Effects of Time Normalization on the Accuracy of Dynamic Time Warping
|
|
|
- Jordan Adams
- 9 years ago
- Views:
Transcription
1 Effects of Time Normalization on the Accuracy of Dynamic Time Warping Olaf Henniger Sascha Müller Abstract This paper revisits Dynamic Time Warping, a method for assessing the dissimilarity of time series. In particular, this paper provides theoretical and experimental evidence showing that uncritical normalizing the length of the time series to be compared has a detrimental effect on the recognition accuracy in application domains such as on-line signature recognition, where the length of compared time series matters for their classification as match or non-match. I. INTRODUCTION Dynamic Time Warping (DTW) is an algorithm for aligning two time series (sequences of values at successive points in time) that are similar, but out of sync and generally not of exactly the same length, in such a way that the distance between the two time series is minimal. This minimal distance is used to characterize the dissimilarity of the two time series. If their distance is greater than a threshold value, the two time series are not regarded as similar; otherwise, they are recognized as similar. DTW has been used for many years in various application domains [1], including speech recognition (e.g. [2], [3]), data mining (e.g. [4]), and the recognition of on-line signatures, handwritten signatures captured by means of a graphic tablet and/or a special pen in the form of time series for the pen position (x and y coordinates) and possibly other values such as the pen-tip pressure (e.g. [5]). Section II of this paper briefly recapitulates the basic DTW algorithm and useful improvements reducing the runtime and memory requirements. In on-line signature recognition, DTW may be applied to the entire signature or to signature segments [6]. DTW may be applied in combination with methods for the statistical, spatial, and spectral analysis of signatures [7] or as a rather self-sufficient method. The recently standardized signature data interchange formats [8] are suitable not only for encoding acquired on-line signature data that serve as a starting point for feature extraction, but also support encoding of time series to be compared directly by DTW algorithms. Using the improvements reviewed in Section II-D, the time and space complexity of DTW algorithms can be reduced significantly, making them efficient enough for application in devices with scarce resources, like mobile platforms [9] or even smart cards [10]. Even though in the different application domains essentially similar DTW algorithms are used, there are domainspecific differences: In [11], C.A. Ratanamahatana and Olaf Henniger ([email protected]) is with the Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany. Sascha Müller ([email protected]) is with the Technische Universität Darmstadt, Germany. E. Keogh argue for normalizing the length of the time series to the same length by interpolating and resampling before applying DTW in data mining domains such as handwrittencharacter recognition, video retrieval, or text mining. The reason why they recommend length normalization is that same-length time series in a database can be indexed very easily, to reduce the search space for fast one-to-many comparison, but time series of different lengths cannot be indexed so easily [4]. [11] states that an extensive literature search through more than 500 papers dating back to the 1960 s failed to produce any theoretical or empirical results to suggest that simply making the sequences to be of the same length has any detrimental effect. The present paper shall fill this gap by providing experimental evidence showing that, in application domains such as on-line signature recognition, making the time series to be of the same length does have a detrimental effect on the recognition accuracy. Even without looking at the empirical results, a simple Gedanken-experiment in Section III may convince the reader of the detrimental effect on the recognition accuracy that normalizing the length of the time series may have in on-line signature recognition. Section IV presents empirical results obtained using a publicly available subset of the database [12], consisting of on-line signature samples of 100 persons. For signatures of different length, DTW has been carried out with both, the original lengths and normalized lengths, and the recognition accuracy in both cases has been compared. A. Optimization problem II. DYNAMIC TIME WARPING Let A = (a i ) i=1,...,i and B = (b j ) j=1,...,j be two time series of length I and J that represent a biometric sample to be verified and a biometric reference, respectively. For online signatures, each a i and b j itself is a vector consisting of the x and y coordinates of the pen position at a sample point and possibly other values, like the pen-tip velocities in x and y direction or the pen-tip pressure. Let distance(a i, b j ) be a point-to-point distance between a i and b j. The point-to-point distance between a i and b j can be defined in different ways, e.g. as the Euclidean distance or as the absolute value norm of the difference vector of a i and b j. The goal of DTW is to determine a mapping between the time series A and B minimizing the sum of the point-to-point distances of corresponding sample points while observing certain side conditions. The side conditions are that the start
