Presentation Attack Detection Algorithms for Finger Vein Biometrics: A Comprehensive Study

Size: px
Start display at page:

Download "Presentation Attack Detection Algorithms for Finger Vein Biometrics: A Comprehensive Study"

Transcription

1 215 11th International Conference on Signal-Image Technology & Internet-Based Systems Presentation Attack Detection Algorithms for Finger Vein Biometrics: A Comprehensive Study R. Raghavendra Christoph Busch Norwegian Biometrics Laboratory Gjøvik University College Gjøvik, Norway raghavendra.ramachandra, hig.no Abstract Finger vein biometric systems have shown a vulnerability to presentation attacks (or direct attack or spoof attack). The presentation attacks have raised crucial security issues for finger vein biometric systems mainly due to the widespread application of these biometric sensors in the financial sector. In this paper, we present a novel algorithm to detected the presentation attack on a finger vein recognition system. The proposed method relies on the texture analysis using steerable pyramids, and the final decision is carried out by classifying the textures features using a Support Vector Machines (SVM). Furthermore, we have also introduced a new kind of attack by using a smartphone display for the first time. Extensive experiments are carried out on a large scale database of 3 unique finger veins collected from 1 subjects. We introduce a new finger vein artefact database collected using three different kinds of artefacts namely: (1) ink jet print (2) laser jet print and (3) smartphone display. An extensive comparison of the proposed scheme with ten different Presentation Attack Detection (PAD) methods demonstrated the efficacy of the proposed scheme. I. INTRODUCTION Biometric technology has emerged as an alternative security access control method when compared with a traditional access control mechanism using a password, pin code or smart card. Biometrics is widely used to identify or recognise the person of interest based on their physical and behaviour characteristics. Since biometric systems can verify the person based on what he/she has the user of the biometric system is exempted from remembering the complex passwords or the access cards for various security application. Similar to any other security systems, biometric systems are also vulnerable to various attacks that can be broadly classified into two types [3]: (1) Direct attack: That involves presenting a biometric artefact directly to the sensor. (2) Indirect attack: That involves attacking the biometric system components through a Trojan horse or another kind of malware and virus. Direct attacks on biometric systems are of higher interest, as the attacker needs no specific knowledge of the biometric system under attack. which is relevant for the assessment of the attack potential for instance in a security evaluation. Among the various biometrics modalities, the finger vein modality has rapidly gained popularity because of its high accuracy, reliability, user convince, permanence and difficulty to spoof the sensor. Moreover unlike for fingerprints data subjects can not leave latent analog Figure 1: Example of finger vein artefact captured using smartphone (a) Real image from a normal presentation (b) Artefact image from an attack presentation samples unintentionally. For this reason, the finger vein biometrics are widely used in the financial sector especially in banking applications in many countries [9]. As the popularity of the finger vein modality increases, the vulnerability of the finger vein biometric systems also increases [6]. Even though the finger vein patterns are not visible to the naked eyes and the risk of latent prints does not exist, it is possible to attack directly the finger vein biometric system in case the finger samples stored in such systems are stolen or compromised. Biometric researchers have successfully demonstrated presentation (or spoofing) attacks on the finger vein recognition sensor using a printed image[12]. In [12], a finger vein artefact database comprised of 1 unique finger vein images from 5 subjects is collected by printing a real finger vein images using the LaserJet printer. The vulnerability analysis presented in [12] indicate a Spoof False Acceptance Rate (SFAR) of 86%. These results strongly indicate the vulnerability of certain finger vein biometric systems for such a direct attack. This motivates researchers to introduce the Presentation Attack Detection (PAD) or spoof detection as a countermeasure technique that can mitigate the attacks and thereby improve the reliability and trustworthiness of the finger vein biometric system. There exist various Presentation Attack Detection (PAD) algorithms for finger vein biometrics. In [5], Frequency and Time-Frequency analysis using Fourier and Wavelet Transform to detect the artefact (or fake/spoof) finger vein images were proposed. The artefact finger veins are captured using HP LaserJet printer on three different papers namely normal A4 paper, matte paper and OHP film. Experiments are presented to a small database of 7 subjects that indicates that the use of frequency information can detect the presence of finger vein artefacts. Considering the importance of the finger vein spoofing, the 1st competition was organised in conjunction with /15 $ IEEE DOI 119/SITIS

