Print Biometrics: Recovering Forensic Signatures from Halftone Images

Size: px
Start display at page:

Download "Print Biometrics: Recovering Forensic Signatures from Halftone Images"

Transcription

1 Print Biometrics: Recovering Forensic Signatures from Halftone Images Stephen Pollard, Steven Simske, Guy Adams HPL Keyword(s): document forensics; biometrics; Gabor filters; anti-counterfeiting Abstract: High-resolution imaging is useful for the forensic identification of unique printed regions. In this paper, we adapt an iris biometric approach to provide significant statistical discrimination between any two imaged halftone areas. The method is based on image registration followed by 2D Gabor wavelet encoding. Hamming Distances (HD) are used for matching. The z-scores for the comparison of like and unlike samples indicate improved identification statistics compared to both iris biometrics and previous methods of print authentication. External Posting Date: January 21, 2013 [Fulltext] Internal Posting Date: January 21, 2013 [Fulltext] Approved for External Publication Copyright 2013 Hewlett-Packard Development Company, L.P.

2 Print Biometrics: Recovering Forensic Signatures from Halftone Images Stephen Pollard Steven Simske Guy Adams Abstract High-resolution imaging is useful for the forensic identification of unique printed regions. In this paper, we adapt an iris biometric approach to provide significant statistical discrimination between any two imaged halftone areas. The method is based on image registration followed by 2D Gabor wavelet encoding. Hamming Distances (HD) are used for matching. The z-scores for the comparison of like and unlike samples indicate improved identification statistics compared to both iris biometrics and previous methods of print authentication. 1. Introduction Counterfeiting, warranty fraud, product tampering, smuggling, product diversion and other forms of organized deception are driving the need for improved brand protection. The potential for security printing and imaging to provide an extremely cost-effective forensic level of authentication is well-recognized [1]. In order to perform a forensic authentication of printed material, it is necessary use an image resolution sufficient to expose unique properties of the print that are extremely difficult to reproduce or copy. For the majority of printing technologies, these result naturally from the stochastic nature of the print process itself and its interaction with the underlying structural properties of the substrate material on which it is printed. As such they represent a unique fingerprint that can be used to authenticate individually printed items such as labels, documents, product packaging and monetary notes. Previously, we have shown that it is possible to derive a model based print signature capable of forensic levels of authentication, from the outline of solid printed material such as character glyphs, company logos or the non-payload indicia of popular 2D barcodes such as the DataMatrix or QR Code [2]. Here, we utilize a methodology borrowed from Iris Recognition [3] to derive a more general area based print biometric that can be applied to halftones images and thus greatly extend the utility and applicability of the forensic print authentication. We build on similar work [4] that related only to substrate materials and required an external method to register samples for analysis, which inhibits its adoption in practice. 2. Methodology We follow the methodology first proposed by Daugman in his 1993 paper on iris recognition [3] and expanded on in subsequent publications [5], [6]. This has become the backbone of many government and commercial biometric recognition systems; offering, as it does, the ability to robustly discriminate many billions of iris patterns. There are 3 essential elements to this form of iris recognition: i) registration of the inner and outer iris boundaries; ii) iris encoding by 2-D Gabor wavelet demodulation over normalized image coordinates; iii) testing of statistical independence between encoded feature sequences. Iris recognition differs from our print authentication task in three important regards. First, our images are captured using a specialized contact imaging device DrCID (Dyson relay CMOS Imaging Device) [7] at an almost fixed high resolution (about 7200dpi), whereas iris images are captured using traditional optics and thus vary in size over a small but significant range. Second, parts of the iris are not properly imaged due to either obscuration (by the eyelids or the eye-lashes) or specular reflections of the near IR light sources. Thus encoded features extracted from these regions must be robustly and accurately excluded from the statistical comparison process. Print images, on the other hand, do not generally suffer such imperfections and the whole of the feature sequence can be used. Finally, unique iris features can be encoded across a wide range of spatial frequencies while the random perturbations associated with printed halftones are more limited. In

