Two novel characteristics in palmprint verification: datum point invariance and line feature matching

Size: px
Start display at page:

Download "Two novel characteristics in palmprint verification: datum point invariance and line feature matching"

Transcription

1 Pattern Recognition 32 (1999) Two novel characteristics in palmprint verification: datum point invariance and line feature matching Dapeng Zhang*, Wei Shu Department of Computing, Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong Received 9 December 1997; in revised form 16 July 1998 Abstract As the first attempt of automatic personal identification by palmprint, in this paper, two novel characteristics, datum point invariance and line feature matching, are presented in palmprint verification. The datum points of palmprint, which have the remarkable advantage of invariable location, are defined and their determination using the directional projection algorithm is developed. Then, line feature extraction and line matching are proposed to detect whether a couple of palmprints are from the same palm. Various palmprint images have been tested to illustrate the effectiveness of the palmprint verification with both characteristics Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved. Keywords: Biometrics; Personal identification; Palmprint verification; Feature extraction; Line matching 1. Introduction Palmprint, as well as fingerprint which has been utilized as a positive human identifier for more than 100 years, is still considered as one of the most reliable means distinguishing a man from his fellows because of its stability and uniqueness. Although law enforcement agencies use human prints (both fingerprints and palmprints) routinely for criminal identification, human prints can provide an unequalled method of personal identification for various other areas such as access control for high security installations, credit card usage verification and employee identification [1 2]. Fingerprint identification is the most widespread application of biometric *Corresponding author. Tel.: (852) ; Fax: (852) ; csdzhang@comp.polyu.edu.hk technology. However, it is a difficult task to extract some small unique features (known as minutiae) from the fingers of elderly people as well as manual labourers [3, 4]. As a result, it is necessary to develop a new technique of automatic personal identification by palmprint. Palm is the inner-surface of the hand between the wrist and the fingers (see Fig. 1). There are usually three principal lines made by flexing the hand and wrist in the palm, which are named as heart line, head line, and life line, respectively [5]. Two endpoints, a and b, are obtained by the principal lines (life line and heart line) which intersect both sides of the palm. Owing to the stability of the principal lines, the endpoints and their midpoint o remain unchanged day in and day out. Some significant properties can be defined in the following: (1) the locations of the endpoints and their midpoint are rotation invariant in a palmprint; (2) a sole two-dimensional right angle coordinate system can be established, of which the /99/$ see front matter 1999 Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved. PII: S ( 9 8 )

2 692 D. Zhang, W. Shu / Pattern Recognition 32 (1999) features could be listed as follows: Fig. 1. Definitions of a palmprint: principal lines (1 heart line, 2 head line and 3 life line), regions (I finger-root region, II inside region and III outside region) and datum points (a, b-endpoint, o-their midpoint). Fig. 2. Geometry features and delta point features of a palmprint, where c d is the perpendicular bisector of segment a b and points 1 5 are delta points. origin is the midpoint o and the main axis passes through the endpoints; (3) a palm can be divided into three regions, including finger-root region (I), inside region (II) and outside region (III) by some connections between the endpoints and their perpendicular bisector; (4) the size of a palm can be uniquely estimated by both the Euclidean distance between two endpoints and the length of their perpendicular bisector in the palm (segment c d in Fig. 2). In this way, the pair of endpoints and their midpoint will act as the important datum points in the palmprint identification because of their invariable locations. In addition to the datum points, there still exists rich and useful information in a palmprint. Some kinds of Geometry features: According to the palm s shape, we can easily get the corresponding geometry features, such as width, length and area. Principal line features: Both location and form of principal lines in a palmprint are very important physiological characteristics to identify individual because they vary little from time to time. ¼rinkle features: In a palmprint, there are many wrinkles which are different from the principal lines in that they are thinner and more irregular. They are classified as coarse wrinkles and fine wrinkles so that more features in detail can be acquired. Delta point features: Delta point is defined as the center of a delta-like region in the palmprint. It is shown that there are always some delta points located in fingerroot region and outside region (e.g. 1 5 in Fig. 2). This makes it possible to obtain these features and well establish the stability and uniqueness. Minutiae features: A palmprint is basically composed of the ridges, hence the minutiae features can be used as a significant measurement. In general, geometry features, principal line features and wrinkle features can be derived from the image with low resolution, even low quality. Delta points can be located in the directional image and their features will be procured from a fine resolution palmprint image in case of the presence of noise in it [6, 7]. Nevertheless, minutiae features are detected only from a high quality and fine resolution image. Palmprint verification, which is to determine whether two palmprints are from the same palm, can apply the physical features mentioned above in principle. However, both delta point and minutiae features only can be obtained in fine resolution image. In addition, geometry features are easily captured so that a fake palm could be created [2]. As a new biometric technology, we will adopt some significant features called line feature (such as principal lines and coarse wrinkles) in palmprint verification. Compared with fingerprint identification, which is a point matching process [3], this palmprint verification by using line feature matching is effective in the following respects: (1) it can be used on the image with low spatial resolution so that the size of a palmprint image can be reduced, even it is comparable to that of a fingerprint image; (2) significant features can be determined in case of the presence of noise because of feature extraction relied on low spatial resolution; (3) palmprint verification is a line matching process, which has several advantages over point matching since a line has more information than a point [8]. In addition, the singular points, namely the core and the delta points, are used as points of registration for comparing minutiae in fingerprints [6]. However, the effective method to detect these

