Print Biometrics: Recovering Forensic Signatures from Halftone Images
|
|
- Lewis McGee
- 6 years ago
- Views:
Transcription
1 Print Biometrics: Recovering Forensic Signatures from Halftone Images Stephen Pollard, Steven Simske, Guy Adams HPL Keyword(s): document forensics; biometrics; Gabor filters; anti-counterfeiting Abstract: High-resolution imaging is useful for the forensic identification of unique printed regions. In this paper, we adapt an iris biometric approach to provide significant statistical discrimination between any two imaged halftone areas. The method is based on image registration followed by 2D Gabor wavelet encoding. Hamming Distances (HD) are used for matching. The z-scores for the comparison of like and unlike samples indicate improved identification statistics compared to both iris biometrics and previous methods of print authentication. External Posting Date: January 21, 2013 [Fulltext] Internal Posting Date: January 21, 2013 [Fulltext] Approved for External Publication Copyright 2013 Hewlett-Packard Development Company, L.P.
2 Print Biometrics: Recovering Forensic Signatures from Halftone Images Stephen Pollard Steven Simske Guy Adams Abstract High-resolution imaging is useful for the forensic identification of unique printed regions. In this paper, we adapt an iris biometric approach to provide significant statistical discrimination between any two imaged halftone areas. The method is based on image registration followed by 2D Gabor wavelet encoding. Hamming Distances (HD) are used for matching. The z-scores for the comparison of like and unlike samples indicate improved identification statistics compared to both iris biometrics and previous methods of print authentication. 1. Introduction Counterfeiting, warranty fraud, product tampering, smuggling, product diversion and other forms of organized deception are driving the need for improved brand protection. The potential for security printing and imaging to provide an extremely cost-effective forensic level of authentication is well-recognized [1]. In order to perform a forensic authentication of printed material, it is necessary use an image resolution sufficient to expose unique properties of the print that are extremely difficult to reproduce or copy. For the majority of printing technologies, these result naturally from the stochastic nature of the print process itself and its interaction with the underlying structural properties of the substrate material on which it is printed. As such they represent a unique fingerprint that can be used to authenticate individually printed items such as labels, documents, product packaging and monetary notes. Previously, we have shown that it is possible to derive a model based print signature capable of forensic levels of authentication, from the outline of solid printed material such as character glyphs, company logos or the non-payload indicia of popular 2D barcodes such as the DataMatrix or QR Code [2]. Here, we utilize a methodology borrowed from Iris Recognition [3] to derive a more general area based print biometric that can be applied to halftones images and thus greatly extend the utility and applicability of the forensic print authentication. We build on similar work [4] that related only to substrate materials and required an external method to register samples for analysis, which inhibits its adoption in practice. 2. Methodology We follow the methodology first proposed by Daugman in his 1993 paper on iris recognition [3] and expanded on in subsequent publications [5], [6]. This has become the backbone of many government and commercial biometric recognition systems; offering, as it does, the ability to robustly discriminate many billions of iris patterns. There are 3 essential elements to this form of iris recognition: i) registration of the inner and outer iris boundaries; ii) iris encoding by 2-D Gabor wavelet demodulation over normalized image coordinates; iii) testing of statistical independence between encoded feature sequences. Iris recognition differs from our print authentication task in three important regards. First, our images are captured using a specialized contact imaging device DrCID (Dyson relay CMOS Imaging Device) [7] at an almost fixed high resolution (about 7200dpi), whereas iris images are captured using traditional optics and thus vary in size over a small but significant range. Second, parts of the iris are not properly imaged due to either obscuration (by the eyelids or the eye-lashes) or specular reflections of the near IR light sources. Thus encoded features extracted from these regions must be robustly and accurately excluded from the statistical comparison process. Print images, on the other hand, do not generally suffer such imperfections and the whole of the feature sequence can be used. Finally, unique iris features can be encoded across a wide range of spatial frequencies while the random perturbations associated with printed halftones are more limited. In