2 Fig. 1. Warped time series and end points of the signatures to be compared must be mapped one on the other, that the temporal ordering of the sample points must be maintained, and that no sample point be omitted. Fig. 1 (from a presentation version of [4]) visualizes the idea. The time axes are in some way stretched in some places and squeezed in other places to map sample points in an optimal way such that the distance of the two time series is as small as possible. More formally, let w be a warping function that assigns to each k, 1 k K with max(i, J) K < I + J, an index pair (i k, j k ) such that w(1) = (1, 1), w(k) = (I, J), and 0 i k i k 1 1 and 0 j k j k 1 1 for 2 k K. The set of index pairs W = {(1, 1),..., (I, J)} described by a warping function w can be considered as a distortion path through the plane spanned by the time axes of A and B (see Fig. 2). Let W be the set of all possible distortion paths for A and B. If the distortion path is the diagonal from (1, 1) to (I, J), then the time distortion is linear. The farther off the diagonal it is, the more non-linear it is. The accumulated distance d W (A, B) between A and B for a given distortion path W is the sum of the point-to-point distances distance(a i, b j ) along this distortion path: d W (A, B) = distance(a i, b j ). (i,j) W The goal is to determine a distortion path for which the accumulated distance between A and B is minimal: d(a, B) = min W W d W (A, B). This is the optimal distortion path. The minimal distance between A and B quantifies the dissimilarity of A and B. Usually, the optimal distortion path is acquired by dynamic programming (see Section II-C). Dynamic programming is a time-consuming procedure. The computing time is reduced by looking for the optimal distortion path only within a limited band (Sakoe/Chiba band [3], see Section II-D). B. Preprocessing of on-line signatures Care must be taken that values are in the same range when the point-to-point distances are determined. The goal of preprocessing is to suppress insignificant information that is expression of random variation without losing information about biometric characteristics of an individual. Preprocessing also helps to even out differences between data captured with different capture devices. It may include: Translation: The values of A and B should be linearly translated to be in the same domains. Rotation: If the direction of the signatures is different, one of them should be rotated to fit to the other one. Normalization and scaling: Not all signatures of a person have the same size. Their x and y coordinates should be scaled appropriately. 1 Removal of the linear component from the x-time regression line: The linear component of the x coordinates (due to writing from left to right) may be removed. Applying a low-pass filter: High frequency portions of the sample should be removed to suppress noise. In the experiment described in Section IV, translation and scaling were applied. The rotation of the samples, which is a crucial preprocessing step in most instances, was omitted since the samples of the used test database are already aligned horizontally. As this step was omitted for both, DTW with the original lengths and with normalized lengths, this has no influence on the relative performance results. C. Dynamic programming The number of possible monotonically increasing paths from (1, 1) to (I, J) is very large, so testing the length of all possible distortion paths to find the shortest one is too costly. Finding the shortest distortion path is achieved by dynamic programming algorithms. Let D = (d i,j ) i=1,...,i;j=1,...,j be a matrix whose entries d i,j are the accumulated point-to-point distances of A and B along optimal distortion paths to (i, j). The accumulated distance d i,j represents the length of the optimal distortion path from (1, 1) to (i, j). The idea is to recurrently calculate d i,j from already known values d i,j with i i and j j until d I,J is reached. d I,J represents the minimal accumulated distance d(a, B) between A and B. Fig. 2 visualizes the idea: The shortest distortion path from (1, 1) to a certain point (i, j) (e.g. P = (5, 7)) can be constructed by connecting (i, j) to that predecessor whose accumulated distance from (1, 1) is shortest. Possible predecessors are (i 1, j), (i 1, j 1), and (i, j 1). The accumulated distance from (1, 1) to (i, j) is obtained by adding the point-to-point distance(a i, b j ) to the accumulated distance from (1, 1) to that predecessor with the shortest accumulated distance from (1, 1). It is sufficient to save an accumulated distance value for each matrix entry since for biometric verification the result of interest is the accumulated distance for the optimal distortion path and not the actual distortion path. The algorithm can be expressed in pseudo-code as follows: FOR i = 1 TO I d i,0 = NEXT i FOR j = 1 TO J d 0,j = NEXT j d 0,0 = 0 1 Note that even though also not all signatures of a person take the same amount of time, the length in time should not be normalized because it helps to distinguish between originals and forgeries as will be seen later.