3 fact, we find that above a critical frequency range image noise tends to dominate, while below this range the portrayed image content itself is dominant. 2.1 Halftone registration and coding Figure 1. The image of the Rainbow Bridge, left, is rendered as a 600dpi halftone, centre, to cover a 4mm square region which is printed on an HP LaserJet 4345 and captured, right, by our high resolution contact imaging device. Halftone patterns are registered using multi-scale gradient descent [8]. Figure 1 shows an example image, its halftone representation and a registered and de-warped high resolution capture using DrCID. For the multi-scale we normalize band pass filters (difference of successive Gaussian filtered images) to have unit standard deviation in order to minimize the difference between the stylized scaled (12x from 600 to 7200dpi) half-tone images and their printed and captured equivalents as shown in figure 2. Initial approximation is achieved using image moments [9]. Gabor filters use Cartesian coordinates and not the polar coordinates used for iris biometrics. That is ignoring orientation: where is a complex valued bit whose real and imaginary parts are either 1 or 0 depending on the sign of the 2-D integral; is the warped raw image; and are size parameters of the Gaussian envelope; the is the spatial frequency of the filter. There is an additional orientation parameter 0 which is ignored in this formulation for simplicity. Thus, for all samples each wavelet provides two bits towards the phase encoding that describes the random elements of the printed halftone. Samples can be combined spatially over an grid and through the choice of filter control parameters notably frequency and orientation. Figure 3. Shows how details of the printed versions of the same halftone differ due to inherent toner and substrate variation. Note in particular differences in the large isolated dots to the top right 2.2 Statistical testing Figure 2. Shows 3 layers of the difference of Gaussian pyramid used for image registration. Scaled (to 7200dpi) halftone (top) and printed captured image (bottom). Registration recovers the affine transform that gives the local minimum sum squared distance between the band-pass filtered images. It is used to dewarp the captured image prior to 2-D Gabor wavelet encoding. Examples of detail from registered halftone images (in this case an HP Logo) are shown in figure 3. It is clear that while the carrier signal (the HP Logo) is preserved, high frequency modulation due to the random nature of some print processes is also evident. Following Daugman s methodology, the random signal is demodulated to extract its phase information using quadrature 2-D Gabor wavelets. In our case the In Daugman s method statistical independence is tested using the norm of the Boolean XOR operator applied to the complete code vectors. This is represented as a fractional Hamming Distance (HD) by dividing by the code length. (N.B. This is complicated, in the case of iris imaging, by the need to include a mask to represent the valid portions of the code that are free from obscuration and specular reflection.) Provided any given bit in the phase code is equally likely to be 1 or 0 and the phase codes are uncorrelated, the expected value of HD = 0.5. For iris images the lack of correlation for different eyes is true across a wide range of spatial scales, while for halftone images it is clearly the case that at lower frequencies the different halftone images (which convey the same subject matter) are closely correlated. In fact, figure 4 shows the results of an experiment in which we collect 48 images of different printed halftones (all of the Rainbow Bridge) and perform all 1128 possible false comparisons plotting mean HD against the wavelength of a single 2-D Gabor filter sampled over an grid (12.8Kbits phase code). As gets

4 larger the phase coded vector becomes increasingly correlated and the mean HD drops accordingly. Figure 4. Plot of mean HD (with error bars) and effective code length for 1128 pairs of different halftone prints against the wavelength of the Gabor filter. Figure 5 shows the histogram of HD for pixels, with mean and standard deviation for which the corresponding probability density function (PDF) is binomial having degrees of freedom. This is less than the 12.8K bits in the phase code due to internal correlations amongst the otherwise random trials. This represents the effective code length (ECL) and is also plotted in figure 4 for other wavelengths. Binomial distributions of this size are reasonably approximated by Gaussian for which standard scores (z-scores) are well defined and provide a convenient shorthand for the probability that the null hypothesis is violated by chance. This provides a simple robustness estimate as to whether two phase codes are in fact derived from the same printed halftone. For example an HD of 0.3 or less has a probability of approximately 2x according to the binomial distribution while it corresponds to a z- score of 32.5 which relates to a cumulative probability on the normal distribution of about 5x (which represents a modest overestimate of the actual probability as both are infinitesimally small). 3. Results We have printed a number of sequences of identical halftone images small enough (4mm square) to be captured by DrCID. Each print is captured twice (using different DrCID imagers) in order to compare the HD scores of valid matches with those of the binomially distributed statistically independent false matches. For brevity, the results presented here are for the Rainbow Bridge image introduced in figure 1. However, similar results are obtained for a range of image content including the HP Logo shown (detail) in figure 3. Figure 5. Distribution of HDs for all possible comparisons of phase codes for pairs of different halftone images for a single =8 and =0 with M=80 2-D Gabor filter. Figure 6 shows a scatter plot of the HD scores of the valid matches of the 48 printed halftones along with the binomial PDF from figure 5 (shown rotated). As can be seen the HD s are in fact all well separated from the false match population with minimum z-score of and an average z-score of While our sample size is relatively small these levels of statistical robustness are staggering even in the context of iris recognition (which is able to discriminate amongst many billions of comparisons [6]). Figure 6. Scatter plot of HD scores of valid matches. Figure 7 plots summary statistics as we vary just the wavelength of the Gabor filter but keep all other parameters constant. As well as plotting the min, max and mean z-scores of the population of 48 correct matches we also plot the less informative z- score of equal error rate [10] which marks the point at which false positives and negatives are equally likely. It is clear that the large standard deviation of the relatively small sample of valid matches tends to dominate this error statistic including as it does all forms of imaging and

