2.11 CMC curves showing the performance of sketch to digital face image matching. algorithms on the CUHK database... 40

Size: px
Start display at page:

Download "2.11 CMC curves showing the performance of sketch to digital face image matching. algorithms on the CUHK database... 40"

Transcription

1 List of Figures 1.1 Illustrating different stages in a face recognition system i.e. image acquisition, face detection, face normalization, feature extraction, and matching Illustrating the concepts of inter-class and intra-class variations in biometrics Covariates of face recognition: (a) existing covariates and (b) emerging covariates Examples showing exaggeration of facial features in forensic sketches Paper quality, sensor noise, and old photographs can affect the quality of sketch-digital image pairs and hence reduce the performance of matching algorithms. (a) Good quality sketch-digital image pairs (CUHK database) and (b) poor quality sketch-digital image pairs (Forensic sketch database) Quality enhancement using the pre-processing technique. (a) represents digital face image before and after pre-processing and(b) represents forensic sketches before and after pre-processing Steps involved in the proposed algorithm for matching sketches with digital face images Illustrating the steps involved in computing the circular WLD histogram (adapted from [1]) Illustrating the steps involved in memetic optimization for assigning optimal weights to each tessellated face region (a) Sample images from the IIIT-Delhi Sketch database. The first row represents the viewed sketches, the second row represents the corresponding digital face images and the third row represents the corresponding semiforensic sketches. (b) Sample images from the CUHK database Sample images from the Forensic Sketch database. Images are obtained from different forensic artists [2], [3]

2 2.9 CMC curves showing the performance of sketch to digital face image matching algorithms on the CUHK database CMC curves showing the performance of sketch to digital face image matching algorithms on the IIIT-Delhi Viewed Sketch database CMC curves showing the performance of sketch to digital face image matching algorithms on the Combined database CMC curves showing the identification performance when algorithms are trained on viewed sketches and matching is performed on semi-forensic sketches CMC curves showing the identification performance when algorithms are trained on viewed sketches and matching is performed on forensic sketches CMC curves showing the identification performance when algorithms are trained on semi-forensic sketches and matching is performed on forensic sketches CMC curves showing the identification performance when algorithms are trained on viewed sketch-digital image pairs and testing is performed using pre-processed (enhanced) forensic sketch-digital image pairs CMC curves showing the identification performance when algorithms are trained on viewed sketch-digital image pairs and tested with large scale digital gallery and forensic sketch probes CMC curves showing the identification performance when algorithms are trained on semi-forensic sketch-digital image pairs and tested with large scale digital (enhanced) gallery and pre-processed forensic sketch probes Illustrating sample cases when (a) the proposed approach and LFDA [4] correctly recognize, (b) LFDA fails while the proposed algorithm correctly recognizes, (c) the proposed algorithm fails while LFDA correctly recognizes, and (d) both the algorithms fail to recognize Facial regions for correctly and incorrectly matched (a) viewed sketches, (b) semi-forensic sketches, and (c) forensic sketches. Dots represents the area that user found to be most discriminating in matching the sketch with digital face images Illustrating the variations in facial appearance, texture, and structural geometry caused due to plastic surgery (images taken from internet)

3 3.2 Relation among plastic surgery, aging, and disguise variations with respect to face recognition Block diagram illustrating different stages of the proposed algorithm Face granules in the first level of granularity. F Gr1,F Gr2, and F Gr3 are generatedbythegaussianoperator, andf Gr4,F Gr5, andf Gr6 aregenerated by the Laplacian operator Horizontal face granules from the second level of granularity (F Gr7 F Gr15 ) Vertical face granules from the second level of granularity (F Gr16 F Gr24 ) (a) Golden ratio face template [5] and (b) face granules in the third level of granularity (F Gr25 F Gr40 ) Genetic optimization process for selecting feature extractor and weight for each face granule CMC curves for the proposed and existing algorithms on the plastic surgery face database CMC curves for the proposed and existing algorithms on the combined heterogeneous face database CMC curves for the proposed and commercial algorithms for large scale evaluation on probe images from (a) Case 1 of Experiment 3 and (b) Case 2 of Experiment CMC curves for the proposed and commercial algorithms for large scale evaluation on probe images from (a) Case 1 of Experiment 3 and (b) Case 2 of Experiment CMC curves on different types of local and global plastic surgery procedures for the proposed algorithm F Gr29 represents the right periocular region and F Gr31 represents the left periocular region CMC curves comparing the performance of different algorithms for matching periocular region on the plastic surgery face database Illustrating the difference in matching (a) low resolution and high resolution images, (b) two high resolution images, and (c) two low resolution images Illustrates the challenge in matching low resolution images when coupled with other covariates. Low resolution challenge (a) alone, (b) with pose, (c) with illumination, and (d) with expression

