A Fully Automatic Approach for Human Recognition from Profile Images Using 2D and 3D Ear Data
|
|
|
- Beatrice Joseph
- 9 years ago
- Views:
Transcription
1 A Fully Automatic Approach for Human Recognition from Profile Images Using 2D and 3D Ear Data S. M. S. Islam, M. Bennamoun, A. S. Mian and R. Davies School of Computer Science and Software Engineering, The University of Western Australia 35, Stirling Hwy, Crawley, WA 6009 {shams, bennamou, ajmal, Abstract The use of ear shape as a biometric trait for recognizing people in different applications is one of the most recent trends in the research communities. In this work, a fully automatic and fast technique based on the AdaBoost algorithm is used to detect a subject s ear from his/her 2D and corresponding 3D profile images. A modified version of the Iterative Closest Point (ICP) algorithm is then used for the matching of this extracted probe ear to the previously stored ear data in a gallery database. A coarse-tofine hierarchical technique is used where the ICP algorithm is first applied on low and then on high resolution meshes of 3D ear data. We obtain a rank one recognition rate of 93% while testing with the University of Notre Dame Biometrics Database. The proposed recognition approach does not require any manual intervention or sharp extraction of ear contour from the detected ear region. No segmentation of the extracted ear is required and more importantly, the system performance does not rely on the presence of a particular feature of the ear. 1. Introduction Due to instances of fraud with the traditional ID based systems, biometric recognition systems are gaining popularity day by day. In such a system, one or more physiological (e.g. face, fingerprint, palmprint, iris and DNA) or behavioral (e.g. handwriting, gait and voice) traits of a subject are taken into consideration for automatic recognition. Although the ear as a biometric trait is not as accurate as iris or DNA, it is non-intrusive and easy to be collected. The face is also non-intrusive but its appearance is affected by changes in facial expressions, use of cosmetics or eye glasses. The ear is also smaller in size but rich in features and its shape does not change with aging between 8 years and 70 years [7]. It can be used separately or in a multimodal approach with the face for effective human recognition in many applications including some national IDs, security, surveillance and law enforcement applications. However, in any of these applications, accurate recognition of the ear is an important step. A biometric recognition system may operate in one or both of two modes: authentication and identification. In authentication, one-to-one matching is performed to compare a user s biometric to the template of the claimed identity. In identification, one-to-many matching is done to associate an identity with the user by matching it against every identity in the database. For both modes, an accurate detection is an essential pre-requisite. However, ear detection from arbitrary profile images is a challenging problem due to the fact that the ear is sometimes occluded by hair and earrings and ear images can vary in appearance under different viewing and illumination conditions. Consequently, most of the existing ear recognition algorithms assume that the ear has been accurately detected [9]. One of the earliest ear detection methods uses Canny edge maps to detect the ear contour [3]. Hurley et al. [6] proposed the force field transformation for ear detection. Alvarez et al. [1] used a modified active contour algorithm and Ovoid model for detecting the ear. Yan and Bowyer [14] proposed taking a predefined sector from the nose tip to locate the ear region. The non-ear portion from that sector is cropped out by skin detection and the ear pit was detected using Gaussian smoothing and curvature estimation. Then, they applied an active contour algorithm to extract the ear contour. The system is automatic but fails if the ear pit is not visible. Li Yuan and Mu [15] used a modified CAMSHIF T algorithm to roughly track the profile image as the region of interest (ROI). Then, contour fitting is operated on ROI for further accurate localization using the contour information of the ear. Most recently, Islam et al. [8] proposed an ear detection approach based on the AdaBoost algorithm [12]. The system was trained with rectangular Haar-like features and using a dataset of varied races, sexes, appearances, orientations and illuminations. The data was collected by cropping
