IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 3, March 2012 ISSN (Online): the life.
|
|
- Anastasia Bond
- 2 years ago
- Views:
Transcription
1 274 Fingerprint Gender Classification using Wave elet Tra ansform and Singular Valu ue Decomposition Gnanasivam P 1, and Dr. Muttan S 2 1 Department of Electronics and Communication Engineering, Agni College of Technology Chennai, Tamilnadu , India 2 Center for Medical Electronics, Department of ECE, College of Engineering, Anna University Chennai, Tamilnadu , India Abstract A novel method of gender Classification from fingerprint is proposed based on discrete wavelet transform (DWT) and singular value decomposition (). The classification is achieved by extracting the energy computed from all the sub-bands of DWT combined with the spatial features of non-zero singular values obtained from the of fingerprint images. K nearest neighbor (KNN) used as a classifier. This method is experimented with the internal database of 35 fingerprints finger prints in which 19 were male fingerprints and 15 were female fingerprints. Finger- wise gender classification is achieved which is 94.32% for the left hand little fingers of female persons and.46% for the left hand index finger of male persons. Gender classification for any finger of male persons tested is attained as 91.67% and 84.69% for female persons respectively. Overall classification rate is 88.28% has been achieved. Keywords: Gender Classification, Fingerprint, Discrete Wavelet Transform, Singular Value Decomposition, k nearest neighbor 1. Introduction Gender and Age information is important to provide investigative leads for finding unknown persons. Existing methods for gender classification have limited use for crime scene investigation because they depend on the availability of teeth, bones, or other identifiable body parts having physical features that allow gender and age estimation by conventional methods. Various methodologies has been used to identify the gender using different biometrics traits such as face, gait, iris, hand shape, speech and fingerprint. In this work, gender and age of a person is identified from the fingerprint using DWT and. The science of fingerprint has been used generally for the identification or verification of person and for official documentation. Fingerprint analysis plays a role in convicting the person responsible for an audacious crime. Fingerprint has been used as a biometric for the gender and age identification because of its unique nature and do not change throughout the life of an individual [1]. In fingerprint, the primary dermal ridges (ridge counts) are formed during the gestational weeks and the resulting fingerprint ridge configuration (fingerprint) is fixed permanently [2-3].Ridges and their patterns exhibit number of properties that reflect the biology of individuals. Fingerprints are static and its size and shape changes may vary with age but basic pattern of the fingerprint remains unchanged. Also, the variability of epidermal ridge breadth in humans is substantial [4]. Dermatoglyphic features statistically differ between the sexes, ethnic groups and age categories [5]. It is proved by various researchers; a fingerprint can be processed for the sex determination [6-11]. Thus the variability in sex and age with size, shape and the ridge width of fingerprints helps for the study. Gender and age determination of unknown can guide investigators to the correct identity among the large number of possible matches. Figure 1 illustrates the process of DWT and based gender and classification system. D F E DWT Feature I C vector KNN Feature N I Gender Fusion A S Classifier L I Feature O vector N Fig. 1 DWT and based gender classification system. According to Police-reported crime statistics in Canada, 2010 [ [12], Crimes tend to be disproportionately committed by youth and young adults and the rate of those accused of a Criminal Code offence peaked at 18 years of age and generally decreasedd with increasing age. According to
2 2 crime in India statistics-2010, published by National Crime Records Bureau [13], the crime rate is higher for the age range of 18 to 44 and decreases after 44. The crime done by female is only 4-8% in comparison with the crime done by male. Wavelet transform is a popular tool in image processing and computer vision because of its complete theoretical framework, the great flexibility for choosing bases and the low computational complexity [14]. As wavelet features has been popularized by the research community for wide range of applications including fingerprint recognition, face recognition and gender identification using face, authors have confirmed the efficiency of the DWT approach for the gender identification using fingerprint. The approach is selected for the gender discrimination because of its good information packing characteristics and potential strengths in demonstrating results. The method is considered as an informationoriented technique since it uses principal components analysis procedures (PCA), a form of factor analysis, to concentrate information before examining the primary analytic issues of interest [15]. K-nearest neighbors (KNN), gives very strong consistent results. It uses the database which was generated in the learning stage of the proposed system and it classifies genders of the fingerprints. The outline of this paper is as follows: we review the previous approaches for sex determination using fingerprint in section 2, followed by discussions of fingerprint feature extraction in Section 3; we then proposed the gender classification using fingerprint features in Section 4; the experimental results are presented in Section 5; Section 6 comes to the conclusion and future work. 2. Previous Approaches Gender and age classification can be me made using the spatial parameters or frequency domain parameters or using the combination of both. Most of the findings are based on the spatial domain analysis and few were based on the frequency domain. Earlier work on gender classification based on the ridge density shows that the ridge density is greater for female than male [7,8, 16,17] and [9] analyzed fingerprints of bagathas a tribal population of Andhra Pradesh (India) and showed the evident that the males showing higher mean ridge counts than females. Importance of ridge distance [18, 19] and ridge period [20] and ridge frequency [21] measurements as spatial parameters in the context of fingerprint gender classification are explained. Except few papers, fingerprint gender identification is made by manual measurements from the inked fingerprints. Many studies were carried out for the human face gender classification by using frequency domain and various classifiers [14, 22-29]. Only few efforts have been made for the gender classification through fingerprint. 