2 Figure 2: Block diagram of the proposed scheme the International Conference of Biometrics (ICB) 215 [11]. This competition uses the publicly available finger vein artefact database collected from 5 subjects [12]. Three different algorithms were introduced namely[11]: (1) Binarized Statistical Image Features (BSIF) (2) Rieze Transform (3) Local Binary Pattern (LBP), Local Phase Quantitation (LPQ). All these three methods have used the Support Vector Machine (SVM) as a classifier to categorize the presented finger vein object as an artefact (or spoof) or live. Thus, it is noted from the existing schemes that, finger vein PAD is limited only to detect the finger vein artefact generated using a laser printer. In this work, we propose a novel scheme for finger vein PAD using a steerable pyramid as a feature extraction scheme and subsequently a linear Support Vector Machine (SVM) as a classifier. The steerable pyramid uses a bank of steerable pyramids at each level of the pyramid rather than a single Laplacian or Gaussian. As a consequence, the use of steerable pyramids will capture more efficient texture information that can be further processed using Support Vector Machine (SVM) to make the final decision on whether the presented finger vein is real or spoof. We also present a new attack on the finger vein sensor by presenting finger vein images to the sensor using a smartphone (see Figure 1). The following are the main contributions of this paper: (1) Novel scheme for finger vein presentation attack detection using steerable pyramids (2) New attack on finger vein sensor by presenting a finger vein sample using a smartphone (3) New finger vein artefact database with 3 unique finger vein identities generated using three different kinds of artefact generation using (a) laser print (b) Ink jet print (c) smartphone presentation (4) Extensive experiments to evaluate the vulnerability of finger vein sensor to three different kinds of artefacts (5) Comprehensive study on the new finger vein database by comparing the proposed method with ten different presentation attack detection algorithms that are widely used in the biometric community. The rest of the paper is structured as follows: Section II presents the proposed scheme for a reliable finger vein biometric system, Section III presents the finger vein artefact data collection, Section IV presents the experimental results and discussion. Finally, Section V draws the conclusion of this work. II. PROPOSED SCHEME Figure 2 shows the block diagram of the proposed PAD scheme for the finger vein recognition system. The proposed scheme can be structured in two functional subsystems namely: (1) PAD Module (2) Finger vein recognition module. Given the finger vein Image F I,we first perform the Region Of Interest (ROI) extraction. Since our in-house sensor has a dedicated space to place the finger, the ROI extraction is carried out by setting a pre-assigned rectangular area to cover the interesting region of the finger. The obtained ROI finger vein image Fr I is further re-sized to have a dimension of 1 3 pixels before passing it to the PAD module. A. PAD Module This section describes the proposed presentation attack detection module introduced in this work. The proposed PAD module has two main functional blocks namely: (1) Feature extraction using steerable pyramids and (2) Classification using linear Support Vector Machine (SVM). In this work, we explore the applicability of the steerable pyramid features to detect the finger vein artefact. The steerable pyramids are a set of oriented filters in which a filter of arbitrary orientation is synthesised as a linear combination of a set basis function [1]. Thus, the use of steerable pyramids allows one to calculate the filter response at different orientations. Furthermore, the steerable pyramids exhibit the property of both rotation and translation invariance. Our motivation in using steerable pyramids for finger vein artefact detection (or spoof detection) is motivated by the fact that they have demonstrated prominently in extracting the texture features from the image. Thus, the texture features extracted using steerable filter are useful in identifying the presence of dot patterns in the case of laser print artefact or in identifying the glare patterns in case of inkjet print artefact or in identifying the additional frequency components in case of smartphone display attack. Given the ROI of the finger vein image Fr I the corresponding steerable pyramid decomposition is defined as: SF mn (x, y) = x F r (x, y)d mn (x x1,y y1) (1) y

3 where, D mn denotes the directional bandpass filters at stage m =, 1, 2,..., S 1, and orientation n =, 1, 2,...,K 1. In this work, we consider only the residual highfrequency band from the steerable pyramid for the features selection process. Figure 3 shows the visual illustration of the residual high-frequency features obtained using steerable pyramids on both real and different kinds of artefact finger vein images. We then employ the linear SVM classifier to determine whether the captured sample belongs to the real (i.e. normal presentation) or artefact (i.e. attack presentation) category. The SVM classifier is first trained using a set of positive (real finger vein) and negative (finger vein artefact) samples according to the protocol described in the Section IV-A. B. Finger vein verification The Finger vein verification system (or baseline system) employed in this work is based on the Maximum Curvature Points (MCP) [4] as a feature extraction method and correlation as a comparator. This choice is made by considering the high performance and few computation characteristics exhibited by the MCP method [7]. III. FINGER VEIN ARTEFACT DATABASE COLLECTION In this section, we discuss the newly collected finger vein artefact database using our in-house finger vein sensor [8] [1]. Our database is comprised of 1 subjects for which we capture the finger vein from four different fingers namely right index, right middle, left index and left middle. However, some of the subjects were not able to provide all four fingers due to various reasons. Thus, the collected database has 3 unique finger vein instances that correspond to 1 subjects. The collected data is dived into two groups namely: (1) Real finger vein capture and (2) Artefact finger vein capture. The real finger vein capture attempts are considered to be normal presentations and were carried out in two sessions to obtain two images respectively. In the case of the artefact finger vein capture attempts, which are considered as attack presentations, we have used the real finger vein captures in the second session to generate various artefacts. The finger vein artefacts are generated using three different kinds of techniques namely: (1) Artefact 1: This artefact is generated by printing the real finger vein image using an ink jet (HP Photo smart 552) printer on highquality glossary paper. (2) Artefact 2: This artefact is generated by printing the real finger vein images on normal quality paper using a laserjet printer. (3) Artefact 3: This artefact is generated by presenting the real finger vein sample using the smartphone. For this purpose the real finger vein image is loaded to the Samsung S5 smartphone and then displayed to the sensor. This attack is introduced on the finger vein modality. However, we have carried out a series of pre-processing operations on the real finger vein images before obtaining the artefacts. Thus, we first perform the pre-processing by extracting the Region of Interest (ROI) and then rescaling the ROI finger vein to have a dimension of 1 3 pixels. We then carry out the contrast enhancement using histogram equalisation to improve the contrast of the real image before obtaining the corresponding artefact. Figure 3 shows the examples of the real and corresponding artefact images. IV. EXPERIMENTAL RESULTS This section describes the experimental protocols and the experimental results obtained by comparing the proposed scheme with ten different state-of-the-art finger vein presentation attack detection algorithms. A. Performance evaluation protocol For the experiments, each finger is considered as a unique instance and thus in total we have observed 3 unique finger vein instances. We then divided the whole database of 3 unique instances into two independent subsets namely: training and testing set. The training set is comprised of the first 5 unique instances and the testing set is comprised of the remaining 25 instances. The training set is used for multiple purposes in this work that includes (1) To set the threshold value based on the Equal Error Rate (EER%) for vulnerability analysis (2) used as the training set to evaluate the state-of-the-art finger vein PAD algorithms. The testing set is solely used to evaluate the performance of the proposed as well as state-of-the-art finger vein PAD schemes. B. Results and discussion We first present the vulnerability study on our in-house finger vein sensor to three different kinds of finger vein print artefacts. The main goal of this vulnerability study is to obtain the Spoof False Acceptance Rate (SFAR%) that indicates the applicability of the artefact samples collected in our work to spoof the sensor. To this extent, we consider the baseline finger vein recognition system that operates in two modes namely: normal mode and attack mode to obtain the comparison scores. In the normal mode, we have used the real finger vein image collected from the first session as the reference and we have used real finger vein image collected in the second session as a probe. For the attack mode, we have used an artefact finger vein image that is generated using the real finger vein image used as the probe in the normal mode. Since we have generated three different artefacts in this work, we use one artefact at a time in the attack mode of the finger vein system.note that, in the attack mode, the reference image corresponds to the real finger vein image captured in session 1 and the probe image corresponds to the artefact image. The only difference in the operation of the attack mode is the use of artefact finger vein as a probe and then to measure the SFAR to measure the vulnerability of the finger vein sensor to the generated artefact. Figure 4 shows the comparison score distribution obtained using the finger vein baseline system when both real and artefact samples were used as the probe. Figure 4 (a) shows the distribution of genuine scores (in green color), zero effort impostor score (in blue color) and artefact (or spoof) scores (in pink color). The black vertical line in 6363