3 Fig. 2. Possible distortion paths FOR i = 1 TO I FOR j = 1 TO J d i,j = min(d i 1,j, d i 1,j 1, d i,j 1 ) + distance(a i, b j ) NEXT j NEXT i RETURN d I,J The additional column and row with index 0 are introduced to deal with the special cases i = 1 and j = 1. D. Improvements of the algorithm to reduce runtime and memory requirements The time and space complexity of the DTW algorithm is one of its drawbacks. Since the accumulated distance matrix has I J entries, the complexity is O(n 2 ) where I J n. This is especially problematic for embedded systems that often have very limited resources. This complexity can be reduced significantly. For matching biometric samples, the optimal distortion paths run near the diagonal. Therefore, it is sufficient to consider only paths lying completely inside a band around the diagonal from (0, 0) to (I, J), as shown in Fig. 3a. This is achieved by adjusting the boundary conditions of the for-loops and setting d i,j = for all (i, j) with i j > r. Such a band [3] is called Sakoe/Chiba band. It contains all index pairs (i, j) with i j r. The width of the band is 2r. If the matrix is quadratic, the slope of this band is 45 and it holds O(n) index pairs. The Itakura parallelogram [2], illustrated in Fig. 3b, may include even less index pairs. Here, the basic idea is to allow only small distortions in the beginning and end of the time series, while bigger ones are accepted in the middle. The implementation is a bit more elaborate than the Sakoe/Chiba band, and its use is not as widespread. Using either of these approaches, the time and space complexity of DTW can be reduced to O(n). The required memory space can even be constant (space complexity O(1)) when using Sakoe/Chiba bands or Itakura parallelograms of fixed size, independent from the length of the time series. Both approaches are easier to implement with quadratic distance matrices, but also work with non-quadratic ones. The accumulated distance matrix is quadratic if I = J, which is generally not the case. There are two ways to solve this problem: Adapt the algorithm, so it can handle Sakoe/Chiba bands or Itakura parallelograms around diagonals with a slope angle other than 45. Normalize A and B by interpolating one time series and resampling it with the same number of sample points as the other. Then apply the DTW algorithm in its simpler, quadratic form. Normalizing the length is easy to implement, but may degrade the recognition accuracy. This will be investigated in the following sections. In the experiment described in Section IV, we used a DTW implementation with a Sakoe/Chiba band both with and without length normalization. The optimal width of the band was determined empirically as 10% of max(i, J). III. GEDANKEN-EXPERIMENT Assume that a skilled forger is able to perfectly replicate the shape of a signature, but doing so, takes him longer than the original signing does. This assumption appears plausible. If the forged signature is length-adjusted to the reference signature before determining the distance between them both, then the temporal dissimilarity between a perfectly shaped forgery and an original is evened out, and the forgery cannot be detected. Therefore, the elapsed time can be expected to matter in distinguishing between original and forged on-line signatures. Because it is not clear how big the detrimental effect of length normalization is in practice, this is investigated in the following section. A. Design of the experiment IV. EMPIRICAL EXPERIMENT The hypothesis is that normalizing the on-line signatures to the same length in time will lead to more false accepts of forged signatures than if the length in time of the on-line signatures is not normalized. We have tested this hypothesis by trying both, normalizing the lengths of signatures to the same length before DTW comparison and doing the DTW comparison with the original lengths. A publicly available subset of the database [12], consisting of signature samples of 100 persons has been used for the experiment. For each person s signature, there are 25 genuine samples and 25 skilled forgeries. In addition to the x and y coordinates, each sample point vector includes a numeric value representing the associated pen pressure. Each of the 250 genuine signature samples has been compared both to the other 24 genuine samples of the same person and to the 25 forgery attempts. All distance values resulting from these comparisons have been recorded. The recognition accuracies in both cases have been calculated from the recorded distance values and been compared with each other.
