Presentation Attack Detection Algorithms for Finger Vein Biometrics: A Comprehensive Study
|
|
- Elijah Porter
- 6 years ago
- Views:
Transcription
1 215 11th International Conference on Signal-Image Technology & Internet-Based Systems Presentation Attack Detection Algorithms for Finger Vein Biometrics: A Comprehensive Study R. Raghavendra Christoph Busch Norwegian Biometrics Laboratory Gjøvik University College Gjøvik, Norway raghavendra.ramachandra, hig.no Abstract Finger vein biometric systems have shown a vulnerability to presentation attacks (or direct attack or spoof attack). The presentation attacks have raised crucial security issues for finger vein biometric systems mainly due to the widespread application of these biometric sensors in the financial sector. In this paper, we present a novel algorithm to detected the presentation attack on a finger vein recognition system. The proposed method relies on the texture analysis using steerable pyramids, and the final decision is carried out by classifying the textures features using a Support Vector Machines (SVM). Furthermore, we have also introduced a new kind of attack by using a smartphone display for the first time. Extensive experiments are carried out on a large scale database of 3 unique finger veins collected from 1 subjects. We introduce a new finger vein artefact database collected using three different kinds of artefacts namely: (1) ink jet print (2) laser jet print and (3) smartphone display. An extensive comparison of the proposed scheme with ten different Presentation Attack Detection (PAD) methods demonstrated the efficacy of the proposed scheme. I. INTRODUCTION Biometric technology has emerged as an alternative security access control method when compared with a traditional access control mechanism using a password, pin code or smart card. Biometrics is widely used to identify or recognise the person of interest based on their physical and behaviour characteristics. Since biometric systems can verify the person based on what he/she has the user of the biometric system is exempted from remembering the complex passwords or the access cards for various security application. Similar to any other security systems, biometric systems are also vulnerable to various attacks that can be broadly classified into two types [3]: (1) Direct attack: That involves presenting a biometric artefact directly to the sensor. (2) Indirect attack: That involves attacking the biometric system components through a Trojan horse or another kind of malware and virus. Direct attacks on biometric systems are of higher interest, as the attacker needs no specific knowledge of the biometric system under attack. which is relevant for the assessment of the attack potential for instance in a security evaluation. Among the various biometrics modalities, the finger vein modality has rapidly gained popularity because of its high accuracy, reliability, user convince, permanence and difficulty to spoof the sensor. Moreover unlike for fingerprints data subjects can not leave latent analog Figure 1: Example of finger vein artefact captured using smartphone (a) Real image from a normal presentation (b) Artefact image from an attack presentation samples unintentionally. For this reason, the finger vein biometrics are widely used in the financial sector especially in banking applications in many countries [9]. As the popularity of the finger vein modality increases, the vulnerability of the finger vein biometric systems also increases [6]. Even though the finger vein patterns are not visible to the naked eyes and the risk of latent prints does not exist, it is possible to attack directly the finger vein biometric system in case the finger samples stored in such systems are stolen or compromised. Biometric researchers have successfully demonstrated presentation (or spoofing) attacks on the finger vein recognition sensor using a printed image[12]. In [12], a finger vein artefact database comprised of 1 unique finger vein images from 5 subjects is collected by printing a real finger vein images using the LaserJet printer. The vulnerability analysis presented in [12] indicate a Spoof False Acceptance Rate (SFAR) of 86%. These results strongly indicate the vulnerability of certain finger vein biometric systems for such a direct attack. This motivates researchers to introduce the Presentation Attack Detection (PAD) or spoof detection as a countermeasure technique that can mitigate the attacks and thereby improve the reliability and trustworthiness of the finger vein biometric system. There exist various Presentation Attack Detection (PAD) algorithms for finger vein biometrics. In [5], Frequency and Time-Frequency analysis using Fourier and Wavelet Transform to detect the artefact (or fake/spoof) finger vein images were proposed. The artefact finger veins are captured using HP LaserJet printer on three different papers namely normal A4 paper, matte paper and OHP film. Experiments are presented to a small database of 7 subjects that indicates that the use of frequency information can detect the presence of finger vein artefacts. Considering the importance of the finger vein spoofing, the 1st competition was organised in conjunction with /15 $ IEEE DOI 119/SITIS