3 fact, we find that above a critical frequency range image noise tends to dominate, while below this range the portrayed image content itself is dominant. 2.1 Halftone registration and coding Figure 1. The image of the Rainbow Bridge, left, is rendered as a 600dpi halftone, centre, to cover a 4mm square region which is printed on an HP LaserJet 4345 and captured, right, by our high resolution contact imaging device. Halftone patterns are registered using multi-scale gradient descent [8]. Figure 1 shows an example image, its halftone representation and a registered and de-warped high resolution capture using DrCID. For the multi-scale we normalize band pass filters (difference of successive Gaussian filtered images) to have unit standard deviation in order to minimize the difference between the stylized scaled (12x from 600 to 7200dpi) half-tone images and their printed and captured equivalents as shown in figure 2. Initial approximation is achieved using image moments [9]. Gabor filters use Cartesian coordinates and not the polar coordinates used for iris biometrics. That is ignoring orientation: where is a complex valued bit whose real and imaginary parts are either 1 or 0 depending on the sign of the 2-D integral; is the warped raw image; and are size parameters of the Gaussian envelope; the is the spatial frequency of the filter. There is an additional orientation parameter 0 which is ignored in this formulation for simplicity. Thus, for all samples each wavelet provides two bits towards the phase encoding that describes the random elements of the printed halftone. Samples can be combined spatially over an grid and through the choice of filter control parameters notably frequency and orientation. Figure 3. Shows how details of the printed versions of the same halftone differ due to inherent toner and substrate variation. Note in particular differences in the large isolated dots to the top right 2.2 Statistical testing Figure 2. Shows 3 layers of the difference of Gaussian pyramid used for image registration. Scaled (to 7200dpi) halftone (top) and printed captured image (bottom). Registration recovers the affine transform that gives the local minimum sum squared distance between the band-pass filtered images. It is used to dewarp the captured image prior to 2-D Gabor wavelet encoding. Examples of detail from registered halftone images (in this case an HP Logo) are shown in figure 3. It is clear that while the carrier signal (the HP Logo) is preserved, high frequency modulation due to the random nature of some print processes is also evident. Following Daugman s methodology, the random signal is demodulated to extract its phase information using quadrature 2-D Gabor wavelets. In our case the In Daugman s method statistical independence is tested using the norm of the Boolean XOR operator applied to the complete code vectors. This is represented as a fractional Hamming Distance (HD) by dividing by the code length. (N.B. This is complicated, in the case of iris imaging, by the need to include a mask to represent the valid portions of the code that are free from obscuration and specular reflection.) Provided any given bit in the phase code is equally likely to be 1 or 0 and the phase codes are uncorrelated, the expected value of HD = 0.5. For iris images the lack of correlation for different eyes is true across a wide range of spatial scales, while for halftone images it is clearly the case that at lower frequencies the different halftone images (which convey the same subject matter) are closely correlated. In fact, figure 4 shows the results of an experiment in which we collect 48 images of different printed halftones (all of the Rainbow Bridge) and perform all 1128 possible false comparisons plotting mean HD against the wavelength of a single 2-D Gabor filter sampled over an grid (12.8Kbits phase code). As gets
4 larger the phase coded vector becomes increasingly correlated and the mean HD drops accordingly. Figure 4. Plot of mean HD (with error bars) and effective code length for 1128 pairs of different halftone prints against the wavelength of the Gabor filter. Figure 5 shows the histogram of HD for pixels, with mean and standard deviation for which the corresponding probability density function (PDF) is binomial having degrees of freedom. This is less than the 12.8K bits in the phase code due to internal correlations amongst the otherwise random trials. This represents the effective code length (ECL) and is also plotted in figure 4 for other wavelengths. Binomial distributions of this size are reasonably approximated by Gaussian for which standard scores (z-scores) are well defined and provide a convenient shorthand for the probability that the null hypothesis is violated by chance. This provides a simple robustness estimate as to whether two phase codes are in fact derived from the same printed halftone. For example an HD of 0.3 or less has a probability of approximately 2x according to the binomial distribution while it corresponds to a z- score of 32.5 which relates to a cumulative probability on the normal distribution of about 5x (which represents a modest overestimate of the actual probability as both are infinitesimally small). 