4 (a) Sakoe/Chiba band Fig. 3. Reducing the number of possible distortion paths (b) Itakura parallelogram B. Metric used From the recorded distance values, for each genuine sample, the sample equal error rate (seer) that is achieved when comparing this sample with the corresponding genuine and forged samples has been calculated. This metric can also be applied in the a-posteriori quality assessment of handwritten signatures [13]. The seer is determined as follows: The sample false match rate (sfmr) of a biometric sample is the proportion of attempted forgeries of this sample that are falsely declared to match that particular sample. The sample false non-match rate (sfnmr) of a biometric sample is the proportion of should-be matching samples that are falsely declared not to match that particular sample. Both sfmr and sfnmr depend on the threshold chosen for declaring a match or non-match. The seer of a biometric sample is the value of sfmr and sfnmr at that threshold where both sfmr and sfnmr are equal. C. Results Fig. 4 gives an overview of the seer s of all 100 probands, with time normalization (left column) and without time normalization (right column). Apparently, in many cases the difference is significant. For example, look at the seer s of the signatures of person 9. With time normalization the mean seer for person 9 is 12.3%, the lowest value being 5.7%. Without time normalization, i.e. when comparing the samples in their original unaltered form, all seer s of person 9 are less than 3%. Furthermore, the seer s of persons 83 and 93 show that time normalization may cause outliers that are not there without time normalization: One genuine signature of person 93 has a seer of more than 45%, while the mean value of the other seer s for that person is less than 5%. This outlier occurs only when time normalization is applied. The mean seer of all signatures with respect to the DTW algorithm using time normalization is 7.1%. The variance is Using no time normalization, the overall recognition accuracy improves significantly. The mean seer decreases to 4.82%, the variance to This shows the detrimental effect of normalizing the length of on-line signatures on the recognition accuracy. Furthermore, as could be expected, the length normalization has no significant effect on the distance of genuine signatures to the other genuine signatures of the same person. The mean value of these distances is with time normalization and without time normalization. V. SUMMARY This paper has shown that length normalization reduces the recognition accuracy in application domains where the length of the compared time series matters for their classification as match or non-match. The results of [11] are limited to application domains where the length of the time series does not matter. The lengths of the time series to be compared can be normalized to the same length if one tries, for instance, to recognize the shape of handwritten characters. However, the time series to be compared should not be normalized to the same length if one tries to verify handwritten signatures, except on the condition that the elapsed time is taken into account as a separate feature whose comparison score is to be fused in some way with the length-normalized DTW distance score. Often, forged signatures imitate the shape of
5 (a) DTW with time normalization Fig. 4. Sample equal error rates (b) DTW without time normalization
6 the original quite well, but it takes longer to write them. This difference is suppressed if the lengths of the two signatures are normalized to the same length and if the elapsed time is not otherwise taken into account. ACKNOWLEDGMENTS The authors are grateful to E. Keogh for having inspired this investigation and for a fruitful discussion that helped to clarify some aspects of this paper. The authors are also grateful to J. Ortega-Garcia and J. Fierrez-Aguilar for making a subcorpus of the MCYT database available for research purposes. REFERENCES [1] J.B. Kruskal. An overview of sequence comparison. In D. Sankoff and J.B. Kruskal, editors, Time Warps, String Edits, and Macromolecules: The Theory and Practice of Sequence Comparison, pages Addison-Wesley, [2] F. Itakura. Minimum prediction residual principle applied to speech recognition. IEEE Transactions on Acoustics, Speech, and Signal Processing, ASSP-23(1):67 72, [3] H. Sakoe and S. Chiba. Dynamic programming algorithm optimization for spoken word recognition. IEEE Transactions on Acoustics, Speech, and Signal Processing, ASSP-26(1):43 49, [4] E. Keogh and C.A. Ratanamahatana. Exact indexing of dynamic time warping. Knowledge and Information Systems, 7(3): , March [5] A. Kholmatov and B. Yanikoglu. Identity authentication using improved online signature verification method. Pattern Recognition Letters, 26: , [6] B. Wirtz. Stroke-based time warping for signature verification. In 3rd International Conference on Document Analysis and Recognition, pages , Montréal, Québec, Canada, [7] C. Schmidt. On-line Unterschriftenanalyse zur Benutzerverifikation. PhD thesis, RWTH Aachen, [8] Information technology Biometric data interchange formats Part 7: Signature/sign time series data. Final Draft International Standard ISO/IEC , [9] M. Skrbek. Signature dynamics on a mobile electronic signature platform. In R. Grimm, H.B. Keller, and K. Rannenberg, editors, GI-Jahrestagung Schwerpunkt Sicherheit Schutz und Zuverlässigkeit, Frankfurt am Main, Germany, [10] O. Henniger and K. Franke. Biometric user authentication on smart cards by means of handwritten signatures. In D. Zhang and A.K. Jain, editors, 1st International Conference on Biometric Authentication, number 3072 in Lecture Notes in Computer Science, Hong Kong, China, Springer. [11] C.A. Ratanamahatana and E. Keogh. Everything you know about dynamic time warping is wrong. In Workshop on Mining Temporal and Sequential Data, in conjunction with the International Conference on Knowledge Discovery and Data Mining, Seattle, WA, USA, [12] J. Ortega-Garcia, J. Fierrez-Aguilar, D. Simon, J. Gonzalez, M. Faundez-Zanuy, V. Espinosa, A. Satue, I. Hernaez, J.-J. Igarza, C. Vivaracho, D. Escudero, and Q.-I. Moro. MCYT baseline corpus: a bimodal biometric database. IEE Proceedings Visual Image Processing, 150(6): , [13] S. Müller and O. Henniger. Evaluating the biometric sample quality of handwritten signatures. In 2nd International Conference on Biometrics, Seoul, South Korea, 2007.