4 4.3 Broad view of super resolution based approaches for cross-resolution face matching Broad view of transformation based approaches for cross-resolution face matching Illustrating the cross-pollination of transfer learning and co-training for transferring knowledge from source domain to target domain Block diagram illustrating the steps involved in the proposed co-transfer learning framework Block diagram illustrating the training process of the source and target domain classifiers to build the ensembles Block diagram illustrating the co-transfer learning in the target domain with unlabeled probe instances Sample images from the (a) CMU Multi-PIE, (b) SCface, (c) ChokePoint, and (d) MBGC v.2 video challenge databases CMC curves showing the performance for matching probe images with gallery images on the CMU Multi-PIE database CMC curves showing the performance for matching probe images with gallery images on the SCface database CMC curves showing the performance for matching probe images with gallery images on the ChokePoint database CMC curves showing the performance for matching probe images with gallery images on the MBGC v.2 video challenge database Illustrating sample cases when the proposed approach (a) correctly recognizes and (b) fails to recognize. All the examples are with probe(left image) size and gallery (right image) size Illustrates the confidence interval for different algorithms for matching crossresolution face images on the CMU Multi-PIE database Illustrates the confidence interval for different algorithms for matching crossresolution face images on the SCface database Illustrates the confidence interval for different algorithms for matching crossresolution face images on the ChokePoint database Illustrates the confidence interval for different algorithms for matching crossresolution face images on the MBGC v2 video challenge database

5 4.19 Enhanced images obtained using three super-resolution techniques (SR- 1,SR-2, and SR-3). The leftmost column represents low resolution (24 24) images and the rightmost column represents the original high resolution images (72 72) from the (a) CMU Multi-PIE, (b) SCface, (c) ChokePoint, and (d) MBGC v.2 video challenge databases CMC curves comparing the performance of the proposed algorithm with three super resolution techniques on the CMU Multi-PIE database. Probe images of pixels are super-resolved by a magnification factor of 3 to match the gallery resolution of pixels CMC curves comparing the performance of the proposed algorithm with three super resolution techniques on the SCface database. Probe images of pixels are super-resolved by a magnification factor of 3 to match the gallery resolution of pixels CMC curves comparing the performance of the proposed algorithm with three super resolution techniques on the ChokePoint database. Probe images of pixels are super-resolved by a magnification factor of 3 to match the gallery resolution of pixels CMC curves comparing the performance of the proposed algorithm with three super resolution techniques on the MBGC v.2 video challenge database. Probe images of pixels are super-resolved by a magnification factor of 3 to match the gallery resolution of pixels Real world cases for cross-resolution face matching: (a) low resolution probe images and (b) corresponding gallery images Illustrates the abundant information present in videos. Compared to (a) still face images, (b) video frames represent large intra-personal and temporal variations useful for face recognition Illustrates the block diagram of the proposed algorithm for matching two videos Illustrates clustering based re-ranking and fusion to form the video signature. Clustering based re-ranking associates dictionary images to different clusters and adjusts their similarity scores. It facilitates to bring images similar to the query frame towards the top of the ranked list. The lists are then re-ranked using the adjusted scores and are finally combined to generate the video signature

6 5.4 Sample images from the MBGC v2 database (a) still face images, (b) frames from activity video, and (c) frames from walking video Illustrates the variations in equal error rate by varying the number of clusters ROC curves comparing the performance of the proposed algorithm with benchmark results on the YouTube faces database [6]. (Best viewed in color). The results from the YouTube database website are as of October, Illustrating examples when the proposed algorithm correctly classified (a) same, (b) not-same video pairs from the YouTube faces database [6]. Similarly, examples when the proposed algorithm incorrectly classified (c) same and (d) not-same video pairs Illustrates the confidence interval for different algorithms for video based face recognition on the YouTube faces database ROC curves comparing the performance of the proposed algorithm with COTS and MNF on the MBGC v2 database [7] for matching activity and walking videos with the gallery comprising still face images ROC curves comparing the performance of the proposed algorithm with COTS and MNF on the MBGC v2 database [7] for matching still face images with gallery comprising activity and walking videos. (Best viewed in color) ROC curves showing the performance of the proposed algorithm on the MBGC v2 video challenge database [7] for matching walking vs walking (WW) ROC curves showing the performance of the proposed algorithm on the MBGC v2 video challenge database [7] for matching walking vs activity (WA) ROC curves showing the performance of the proposed algorithm on the MBGC v2 video challenge database [7] for matching activity vs activity (AA) videos (Best viewed in color) Progression in face recognition with respect to different covariates