2 Figure 2: Block diagram of the proposed scheme the International Conference of Biometrics (ICB) 215 [11]. This competition uses the publicly available finger vein artefact database collected from 5 subjects [12]. Three different algorithms were introduced namely[11]: (1) Binarized Statistical Image Features (BSIF) (2) Rieze Transform (3) Local Binary Pattern (LBP), Local Phase Quantitation (LPQ). All these three methods have used the Support Vector Machine (SVM) as a classifier to categorize the presented finger vein object as an artefact (or spoof) or live. Thus, it is noted from the existing schemes that, finger vein PAD is limited only to detect the finger vein artefact generated using a laser printer. In this work, we propose a novel scheme for finger vein PAD using a steerable pyramid as a feature extraction scheme and subsequently a linear Support Vector Machine (SVM) as a classifier. The steerable pyramid uses a bank of steerable pyramids at each level of the pyramid rather than a single Laplacian or Gaussian. As a consequence, the use of steerable pyramids will capture more efficient texture information that can be further processed using Support Vector Machine (SVM) to make the final decision on whether the presented finger vein is real or spoof. We also present a new attack on the finger vein sensor by presenting finger vein images to the sensor using a smartphone (see Figure 1). The following are the main contributions of this paper: (1) Novel scheme for finger vein presentation attack detection using steerable pyramids (2) New attack on finger vein sensor by presenting a finger vein sample using a smartphone (3) New finger vein artefact database with 3 unique finger vein identities generated using three different kinds of artefact generation using (a) laser print (b) Ink jet print (c) smartphone presentation (4) Extensive experiments to evaluate the vulnerability of finger vein sensor to three different kinds of artefacts (5) Comprehensive study on the new finger vein database by comparing the proposed method with ten different presentation attack detection algorithms that are widely used in the biometric community. The rest of the paper is structured as follows: Section II presents the proposed scheme for a reliable finger vein biometric system, Section III presents the finger vein artefact data collection, Section IV presents the experimental results and discussion. Finally, Section V draws the conclusion of this work. II. PROPOSED SCHEME Figure 2 shows the block diagram of the proposed PAD scheme for the finger vein recognition system. The proposed scheme can be structured in two functional subsystems namely: (1) PAD Module (2) Finger vein recognition module. Given the finger vein Image F I,we first perform the Region Of Interest (ROI) extraction. Since our in-house sensor has a dedicated space to place the finger, the ROI extraction is carried out by setting a pre-assigned rectangular area to cover the interesting region of the finger. The obtained ROI finger vein image Fr I is further re-sized to have a dimension of 1 3 pixels before passing it to the PAD module. A. PAD Module This section describes the proposed presentation attack detection module introduced in this work. The proposed PAD module has two main functional blocks namely: (1) Feature extraction using steerable pyramids and (2) Classification using linear Support Vector Machine (SVM). In this work, we explore the applicability of the steerable pyramid features to detect the finger vein artefact. The steerable pyramids are a set of oriented filters in which a filter of arbitrary orientation is synthesised as a linear combination of a set basis function [1]. Thus, the use of steerable pyramids allows one to calculate the filter response at different orientations. Furthermore, the steerable pyramids exhibit the property of both rotation and translation invariance. Our motivation in using steerable pyramids for finger vein artefact detection (or spoof detection) is motivated by the fact that they have demonstrated prominently in extracting the texture features from the image. Thus, the texture features extracted using steerable filter are useful in identifying the presence of dot patterns in the case of laser print artefact or in identifying the glare patterns in case of inkjet print artefact or in identifying the additional frequency components in case of smartphone display attack. Given the ROI of the finger vein image Fr I the corresponding steerable pyramid decomposition is defined as: SF mn (x, y) = x F r (x, y)d mn (x x1,y y1) (1) y
3 where, D mn denotes the directional bandpass filters at stage m =, 1, 2,..., S 1, and orientation n =, 1, 2,...,K 1. In this work, we consider only the residual highfrequency band from the steerable pyramid for the features selection process. Figure 3 shows the visual illustration of the residual high-frequency features obtained using steerable pyramids on both real and different kinds of artefact finger vein images. We then employ the linear SVM classifier to determine whether the captured sample belongs to the real (i.e. normal presentation) or artefact (i.e. attack presentation) category. The SVM classifier is first trained using a set of positive (real finger vein) and negative (finger vein artefact) samples according to the protocol described in the Section IV-A. B. Finger vein verification The Finger vein verification system (or baseline system) employed in this work is based on the Maximum Curvature Points (MCP) [4] as a feature extraction method and correlation as a comparator. This choice is made by considering the high performance and few computation characteristics exhibited by the MCP method [7]. III. FINGER VEIN ARTEFACT DATABASE COLLECTION In this section, we discuss the newly collected finger vein artefact database using our in-house finger vein sensor [8] [1]. Our database is comprised of 1 subjects for which we capture the finger vein from four different fingers namely right index, right middle, left index and left middle. However, some of the subjects were not able to provide all four fingers due to various reasons. Thus, the collected database has 3 unique finger vein instances that correspond to 1 subjects. The collected data is dived into two groups namely: (1) Real finger vein capture and (2) Artefact finger vein capture. The real finger vein capture attempts are considered to be normal