3. Fingerprint feature extraction Feature extraction is a fundamental pre-processing step for pattern recognition and machine learning problems. In the proposed method, the energy of all DWT sub-bands and non-zero singular values obtained from the of fingerprint image are used as features for the classification of gender. In this section, DWT and based fingerprint feature extractions are described. 3.1 DWT Based Fingerprint Feature extraction Wavelets have been used frequently in image processing and used for feature extraction, de-noising, compression, face recognition, and image super-resolution. Two dimensional DWT decomposes an image into sub-bands that are localized in frequency and orientation. The decomposition of images into different frequency ranges permits the isolation of the frequency components introduced by intrinsic deformations or extrinsic factors into certain sub-bands. This process results in isolating small changes in an image mainly in high frequency subband images. Hence, DWT is a suitable tool to be used for designing a classification system. The 2-D wavelet decomposition of an image is results in four decomposed sub-band images referred to as low low (LL), low high (LH), high low (HL), and high high (HH). Each of these subbands represents different image properties. Typically, most of the energy in images is in the low frequencies and hence decomposition is generally repeated on the LL sub band only (dyadic decomposition). For k level DWT, there are (3*k) + 1 sub-bands available. The energy of all the sub-band coefficients is used as feature vectors individually which is called as sub-band energy vector (E). The energy of each sub-band is calculated by using the equation (1). 1, 1 Where, is the pixel value of the kth sub-band and R, C is width and height of the sub-band respectively. Figure 2 shows the block diagram of the frequency feature extraction by using DWT. The input fingerprint image is first cropped and then decomposed by using the DWT. For level 1, number of subbands are 4 and 3 subbands are added
3 276 for each next levels Thus the increase in levels of DWT increases the features. Training sample Fig. 2 DWT based fingerprint feature extraction 3.2 based Fingerprint Feature extraction The Singular Value Decomposition () is an algebraic technique for factoring any rectangular matrix into the product of three other matrices. Mathematically and historically, it is closely related to Principal Components Analysis (PCA). In addition it provides insight into the geometric interpretation of PCA. As noted previously, the has long been considered fundamental to the understanding of PCA. The is the factorization of any matrix into three matrices, each of which has important properties. That is, any rectangular matrix A of k rows by p columns can be factored into U, S and V by using the equation (2). Where And S is a k X p diagonal matrix with r non-zero singular values on the diagonal, where r is the rank of A. Each singular value is the square root of one of the Eigen values of both AA and A A. The singular values are ordered so that the largest singular values are at the top left and the smallest singular values are at the bottom right, i.e., s, s, s, etc. Among the three rectangular matrices, S is a diagonal matrix which contains the square root Eigen values from U or V in descending order. These values are stored in a vector called Eigen vector (V). As the internal database contains images of size 260x300 pixels, the feature vector of is of the size 1x260. The spatial feature extraction by using is shown in Figure 3. Training Sample Cropping DWT Singular Value Decomposition Extraction of sub-band energy vector Extraction of non-zero Singular values Fig. 3 based fingerprint feature extraction 4. Fingerprint Gender classification The proposed system for gender classification is built based on the fusion of fingerprint features obtained by using DWT and. This section describes two different stages named as learning stage and classification stage and the KNN classifier used for the gender classification. 4.1 Learning Stage The feature vector V of size 1x260 obtained by and the sub band energy vector E of size 1x19 obtained by DWT are fused to form the feature vector and used in the learning stage. The fusion of feature vector V and E is done by concatenation of features that are widely used for feature level fusion. The resulting feature vector is of the size 1x279 (1x260 +1x19).The learning stage is shown in Figure 4. Training Sample Fig. 4 Learning stage of the proposed gender classification system The learning algorithm is as follows: Learning Algorithm: [Input] all samples of fingerprint with known class (Gender) [Output] the feature vector of all samples as database 1) Decompose the fingerprint with 6 level decomposition of DWT. 2) Calculate the sub-band energy vector (E) using (1). 3) Calculate the Eigen vector (V) using (2). 4) Fuse the vectors E and V to form the feature vector for the particular fingerprint. 5) Insert this feature vector and the known class into the database. 6) Repeat the above steps for all the samples. 4.2 KNN Classifier Frequency Features Extraction Spatial Features Extraction Feature Fusion DATABASE In pattern recognition, the k-nearest neighbour algorithm (K-NN) is the generally used method for classifying objects based on closest training examples in the feature space. K- NN is a type of instance-based learning where the function is only approximated locally and all computation is deferred until classification. In K-NN, an object is classified by a majority vote of its neighbours, with the object being assigned to the class most common amongst its k nearest