3 structural features makes use of directional histograms in the neighborhood of these points [3, 6, 7], hence it will be difficult to provide accurate estimates of the singular points while fingerprint image is rotated and deformed. Therefore, the datum points of palmprint are more stable than those of fingerprint. The palmprint verification approach based on both datum point invariance and line feature matching is the important supplement to biometric technology. This will be discussed in the following sections. How to determine the datum points which act as the important registrations in palmprint verification will be demonstrated in the next section. Section 3 presents line feature extraction and matching. In Section 4, experimental results of the proposed approach are obtained. Section 5 contains the summary and discussion. D. Zhang, W. Shu / Pattern Recognition 32 (1999) Datum point determination The goal of datum point determination is to achieve the registrations in palmprint feature representation and matching. As a prime but important process in the palmprint verification, it is demanded as simple and effective as possible. The basic idea of datum point determination is to locate the endpoint of each principal line. According to the given regularity, the principal lines and their endpoints are accurately detected by using the directional projection algorithm Directional projection algorithm It is widely known that projection is a simple yet effective method of line segment detection along some orientation [9]. Let F be an M N gray scale image and f (i, j) bethe gray level of pixel (i, j) (i"0, 1,2, M!1; j"0, 1,2, N!1). Without loss of generality, we consider that the projective angle α is measured clockwise from the i-axis and pixel (i, j ) is a pixel in F. Then, an x y right angle coordinate system can be established, of which pixel (i, j ) is the origin and the orientation of the x-axis is that of the projection (see in Fig. 3). In the x y coordinate system, a (2m#1) (2n#1) pixel in size subimage, F 1, can be obtained, and f(x, y) is the gray level of pixel (x, y) (x"!m,!m#1, 2, 0, 2, m!1, m; y"!n,!n#1, 2,0,2, n!1, n). As a result, the correspondence between this pair of coordinate systems is denoted as follows: i"i #cos(α#β) x #y, j"j #sin(α#β) x #y, (1) where β"tan (y/x). Fig. 3. The correspondence of two coordinate systems in directional projection algorithm. In F 1, obviously, the directional projection of this subimage is p(y)" f (x, y). (2) The smoothed set q(y) is calculated as q(y)" 1 p (y#k). (3) 2w#1 Then, pixel (0, y ), where y " k q(k)"max q(y) (4) is detected and the corresponding pixel in F is defined as pixel (i, j ), where i "i #y cos(α# ), j "j #y sin(α# ). (5) Here, this basic algorithm is classified as four forms by the different projective orientations: horizontal projection (α"0 ), projection with 45 (α"45 ), vertical projection (α"90 ) and projection with 135 (α"135 ) Properties for principal lines From the study of the principal lines, their properties can be obtained as follows: (1) each principal line meets the side of palm at approximate right angle when it flows out the palm; (2) the life line is located at the inside part of palm, which gradually inclines to the inside of the palm in parallel at the beginning; (3) most of the life line and head line flow out of the palm at the same point; (4) the endpoints are closer to fingers than wrist.

4 694 D. Zhang, W. Shu / Pattern Recognition 32 (1999) Fig. 4. Computation of the directional projection: (a) original image; (b) directional projection along principal line; and (c) directional projection after median filter. Based on the projective correspondence (see Fig. 4), it is clear that the pixel (x, y) calculated by the basic algorithm belongs to the principal line if the orientation of directional projection follows the principal line and the parameter w in Eq. (3) equals the half width of a principal line. However, the pixel on the other different kinds of lines cannot be determined by means of the conditions given above. This is because the projection of line which is not in parallel with the projective orientation or is shorter than the principal line would be less than that of principal line. In addition, a thin line might map to the maximum value in the directional projection, p(y), but it could be reduced after smoothing. So, the basic algorithm can be used to locate the pixel only on the principal line while the directional projection along the principal line is maximized in a palmprint subimage Datum point determination To apply the above rules to get the endpoints, two processing stages, i.e. principal line detection stage and principal line tracing stage, should be defined. Without loss of generality, the images of a person s right palm are employed and all palmprints are considered as fingers upturned so as to describe the method of datum point determination simply. The track of the datum point determination is shown in Fig Principal line detection The purpose of this stage is to obtain the points, those belong to heart line or life line. The heart line detection is easier than that of life line because there is only one principal line in the outside part of palm. After the edges of outside and topside are detected, a pixel which has the suitable offsets to two edges is adopted in palmprint. Point b, which belongs to heart line, is located by the horizontal projection algorithm. However, the detection of life line cannot use the horizontal projection in the inside part of palm because the head line is determined sometimes instead of the life line while their flowing out palm at the different points. Therefore, another subimage Fig. 5. Track of datum point determination by using the directional projection algorithm. close to wrist is processed by the vertical projection algorithm and point a on the life line is calculated Principal line tracing The main idea is to estimate a pair of endpoints by tracing principal lines. According to the peculiarities of the heart line, the horizontal projection algorithm is easy to locate endpoint b to a subimage where there is a pixel situated at the outside edge with the same level as pixel b. However, the detection of endpoint a is different from that of endpoint b because the life line is a curve from pixel a to point a. As a result, the details of point a determination are shown below: Step 1: Point a is defined by the straight line, which is a connection between endpoint b and b, intersecting the inside edge of the palm. Step 2: Pixels a and a, which trisect the vertical distance between pixel a and point a, are obtained in proper order along the life line by the vertical projection algorithm. Step 3: Pixel a belonging to the life line is denoted. The horizontal distance from pixel a to the inside edge of the palm is calculated and a new point can be located, from which both horizontal and vertical distances are half of above distance to pixel a. A subimage around this new point is processed by the directional projection algorithm with 135. Step 4: Point a is detected by the straight line, which flows out from pixel a, intersecting the inside edge of the palm at Step 5: Endpoint a is estimated in the subimage with point a by the horizontal projection algorithm. Based on the endpoint a and b, it is simple to determine the midpoint o. For the left palmprint s datum point