presentations and were carried out in two sessions to obtain two images respectively. In the case of the artefact finger vein capture attempts, which are considered as attack presentations, we have used the real finger vein captures in the second session to generate various artefacts. The finger vein artefacts are generated using three different kinds of techniques namely: (1) Artefact 1: This artefact is generated by printing the real finger vein image using an ink jet (HP Photo smart 552) printer on highquality glossary paper. (2) Artefact 2: This artefact is generated by printing the real finger vein images on normal quality paper using a laserjet printer. (3) Artefact 3: This artefact is generated by presenting the real finger vein sample using the smartphone. For this purpose the real finger vein image is loaded to the Samsung S5 smartphone and then displayed to the sensor. This attack is introduced on the finger vein modality. However, we have carried out a series of pre-processing operations on the real finger vein images before obtaining the artefacts. Thus, we first perform the pre-processing by extracting the Region of Interest (ROI) and then rescaling the ROI finger vein to have a dimension of 1 3 pixels. We then carry out the contrast enhancement using histogram equalisation to improve the contrast of the real image before obtaining the corresponding artefact. Figure 3 shows the examples of the real and corresponding artefact images. IV. EXPERIMENTAL RESULTS This section describes the experimental protocols and the experimental results obtained by comparing the proposed scheme with ten different state-of-the-art finger vein presentation attack detection algorithms. A. Performance evaluation protocol For the experiments, each finger is considered as a unique instance and thus in total we have observed 3 unique finger vein instances. We then divided the whole database of 3 unique instances into two independent subsets namely: training and testing set. The training set is comprised of the first 5 unique instances and the testing set is comprised of the remaining 25 instances. The training set is used for multiple purposes in this work that includes (1) To set the threshold value based on the Equal Error Rate (EER%) for vulnerability analysis (2) used as the training set to evaluate the state-of-the-art finger vein PAD algorithms. The testing set is solely used to evaluate the performance of the proposed as well as state-of-the-art finger vein PAD schemes. B. Results and discussion We first present the vulnerability study on our in-house finger vein sensor to three different kinds of finger vein print artefacts. The main goal of this vulnerability study is to obtain the Spoof False Acceptance Rate (SFAR%) that indicates the applicability of the artefact samples collected in our work to spoof the sensor. To this extent, we consider the baseline finger vein recognition system that operates in two modes namely: normal mode and attack mode to obtain the comparison scores. In the normal mode, we have used the real finger vein image collected from the first session as the reference and we have used real finger vein image collected in the second session as a probe. For the attack mode, we have used an artefact finger vein image that is generated using the real finger vein image used as the probe in the normal mode. Since we have generated three different artefacts in this work, we use one artefact at a time in the attack mode of the finger vein system.note that, in the attack mode, the reference image corresponds to the real finger vein image captured in session 1 and the probe image corresponds to the artefact image. The only difference in the operation of the attack mode is the use of artefact finger vein as a probe and then to measure the SFAR to measure the vulnerability of the finger vein sensor to the generated artefact. Figure 4 shows the comparison score distribution obtained using the finger vein baseline system when both real and artefact samples were used as the probe. Figure 4 (a) shows the distribution of genuine scores (in green color), zero effort impostor score (in blue color) and artefact (or spoof) scores (in pink color). The black vertical line in 6363
4 Figure 3: Illustration of residual high frequency features on (a) Real finger vein image (b) Artefact 1 (Ink jet print artefact) (c) Artefact 2 (Laser jet print ) (3) Artefact 3 (smartphone display) Zero Effort Imposter Scores Artefact 1 scores Threshold obtained on Development Database Zero-Effort Imposter Scores Artefact 2 Scores Threshold obtained on development dataset Zero-effort Impooster Scores Artefact 3 Scores Threshold obtained on development dataset Figure 4: Comparison score distributions of finger vein baseline system (a) with Artefact 1 (b) with Artefact 2 (c) with Artefact 3 Figure 4 (a) indicates the threshold value obtained on the training dataset that corresponds to the EER value of the baseline finger vein system operating in the normal mode (i.e. with real presentations). It can be noticed from the Figure 4 (a) that, the comparison scores obtained using artefacts will lie between genuine and zero effort impostor scores. Thus, with this threshold value more than 78% (SFAR) of the artefact 1 samples are accepted as the real presentation. A similar observation is also noted with Figure 4 (b) on artefact 2 that shows an SFAR of 76.4% and from Figure 4 (c) on artefact 3 indicating a SFAR of 1%. Thus, based on the high SFAR obtained from the vulnerability analysis, it is clear that the finger vein systems can be spoofed (or attacked) with the artefacts presented in this study. Table I: Performance results for the proposed PAD algorithm on the Artefact 1 Ensemble of BSIF SVM GLCM-SVM LBP(3X3) u2 SVM LPQ SVM LBP Variance SVM D FFT SVM D Cepstrum SVM Local Entropy Map SVM