4 277 neighbours (k is a positive integer, typically small). If k = 1, then the object is simply assigned to the class of its nearest neighbour. The neighbours are taken from a set of objects for which the correct classification is known. This can be thought of as the training set for the algorithm, though no explicit training step is required. 4.3 Classification Stage In the classification phase, the fused feature vector of the input fingerprint is compared with the feature vectors in the database by using the KNN classifier. The distance measure used in the classifier is Euclidean Distance. The classification process is as follows. Algorithm II: Classification Algorithm [Input] unknown fingerprint and the feature database [Output] the class of the fingerprint to which this unknown fingerprint is assigned 1) Decompose the given unknown fingerprint with 6 level decomposition of DWT. 2) Calculate the sub-band energy vector (E) using (2). 3) Calculate the Eigen vector (V) using (1). 4) Fuse the vectors E and V to form the feature vector for the given unknown fingerprint. 5) Apply KNN classifier and find the class of the unknown fingerprint by using the database generated in the learning phase. 5. Experimental Results In this section, the performance of the proposed gender classification algorithm is verified by using the internal database. The success rate (in percentage) of gender classification using DWT, and combination of both are summarized and discussed. Also, the results of the proposed method are compared with the results of earlier publications of gender classification. 5.1 Data set The fingerprint images of internal database were collected by using Fingkey Hamster II scanner manufactured by Nitgen biometric solution [30], Korea. Every original image is of size 260x300 pixels with 256 grey levels and resolution of 500 dpi. The internal database includes all ten fingers collected from males and females of different ages. From the internal database, irrespective of quality and age, all ten fingers of 35 fingerprints in which 19 were male fingerprints and 15 were female fingerprints are used for testing and training. These 35 fingerprint images are separated into two sets. For the learning stage 2/3 of total images are used. The remaining images are used in the classification stage. Table 1 shows the age and gender wise samples of the internal database. Table 1: Age and gender wise samples details Age Group Male Total Up to and above Total Samples The scanned fingers were numbered as follows. Left little finger to left thumb is numbered as 1-5. Right thumb to right little finger is numbered as 6-10 as shown in Figure 5. Fig. 5 Finger numbering 5.2 Gender classification using DWT only The code is tested from 2nd level to 7th level and the success rate for the classification is identified. No appreciable results were obtained for the levels 2 to 4 and beyond the, the results were not convincing. Significant success rate is obtained for the levels 5, 6 and 7. The subband energy vector for the is of the size 1x16 and these features are compared with templates stored in the database obtained during the learning stage. Similarly, the subband energy vectors are of the size 1x19 and 1x22 for the and 7 respectively. The results achieved by the 2-D DWT for the levels 5, 6 and 7 are listed in table 2 for each finger of the male and female. Table 2: Gender classification rate for different levels of DWT Finger Level 5 Level 6 Level 7 No. Male Male Male Average
5 278 The overall classification rate for the, 6 and 7 are 84.61%,.46% and 86.41% respectively. It is also observed that the success rate of right thumb finger (numbered as 6) of male are quite higher than the other fingers. Similarly, the success rate of left hand little finger (numbered as 1) of female are higher than the other fingers. The result pattern for the male and female fingers is shown in figure 6 (a) and 6(b) respectively Male (a) (b) Fig 6 Result pattern of different levels of DWT (a) Male (b) By average, the DWT produces the best result for male gender and the DWT produces the best result for female gender. Considering the training and testing duration, DWT is considered as the optimum level for the gender classification. 5.3 Gender classification using only In this section, alone is applied for the gender classification and its results are compared only with the DWT. generates large feature vector depends on the size of the image and for the internal database the feature vector is of the size 1x260. Thus, significant improvement on gender classification is observed and listed in table 3. The success rate for the male and female finger identification is 91.74% and 83.30% respectively and the overall classification rate is 87.52%. Table 3: Gender classification using Finger No. Male Average While comparing with DWT, the results are 2.64 % more for male and 2.1 % more for female gender. In, thumb fingers (numbered as 5 and 6) and the right index (numbered 7) shows higher results than the other fingers. Similarly, the left little finger of the female shows higher result than the other fingers as shown in figure 7. Fig. 7 Result pattern of for male and female Male The success rate rises from the 1st finger to 5th finger and falls from the 6th finger to 10th finger for the male fingers. But for the female fingers, the success rate falls from the 1st finger to 5th finger and rises from the 6th finger to 10th finger and thus forms like a valley structure. 5.4 Gender classification using combined DWT and From the table 4, it is evident that, by there is an overall raise in gender classification rate of 2.35 % in comparison with the DWT. To assess the results of combined DWT and, the features of these two approaches are combined by concatenation and the results are verified. To identify the better combinations of different levels of DWT and, features of, 6 and 7 are
