital Manga Comic
Method for Real Time Text Extraction of Digital Manga Comic Kohei Arai Information Science Department Saga University Saga, 840-0027, Japan Herman Tolle Software Engineering Department Brawijaya University
More informationThe 2019 Biometric Technology Rally
DHS SCIENCE AND TECHNOLOGY The 2019 Biometric Technology Rally Kickoff Webinar, November 5, 2018 Arun Vemury -- DHS S&T Jake Hasselgren, John Howard, and Yevgeniy Sirotin -- The Maryland Test Facility
More informationMULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE
MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,
More informationFLUORESCENCE MAGNETIC PARTICLE FLAW DETECTING SYSTEM BASED ON LOW LIGHT LEVEL CCD
FLUORESCENCE MAGNETIC PARTICLE FLAW DETECTING SYSTEM BASED ON LOW LIGHT LEVEL CCD Jingrong Zhao 1, Yang Mi 2, Ke Wang 1, Yukuan Ma 1 and Jingqiu Yang 3 1 College of Communication Engineering, Jilin University,
More informationRecovery of badly degraded Document images using Binarization Technique
International Journal of Scientific and Research Publications, Volume 4, Issue 5, May 2014 1 Recovery of badly degraded Document images using Binarization Technique Prof. S. P. Godse, Samadhan Nimbhore,
More informationVEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL
VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh Palani (1000660520) prasannaven.palani@mavs.uta.edu
More informationThe Hand Gesture Recognition System Using Depth Camera
The Hand Gesture Recognition System Using Depth Camera Ahn,Yang-Keun VR/AR Research Center Korea Electronics Technology Institute Seoul, Republic of Korea e-mail: ykahn@keti.re.kr Park,Young-Choong VR/AR
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Intl. Conf. on Control, Automation, Robotics and Vision, ICARCV, Special Session on Biometrics, Singapore,
More information