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

Face Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park

Face Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park Face Recognition: Some Challenges in Forensics Anil K. Jain, Brendan Klare, and Unsang Park Forensic Identification Apply A l science i tto analyze data for identification Traditionally: Latent FP, DNA,

More information

A Learning Based Method for Super-Resolution of Low Resolution Images

A Learning Based Method for Super-Resolution of Low Resolution Images A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 [email protected] Abstract The main objective of this project is the study of a learning based method

More information

Performance Comparison of Visual and Thermal Signatures for Face Recognition

Performance Comparison of Visual and Thermal Signatures for Face Recognition Performance Comparison of Visual and Thermal Signatures for Face Recognition Besma Abidi The University of Tennessee The Biometric Consortium Conference 2003 September 22-24 OUTLINE Background Recognition

More information

Interactive person re-identification in TV series

Interactive person re-identification in TV series Interactive person re-identification in TV series Mika Fischer Hazım Kemal Ekenel Rainer Stiefelhagen CV:HCI lab, Karlsruhe Institute of Technology Adenauerring 2, 76131 Karlsruhe, Germany E-mail: {mika.fischer,ekenel,rainer.stiefelhagen}@kit.edu

More information

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014 Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College

More information

Efficient Attendance Management: A Face Recognition Approach

Efficient Attendance Management: A Face Recognition Approach Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely

More information

Online Learning in Biometrics: A Case Study in Face Classifier Update

Online Learning in Biometrics: A Case Study in Face Classifier Update Online Learning in Biometrics: A Case Study in Face Classifier Update Richa Singh, Mayank Vatsa, Arun Ross, and Afzel Noore Abstract In large scale applications, hundreds of new subjects may be regularly

More information

Low-resolution Image Processing based on FPGA

Low-resolution Image Processing based on FPGA Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,

More information

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA

More information

Introduction to Pattern Recognition

Introduction to Pattern Recognition Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University [email protected] CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)

More information

Multidimensional Scaling for Matching. Low-resolution Face Images

Multidimensional Scaling for Matching. Low-resolution Face Images Multidimensional Scaling for Matching 1 Low-resolution Face Images Soma Biswas, Member, IEEE, Kevin W. Bowyer, Fellow, IEEE, and Patrick J. Flynn, Senior Member, IEEE Abstract Face recognition performance

More information

Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall

Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Automatic Photo Quality Assessment Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Estimating i the photorealism of images: Distinguishing i i paintings from photographs h Florin

More information

Understanding The Face Image Format Standards

Understanding The Face Image Format Standards Understanding The Face Image Format Standards Paul Griffin, Ph.D. Chief Technology Officer Identix April 2005 Topics The Face Image Standard The Record Format Frontal Face Images Face Images and Compression

More information

3)Skilled Forgery: It is represented by suitable imitation of genuine signature mode.it is also called Well-Versed Forgery[4].

3)Skilled Forgery: It is represented by suitable imitation of genuine signature mode.it is also called Well-Versed Forgery[4]. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Technique

More information

Face Recognition in Low-resolution Images by Using Local Zernike Moments

Face Recognition in Low-resolution Images by Using Local Zernike Moments Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie

More information

Environmental Remote Sensing GEOG 2021

Environmental Remote Sensing GEOG 2021 Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class

More information

Open issues and research trends in Content-based Image Retrieval

Open issues and research trends in Content-based Image Retrieval Open issues and research trends in Content-based Image Retrieval Raimondo Schettini DISCo Universita di Milano Bicocca [email protected] www.disco.unimib.it/schettini/ IEEE Signal Processing Society

More information

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research

More information

SIGNATURE VERIFICATION

SIGNATURE VERIFICATION SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University

More information

Extracting a Good Quality Frontal Face Images from Low Resolution Video Sequences