4 Figure 3: Illustration of residual high frequency features on (a) Real finger vein image (b) Artefact 1 (Ink jet print artefact) (c) Artefact 2 (Laser jet print ) (3) Artefact 3 (smartphone display) Zero Effort Imposter Scores Artefact 1 scores Threshold obtained on Development Database Zero-Effort Imposter Scores Artefact 2 Scores Threshold obtained on development dataset Zero-effort Impooster Scores Artefact 3 Scores Threshold obtained on development dataset Figure 4: Comparison score distributions of finger vein baseline system (a) with Artefact 1 (b) with Artefact 2 (c) with Artefact 3 Figure 4 (a) indicates the threshold value obtained on the training dataset that corresponds to the EER value of the baseline finger vein system operating in the normal mode (i.e. with real presentations). It can be noticed from the Figure 4 (a) that, the comparison scores obtained using artefacts will lie between genuine and zero effort impostor scores. Thus, with this threshold value more than 78% (SFAR) of the artefact 1 samples are accepted as the real presentation. A similar observation is also noted with Figure 4 (b) on artefact 2 that shows an SFAR of 76.4% and from Figure 4 (c) on artefact 3 indicating a SFAR of 1%. Thus, based on the high SFAR obtained from the vulnerability analysis, it is clear that the finger vein systems can be spoofed (or attacked) with the artefacts presented in this study. Table I: Performance results for the proposed PAD algorithm on the Artefact 1 Ensemble of BSIF SVM GLCM-SVM LBP(3X3) u2 SVM LPQ SVM LBP Variance SVM D FFT SVM D Cepstrum SVM Local Entropy Map SVM Quality based Techniques Block-wise Sharpness - SVM Block-wise standard deviation - SVM Proposed Method Steerable Pyramids - SVM Table I - Table III indicates the quantitative performance of the proposed scheme on three different artefacts. Further, we also present the comprehensive comparison by comparing the proposed method with ten different presentation attack detection algorithms that are widely used in the biometric community. The quantitative performance of the presentation attack detection algorithms are presented according to the metric developed in ISO/IEC [2] in terms of: (1) Attack Presentation Classification Error Rate (APCER), which is defined as a proportion of attack presentation incorrectly classified as normal (or real) presentation (2) Normal Presentation Classification Error Rate (NPCER) which is defined as proportion of normal presentation incorrectly classified as attack presentation. Finally, the performance of the overall PAD algorithm is presented in terms of Average Classification Error (AP CER+NPCER) 2 Rate (ACER) such that, ACER = the lower the values of ACER, the better is the PAD performance. Table II: Performance results for the proposed PAD algorithm on the Artefact 2 Ensemble of BSIF SVM GLCM-SVM LBP(3X3) u2 SVM LPQ SVM LBP Variance SVM D FFT SVM D Cepstrum SVM Local Entropy Map SVM Quality based Techniques Block-wise Sharpness - SVM Block-wise standard deviation - SVM Proposed Method Steerable Pyramids - SVM