Quality based Techniques Block-wise Sharpness - SVM Block-wise standard deviation - SVM Proposed Method Steerable Pyramids - SVM Table I - Table III indicates the quantitative performance of the proposed scheme on three different artefacts. Further, we also present the comprehensive comparison by comparing the proposed method with ten different presentation attack detection algorithms that are widely used in the biometric community. The quantitative performance of the presentation attack detection algorithms are presented according to the metric developed in ISO/IEC [2] in terms of: (1) Attack Presentation Classification Error Rate (APCER), which is defined as a proportion of attack presentation incorrectly classified as normal (or real) presentation (2) Normal Presentation Classification Error Rate (NPCER) which is defined as proportion of normal presentation incorrectly classified as attack presentation. Finally, the performance of the overall PAD algorithm is presented in terms of Average Classification Error (AP CER+NPCER) 2 Rate (ACER) such that, ACER = the lower the values of ACER, the better is the PAD performance. Table II: Performance results for the proposed PAD algorithm on the Artefact 2 Ensemble of BSIF SVM GLCM-SVM LBP(3X3) u2 SVM LPQ SVM LBP Variance SVM D FFT SVM D Cepstrum SVM Local Entropy Map SVM Quality based Techniques Block-wise Sharpness - SVM Block-wise standard deviation - SVM Proposed Method Steerable Pyramids - SVM
5 Table I presents the performance of the proposed scheme on artefact 1 samples. It can be observed that the proposed scheme has demonstrated the best performance with the lowest ACER of 3.6% while the second best performance is noted with the LPQ-SVM with an ACER of 6.8%. Table II indicate the quantitative performance of the proposed scheme on artefact 2 samples. Here also it can be observed that the proposed method have emerged as the best method with the lowest ACER of 3%. A similar observation is noted with the artefact 3 as indicated in the Table III in which the proposed scheme has demonstrated the best performance with ACER of 2.4%. Thus based on the obtained results obtained the proposed method is emerged as the best PAD scheme for finger vein biometric systems. Table III: Performance results for the proposed PAD algorithm on the Artefact 3 Ensemble of BSIF SVM GLCM-SVM LBP(3X3) u2 SVM LPQ SVM LBP Variance SVM D FFT SVM D Cepstrum SVM Local Entropy Map SVM Quality based Techniques Block-wise Sharpness - SVM Block-wise standard deviation - SVM Proposed Method Steerable Pyramids - SVM V. CONCLUSION The goal of the PAD algorithm research is to improve the reliability of a finger vein biometric system by automatically detecting and mitigating the direct attacks. In this work, we present a novel algorithm based on the steerable pyramid and SVM. The proposed PAD algorithm was evaluated on three different kinds of finger vein artefact samples that shows the consistent high performance in detecting the finger vein artefact. A comparative evaluation is presented by evaluating the performance of the proposed method with ten different PAD algorithms used widely in biometric spoof detection. The experimental results demonstrate the efficacy of the proposed scheme with the lowest ACER of 3.6% on artefact 1, 3.% on artefact 2 and 2.4% on artefact 3. [3] S. Marcel, M. S. Nixon, and S. Z. Li. Handbook of Biometric Anti-Spoofing: Trusted Biometrics Under Spoofing Attacks. Springer Publishing Company, Incorporated, 214. [4] N. Miura, A. Nagasaka, and T. Miyatake. Extraction of finger-vein patterns using maximum curvature points in image profiles. IEICE Transactions on Information and Systems, 9(8): , 27. [5] D. T. Nguyen, Y. H. Park, K. Y. Shin, S. Y. Kwon, H. C. Lee, and K. R. Park. Fake finger-vein image detection based on fourier and wavelet transforms. Digital Signal Processing, 23(5): , 213. [6] R. Raghavendra, M. Avinas, C. Busch, and S. Marcel. Finger vein liveness detection using motion magnification. In IEEE International Conference on Biometrics: Theory, Applications and Systems, Sept [7] R. Raghavendra, K. Raja, J. Surbiryala, and C. Busch. Finger vascular pattern imaging; a comprehensive evaluation. In Asia-Pacific Signal and Information Processing Association, 214 Annual Summit and Conference (APSIPA), pages 1 5, Dec 214. [8] R. Raghavendra, K. B. Raja, J. Surbiryala, and C. Busch. A low-cost multimodal biometric sensor to capture finger vein and fingerprint. In International Joint Conference on Biometrics (IJCB), pages 1 7, Sep 214. [9] R. Raghavendra, J. Surbiryala, and C. Busch. An efficient finger vein indexing scheme based on unsupervised clustering. In 1st IEEE International Conference on Identity, Security and Behaviour Analysis (ISBA 215). IEEE, 215. [1] R. Raghavendra, J. Surbiryala, K. B. Raja, and C. Busch. Novel finger vascular pattern imaging device for robust biometric verification. In Imaging Systems and Techniques (IST), 214 IEEE International Conference on, pages IEEE, 214. [11] P. Tome, R. Raghavendra, C. Busch, S. Tirunagari, N. Poh, B. H. Shekar, D. Gragnaniello, C. Sansone, L. Verdoliva, and S. Marcel. The 1st competition on counter measures to finger vein spoofing attacks. In The 8th IAPR International Conference on Biometrics (ICB), May 215. [12] P. Tome, M. Vanoni, and S. Marcel. On the vulnerability of finger vein recognition to spoofing. In International Conference of the Biometrics Special Interest Group (BIOSIG), pages 1 1, Sept 214. VI. ACKNOWLEDGMENT This work is funded by the EU 7th Framework Program (FP7/27-213) under grant agreement n o for the large-scale integrated project FIDELITY. REFERENCES [1] W. T. Freeman and E. H. Adelson. The design and use of steerable filters. IEEE Transactions on Pattern Analysis & Machine Intelligence, (9):891 96, [2] ISO/IEC JTC1 SC37 Biometrics. ISO/IEC WD 317-3:214 Information Technology - presentation attack detection - Part 3: testing and reporting and classification of attacks. International Organization for Standardization,