2 and synthesizing from the University of Notre Dame (UND) biometrics database [13, 14], the NIST Mugshot Identification Database (MID), the XM2VTSDB [10], the USTB, the MIT-CBL and the UMIST database. The approach is fully automatic, provides 100% detection while tested with 203 non-occluded images of the UND profile face database and also works well with some occluded and degraded images. As summarized in the survey of Pun et al. [11] and Islam et al. [9], most of the proposed ear recognition approaches use either PCA (Principal Component Analysis) or the ICP algorithm for matching. Choras [4] proposed a different automated geometrical method. Testing with 240 images (20 different views) of 12 subjects, 100% recognition rate is reported. Genetic local search and the force field transformation based approaches have also been proposed by Yuizono et al. [16] and Hurley et al. [6] respectively. The first ever ear recognition system tested with a larger database of 415 subjects is proposed by Yan and Bowyer [14]. Using a modified version of the ICP, they achieved an accuracy of 95.7% with occlusion and 97.8 % without occlusion (with an Equal-error rate (EER) of 1.2%). The system does not work well if the ear pit is not visible. In this work, we have adopted the work of Islam et al. [8] for detecting the ear from 2D profile images and then, extended it for cropping the corresponding 3D profile face data. After ear detection, we apply a variant of the Iterative Closest Point (ICP) algorithm for recognition of the ear at different mesh resolutions of the extracted 3D ear data. Using two different resolutions hierarchically, we obtain a rank 1 recognition rate of 93%. The proposed system is fully automatic and does not rely on the presence of a particular feature of the ear ( e.g. ear pit). It also does not require an accurate extraction of the ear contour and hence reduces the computational cost. Besides, the ear recognition results can be combined with other biometric modalities such as 2D and 3D faces to obtain a more robust and accurate human recognition system. The paper is organized as follows. The proposed system for 3D ear detection and that for 3D ear recognition are described in Section 2 and 3 respectively. Results obtained are reported and discussed in Section 4. Section 5 concludes our findings. 2. 3D Ear Detection and Normalization The proposed 3D ear detection approach utilizes the AdaBoost based 2D ear detection technique developed by Islam et al. [8]. Since the 3D profile data are co-registered with corresponding the 2D images, the 2D ear detector is first scanned through the whole profile image to localize the ear. A rectangle is placed covering the ear. The 3D data corresponding to this rectangular region is cropped for use in 3D ear recognition. The complete ear detection process from 2D and 3D face profile image/data is shown in Figure 1. A sample of a profile image and corresponding 2D and 3D ear data detected by our system is also shown in the same figure. Data collection (2D and 3D profile faces) Pre-processing the 2D data 2D 3D 2D Validation and update of the training with false positives Training of the classifier using Cascaded AdaBoost Creation of rectangular features Off-line On-line Crop 2D ear region using the trained classifier Extract the corresponding 3D Ear data Figure 1. Block diagram of the 3D ear detection approach. Once the 3D ear is detected, we remove all the spikes and holes by filtering the data. We perform triangulation on the data points, remove edges longer than a threshold of 0.6 and finally, remove disconnected points. The data is then normalized by shifting to its mean and then, uniformly sampled using a grid of size 82 by 56 pixels. 3. 3D Ear Matching and Recognition The extracted 3D ear data of a subject (also called probe data) is matched with one (for authentication) or all (for identification) 3D ear data (also called gallery data) stored in the gallery database built off-line. Matching can be performed based on the error of registering between the two data sets, more specifically, two clouds of points. The ICP algorithm [2] is considered as one of the most accurate algorithms for this purpose. However, it is computationally expensive and may converge to a local minimum if the two data sets are not nearly registered. To minimize these limitations, we adopted a coarse-to-fine hierarchical technique. ICP is