6 279 combined individually with features and results are obtained. The gender classification results for the plus, plus and the + are shown in the table 4. A notable increase in the success rate is achieved in each case. Table 4: Gender classification rate of the combined and DWT for the samples used for training Finger No. Level 5 Level 6 Level 7 Male Male Male Average Selection of optimum DWT level: The overall classification rate for the combined and DWT, 6 and 7 are 87.96%, 89.16% and 88.35% respectively for the samples used for the training. While testing this method for external input other than the samples used for training, the overall classification rate obtained is 86.06%, 88.28% and 86.16% for and DWT, 6 and 7 respectively. Thus, gives greater success rate than and. The results are shown in table 5.Thus the DWT is considered as an optimum level for the gender identification. Table 5: Gender classification rate of the combined and DWT for the testing samples Finger Level 5 Level 6 Level 7 No. Male Male Male Average Gender classification rate of all the approaches discussed above are shown as a bar chart in figure 8 and 9. Figure 8 shows the increased rate of gender identification by the combined DWT and for male than the individual approach of DWT and. The success rate is more for the thumb and index fingers than other fingers. Fig. 8 Male gender classification rate of DWT, and combined DWT and Figure 9 shows the increased rate of gender identification by the combined DWT and for female than the individual approach of DWT and. The success rate is more for the left index (numbered 1) than other fingers. DWT Proposed DWT Proposed Fig. 9 gender classification rate of DWT, and combined DWT and Average success rate for the methods discussed are shown as line chart in the figure 10. There is raise in success rate in proposed method than DWT alone by 2.56% and only 0.08% less with alone for male. But for female, the proposed method produces 2.29% and 1.87% more than DWT and alone. Similar to the DWT and, the left hand thumb (numbered as 5) and the left hand index finger (numbered as 4) shows higher success rate for male
7 2 and the left hand little finger (numbered as 1) for female shows higher success rate than the other fingers. Fig. 10 Performance comparison of proposed method The success rate rises from the 1st finger to 5th finger and falls from the 6th finger to 10th finger for the male fingers and thus the pattern is projected in the middle area. But for the female fingers, the success rate falls from the 1st finger to 5th finger and rises from the 6th finger to 10th finger and thus the result pattern forms like a valley in the middle. The result pattern of table 4 and 5 are shown in figure 11 and 12 respectively Male DWT level 6 Proposed Male (a) (b) Fig. 11 Result patterns of table 4, (a) Male (b) (b) Fig. 12 Result patterns of table 4, (b) Result patterns of table Performance comparison In this sub-section, the proposed method is compared with the earliest published results. The results of Ahmed Badawi et al. [10], is compared and in their study, ridge thickness to valley thickness ration (RTVTR), ridge count, white lines count, ridge count asymmetry and pattern type concordance were used as features and FCM, LDA, and NN classifiers were used for gender classification. For this study The RTVTR, and white lines count features were analyzed for 255 persons (150 males, and 105 females). These images were scanned from the person s ink print. Manish Verma et al. [11], in their paper used ridge density and ridge width in addition to RTVTR as features and results were obtained for the internal database of 200 male and 200 female fingerprints with SVM classifier. Gender classification accuracies of the proposed method and the published results are shown in table 6. Features used Male Table 6: Comparison of gender classification accuracies Ahmaed Badawi et al. Manish Verma Proposed method RTVTR, white line count, ridge count asymmetry pattern type et al. RTVTR, Ridge width and ridge density DWT & Classifiers FCM LDA NN SVM KNN Male
8 Conclusions In this work, we have proposed a new method for gender classification of fingerprint images based on DWT and. This method considered the frequency features of the wavelet domain and the spatial features of the singular value decomposition. The spatial features include the internal structure of the fingerprint images and the fusion of these features with the frequency features produces improved performance in gender classification. The DWT is selected as optimum level for the gender classification by analysing the results obtained for the database used for training and testing and the database used other than the training and testing. By the proposed method, the gender classification rate achieved is 91.67% for male and 84.89% for female. For the finger-wise gender classification, the success rate is higher for the little fingers and decreases from little fingers to thumb fingers. The success rates falls at the rate of 2.56% minimum to 8.05% maximum from the finger 1 to 5 and rises at the rate of 1.32% to 8% from finger 6 to 10. Thus the result pattern shown in line diagrams formed like a valley. Similarly among the male fingers the success rate is higher for the thumb fingers and index fingers and decreases from the thumb to little fingers. The success rates rises at the rate of 0.77% minimum to 7.8% maximum from the finger 1 to 5 and falls at the rate of 0.