5 experimenter error. and halftone coding is that the former is almost circularly symmetric and requires some alignment to compute minimum HD values. Halftone patterns, on the other hand, can be chosen to uniquely resolve the orientation of the code; thus increasing further the disambiguating power of the statistical test. More importantly, printed information can readily be associated with a unique document serial number (e.g. printed in a barcode) which transforms the search task to a statistically more powerful identification check. It is also possible for this information to be encoded in the halftone itself [11]. Figure 7. Plots of the z-scores of valid matches against the wavelength of the Gabor filter. Figure 7 shows that, as discussed previously, there is a relatively small range of wavelength that gives extremely good statistical robustness using a single 2- D Gabor filter. In figure 8 we plot the average z-score as we vary the code length (SQRT of the number of bits) by varying the sampling frequency (M) and the number of independent wavelets that contribute to the phase code at each location. Specifically, we use up to 4 orientations and 3 wavelengths to encode the halftone. Note that increasing the sampling frequency of a single wavelet plateaus out soon after the (i.e bits) as the samples become spatially correlated. Adding multiple orientation provides the biggest improvement (with average z-score increasing all the way to 114 for bits) as they are most statistically independent. 4. Discussion In his work on iris recognition, Daugman [3] used a 2Kbit (256 Byte) code to represent each iris. This code size was chosen for pragmatic reasons, and was limited by the resolution of his captured images. Our images are much higher resolution, so even though we are limited to a modest range of applicable filter wavelengths, it is possible to select much longer phase codes with greater discrimination power. However, even if we restrict ourselves to a comparable encoding length (e.g. for a single Gabor filter of wavelength at each sample) the number of degrees of freedom of the corresponding binomial distribution is 1957 ( compared to the figure of 249 reported for iris recognition. It is important to note that this ECL is not the whole story. If we compare the graphs in figures 4 and 7, the extremely high ECL evident at very short wavelengths (e.g. ) appears to be encoding image noise and does not lead to optimal discrimination. Another important distinction between iris coding Figure 8. Plots of the mean z-scores of valid matches against the square root of the length of the encoding. References [1] D. Pizzanelli, The Future of Anti-Counterfeiting, Brand Protection and Security Packaging V, Pira International, Leatherhead, UK, 2009 [2] S. Pollard, S. Simske, G. Adams, Model based print signature profile extraction for forensic analysis of individual text glyphs, IEEE WIFS, [3] J.G. Daugman, High confidence visual recognition of persons by a test of visual phase information, IEEE PAMI, 15(11), [4] A.Sharma, L. Subramanian and E. Brewer, PaperSpeckle: microscopic fingerprinting of paper, ACM CCS, [5] J. Daugman, New methods in iris recognition, IEEE SMC, 37(5), [6] J. Daugman, Probing the uniqueness and randomness of IrisCodes: results from 200 billion comparisons, Proc. IEEE, 94(11), [7] G. Adams, Handheld Dyson Relay Lens for Anti- Counterfeiting, IEEE IST, [8] B. Lucas and T. Kanade, An iterative image registration technique with an application to stereo vision, IJCAI, [9] J. Flusser, T. Suk, and B. Zitová, Moments and Moment Invariants in Pattern Recognition, John Wiley, Chichester, UK, [10] N. Poh and S. Bengio, How do correlation and variance of base-experts affect fusion in biometric authentication tasks?, IEEE Trans. Signal Processing, 53(11), [11] R. Ulichney, M. Gaubatz, and S. Simske, Encoding information in clustered-dot halftones, IS&T NIP26, 2010.

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) www.irjaet.com ISSN (PRINT) : 2454-4744 ISSN (ONLINE): 2454-4752 Vol. 1, Issue 4, pp.240-245, November, 2015 IRIS RECOGNITION

More information

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication

More information

Experiments with An Improved Iris Segmentation Algorithm

Experiments with An Improved Iris Segmentation Algorithm Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.

More information

ANALYSIS OF PARTIAL IRIS RECOGNITION

ANALYSIS OF PARTIAL IRIS RECOGNITION ANALYSIS OF PARTIAL IRIS RECOGNITION Yingzi Du, Robert Ives, Bradford Bonney, Delores Etter Electrical Engineering Department, U.S. Naval Academy, Annapolis, MD, USA 21402 ABSTRACT In this paper, we investigate

More information

Encoding Information in Clustered-Dot Halftones

Encoding Information in Clustered-Dot Halftones Encoding Information in Clustered-Dot Halftones Robert Ulichney, Matthew Gaubatz, Steven Simske HP Laboratories HPL-2010-136 Keyword(s): Steganographic Halftone, Clustered-dot halfioning, Data-bearing

More information

A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique

A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique Ms. Priti V. Dable 1, Prof. P.R. Lakhe 2, Mr. S.S. Kemekar 3 Ms. Priti V. Dable 1 (PG Scholar) Comm (Electronics) S.D.C.E.

More information

Iris Recognition using Histogram Analysis

Iris Recognition using Histogram Analysis Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition

More information

Iris Recognition using Hamming Distance and Fragile Bit Distance

Iris Recognition using Hamming Distance and Fragile Bit Distance IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik

More information

Iris Segmentation & Recognition in Unconstrained Environment

Iris Segmentation & Recognition in Unconstrained Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT

More information

Printed Document Watermarking Using Phase Modulation

Printed Document Watermarking Using Phase Modulation 1 Printed Document Watermarking Using Phase Modulation Chabukswar Hrishikesh Department Of Computer Engineering, SBPCOE, Indapur, Maharastra, India, Pise Anil Audumbar Department Of Computer Engineering,

More information

A New Fake Iris Detection Method

A New Fake Iris Detection Method A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn

More information

1. INTRODUCTION. Appeared in: Proceedings of the SPIE Biometric Technology for Human Identification II, Vol. 5779, pp , Orlando, FL, 2005.