5 D. Zhang, W. Shu / Pattern Recognition 32 (1999) detection, the similar steps are used except that the directional projection algorithm in Step 3 is replaced by that with 45. Obviously, the proposed method is also suitable for the palmprint under rotation while the outside edge of the palm is detected and rotated to approximate vertical. 3. Verification by line feature There are mainly two operations in the following verification: feature extraction and feature matching. Owing to line features adopted to identify the individual, line feature extraction and line matching are proposed. Obviously, line feature includes curves and straight lines. In fact, most line features can approximate straight-line segments except for the principal lines. Based on our observation, the curvature of the principal lines is small enough to be represented by several straight-line segments. In this way, the representation and matching of straight lines are simple. As a result, line feature is considered as straight-line segments in this section. The measurement of palmprints matching will be also described Line feature extraction Line feature extraction is always an important yet difficult step in image verification and many line feature detection methods have been proposed [10 12]. Most of these methods cannot generate a precise line map of stripe images such as palmprint images. Although the algorithm of pyramid edge detection based on stack filter performs well for these types of lines [10], it only extracts the principal lines from a palmprint image. In addition, a 3 3 operator, h, which convolves the image with! 1!! 1! (6)! 1! is commonly used as a detector for thin vertical lines and it can be extended to detect both lines in directions other than the vertical and thick lines [13]. A straight line that passes through the center of a 3 3 neighborhood must intersect that neighborhood in one of the following 12 patterns (the center of the neighborhood has been underlined): 0 θ 0 θ θ θ 0 0 θ 0 0 θ 0 0 θ 0 θ 0 (a) (b) (c) (d) 0 θ θ θ 0 θ θ 0 0 θ 0 θ 0 0 θ (e) (f ) (7) 0 θ 0 θ 0 0 θ θ 0 θ θ θ θ θ 0 0 θ θ 0 0 (g) (h) (i) (j) θ θ θ 0 0 θ θ θ 0 0 θ θ θ 0 (k) (l) To obtain a complete set of thick-line operators, we would need an analogue of h for each of these patterns. For the five near-vertical patterns, then h operator would be defined by comparing the three θ points with their horizontal neighbors; for the five near-horizontal patterns, we would compare the points with their vertical neighbors; and for the two diagonal patterns, we could do either type of comparison. A similar set of operators could be used for streak detection, with the θ s representing adjacent nonoverlapping averages rather than individual points. Nevertheless, many ridges and fine wrinkles have the same width as coarse wrinkles except that they are shorter. As a result, the algorithm mentioned above is also difficult to acquire the line features from a palmprint because a mass of ridges and fine wrinkles could dirty the line features. We improve on this algorithm, which is called a improved template algorithm, so as to extract and post-process line segments of each orientation respectively and then combine them. The improved template algorithm consists of the following main steps: (1) Determine vertical line segments by using the five near-vertical templates, and then thin and post-process these line segments. The rule of post-processing is to clear up the short segments. (2) Similarly, detect lines in the other three directions. (3) Combine the results of four different directions, and then post-process once more. The purpose of postprocessing is to eliminate the segments overlapped. Both the process and result of line feature extraction by the improved template algorithm are shown in Fig Line matching In general, there are many ways to represent a line. One way, which is always possible, is to store the

6 696 D. Zhang, W. Shu / Pattern Recognition 32 (1999) endpoints of every straight line segment [14]. In a twodimensional right angle coordinate system which is uniquely established by the datum points (see Fig. 2), line segments can be described by endpoints: (X (i), ½ (i)), (X (i), ½ (i)), i"1, 2, I, where I is the number of line segments. Without loss of generality, exchange the endpoints of each line segment so that X (i))x (i), i"1, 2, I. IfX (i)" X (i), exchange the endpoints so that ½ (i))½ (i). Next, three parameters of each line segment, including slope, intercept and angle of inclination, can be calculated as follows: slope(i)"(½ (i)!½ (i))/(x (i)!x (i)), (8) intercept(i)"½ (i)!x (i) slope(i) (9) and α(i)"tan (slope(i)). (10) The object of matching is to tell whether two line segments from a couple of palmprint images are the same in a palmprint. The two-dimensional right angle coordinate system established by the datum points does act as the important registration in line feature matching. For example, two line segments from two images can be represented as (X (i), ½ (i)), (X (i), ½ (i)) and (X ( j), ½ ( j)), (X ( j), ½ ( j)), respectively. The Euclidean distances between the endpoints of two line segments are denoted as " ((X (i)!x ( j)) #((½ (i)!½ ( j)), (11) " ((X (i)!x ( j)) #((½ (i)!½ ( j)). (12) Without question, the following conditions for line segment matching can be proposed: (1) If both and are less than some threshold D, then it clearly indicates that two line segments are the same. (2) If the difference of angle of inclination (difference between two line segments) is less than some threshold β and that of the intercepts is less than some threshold B, then it shows that two line segments have the equal angle of inclination and intercept. Within class of equal angle of inclination and equal intercept, if one of and is less than D, then two line segments clearly belong to the same one. (3) While two line segments overlap, they are regarded as one line segment if the midpoint of one line segment is between two endpoints of another line Verification function By applying the above rules of line feature matching to a couple of palmprint images, we can achieve the corresponding pairs of lines (shown as Fig. 7). The verification Fig. 6. Process and result of linear feature extraction: (a) input image; (b) map with linear features extracted; (c), (e), (g) and (i) line segments detection in four different directions by template algorithm, respectively; (d), (f ), (h) and (j) their results thinned and post-processed.

7 D. Zhang, W. Shu / Pattern Recognition 32 (1999) Fig. 6. (Continued.) function, r, is defined as r"2n/(n #N ), (13) where N is the number of these corresponding pairs; N and N are the numbers of the line segments determined from two palmprint images, respectively. In principle, it shows that two images are from one palm if r is more than some threshold ¹ which is between 0 and Experimental results In our experiments, gray-scale inked palmprint images are employed. The resolution is 100 dpi, 256 gray levels. The algorithm of datum point determination has been tested by many palmprint images. Of the datum points calculated in the 100 palmprint images, 95 are found to be in excellent agreement with the manual estimate. In

8 698 D. Zhang, W. Shu / Pattern Recognition 32 (1999) Fig. 6. (Continued.) particular, this algorithm is used to estimate the datum points with 60 special palmprint images, of which 20 belong to under rotation, 35 to incomplete and 5 to those life line and head line flow out the palm at different points. Some typical palmprint images are shown in Fig. 8 and the results of the datum points detection from special palmprint images are given in Table 1. Next, the palmprint verification with both datum point invariance and line feature matching also has been tested by 20 couples of palmprint images from 20 right palms. The measure of experimental result is represented by a slippery pair of statistics known as false rejection rate (FRR) and false acceptance rate (FAR). In this experiment, some thresholds are adopted as follows: (a) D"5, β"0.157 and B"10; (b) D"5, β"0.314 and