Extracting a Good Quality Frontal Face Images from Low Resolution Video Sequences Extracting a Good Quality Frontal Face Images from Low Resolution Video Sequences Pritam P. Patil 1, Prof. M.V. Phatak 2 1 ME.Comp, 2 Asst.Professor, MIT, Pune Abstract The face is one of the important

More information

DYNAMIC FUZZY PATTERN RECOGNITION WITH APPLICATIONS TO FINANCE AND ENGINEERING LARISA ANGSTENBERGER

DYNAMIC FUZZY PATTERN RECOGNITION WITH APPLICATIONS TO FINANCE AND ENGINEERING LARISA ANGSTENBERGER DYNAMIC FUZZY PATTERN RECOGNITION WITH APPLICATIONS TO FINANCE AND ENGINEERING LARISA ANGSTENBERGER Kluwer Academic Publishers Boston/Dordrecht/London TABLE OF CONTENTS FOREWORD ACKNOWLEDGEMENTS XIX XXI

More information

Signature verification using Kolmogorov-Smirnov. statistic

Signature verification using Kolmogorov-Smirnov. statistic Signature verification using Kolmogorov-Smirnov statistic Harish Srinivasan, Sargur N.Srihari and Matthew J Beal University at Buffalo, the State University of New York, Buffalo USA {srihari,hs32}@cedar.buffalo.edu,[email protected]

More information

Pre-Calculus Math 12 First Assignment

Pre-Calculus Math 12 First Assignment Name: Pre-Calculus Math 12 First Assignment This assignment consists of two parts, a review of function notation and an introduction to translating graphs of functions. It is the first work for the Pre-Calculus

More information

Redundant Wavelet Transform Based Image Super Resolution

Redundant Wavelet Transform Based Image Super Resolution Redundant Wavelet Transform Based Image Super Resolution Arti Sharma, Prof. Preety D Swami Department of Electronics &Telecommunication Samrat Ashok Technological Institute Vidisha Department of Electronics

More information

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Vehicle Tracking System Robust to Changes in Environmental Conditions

Vehicle Tracking System Robust to Changes in Environmental Conditions INORMATION & COMMUNICATIONS Vehicle Tracking System Robust to Changes in Environmental Conditions Yasuo OGIUCHI*, Masakatsu HIGASHIKUBO, Kenji NISHIDA and Takio KURITA Driving Safety Support Systems (DSSS)

More information

PHYSIOLOGICALLY-BASED DETECTION OF COMPUTER GENERATED FACES IN VIDEO

PHYSIOLOGICALLY-BASED DETECTION OF COMPUTER GENERATED FACES IN VIDEO PHYSIOLOGICALLY-BASED DETECTION OF COMPUTER GENERATED FACES IN VIDEO V. Conotter, E. Bodnari, G. Boato H. Farid Department of Information Engineering and Computer Science University of Trento, Trento (ITALY)

More information

M3039 MPEG 97/ January 1998

M3039 MPEG 97/ January 1998 INTERNATIONAL ORGANISATION FOR STANDARDISATION ORGANISATION INTERNATIONALE DE NORMALISATION ISO/IEC JTC1/SC29/WG11 CODING OF MOVING PICTURES AND ASSOCIATED AUDIO INFORMATION ISO/IEC JTC1/SC29/WG11 M3039

More information

Infographics in the Classroom: Using Data Visualization to Engage in Scientific Practices

Infographics in the Classroom: Using Data Visualization to Engage in Scientific Practices Infographics in the Classroom: Using Data Visualization to Engage in Scientific Practices Activity 4: Graphing and Interpreting Data In Activity 4, the class will compare different ways to graph the exact

More information

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode

More information

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.

More information

Document Image Retrieval using Signatures as Queries

Document Image Retrieval using Signatures as Queries Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and

More information

Template-based Eye and Mouth Detection for 3D Video Conferencing

Template-based Eye and Mouth Detection for 3D Video Conferencing Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer

More information

Detecting Credit Card Fraud

Detecting Credit Card Fraud Case Study Detecting Credit Card Fraud Analysis of Behaviometrics in an online Payment environment Introduction BehavioSec have been conducting tests on Behaviometrics stemming from card payments within

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:

More information

PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM

PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM Rohan Ashok Mandhare 1, Pragati Upadhyay 2,Sudha Gupta 3 ME Student, K.J.SOMIYA College of Engineering, Vidyavihar, Mumbai, Maharashtra,