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
Efficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
An Order-Invariant Time Series Distance Measure [Position on Recent Developments in Time Series Analysis]
An Order-Invariant Time Series Distance Measure [Position on Recent Developments in Time Series Analysis] Stephan Spiegel and Sahin Albayrak DAI-Lab, Technische Universität Berlin, Ernst-Reuter-Platz 7,
Visual-based ID Verification by Signature Tracking
Visual-based ID Verification by Signature Tracking Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu Outline Biometric ID Visual Signature Acquisition
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
Identity authentication using improved online signature verification method
Pattern Recognition Letters 26 (2005) 2400 2408 www.elsevier.com/locate/patrec Identity authentication using improved online signature verification method Alisher Kholmatov, Berrin Yanikoglu * Sabanci
Signature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
Cryptographic key generation using handwritten signature
Cryptographic key generation using handwritten signature M. Freire-Santos a, J. Fierrez-Aguilar a, J. Ortega-Garcia a a ATVS-Biometrics Research Lab., Escuela Politecnica Superior, Universidad Autonoma
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Establishing the Uniqueness of the Human Voice for Security Applications
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Least Squares Estimation
Least Squares Estimation SARA A VAN DE GEER Volume 2, pp 1041 1045 in Encyclopedia of Statistics in Behavioral Science ISBN-13: 978-0-470-86080-9 ISBN-10: 0-470-86080-4 Editors Brian S Everitt & David
Securing Electronic Medical Records using Biometric Authentication
Securing Electronic Medical Records using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA, [email protected], [email protected] Abstract.
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
Signature verification using Kolmogorov-Smirnov. statistic
Signature verification using Kolmogorov-Smirnov statistic Harish Srinivasan, Sargur N.Srihari and Matthew J Beal University at Buffalo, the State University of New York, Buffalo USA {srihari,hs32}@cedar.buffalo.edu,[email protected]
Extending EMV payment smart cards with biometric on-card verification
Extending EMV payment smart cards with biometric on-card verification Olaf Henniger 1 and Dimitar Nikolov 2 1 Fraunhofer Institute for Computer Graphics Research IGD Fraunhoferstr. 5, D-64283 Darmstadt,
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
Review Jeopardy. Blue vs. Orange. Review Jeopardy
Review Jeopardy Blue vs. Orange Review Jeopardy Jeopardy Round Lectures 0-3 Jeopardy Round $200 How could I measure how far apart (i.e. how different) two observations, y 1 and y 2, are from each other?
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
Environmental Remote Sensing GEOG 2021
Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class
Categorical Data Visualization and Clustering Using Subjective Factors
Categorical Data Visualization and Clustering Using Subjective Factors Chia-Hui Chang and Zhi-Kai Ding Department of Computer Science and Information Engineering, National Central University, Chung-Li,
Securing Electronic Medical Records Using Biometric Authentication
Securing Electronic Medical Records Using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA {krawcz10,jain}@cse.msu.edu Abstract. Ensuring
D-optimal plans in observational studies
D-optimal plans in observational studies Constanze Pumplün Stefan Rüping Katharina Morik Claus Weihs October 11, 2005 Abstract This paper investigates the use of Design of Experiments in observational
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
Simultaneous Gamma Correction and Registration in the Frequency Domain
Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong [email protected] William Bishop [email protected] Department of Electrical and Computer Engineering University
Private Record Linkage with Bloom Filters
To appear in: Proceedings of Statistics Canada Symposium 2010 Social Statistics: The Interplay among Censuses, Surveys and Administrative Data Private Record Linkage with Bloom Filters Rainer Schnell,
Performance Evaluation of Biometric Template Update
Performance Evaluation of Biometric Template Update Romain Giot and Christophe Rosenberger Université de Caen, UMR 6072 GREYC ENSICAEN, UMR 6072 GREYC CNRS, UMR 6072 GREYC Email: [email protected]
Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences
Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences Byoung-moon You 1, Kyung-tack Jung 2, Sang-kook Kim 2, and Doo-sung Hwang 3 1 L&Y Vision Technologies, Inc., Daejeon,
Signature Verification Why xyzmo offers the leading solution.