3. Results We have printed a number of sequences of identical halftone images small enough (4mm square) to be captured by DrCID. Each print is captured twice (using different DrCID imagers) in order to compare the HD scores of valid matches with those of the binomially distributed statistically independent false matches. For brevity, the results presented here are for the Rainbow Bridge image introduced in figure 1. However, similar results are obtained for a range of image content including the HP Logo shown (detail) in figure 3. Figure 5. Distribution of HDs for all possible comparisons of phase codes for pairs of different halftone images for a single =8 and =0 with M=80 2-D Gabor filter. Figure 6 shows a scatter plot of the HD scores of the valid matches of the 48 printed halftones along with the binomial PDF from figure 5 (shown rotated). As can be seen the HD s are in fact all well separated from the false match population with minimum z-score of and an average z-score of While our sample size is relatively small these levels of statistical robustness are staggering even in the context of iris recognition (which is able to discriminate amongst many billions of comparisons [6]). Figure 6. Scatter plot of HD scores of valid matches. Figure 7 plots summary statistics as we vary just the wavelength of the Gabor filter but keep all other parameters constant. As well as plotting the min, max and mean z-scores of the population of 48 correct matches we also plot the less informative z- score of equal error rate [10] which marks the point at which false positives and negatives are equally likely. It is clear that the large standard deviation of the relatively small sample of valid matches tends to dominate this error statistic including as it does all forms of imaging and
5 experimenter error. and halftone coding is that the former is almost circularly symmetric and requires some alignment to compute minimum HD values. Halftone patterns, on the other hand, can be chosen to uniquely resolve the orientation of the code; thus increasing further the disambiguating power of the statistical test. More importantly, printed information can readily be associated with a unique document serial number (e.g. printed in a barcode) which transforms the search task to a statistically more powerful identification check. It is also possible for this information to be encoded in the halftone itself [11]. Figure 7. Plots of the z-scores of valid matches against the wavelength of the Gabor filter. Figure 7 shows that, as discussed previously, there is a relatively small range of wavelength that gives extremely good statistical robustness using a single 2- D Gabor filter. In figure 8 we plot the average z-score as we vary the code length (SQRT of the number of bits) by varying the sampling frequency (M) and the number of independent wavelets that contribute to the phase code at each location. Specifically, we use up to 4 orientations and 3 wavelengths to encode the halftone. Note that increasing the sampling frequency of a single wavelet plateaus out soon after the (i.e bits) as the samples become spatially correlated. Adding multiple orientation provides the biggest improvement (with average z-score increasing all the way to 114 for bits) as they are most statistically independent. 4. Discussion In his work on iris recognition, Daugman [3] used a 2Kbit (256 Byte) code to represent each iris. This code size was chosen for pragmatic reasons, and was limited by the resolution of his captured images. Our images are much higher resolution, so even though we are limited to a modest range of applicable filter wavelengths, it is possible to select much longer phase codes with greater discrimination power. However, even if we restrict ourselves to a comparable encoding length (e.g. for a single Gabor filter of wavelength at each sample) the number of degrees of freedom of the corresponding binomial distribution is 1957 ( compared to the figure of 249 reported for iris recognition. It is important to note that this ECL is not the whole story. If we compare the graphs in figures 4 and 7, the extremely high ECL evident at very short wavelengths (e.g. ) appears to be encoding image noise and does not lead to optimal discrimination. Another important distinction between iris coding Figure 8. Plots of the mean z-scores of valid matches against the square root of the length of the encoding. References [1] D. Pizzanelli, The Future of Anti-Counterfeiting, Brand Protection and Security Packaging V, Pira International, Leatherhead, UK, 2009 [2] S. Pollard, S. Simske, G. Adams, Model based print signature profile extraction for forensic analysis of individual text glyphs, IEEE WIFS, [3] J.G. Daugman, High confidence visual recognition of persons by a test of visual phase information, IEEE PAMI, 15(11), [4] A.Sharma, L. Subramanian and E. Brewer, PaperSpeckle: microscopic fingerprinting of paper, ACM CCS, [5] J. Daugman, New methods in iris recognition, IEEE SMC, 37(5), [6] J. Daugman, Probing the uniqueness and randomness of IrisCodes: results from 200 billion comparisons, Proc. IEEE, 94(11), [7] G. Adams, Handheld Dyson Relay Lens for Anti- Counterfeiting, IEEE IST, [8] B. Lucas and T. Kanade, An iterative image registration technique with an application to stereo vision, IJCAI, [9] J. Flusser, T. Suk, and B. Zitová, Moments and Moment Invariants in Pattern Recognition, John Wiley, Chichester, UK, [10] N. Poh and S. Bengio, How do correlation and variance of base-experts affect fusion in biometric authentication tasks?, IEEE Trans. Signal Processing, 53(11), [11] R. Ulichney, M. Gaubatz, and S. Simske, Encoding information in clustered-dot halftones, IS&T NIP26, 2010.
INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)
INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) www.irjaet.com ISSN (PRINT) : 2454-4744 ISSN (ONLINE): 2454-4752 Vol. 1, Issue 4, pp.240-245, November, 2015 IRIS RECOGNITION
More informationAn Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression
An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication
More informationExperiments with An Improved Iris Segmentation Algorithm
Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.