1. INTRODUCTION. Appeared in: Proceedings of the SPIE Biometric Technology for Human Identification II, Vol. 5779, pp , Orlando, FL, 2005. Appeared in: Proceedings of the SPIE Biometric Technology for Human Identification II, Vol. 5779, pp. 41-50, Orlando, FL, 2005. Extended depth-of-field iris recognition system for a workstation environment

More information

Image Rendering for Digital Fax

Image Rendering for Digital Fax Rendering for Digital Fax Guotong Feng a, Michael G. Fuchs b and Charles A. Bouman a a Purdue University, West Lafayette, IN b Hewlett-Packard Company, Boise, ID ABSTRACT Conventional halftoning methods

More information

Impact of out-of-focus blur on iris recognition

Impact of out-of-focus blur on iris recognition Impact of out-of-focus blur on iris recognition Nadezhda Sazonova 1, Stephanie Schuckers, Peter Johnson, Paulo Lopez-Meyer 1, Edward Sazonov 1, Lawrence Hornak 3 1 Department of Electrical and Computer

More information

IRIS Recognition Using Cumulative Sum Based Change Analysis

IRIS Recognition Using Cumulative Sum Based Change Analysis IRIS Recognition Using Cumulative Sum Based Change Analysis L.Hari.Hara.Brahma Kuppam Engineering College, Chittoor. Dr. G.N.Kodanda Ramaiah Head of Department, Kuppam Engineering College, Chittoor. Dr.M.N.Giri

More information

IRIS RECOGNITION USING GABOR

IRIS RECOGNITION USING GABOR IRIS RECOGNITION USING GABOR Shirke Swati D.. Prof.Gupta Deepak ME-COMPUTER-I Assistant Prof. ME COMPUTER CAYMT s Siddhant COE, CAYMT s Siddhant COE Sudumbare,Pune Sudumbare,Pune Abstract The iris recognition

More information

High volume security printing using sheet-fed offset press

High volume security printing using sheet-fed offset press High volume security printing using sheet-fed offset press Slavtcho (Slavi) Bonev Epyxs GmbH Richard-Wagner-Str 29, 6816 Mannheim, Germany sbonev@epyxscom Abstract: Security printing based on DataGrid

More information

Laser Surface Authentication TM : biometrics for documents and goods

Laser Surface Authentication TM : biometrics for documents and goods Laser Surface Authentication TM : biometrics for documents and goods Professor Russell Cowburn Professor of Nanotechnology, Department of Physics, Imperial College London, UK. Chief Technical Officer,

More information

Study guide for Graduate Computer Vision

Study guide for Graduate Computer Vision Study guide for Graduate Computer Vision Erik G. Learned-Miller Department of Computer Science University of Massachusetts, Amherst Amherst, MA 01003 November 23, 2011 Abstract 1 1. Know Bayes rule. What

More information

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,

More information

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.

More information

Edge-Raggedness Evaluation Using Slanted-Edge Analysis

Edge-Raggedness Evaluation Using Slanted-Edge Analysis Edge-Raggedness Evaluation Using Slanted-Edge Analysis Peter D. Burns Eastman Kodak Company, Rochester, NY USA 14650-1925 ABSTRACT The standard ISO 12233 method for the measurement of spatial frequency

More information

Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network

Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network , October 21-23, 2015, San Francisco, USA Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network Mark Erwin C. Villariña and Noel B. Linsangan, Member, IAENG Abstract

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 2nd IEEE International Conference on Biometrics - Theory, Applications and Systems (BTAS 28), Washington, DC, SEP.

More information

Copyright 2006 Society of Photo-Optical Instrumentation Engineers.

Copyright 2006 Society of Photo-Optical Instrumentation Engineers. Adam Czajka, Przemek Strzelczyk, ''Iris recognition with compact zero-crossing-based coding'', in: Ryszard S. Romaniuk (Ed.), Proceedings of SPIE - Volume 6347, Photonics Applications in Astronomy, Communications,

More information

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017) Sparsity Inspired Selection and Recognition of Iris Images 1. Dr K R Badhiti, Assistant Professor, Dept. of Computer Science, Adikavi Nannaya University, Rajahmundry, A.P, India 2. Prof. T. Sudha, Dept.

More information

Iris Recognition using Wavelet Transformation Amritpal Kaur Research Scholar GNE College, Ludhiana, Punjab (India)

Iris Recognition using Wavelet Transformation Amritpal Kaur Research Scholar GNE College, Ludhiana, Punjab (India) Iris Recognition using Wavelet Transformation Amritpal Kaur Research Scholar GNE College, Ludhiana, Punjab (India) eramritpalsaini@gmail.com Abstract: The demand for an accurate biometric system that provides

More information

Iris Recognition-based Security System with Canny Filter

Iris Recognition-based Security System with Canny Filter Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role

More information

Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches

Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Sarah E. Baker, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame {sbaker3,kwb,flynn}@cse.nd.edu

More information

PASS Sample Size Software

PASS Sample Size Software Chapter 945 Introduction This section describes the options that are available for the appearance of a histogram. A set of all these options can be stored as a template file which can be retrieved later.