Face Presentation Attack Detection by Exploring Spectral Signatures
Face Presentation Attack Detection by Exploring Spectral Signatures R. Raghavendra, Kiran B. Raja, Sushma Venkatesh, Christoph Busch Norwegian Biometrics Laboratory, NTNU - Gjøvik, Norway {raghavendra.ramachandra;
More informationA New Fake Iris Detection Method
A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn
More informationEmpirical Evaluation of Visible Spectrum Iris versus Periocular Recognition in Unconstrained Scenario on Smartphones
Empirical Evaluation of Visible Spectrum Iris versus Periocular Recognition in Unconstrained Scenario on Smartphones Kiran B. Raja * R. Raghavendra * Christoph Busch * * Norwegian Biometric Laboratory,
More informationPresentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey
Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey RAGHAVENDRA RAMACHANDRA and CHRISTOPH BUSCH, Norwegian Biometric Laboratory, Norwegian University of Science and
More informationA Novel Image Fusion Scheme For Robust Multiple Face Recognition With Light-field Camera
A Novel Image Fusion Scheme For Robust Multiple Face Recognition With Light-field Camera R. Raghavendra Kiran B Raja Bian Yang Christoph Busch Norwegian Biometric Laboratory, Gjøvik University College,
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationBiometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More informationAn Enhanced Biometric System for Personal Authentication
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 6, Issue 3 (May. - Jun. 2013), PP 63-69 An Enhanced Biometric System for Personal Authentication
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationEvaluation of Biometric Systems. Christophe Rosenberger
Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC
More informationAPPENDIX 1 TEXTURE IMAGE DATABASES
167 APPENDIX 1 TEXTURE IMAGE DATABASES A 1.1 BRODATZ DATABASE The Brodatz's photo album is a well-known benchmark database for evaluating texture recognition algorithms. It contains 111 different texture
More informationCOLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee
COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES Do-Guk Kim, Heung-Kyu Lee Graduate School of Information Security, KAIST Department of Computer Science, KAIST ABSTRACT Due to the
More informationTitle Goes Here Algorithms for Biometric Authentication
Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing
More informationImpact of Out-of-focus Blur on Face Recognition Performance Based on Modular Transfer Function
Impact of Out-of-focus Blur on Face Recognition Performance Based on Modular Transfer Function Fang Hua 1, Peter Johnson 1, Nadezhda Sazonova 2, Paulo Lopez-Meyer 2, Stephanie Schuckers 1 1 ECE Department,
More informationOUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS
1 OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS RESULTS OF PRACTICAL EXPERIMENTS CONCLUSION 2 ABSTRACT IDENTITY VERIFICATION
More informationAn Efficient Color Image Segmentation using Edge Detection and Thresholding Methods
19 An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods T.Arunachalam* Post Graduate Student, P.G. Dept. of Computer Science, Govt Arts College, Melur - 625 106 Email-Arunac682@gmail.com
More informationProcessing and Enhancement of Palm Vein Image in Vein Pattern Recognition System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
More informationZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION
ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION What are Finger Veins? Veins are blood vessels which present throughout the body as tubes that carry blood back to the heart. As its name implies,
More informationPalm Vein Recognition System using Directional Coding and Back-propagation Neural Network
, October 21-23, 2015, San Francisco, USA Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network Mark Erwin C. Villariña and Noel B. Linsangan, Member, IAENG Abstract
More informationSegmentation of Fingerprint Images
Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands
More informationDirect Attacks Using Fake Images in Iris Verification
Direct Attacks Using Fake Images in Iris Verification Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Fernando Alonso-Fernandez, Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia Biometric Recognition
More informationComputer Vision in Human-Computer Interaction
Invited talk in 2010 Autumn Seminar and Meeting of Pattern Recognition Society of Finland, M/S Baltic Princess, 26.11.2010 Computer Vision in Human-Computer Interaction Matti Pietikäinen Machine Vision
More informationComparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners
Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,
More informationImplementation of Face Spoof Recognization by Using Image Distortion Analysis
Implementation of Face Spoof Recognization by Using Distortion Analysis Priyanka P. Raut 1, Namrata R. Borkar 2, Virendra P. Nikam 3 1ME Student, CSE Department, KGIET, Darapur, M.S., India 2,3 Assistant
More informationStamp detection in scanned documents
Annales UMCS Informatica AI X, 1 (2010) 61-68 DOI: 10.2478/v10065-010-0036-6 Stamp detection in scanned documents Paweł Forczmański Chair of Multimedia Systems, West Pomeranian University of Technology,
More informationNEURALNETWORK BASED CLASSIFICATION OF LASER-DOPPLER FLOWMETRY SIGNALS
NEURALNETWORK BASED CLASSIFICATION OF LASER-DOPPLER FLOWMETRY SIGNALS N. G. Panagiotidis, A. Delopoulos and S. D. Kollias National Technical University of Athens Department of Electrical and Computer Engineering
More informationImage Extraction using Image Mining Technique