More informationANALYSIS OF PARTIAL IRIS RECOGNITION
ANALYSIS OF PARTIAL IRIS RECOGNITION Yingzi Du, Robert Ives, Bradford Bonney, Delores Etter Electrical Engineering Department, U.S. Naval Academy, Annapolis, MD, USA 21402 ABSTRACT In this paper, we investigate
More informationEncoding Information in Clustered-Dot Halftones
Encoding Information in Clustered-Dot Halftones Robert Ulichney, Matthew Gaubatz, Steven Simske HP Laboratories HPL-2010-136 Keyword(s): Steganographic Halftone, Clustered-dot halfioning, Data-bearing
More informationA Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique
A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique Ms. Priti V. Dable 1, Prof. P.R. Lakhe 2, Mr. S.S. Kemekar 3 Ms. Priti V. Dable 1 (PG Scholar) Comm (Electronics) S.D.C.E.
More informationIris Recognition using Histogram Analysis
Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition
More informationIris Recognition using Hamming Distance and Fragile Bit Distance
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik
More informationIris Segmentation & Recognition in Unconstrained Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT
More informationPrinted Document Watermarking Using Phase Modulation
1 Printed Document Watermarking Using Phase Modulation Chabukswar Hrishikesh Department Of Computer Engineering, SBPCOE, Indapur, Maharastra, India, Pise Anil Audumbar Department Of Computer Engineering,
More informationA New Fake Iris Detection Method
A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn
More information1. INTRODUCTION. Appeared in: Proceedings of the SPIE Biometric Technology for Human Identification II, Vol. 5779, pp , Orlando, FL, 2005.
Appeared in: Proceedings of the SPIE Biometric Technology for Human Identification II, Vol. 5779, pp. 41-50, Orlando, FL, 2005. Extended depth-of-field iris recognition system for a workstation environment
More informationImage Rendering for Digital Fax
Rendering for Digital Fax Guotong Feng a, Michael G. Fuchs b and Charles A. Bouman a a Purdue University, West Lafayette, IN b Hewlett-Packard Company, Boise, ID ABSTRACT Conventional halftoning methods
More informationImpact of out-of-focus blur on iris recognition
Impact of out-of-focus blur on iris recognition Nadezhda Sazonova 1, Stephanie Schuckers, Peter Johnson, Paulo Lopez-Meyer 1, Edward Sazonov 1, Lawrence Hornak 3 1 Department of Electrical and Computer
More informationIRIS Recognition Using Cumulative Sum Based Change Analysis
IRIS Recognition Using Cumulative Sum Based Change Analysis L.Hari.Hara.Brahma Kuppam Engineering College, Chittoor. Dr. G.N.Kodanda Ramaiah Head of Department, Kuppam Engineering College, Chittoor. Dr.M.N.Giri
More informationIRIS RECOGNITION USING GABOR
IRIS RECOGNITION USING GABOR Shirke Swati D.. Prof.Gupta Deepak ME-COMPUTER-I Assistant Prof. ME COMPUTER CAYMT s Siddhant COE, CAYMT s Siddhant COE Sudumbare,Pune Sudumbare,Pune Abstract The iris recognition
More informationHigh volume security printing using sheet-fed offset press
High volume security printing using sheet-fed offset press Slavtcho (Slavi) Bonev Epyxs GmbH Richard-Wagner-Str 29, 6816 Mannheim, Germany sbonev@epyxscom Abstract: Security printing based on DataGrid
More informationLaser Surface Authentication TM : biometrics for documents and goods
Laser Surface Authentication TM : biometrics for documents and goods Professor Russell Cowburn Professor of Nanotechnology, Department of Physics, Imperial College London, UK. Chief Technical Officer,
More informationStudy guide for Graduate Computer Vision
Study guide for Graduate Computer Vision Erik G. Learned-Miller Department of Computer Science University of Massachusetts, Amherst Amherst, MA 01003 November 23, 2011 Abstract 1 1. Know Bayes rule. What
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationIMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION
IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.
More informationEdge-Raggedness Evaluation Using Slanted-Edge Analysis
Edge-Raggedness Evaluation Using Slanted-Edge Analysis Peter D. Burns Eastman Kodak Company, Rochester, NY USA 14650-1925 ABSTRACT The standard ISO 12233 method for the measurement of spatial frequency
More informationPalm Vein Recognition System using Directional Coding and Back-propagation Neural Network
, October 21-23, 2015, San Francisco, USA Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network Mark Erwin C. Villariña and Noel B. Linsangan, Member, IAENG Abstract
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 2nd IEEE International Conference on Biometrics - Theory, Applications and Systems (BTAS 28), Washington, DC, SEP.
More informationCopyright 2006 Society of Photo-Optical Instrumentation Engineers.