5 Table I presents the performance of the proposed scheme on artefact 1 samples. It can be observed that the proposed scheme has demonstrated the best performance with the lowest ACER of 3.6% while the second best performance is noted with the LPQ-SVM with an ACER of 6.8%. Table II indicate the quantitative performance of the proposed scheme on artefact 2 samples. Here also it can be observed that the proposed method have emerged as the best method with the lowest ACER of 3%. A similar observation is noted with the artefact 3 as indicated in the Table III in which the proposed scheme has demonstrated the best performance with ACER of 2.4%. Thus based on the obtained results obtained the proposed method is emerged as the best PAD scheme for finger vein biometric systems. Table III: Performance results for the proposed PAD algorithm on the Artefact 3 Ensemble of BSIF SVM GLCM-SVM LBP(3X3) u2 SVM LPQ SVM LBP Variance SVM D FFT SVM D Cepstrum SVM Local Entropy Map SVM Quality based Techniques Block-wise Sharpness - SVM Block-wise standard deviation - SVM Proposed Method Steerable Pyramids - SVM V. CONCLUSION The goal of the PAD algorithm research is to improve the reliability of a finger vein biometric system by automatically detecting and mitigating the direct attacks. In this work, we present a novel algorithm based on the steerable pyramid and SVM. The proposed PAD algorithm was evaluated on three different kinds of finger vein artefact samples that shows the consistent high performance in detecting the finger vein artefact. A comparative evaluation is presented by evaluating the performance of the proposed method with ten different PAD algorithms used widely in biometric spoof detection. The experimental results demonstrate the efficacy of the proposed scheme with the lowest ACER of 3.6% on artefact 1, 3.% on artefact 2 and 2.4% on artefact 3. [3] S. Marcel, M. S. Nixon, and S. Z. Li. Handbook of Biometric Anti-Spoofing: Trusted Biometrics Under Spoofing Attacks. Springer Publishing Company, Incorporated, 214. [4] N. Miura, A. Nagasaka, and T. Miyatake. Extraction of finger-vein patterns using maximum curvature points in image profiles. IEICE Transactions on Information and Systems, 9(8): , 27. [5] D. T. Nguyen, Y. H. Park, K. Y. Shin, S. Y. Kwon, H. C. Lee, and K. R. Park. Fake finger-vein image detection based on fourier and wavelet transforms. Digital Signal Processing, 23(5): , 213. [6] R. Raghavendra, M. Avinas, C. Busch, and S. Marcel. Finger vein liveness detection using motion magnification. In IEEE International Conference on Biometrics: Theory, Applications and Systems, Sept [7] R. Raghavendra, K. Raja, J. Surbiryala, and C. Busch. Finger vascular pattern imaging; a comprehensive evaluation. In Asia-Pacific Signal and Information Processing Association, 214 Annual Summit and Conference (APSIPA), pages 1 5, Dec 214. [8] R. Raghavendra, K. B. Raja, J. Surbiryala, and C. Busch. A low-cost multimodal biometric sensor to capture finger vein and fingerprint. In International Joint Conference on Biometrics (IJCB), pages 1 7, Sep 214. [9] R. Raghavendra, J. Surbiryala, and C. Busch. An efficient finger vein indexing scheme based on unsupervised clustering. In 1st IEEE International Conference on Identity, Security and Behaviour Analysis (ISBA 215). IEEE, 215. [1] R. Raghavendra, J. Surbiryala, K. B. Raja, and C. Busch. Novel finger vascular pattern imaging device for robust biometric verification. In Imaging Systems and Techniques (IST), 214 IEEE International Conference on, pages IEEE, 214. [11] P. Tome, R. Raghavendra, C. Busch, S. Tirunagari, N. Poh, B. H. Shekar, D. Gragnaniello, C. Sansone, L. Verdoliva, and S. Marcel. The 1st competition on counter measures to finger vein spoofing attacks. In The 8th IAPR International Conference on Biometrics (ICB), May 215. [12] P. Tome, M. Vanoni, and S. Marcel. On the vulnerability of finger vein recognition to spoofing. In International Conference of the Biometrics Special Interest Group (BIOSIG), pages 1 1, Sept 214. VI. ACKNOWLEDGMENT This work is funded by the EU 7th Framework Program (FP7/27-213) under grant agreement n o for the large-scale integrated project FIDELITY. REFERENCES [1] W. T. Freeman and E. H. Adelson. The design and use of steerable filters. IEEE Transactions on Pattern Analysis & Machine Intelligence, (9):891 96, [2] ISO/IEC JTC1 SC37 Biometrics. ISO/IEC WD 317-3:214 Information Technology - presentation attack detection - Part 3: testing and reporting and classification of attacks. International Organization for Standardization,

Face Presentation Attack Detection by Exploring Spectral Signatures

Face Presentation Attack Detection by Exploring Spectral Signatures Face Presentation Attack Detection by Exploring Spectral Signatures R. Raghavendra, Kiran B. Raja, Sushma Venkatesh, Christoph Busch Norwegian Biometrics Laboratory, NTNU - Gjøvik, Norway {raghavendra.ramachandra;

More information

A New Fake Iris Detection Method

A New Fake Iris Detection Method A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn

More information

Empirical Evaluation of Visible Spectrum Iris versus Periocular Recognition in Unconstrained Scenario on Smartphones

Empirical Evaluation of Visible Spectrum Iris versus Periocular Recognition in Unconstrained Scenario on Smartphones Empirical Evaluation of Visible Spectrum Iris versus Periocular Recognition in Unconstrained Scenario on Smartphones Kiran B. Raja * R. Raghavendra * Christoph Busch * * Norwegian Biometric Laboratory,

More information

Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey

Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey RAGHAVENDRA RAMACHANDRA and CHRISTOPH BUSCH, Norwegian Biometric Laboratory, Norwegian University of Science and

More information

A Novel Image Fusion Scheme For Robust Multiple Face Recognition With Light-field Camera

A Novel Image Fusion Scheme For Robust Multiple Face Recognition With Light-field Camera A Novel Image Fusion Scheme For Robust Multiple Face Recognition With Light-field Camera R. Raghavendra Kiran B Raja Bian Yang Christoph Busch Norwegian Biometric Laboratory, Gjøvik University College,

More information

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

An Enhanced Biometric System for Personal Authentication

An Enhanced Biometric System for Personal Authentication IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 6, Issue 3 (May. - Jun. 2013), PP 63-69 An Enhanced Biometric System for Personal Authentication

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

Evaluation of Biometric Systems. Christophe Rosenberger

Evaluation of Biometric Systems. Christophe Rosenberger Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC

More information

APPENDIX 1 TEXTURE IMAGE DATABASES

APPENDIX 1 TEXTURE IMAGE DATABASES 167 APPENDIX 1 TEXTURE IMAGE DATABASES A 1.1 BRODATZ DATABASE The Brodatz's photo album is a well-known benchmark database for evaluating texture recognition algorithms. It contains 111 different texture