More information

Inspection and authentication of color security deterrents with multiple imaging devices Jason S. Aronoff, Steven J. Simske

Inspection and authentication of color security deterrents with multiple imaging devices Jason S. Aronoff, Steven J. Simske Inspection and authentication of color security deterrents with multiple imaging devices Jason S. Aronoff, Steven J. Simske HP Laboratories HPL-2010-8 Keyword(s): Payload density, grayscale pre-compensation,

More information

ACCEPTED MANUSCRIPT. Pupil Dilation Degrades Iris Biometric Performance

ACCEPTED MANUSCRIPT. Pupil Dilation Degrades Iris Biometric Performance Accepted Manuscript Pupil Dilation Degrades Iris Biometric Performance Karen Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn Dept. of Computer Science and Engineering, University of Notre Dame Notre

More information

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

Linear Gaussian Method to Detect Blurry Digital Images using SIFT IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org

More information

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,

More information

Filtering Images in the Spatial Domain Chapter 3b G&W. Ross Whitaker (modified by Guido Gerig) School of Computing University of Utah

Filtering Images in the Spatial Domain Chapter 3b G&W. Ross Whitaker (modified by Guido Gerig) School of Computing University of Utah Filtering Images in the Spatial Domain Chapter 3b G&W Ross Whitaker (modified by Guido Gerig) School of Computing University of Utah 1 Overview Correlation and convolution Linear filtering Smoothing, kernels,

More information

Multiresolution Histograms and their Use for Texture Classification

Multiresolution Histograms and their Use for Texture Classification Multiresolution Histograms and their Use for Texture Classification E. Hadjidemetriou, M. D. Grossberg, and S. K. Nayar Computer Science, Columbia University, New York, NY 17 {stathis, mdog, nayar}@cs.columbia.edu

More information

Printer Model + Genetic Algorithm = Halftone Masks

Printer Model + Genetic Algorithm = Halftone Masks Printer Model + Genetic Algorithm = Halftone Masks Peter G. Anderson, Jonathan S. Arney, Sunadi Gunawan, Kenneth Stephens Laboratory for Applied Computing Rochester Institute of Technology Rochester, New

More information

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Swathi.K 1, Ramudu.K 2 1 M.Tech Scholar, Annamacharya Institute of Technology & Sciences, Rajampet, Andhra Pradesh, India 2 Assistant

More information

Title Goes Here Algorithms for Biometric Authentication

Title Goes Here Algorithms for Biometric Authentication Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing

More information

Fast Subsequent Color Iris Matching in large Database

Fast Subsequent Color Iris Matching in large Database www.ijcsi.org 72 Fast Subsequent Color Iris Matching in large Database Adnan Alam Khan 1, Safeeullah Soomro 2 and Irfan Hyder 3 1 PAF-KIET Department of Telecommunications, Employer of Institute of Business

More information

Multimodal Face Recognition using Hybrid Correlation Filters

Multimodal Face Recognition using Hybrid Correlation Filters Multimodal Face Recognition using Hybrid Correlation Filters Anamika Dubey, Abhishek Sharma Electrical Engineering Department, Indian Institute of Technology Roorkee, India {ana.iitr, abhisharayiya}@gmail.com

More information

Document Imaging Security and Forensics Ecosystem Considerations

Document Imaging Security and Forensics Ecosystem Considerations Document Imaging Security and Forensics Ecosystem Considerations Steven Simske, Margaret Sturgill, Guy Adams, Paul Everest HP Laboratories HPL-010-156 Keyword(s): Security, Forensics, Color Tiles, 3D Bar

More information

Camera Resolution and Distortion: Advanced Edge Fitting

Camera Resolution and Distortion: Advanced Edge Fitting 28, Society for Imaging Science and Technology Camera Resolution and Distortion: Advanced Edge Fitting Peter D. Burns; Burns Digital Imaging and Don Williams; Image Science Associates Abstract A frequently

More information

A Novel on understanding How IRIS Recognition works

A Novel on understanding How IRIS Recognition works A Novel on understanding How IRIS Recognition works Vijay Shinde Dept. of Comp. Science M.P.M. College, Bhopal, India Prof. Prakash Tanwar Asst. Professor CSE M.P.M. College, Bhopal, India Abstract- Algorithms

More information

Impeding Forgers at Photo Inception

Impeding Forgers at Photo Inception Impeding Forgers at Photo Inception Matthias Kirchner a, Peter Winkler b and Hany Farid c a International Computer Science Institute Berkeley, Berkeley, CA 97, USA b Department of Mathematics, Dartmouth

More information

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea

More information

Image Filtering in Spatial domain. Computer Vision Jia-Bin Huang, Virginia Tech

Image Filtering in Spatial domain. Computer Vision Jia-Bin Huang, Virginia Tech Image Filtering in Spatial domain Computer Vision Jia-Bin Huang, Virginia Tech Administrative stuffs Lecture schedule changes Office hours - Jia-Bin (44 Whittemore Hall) Friday at : AM 2: PM Office hours

More information

Guide to Digital and Flexographic Printing

Guide to Digital and Flexographic Printing PERFORMANCE. PACKAGED Guide to Digital and Flexographic Printing A look at the print technologies that bring your labels to life L&C LABELING & CODING Guide to Digital and Flexographic Printing Table of

More information

Iris Recognition with Fake Identification

Iris Recognition with Fake Identification Iris Recognition with Fake Identification Pradeep Kumar ECE Deptt., Vidya Vihar Institute Of Technology Maranga, Purnea, Bihar-854301, India Tel: +917870248311, Email: pra_deep_jec@yahoo.co.in Abstract