Adam Czajka, Przemek Strzelczyk, ''Iris recognition with compact zero-crossing-based coding'', in: Ryszard S. Romaniuk (Ed.), Proceedings of SPIE - Volume 6347, Photonics Applications in Astronomy, Communications,
More informationIntroduction to Video Forgery Detection: Part I
Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,
More informationInternational Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)
Sparsity Inspired Selection and Recognition of Iris Images 1. Dr K R Badhiti, Assistant Professor, Dept. of Computer Science, Adikavi Nannaya University, Rajahmundry, A.P, India 2. Prof. T. Sudha, Dept.
More informationIris Recognition using Wavelet Transformation Amritpal Kaur Research Scholar GNE College, Ludhiana, Punjab (India)
Iris Recognition using Wavelet Transformation Amritpal Kaur Research Scholar GNE College, Ludhiana, Punjab (India) eramritpalsaini@gmail.com Abstract: The demand for an accurate biometric system that provides
More informationIris Recognition-based Security System with Canny Filter
Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role
More informationEmpirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches
Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Sarah E. Baker, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame {sbaker3,kwb,flynn}@cse.nd.edu
More informationPASS Sample Size Software
Chapter 945 Introduction This section describes the options that are available for the appearance of a histogram. A set of all these options can be stored as a template file which can be retrieved later.
More informationInspection and authentication of color security deterrents with multiple imaging devices Jason S. Aronoff, Steven J. Simske
Inspection and authentication of color security deterrents with multiple imaging devices Jason S. Aronoff, Steven J. Simske HP Laboratories HPL-2010-8 Keyword(s): Payload density, grayscale pre-compensation,
More informationACCEPTED MANUSCRIPT. Pupil Dilation Degrades Iris Biometric Performance
Accepted Manuscript Pupil Dilation Degrades Iris Biometric Performance Karen Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn Dept. of Computer Science and Engineering, University of Notre Dame Notre
More informationLinear Gaussian Method to Detect Blurry Digital Images using SIFT
IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org
More informationComparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners
Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,
More informationFiltering Images in the Spatial Domain Chapter 3b G&W. Ross Whitaker (modified by Guido Gerig) School of Computing University of Utah
Filtering Images in the Spatial Domain Chapter 3b G&W Ross Whitaker (modified by Guido Gerig) School of Computing University of Utah 1 Overview Correlation and convolution Linear filtering Smoothing, kernels,
More informationMultiresolution Histograms and their Use for Texture Classification
Multiresolution Histograms and their Use for Texture Classification E. Hadjidemetriou, M. D. Grossberg, and S. K. Nayar Computer Science, Columbia University, New York, NY 17 {stathis, mdog, nayar}@cs.columbia.edu
More informationPrinter Model + Genetic Algorithm = Halftone Masks
Printer Model + Genetic Algorithm = Halftone Masks Peter G. Anderson, Jonathan S. Arney, Sunadi Gunawan, Kenneth Stephens Laboratory for Applied Computing Rochester Institute of Technology Rochester, New
More informationRobust Invisible QR Code Image Watermarking Algorithm in SWT Domain
Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Swathi.K 1, Ramudu.K 2 1 M.Tech Scholar, Annamacharya Institute of Technology & Sciences, Rajampet, Andhra Pradesh, India 2 Assistant
More informationTitle Goes Here Algorithms for Biometric Authentication
Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing
More informationFast Subsequent Color Iris Matching in large Database
www.ijcsi.org 72 Fast Subsequent Color Iris Matching in large Database Adnan Alam Khan 1, Safeeullah Soomro 2 and Irfan Hyder 3 1 PAF-KIET Department of Telecommunications, Employer of Institute of Business
More informationMultimodal Face Recognition using Hybrid Correlation Filters
Multimodal Face Recognition using Hybrid Correlation Filters Anamika Dubey, Abhishek Sharma Electrical Engineering Department, Indian Institute of Technology Roorkee, India {ana.iitr, abhisharayiya}@gmail.com