9 D. Zhang, W. Shu / Pattern Recognition 32 (1999) Fig. 7. Results of a pair of palmprint matching by using line features: (a) template linear feature set; (b) input linear feature set; and (c) matching result. B"10, or β"0.157 and B"50. The results are shown in Fig. 9 with the various threshold ¹. In Case (a), the palmprint verification can obtain an ideal result while ¹" Conclusion In this paper, we have implemented an automated biometric-based identification by using both datum points and line features extracted from the palmprints to verify the identity of a live person. As the primary palmprint identification, the datum points are defined as the points of registration in palmprint matching because of their stability. The basic algorithm using directional projection is designed to locate the principal line as well as to determine the endpoints accurately. A number of palmprint images have been tested and the experimental results show that most datum points are in excellent agreement with the manual

10 700 D. Zhang, W. Shu / Pattern Recognition 32 (1999) Fig. 8. Examples of datum points determination: (a) normal palmprint; (b) rotated palmprint; (c) incomplete palmprint; and (d) life line and head line unintersection. Table 1 Experimental results of datum points determination in special palmprint images Classification R I U Experiment images Accurate determination images The rate of accuracy (%) Note: R"rotated image; I" incomplete image; U"life line and head line unintersection. estimate. It is also reliable and effective to locate the datum points in the special palmprint images. The computation of the basic algorithm is simple and logical. An improved template algorithm of line feature extraction is then presented due to its simplicity. The line features are considered as straight line segments and are represented by their endpoints. Several rules are applied to match the line features so as to detect whether a couple of palmprints are from the same palm. Twenty couples of palmprint images are determined by both datum point

11 D. Zhang, W. Shu / Pattern Recognition 32 (1999) Fig. 9. Experimental results for FAR and FRR: (a) D"5, β"0.157 and B"10; (b) D"5, β"0.314 and B"10, or β"0.157 and B"50. invariance and line feature matching and the experimental result shows that the verification accuracy is acceptable. The palmprint verification proposed in this paper is also foolproof because these significant physiological characteristics are unique, unchanging, and cannot be forged and transferred. In addition, it has the remarkable advantage of requiring lower spatial resolution so as to limit the size of palmprint image and also to be insensitive to noise. As an important complement of automated biometric-based identification, the palmprint verification with both characteristics can be effectively used to identify an individual. 6. Summary Palmprint has been used as a positive human identifier for many years. As the first attempt of automatic personal identification by palmprint, in this paper, we have developed such a biometric technology to verify the identity of a live person by using both datum points and line features extracted from the palmprint. In Sect. 1, the properties of palmprints are introduced and some significant features in the palmprint are defined. Compared with fingerprint identification, two new characteristics, datum point invariance and line feature matching, are presented in palmprint verification. Sect. 2 mainly demonstrates how to determine the datum points which act as the important registrations in palmprint verification. The basic algorithm, including directional projection, is developed. The proposed algorithm is effective to locate the principal line as well as to accurately detect its endpoint based on the approximate position. The computation of the basic algorithm is simple and logical. Line feature extraction and matching are presented in Sect. 3. An improved template algorithm for line feature extraction is also designed due to its simplicity and efficiency. The line features are considered as straight-line segments and represented by their endpoints. Furthermore, several rules of line feature matching are applied to decide whether a couple of palmprints are from the same palm. Experimental results of the palmprint verification are described in Sect. 4. The algorithm of datum point determination has been tested on a number of palmprint images. It shows that most of datum points are in excellent agreement with the manual estimate and this algorithm is also effective to locate the datum points in the special palmprint images. Twenty couples of palmprint images have been determined by using both datum point invariance and line feature matching and the result shows the effectiveness of the palmprint verification. As summary and discussion in Sect. 5, in brief, the palmprint verification is foolproof because these significant physiological characteristics are unique, unchanging, and cannot be forged and transferred. This palmprint verification has the remarkable advantage of requiring lower spatial resolution, hence it can limit the size of palmprint image and also be insensitive to noise. As an important complement of automated biometric-based identification, the palmprint verification can be effectively used to identify an individual. References [1] M. Eleccion, Automatic fingerprint identification, IEEE Spectrum 10 (9) (1973) [2] B. Miller, Vital signs of identity, IEEE Spectrum 32 (2) (1994) [3] A. Jain, L. Hong, R. Bolle, On-line fingerprint verification, IEEE Trans. Pattern Anal. Mach. Intell., 19 (4) (1997) [4] L. Coetzee, E.C. Botha, Fingerprint recognition in low quality images, Pattern Recognition, 26 (10) (1993)

12 702 D. Zhang, W. Shu / Pattern Recognition 32 (1999) [5] Grolier Incorporated, The Encyclopedia American. Grolier, U.S.A. (1995). [6] V.S. Srinivasan, N.N. Murthy, Detection of singular points in fingerprint images, Pattern Recognition 25 (2) (1992) [7] Kalle Karu, Anil K. Jain, Fingerprint classification, Pattern Recognition 29 (3) (1996) [8] James H. Mcintish, Kathleen M. Mutch, Matching straight lines, Comput. Vision Graphics Image Process. 43 (1988) [9] Thoe Pavlidis, Algorithms for Graphics and Image Processing, Computer Science Press, Rockville, Md. (1982). [10] Paul S. Wu, Ming Li, Pyramid edge detection based on stack filter, Pattern Recognition Lett. 18 (4) (1997) [11] T.S. Chan, Raymond K.K. Yip, Line detection algorithm, Proc. 13th ICPR (1996) pp [12] J. Brian Burns, Allen R. Hanson, Edward M. Riseman, Extracting straight lines, IEEE Trans. Pattern Anal. Mach. Intell. 8 (4) (1986) [13] Azriel Rosenfeld, Avinash C. Kak, Digital Picture Processing. Academic Press, London (1982). [14] J.F. Keegan, How can you tell if two line drawings are the same?, Comput. Graphics Image Process. 6 (1) (1977) About the Author DAPENG ZHANG graduated in computer science from Peking University in 1974 and received his M.Sc and Ph.D degrees in computer science and engineering from Harbin Institute of Technology (HIT) in 1983 and 1985, respectively. From 1986 to 1988 he was a postdoctoral fellow at Tsinghua University and became an associate professor at Academia Sinica, Beijing, China. In 1988, he joined the University of Windsor, Ontario, Canada, as a Visiting Research Fellow in electrical engineering. He received his second Ph.D in electrical and computer engineering at University of Waterloo, Ontario, Canada, in Currently, he is an associate professor at the Hong Kong Polytechnic University. His research areas include automated biometric-based identification, neural systems and applications, VLSI system design methodology and parallel computer architecturetion. He has authored and co-authored over 100 papers including three books, as well as received several recognisable project awards. Dr Zhang is a senior member of the IEEE. About the Author WEI SHU received the B.E. Degree in automation control and the M.E. Degree in pattern recognition and intelligence control from Tsinghua University, Beijing, in 1990 and 1994, respectively. He is currently a Research Assistant at Department of Computer Science at City University of Hong Kong as well as a Ph.D student in Department of Automation at Tsinghua University. His research interests include pattern recognition, image analysis and biometrics.

