CHAPTER 6 MULTIMODAL BIOMETRIC RECOGNITION SYSTEM
|
|
- Bethanie Esther Gardner
- 7 years ago
- Views:
Transcription
1 123 CHAPTER 6 MULTIMODAL BIOMETRIC RECOGNITION SYSTEM Some of the challenges faced by the unimodal biometric systems are noisy data, lack of universal data, less performance improvement and vulnerable to spoof attacks. Hence, multimodal biometric system is preferred, which refers to the system that establishes identity based on combining two or more biometric traits, i.e., fuse multiple traits of an individual or extraction of multiple features and matching algorithms operating on the same biometric. The most compelling reason to combine different biometric traits is to improve the identification accuracy significantly and provide larger population coverage. This can be done when features extracted from different biometrics are statistically independent. 6.1 PROPOSED MULTIMODAL BIOMETRIC SYSTEM The block diagram of the proposed multimodal biometric recognition system is shown in Figure 6.1. The biometric images obtained from each modality are preprocessed, transformed using multi-resolution transforms such as Curvelet and Ridgelet, and then, features are extracted from these transformed output images. These extracted multi-resolution features are compared against the stored templates to generate the match scores.
2 124 DA Iris DA Fingerprint DA Face Preprocessing Preprocessing Preprocessing Multi-resolution Transforms Features Extraction Features Extraction Features Extraction Matching Score Matching Score Matching Score Score level Fusion Stored Templates Decision? Yes Genuine No Imposter DA Data Acquisition Figure 6.1 Block Diagram of Proposed Multimodal Biometric Recognition System A match score is a measure of similarity between the input and template biometric feature vectors. When match score output by different
3 125 biometric matchers are consolidated in order to arrive at a final recognition decision, fusion is said to be done at the match score level. This is also known as fusion at the measurement level or confidence level. After generating matching scores for each modality, the scores are normalized using various techniques such as min-max (MM), max (MX), median-mad (MAD), tanh (TH), double-sigmoid (DS), and z-score (ZS). 6.2 DIFFERENT LEVELS OF FUSION TECHNIQUES The various levels of fusion techniques are broadly categorized into two namely, pre-classification or fusion before matching, and postclassification or fusion after matching (Jain et al 2008). Different fusion techniques that can be accomplished at various levels in a biometric system are shown in Figure 6.2. Biometric Fusion Before matching After matching Sensor Level Feature Level Classifier Fusion Match-Score Level Rank Level Decision Level Figure 6.2 Different Levels of Fusion Techniques in a Biometric System
4 126 The sensor level and feature level techniques fall into the first category, while the second category fusion techniques are match-score level, rank level and decision level Sensor Level Fusion Technique It combines information at the raw data obtained using multiple sensors or multiple snapshots of a biometric using a single sensor. Mosaicing multiple samples of the same biometric is an example of this type of fusion Feature Level Fusion Technique It typically involves enhancing the feature vectors arising from multiple feature extractors and subjecting the fused feature vector to a feature transformation algorithm. This enables the system to compute discriminatory features that can enhance matching performance Match-Score Level Fusion Technique Each individual biometric process typically outputs a match score but possibly, multiple scores. The fusion process fuses these scores into a single score, which is then compared to the system acceptable threshold. If the classification approach to score fusion is allowed, then the output may be direct decisions instead of scores. Fusion methods at this level can be broadly classified into three categories namely, density-based, transformation-based and classifier-based schemes (Ross et al 2006). In the density-based scheme, a large number of training samples are necessary to reliably estimate the joint-density function especially if the dimensionality of the feature vector is large. In transformation-based scheme, a score normalization process is essential to transform the multiple match