More informationDocument Imaging Security and Forensics Ecosystem Considerations
Document Imaging Security and Forensics Ecosystem Considerations Steven Simske, Margaret Sturgill, Guy Adams, Paul Everest HP Laboratories HPL-010-156 Keyword(s): Security, Forensics, Color Tiles, 3D Bar
More informationCamera Resolution and Distortion: Advanced Edge Fitting
28, Society for Imaging Science and Technology Camera Resolution and Distortion: Advanced Edge Fitting Peter D. Burns; Burns Digital Imaging and Don Williams; Image Science Associates Abstract A frequently
More informationA Novel on understanding How IRIS Recognition works
A Novel on understanding How IRIS Recognition works Vijay Shinde Dept. of Comp. Science M.P.M. College, Bhopal, India Prof. Prakash Tanwar Asst. Professor CSE M.P.M. College, Bhopal, India Abstract- Algorithms
More informationImpeding Forgers at Photo Inception
Impeding Forgers at Photo Inception Matthias Kirchner a, Peter Winkler b and Hany Farid c a International Computer Science Institute Berkeley, Berkeley, CA 97, USA b Department of Mathematics, Dartmouth
More informationAlgorithm for Detection and Elimination of False Minutiae in Fingerprint Images
Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea
More informationImage Filtering in Spatial domain. Computer Vision Jia-Bin Huang, Virginia Tech
Image Filtering in Spatial domain Computer Vision Jia-Bin Huang, Virginia Tech Administrative stuffs Lecture schedule changes Office hours - Jia-Bin (44 Whittemore Hall) Friday at : AM 2: PM Office hours
More informationGuide to Digital and Flexographic Printing
PERFORMANCE. PACKAGED Guide to Digital and Flexographic Printing A look at the print technologies that bring your labels to life L&C LABELING & CODING Guide to Digital and Flexographic Printing Table of
More informationIris Recognition with Fake Identification
Iris Recognition with Fake Identification Pradeep Kumar ECE Deptt., Vidya Vihar Institute Of Technology Maranga, Purnea, Bihar-854301, India Tel: +917870248311, Email: pra_deep_jec@yahoo.co.in Abstract
More informationCS534 Introduction to Computer Vision. Linear Filters. Ahmed Elgammal Dept. of Computer Science Rutgers University
CS534 Introduction to Computer Vision Linear Filters Ahmed Elgammal Dept. of Computer Science Rutgers University Outlines What are Filters Linear Filters Convolution operation Properties of Linear Filters
More informationTHE IMAGE REGISTRATION TECHNIQUE FOR HIGH RESOLUTION REMOTE SENSING IMAGE IN HILLY AREA
THE IMAGE REGISTRATION TECHNIQUE FOR HIGH RESOLUTION REMOTE SENSING IMAGE IN HILLY AREA Gang Hong, Yun Zhang Department of Geodesy and Geomatics Engineering University of New Brunswick Fredericton, New
More informationFinding Text Regions Using Localised Measures
Finding Text Regions Using Localised Measures P. Clark and M. Mirmehdi Department of Computer Science, University of Bristol, Bristol, UK, BS8 1UB, fpclark,majidg@cs.bris.ac.uk Abstract We present a method
More information8.2 IMAGE PROCESSING VERSUS IMAGE ANALYSIS Image processing: The collection of routines and
8.1 INTRODUCTION In this chapter, we will study and discuss some fundamental techniques for image processing and image analysis, with a few examples of routines developed for certain purposes. 8.2 IMAGE
More informationCOMP 776 Computer Vision Project Final Report Distinguishing cartoon image and paintings from photographs
COMP 776 Computer Vision Project Final Report Distinguishing cartoon image and paintings from photographs Sang Woo Lee 1. Introduction With overwhelming large scale images on the web, we need to classify
More informationAuthentication using Iris
Authentication using Iris C.S.S.Anupama Associate Professor, Dept of E.I.E, V.R.Siddhartha Engineering College, Vijayawada, A.P P.Rajesh Assistant Professor Dept of E.I.E V.R.Siddhartha Engineering College
More informationCOLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee
COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES Do-Guk Kim, Heung-Kyu Lee Graduate School of Information Security, KAIST Department of Computer Science, KAIST ABSTRACT Due to the
More informationAuthenticated Automated Teller Machine Using Raspberry Pi
Authenticated Automated Teller Machine Using Raspberry Pi 1 P. Jegadeeshwari, 2 K.M. Haripriya, 3 P. Kalpana, 4 K. Santhini Department of Electronics and Communication, C K college of Engineering and Technology.