% minimum to 4.38% maximum from finger 6 to 10. Thus the result patterns shown in line diagrams are slightly projected at the middle. Our future work is to extend the proposed method of gender classification using the spatial parameters. Also, it is aimed to use various other techniques to increase the success rate. References [1] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, first ed., Springer, New York, [2] J. John, Mulvihill, and David W. Smith, The genesis of dermatoglyphics, the journal of pediatrics, vol., no. 4, 1969, pp [3] W. Babler, Embryologic development of epidermal ridges and their configurations, In: Plato CC, Garruto RM, Schaumann BA, editors.; Dermatoglyphics: Science in Transition. [4] Miroslav Kralik, Vladimir Novotny, Epidermal Ridge Breadth: An Indicator of Age and Sex in Paleodermatoglyphics, Variability and Evolution, Vol. 11, 2003, pp [5] Harold Cummins, Walter J. Walts, and James T McQuitty, The breadths of epidermal ridges on the finger tips and palms - A study of variation. American Journal of Anatomy, vol. 68, no.1, 1941, pp [6] M. Kralik and V. Novotny, Epidermal ridge breadth: an indicator of age and sex in paleo dermatoglyphics Variability and Evolution, vol. 11, 2003, pp [7] M.D. Nithin, B. Manjunatha, D.S. Preethi, and B.M. Balaraj, Gender differentiation by Finger ridge count among South Indian population, Journal of Forensic and Legal Medicine, vol. 18, no. 2, pp , [8] Dr. Sudesh Gungadin MBBS, MD Sex Determination from Fingerprint Ridge Density, Internet Journal of Medical Update, Vol. 2, No. 2, [9] G. G. Reddy, Finger dermatoglyphics of the Bagathas of Araku Valley (A.P.), American Journal of Physical Anthropology, vol. 42, no. 2, 19, pp [10] Badawi, M. Mahfouz, R. Tadross, and R. Jantz, Fingerprint-based gender classification, in Proceedings of the International Conference on Image Processing, Computer Vision and Pattern Recognition (IPCV 06), June 2006, pp [11] Manish Verma and Suneeta Agarwal. Fingerprint Based Male- Classification. in Proceedings of the international workshop on computational intelligence in security for information systems (CISIS 08), Genoa, Italy, 2008, pp [12] Shannon Brennan and Mia Dauvergne, Police-reported crime statistics in Canada, 2010, www. statcan. gc.ca/ pub/-002-x/2011/article/11523-eng.htm [13] Crime in India 2010-Statistics, National Crime Records Bureau, Ministry of Home Affairs, Government of India, [14] Bai-Ling Zhang, Haihong Zhang, and Shuzhi Sam Ge, Face Recognition by Applying Wavelet Subband Representation and Kernel Associative Memory, IEEE Transactions on neural networks, vol. 15, no. 1, 2004, pp [15] G. Golub, and W. Kahane, Calculating the singular values and pseudo-inverse of a matrix, Journal of Society for industrial and application mathematics series B: numerical analysis, vol. 2, no. 2, 1965, pp [16] M. Acree, Is there a gender difference in fingerprint ridge density?, Forensic Science International, vol. 102, no.1, 1999, pp [17] D.Maio and D.Maltoni, Ridge-line density estimation in digital images, in Proceedings of the 14th International Conference on Pattern Recognition (ICPR), 1998, pp [18] Y.Yin, J. Tian, and X. Yang, Ridge Distance Estimation in Fingerprint Images, EURSIP Journal on Applied Signal Processing, vol. 4, no. 4, 2004, pp [19] Zs. M. Kovacs Vajna, R. Rovatti, and M. Frazzoni, Fingerprint ridge distance Computation methodologies, Pattern Recognition, vol. 33, no. 1, 2000, pp. 69. [20] D. C. Douglas Hung, Enhancement and feature purification of fingerprint images, Pattern Recognition, vol. 26, no. 11, 1993, pp [21] L. Hong, Y. Wan, and A. K. Jain, Fingerprint image enhancement: algorithm and performance evaluation, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 8, 1998, pp [22] Wen-Sheng Chu, Chun-Rong Huang and Chu-Song Chen, Identifying Gender from Unaligned Facial Images by Set Classification, in proceedings of the 20th International
9 282 Conference on Pattern Recognition (ICPR), Istanbul, Turkey, 2010, pp [23] Matta, F, Saeed, U., Mallauran, C. and Dugelay, J.L., Facial gender recognition using multiple sources of visual information, in proceedings of the IEEE 10th Workshop on Multimedia Signal Processing (MMSP-08), 2008, pp [24] Zhiguang Y., Ming L. and Haizhou A., An Experimental Study on Automatic Face Gender Classification, in proceedings of IEEE international conference on Pattern Recognition (ICPR 06), Hong Kong, August 2006, pp [25] Saatci Y. and Town C., Cascaded classification of gender and facial expression using active appearance models", in proceedings of the International conference on Automatic Face and Gesture Recognition (FG 2006), 2006, pp [26] H. C. Kim, D. Kim, Z. Ghahramani, and S. Y. Bang, Appearance based gender classification with Gaussian processes, Pattern Recognition Letters, vol. 27, no. 6, 2006, pp [27] Lu X., Chen H. and Jain A.K., Multimodal facial gender and ethnicity identification, In International conference on Advances in Biometrics (ICB 2006), Hong Kong, China, January 2006, pp [28] S. Gutta, J. R. J. Huang P. Jonathon, and H. Wechsler, Mixture of experts for classification of gender, ethnic origin, and pose of human faces, IEEE Transactions on Neural Networks, vol. 11, no. 4, 2000, pp [29] K. Jones K, K. A Johnson, J. A Becker, P. A. Spiers, M. S. Albert, and Holman B.L, Use of singular value decomposition to characterize age and gender differences in SPECT cerebral perfusion, Journal of Nuclear Medicine, vol. 39, 1998, pp [30] Nitgen Company, Fingkey Hamster II fingerprint sensor P. Gnanasivam received his A.M.I.E in electronics and communication engineering from Institution of Engineers (India) in 1989 and M.E in Applied Electronics from the Anna University, India in He is currently working towards the Ph.D. degree in the Department of Electronics and Communication Engineering, Anna University, India. His research interests include Pattern recognition, Image processing, Biometrics and Embedded system. Dr. S. Muttan, Professor, Centre for Medical Electronics, Department of ECE, Anna University, former Asst. secretary of Indian Association of Biomedical Scientists and also a Life member of Biomedical society of India, Life Member in ISTE. He has been guiding UG and PG students and research scholars on various fields in Electronics communications and Information and Communication Technology applied to medicine. His area of research includes Medical Informatics, pattern recognition, and biometrics and e-health services. He has published many research papers in both National and International conferences and Journals. He completed his PhD. in Evolution and Design of Integrated Cardiac Information system in Multimedia.