More information

Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

More information

DeCyder Extended Data Analysis module Version 1.0

DeCyder Extended Data Analysis module Version 1.0 GE Healthcare DeCyder Extended Data Analysis module Version 1.0 Module for DeCyder 2D version 6.5 User Manual Contents 1 Introduction 1.1 Introduction... 7 1.2 The DeCyder EDA User Manual... 9 1.3 Getting

More information

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification

More information

Recognizing Cats and Dogs with Shape and Appearance based Models. Group Member: Chu Wang, Landu Jiang

Recognizing Cats and Dogs with Shape and Appearance based Models. Group Member: Chu Wang, Landu Jiang Recognizing Cats and Dogs with Shape and Appearance based Models Group Member: Chu Wang, Landu Jiang Abstract Recognizing cats and dogs from images is a challenging competition raised by Kaggle platform

More information

Face Recognition For Remote Database Backup System

Face Recognition For Remote Database Backup System Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM

More information

Analecta Vol. 8, No. 2 ISSN 2064-7964

Analecta Vol. 8, No. 2 ISSN 2064-7964 EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,

More information

Efficient on-line Signature Verification System

Efficient on-line Signature Verification System International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information

More information

STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK

STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Volume 6, Issue 3, pp: 335343 IJESET STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Dipti Verma 1, Sipi Dubey 2 1 Department of Computer

More information

Optical Methods of Surface Measurement

Optical Methods of Surface Measurement Optical Methods of Surface Measurement Ted Vorburger, Guest Researcher National Institute of Standards and Technology (NIST) Measurement Science and Standards in Forensic Firearms Analysis 2012 NIST, Gaithersburg,

More information

Visualization Software

Visualization Software Visualization Software Maneesh Agrawala CS 294-10: Visualization Fall 2007 Assignment 1b: Deconstruction & Redesign Due before class on Sep 12, 2007 1 Assignment 2: Creating Visualizations Use existing

More information

TDS5000B, TDS6000B, TDS/CSA7000B Series Acquisition Modes

TDS5000B, TDS6000B, TDS/CSA7000B Series Acquisition Modes TDS5000B, TDS6000B, TDS/CSA7000B Series Acquisition Modes Tektronix oscilloscopes provide several different acquisition modes. While this gives the user great flexibility and choice, each mode is optimized

More information

1816 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 7, JULY 2006. Principal Components Null Space Analysis for Image and Video Classification

1816 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 7, JULY 2006. Principal Components Null Space Analysis for Image and Video Classification 1816 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 7, JULY 2006 Principal Components Null Space Analysis for Image and Video Classification Namrata Vaswani, Member, IEEE, and Rama Chellappa, Fellow,

More information

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic

More information

Using Lexical Similarity in Handwritten Word Recognition

Using Lexical Similarity in Handwritten Word Recognition Using Lexical Similarity in Handwritten Word Recognition Jaehwa Park and Venu Govindaraju Center of Excellence for Document Analysis and Recognition (CEDAR) Department of Computer Science and Engineering

More information

FPGA Implementation of Human Behavior Analysis Using Facial Image

FPGA Implementation of Human Behavior Analysis Using Facial Image RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

STATISTICA. Financial Institutions. Case Study: Credit Scoring. and

STATISTICA. Financial Institutions. Case Study: Credit Scoring. and Financial Institutions and STATISTICA Case Study: Credit Scoring STATISTICA Solutions for Business Intelligence, Data Mining, Quality Control, and Web-based Analytics Table of Contents INTRODUCTION: WHAT

More information

Big Data: Image & Video Analytics

Big Data: Image & Video Analytics Big Data: Image & Video Analytics How it could support Archiving & Indexing & Searching Dieter Haas, IBM Deutschland GmbH The Big Data Wave 60% of internet traffic is multimedia content (images and videos)

More information

HIGH-PERFORMANCE INSPECTION VEHICLE FOR RAILWAYS AND TUNNEL LININGS. HIGH-PERFORMANCE INSPECTION VEHICLE FOR RAILWAY AND ROAD TUNNEL LININGS.