More information

CS534 Introduction to Computer Vision. Linear Filters. Ahmed Elgammal Dept. of Computer Science Rutgers University

CS534 Introduction to Computer Vision. Linear Filters. Ahmed Elgammal Dept. of Computer Science Rutgers University CS534 Introduction to Computer Vision Linear Filters Ahmed Elgammal Dept. of Computer Science Rutgers University Outlines What are Filters Linear Filters Convolution operation Properties of Linear Filters

More information

THE IMAGE REGISTRATION TECHNIQUE FOR HIGH RESOLUTION REMOTE SENSING IMAGE IN HILLY AREA

THE IMAGE REGISTRATION TECHNIQUE FOR HIGH RESOLUTION REMOTE SENSING IMAGE IN HILLY AREA THE IMAGE REGISTRATION TECHNIQUE FOR HIGH RESOLUTION REMOTE SENSING IMAGE IN HILLY AREA Gang Hong, Yun Zhang Department of Geodesy and Geomatics Engineering University of New Brunswick Fredericton, New

More information

Finding Text Regions Using Localised Measures

Finding Text Regions Using Localised Measures Finding Text Regions Using Localised Measures P. Clark and M. Mirmehdi Department of Computer Science, University of Bristol, Bristol, UK, BS8 1UB, fpclark,majidg@cs.bris.ac.uk Abstract We present a method

More information

8.2 IMAGE PROCESSING VERSUS IMAGE ANALYSIS Image processing: The collection of routines and

8.2 IMAGE PROCESSING VERSUS IMAGE ANALYSIS Image processing: The collection of routines and 8.1 INTRODUCTION In this chapter, we will study and discuss some fundamental techniques for image processing and image analysis, with a few examples of routines developed for certain purposes. 8.2 IMAGE

More information

COMP 776 Computer Vision Project Final Report Distinguishing cartoon image and paintings from photographs

COMP 776 Computer Vision Project Final Report Distinguishing cartoon image and paintings from photographs COMP 776 Computer Vision Project Final Report Distinguishing cartoon image and paintings from photographs Sang Woo Lee 1. Introduction With overwhelming large scale images on the web, we need to classify

More information

Authentication using Iris

Authentication using Iris Authentication using Iris C.S.S.Anupama Associate Professor, Dept of E.I.E, V.R.Siddhartha Engineering College, Vijayawada, A.P P.Rajesh Assistant Professor Dept of E.I.E V.R.Siddhartha Engineering College

More information

COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee

COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES Do-Guk Kim, Heung-Kyu Lee Graduate School of Information Security, KAIST Department of Computer Science, KAIST ABSTRACT Due to the

More information

Authenticated Automated Teller Machine Using Raspberry Pi

Authenticated Automated Teller Machine Using Raspberry Pi Authenticated Automated Teller Machine Using Raspberry Pi 1 P. Jegadeeshwari, 2 K.M. Haripriya, 3 P. Kalpana, 4 K. Santhini Department of Electronics and Communication, C K college of Engineering and Technology.

More information

Introduction to Machine Learning

Introduction to Machine Learning Introduction to Machine Learning Deep Learning Barnabás Póczos Credits Many of the pictures, results, and other materials are taken from: Ruslan Salakhutdinov Joshua Bengio Geoffrey Hinton Yann LeCun 2

More information

Image analysis. CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror

Image analysis. CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror Image analysis CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror A two- dimensional image can be described as a function of two variables f(x,y). For a grayscale image, the value of f(x,y) specifies the brightness

More information

Recent research results in iris biometrics

Recent research results in iris biometrics Recent research results in iris biometrics Karen Hollingsworth, Sarah Baker, Sarah Ring Kevin W. Bowyer, and Patrick J. Flynn Computer Science and Engineering Department, University of Notre Dame, Notre

More information

Iris Recognition Systems and methods

Iris Recognition Systems and methods Iris Recognition Systems and methods Jarkko Vartiainen Lappeenranta University of Technology, Department of Information Technology P.O. Box 20, 53851 Lappeenranta, Finland vartiain@lut.fi Abstract. This

More information

Automatic Morphological Segmentation and Region Growing Method of Diagnosing Medical Images

Automatic Morphological Segmentation and Region Growing Method of Diagnosing Medical Images International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 3 (2012), pp. 173-180 International Research Publications House http://www. irphouse.com Automatic Morphological

More information

Improved SIFT Matching for Image Pairs with a Scale Difference

Improved SIFT Matching for Image Pairs with a Scale Difference Improved SIFT Matching for Image Pairs with a Scale Difference Y. Bastanlar, A. Temizel and Y. Yardımcı Informatics Institute, Middle East Technical University, Ankara, 06531, Turkey Published in IET Electronics,

More information

Individuality of Fingerprints

Individuality of Fingerprints Individuality of Fingerprints Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York srihari@cedar.buffalo.edu IAI Conference, San Diego, CA

More information

Do It Yourself 3. Speckle filtering

Do It Yourself 3. Speckle filtering Do It Yourself 3 Speckle filtering The objectives of this third Do It Yourself concern the filtering of speckle in POLSAR images and its impact on data statistics. 1. SINGLE LOOK DATA STATISTICS 1.1 Data