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation
A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation S.VENKATA RAMANA ¹, S. NARAYANA REDDY ² M.Tech student, Department of ECE, SVU college of Engineering, Tirupati, 517502,
Image Compression Effects on Face Recognition for Images with Reduction in Size
Image Compression Effects on Face Recognition for Images with Reduction in Size Padmaja.V.K Jawaharlal Nehru Technological University, Anantapur Giri Prasad, PhD. B. Chandrasekhar, PhD. ABSTRACT In this
Implementation of the 5/3 Lifting 2D Discrete Wavelet Transform
Implementation of the 5/3 Lifting 2D Discrete Wavelet Transform 1 Jinal Patel, 2 Ketki Pathak 1 Post Graduate Student, 2 Assistant Professor Electronics and Communication Engineering Department, Sarvajanik
Palmprint as a Biometric Identifier
Palmprint as a Biometric Identifier 1 Kasturika B. Ray, 2 Rachita Misra 1 Orissa Engineering College, Nabojyoti Vihar, Bhubaneswar, Orissa, India 2 Dept. Of IT, CV Raman College of Engineering, Bhubaneswar,
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Redundant Wavelet Transform Based Image Super Resolution
Redundant Wavelet Transform Based Image Super Resolution Arti Sharma, Prof. Preety D Swami Department of Electronics &Telecommunication Samrat Ashok Technological Institute Vidisha Department of Electronics
ScienceDirect. Brain Image Classification using Learning Machine Approach and Brain Structure Analysis
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 50 (2015 ) 388 394 2nd International Symposium on Big Data and Cloud Computing (ISBCC 15) Brain Image Classification using
Facial Gender Recognition Using Eyes Images
Facial Gender Recognition Using Eyes Images Hadeel Fahad Alrashed 1 and Mohamed Abdou Berbar 2 Senior teaching assistant, Department of Computer Science, College of Computer and Information Sciences, Qassim
Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap
Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic
Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Face Recognition using Principle Component Analysis
Face Recognition using Principle Component Analysis Kyungnam Kim Department of Computer Science University of Maryland, College Park MD 20742, USA Summary This is the summary of the basic idea about PCA
PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM
PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM Rohan Ashok Mandhare 1, Pragati Upadhyay 2,Sudha Gupta 3 ME Student, K.J.SOMIYA College of Engineering, Vidyavihar, Mumbai, Maharashtra,
Efficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
Face Recognition in Low-resolution Images by Using Local Zernike Moments
Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie
Establishing the Uniqueness of the Human Voice for Security Applications
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability
Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller
Fingerprint s Core Point Detection using Gradient Field Mask
Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]
Leaf recognition for plant classification using GLCM and PCA methods
Oriental Journal of Computer Science & Technology Vol. 3(1), 31-36 (2010) Leaf recognition for plant classification using GLCM and PCA methods ABDOLVAHAB EHSANIRAD and SHARATH KUMAR Y. H. Department of
Adaptive Face Recognition System from Myanmar NRC Card
Adaptive Face Recognition System from Myanmar NRC Card Ei Phyo Wai University of Computer Studies, Yangon, Myanmar Myint Myint Sein University of Computer Studies, Yangon, Myanmar ABSTRACT Biometrics is
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Face Recognition Based on PCA Algorithm Using Simulink in Matlab
Face Recognition Based on PCA Algorithm Using Simulink in Matlab Dinesh Kumar 1, Rajni 2. 1 Mtech scholar department of ECE DCRUST Murthal Sonipat Haryana, 2 Assistant Prof. Department of ECE DCRUST Murthal
Tracking and Recognition in Sports Videos
Tracking and Recognition in Sports Videos Mustafa Teke a, Masoud Sattari b a Graduate School of Informatics, Middle East Technical University, Ankara, Turkey mustafa.teke@gmail.com b Department of Computer
Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition
IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Adaptive sequence of Key Pose Detection for Human Action Recognition 1 T. Sindhu
Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.
Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram,
Face Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
TIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi Course Description Content
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
DESIGN OF VLSI ARCHITECTURE USING 2D DISCRETE WAVELET TRANSFORM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE DESIGN OF VLSI ARCHITECTURE USING 2D DISCRETE WAVELET TRANSFORM Lavanya Pulugu 1, Pathan Osman 2 1 M.Tech Student, Dept of ECE, Nimra
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
A Method for Face Recognition from Facial Expression
Review Article A Method for Face Recognition from Facial Expression Sarbani Ghosh and Samir K. Bandyopadhyay* Department of Computer Science & Engineering, University of Calcutta, Kolkata, India *Corresponding
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode Value
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
A Learning Based Method for Super-Resolution of Low Resolution Images
A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 emre.ugur@ceng.metu.edu.tr Abstract The main objective of this project is the study of a learning based method
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
Face Recognition using SIFT Features
Face Recognition using SIFT Features Mohamed Aly CNS186 Term Project Winter 2006 Abstract Face recognition has many important practical applications, like surveillance and access control.