5 127 scores generated by multiple matchers into a common domain. The goal of classifier-based scheme is to directly estimate the class rather than to compute an intermediate scalar value. This fusion scheme assumes the availability of a large representative number of genuine and impostor scores during the training phase of the classifier when its parameters are computed Rank Level Fusion Technique When a biometric system operates in the identification mode, the system output can be viewed as a ranking of the enrolled identities. In this case, the output indicates the set of possible matching identities sorted in decreasing order of confidence. The goal of rank level fusion scheme is to consolidate the rank output by the individual biometric subsystems in order to derive a consensus rank for each identity. This fusion technique does not need normalization techniques Decision Level Fusion Each individual biometric process outputs its Boolean result. The fusion process fuses them together by a combination algorithm such as AND, OR rules etc. Other decision level fusion technique includes majority voting, weighted majority voting, Bayesian decision fusion, etc. 6.3 PROPOSED SCORE LEVEL FUSION TECHNIQUES The matching scores at the output of the individual matchers may not be homogeneous. For example, one matcher may output a dissimilarity measure while another may output a similarity measure. Further, the scores of individual measures need not be on the same numerical scale and may follow different statistical distribution. Due to these reasons, score normalization is
6 128 essential to transform the scores of the individual matchers into a common domain prior to combining them Score Normalization Techniques Score normalization refers to changing the location and scale parameters of matching score distributions at the output of the individual matchers, so that the scores of different matchers are transformed into a common domain. When the parameters used for normalization are determined using a fixed training set, it is referred to as fixed score normalization. In such case, the matching score distribution of the training set is examined and a suitable model is chosen to fit the distribution. Based on the model, the normalization parameters are determined. In adaptive score normalization, the normalization parameters are estimated based on the current feature vector. This approach has the ability to adapt to variations in the input data such as the change in the length of the speech signal in speaker recognition systems. The score normalization techniques used in our work include min-max (MM), max (MX), median-mad (MAD), tanh (TH), double-sigmoid (DS), and Z-score (ZS) normalizations. Let M be the total number of matchers, X i be the set of all the raw output values (matching scores) of the corresponding matcher i and x i X i, i M, where x i is the output raw value of the matcher i. The corresponding normalized matching score is denoted as ns i is the set of normalized matching scores of the matcher i. NS i, where NS i Min-max normalization (MM): It is the simplest normalization technique that normalizes the numerical range of the scores to [0, 1] and also retains the shapes of the original distributions. The min-max normalization function is given by
7 129 where min(x i ) and max(x i ) are the minimum and maximum values of the matching scores. Max normalization (MX): This normalization technique is constructed from the above min-max normalization technique by assigning zero to the min value. The max normalization function is given by Median-MAD normalization (MAD): This normalization scheme would be relatively robust to the presence of noise in the training data and is given by The denominator value is Median Absolute Deviation (MAD), which is an estimate of the scale parameter of the feature value. Tanh-normalization (TH): It is similar to Z-score normalization, which is also computed using mean and standard deviation of the match scores. The tanh-normalization function is given as: where µ and respectively. denote the mean and standard deviation of the match scores
8 130 Double-sigmoid normalization (DS): This normalization scheme provides a linear transformation of the scores in the region of overlap, while the scores outside this region are transformed non-linearly. The double-sigmoid normalization function is given by where is the reference operating point and 1 and 2 denote the left and right edges of the region in which the function is linear. The function exhibits linear characteristics in the interval ( - 1, - 2). Z-score normalization (ZS): The most commonly used score normalization technique is the Z-score which is calculated using the arithmetic mean and standard deviation of the match scores. It is given by where µ i and i are the arithmetic mean and standard deviation respectively for the i th matcher. This scheme can be expected to perform well if the average and the variance of the score distributions of the matchers are available, if not known, they can be estimated based on the given training set. Table 6.1 shows the summary of the various matching score level normalization techniques as cited in Ross et al It states that the tanh and double sigmoid techniques are more robust and their efficiencies are high.