More information

Decoding of Block Turbo Codes

Decoding of Block Turbo Codes Decoding of Block Turbo Codes Mathematical Methods for Cryptography Dedicated to Celebrate Prof. Tor Helleseth s 70 th Birthday September 4-8, 2017 Kyeongcheol Yang Pohang University of Science and Technology

More information

UNDERWATER ACOUSTIC CHANNEL ESTIMATION AND ANALYSIS

UNDERWATER ACOUSTIC CHANNEL ESTIMATION AND ANALYSIS Proceedings of the 5th Annual ISC Research Symposium ISCRS 2011 April 7, 2011, Rolla, Missouri UNDERWATER ACOUSTIC CHANNEL ESTIMATION AND ANALYSIS Jesse Cross Missouri University of Science and Technology

More information

Iris Recognition based on Local Mean Decomposition

Iris Recognition based on Local Mean Decomposition Appl. Math. Inf. Sci. 8, No. 1L, 217-222 (2014) 217 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/081l27 Iris Recognition based on Local Mean Decomposition

More information

Multiresolution Analysis of Connectivity

Multiresolution Analysis of Connectivity Multiresolution Analysis of Connectivity Atul Sajjanhar 1, Guojun Lu 2, Dengsheng Zhang 2, Tian Qi 3 1 School of Information Technology Deakin University 221 Burwood Highway Burwood, VIC 3125 Australia

More information

Biometrics and Fingerprint Authentication Technical White Paper

Biometrics and Fingerprint Authentication Technical White Paper Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical

More information

Multi-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments

Multi-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments , pp.32-36 http://dx.doi.org/10.14257/astl.2016.129.07 Multi-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments Viet Dung Do 1 and Dong-Min Woo 1 1 Department of

More information

Determining MTF with a Slant Edge Target ABSTRACT AND INTRODUCTION

Determining MTF with a Slant Edge Target ABSTRACT AND INTRODUCTION Determining MTF with a Slant Edge Target Douglas A. Kerr Issue 2 October 13, 2010 ABSTRACT AND INTRODUCTION The modulation transfer function (MTF) of a photographic lens tells us how effectively the lens

More information

Processing and Enhancement of Palm Vein Image in Vein Pattern Recognition System

Processing and Enhancement of Palm Vein Image in Vein Pattern Recognition System Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,

More information

Automatic Iris Segmentation Using Active Near Infra Red Lighting

Automatic Iris Segmentation Using Active Near Infra Red Lighting Automatic Iris Segmentation Using Active Near Infra Red Lighting Carlos H. Morimoto Thiago T. Santos Adriano S. Muniz Departamento de Ciência da Computação - IME/USP Rua do Matão, 1010, São Paulo, SP,

More information

Contrast adaptive binarization of low quality document images

Contrast adaptive binarization of low quality document images Contrast adaptive binarization of low quality document images Meng-Ling Feng a) and Yap-Peng Tan b) School of Electrical and Electronic Engineering, Nanyang Technological University, Nanyang Avenue, Singapore

More information

Robert B.Hallock Draft revised April 11, 2006 finalpaper2.doc

Robert B.Hallock Draft revised April 11, 2006 finalpaper2.doc How to Optimize the Sharpness of Your Photographic Prints: Part II - Practical Limits to Sharpness in Photography and a Useful Chart to Deteremine the Optimal f-stop. Robert B.Hallock hallock@physics.umass.edu

More information

Wavelet-based Image Splicing Forgery Detection

Wavelet-based Image Splicing Forgery Detection Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of

More information

A Study of Slanted-Edge MTF Stability and Repeatability

A Study of Slanted-Edge MTF Stability and Repeatability A Study of Slanted-Edge MTF Stability and Repeatability Jackson K.M. Roland Imatest LLC, 2995 Wilderness Place Suite 103, Boulder, CO, USA ABSTRACT The slanted-edge method of measuring the spatial frequency

More information

Migration from Contrast Transfer Function to ISO Spatial Frequency Response

Migration from Contrast Transfer Function to ISO Spatial Frequency Response IS&T's 22 PICS Conference Migration from Contrast Transfer Function to ISO 667- Spatial Frequency Response Troy D. Strausbaugh and Robert G. Gann Hewlett Packard Company Greeley, Colorado Abstract With

More information

Contrast Enhancement for Fog Degraded Video Sequences Using BPDFHE

Contrast Enhancement for Fog Degraded Video Sequences Using BPDFHE Contrast Enhancement for Fog Degraded Video Sequences Using BPDFHE C.Ramya, Dr.S.Subha Rani ECE Department,PSG College of Technology,Coimbatore, India. Abstract--- Under heavy fog condition the contrast

More information

Challenges and Potential Research Areas In Biometrics

Challenges and Potential Research Areas In Biometrics Challenges and Potential Research Areas In Biometrics Defence Research and Development Canada Qinghan Xiao and Karim Dahel Defence R&D Canada - Ottawa October 18, 2004 Recherche et développement pour la

More information

Fast identification of individuals based on iris characteristics for biometric systems