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic

More information

Palmprint as a Biometric Identifier

Palmprint as a Biometric Identifier Palmprint as a Biometric Identifier 1 Kasturika B. Ray, 2 Rachita Misra 1 Orissa Engineering College, Nabojyoti Vihar, Bhubaneswar, Orissa, India 2 Dept. Of IT, CV Raman College of Engineering, Bhubaneswar,

More information

Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability

Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller

More information

Palmprint Classification

Palmprint Classification Palmprint Classification Li Fang*, Maylor K.H. Leung, Tejas Shikhare, Victor Chan, Kean Fatt Choon School of Computer Engineering, Nanyang Technological University, Singapore 639798 E-mail: asfli@ntu.edu.sg

More information

Face detection is a process of localizing and extracting the face region from the

Face detection is a process of localizing and extracting the face region from the Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.

More information

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification

More information

Regional fusion for high-resolution palmprint recognition using spectral minutiae representation

Regional fusion for high-resolution palmprint recognition using spectral minutiae representation Published in IET Biometrics Received on 1st September 2013 Revised on 15th January 2014 Accepted on 10th February 2014 Special Issue: Integration of Biometrics and Forensics ISSN 2047-4938 Regional fusion

More information

Pattern Recognition 43 (2010) 1050 -- 1061. Contents lists available at ScienceDirect. Pattern Recognition

Pattern Recognition 43 (2010) 1050 -- 1061. Contents lists available at ScienceDirect. Pattern Recognition Pattern Recognition 43 (2010) 1050 -- 1061 Contents lists available at ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/pr High resolution partial fingerprint alignment using

More information

Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

More information

Automated PolyU Palmprint sample Registration and Coarse Classification

Automated PolyU Palmprint sample Registration and Coarse Classification www.ijcsi.org 186 Automated PolyU Palmprint sample Registration and Coarse Classification Dhananjay D. M. 1, Dr C.V.Guru Rao 2 and Dr I.V.Muralikrishna 3 1 Computer Science Department,JNTU Hyderabad, Andhra

More information

Determining optimal window size for texture feature extraction methods

Determining optimal window size for texture feature extraction methods IX Spanish Symposium on Pattern Recognition and Image Analysis, Castellon, Spain, May 2001, vol.2, 237-242, ISBN: 84-8021-351-5. Determining optimal window size for texture feature extraction methods Domènec

More information

Fingerprint s Core Point Detection using Gradient Field Mask

Fingerprint s Core Point Detection using Gradient Field Mask Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]

More information

Development of Palmprint Verification System Using Biometrics

Development of Palmprint Verification System Using Biometrics ISSN 1000-985, CDEN RUXUEW E-mail: jos@iscas.ac.cn Journal of Software, Vol.17, No.8, August 006, pp.184 1836 http://www.jos.org.cn DI: 10.1360/jos17184 Tel/Fax: +86-10-656563 006 by Journal of Software.

More information

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA

More information

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines. International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer

More information

Part-Based Recognition

Part-Based Recognition Part-Based Recognition Benedict Brown CS597D, Fall 2003 Princeton University CS 597D, Part-Based Recognition p. 1/32 Introduction Many objects are made up of parts It s presumably easier to identify simple

More information

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.

More information

Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences

Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences Byoung-moon You 1, Kyung-tack Jung 2, Sang-kook Kim 2, and Doo-sung Hwang 3 1 L&Y Vision Technologies, Inc., Daejeon,

More information

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014 Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College

More information

Thresholding technique with adaptive window selection for uneven lighting image

Thresholding technique with adaptive window selection for uneven lighting image Pattern Recognition Letters 26 (2005) 801 808 wwwelseviercom/locate/patrec Thresholding technique with adaptive window selection for uneven lighting image Qingming Huang a, *, Wen Gao a, Wenjian Cai b

More information

Handwritten Character Recognition from Bank Cheque

Handwritten Character Recognition from Bank Cheque International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Handwritten Character Recognition from Bank Cheque Siddhartha Banerjee*

More information

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 111-115 MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT A. Jaya Lakshmi 1, I. Ramesh Babu 2,

More information

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode

More information

Solving Simultaneous Equations and Matrices

Solving Simultaneous Equations and Matrices Solving Simultaneous Equations and Matrices The following represents a systematic investigation for the steps used to solve two simultaneous linear equations in two unknowns. The motivation for considering

More information

Geometry: Unit 1 Vocabulary TERM DEFINITION GEOMETRIC FIGURE. Cannot be defined by using other figures.

Geometry: Unit 1 Vocabulary TERM DEFINITION GEOMETRIC FIGURE. Cannot be defined by using other figures. Geometry: Unit 1 Vocabulary 1.1 Undefined terms Cannot be defined by using other figures. Point A specific location. It has no dimension and is represented by a dot. Line Plane A connected straight path.

More information

Efficient on-line Signature Verification System

Efficient on-line Signature Verification System International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information

More information

Curriculum Map by Block Geometry Mapping for Math Block Testing 2007-2008. August 20 to August 24 Review concepts from previous grades.