first applied on low and then, on high resolution meshes of the 3D ear data. The mesh reduction was performed using the surface simplification algorithm of Garland and Heckbert [5] as it preserves features on the surfaces of a mesh (unlike the sampling reduction which removes points without any regard to the features). The degree of mesh reduction can be controlled by fixing the number of triangles to be remained in the reduced mesh or by fixing the surface error approximations (using quadric matrices). We achieved better result using the later option (see Section 4.3). Initially, reduced meshes (see Figure 2) of the probe (created on-line) and the gallery (created off-line) ear data are used for coarse registration with the ICP. The rotation and translation resulting from this coarse registration are applied to the original data set and then, the ICP algorithm is applied to them to get a finer match. The matching approach which
3 (a) Full mesh with triangles (b) Reduced mesh with 2000 triangles (c) Reduced mesh with 400 triangles Figure 2. Sample of the full and reduced meshes of the extracted 3D ear data. we term as the two-step ICP is shown in the flowchart of figure 3. Subscripts p and q in the flowchart are used for the probe and the gallery respectively. Start Take dp=3d data of the probe, N=total number of gallery images, i=1 Create probe mesh Mp for dp Reduce mesh Mp to Mp_r with data points dp_r 4.1. Dataset Used The recognition performance of the proposed system was evaluated against two datasets collected from the UND Biometrics Database [13, 14]. Dataset A consists of arbitrarily selected 200 profile images of 100 different subjects each with the size of 640 by 480 pixels. Among the chosen images, 100 images collected in the year 2003 are used in the gallery database and another 100 images of the same subjects collected in the year 2004 are used for the probe database. No image of this dataset was used in the training of the detection classifiers. In Dataset B, the whole UND database is used excluding the images of two subjects (due to data error). 300 images taken in the year of 2003 are used as gallery. One image out of multiple images of the same subjects is arbitrarily chosen as probe Recognition Rate of the Single-step ICP Using Dataset A, we obtained recognition rate of 93% and 94% rank one and rank ten respectively with the singlestep ICP. Testing with Dataset B provided recognition rate of 93.98%, 94.31%, 95.31% and 96.32% rank one, two, three and ten respectively. Figure 4 shows a sample of the correct recognition. It is noticed that the system works even in the presence of partial occlusions due to hair and earrings. i>=n? Sort E in ascending order Create gallery mesh Mg_i for dg_i Reduce mesh Mg_i to Mg_i_r with data points dg_i_r Find rotation R and translation t needed for registering dp_r with dg_i_r using the ICP algorithm Calculate dp=dp R + t Find error e for registering dp with dg_i using the ICP algorithm Assign E(i)=e and i=i+1 Find dg_i corresponding to E(1) as the rank-1, that to E(2) as rank-2 and that to E(3) as rank-3 match Stop Figure 3. Flowchart of the matching algorithm using coarse-to-fine hierarchical technique with ICP. 4. Results and Discussion In this section, results of our recognition system using both two and three levels of mesh resolution are reported. The reasons for misclassifications are also discussed. (a) (b) Figure 4. Example of recognition: (a) 2D and range image of the gallery ear (b) 2D and range image of the probe ear with a small ear-ring and hair (This figure is best seen in color) Improvement Obtained with the Two-step ICP The recognition rate with Dataset A improved to 93%, 94% and 95% for rank 1, rank 2 and rank 7 respectively when we applied the two-step ICP as mentioned in Section 3. In our experiment, we choose quadric error factor of 10 for the mesh reduction. The improvement is shown by the plots in Figure 5. It is worth mentioning that the recognition result becomes worse (84%, 88% and 88% respectively) when we fix the number of triangles to be 400 for mesh reduction. This is due to the fact that the size of the detected window is not same for all the ear images. The two-step ICP provides better results in the cases where the single-step ICP converged to a local minimum and also where the probe and the gallery images differ