More information

COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee

COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES Do-Guk Kim, Heung-Kyu Lee Graduate School of Information Security, KAIST Department of Computer Science, KAIST ABSTRACT Due to the

More information

Title Goes Here Algorithms for Biometric Authentication

Title Goes Here Algorithms for Biometric Authentication Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing

More information

Impact of Out-of-focus Blur on Face Recognition Performance Based on Modular Transfer Function

Impact of Out-of-focus Blur on Face Recognition Performance Based on Modular Transfer Function Impact of Out-of-focus Blur on Face Recognition Performance Based on Modular Transfer Function Fang Hua 1, Peter Johnson 1, Nadezhda Sazonova 2, Paulo Lopez-Meyer 2, Stephanie Schuckers 1 1 ECE Department,

More information

OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS

OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS 1 OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS RESULTS OF PRACTICAL EXPERIMENTS CONCLUSION 2 ABSTRACT IDENTITY VERIFICATION

More information

An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods

An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods 19 An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods T.Arunachalam* Post Graduate Student, P.G. Dept. of Computer Science, Govt Arts College, Melur - 625 106 Email-Arunac682@gmail.com

More information

Processing and Enhancement of Palm Vein Image in Vein Pattern Recognition System

Processing and Enhancement of Palm Vein Image in Vein Pattern Recognition System Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,

More information

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION What are Finger Veins? Veins are blood vessels which present throughout the body as tubes that carry blood back to the heart. As its name implies,

More information

Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network

Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network , October 21-23, 2015, San Francisco, USA Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network Mark Erwin C. Villariña and Noel B. Linsangan, Member, IAENG Abstract

More information

Segmentation of Fingerprint Images

Segmentation of Fingerprint Images Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands

More information

Direct Attacks Using Fake Images in Iris Verification

Direct Attacks Using Fake Images in Iris Verification Direct Attacks Using Fake Images in Iris Verification Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Fernando Alonso-Fernandez, Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia Biometric Recognition

More information

Computer Vision in Human-Computer Interaction

Computer Vision in Human-Computer Interaction Invited talk in 2010 Autumn Seminar and Meeting of Pattern Recognition Society of Finland, M/S Baltic Princess, 26.11.2010 Computer Vision in Human-Computer Interaction Matti Pietikäinen Machine Vision

More information

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,

More information

Implementation of Face Spoof Recognization by Using Image Distortion Analysis

Implementation of Face Spoof Recognization by Using Image Distortion Analysis Implementation of Face Spoof Recognization by Using Distortion Analysis Priyanka P. Raut 1, Namrata R. Borkar 2, Virendra P. Nikam 3 1ME Student, CSE Department, KGIET, Darapur, M.S., India 2,3 Assistant

More information

Stamp detection in scanned documents

Stamp detection in scanned documents Annales UMCS Informatica AI X, 1 (2010) 61-68 DOI: 10.2478/v10065-010-0036-6 Stamp detection in scanned documents Paweł Forczmański Chair of Multimedia Systems, West Pomeranian University of Technology,

More information

NEURALNETWORK BASED CLASSIFICATION OF LASER-DOPPLER FLOWMETRY SIGNALS

NEURALNETWORK BASED CLASSIFICATION OF LASER-DOPPLER FLOWMETRY SIGNALS NEURALNETWORK BASED CLASSIFICATION OF LASER-DOPPLER FLOWMETRY SIGNALS N. G. Panagiotidis, A. Delopoulos and S. D. Kollias National Technical University of Athens Department of Electrical and Computer Engineering

More information

Image Extraction using Image Mining Technique

Image Extraction using Image Mining Technique IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,

More information

Laser Printer Source Forensics for Arbitrary Chinese Characters

Laser Printer Source Forensics for Arbitrary Chinese Characters Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,

More information

Biometric Signature for Mobile Devices

Biometric Signature for Mobile Devices Chapter 13 Biometric Signature for Mobile Devices Maria Villa and Abhishek Verma CONTENTS 13.1 Biometric Signature Recognition 309 13.2 Introduction 310 13.2.1 How Biometric Signature Works 310 13.2.2

More information

3D Face Recognition System in Time Critical Security Applications

3D Face Recognition System in Time Critical Security Applications Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications

More information

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,

More information

Recognition System for Pakistani Paper Currency

Recognition System for Pakistani Paper Currency World Applied Sciences Journal 28 (12): 2069-2075, 2013 ISSN 1818-4952 IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.28.12.300 Recognition System for Pakistani Paper Currency 1 2 Ahmed Ali and

More information

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Proposed Method for Off-line Signature Recognition and Verification using Neural Network e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature

More information

Multimodal Face Recognition using Hybrid Correlation Filters

Multimodal Face Recognition using Hybrid Correlation Filters Multimodal Face Recognition using Hybrid Correlation Filters Anamika Dubey, Abhishek Sharma Electrical Engineering Department, Indian Institute of Technology Roorkee, India {ana.iitr, abhisharayiya}@gmail.com

More information

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition

More information

PERFORMANCE TESTING EVALUATION REPORT OF RESULTS

PERFORMANCE TESTING EVALUATION REPORT OF RESULTS COVER Page 1 / 139 PERFORMANCE TESTING EVALUATION REPORT OF RESULTS Copy No.: 1 CREATED BY: REVIEWED BY: APPROVED BY: Dr. Belen Fernandez Saavedra Dr. Raul Sanchez-Reillo Dr. Raul Sanchez-Reillo Date:

More information

Image Forgery Detection Using Svm Classifier

Image Forgery Detection Using Svm Classifier Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama

More information

License Plate Localisation based on Morphological Operations

License Plate Localisation based on Morphological Operations License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract

More information

Contact lens detection in iris images

Contact lens detection in iris images page 1 Chapter 1 Contact lens detection in iris images Jukka Komulainen, Abdenour Hadid and Matti Pietikäinen Iris texture provides the means for extremely accurate uni-modal person identification. However,

More information

An Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP)

An Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP) , pp.13-22 http://dx.doi.org/10.14257/ijmue.2015.10.8.02 An Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP) Anusha Alapati 1 and Dae-Seong Kang 1

More information

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets CCV: The 5 th sian Conference on Computer Vision, 3-5 January, Melbourne, ustralia Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets Sylvain Bernard,, Nozha Boujemaa, David Vitale,

More information

Improved SIFT Matching for Image Pairs with a Scale Difference

Improved SIFT Matching for Image Pairs with a Scale Difference Improved SIFT Matching for Image Pairs with a Scale Difference Y. Bastanlar, A. Temizel and Y. Yardımcı Informatics Institute, Middle East Technical University, Ankara, 06531, Turkey Published in IET Electronics,

More information

http://www.diva-portal.org This is the published version of a paper presented at SAI Annual Conference on Areas of Intelligent Systems and Artificial Intelligence and their Applications to the Real World

More information

Iris Recognition using Histogram Analysis

Iris Recognition using Histogram Analysis Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

Performance study of Text-independent Speaker identification system using MFCC & IMFCC for Telephone and Microphone Speeches

Performance study of Text-independent Speaker identification system using MFCC & IMFCC for Telephone and Microphone Speeches Performance study of Text-independent Speaker identification system using & I for Telephone and Microphone Speeches Ruchi Chaudhary, National Technical Research Organization Abstract: A state-of-the-art

More information

IMPACT OF SEVERE SIGNAL DEGRADATION ON EAR RECOGNITION PERFORMANCE. A. Pflug, J. Wagner, C. Rathgeb and C. Busch

IMPACT OF SEVERE SIGNAL DEGRADATION ON EAR RECOGNITION PERFORMANCE. A. Pflug, J. Wagner, C. Rathgeb and C. Busch IMPACT OF SEVERE SIGNAL DEGRADATION ON EAR RECOGNITION PERFORMANCE A. Pflug, J. Wagner, C. Rathgeb and C. Busch da/sec Biometrics and Internet Security Research Group Hochschule Darmstadt, Darmstadt, Germany

More information

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor

More information

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International

More information

Database of Iris Printouts and its Application: Development of Liveness Detection Method for Iris Recognition

Database of Iris Printouts and its Application: Development of Liveness Detection Method for Iris Recognition Database of Iris Printouts and its Application: Development of Liveness Detection Method for Iris Recognition Adam Czajka, Institute of Control and Computation Engineering Warsaw University of Technology,

More information

Automation of Fingerprint Recognition Using OCT Fingerprint Images

Automation of Fingerprint Recognition Using OCT Fingerprint Images Journal of Signal and Information Processing, 2012, 3, 117-121 http://dx.doi.org/10.4236/jsip.2012.31015 Published Online February 2012 (http://www.scirp.org/journal/jsip) 117 Automation of Fingerprint

More information

An Algorithm for Fingerprint Image Postprocessing

An Algorithm for Fingerprint Image Postprocessing An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most

More information

Adaptive Feature Analysis Based SAR Image Classification

Adaptive Feature Analysis Based SAR Image Classification I J C T A, 10(9), 2017, pp. 973-977 International Science Press ISSN: 0974-5572 Adaptive Feature Analysis Based SAR Image Classification Debabrata Samanta*, Abul Hasnat** and Mousumi Paul*** ABSTRACT SAR

More information

Authenticated Document Management System

Authenticated Document Management System Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College

More information

Automatic Aesthetic Photo-Rating System

Automatic Aesthetic Photo-Rating System Automatic Aesthetic Photo-Rating System Chen-Tai Kao chentai@stanford.edu Hsin-Fang Wu hfwu@stanford.edu Yen-Ting Liu eggegg@stanford.edu ABSTRACT Growing prevalence of smartphone makes photography easier

More information

Practical View on Face Presentation Attack Detection

Practical View on Face Presentation Attack Detection DAMER, DIMITROV: PRACTICAL FACE PRESENTATION ATTACK DETECTION 1 Practical View on Face Presentation Attack Detection Naser Damer naser.damer@igd.fraunhofer.de Kristiyan Dimitrov kristiyan.dimitrov@igd.fraunhofer.de

More information

Wavelet-based Image Splicing Forgery Detection

Wavelet-based Image Splicing Forgery Detection Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of

More information

Drum Transcription Based on Independent Subspace Analysis

Drum Transcription Based on Independent Subspace Analysis Report for EE 391 Special Studies and Reports for Electrical Engineering Drum Transcription Based on Independent Subspace Analysis Yinyi Guo Center for Computer Research in Music and Acoustics, Stanford,

More information

Travel Photo Album Summarization based on Aesthetic quality, Interestingness, and Memorableness

Travel Photo Album Summarization based on Aesthetic quality, Interestingness, and Memorableness Travel Photo Album Summarization based on Aesthetic quality, Interestingness, and Memorableness Jun-Hyuk Kim and Jong-Seok Lee School of Integrated Technology and Yonsei Institute of Convergence Technology

More information

Classification in Image processing: A Survey

Classification in Image processing: A Survey Classification in Image processing: A Survey Rashmi R V, Sheela Sridhar Department of computer science and Engineering, B.N.M.I.T, Bangalore-560070 Department of computer science and Engineering, B.N.M.I.T,