User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok
Simultaneous Gamma Correction and Registration in the Frequency Domain
Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong a28wong@uwaterloo.ca William Bishop wdbishop@uwaterloo.ca Department of Electrical and Computer Engineering University
On the Order of Search for Personal Identification with Biometric Images
On the Order of Search for Personal Identification with Biometric Images Kensuke Baba Library, Kyushu University 10-1, Hakozaki 6, Higashi-ku Fukuoka, 812-8581, Japan baba.kensuke.060@m.kyushu-u.ac.jp
Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature
3rd International Conference on Multimedia Technology ICMT 2013) Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature Qian You, Xichang Wang, Huaying Zhang, Zhen Sun
Keywords: fingerprints, attendance, enrollment, authentication, identification
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal
Palmprint Classification
Palmprint Classification Li Fang*, Maylor K.H. Leung, Tejas Shikhare, Victor Chan, Kean Fatt Choon School of Computer Engineering, Nanyang Technological University, Singapore 639798 E-mail: asfli@ntu.edu.sg
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING Sunghae Jun 1 1 Professor, Department of Statistics, Cheongju University, Chungbuk, Korea Abstract The internet of things (IoT) is an
Development of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS
PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS Ram P. Krish 1, Julian Fierrez 1, Daniel Ramos 1, Javier Ortega-Garcia 1, Josef Bigun 2 1 Biometric Recognition
Improving Quality of Satellite Image by Wavelet Transforming & Morphological Filtering
Improving Quality of Satellite Image by Wavelet Transforming & Morphological Filtering Anumolu Lasmika 1, K. Raveendra 2 P.G. Student, Department of ECE, S. V. Engineering College for Women, Tirupati,
ATM Transaction Security Using Fingerprint/OTP
ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering
A Zone Based Approach for Classification and Recognition of Telugu Handwritten Characters
International Journal of Electrical and Computer Engineering (IJECE) Vol. 6, No. 4, August 2016, pp. 1647~1653 ISSN: 2088-8708, DOI: 10.11591/ijece.v6i4.10553 1647 A Zone Based Approach for Classification
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
A FPGA based Generic Architecture for Polynomial Matrix Multiplication in Image Processing
A FPGA based Generic Architecture for Polynomial Matrix Multiplication in Image Processing Prof. Dr. S. K. Shah 1, S. M. Phirke 2 Head of PG, Dept. of ETC, SKN College of Engineering, Pune, India 1 PG
An Experimental Study of the Performance of Histogram Equalization for Image Enhancement
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-2, April 216 E-ISSN: 2347-2693 An Experimental Study of the Performance of Histogram Equalization
High-Performance Signature Recognition Method using SVM
High-Performance Signature Recognition Method using SVM Saeid Fazli Research Institute of Modern Biological Techniques University of Zanjan Shima Pouyan Electrical Engineering Department University of
Sachin Patel HOD I.T Department PCST, Indore, India. Parth Bhatt I.T Department, PCST, Indore, India. Ankit Shah CSE Department, KITE, Jaipur, India
Image Enhancement Using Various Interpolation Methods Parth Bhatt I.T Department, PCST, Indore, India Ankit Shah CSE Department, KITE, Jaipur, India Sachin Patel HOD I.T Department PCST, Indore, India
CHAPTER 5 SENDER AUTHENTICATION USING FACE BIOMETRICS
74 CHAPTER 5 SENDER AUTHENTICATION USING FACE BIOMETRICS 5.1 INTRODUCTION Face recognition has become very popular in recent years, and is used in many biometric-based security systems. Face recognition
A Comparative Study on ATM Security with Multimodal Biometric System
A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. lavanya.kk2005@gmail.com C.Naga Raju Associate Professor
SYMMETRIC EIGENFACES MILI I. SHAH
SYMMETRIC EIGENFACES MILI I. SHAH Abstract. Over the years, mathematicians and computer scientists have produced an extensive body of work in the area of facial analysis. Several facial analysis algorithms
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
APPLICATION OF FILTER BANK THEORY TO SUBBAND CODING OF IMAGES
EC 623 ADVANCED DIGITAL SIGNAL PROCESSING TERM-PROJECT APPLICATION OF FILTER BANK THEORY TO SUBBAND CODING OF IMAGES Y. PRAVEEN KUMAR 03010240 KANCHAN MISHRA 03010242 Supervisor: Dr. S.R.M. Prasanna Department
FPGA Implementation of Human Behavior Analysis Using Facial Image
RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
VISION BASED INDIAN SIGN LANGUAGE CHARACTER RECOGNITION
VISION BASED INDIAN SIGN LANGUAGE CHARACTER RECOGNITION 1 ASHOK KUMAR SAHOO, 2 KIRAN KUMAR RAVULAKOLLU Department of Computer Science and Engineering, Sharda University, Greater Noida, India E-Mail: ashoksahoo2000@yahoo.com
BIOINF 585 Fall 2015 Machine Learning for Systems Biology & Clinical Informatics http://www.ccmb.med.umich.edu/node/1376
Course Director: Dr. Kayvan Najarian (DCM&B, kayvan@umich.edu) Lectures: Labs: Mondays and Wednesdays 9:00 AM -10:30 AM Rm. 2065 Palmer Commons Bldg. Wednesdays 10:30 AM 11:30 AM (alternate weeks) Rm.