4 96 95 Recognition Rate (a) (b) Single-step ICP Two-step ICP Rank Figure 5. Recognition rates with Single-step and Two-step ICP. slightly in rotation and translation. An example of this improvement is shown in figure 6. (a) Figure 6. Examples of improvement with the two-step ICP which was not correctly recognized by the single-step ICP [left image is the gallery and right one is the probe] Analysis of the Misclassification Both single-step and two-step ICP failed to recognize some of the probe images. Visual inspection of these probe images and the corresponding gallery images indicates that the ICP algorithm cannot work properly if there is large variation in pose (rotation and translation) as shown in Figure 7-(a, b, c), occlusion by hair or ear-rings as shown in Figure 7-(a, d) or missing of data as in Figure 7-(e) is present. The pose variation might occur during the capture of the probe profile image as mentioned in section 4.1 or by the detection program (see Figure 7-(d)). 5. Conclusion Our method for ear detection and recognition from profile images is fully automatic and robust to some degrees of occlusion due to hair and ear-rings. One of its major (b) (c) (d) (e) Figure 7. Examples of misclassification:(a, b, c) 2D image of a gallery (left) and the corresponding probe (right) with pose variations, (d) 2D image of a probe with occlusions (e) Range image of a probe having missing data. strengths is that it does not assume accurate prior detection of the ear. It also does not rely on the presence of particular features like the ear pit. Thus, it is suitable for any non-intrusive biometric application. In this paper, it is also shown that the recognition performance of the ICP algorithm improves with the proposed hierarchical approach. ICP performance may be further improved by providing better initial registration. This can be done by invariant feature matching. The recognition system can be made more robust to occlusion by representing the extracted ear data with some occlusion-invariant representations. These include our future research tasks. Acknowledgements Authors acknowledge the use of the University of Notre Dame Biometrics Database for 3D ear detection and recognition. This research is sponsored by ARC grants DP and DP References [1] L. Alvarez, E. Gonzalez, and L. Mazorra. Fitting ear contour using an ovoid model. In Proc. of Int l Carnahan Conf. on Security Technology, 2005., pages , Oct [2] P. J. Besl and N. D. McKay. A Method for Registration of 3-D Shapes. IEEE Trans. on PAMI, 14(2): , [3] M. Burge and W. Burger. Ear biometrics in computer vision. In Proc. of the ICPR 00, pages , Sept [4] M. Choras. Ear biometrics based on geometrical feature extraction. Electronic Letters on Computer Vision and Image Analysis, Vol. 5:84 95, [5] M. Garland and C. Heckbert. Surface Simplification Using Quadric Error Metrics. In SIGGRAPH, 1997.
5 [6] D. J. Hurley, M. S. Nixon, and J. N. Carter. Force field feature extraction for ear biometrics. Computer Vision and Image Understanding, 98(3): , June [7] A. Iannarelli. Ear Identification. Forensic Identification Series. Paramount Publishing Company, Fremont, California, [8] S. Islam, M. Bennamoun, and R. Davies. Fast and Fully Automatic Ear Detection Using Cascaded AdaBoost. Proc. of IEEE Workshop on Application of Computer Vision WACV 2008, Jan [9] S. Islam, M. Bennamoun, R. Owens, and R. Davies. Biometric Approaches of 2D-3D Ear and Face: A Survey. Proc. of Int l Conf. on Systems, Computing Sciences and Software Engineering, SCSS 2007, Dec [10] K. Messer, J. Matas, J. Kittler, J. Luettin, and G. Maitre. Xm2vtsbd: The extended m2vts database. In Proc. of the 2nd Conf. on Audio and Video-base Biometric Personal Verification, Springer Verlag, New York, pages 1 6, May [11] K. H. Pun and Y. S. Moon. Recent advances in ear biometrics. In Proc. of the Sixth IEEE Int l Conf. on Automatic Face and Gesture Recognition, pages , May [12] R. Schapire and Y. Singer. Improved boosting algorithms using confidence-rated predictions. Mach. Learn., 37(3): , [13] University of Notre Dame Biometrics Database. cvrl/undbiometricsdatabase.html. [14] P. Yan and K. W. Bowyer. Biometric recognition using 3d ear shape. IEEE Trans. on PAMI, 29(8): , Aug [15] L. Yuan and Z.-C. Mu. Ear detection based on skin-color and contour information. In Proc. of the Int l Conf. on Machine Learning and Cybernetics, Vol. 4: , Aug [16] T. Yuizono, Y. Wang, K. Satoh, and S. Nakayama. Study on individual recognition for ear images by using genetic local search. In Proc. of Congress on Evolutionary Computation, pages , 2002.