More information

RESEARCH PAPER FOR ARBITRARY ORIENTED TEAM TEXT DETECTION IN VIDEO IMAGES USING CONNECTED COMPONENT ANALYSIS

RESEARCH PAPER FOR ARBITRARY ORIENTED TEAM TEXT DETECTION IN VIDEO IMAGES USING CONNECTED COMPONENT ANALYSIS International Journal of Latest Trends in Engineering and Technology Vol.(7)Issue(4), pp.137-141 DOI: http://dx.doi.org/10.21172/1.74.018 e-issn:2278-621x RESEARCH PAPER FOR ARBITRARY ORIENTED TEAM TEXT

More information

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,

More information

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL Department of Electronics and Telecommunication, V.V.P. Institute of Engg & Technology,Solapur University Solapur,

More information

A new seal verification for Chinese color seal

A new seal verification for Chinese color seal Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558

More information

An Analysis of Image Denoising and Restoration of Handwritten Degraded Document Images

An Analysis of Image Denoising and Restoration of Handwritten Degraded Document Images Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Student Attendance Monitoring System Via Face Detection and Recognition System

Student Attendance Monitoring System Via Face Detection and Recognition System IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal

More information

CAN NO-REFERENCE IMAGE QUALITY METRICS ASSESS VISIBLE WAVELENGTH IRIS SAMPLE QUALITY?

CAN NO-REFERENCE IMAGE QUALITY METRICS ASSESS VISIBLE WAVELENGTH IRIS SAMPLE QUALITY? CAN NO-REFERENCE IMAGE QUALITY METRICS ASSESS VISIBLE WAVELENGTH IRIS SAMPLE QUALITY? Xinwei Liu 1,2,, Marius Pedersen 2, Christophe Charrier 1, and Patrick Bours 2 1 Normandie Univ, UNICAEN, ENSICAEN,

More information

Background Pixel Classification for Motion Detection in Video Image Sequences

Background Pixel Classification for Motion Detection in Video Image Sequences Background Pixel Classification for Motion Detection in Video Image Sequences P. Gil-Jiménez, S. Maldonado-Bascón, R. Gil-Pita, and H. Gómez-Moreno Dpto. de Teoría de la señal y Comunicaciones. Universidad

More information

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS Hui Su, Ravi Garg, Adi Hajj-Ahmad, and Min Wu {hsu, ravig, adiha, minwu}@umd.edu University of Maryland, College Park ABSTRACT Electric Network (ENF) based forensic

More information

A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION. Scott Deeann Chen and Pierre Moulin

A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION. Scott Deeann Chen and Pierre Moulin A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION Scott Deeann Chen and Pierre Moulin University of Illinois at Urbana-Champaign Department of Electrical and Computer Engineering 5 North Mathews

More information

Introduction to

Introduction to Introduction to 2013. 12 1 Contents Company Technologies Products Reference sites 2 Corporate Profile Techsphere: As a leading company in vascular biometric technology in the world, Techsphere s HVPR products

More information

Software Development Kit to Verify Quality Iris Images

Software Development Kit to Verify Quality Iris Images Software Development Kit to Verify Quality Iris Images Isaac Mateos, Gualberto Aguilar, Gina Gallegos Sección de Estudios de Posgrado e Investigación Culhuacan, Instituto Politécnico Nacional, México D.F.,

More information

Edge Histogram Descriptor for Finger Vein Recognition

Edge Histogram Descriptor for Finger Vein Recognition Edge Histogram Descriptor for Finger Vein Recognition Yu Lu 1, Sook Yoon 2, Daegyu Hwang 1, and Dong Sun Park 2 1 Division of Electronic and Information Engineering, Chonbuk National University, Jeonju,

More information

Study Impact of Architectural Style and Partial View on Landmark Recognition

Study Impact of Architectural Style and Partial View on Landmark Recognition Study Impact of Architectural Style and Partial View on Landmark Recognition Ying Chen smileyc@stanford.edu 1. Introduction Landmark recognition in image processing is one of the important object recognition

More information

Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition

Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad Road, Rajkot Gujarat, India C. K. Kumbharana,

More information

Digital Imaging Systems for Historical Documents

Digital Imaging Systems for Historical Documents Digital Imaging Systems for Historical Documents Improvement Legibility by Frequency Filters Kimiyoshi Miyata* and Hiroshi Kurushima** * Department Museum Science, ** Department History National Museum

More information

Analyzing features learned for Offline Signature Verification using Deep CNNs

Analyzing features learned for Offline Signature Verification using Deep CNNs Accepted as a conference paper for ICPR 2016 Analyzing features learned for Offline Signature Verification using Deep CNNs Luiz G. Hafemann, Robert Sabourin Lab. d imagerie, de vision et d intelligence

More information

Real-Time Face Detection and Tracking for High Resolution Smart Camera System

Real-Time Face Detection and Tracking for High Resolution Smart Camera System Digital Image Computing Techniques and Applications Real-Time Face Detection and Tracking for High Resolution Smart Camera System Y. M. Mustafah a,b, T. Shan a, A. W. Azman a,b, A. Bigdeli a, B. C. Lovell

More information

Copyright 2006 Society of Photo-Optical Instrumentation Engineers.