More informationIntroduction to Machine Learning
Introduction to Machine Learning Deep Learning Barnabás Póczos Credits Many of the pictures, results, and other materials are taken from: Ruslan Salakhutdinov Joshua Bengio Geoffrey Hinton Yann LeCun 2
More informationImage analysis. CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror
Image analysis CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror A two- dimensional image can be described as a function of two variables f(x,y). For a grayscale image, the value of f(x,y) specifies the brightness
More informationRecent research results in iris biometrics
Recent research results in iris biometrics Karen Hollingsworth, Sarah Baker, Sarah Ring Kevin W. Bowyer, and Patrick J. Flynn Computer Science and Engineering Department, University of Notre Dame, Notre
More informationIris Recognition Systems and methods
Iris Recognition Systems and methods Jarkko Vartiainen Lappeenranta University of Technology, Department of Information Technology P.O. Box 20, 53851 Lappeenranta, Finland vartiain@lut.fi Abstract. This
More informationAutomatic Morphological Segmentation and Region Growing Method of Diagnosing Medical Images
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 3 (2012), pp. 173-180 International Research Publications House http://www. irphouse.com Automatic Morphological
More informationImproved SIFT Matching for Image Pairs with a Scale Difference
Improved SIFT Matching for Image Pairs with a Scale Difference Y. Bastanlar, A. Temizel and Y. Yardımcı Informatics Institute, Middle East Technical University, Ankara, 06531, Turkey Published in IET Electronics,
More informationIndividuality of Fingerprints
Individuality of Fingerprints Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York srihari@cedar.buffalo.edu IAI Conference, San Diego, CA
More informationDo It Yourself 3. Speckle filtering
Do It Yourself 3 Speckle filtering The objectives of this third Do It Yourself concern the filtering of speckle in POLSAR images and its impact on data statistics. 1. SINGLE LOOK DATA STATISTICS 1.1 Data
More informationDecoding of Block Turbo Codes
Decoding of Block Turbo Codes Mathematical Methods for Cryptography Dedicated to Celebrate Prof. Tor Helleseth s 70 th Birthday September 4-8, 2017 Kyeongcheol Yang Pohang University of Science and Technology
More informationUNDERWATER ACOUSTIC CHANNEL ESTIMATION AND ANALYSIS
Proceedings of the 5th Annual ISC Research Symposium ISCRS 2011 April 7, 2011, Rolla, Missouri UNDERWATER ACOUSTIC CHANNEL ESTIMATION AND ANALYSIS Jesse Cross Missouri University of Science and Technology
More informationIris Recognition based on Local Mean Decomposition
Appl. Math. Inf. Sci. 8, No. 1L, 217-222 (2014) 217 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/081l27 Iris Recognition based on Local Mean Decomposition
More informationMultiresolution Analysis of Connectivity
Multiresolution Analysis of Connectivity Atul Sajjanhar 1, Guojun Lu 2, Dengsheng Zhang 2, Tian Qi 3 1 School of Information Technology Deakin University 221 Burwood Highway Burwood, VIC 3125 Australia
More informationBiometrics and Fingerprint Authentication Technical White Paper
Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical
More informationMulti-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments
, pp.32-36 http://dx.doi.org/10.14257/astl.2016.129.07 Multi-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments Viet Dung Do 1 and Dong-Min Woo 1 1 Department of
More informationDetermining MTF with a Slant Edge Target ABSTRACT AND INTRODUCTION
Determining MTF with a Slant Edge Target Douglas A. Kerr Issue 2 October 13, 2010 ABSTRACT AND INTRODUCTION The modulation transfer function (MTF) of a photographic lens tells us how effectively the lens
More informationProcessing and Enhancement of Palm Vein Image in Vein Pattern Recognition System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
More informationAutomatic Iris Segmentation Using Active Near Infra Red Lighting
Automatic Iris Segmentation Using Active Near Infra Red Lighting Carlos H. Morimoto Thiago T. Santos Adriano S. Muniz Departamento de Ciência da Computação - IME/USP Rua do Matão, 1010, São Paulo, SP,
More informationContrast adaptive binarization of low quality document images
Contrast adaptive binarization of low quality document images Meng-Ling Feng a) and Yap-Peng Tan b) School of Electrical and Electronic Engineering, Nanyang Technological University, Nanyang Avenue, Singapore
More informationRobert B.Hallock Draft revised April 11, 2006 finalpaper2.doc
How to Optimize the Sharpness of Your Photographic Prints: Part II - Practical Limits to Sharpness in Photography and a Useful Chart to Deteremine the Optimal f-stop. Robert B.Hallock hallock@physics.umass.edu
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationA Study of Slanted-Edge MTF Stability and Repeatability
A Study of Slanted-Edge MTF Stability and Repeatability Jackson K.M. Roland Imatest LLC, 2995 Wilderness Place Suite 103, Boulder, CO, USA ABSTRACT The slanted-edge method of measuring the spatial frequency
More informationMigration from Contrast Transfer Function to ISO Spatial Frequency Response
IS&T's 22 PICS Conference Migration from Contrast Transfer Function to ISO 667- Spatial Frequency Response Troy D. Strausbaugh and Robert G. Gann Hewlett Packard Company Greeley, Colorado Abstract With