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,
More informationLaser Printer Source Forensics for Arbitrary Chinese Characters
Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,
More informationBiometric Signature for Mobile Devices
Chapter 13 Biometric Signature for Mobile Devices Maria Villa and Abhishek Verma CONTENTS 13.1 Biometric Signature Recognition 309 13.2 Introduction 310 13.2.1 How Biometric Signature Works 310 13.2.2
More information3D Face Recognition System in Time Critical Security Applications
Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications
More informationENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION
ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,
More informationRecognition System for Pakistani Paper Currency
World Applied Sciences Journal 28 (12): 2069-2075, 2013 ISSN 1818-4952 IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.28.12.300 Recognition System for Pakistani Paper Currency 1 2 Ahmed Ali and
More informationProposed Method for Off-line Signature Recognition and Verification using Neural Network
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature
More informationMultimodal Face Recognition using Hybrid Correlation Filters
Multimodal Face Recognition using Hybrid Correlation Filters Anamika Dubey, Abhishek Sharma Electrical Engineering Department, Indian Institute of Technology Roorkee, India {ana.iitr, abhisharayiya}@gmail.com
More informationA Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation
Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition
More informationPERFORMANCE TESTING EVALUATION REPORT OF RESULTS
COVER Page 1 / 139 PERFORMANCE TESTING EVALUATION REPORT OF RESULTS Copy No.: 1 CREATED BY: REVIEWED BY: APPROVED BY: Dr. Belen Fernandez Saavedra Dr. Raul Sanchez-Reillo Dr. Raul Sanchez-Reillo Date:
More informationImage Forgery Detection Using Svm Classifier
Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama
More informationLicense Plate Localisation based on Morphological Operations
License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract
More informationContact lens detection in iris images
page 1 Chapter 1 Contact lens detection in iris images Jukka Komulainen, Abdenour Hadid and Matti Pietikäinen Iris texture provides the means for extremely accurate uni-modal person identification. However,
More informationAn Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP)
, pp.13-22 http://dx.doi.org/10.14257/ijmue.2015.10.8.02 An Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP) Anusha Alapati 1 and Dae-Seong Kang 1
More informationFingerprint Segmentation using the Phase of Multiscale Gabor Wavelets
CCV: The 5 th sian Conference on Computer Vision, 3-5 January, Melbourne, ustralia Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets Sylvain Bernard,, Nozha Boujemaa, David Vitale,
More informationImproved SIFT Matching for Image Pairs with a Scale Difference
Improved SIFT Matching for Image Pairs with a Scale Difference Y. Bastanlar, A. Temizel and Y. Yardımcı Informatics Institute, Middle East Technical University, Ankara, 06531, Turkey Published in IET Electronics,
More informationhttp://www.diva-portal.org This is the published version of a paper presented at SAI Annual Conference on Areas of Intelligent Systems and Artificial Intelligence and their Applications to the Real World
More informationIris Recognition using Histogram Analysis
Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition
More informationBiometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics
CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used
More informationPerformance study of Text-independent Speaker identification system using MFCC & IMFCC for Telephone and Microphone Speeches
Performance study of Text-independent Speaker identification system using & I for Telephone and Microphone Speeches Ruchi Chaudhary, National Technical Research Organization Abstract: A state-of-the-art
More informationIMPACT OF SEVERE SIGNAL DEGRADATION ON EAR RECOGNITION PERFORMANCE. A. Pflug, J. Wagner, C. Rathgeb and C. Busch
IMPACT OF SEVERE SIGNAL DEGRADATION ON EAR RECOGNITION PERFORMANCE A. Pflug, J. Wagner, C. Rathgeb and C. Busch da/sec Biometrics and Internet Security Research Group Hochschule Darmstadt, Darmstadt, Germany
More informationVein and Fingerprint Identification Multi Biometric System: A Novel Approach
Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor
More informationOn-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor
On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International
More informationDatabase of Iris Printouts and its Application: Development of Liveness Detection Method for Iris Recognition
Database of Iris Printouts and its Application: Development of Liveness Detection Method for Iris Recognition Adam Czajka, Institute of Control and Computation Engineering Warsaw University of Technology,
More informationAutomation of Fingerprint Recognition Using OCT Fingerprint Images
Journal of Signal and Information Processing, 2012, 3, 117-121 http://dx.doi.org/10.4236/jsip.2012.31015 Published Online February 2012 (http://www.scirp.org/journal/jsip) 117 Automation of Fingerprint
More informationAn Algorithm for Fingerprint Image Postprocessing
An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most
More informationAdaptive Feature Analysis Based SAR Image Classification
I J C T A, 10(9), 2017, pp. 973-977 International Science Press ISSN: 0974-5572 Adaptive Feature Analysis Based SAR Image Classification Debabrata Samanta*, Abul Hasnat** and Mousumi Paul*** ABSTRACT SAR
More informationAuthenticated Document Management System
Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College
More informationAutomatic Aesthetic Photo-Rating System