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Normalisation of 3D Face Data
Normalisation of 3D Face Data Chris McCool, George Mamic, Clinton Fookes and Sridha Sridharan Image and Video Research Laboratory Queensland University of Technology, 2 George Street, Brisbane, Australia,
Face Model Fitting on Low Resolution Images
Face Model Fitting on Low Resolution Images Xiaoming Liu Peter H. Tu Frederick W. Wheeler Visualization and Computer Vision Lab General Electric Global Research Center Niskayuna, NY, 1239, USA {liux,tu,wheeler}@research.ge.com
Canny Edge Detection
Canny Edge Detection 09gr820 March 23, 2009 1 Introduction The purpose of edge detection in general is to significantly reduce the amount of data in an image, while preserving the structural properties
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Performance Comparison of Visual and Thermal Signatures for Face Recognition
Performance Comparison of Visual and Thermal Signatures for Face Recognition Besma Abidi The University of Tennessee The Biometric Consortium Conference 2003 September 22-24 OUTLINE Background Recognition
A Various Biometric application for authentication and identification
A Various Biometric application for authentication and identification 1 Karuna Soni, 2 Umesh Kumar, 3 Priya Dosodia, Government Mahila Engineering College, Ajmer, India Abstract: In today s environment,
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
Expression Invariant 3D Face Recognition with a Morphable Model
Expression Invariant 3D Face Recognition with a Morphable Model Brian Amberg [email protected] Reinhard Knothe [email protected] Thomas Vetter [email protected] Abstract We present an
Face Recognition in Low-resolution Images by Using Local Zernike Moments
Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie
Signature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
Efficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
Keywords Input Images, Damage face images, Face recognition system, etc...
Volume 5, Issue 4, 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Research - Face Recognition
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - [email protected]
A Study of Automatic License Plate Recognition Algorithms and Techniques
A Study of Automatic License Plate Recognition Algorithms and Techniques Nima Asadi Intelligent Embedded Systems Mälardalen University Västerås, Sweden [email protected] ABSTRACT One of the most
High Resolution Fingerprint Matching Using Level 3 Features
High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
Face Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
High-accuracy ultrasound target localization for hand-eye calibration between optical tracking systems and three-dimensional ultrasound
High-accuracy ultrasound target localization for hand-eye calibration between optical tracking systems and three-dimensional ultrasound Ralf Bruder 1, Florian Griese 2, Floris Ernst 1, Achim Schweikard
Practical Tour of Visual tracking. David Fleet and Allan Jepson January, 2006
Practical Tour of Visual tracking David Fleet and Allan Jepson January, 2006 Designing a Visual Tracker: What is the state? pose and motion (position, velocity, acceleration, ) shape (size, deformation,
Classroom Monitoring System by Wired Webcams and Attendance Management System
Classroom Monitoring System by Wired Webcams and Attendance Management System Sneha Suhas More, Amani Jamiyan Madki, Priya Ranjit Bade, Upasna Suresh Ahuja, Suhas M. Patil Student, Dept. of Computer, KJCOEMR,
Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.
Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram,
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany L-1 Identity Solutions AG All rights reserved Outline Face
Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap
Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic
Interactive person re-identification in TV series
Interactive person re-identification in TV series Mika Fischer Hazım Kemal Ekenel Rainer Stiefelhagen CV:HCI lab, Karlsruhe Institute of Technology Adenauerring 2, 76131 Karlsruhe, Germany E-mail: {mika.fischer,ekenel,rainer.stiefelhagen}@kit.edu
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
3D Human Face Recognition Using Point Signature
3D Human Face Recognition Using Point Signature Chin-Seng Chua, Feng Han, Yeong-Khing Ho School of Electrical and Electronic Engineering Nanyang Technological University, Singapore 639798 [email protected]
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Visar Shehu 1, Agni Dika 2 Contemporary Sciences and Technologies - South East European University, Macedonia 1 Contemporary
Poker Vision: Playing Cards and Chips Identification based on Image Processing
Poker Vision: Playing Cards and Chips Identification based on Image Processing Paulo Martins 1, Luís Paulo Reis 2, and Luís Teófilo 2 1 DEEC Electrical Engineering Department 2 LIACC Artificial Intelligence
Segmentation of building models from dense 3D point-clouds
Segmentation of building models from dense 3D point-clouds Joachim Bauer, Konrad Karner, Konrad Schindler, Andreas Klaus, Christopher Zach VRVis Research Center for Virtual Reality and Visualization, Institute
Face detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL Garkal Bramhraj 1, palve Atul 2, Ghule Supriya 3, Misal sonali 4 1 Garkal Bramhraj mahadeo, 2 Palve Atule Vasant, 3 Ghule Supriya Shivram, 4 Misal Sonali Babasaheb,
A Comparison of Photometric Normalisation Algorithms for Face Verification
A Comparison of Photometric Normalisation Algorithms for Face Verification James Short, Josef Kittler and Kieron Messer Centre for Vision, Speech and Signal Processing University of Surrey Guildford, Surrey,
Face Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park
Face Recognition: Some Challenges in Forensics Anil K. Jain, Brendan Klare, and Unsang Park Forensic Identification Apply A l science i tto analyze data for identification Traditionally: Latent FP, DNA,
Circle Object Recognition Based on Monocular Vision for Home Security Robot
Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang
CS 534: Computer Vision 3D Model-based recognition
CS 534: Computer Vision 3D Model-based recognition Ahmed Elgammal Dept of Computer Science CS 534 3D Model-based Vision - 1 High Level Vision Object Recognition: What it means? Two main recognition tasks:!
Template-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
EFFICIENT VEHICLE TRACKING AND CLASSIFICATION FOR AN AUTOMATED TRAFFIC SURVEILLANCE SYSTEM
EFFICIENT VEHICLE TRACKING AND CLASSIFICATION FOR AN AUTOMATED TRAFFIC SURVEILLANCE SYSTEM Amol Ambardekar, Mircea Nicolescu, and George Bebis Department of Computer Science and Engineering University
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
A secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
MACHINE VISION MNEMONICS, INC. 102 Gaither Drive, Suite 4 Mount Laurel, NJ 08054 USA 856-234-0970 www.mnemonicsinc.com
MACHINE VISION by MNEMONICS, INC. 102 Gaither Drive, Suite 4 Mount Laurel, NJ 08054 USA 856-234-0970 www.mnemonicsinc.com Overview A visual information processing company with over 25 years experience
Palmprint as a Biometric Identifier
Palmprint as a Biometric Identifier 1 Kasturika B. Ray, 2 Rachita Misra 1 Orissa Engineering College, Nabojyoti Vihar, Bhubaneswar, Orissa, India 2 Dept. Of IT, CV Raman College of Engineering, Bhubaneswar,
Introduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University [email protected] CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
Palmprint Classification
Palmprint Classification Li Fang*, Maylor K.H. Leung, Tejas Shikhare, Victor Chan, Kean Fatt Choon School of Computer Engineering, Nanyang Technological University, Singapore 639798 E-mail: [email protected]
Mean-Shift Tracking with Random Sampling
1 Mean-Shift Tracking with Random Sampling Alex Po Leung, Shaogang Gong Department of Computer Science Queen Mary, University of London, London, E1 4NS Abstract In this work, boosting the efficiency of
Low-resolution Image Processing based on FPGA
Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,
Active Learning with Boosting for Spam Detection