More informationContrast Enhancement for Fog Degraded Video Sequences Using BPDFHE
Contrast Enhancement for Fog Degraded Video Sequences Using BPDFHE C.Ramya, Dr.S.Subha Rani ECE Department,PSG College of Technology,Coimbatore, India. Abstract--- Under heavy fog condition the contrast
More informationChallenges and Potential Research Areas In Biometrics
Challenges and Potential Research Areas In Biometrics Defence Research and Development Canada Qinghan Xiao and Karim Dahel Defence R&D Canada - Ottawa October 18, 2004 Recherche et développement pour la
More informationFast identification of individuals based on iris characteristics for biometric systems
Fast identification of individuals based on iris characteristics for biometric systems J.G. Rogeri, M.A. Pontes, A.S. Pereira and N. Marranghello Department of Computer Science and Statistic, IBILCE, Sao
More informationClassification in Image processing: A Survey
Classification in Image processing: A Survey Rashmi R V, Sheela Sridhar Department of computer science and Engineering, B.N.M.I.T, Bangalore-560070 Department of computer science and Engineering, B.N.M.I.T,
More informationA JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS
A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS Evren Terzi, Hasan B. Celebi, and Huseyin Arslan Department of Electrical Engineering, University of South Florida
More informationCluster-Dot Halftoning based on the Error Diffusion with no Directional Characteristic
Cluster-Dot Halftoning based on the Error Diffusion with no Directional Characteristic Hidemasa Nakai and Koji Nakano Abstract Digital halftoning is a process to convert a continuous-tone image into a
More informationCHANGE DETECTION BY THE IR-MAD AND KERNEL MAF METHODS IN LANDSAT TM DATA COVERING A SWEDISH FOREST REGION
CHANGE DETECTION BY THE IR-MAD AND KERNEL MAF METHODS IN LANDSAT TM DATA COVERING A SWEDISH FOREST REGION Allan A. NIELSEN a, Håkan OLSSON b a Technical University of Denmark, National Space Institute
More informationImage Averaging for Improved Iris Recognition
Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video
More informationAnalysis and Synthesis of Texture
Analysis and Synthesis of Texture CMPE 264: Image Analysis and Computer Vision Hai Tao Extracting image structure by filter banks Represent image textures using the responses of a collection of filters
More informationAutomated Signature Detection from Hand Movement ¹
Automated Signature Detection from Hand Movement ¹ Mladen Savov, Georgi Gluhchev Abstract: The problem of analyzing hand movements of an individual placing a signature has been studied in order to identify
More informationWhy Should We Care? Everyone uses plotting But most people ignore or are unaware of simple principles Default plotting tools are not always the best
Elementary Plots Why Should We Care? Everyone uses plotting But most people ignore or are unaware of simple principles Default plotting tools are not always the best More importantly, it is easy to lie
More informationA new quad-tree segmented image compression scheme using histogram analysis and pattern matching
University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai A new quad-tree segmented image compression scheme using histogram analysis and pattern
More informationReal Time Word to Picture Translation for Chinese Restaurant Menus
Real Time Word to Picture Translation for Chinese Restaurant Menus Michelle Jin, Ling Xiao Wang, Boyang Zhang Email: mzjin12, lx2wang, boyangz @stanford.edu EE268 Project Report, Spring 2014 Abstract--We
More informationFeature Accuracy assessment of the modern industrial robot
Feature Accuracy assessment of the modern industrial robot Ken Young and Craig G. Pickin The authors Ken Young is Principal Research Fellow and Craig G. Pickin is a Research Fellow, both at Warwick University,
More informationEC-433 Digital Image Processing
EC-433 Digital Image Processing Lecture 2 Digital Image Fundamentals Dr. Arslan Shaukat 1 Fundamental Steps in DIP Image Acquisition An image is captured by a sensor (such as a monochrome or color TV camera)
More informationStudy and Analysis of Wire Antenna using Integral Equations: A MATLAB Approach
2016 International Conference on Micro-Electronics and Telecommunication Engineering Study and Analysis of Wire Antenna using Integral Equations: A MATLAB Approach 1 Shekhar, 2 Taimoor Khan, 3 Abhishek
More informationThe Statistics of Visual Representation Daniel J. Jobson *, Zia-ur Rahman, Glenn A. Woodell * * NASA Langley Research Center, Hampton, Virginia 23681
The Statistics of Visual Representation Daniel J. Jobson *, Zia-ur Rahman, Glenn A. Woodell * * NASA Langley Research Center, Hampton, Virginia 23681 College of William & Mary, Williamsburg, Virginia 23187
More informationDigital Image Processing 3/e
Laboratory Projects for Digital Image Processing 3/e by Gonzalez and Woods 2008 Prentice Hall Upper Saddle River, NJ 07458 USA www.imageprocessingplace.com The following sample laboratory projects are
More informationReversible data hiding based on histogram modification using S-type and Hilbert curve scanning
Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using
More information