Curriculum Map by Block Geometry Mapping for Math Block Testing 2007-2008. August 20 to August 24 Review concepts from previous grades. Curriculum Map by Geometry Mapping for Math Testing 2007-2008 Pre- s 1 August 20 to August 24 Review concepts from previous grades. August 27 to September 28 (Assessment to be completed by September 28)

More information

STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK

STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Volume 6, Issue 3, pp: 335343 IJESET STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Dipti Verma 1, Sipi Dubey 2 1 Department of Computer

More information

PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS

PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS Ram P. Krish 1, Julian Fierrez 1, Daniel Ramos 1, Javier Ortega-Garcia 1, Josef Bigun 2 1 Biometric Recognition

More information

Personal authentication using palm-print features

Personal authentication using palm-print features Pattern Recognition 36 (2003) 371 381 www.elsevier.com/locate/patcog Personal authentication using palm-print features Chin-Chuan Han a;, Hsu-Liang Cheng b, Chih-Lung Lin b, Kuo-Chin Fan b a Department

More information

Signature Region of Interest using Auto cropping

Signature Region of Interest using Auto cropping ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,

More information

Research on Chinese financial invoice recognition technology

Research on Chinese financial invoice recognition technology Pattern Recognition Letters 24 (2003) 489 497 www.elsevier.com/locate/patrec Research on Chinese financial invoice recognition technology Delie Ming a,b, *, Jian Liu b, Jinwen Tian b a State Key Laboratory

More information

Reflection and Refraction

Reflection and Refraction Equipment Reflection and Refraction Acrylic block set, plane-concave-convex universal mirror, cork board, cork board stand, pins, flashlight, protractor, ruler, mirror worksheet, rectangular block worksheet,

More information

SIGNATURE VERIFICATION

SIGNATURE VERIFICATION SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University

More information

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the

More information

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the

More information

Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras

Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith

More information

Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition

Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary

More information

Simultaneous Gamma Correction and Registration in the Frequency Domain

Simultaneous Gamma Correction and Registration in the Frequency Domain Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong a28wong@uwaterloo.ca William Bishop wdbishop@uwaterloo.ca Department of Electrical and Computer Engineering University

More information

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,

More information

A Dynamic Approach to Extract Texts and Captions from Videos

A Dynamic Approach to Extract Texts and Captions from Videos Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Online Farsi Handwritten Character Recognition Using Hidden Markov Model

Online Farsi Handwritten Character Recognition Using Hidden Markov Model Online Farsi Handwritten Character Recognition Using Hidden Markov Model Vahid Ghods*, Mohammad Karim Sohrabi Department of Electrical and Computer Engineering, Semnan Branch, Islamic Azad University,

More information

A Method of Caption Detection in News Video

A Method of Caption Detection in News Video 3rd International Conference on Multimedia Technology(ICMT 3) A Method of Caption Detection in News Video He HUANG, Ping SHI Abstract. News video is one of the most important media for people to get information.

More information

Geometry Chapter 1. 1.1 Point (pt) 1.1 Coplanar (1.1) 1.1 Space (1.1) 1.2 Line Segment (seg) 1.2 Measure of a Segment

Geometry Chapter 1. 1.1 Point (pt) 1.1 Coplanar (1.1) 1.1 Space (1.1) 1.2 Line Segment (seg) 1.2 Measure of a Segment Geometry Chapter 1 Section Term 1.1 Point (pt) Definition A location. It is drawn as a dot, and named with a capital letter. It has no shape or size. undefined term 1.1 Line A line is made up of points

More information

A Learning Based Method for Super-Resolution of Low Resolution Images

A Learning Based Method for Super-Resolution of Low Resolution Images A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 emre.ugur@ceng.metu.edu.tr Abstract The main objective of this project is the study of a learning based method

More information

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

Automatic Biometric Student Attendance System: A Case Study Christian Service University College Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions

More information

Glencoe. correlated to SOUTH CAROLINA MATH CURRICULUM STANDARDS GRADE 6 3-3, 5-8 8-4, 8-7 1-6, 4-9

Glencoe. correlated to SOUTH CAROLINA MATH CURRICULUM STANDARDS GRADE 6 3-3, 5-8 8-4, 8-7 1-6, 4-9 Glencoe correlated to SOUTH CAROLINA MATH CURRICULUM STANDARDS GRADE 6 STANDARDS 6-8 Number and Operations (NO) Standard I. Understand numbers, ways of representing numbers, relationships among numbers,

More information

siftservice.com - Turning a Computer Vision algorithm into a World Wide Web Service

siftservice.com - Turning a Computer Vision algorithm into a World Wide Web Service siftservice.com - Turning a Computer Vision algorithm into a World Wide Web Service Ahmad Pahlavan Tafti 1, Hamid Hassannia 2, and Zeyun Yu 1 1 Department of Computer Science, University of Wisconsin -Milwaukee,

More information

High Resolution Fingerprint Matching Using Level 3 Features

High Resolution Fingerprint Matching Using Level 3 Features High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count

More information

How To Filter Spam Image From A Picture By Color Or Color

How To Filter Spam Image From A Picture By Color Or Color Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among

More information

Face Recognition in Low-resolution Images by Using Local Zernike Moments

Face Recognition in Low-resolution Images by Using Local Zernike Moments Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie

More information

Visual-based ID Verification by Signature Tracking

Visual-based ID Verification by Signature Tracking Visual-based ID Verification by Signature Tracking Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu Outline Biometric ID Visual Signature Acquisition

More information

3)Skilled Forgery: It is represented by suitable imitation of genuine signature mode.it is also called Well-Versed Forgery[4].

3)Skilled Forgery: It is represented by suitable imitation of genuine signature mode.it is also called Well-Versed Forgery[4]. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Technique

More information

Analecta Vol. 8, No. 2 ISSN 2064-7964

Analecta Vol. 8, No. 2 ISSN 2064-7964 EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,

More information

DEVELOPMENT OF HYBRID VECTORIZING SOFTWARE FOR DIGITIZATION OF CADASTRAL MAPS

DEVELOPMENT OF HYBRID VECTORIZING SOFTWARE FOR DIGITIZATION OF CADASTRAL MAPS DEVELOPMENT OF HYBRID VECTORIZING SOFTWARE FOR DIGITIZATION OF CADASTRAL MAPS Byoungjun SEO, Jaejoon JEONG, Jaebin LEE and Prof. Yongil KIM, Korea ABSTRACT The Cadastral map is a basic data that prescribes

More information

2. MATERIALS AND METHODS

2. MATERIALS AND METHODS Difficulties of T1 brain MRI segmentation techniques M S. Atkins *a, K. Siu a, B. Law a, J. Orchard a, W. Rosenbaum a a School of Computing Science, Simon Fraser University ABSTRACT This paper looks at

More information

Automatic Detection of PCB Defects

Automatic Detection of PCB Defects IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.