HIGH-PERFORMANCE INSPECTION VEHICLE FOR RAILWAYS AND TUNNEL LININGS. HIGH-PERFORMANCE INSPECTION VEHICLE FOR RAILWAY AND ROAD TUNNEL LININGS. HIGH-PERFORMANCE INSPECTION VEHICLE FOR RAILWAYS AND TUNNEL LININGS. HIGH-PERFORMANCE INSPECTION VEHICLE FOR RAILWAY AND ROAD TUNNEL LININGS. The vehicle developed by Euroconsult and Pavemetrics and described

More information

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines. International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

Galaxy Morphological Classification

Galaxy Morphological Classification Galaxy Morphological Classification Jordan Duprey and James Kolano Abstract To solve the issue of galaxy morphological classification according to a classification scheme modelled off of the Hubble Sequence,

More information

Open-Set Face Recognition-based Visitor Interface System

Open-Set Face Recognition-based Visitor Interface System Open-Set Face Recognition-based Visitor Interface System Hazım K. Ekenel, Lorant Szasz-Toth, and Rainer Stiefelhagen Computer Science Department, Universität Karlsruhe (TH) Am Fasanengarten 5, Karlsruhe

More information

Chapter 3 Data Warehouse - technological growth

Chapter 3 Data Warehouse - technological growth Chapter 3 Data Warehouse - technological growth Computing began with data storage in conventional file systems. In that era the data volume was too small and easy to be manageable. With the increasing

More information

Conclusions and Future Directions

Conclusions and Future Directions Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions

More information

SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp

SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS Nitin Khanna and Edward J. Delp Video and Image Processing Laboratory School of Electrical and Computer Engineering Purdue University West Lafayette,

More information

Unit 9 Describing Relationships in Scatter Plots and Line Graphs

Unit 9 Describing Relationships in Scatter Plots and Line Graphs Unit 9 Describing Relationships in Scatter Plots and Line Graphs Objectives: To construct and interpret a scatter plot or line graph for two quantitative variables To recognize linear relationships, non-linear

More information

A Framework for Secure Cloud- Empowered Mobile Biometrics

A Framework for Secure Cloud- Empowered Mobile Biometrics A Framework for Secure Cloud- Empowered Mobile Biometrics A. Bommagani 1, M. C. ValenA 1, and A. Ross 2 1 West Virginia University, Morgantown, WV, USA 2 Michigan State University, East Lansing, MI, USA

More information

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,

More information

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic

More information

A method of generating free-route walk-through animation using vehicle-borne video image

A method of generating free-route walk-through animation using vehicle-borne video image A method of generating free-route walk-through animation using vehicle-borne video image Jun KUMAGAI* Ryosuke SHIBASAKI* *Graduate School of Frontier Sciences, Shibasaki lab. University of Tokyo 4-6-1

More information

THE development of methods for automatic detection

THE development of methods for automatic detection Learning to Detect Objects in Images via a Sparse, Part-Based Representation Shivani Agarwal, Aatif Awan and Dan Roth, Member, IEEE Computer Society 1 Abstract We study the problem of detecting objects

More information

SAMPLE MIDTERM QUESTIONS

SAMPLE MIDTERM QUESTIONS Geography 309 Sample MidTerm Questions Page 1 SAMPLE MIDTERM QUESTIONS Textbook Questions Chapter 1 Questions 4, 5, 6, Chapter 2 Questions 4, 7, 10 Chapter 4 Questions 8, 9 Chapter 10 Questions 1, 4, 7

More information

Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition

Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition Send Orders for Reprints to [email protected] The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary

More information

Scatter Plots with Error Bars

Scatter Plots with Error Bars Chapter 165 Scatter Plots with Error Bars Introduction The procedure extends the capability of the basic scatter plot by allowing you to plot the variability in Y and X corresponding to each point. Each

More information

MACHINE VISION MNEMONICS, INC. 102 Gaither Drive, Suite 4 Mount Laurel, NJ 08054 USA 856-234-0970 www.mnemonicsinc.com

MACHINE VISION MNEMONICS, INC. 102 Gaither Drive, Suite 4 Mount Laurel, NJ 08054 USA 856-234-0970 www.mnemonicsinc.com MACHINE VISION by MNEMONICS, INC. 102 Gaither Drive, Suite 4 Mount Laurel, NJ 08054 USA 856-234-0970 www.mnemonicsinc.com Overview A visual information processing company with over 25 years experience

More information

Face detection is a process of localizing and extracting the face region from the

Face detection is a process of localizing and extracting the face region from the Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.