Fast identification of individuals based on iris characteristics for biometric systems Fast identification of individuals based on iris characteristics for biometric systems J.G. Rogeri, M.A. Pontes, A.S. Pereira and N. Marranghello Department of Computer Science and Statistic, IBILCE, Sao

More information

Classification in Image processing: A Survey

Classification in Image processing: A Survey Classification in Image processing: A Survey Rashmi R V, Sheela Sridhar Department of computer science and Engineering, B.N.M.I.T, Bangalore-560070 Department of computer science and Engineering, B.N.M.I.T,

More information

A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS

A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS Evren Terzi, Hasan B. Celebi, and Huseyin Arslan Department of Electrical Engineering, University of South Florida

More information

Cluster-Dot Halftoning based on the Error Diffusion with no Directional Characteristic

Cluster-Dot Halftoning based on the Error Diffusion with no Directional Characteristic Cluster-Dot Halftoning based on the Error Diffusion with no Directional Characteristic Hidemasa Nakai and Koji Nakano Abstract Digital halftoning is a process to convert a continuous-tone image into a

More information

CHANGE DETECTION BY THE IR-MAD AND KERNEL MAF METHODS IN LANDSAT TM DATA COVERING A SWEDISH FOREST REGION

CHANGE DETECTION BY THE IR-MAD AND KERNEL MAF METHODS IN LANDSAT TM DATA COVERING A SWEDISH FOREST REGION CHANGE DETECTION BY THE IR-MAD AND KERNEL MAF METHODS IN LANDSAT TM DATA COVERING A SWEDISH FOREST REGION Allan A. NIELSEN a, Håkan OLSSON b a Technical University of Denmark, National Space Institute

More information

Image Averaging for Improved Iris Recognition

Image Averaging for Improved Iris Recognition Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video

More information

Analysis and Synthesis of Texture

Analysis and Synthesis of Texture Analysis and Synthesis of Texture CMPE 264: Image Analysis and Computer Vision Hai Tao Extracting image structure by filter banks Represent image textures using the responses of a collection of filters

More information

Automated Signature Detection from Hand Movement ¹

Automated Signature Detection from Hand Movement ¹ Automated Signature Detection from Hand Movement ¹ Mladen Savov, Georgi Gluhchev Abstract: The problem of analyzing hand movements of an individual placing a signature has been studied in order to identify

More information

Why Should We Care? Everyone uses plotting But most people ignore or are unaware of simple principles Default plotting tools are not always the best

Why Should We Care? Everyone uses plotting But most people ignore or are unaware of simple principles Default plotting tools are not always the best Elementary Plots Why Should We Care? Everyone uses plotting But most people ignore or are unaware of simple principles Default plotting tools are not always the best More importantly, it is easy to lie

More information

A new quad-tree segmented image compression scheme using histogram analysis and pattern matching

A new quad-tree segmented image compression scheme using histogram analysis and pattern matching University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai A new quad-tree segmented image compression scheme using histogram analysis and pattern

More information

Real Time Word to Picture Translation for Chinese Restaurant Menus

Real Time Word to Picture Translation for Chinese Restaurant Menus Real Time Word to Picture Translation for Chinese Restaurant Menus Michelle Jin, Ling Xiao Wang, Boyang Zhang Email: mzjin12, lx2wang, boyangz @stanford.edu EE268 Project Report, Spring 2014 Abstract--We

More information

Feature Accuracy assessment of the modern industrial robot

Feature Accuracy assessment of the modern industrial robot Feature Accuracy assessment of the modern industrial robot Ken Young and Craig G. Pickin The authors Ken Young is Principal Research Fellow and Craig G. Pickin is a Research Fellow, both at Warwick University,

More information

EC-433 Digital Image Processing

EC-433 Digital Image Processing EC-433 Digital Image Processing Lecture 2 Digital Image Fundamentals Dr. Arslan Shaukat 1 Fundamental Steps in DIP Image Acquisition An image is captured by a sensor (such as a monochrome or color TV camera)

More information

Study and Analysis of Wire Antenna using Integral Equations: A MATLAB Approach

Study and Analysis of Wire Antenna using Integral Equations: A MATLAB Approach 2016 International Conference on Micro-Electronics and Telecommunication Engineering Study and Analysis of Wire Antenna using Integral Equations: A MATLAB Approach 1 Shekhar, 2 Taimoor Khan, 3 Abhishek

More information

The Statistics of Visual Representation Daniel J. Jobson *, Zia-ur Rahman, Glenn A. Woodell * * NASA Langley Research Center, Hampton, Virginia 23681

The Statistics of Visual Representation Daniel J. Jobson *, Zia-ur Rahman, Glenn A. Woodell * * NASA Langley Research Center, Hampton, Virginia 23681 The Statistics of Visual Representation Daniel J. Jobson *, Zia-ur Rahman, Glenn A. Woodell * * NASA Langley Research Center, Hampton, Virginia 23681 College of William & Mary, Williamsburg, Virginia 23187

More information

Digital Image Processing 3/e

Digital Image Processing 3/e Laboratory Projects for Digital Image Processing 3/e by Gonzalez and Woods 2008 Prentice Hall Upper Saddle River, NJ 07458 USA www.imageprocessingplace.com The following sample laboratory projects are

More information

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using

More information