More information

Biometric Authentication using Online Signatures

Biometric Authentication using Online Signatures Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,

More information

A Robust Method for Solving Transcendental Equations

A Robust Method for Solving Transcendental Equations www.ijcsi.org 413 A Robust Method for Solving Transcendental Equations Md. Golam Moazzam, Amita Chakraborty and Md. Al-Amin Bhuiyan Department of Computer Science and Engineering, Jahangirnagar University,

More information

GEOMETRY COMMON CORE STANDARDS

GEOMETRY COMMON CORE STANDARDS 1st Nine Weeks Experiment with transformations in the plane G-CO.1 Know precise definitions of angle, circle, perpendicular line, parallel line, and line segment, based on the undefined notions of point,

More information

Medical Image Segmentation of PACS System Image Post-processing *

Medical Image Segmentation of PACS System Image Post-processing * Medical Image Segmentation of PACS System Image Post-processing * Lv Jie, Xiong Chun-rong, and Xie Miao Department of Professional Technical Institute, Yulin Normal University, Yulin Guangxi 537000, China

More information

Solving Geometric Problems with the Rotating Calipers *

Solving Geometric Problems with the Rotating Calipers * Solving Geometric Problems with the Rotating Calipers * Godfried Toussaint School of Computer Science McGill University Montreal, Quebec, Canada ABSTRACT Shamos [1] recently showed that the diameter of

More information

Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature

Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature 3rd International Conference on Multimedia Technology ICMT 2013) Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature Qian You, Xichang Wang, Huaying Zhang, Zhen Sun

More information

Neural Network based Vehicle Classification for Intelligent Traffic Control

Neural Network based Vehicle Classification for Intelligent Traffic Control Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN

More information

Development of a Networked Thumb Print-Based Staff Attendance Management System

Development of a Networked Thumb Print-Based Staff Attendance Management System American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-03, Issue-03, pp-121-126 www.ajer.org Research Paper Open Access Development of a Networked Thumb Print-Based

More information

Signature Segmentation from Machine Printed Documents using Conditional Random Field

Signature Segmentation from Machine Printed Documents using Conditional Random Field 2011 International Conference on Document Analysis and Recognition Signature Segmentation from Machine Printed Documents using Conditional Random Field Ranju Mandal Computer Vision and Pattern Recognition

More information

Reliability of Fingerprint Verification in Ghana

Reliability of Fingerprint Verification in Ghana Reliability of Fingerprint Verification in Ghana Osman Yakubu Garden City University College Department of Computer Science Kenyasi, Kumasi, Ghana ABSTRACT Biometric recognition refers to the automatic

More information

Super-resolution method based on edge feature for high resolution imaging

Super-resolution method based on edge feature for high resolution imaging Science Journal of Circuits, Systems and Signal Processing 2014; 3(6-1): 24-29 Published online December 26, 2014 (http://www.sciencepublishinggroup.com/j/cssp) doi: 10.11648/j.cssp.s.2014030601.14 ISSN:

More information

Euler Vector: A Combinatorial Signature for Gray-Tone Images

Euler Vector: A Combinatorial Signature for Gray-Tone Images Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, murthyg@isical.ac.in Indian Statistical Institute,

More information

IMPLEMENTATION OF MS ACCESS SOFTWARE FOR CASING-CLASS MANUFACTURING FEATURES SAVING

IMPLEMENTATION OF MS ACCESS SOFTWARE FOR CASING-CLASS MANUFACTURING FEATURES SAVING constructional data, database, casing-class part, MS Access Arkadiusz GOLA *, Łukasz SOBASZEK ** IMPLEMENTATION OF MS ACCESS SOFTWARE FOR CASING-CLASS MANUFACTURING FEATURES SAVING Abstract Manufacturing

More information

Geometry Enduring Understandings Students will understand 1. that all circles are similar.

Geometry Enduring Understandings Students will understand 1. that all circles are similar. High School - Circles Essential Questions: 1. Why are geometry and geometric figures relevant and important? 2. How can geometric ideas be communicated using a variety of representations? ******(i.e maps,

More information

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering

More information

Image and Vision Computing

Image and Vision Computing Image and Vision Computing 26 (2008) 1551 1560 Contents lists available at ScienceDirect Image and Vision Computing journal homepage: www.elsevier.com/locate/imavis Review article Touch-less palm print

More information

Constrained Tetrahedral Mesh Generation of Human Organs on Segmented Volume *

Constrained Tetrahedral Mesh Generation of Human Organs on Segmented Volume * Constrained Tetrahedral Mesh Generation of Human Organs on Segmented Volume * Xiaosong Yang 1, Pheng Ann Heng 2, Zesheng Tang 3 1 Department of Computer Science and Technology, Tsinghua University, Beijing

More information

Handwritten Signature Verification using Neural Network

Handwritten Signature Verification using Neural Network Handwritten Signature Verification using Neural Network Ashwini Pansare Assistant Professor in Computer Engineering Department, Mumbai University, India Shalini Bhatia Associate Professor in Computer Engineering

More information

3D Human Face Recognition Using Point Signature

3D Human Face Recognition Using Point Signature 3D Human Face Recognition Using Point Signature Chin-Seng Chua, Feng Han, Yeong-Khing Ho School of Electrical and Electronic Engineering Nanyang Technological University, Singapore 639798 ECSChua@ntu.edu.sg

More information

Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall

Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Automatic Photo Quality Assessment Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Estimating i the photorealism of images: Distinguishing i i paintings from photographs h Florin

More information

Outline. Multitemporal high-resolution image classification

Outline. Multitemporal high-resolution image classification IGARSS-2011 Vancouver, Canada, July 24-29, 29, 2011 Multitemporal Region-Based Classification of High-Resolution Images by Markov Random Fields and Multiscale Segmentation Gabriele Moser Sebastiano B.