9 131 Table 6.1 Summary of Normalization Techniques Normalization techniques Robustness Efficiency Min-max No N/A Max No N/A Median-MAD Yes Moderate Tanh Yes High Double-sigmoid Yes High Z-score No High Various Score-level Fusion Techniques Consider NS iris, NS fp, and NS face as the normalized scores of iris, fingerprint and face respectively. Let a, b and c be the weights assigned respectively to the biometric modalities iris, fingerprint and face. During the implementation of weighted fusion techniques, three test cases are considered. For the first test case, equal weights (0.33) are assigned to all the three modalities and for the remaining two test cases, more weights are assigned to iris, next less weight to fingerprint and least weight to the face modality. The chosen weights are based on the possibility of spoofing attacks. Table 6.2 Different Weights Assignment Strategy Weights assigned for Test case # Iris Fingerprint Face
10 132 Since, this system aims to reduce (or) decrease the vulnerability of spoofing attacks, falsifying iris trait is tough when compared to fingerprint and is still tough when compared to the face modality. Hence, the iris modality is assigned with the highest weight thus leading to better multimodal recognition rate. a takes the value either 0.33 or b takes either 0.3 or 0.33 c takes either 0.2 or 0.3 or 0.33, as listed in Table 6.2. The eight score level fusion techniques namely sum, mean, product, min, max, median, tanh and exponential methods are considered and are listed in Table 6.3. Here, NS final denotes the final normalized score after applying individual fusion techniques. Table 6.3 Various Score Level Fusion Techniques Fusion techniques Formula Weighted Sum Weighted Mean Weighted Min Weighted Max Weighted Median Weighted Product Weighted Tanh Weighted Exponential
11 Decision-Making Technique Threshold value is chosen adaptively by collecting the wrongly classified subjects minimum match scores and applying them in the corresponding fusion techniques. A user is considered to be genuine, if the match score value after fusion is less than the chosen threshold; otherwise as an imposter. 6.4 EXPERIMENTAL RESULTS AND DISCUSSION The proposed multimodal biometric recognition system is tested with the virtual multimodal database formed from the public biometric database. To demonstrate the effectiveness of the proposed methodologies on the virtual multimodal database, the public database considered here are CASIA-IrisV3-Interval database for Iris, FVC2004 DB1_A for fingerprint and ORL database for face. The subjects chosen from each biometric trait is forty with eight samples per subject, leading to 160 images for training and 160 for testing for each biometric modality. Table 6.4 Recognition Rate of the Public Database Modality No. of Subjects Recognition No. of images used for Rate (%) training testing CT RT Iris Fingerprint Face The reason for choosing forty subjects is that the ORL database contains a maximum of forty subjects and reason for choosing eight samples per subject,
12 134 is that FVC2004 DB1_A database as a maximum of eight samples per subject. Table 6.4 illustrates the recognition rate of individual biometric traits from the public biometric database. It is seen from the Table 6.4 that the Ridgelet Transform performs better for iris images and Curvelet Transform performs better for fingerprint and face images Recognition Results for Virtual Multimodal Database Table 6.5 shows the multimodal biometric recognition rate using different normalization and fusion techniques for the virtual multimodal database by considering the above mentioned three test-cases. Eight different score fusion techniques and six different normalization techniques are considered for experimentation. The experimented results are shown in the Table 6.5. Each row in the table defines different fusion techniques and each column defines various normalization techniques. Table 6.5 Recognition Rate using Different Normalization and Fusion Techniques for Virtual Multimodal Database (a) Test Case-1 (b) Test Case-2 and (c) Test Case-3 Normalization techniques Fusion techniques MM MX MAD TH DS ZS Weighted Sum Weighted Mean Weighted Min Weighted Max Weighted Median Weighted Product Weighted Tanh Weighted Exponential (a)
13 135 Table 6.5 (Continued) Normalization techniques Fusion techniques MM MX MAD TH DS ZS Weighted Sum Weighted Mean Weighted Min Weighted Max Weighted Median Weighted Product Weighted Tanh Weighted Exponential (b) Fusion techniques Normalization techniques MM MX MAD TH DS ZS Weighted Sum Weighted Mean Weighted Min Weighted Max Weighted Median Weighted Product Weighted Tanh Weighted Exponential (c) In the case of virtual multimodal database recognition rates, from Table 6.5, it is clearly seen that for the test case-1, % is obtained for the weighted-product fusion technique; for the test case-2, the maximum