More information

Multisensor Data Fusion and Applications

Multisensor Data Fusion and Applications Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: [email protected]

More information

A Counting Algorithm and Application of Image-Based Printed Circuit Boards

A Counting Algorithm and Application of Image-Based Printed Circuit Boards Tamkang Journal of Science and Engineering, Vol. 12, No. 4, pp. 471 479 (2009) 471 A Counting Algorithm and Application of Image-Based Printed Circuit Boards Ping-Huang Wu 1 * and Chin-Hwa Kuo 2 1 Department

More information

ADVANTAGES AND DISADVANTAGES OF THE HOUGH TRANSFORMATION IN THE FRAME OF AUTOMATED BUILDING EXTRACTION

ADVANTAGES AND DISADVANTAGES OF THE HOUGH TRANSFORMATION IN THE FRAME OF AUTOMATED BUILDING EXTRACTION ADVANTAGES AND DISADVANTAGES OF THE HOUGH TRANSFORMATION IN THE FRAME OF AUTOMATED BUILDING EXTRACTION G. Vozikis a,*, J.Jansa b a GEOMET Ltd., Faneromenis 4 & Agamemnonos 11, GR - 15561 Holargos, GREECE

More information

Neovision2 Performance Evaluation Protocol

Neovision2 Performance Evaluation Protocol Neovision2 Performance Evaluation Protocol Version 3.0 4/16/2012 Public Release Prepared by Rajmadhan Ekambaram [email protected] Dmitry Goldgof, Ph.D. [email protected] Rangachar Kasturi, Ph.D.

More information

Review Article Biometric Template Security

Review Article Biometric Template Security Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 579416, 17 pages doi:10.1155/2008/579416 Review Article Biometric Template Security Anil K. Jain,

More information

Keywords Input Images, Damage face images, Face recognition system, etc...

Keywords Input Images, Damage face images, Face recognition system, etc... Volume 5, Issue 4, 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Research - Face Recognition

More information

Object Recognition. Selim Aksoy. Bilkent University [email protected]

Object Recognition. Selim Aksoy. Bilkent University saksoy@cs.bilkent.edu.tr Image Classification and Object Recognition Selim Aksoy Department of Computer Engineering Bilkent University [email protected] Image classification Image (scene) classification is a fundamental

More information

Introduction. A. Bellaachia Page: 1

Introduction. A. Bellaachia Page: 1 Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.

More information

Structural Health Monitoring Tools (SHMTools)

Structural Health Monitoring Tools (SHMTools) Structural Health Monitoring Tools (SHMTools) Getting Started LANL/UCSD Engineering Institute LA-CC-14-046 c Copyright 2014, Los Alamos National Security, LLC All rights reserved. May 30, 2014 Contents

More information

Information Management course

Information Management course Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli ([email protected])

More information

E27 SPRING 2013 ZUCKER PROJECT 2 PROJECT 2 AUGMENTED REALITY GAMING SYSTEM

E27 SPRING 2013 ZUCKER PROJECT 2 PROJECT 2 AUGMENTED REALITY GAMING SYSTEM PROJECT 2 AUGMENTED REALITY GAMING SYSTEM OVERVIEW For this project, you will implement the augmented reality gaming system that you began to design during Exam 1. The system consists of a computer, projector,

More information

GPU Point List Generation through Histogram Pyramids

GPU Point List Generation through Histogram Pyramids VMV 26, GPU Programming GPU Point List Generation through Histogram Pyramids Gernot Ziegler, Art Tevs, Christian Theobalt, Hans-Peter Seidel Agenda Overall task Problems Solution principle Algorithm: Discriminator

More information

Machine Learning: Overview

Machine Learning: Overview Machine Learning: Overview Why Learning? Learning is a core of property of being intelligent. Hence Machine learning is a core subarea of Artificial Intelligence. There is a need for programs to behave

More information

FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS

FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS K.Jaikumar 1, M.Santhosh Kumar 2, S.Rajkumar 3, A.Sakthivel 4 1 Asst. Professor-ECE, P. A. College of Engineering and Technology 2

More information

Performance Evaluation of Biometric Template Update

Performance Evaluation of Biometric Template Update Performance Evaluation of Biometric Template Update Romain Giot and Christophe Rosenberger Université de Caen, UMR 6072 GREYC ENSICAEN, UMR 6072 GREYC CNRS, UMR 6072 GREYC Email: [email protected]

More information

Digital Forensics. Module 4 CS 996

Digital Forensics. Module 4 CS 996 Digital Forensics Module 4 CS 996 Hard Drive Forensics Acquisition Bit for bit copy Write protect the evidence media EnCase for DOS Safeback (NTI: www.forensics-intl.com) Analysis EnCase FTK (www.accessdata.com)

More information