Active Learning with Boosting for Spam Detection Nikhila Arkalgud Last update: March 22, 2008 Active Learning with Boosting for Spam Detection Last update: March 22, 2008 1 / 38 Outline 1 Spam Filters
FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE
FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE Ms. S.Revathi 1, Mr. T. Prabahar Godwin James 2 1 Post Graduate Student, Department of Computer Applications, Sri Sairam
Open-Set Face Recognition-based Visitor Interface System
Open-Set Face Recognition-based Visitor Interface System Hazım K. Ekenel, Lorant Szasz-Toth, and Rainer Stiefelhagen Computer Science Department, Universität Karlsruhe (TH) Am Fasanengarten 5, Karlsruhe
An Active Head Tracking System for Distance Education and Videoconferencing Applications
An Active Head Tracking System for Distance Education and Videoconferencing Applications Sami Huttunen and Janne Heikkilä Machine Vision Group Infotech Oulu and Department of Electrical and Information
Automatic Extraction of Signatures from Bank Cheques and other Documents
Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group,
Extracting a Good Quality Frontal Face Images from Low Resolution Video Sequences
Extracting a Good Quality Frontal Face Images from Low Resolution Video Sequences Pritam P. Patil 1, Prof. M.V. Phatak 2 1 ME.Comp, 2 Asst.Professor, MIT, Pune Abstract The face is one of the important
Image Normalization for Illumination Compensation in Facial Images
Image Normalization for Illumination Compensation in Facial Images by Martin D. Levine, Maulin R. Gandhi, Jisnu Bhattacharyya Department of Electrical & Computer Engineering & Center for Intelligent Machines
The Visual Internet of Things System Based on Depth Camera
The Visual Internet of Things System Based on Depth Camera Xucong Zhang 1, Xiaoyun Wang and Yingmin Jia Abstract The Visual Internet of Things is an important part of information technology. It is proposed
Robust Real-Time Face Detection
Robust Real-Time Face Detection International Journal of Computer Vision 57(2), 137 154, 2004 Paul Viola, Michael Jones 授 課 教 授 : 林 信 志 博 士 報 告 者 : 林 宸 宇 報 告 日 期 :96.12.18 Outline Introduction The Boost
Document Image Retrieval using Signatures as Queries
Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and
Optical Digitizing by ATOS for Press Parts and Tools
Optical Digitizing by ATOS for Press Parts and Tools Konstantin Galanulis, Carsten Reich, Jan Thesing, Detlef Winter GOM Gesellschaft für Optische Messtechnik mbh, Mittelweg 7, 38106 Braunschweig, Germany
Environmental Remote Sensing GEOG 2021
Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
Visual-based ID Verification by Signature Tracking
Visual-based ID Verification by Signature Tracking Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu Outline Biometric ID Visual Signature Acquisition
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
An Approach for Utility Pole Recognition in Real Conditions
6th Pacific-Rim Symposium on Image and Video Technology 1st PSIVT Workshop on Quality Assessment and Control by Image and Video Analysis An Approach for Utility Pole Recognition in Real Conditions Barranco
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
Simultaneous Gamma Correction and Registration in the Frequency Domain
Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong [email protected] William Bishop [email protected] Department of Electrical and Computer Engineering University
Tracking performance evaluation on PETS 2015 Challenge datasets
Tracking performance evaluation on PETS 2015 Challenge datasets Tahir Nawaz, Jonathan Boyle, Longzhen Li and James Ferryman Computational Vision Group, School of Systems Engineering University of Reading,
Support Vector Machine-Based Human Behavior Classification in Crowd through Projection and Star Skeletonization
Journal of Computer Science 6 (9): 1008-1013, 2010 ISSN 1549-3636 2010 Science Publications Support Vector Machine-Based Human Behavior Classification in Crowd through Projection and Star Skeletonization
ACCURACY ASSESSMENT OF BUILDING POINT CLOUDS AUTOMATICALLY GENERATED FROM IPHONE IMAGES
ACCURACY ASSESSMENT OF BUILDING POINT CLOUDS AUTOMATICALLY GENERATED FROM IPHONE IMAGES B. Sirmacek, R. Lindenbergh Delft University of Technology, Department of Geoscience and Remote Sensing, Stevinweg
Understanding The Face Image Format Standards
Understanding The Face Image Format Standards Paul Griffin, Ph.D. Chief Technology Officer Identix April 2005 Topics The Face Image Standard The Record Format Frontal Face Images Face Images and Compression
Naive-Deep Face Recognition: Touching the Limit of LFW Benchmark or Not?