More information

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - nzarrin@qiau.ac.ir

More information

Skew Detection of Scanned Document Images

Skew Detection of Scanned Document Images , March 13-15, 2013, Hong Kong Skew Detection of Scanned Document Images Sepideh Barekat Rezaei, Abdolhossein Sarrafzadeh, and Jamshid Shanbehzadeh Abstract Skewing of the scanned image is an inevitable

More information

Palmprint Identification Based on Principle Line Using Machine Learning Techniques

Palmprint Identification Based on Principle Line Using Machine Learning Techniques International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Palmprint Identification Based on Principle Line Using Machine Learning Techniques Krishnaveni.M 1, Arunpriya.C 2 1,2 (Research

More information

ME 111: Engineering Drawing

ME 111: Engineering Drawing ME 111: Engineering Drawing Lecture # 14 (10/10/2011) Development of Surfaces http://www.iitg.ernet.in/arindam.dey/me111.htm http://www.iitg.ernet.in/rkbc/me111.htm http://shilloi.iitg.ernet.in/~psr/ Indian

More information

Palmprint Recognition with PCA and ICA

Palmprint Recognition with PCA and ICA Abstract Palmprint Recognition with PCA and ICA Tee Connie, Andrew Teoh, Michael Goh, David Ngo Faculty of Information Sciences and Technology, Multimedia University, Melaka, Malaysia tee.connie@mmu.edu.my

More information

G.H. Raisoni College of Engineering, Nagpur. Department of Information Technology

G.H. Raisoni College of Engineering, Nagpur. Department of Information Technology Practical List 1) WAP to implement line generation using DDA algorithm 2) WAP to implement line using Bresenham s line generation algorithm. 3) WAP to generate circle using circle generation algorithm

More information

Binary Image Scanning Algorithm for Cane Segmentation

Binary Image Scanning Algorithm for Cane Segmentation Binary Image Scanning Algorithm for Cane Segmentation Ricardo D. C. Marin Department of Computer Science University Of Canterbury Canterbury, Christchurch ricardo.castanedamarin@pg.canterbury.ac.nz Tom

More information

Copyright 2011 Casa Software Ltd. www.casaxps.com. Centre of Mass

Copyright 2011 Casa Software Ltd. www.casaxps.com. Centre of Mass Centre of Mass A central theme in mathematical modelling is that of reducing complex problems to simpler, and hopefully, equivalent problems for which mathematical analysis is possible. The concept of

More information

Co-ordinate Geometry THE EQUATION OF STRAIGHT LINES

Co-ordinate Geometry THE EQUATION OF STRAIGHT LINES Co-ordinate Geometry THE EQUATION OF STRAIGHT LINES This section refers to the properties of straight lines and curves using rules found by the use of cartesian co-ordinates. The Gradient of a Line. As

More information

Personal Identity Verification (PIV) IMAGE QUALITY SPECIFICATIONS FOR SINGLE FINGER CAPTURE DEVICES

Personal Identity Verification (PIV) IMAGE QUALITY SPECIFICATIONS FOR SINGLE FINGER CAPTURE DEVICES Personal Identity Verification (PIV) IMAGE QUALITY SPECIFICATIONS FOR SINGLE FINGER CAPTURE DEVICES 1.0 SCOPE AND PURPOSE These specifications apply to fingerprint capture devices which scan and capture

More information

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic

More information

Grazing incidence wavefront sensing and verification of X-ray optics performance

Grazing incidence wavefront sensing and verification of X-ray optics performance Grazing incidence wavefront sensing and verification of X-ray optics performance Timo T. Saha, Scott Rohrbach, and William W. Zhang, NASA Goddard Space Flight Center, Greenbelt, Md 20771 Evaluation of

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Static Environment Recognition Using Omni-camera from a Moving Vehicle

Static Environment Recognition Using Omni-camera from a Moving Vehicle Static Environment Recognition Using Omni-camera from a Moving Vehicle Teruko Yata, Chuck Thorpe Frank Dellaert The Robotics Institute Carnegie Mellon University Pittsburgh, PA 15213 USA College of Computing

More information

A Study of Automatic License Plate Recognition Algorithms and Techniques

A Study of Automatic License Plate Recognition Algorithms and Techniques A Study of Automatic License Plate Recognition Algorithms and Techniques Nima Asadi Intelligent Embedded Systems Mälardalen University Västerås, Sweden nai10001@student.mdh.se ABSTRACT One of the most

More information

Cabri Geometry Application User Guide

Cabri Geometry Application User Guide Cabri Geometry Application User Guide Preview of Geometry... 2 Learning the Basics... 3 Managing File Operations... 12 Setting Application Preferences... 14 Selecting and Moving Objects... 17 Deleting

More information

Analytical Geometry (4)

Analytical Geometry (4) Analytical Geometry (4) Learning Outcomes and Assessment Standards Learning Outcome 3: Space, shape and measurement Assessment Standard As 3(c) and AS 3(a) The gradient and inclination of a straight line

More information

TIETS34 Seminar: Data Mining on Biometric identification

TIETS34 Seminar: Data Mining on Biometric identification TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi Course Description Content

More information

A Fast Algorithm for Multilevel Thresholding

A Fast Algorithm for Multilevel Thresholding JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 713-727 (2001) A Fast Algorithm for Multilevel Thresholding PING-SUNG LIAO, TSE-SHENG CHEN * AND PAU-CHOO CHUNG + Department of Electrical Engineering

More information

Subspace Analysis and Optimization for AAM Based Face Alignment

Subspace Analysis and Optimization for AAM Based Face Alignment Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China zhaoming1999@zju.edu.cn Stan Z. Li Microsoft

More information

Segmentation of building models from dense 3D point-clouds

Segmentation of building models from dense 3D point-clouds Segmentation of building models from dense 3D point-clouds Joachim Bauer, Konrad Karner, Konrad Schindler, Andreas Klaus, Christopher Zach VRVis Research Center for Virtual Reality and Visualization, Institute

More information