Copyright 2006 Society of Photo-Optical Instrumentation Engineers. Adam Czajka, Przemek Strzelczyk, ''Iris recognition with compact zero-crossing-based coding'', in: Ryszard S. Romaniuk (Ed.), Proceedings of SPIE - Volume 6347, Photonics Applications in Astronomy, Communications,

More information

Method for Real Time Text Extraction of Digital Manga Comic

Method for Real Time Text Extraction of Digital Manga Comic Method for Real Time Text Extraction of Digital Manga Comic Kohei Arai Information Science Department Saga University Saga, 840-0027, Japan Herman Tolle Software Engineering Department Brawijaya University

More information

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

FastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC)

FastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC) FastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC) EAB - Research Project Conference, Darmstadt, September 19 th, 2016 Presented by Markus Clabian Senior Research Engineer,

More information

Face Recognition in Low Resolution Images. Trey Amador Scott Matsumura Matt Yiyang Yan

Face Recognition in Low Resolution Images. Trey Amador Scott Matsumura Matt Yiyang Yan Face Recognition in Low Resolution Images Trey Amador Scott Matsumura Matt Yiyang Yan Introduction Purpose: low resolution facial recognition Extract image/video from source Identify the person in real

More information

Digital Image Processing 3/e

Digital Image Processing 3/e Laboratory Projects for Digital Image Processing 3/e by Gonzalez and Woods 2008 Prentice Hall Upper Saddle River, NJ 07458 USA www.imageprocessingplace.com The following sample laboratory projects are

More information

Improving Spectroface using Pre-processing and Voting Ricardo Santos Dept. Informatics, University of Beira Interior, Portugal

Improving Spectroface using Pre-processing and Voting Ricardo Santos Dept. Informatics, University of Beira Interior, Portugal Improving Spectroface using Pre-processing and Voting Ricardo Santos Dept. Informatics, University of Beira Interior, Portugal Email: ricardo_psantos@hotmail.com Luís A. Alexandre Dept. Informatics, University

More information

Fusing Iris Colour and Texture information for fast iris recognition on mobile devices

Fusing Iris Colour and Texture information for fast iris recognition on mobile devices Fusing Iris Colour and Texture information for fast iris recognition on mobile devices Chiara Galdi EURECOM Sophia Antipolis, France Email: chiara.galdi@eurecom.fr Jean-Luc Dugelay EURECOM Sophia Antipolis,

More information

A Study of Distortion Effects on Fingerprint Matching

A Study of Distortion Effects on Fingerprint Matching A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

Session 2: 10 Year Vision session (11:00-12:20) - Tuesday. Session 3: Poster Highlights A (14:00-15:00) - Tuesday 20 posters (3minutes per poster)

Session 2: 10 Year Vision session (11:00-12:20) - Tuesday. Session 3: Poster Highlights A (14:00-15:00) - Tuesday 20 posters (3minutes per poster) Lessons from Collecting a Million Biometric Samples 109 Expression Robust 3D Face Recognition by Matching Multi-component Local Shape Descriptors on the Nasal and Adjoining Cheek Regions 177 Shared Representation

More information

Image De-Noising Using a Fast Non-Local Averaging Algorithm

Image De-Noising Using a Fast Non-Local Averaging Algorithm Image De-Noising Using a Fast Non-Local Averaging Algorithm RADU CIPRIAN BILCU 1, MARKKU VEHVILAINEN 2 1,2 Multimedia Technologies Laboratory, Nokia Research Center Visiokatu 1, FIN-33720, Tampere FINLAND

More information

Challenges and Potential Research Areas In Biometrics

Challenges and Potential Research Areas In Biometrics Challenges and Potential Research Areas In Biometrics Defence Research and Development Canada Qinghan Xiao and Karim Dahel Defence R&D Canada - Ottawa October 18, 2004 Recherche et développement pour la

More information

A Comparison Study of Image Descriptors on Low- Resolution Face Image Verification

A Comparison Study of Image Descriptors on Low- Resolution Face Image Verification A Comparison Study of Image Descriptors on Low- Resolution Face Image Verification Gittipat Jetsiktat, Sasipa Panthuwadeethorn and Suphakant Phimoltares Advanced Virtual and Intelligent Computing (AVIC)

More information

Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence

Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Sheng Yan LI, Jie FENG, Bin Gang XU, and Xiao Ming TAO Institute of Textiles and Clothing,

More information

Touchless Fingerprint Recognization System

Touchless Fingerprint Recognization System e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph

More information

Iris Recognition-based Security System with Canny Filter

Iris Recognition-based Security System with Canny Filter Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role

More information

A Novel Region Based Liveness Detection Approach for Fingerprint Scanners

A Novel Region Based Liveness Detection Approach for Fingerprint Scanners A Novel Region Based Liveness Detection Approach for Fingerprint Scanners Brian DeCann, Bozhao Tan, and Stephanie Schuckers Clarkson University, Potsdam, NY 13699 USA {decannbm,tanb,sschucke}@clarkson.edu

More information

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017) Sparsity Inspired Selection and Recognition of Iris Images 1. Dr K R Badhiti, Assistant Professor, Dept. of Computer Science, Adikavi Nannaya University, Rajahmundry, A.P, India 2. Prof. T. Sudha, Dept.

More information

Classification for Motion Game Based on EEG Sensing

Classification for Motion Game Based on EEG Sensing Classification for Motion Game Based on EEG Sensing Ran WEI 1,3,4, Xing-Hua ZHANG 1,4, Xin DANG 2,3,4,a and Guo-Hui LI 3 1 School of Electronics and Information Engineering, Tianjin Polytechnic University,

More information

MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC.

MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. Minutiae Manipulation for Biometric Attacks 1 INTRODUCTION

More information

IJRASET 2015: All Rights are Reserved

IJRASET 2015: All Rights are Reserved A Novel Approach For Indian Currency Denomination Identification Abhijit Shinde 1, Priyanka Palande 2, Swati Kamble 3, Prashant Dhotre 4 1,2,3,4 Sinhgad Institute of Technology and Science, Narhe, Pune,

More information