Automatic Aesthetic Photo-Rating System Chen-Tai Kao chentai@stanford.edu Hsin-Fang Wu hfwu@stanford.edu Yen-Ting Liu eggegg@stanford.edu ABSTRACT Growing prevalence of smartphone makes photography easier
More informationPractical View on Face Presentation Attack Detection
DAMER, DIMITROV: PRACTICAL FACE PRESENTATION ATTACK DETECTION 1 Practical View on Face Presentation Attack Detection Naser Damer naser.damer@igd.fraunhofer.de Kristiyan Dimitrov kristiyan.dimitrov@igd.fraunhofer.de
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationDrum Transcription Based on Independent Subspace Analysis
Report for EE 391 Special Studies and Reports for Electrical Engineering Drum Transcription Based on Independent Subspace Analysis Yinyi Guo Center for Computer Research in Music and Acoustics, Stanford,
More informationTravel Photo Album Summarization based on Aesthetic quality, Interestingness, and Memorableness
Travel Photo Album Summarization based on Aesthetic quality, Interestingness, and Memorableness Jun-Hyuk Kim and Jong-Seok Lee School of Integrated Technology and Yonsei Institute of Convergence Technology
More informationClassification in Image processing: A Survey
Classification in Image processing: A Survey Rashmi R V, Sheela Sridhar Department of computer science and Engineering, B.N.M.I.T, Bangalore-560070 Department of computer science and Engineering, B.N.M.I.T,
More informationRESEARCH PAPER FOR ARBITRARY ORIENTED TEAM TEXT DETECTION IN VIDEO IMAGES USING CONNECTED COMPONENT ANALYSIS
International Journal of Latest Trends in Engineering and Technology Vol.(7)Issue(4), pp.137-141 DOI: http://dx.doi.org/10.21172/1.74.018 e-issn:2278-621x RESEARCH PAPER FOR ARBITRARY ORIENTED TEAM TEXT
More information3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India
Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,
More informationCOMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL
COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL Department of Electronics and Telecommunication, V.V.P. Institute of Engg & Technology,Solapur University Solapur,
More informationA new seal verification for Chinese color seal
Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558
More informationAn Analysis of Image Denoising and Restoration of Handwritten Degraded Document Images
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationStudent Attendance Monitoring System Via Face Detection and Recognition System
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal
More informationCAN NO-REFERENCE IMAGE QUALITY METRICS ASSESS VISIBLE WAVELENGTH IRIS SAMPLE QUALITY?
CAN NO-REFERENCE IMAGE QUALITY METRICS ASSESS VISIBLE WAVELENGTH IRIS SAMPLE QUALITY? Xinwei Liu 1,2,, Marius Pedersen 2, Christophe Charrier 1, and Patrick Bours 2 1 Normandie Univ, UNICAEN, ENSICAEN,
More informationBackground Pixel Classification for Motion Detection in Video Image Sequences
Background Pixel Classification for Motion Detection in Video Image Sequences P. Gil-Jiménez, S. Maldonado-Bascón, R. Gil-Pita, and H. Gómez-Moreno Dpto. de Teoría de la señal y Comunicaciones. Universidad
More informationENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS
ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS Hui Su, Ravi Garg, Adi Hajj-Ahmad, and Min Wu {hsu, ravig, adiha, minwu}@umd.edu University of Maryland, College Park ABSTRACT Electric Network (ENF) based forensic
More informationA TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION. Scott Deeann Chen and Pierre Moulin
A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION Scott Deeann Chen and Pierre Moulin University of Illinois at Urbana-Champaign Department of Electrical and Computer Engineering 5 North Mathews
More informationIntroduction to
Introduction to 2013. 12 1 Contents Company Technologies Products Reference sites 2 Corporate Profile Techsphere: As a leading company in vascular biometric technology in the world, Techsphere s HVPR products
More informationSoftware Development Kit to Verify Quality Iris Images
Software Development Kit to Verify Quality Iris Images Isaac Mateos, Gualberto Aguilar, Gina Gallegos Sección de Estudios de Posgrado e Investigación Culhuacan, Instituto Politécnico Nacional, México D.F.,
More informationEdge Histogram Descriptor for Finger Vein Recognition
Edge Histogram Descriptor for Finger Vein Recognition Yu Lu 1, Sook Yoon 2, Daegyu Hwang 1, and Dong Sun Park 2 1 Division of Electronic and Information Engineering, Chonbuk National University, Jeonju,
More informationStudy Impact of Architectural Style and Partial View on Landmark Recognition
Study Impact of Architectural Style and Partial View on Landmark Recognition Ying Chen smileyc@stanford.edu 1. Introduction Landmark recognition in image processing is one of the important object recognition
More informationPreprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition
Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad Road, Rajkot Gujarat, India C. K. Kumbharana,
More informationDigital Imaging Systems for Historical Documents
Digital Imaging Systems for Historical Documents Improvement Legibility by Frequency Filters Kimiyoshi Miyata* and Hiroshi Kurushima** * Department Museum Science, ** Department History National Museum
More informationAnalyzing features learned for Offline Signature Verification using Deep CNNs
Accepted as a conference paper for ICPR 2016 Analyzing features learned for Offline Signature Verification using Deep CNNs Luiz G. Hafemann, Robert Sabourin Lab. d imagerie, de vision et d intelligence
More informationReal-Time Face Detection and Tracking for High Resolution Smart Camera System
Digital Image Computing Techniques and Applications Real-Time Face Detection and Tracking for High Resolution Smart Camera System Y. M. Mustafah a,b, T. Shan a, A. W. Azman a,b, A. Bigdeli a, B. C. Lovell
More informationCopyright 2006 Society of Photo-Optical Instrumentation Engineers.