14 136 recognition rate of 97.5 % is obtained for weighted-max fusion technique; for the test case-3, the recognition rate of % is achieved for weighted-min, weighted-product and weighted-tanh fusion techniques Recognition Results for Self-built Multimodal Database Table 6.6 shows the multimodal biometric recognition rate for the self-built multimodal database for the above mentioned three test cases. Table 6.6 Recognition Rate using Different Normalization and Fusion Techniques for Self-Built Multimodal Database (a) Test Case-1 (b) Test Case-2 and (c) Test Case-3 Normalization techniques Fusion techniques MM MX MAD TH DS ZS Weighted Sum Weighted Mean Weighted Min Weighted Max Weighted Median Weighted Product Weighted Tanh Weighted Exponential (a)
15 137 Table 6.6 (Continued) Normalization techniques Fusion techniques MM MX MAD TH DS ZS Weighted Sum Weighted Mean Weighted Min Weighted Max Weighted Median Weighted Product Weighted Tanh Weighted Exponential (b) Normalization techniques Fusion techniques MM MX MAD TH DS ZS Weighted Sum Weighted Mean Weighted Min Weighted Max Weighted Median Weighted Product Weighted Tanh Weighted Exponential (c) From Table 6.6, it is observed for the self-built biometric data set that the 100 % recognition rate is achieved for many score normalization and fusion techniques. The test case-3, i.e., weight assignments of 0.5 for iris, 0.3 for fingerprint and 0.2 for face, results in better performance in an overall sense, for all fusion and normalization techniques while weighted-min fusion
16 138 technique outperforms other fusion techniques with 100 % recognition rate for almost all normalization techniques and for the three test cases, as evident from Table PERFORMANCE COMPARISON Liu et al 2009 used three biometric traits namely iris, fingerprint and face with forty subjects and obtained a recognition rate of 95.6% using score level fusion by employing the Gabor Wavelet and the Posterior Union Decision-Based Neural Network (PUDBNN) while our proposed work, achieves a recognition rate of 99.38% for forty subjects which is shown in Table 6.7. Genuine Acceptance Rate (GAR) obtained for the self-built multimodal database is 99.5%. Table 6.7 Performance Comparison with Liu et al (2009) (Against Score Level Fusion) Recognition Rate (in %) Modalities Liu et al (2009) method Proposed method Iris Fingerprint Face Iris + Fingerprint + Face Gan et al (2008) conducted experiments on ORL face database and CASIA iris database. They extracted the two features using Two-Dimensional Discrete Cosine Transform (2-D DCT) and used the Kernel Fisher Discriminant Analysis (KFDA) to produce the optimal discriminant feature at the feature level. They considered 7 frontal samples per subject with front 4 samples for each class as training samples, and the remainder 3
17 139 samples for each class as testing samples. Their obtained correct recognition rate based on appointed and random training and test samples were 96.67% and 94.17% respectively. Our experimental results done on the face and iris database produced the recognition rates of 97.5 % and % at the feature level for the appointed and random training and test samples respectively. It is shown in Table 6.8. Table 6.8 Performance Comparison with Gan et al (2008) (Against Feature Level Fusion) RR of Gan (in %) method RR of proposed method (in %) Al-Hijaili & AbdulAziz (2011) performed the fusion of two features obtained from the iris and face modalities at the matching score-level by assigning weights 0.8 and 0.2 for the iris and face respectively. Iris and face images were recognized using the method proposed by Masek (2003) and Turk & Pentland (1991) respectively. The recognition rates for iris and face images were 95.63% and 75 % for 40 subjects respectively. When the two scores were fused at the score-level, the obtained recognition rate after fusion was % and the genuine acceptance rate (GAR) was 98 %. Our proposed method has provided a recognition rate of 100% at the score level, with a genuine acceptance rate (GAR) of 98%. The recognition rates (RR) of these works are tabulated in Table 6.9.
18 140 Table 6.9 Performance Comparison with Al-Hijaili & AbdulAziz (2011) (Against Score Level Fusion) RR of Al-Hijaili & AbdulAziz (2011) method (in %) RR of proposed method (in %) The improvement in the performance is due to the extraction of statistical / co-occurrence features by deploying multi-resolution transforms such as Curvelet and Ridgelet. Also, the match-score level fusion technique with high weightage assigned to iris biometric modality leads to better recognition rate. 6.7 SUMMARY The proposed framework for multimodal biometric recognition system extracts the multi-resolution features from the Curvelet and Ridgelet transformed output images and the extracted features are matched at the matching score level. The performance of the multimodal biometric system is examined with different score normalization techniques and fusion methods by assigning different weights on both virtual and self-built multimodal database. The proposed weighted-min fusion technique performs well among all the normalization techniques. It is proved that the combination of iris, fingerprint and face biometric modalities for the proposed multimodal biometric recognition system has higher performance than each unimodal separately. The next chapter concludes this thesis work and addresses the scope for further enhancements in this work.