On Multifont Character Classification in Telugu
On Multifont Character Classification in Telugu Venkat Rasagna, K. J. Jinesh, and C. V. Jawahar International Institute of Information Technology, Hyderabad 500032, INDIA. Abstract. A major requirement
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS Nitin Khanna and Edward J. Delp Video and Image Processing Laboratory School of Electrical and Computer Engineering Purdue University West Lafayette,
FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE
FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE Ms. S.Revathi 1, Mr. T. Prabahar Godwin James 2 1 Post Graduate Student, Department of Computer Applications, Sri Sairam
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia sjafari@ut.ee
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Performance Analysis of Compression Techniques Using SVD, BTC, DCT and GP
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. 2 (Jan Feb. 2015), PP 06-11 www.iosrjournals.org Performance Analysis of Compression Techniques
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Fingerprint recognition using fingerprint model
International Journal of Engineering and Technical Research (IJETR) Fingerprint recognition using fingerprint model Suman Sankhla, Sunil Sharma, Naveen Jain Abstract Nowadays, fingerprint recognisation
Unlock Screen Application Design Using Face Expression on Android Smartphone
Unlock Screen Application Design Using Face Expression on Android Smartphone Rhio Sutoyo, Jeklin Harefa, Alexander, Andry Chowanda Bina Nusantara University, Jakarta, Indonesia Abstract. Nowadays, smartphone
Solution of Linear Systems
Chapter 3 Solution of Linear Systems In this chapter we study algorithms for possibly the most commonly occurring problem in scientific computing, the solution of linear systems of equations. We start
Plant Identification Using Leaf Images
Plant Identification Using Leaf Images Sachin D. Chothe 1, V.R.Ratnaparkhe 2 P.G. Student, Department of EE, Government College of Engineering, Aurangabad, Maharashtra, India 1 Assistant Professor, Department
Introduction to machine learning and pattern recognition Lecture 1 Coryn Bailer-Jones
Introduction to machine learning and pattern recognition Lecture 1 Coryn Bailer-Jones http://www.mpia.de/homes/calj/mlpr_mpia2008.html 1 1 What is machine learning? Data description and interpretation
Automatic Indian Sign Language Recognition for Continuous Video Sequence Joyeeta Singha 1, Karen Das 2
Automatic Indian Sign Language Recognition for Continuous Video Sequence Joyeeta Singha 1, Karen Das 2 1 National Institute of Technology, Silchar, Silchar-788010, Assam, INDIA joyeeta_singha90[at]yahoo.com
INVESTIGATIONS INTO EFFECTIVENESS OF GAUSSIAN AND NEAREST MEAN CLASSIFIERS FOR SPAM DETECTION
INVESTIGATIONS INTO EFFECTIVENESS OF AND CLASSIFIERS FOR SPAM DETECTION Upasna Attri C.S.E. Department, DAV Institute of Engineering and Technology, Jalandhar (India) upasnaa.8@gmail.com Harpreet Kaur
3D Medical Image Enhancement based on Wavelet Transforms
YAVARIABDI et al.: 1 3D Medical Image Enhancement based on Wavelet Transforms Amir Yavariabdi amir.yavariabdi@u-clermont1.fr Chafik Samir chafik.samir@u-clermont1.fr Adrien Bartoli adrien.bartoli@u-clermont1.fr
Denial of Service Attack Detection Using Multivariate Correlation Information and Support Vector Machine Classification
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Denial of Service Attack Detection Using Multivariate Correlation Information and
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin
Challenges in Face Recognition Biometrics. Sujeewa Alwis Cybula Ltd
Challenges in Face Recognition Biometrics Sujeewa Alwis Cybula Ltd Background Techniques and issues Demo Questions Why use face? Every one has got a fairly unique face Can be captured without user cooperation
Fingerprint Verification Using SIFT Features
Fingerprint Verification Using SIFT Features Unsang Park* a, Sharath Pankanti a, A. K. Jain b a IBM T. J. Watson Research Center, Hawthorne, NY, USA 10532; b Dept. of Computer Science & Engineering, Michigan
PCA to Eigenfaces. CS 510 Lecture #16 March 23 th A 9 dimensional PCA example
PCA to Eigenfaces CS 510 Lecture #16 March 23 th 2015 A 9 dimensional PCA example is dark around the edges and bright in the middle. is light with dark vertical bars. is light with dark horizontal bars.
Component Ordering in Independent Component Analysis Based on Data Power
Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
A Novel method to compress still Images using Golomb Code (GC) in JPEG2000
2 IJSNS International Journal of omputer Science and Network Security, VOL.0 No.8, August 0 A Novel method to compress still Images using olomb ode () in JPE00 K.Somasundaram and P. Sumitra2,, Department
A Various Biometric application for authentication and identification
A Various Biometric application for authentication and identification 1 Karuna Soni, 2 Umesh Kumar, 3 Priya Dosodia, Government Mahila Engineering College, Ajmer, India Abstract: In today s environment,
Subspace Analysis and Optimization for AAM Based Face Alignment
Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China zhaoming1999@zju.edu.cn Stan Z. Li Microsoft
Introduction to Medical Image Compression Using Wavelet Transform
National Taiwan University Graduate Institute of Communication Engineering Time Frequency Analysis and Wavelet Transform Term Paper Introduction to Medical Image Compression Using Wavelet Transform 李 自
Fingerprint recognition using standardized fingerprint model
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 11 Fingerprint recognition using standardized fingerprint model Le Hoang Thai 1 and Ha Nhat Tam 2 1 Faculty of Information Technology, University of Science
HYBRID DOMAIN BASED STEGANOGRAPHY USING BPS, LSB AND IWT
92 Chapter 6 HYBRID DOMAIN BASED STEGANOGRAPHY USING BPS, LSB AND IWT Table of contents Particulars Page No. 6.1 Introduction 110 6.2 HSBLI Embedding Model 6.3 HSBLI Extraction Model. 6.4 Algorithms of
Face detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.