Adam Czajka, Przemek Strzelczyk, ''Iris recognition with compact zero-crossing-based coding'', in: Ryszard S. Romaniuk (Ed.), Proceedings of SPIE - Volume 6347, Photonics Applications in Astronomy, Communications,
More informationMethod for Real Time Text Extraction of Digital Manga Comic
Method for Real Time Text Extraction of Digital Manga Comic Kohei Arai Information Science Department Saga University Saga, 840-0027, Japan Herman Tolle Software Engineering Department Brawijaya University
More informationIntroduction to Video Forgery Detection: Part I
Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,
More informationFastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC)
FastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC) EAB - Research Project Conference, Darmstadt, September 19 th, 2016 Presented by Markus Clabian Senior Research Engineer,
More informationFace Recognition in Low Resolution Images. Trey Amador Scott Matsumura Matt Yiyang Yan
Face Recognition in Low Resolution Images Trey Amador Scott Matsumura Matt Yiyang Yan Introduction Purpose: low resolution facial recognition Extract image/video from source Identify the person in real
More informationDigital Image Processing 3/e
Laboratory Projects for Digital Image Processing 3/e by Gonzalez and Woods 2008 Prentice Hall Upper Saddle River, NJ 07458 USA www.imageprocessingplace.com The following sample laboratory projects are
More informationImproving Spectroface using Pre-processing and Voting Ricardo Santos Dept. Informatics, University of Beira Interior, Portugal
Improving Spectroface using Pre-processing and Voting Ricardo Santos Dept. Informatics, University of Beira Interior, Portugal Email: ricardo_psantos@hotmail.com Luís A. Alexandre Dept. Informatics, University
More informationFusing Iris Colour and Texture information for fast iris recognition on mobile devices
Fusing Iris Colour and Texture information for fast iris recognition on mobile devices Chiara Galdi EURECOM Sophia Antipolis, France Email: chiara.galdi@eurecom.fr Jean-Luc Dugelay EURECOM Sophia Antipolis,
More informationA Study of Distortion Effects on Fingerprint Matching
A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department
More informationBiometric Authentication for secure e-transactions: Research Opportunities and Trends
Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa
More informationSession 2: 10 Year Vision session (11:00-12:20) - Tuesday. Session 3: Poster Highlights A (14:00-15:00) - Tuesday 20 posters (3minutes per poster)
Lessons from Collecting a Million Biometric Samples 109 Expression Robust 3D Face Recognition by Matching Multi-component Local Shape Descriptors on the Nasal and Adjoining Cheek Regions 177 Shared Representation
More informationImage De-Noising Using a Fast Non-Local Averaging Algorithm
Image De-Noising Using a Fast Non-Local Averaging Algorithm RADU CIPRIAN BILCU 1, MARKKU VEHVILAINEN 2 1,2 Multimedia Technologies Laboratory, Nokia Research Center Visiokatu 1, FIN-33720, Tampere FINLAND
More informationChallenges and Potential Research Areas In Biometrics
Challenges and Potential Research Areas In Biometrics Defence Research and Development Canada Qinghan Xiao and Karim Dahel Defence R&D Canada - Ottawa October 18, 2004 Recherche et développement pour la
More informationA Comparison Study of Image Descriptors on Low- Resolution Face Image Verification
A Comparison Study of Image Descriptors on Low- Resolution Face Image Verification Gittipat Jetsiktat, Sasipa Panthuwadeethorn and Suphakant Phimoltares Advanced Virtual and Intelligent Computing (AVIC)
More informationIntegrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence
Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Sheng Yan LI, Jie FENG, Bin Gang XU, and Xiao Ming TAO Institute of Textiles and Clothing,
More informationTouchless Fingerprint Recognization System
e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph
More informationIris Recognition-based Security System with Canny Filter
Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role
More informationA Novel Region Based Liveness Detection Approach for Fingerprint Scanners
A Novel Region Based Liveness Detection Approach for Fingerprint Scanners Brian DeCann, Bozhao Tan, and Stephanie Schuckers Clarkson University, Potsdam, NY 13699 USA {decannbm,tanb,sschucke}@clarkson.edu
More informationInternational Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)
Sparsity Inspired Selection and Recognition of Iris Images 1. Dr K R Badhiti, Assistant Professor, Dept. of Computer Science, Adikavi Nannaya University, Rajahmundry, A.P, India 2. Prof. T. Sudha, Dept.
More informationClassification for Motion Game Based on EEG Sensing
Classification for Motion Game Based on EEG Sensing Ran WEI 1,3,4, Xing-Hua ZHANG 1,4, Xin DANG 2,3,4,a and Guo-Hui LI 3 1 School of Electronics and Information Engineering, Tianjin Polytechnic University,
More informationMINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC.
MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. Minutiae Manipulation for Biometric Attacks 1 INTRODUCTION
More informationIJRASET 2015: All Rights are Reserved
A Novel Approach For Indian Currency Denomination Identification Abhijit Shinde 1, Priyanka Palande 2, Swati Kamble 3, Prashant Dhotre 4 1,2,3,4 Sinhgad Institute of Technology and Science, Narhe, Pune,
More information