Naive-Deep Face Recognition: Touching the Limit of LFW Benchmark or Not? Erjin Zhou [email protected] Zhimin Cao [email protected] Qi Yin [email protected] Abstract Face recognition performance improves rapidly
MetropoGIS: A City Modeling System DI Dr. Konrad KARNER, DI Andreas KLAUS, DI Joachim BAUER, DI Christopher ZACH
MetropoGIS: A City Modeling System DI Dr. Konrad KARNER, DI Andreas KLAUS, DI Joachim BAUER, DI Christopher ZACH VRVis Research Center for Virtual Reality and Visualization, Virtual Habitat, Inffeldgasse
MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 111-115 MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT A. Jaya Lakshmi 1, I. Ramesh Babu 2,
Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference
Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference Jue Wang, Michael F. Cohen Department of Electrical Engineering, University of Washington Microsoft Research Abstract Providing the best
Efficient Storage, Compression and Transmission
Efficient Storage, Compression and Transmission of Complex 3D Models context & problem definition general framework & classification our new algorithm applications for digital documents Mesh Decimation
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du [email protected] University of British Columbia
Illumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real- Time Applications
Illumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real- Time Applications Shireesha Chintalapati #1, M. V. Raghunadh *2 Department of E and CE NIT Warangal, Andhra
Interactive Data Mining and Visualization
Interactive Data Mining and Visualization Zhitao Qiu Abstract: Interactive analysis introduces dynamic changes in Visualization. On another hand, advanced visualization can provide different perspectives
What is the Right Illumination Normalization for Face Recognition?
What is the Right Illumination Normalization for Face Recognition? Aishat Mahmoud Dan-ali Department of Computer Science and Engineering The American University in Cairo AUC Avenue, P.O. Box 74, New Cairo
How To Create A Surface From Points On A Computer With A Marching Cube
Surface Reconstruction from a Point Cloud with Normals Landon Boyd and Massih Khorvash Department of Computer Science University of British Columbia,2366 Main Mall Vancouver, BC, V6T1Z4, Canada {blandon,khorvash}@cs.ubc.ca
Jiří Matas. Hough Transform
Hough Transform Jiří Matas Center for Machine Perception Department of Cybernetics, Faculty of Electrical Engineering Czech Technical University, Prague Many slides thanks to Kristen Grauman and Bastian
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
High Quality Image Magnification using Cross-Scale Self-Similarity
High Quality Image Magnification using Cross-Scale Self-Similarity André Gooßen 1, Arne Ehlers 1, Thomas Pralow 2, Rolf-Rainer Grigat 1 1 Vision Systems, Hamburg University of Technology, D-21079 Hamburg
Fingerprint s Core Point Detection using Gradient Field Mask
Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]
SECURE WEB MARKETING USING EAR BIOMETRICS
SECURE WEB MARKETING USING EAR BIOMETRICS Girish Kumar, Lecturer, ACET, India [email protected] ABSTRACT The researches discuss if the ears are unique or unique enough to be used as biometrics. Ear
Low-resolution Character Recognition by Video-based Super-resolution
2009 10th International Conference on Document Analysis and Recognition Low-resolution Character Recognition by Video-based Super-resolution Ataru Ohkura 1, Daisuke Deguchi 1, Tomokazu Takahashi 2, Ichiro