INTEGRATION OF MULTIPLE CUES IN BIOMETRIC SYSTEMS
INTEGRATION OF MULTIPLE CUES IN BIOMETRIC SYSTEMS By Karthik Nandakumar A THESIS Submitted to Michigan State University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Department
More informationThe Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
More informationMultimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
More informationDiscriminative Multimodal Biometric. Authentication Based on Quality Measures
Discriminative Multimodal Biometric Authentication Based on Quality Measures Julian Fierrez-Aguilar a,, Javier Ortega-Garcia a, Joaquin Gonzalez-Rodriguez a, Josef Bigun b a Escuela Politecnica Superior,
More informationMulti-Factor Biometrics: An Overview
Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems
More informationMULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 111-115 MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT A. Jaya Lakshmi 1, I. Ramesh Babu 2,
More informationBiometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
More informationBiostatistics: DESCRIPTIVE STATISTICS: 2, VARIABILITY
Biostatistics: DESCRIPTIVE STATISTICS: 2, VARIABILITY 1. Introduction Besides arriving at an appropriate expression of an average or consensus value for observations of a population, it is important to
More informationEfficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
More informationFace detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
More informationSecuring Electronic Medical Records using Biometric Authentication
Securing Electronic Medical Records using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA, krawcz10@cse.msu.edu, jain@cse.msu.edu Abstract.
More informationSIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
More informationAnalysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
More informationEnvironmental Remote Sensing GEOG 2021
Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class
More informationUSER AUTHENTICATION USING ON-LINE SIGNATURE AND SPEECH
USER AUTHENTICATION USING ON-LINE SIGNATURE AND SPEECH By Stephen Krawczyk A THESIS Submitted to Michigan State University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE
More informationBiometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
More informationInternational Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
More informationSecuring Electronic Medical Records Using Biometric Authentication
Securing Electronic Medical Records Using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA {krawcz10,jain}@cse.msu.edu Abstract. Ensuring
More informationClassification of Fingerprints. Sarat C. Dass Department of Statistics & Probability
Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller
More informationChapter 6. The stacking ensemble approach
82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described
More informationImpact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
More informationSTATS8: Introduction to Biostatistics. Data Exploration. Babak Shahbaba Department of Statistics, UCI
STATS8: Introduction to Biostatistics Data Exploration Babak Shahbaba Department of Statistics, UCI Introduction After clearly defining the scientific problem, selecting a set of representative members
More informationEfficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
More informationPATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION
PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical
More informationIntroduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
More informationA Comparative Study on ATM Security with Multimodal Biometric System
A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. lavanya.kk2005@gmail.com C.Naga Raju Associate Professor
More informationaddressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
More information2.11 CMC curves showing the performance of sketch to digital face image matching. algorithms on the CUHK database... 40
List of Figures 1.1 Illustrating different stages in a face recognition system i.e. image acquisition, face detection, face normalization, feature extraction, and matching.. 10 1.2 Illustrating the concepts
More informationFUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
More informationBachelor's Degree in Business Administration and Master's Degree course description
Bachelor's Degree in Business Administration and Master's Degree course description Bachelor's Degree in Business Administration Department s Compulsory Requirements Course Description (402102) Principles
More informationD-optimal plans in observational studies
D-optimal plans in observational studies Constanze Pumplün Stefan Rüping Katharina Morik Claus Weihs October 11, 2005 Abstract This paper investigates the use of Design of Experiments in observational
More informationChapter 4. Probability and Probability Distributions
Chapter 4. robability and robability Distributions Importance of Knowing robability To know whether a sample is not identical to the population from which it was selected, it is necessary to assess the
More informationFPGA Implementation of Human Behavior Analysis Using Facial Image
RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering
More informationInformation Fusion in Low-Resolution Iris Videos using Principal Components Transform
Information Fusion in Low-Resolution Iris Videos using Principal Components Transform Raghavender Jillela, Arun Ross West Virginia University {Raghavender.Jillela, Arun.Ross}@mail.wvu.edu Patrick J. Flynn
More informationChristfried Webers. Canberra February June 2015
c Statistical Group and College of Engineering and Computer Science Canberra February June (Many figures from C. M. Bishop, "Pattern Recognition and ") 1of 829 c Part VIII Linear Classification 2 Logistic
More informationArtificial Neural Network for Speech Recognition
Artificial Neural Network for Speech Recognition Austin Marshall March 3, 2005 2nd Annual Student Research Showcase Overview Presenting an Artificial Neural Network to recognize and classify speech Spoken
More informationClassification of Bad Accounts in Credit Card Industry
Classification of Bad Accounts in Credit Card Industry Chengwei Yuan December 12, 2014 Introduction Risk management is critical for a credit card company to survive in such competing industry. In addition
More informationMaking Sense of the Mayhem: Machine Learning and March Madness
Making Sense of the Mayhem: Machine Learning and March Madness Alex Tran and Adam Ginzberg Stanford University atran3@stanford.edu ginzberg@stanford.edu I. Introduction III. Model The goal of our research
More informationFACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationDigital image processing
746A27 Remote Sensing and GIS Lecture 4 Digital image processing Chandan Roy Guest Lecturer Department of Computer and Information Science Linköping University Digital Image Processing Most of the common
More informationSupport Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
More informationMBA 611 STATISTICS AND QUANTITATIVE METHODS
MBA 611 STATISTICS AND QUANTITATIVE METHODS Part I. Review of Basic Statistics (Chapters 1-11) A. Introduction (Chapter 1) Uncertainty: Decisions are often based on incomplete information from uncertain
More informationFEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL
FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL STATIsTICs 4 IV. RANDOm VECTORs 1. JOINTLY DIsTRIBUTED RANDOm VARIABLEs If are two rom variables defined on the same sample space we define the joint
More informationComponent Ordering in Independent Component Analysis Based on Data Power
Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals
More informationStatistics I for QBIC. Contents and Objectives. Chapters 1 7. Revised: August 2013
Statistics I for QBIC Text Book: Biostatistics, 10 th edition, by Daniel & Cross Contents and Objectives Chapters 1 7 Revised: August 2013 Chapter 1: Nature of Statistics (sections 1.1-1.6) Objectives
More informationUnder Real Spoofing Attacks
Security Evaluation of Biometric Authentication Systems Under Real Spoofing Attacks Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, and Fabio Roli Department of Electrical and Electronic
More informationLAB 4 INSTRUCTIONS CONFIDENCE INTERVALS AND HYPOTHESIS TESTING
LAB 4 INSTRUCTIONS CONFIDENCE INTERVALS AND HYPOTHESIS TESTING In this lab you will explore the concept of a confidence interval and hypothesis testing through a simulation problem in engineering setting.
More informationFoundation of Quantitative Data Analysis
Foundation of Quantitative Data Analysis Part 1: Data manipulation and descriptive statistics with SPSS/Excel HSRS #10 - October 17, 2013 Reference : A. Aczel, Complete Business Statistics. Chapters 1
More informationConclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
More informationBiometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company
Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company Overview Published standards In-development ISO/IEC standards Scope and status 2 Published
More informationLean Six Sigma Analyze Phase Introduction. TECH 50800 QUALITY and PRODUCTIVITY in INDUSTRY and TECHNOLOGY
TECH 50800 QUALITY and PRODUCTIVITY in INDUSTRY and TECHNOLOGY Before we begin: Turn on the sound on your computer. There is audio to accompany this presentation. Audio will accompany most of the online
More informationAN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
More informationLesson 4 Measures of Central Tendency
Outline Measures of a distribution s shape -modality and skewness -the normal distribution Measures of central tendency -mean, median, and mode Skewness and Central Tendency Lesson 4 Measures of Central
More informationSecurity Issues in Smart Infrastructures for MMBS of Wireless Images for ATM banking
Security Issues in Smart Infrastructures for MMBS of Wireless s for ATM banking S.Koteswari #1, Dr.P.John Paul *2,S.Indrani ~3 # 1 Associate. Professor, Dept of ECE, D.N.R Engineering College, Bhimavaram,W.G.Dist,
More informationWhite Paper Think BIG
White Paper Think BIG Fusion of Biometric and Biographic Data In Large-Scale Identification Projects WCC is a global leader in search and match technology with a market leading platform for identification
More informationBiometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
More informationIntroduction; Descriptive & Univariate Statistics
Introduction; Descriptive & Univariate Statistics I. KEY COCEPTS A. Population. Definitions:. The entire set of members in a group. EXAMPLES: All U.S. citizens; all otre Dame Students. 2. All values of
More informationAssessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall
Automatic Photo Quality Assessment Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Estimating i the photorealism of images: Distinguishing i i paintings from photographs h Florin
More informationANN Based Fault Classifier and Fault Locator for Double Circuit Transmission Line
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-2, April 2016 E-ISSN: 2347-2693 ANN Based Fault Classifier and Fault Locator for Double Circuit
More informationECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
More information1. Classification problems
Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification
More informationBayesian probability theory
Bayesian probability theory Bruno A. Olshausen arch 1, 2004 Abstract Bayesian probability theory provides a mathematical framework for peforming inference, or reasoning, using probability. The foundations
More informationLearning Example. Machine learning and our focus. Another Example. An example: data (loan application) The data and the goal
Learning Example Chapter 18: Learning from Examples 22c:145 An emergency room in a hospital measures 17 variables (e.g., blood pressure, age, etc) of newly admitted patients. A decision is needed: whether
More informationVisual-based ID Verification by Signature Tracking
Visual-based ID Verification by Signature Tracking Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu Outline Biometric ID Visual Signature Acquisition
More informationPoint Biserial Correlation Tests
Chapter 807 Point Biserial Correlation Tests Introduction The point biserial correlation coefficient (ρ in this chapter) is the product-moment correlation calculated between a continuous random variable
More informationReview Jeopardy. Blue vs. Orange. Review Jeopardy
Review Jeopardy Blue vs. Orange Review Jeopardy Jeopardy Round Lectures 0-3 Jeopardy Round $200 How could I measure how far apart (i.e. how different) two observations, y 1 and y 2, are from each other?
More information4. Continuous Random Variables, the Pareto and Normal Distributions
4. Continuous Random Variables, the Pareto and Normal Distributions A continuous random variable X can take any value in a given range (e.g. height, weight, age). The distribution of a continuous random
More informationAbstract. 1. Introduction. 1.1. Methodology
Fingerprint Recognition System Performance in the Maritime Environment Hourieh Fakourfar 1, Serge Belongie 2* 1 Department of Electrical and Computer Engineering, and 2 Department of Computer Science and
More informationMultisensor Data Fusion and Applications
Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: varshney@syr.edu
More informationUSING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu
More informationAuthentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS ABSTRACT: Biometrics based authentication is a potential candidate to
More informationGamma Distribution Fitting
Chapter 552 Gamma Distribution Fitting Introduction This module fits the gamma probability distributions to a complete or censored set of individual or grouped data values. It outputs various statistics
More informationOnline Learning in Biometrics: A Case Study in Face Classifier Update
Online Learning in Biometrics: A Case Study in Face Classifier Update Richa Singh, Mayank Vatsa, Arun Ross, and Afzel Noore Abstract In large scale applications, hundreds of new subjects may be regularly
More informationStandardization and Its Effects on K-Means Clustering Algorithm
Research Journal of Applied Sciences, Engineering and Technology 6(7): 399-3303, 03 ISSN: 040-7459; e-issn: 040-7467 Maxwell Scientific Organization, 03 Submitted: January 3, 03 Accepted: February 5, 03
More informationB-bleaching: Agile Overtraining Avoidance in the WiSARD Weightless Neural Classifier
B-bleaching: Agile Overtraining Avoidance in the WiSARD Weightless Neural Classifier Danilo S. Carvalho 1,HugoC.C.Carneiro 1,FelipeM.G.França 1, Priscila M. V. Lima 2 1- Universidade Federal do Rio de
More informationDetermining optimal window size for texture feature extraction methods
IX Spanish Symposium on Pattern Recognition and Image Analysis, Castellon, Spain, May 2001, vol.2, 237-242, ISBN: 84-8021-351-5. Determining optimal window size for texture feature extraction methods Domènec
More informationObject Recognition and Template Matching
Object Recognition and Template Matching Template Matching A template is a small image (sub-image) The goal is to find occurrences of this template in a larger image That is, you want to find matches of
More informationLecture 14. Point Spread Function (PSF)
Lecture 14 Point Spread Function (PSF), Modulation Transfer Function (MTF), Signal-to-noise Ratio (SNR), Contrast-to-noise Ratio (CNR), and Receiver Operating Curves (ROC) Point Spread Function (PSF) Recollect