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
Template-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
Introduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University [email protected] CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Simple Regression Theory II 2010 Samuel L. Baker
SIMPLE REGRESSION THEORY II 1 Simple Regression Theory II 2010 Samuel L. Baker Assessing how good the regression equation is likely to be Assignment 1A gets into drawing inferences about how close the
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
Support Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
Offline Word Spotting in Handwritten Documents
Offline Word Spotting in Handwritten Documents Nicholas True Department of Computer Science University of California, San Diego San Diego, CA 9500 [email protected] Abstract The digitization of written
TIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland [email protected] Course Description Content
Decision Trees from large Databases: SLIQ
Decision Trees from large Databases: SLIQ C4.5 often iterates over the training set How often? If the training set does not fit into main memory, swapping makes C4.5 unpractical! SLIQ: Sort the values
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
3 An Illustrative Example
Objectives An Illustrative Example Objectives - Theory and Examples -2 Problem Statement -2 Perceptron - Two-Input Case -4 Pattern Recognition Example -5 Hamming Network -8 Feedforward Layer -8 Recurrent
15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability
Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
Object Recognition and Template Matching
Object Recognition and Template Matching Template Matching A template is a small image (sub-image) The goal is to find occurrences of this template in a larger image That is, you want to find matches of
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
Algebra 1 2008. Academic Content Standards Grade Eight and Grade Nine Ohio. Grade Eight. Number, Number Sense and Operations Standard
Academic Content Standards Grade Eight and Grade Nine Ohio Algebra 1 2008 Grade Eight STANDARDS Number, Number Sense and Operations Standard Number and Number Systems 1. Use scientific notation to express
Methodology for Emulating Self Organizing Maps for Visualization of Large Datasets
Methodology for Emulating Self Organizing Maps for Visualization of Large Datasets Macario O. Cordel II and Arnulfo P. Azcarraga College of Computer Studies *Corresponding Author: [email protected]
Standardization and Its Effects on K-Means Clustering Algorithm
Research Journal of Applied Sciences, Engineering and Technology 6(7): 399-3303, 03 ISSN: 040-7459; e-issn: 040-7467 Maxwell Scientific Organization, 03 Submitted: January 3, 03 Accepted: February 5, 03
Comparison of Elastic Matching Algorithms for Online Tamil Handwritten Character Recognition
Comparison of Elastic Matching Algorithms for Online Tamil Handwritten Character Recognition Niranjan Joshi, G Sita, and A G Ramakrishnan Indian Institute of Science, Bangalore, India joshi,sita,agr @ragashrieeiiscernetin
MATH2210 Notebook 1 Fall Semester 2016/2017. 1 MATH2210 Notebook 1 3. 1.1 Solving Systems of Linear Equations... 3
MATH0 Notebook Fall Semester 06/07 prepared by Professor Jenny Baglivo c Copyright 009 07 by Jenny A. Baglivo. All Rights Reserved. Contents MATH0 Notebook 3. Solving Systems of Linear Equations........................
Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data
CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear
Support Vector Machines with Clustering for Training with Very Large Datasets
Support Vector Machines with Clustering for Training with Very Large Datasets Theodoros Evgeniou Technology Management INSEAD Bd de Constance, Fontainebleau 77300, France [email protected] Massimiliano
Vector and Matrix Norms
Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty
Jitter Measurements in Serial Data Signals
Jitter Measurements in Serial Data Signals Michael Schnecker, Product Manager LeCroy Corporation Introduction The increasing speed of serial data transmission systems places greater importance on measuring
Knowledge Discovery and Data Mining. Structured vs. Non-Structured Data
Knowledge Discovery and Data Mining Unit # 2 1 Structured vs. Non-Structured Data Most business databases contain structured data consisting of well-defined fields with numeric or alphanumeric values.
Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication
Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication Thomas Reilly Data Physics Corporation 1741 Technology Drive, Suite 260 San Jose, CA 95110 (408) 216-8440 This paper
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
Visualization of General Defined Space Data
International Journal of Computer Graphics & Animation (IJCGA) Vol.3, No.4, October 013 Visualization of General Defined Space Data John R Rankin La Trobe University, Australia Abstract A new algorithm
An Iterative Image Registration Technique with an Application to Stereo Vision
An Iterative Image Registration Technique with an Application to Stereo Vision Bruce D. Lucas Takeo Kanade Computer Science Department Carnegie-Mellon University Pittsburgh, Pennsylvania 15213 Abstract
Local outlier detection in data forensics: data mining approach to flag unusual schools
Local outlier detection in data forensics: data mining approach to flag unusual schools Mayuko Simon Data Recognition Corporation Paper presented at the 2012 Conference on Statistical Detection of Potential
Investigating the genetic basis for intelligence
Investigating the genetic basis for intelligence Steve Hsu University of Oregon and BGI www.cog-genomics.org Outline: a multidisciplinary subject 1. What is intelligence? Psychometrics 2. g and GWAS: a
Subspace Analysis and Optimization for AAM Based Face Alignment
Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China [email protected] Stan Z. Li Microsoft
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Transcription of polyphonic signals using fast filter bank( Accepted version ) Author(s) Foo, Say Wei;
Alignment and Preprocessing for Data Analysis
Alignment and Preprocessing for Data Analysis Preprocessing tools for chromatography Basics of alignment GC FID (D) data and issues PCA F Ratios GC MS (D) data and issues PCA F Ratios PARAFAC Piecewise
Document Image Retrieval using Signatures as Queries
Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and
Classifying Manipulation Primitives from Visual Data
Classifying Manipulation Primitives from Visual Data Sandy Huang and Dylan Hadfield-Menell Abstract One approach to learning from demonstrations in robotics is to make use of a classifier to predict if
Investigations on Error Minimizing Training Criteria for Discriminative Training in Automatic Speech Recognition
, Lisbon Investigations on Error Minimizing Training Criteria for Discriminative Training in Automatic Speech Recognition Wolfgang Macherey Lars Haferkamp Ralf Schlüter Hermann Ney Human Language Technology
CHAPTER 6 TEXTURE ANIMATION
CHAPTER 6 TEXTURE ANIMATION 6.1. INTRODUCTION Animation is the creating of a timed sequence or series of graphic images or frames together to give the appearance of continuous movement. A collection of
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
Visualization of large data sets using MDS combined with LVQ.
Visualization of large data sets using MDS combined with LVQ. Antoine Naud and Włodzisław Duch Department of Informatics, Nicholas Copernicus University, Grudziądzka 5, 87-100 Toruń, Poland. www.phys.uni.torun.pl/kmk
Research on Chinese financial invoice recognition technology
Pattern Recognition Letters 24 (2003) 489 497 www.elsevier.com/locate/patrec Research on Chinese financial invoice recognition technology Delie Ming a,b, *, Jian Liu b, Jinwen Tian b a State Key Laboratory
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT)
Page 1 Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) ECC RECOMMENDATION (06)01 Bandwidth measurements using FFT techniques
UNSUPERVISED MACHINE LEARNING TECHNIQUES IN GENOMICS
UNSUPERVISED MACHINE LEARNING TECHNIQUES IN GENOMICS Dwijesh C. Mishra I.A.S.R.I., Library Avenue, New Delhi-110 012 [email protected] What is Learning? "Learning denotes changes in a system that enable
DATA PREPARATION FOR DATA MINING
Applied Artificial Intelligence, 17:375 381, 2003 Copyright # 2003 Taylor & Francis 0883-9514/03 $12.00 +.00 DOI: 10.1080/08839510390219264 u DATA PREPARATION FOR DATA MINING SHICHAO ZHANG and CHENGQI
Analysis of Bayesian Dynamic Linear Models
Analysis of Bayesian Dynamic Linear Models Emily M. Casleton December 17, 2010 1 Introduction The main purpose of this project is to explore the Bayesian analysis of Dynamic Linear Models (DLMs). The main
Big Ideas in Mathematics
Big Ideas in Mathematics which are important to all mathematics learning. (Adapted from the NCTM Curriculum Focal Points, 2006) The Mathematics Big Ideas are organized using the PA Mathematics Standards
Learning Example. Machine learning and our focus. Another Example. An example: data (loan application) The data and the goal
Learning Example Chapter 18: Learning from Examples 22c:145 An emergency room in a hospital measures 17 variables (e.g., blood pressure, age, etc) of newly admitted patients. A decision is needed: whether
Novelty Detection in image recognition using IRF Neural Networks properties
Novelty Detection in image recognition using IRF Neural Networks properties Philippe Smagghe, Jean-Luc Buessler, Jean-Philippe Urban Université de Haute-Alsace MIPS 4, rue des Frères Lumière, 68093 Mulhouse,
Data Cleansing for Remote Battery System Monitoring
Data Cleansing for Remote Battery System Monitoring Gregory W. Ratcliff Randall Wald Taghi M. Khoshgoftaar Director, Life Cycle Management Senior Research Associate Director, Data Mining and Emerson Network
We shall turn our attention to solving linear systems of equations. Ax = b
59 Linear Algebra We shall turn our attention to solving linear systems of equations Ax = b where A R m n, x R n, and b R m. We already saw examples of methods that required the solution of a linear system
Example: Credit card default, we may be more interested in predicting the probabilty of a default than classifying individuals as default or not.