More informationCurriculum Map Statistics and Probability Honors (348) Saugus High School Saugus Public Schools 2009-2010
Curriculum Map Statistics and Probability Honors (348) Saugus High School Saugus Public Schools 2009-2010 Week 1 Week 2 14.0 Students organize and describe distributions of data by using a number of different
More informationLecture 9: Introduction to Pattern Analysis
Lecture 9: Introduction to Pattern Analysis g Features, patterns and classifiers g Components of a PR system g An example g Probability definitions g Bayes Theorem g Gaussian densities Features, patterns
More informationStructural Health Monitoring Tools (SHMTools)
Structural Health Monitoring Tools (SHMTools) Parameter Specifications LANL/UCSD Engineering Institute LA-CC-14-046 c Copyright 2014, Los Alamos National Security, LLC All rights reserved. May 30, 2014
More informationSTATISTICA Formula Guide: Logistic Regression. Table of Contents
: Table of Contents... 1 Overview of Model... 1 Dispersion... 2 Parameterization... 3 Sigma-Restricted Model... 3 Overparameterized Model... 4 Reference Coding... 4 Model Summary (Summary Tab)... 5 Summary
More informationPalmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap
Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic
More informationMultimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
More informationTemplate and Database Security in Biometrics Systems: A Challenging Task
Template and Database Security in Biometrics Systems: A Challenging Task Manvjeet Kaur Lecturer CSE Deptt. Dr. Sanjeev Sofat Prof. and Head CSE Deptt. Deepak Saraswat ME (CSE) Student ABSTRACT Security
More informationThe Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
More informationThe Development of a Pressure-based Typing Biometrics User Authentication System
The Development of a Pressure-based Typing Biometrics User Authentication System Chen Change Loy Adv. Informatics Research Group MIMOS Berhad by Assoc. Prof. Dr. Chee Peng Lim Associate Professor Sch.
More informationFace Recognition: Impostor-based Measures of Uniqueness and Quality
To appear: Proceedings of the IEEE Conference on Biometrics: Theory, Applications, and Systems, 22. Face Recognition: Impostor-based Measures of Uniqueness and Quality Brendan F. Klare Noblis Falls Church,
More informationStructural Health Monitoring Tools (SHMTools)
Structural Health Monitoring Tools (SHMTools) Getting Started LANL/UCSD Engineering Institute LA-CC-14-046 c Copyright 2014, Los Alamos National Security, LLC All rights reserved. May 30, 2014 Contents
More informationCA200 Quantitative Analysis for Business Decisions. File name: CA200_Section_04A_StatisticsIntroduction
CA200 Quantitative Analysis for Business Decisions File name: CA200_Section_04A_StatisticsIntroduction Table of Contents 4. Introduction to Statistics... 1 4.1 Overview... 3 4.2 Discrete or continuous
More informationCHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
More informationMachine Learning and Data Mining. Fundamentals, robotics, recognition
Machine Learning and Data Mining Fundamentals, robotics, recognition Machine Learning, Data Mining, Knowledge Discovery in Data Bases Their mutual relations Data Mining, Knowledge Discovery in Databases,
More informationMeasuring Line Edge Roughness: Fluctuations in Uncertainty
Tutor6.doc: Version 5/6/08 T h e L i t h o g r a p h y E x p e r t (August 008) Measuring Line Edge Roughness: Fluctuations in Uncertainty Line edge roughness () is the deviation of a feature edge (as
More informationData Exploration Data Visualization
Data Exploration Data Visualization What is data exploration? A preliminary exploration of the data to better understand its characteristics. Key motivations of data exploration include Helping to select
More informationBEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
More informationMethod of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
More informationHow To Run Statistical Tests in Excel
How To Run Statistical Tests in Excel Microsoft Excel is your best tool for storing and manipulating data, calculating basic descriptive statistics such as means and standard deviations, and conducting
More informationHow To Identify A Churner
2012 45th Hawaii International Conference on System Sciences A New Ensemble Model for Efficient Churn Prediction in Mobile Telecommunication Namhyoung Kim, Jaewook Lee Department of Industrial and Management
More informationVEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS
VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS Aswin C Sankaranayanan, Qinfen Zheng, Rama Chellappa University of Maryland College Park, MD - 277 {aswch, qinfen, rama}@cfar.umd.edu Volkan Cevher, James
More informationEvaluation of Feature Selection Methods for Predictive Modeling Using Neural Networks in Credits Scoring
714 Evaluation of Feature election Methods for Predictive Modeling Using Neural Networks in Credits coring Raghavendra B. K. Dr. M.G.R. Educational and Research Institute, Chennai-95 Email: raghavendra_bk@rediffmail.com
More information