Statistical Learning: Chapter 4 Classification 4.1 Introduction Supervised learning with a categorical (Qualitative) response Notation: - Feature vector X, - qualitative response Y, taking values in C
Removing Moving Objects from Point Cloud Scenes
1 Removing Moving Objects from Point Cloud Scenes Krystof Litomisky [email protected] Abstract. Three-dimensional simultaneous localization and mapping is a topic of significant interest in the research
Online Ensembles for Financial Trading
Online Ensembles for Financial Trading Jorge Barbosa 1 and Luis Torgo 2 1 MADSAD/FEP, University of Porto, R. Dr. Roberto Frias, 4200-464 Porto, Portugal [email protected] 2 LIACC-FEP, University of
An Implementation of a High Capacity 2D Barcode
An Implementation of a High Capacity 2D Barcode Puchong Subpratatsavee 1 and Pramote Kuacharoen 2 Department of Computer Science, Graduate School of Applied Statistics National Institute of Development
More Local Structure Information for Make-Model Recognition
More Local Structure Information for Make-Model Recognition David Anthony Torres Dept. of Computer Science The University of California at San Diego La Jolla, CA 9093 Abstract An object classification
A simplified implementation of the least squares solution for pairwise comparisons matrices
A simplified implementation of the least squares solution for pairwise comparisons matrices Marcin Anholcer Poznań University of Economics Al. Niepodleg lości 10, 61-875 Poznań, Poland V. Babiy McMaster
CS 2750 Machine Learning. Lecture 1. Machine Learning. http://www.cs.pitt.edu/~milos/courses/cs2750/ CS 2750 Machine Learning.
Lecture Machine Learning Milos Hauskrecht [email protected] 539 Sennott Square, x5 http://www.cs.pitt.edu/~milos/courses/cs75/ Administration Instructor: Milos Hauskrecht [email protected] 539 Sennott
Evaluating an Integrated Time-Series Data Mining Environment - A Case Study on a Chronic Hepatitis Data Mining -
Evaluating an Integrated Time-Series Data Mining Environment - A Case Study on a Chronic Hepatitis Data Mining - Hidenao Abe, Miho Ohsaki, Hideto Yokoi, and Takahira Yamaguchi Department of Medical Informatics,
Smart Signature. Gesture Based Authentication using a Smart Ring. Tatiana Bradley, Rakshith Hiresamudra Shivegowda, and Wai Man Chan
SmartSignature Gesture Based Authentication using a Smart Ring Tatiana Bradley, Rakshith Hiresamudra Shivegowda, and Wai Man Chan CS 244, Fall 2015 Acknowledgement: Nod Labs, for providing smart ring.
Error Log Processing for Accurate Failure Prediction. Humboldt-Universität zu Berlin
Error Log Processing for Accurate Failure Prediction Felix Salfner ICSI Berkeley Steffen Tschirpke Humboldt-Universität zu Berlin Introduction Context of work: Error-based online failure prediction: error
Solving Simultaneous Equations and Matrices
Solving Simultaneous Equations and Matrices The following represents a systematic investigation for the steps used to solve two simultaneous linear equations in two unknowns. The motivation for considering
