4,821 research outputs found

    Curved Gabor Filters for Fingerprint Image Enhancement

    Full text link
    Gabor filters play an important role in many application areas for the enhancement of various types of images and the extraction of Gabor features. For the purpose of enhancing curved structures in noisy images, we introduce curved Gabor filters which locally adapt their shape to the direction of flow. These curved Gabor filters enable the choice of filter parameters which increase the smoothing power without creating artifacts in the enhanced image. In this paper, curved Gabor filters are applied to the curved ridge and valley structure of low-quality fingerprint images. First, we combine two orientation field estimation methods in order to obtain a more robust estimation for very noisy images. Next, curved regions are constructed by following the respective local orientation and they are used for estimating the local ridge frequency. Lastly, curved Gabor filters are defined based on curved regions and they are applied for the enhancement of low-quality fingerprint images. Experimental results on the FVC2004 databases show improvements of this approach in comparison to state-of-the-art enhancement methods

    Biometric Systems

    Get PDF
    Biometric authentication has been widely used for access control and security systems over the past few years. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics. In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time includes state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications

    Short Papers of the 8th Conference on Cloud Computing Conference, Big Data & Emerging Topics (JCC-BD&ET 2020)

    Get PDF
    Compilación de los short papers presentados en las 8vas Jornadas de Cloud Computing, Big Data & Emerging Topics (JCC-BD&ET2020), llevadas a cabo en modalidad virtual durante septiembre de 2020 y organizadas por el Instituto de Investigación en Informática LIDI (III-LIDI) y la Secretaría de Posgrado de la Facultad de Informática de la UNLP en colaboración con universidades de Argentina y del exterior.Facultad de Informátic

    Review of personal identification systems

    Get PDF
    The growth of the use of biometric personal identification systems has been relatively steady over the last 20 years. The expected biometric revolution which was forecast since the mid 1970\u27s has not yet occurred. The main factor for lower than expected growth has been the cost and user acceptance of the systems. During the last few years, however, a new generation of more reliable, less expensive and better designed biometric devices have come onto the market. This combined with the anticipated expansion of new reliable, user friendly inexpensive systems provides a signal that the revolution is about to begin. This paper provides a glimpse into the future for personal identification systems and focuses on research directions, emerging applications and significant issues of the future

    Integration of biometrics and steganography: A comprehensive review

    Get PDF
    The use of an individual’s biometric characteristics to advance authentication and verification technology beyond the current dependence on passwords has been the subject of extensive research for some time. Since such physical characteristics cannot be hidden from the public eye, the security of digitised biometric data becomes paramount to avoid the risk of substitution or replay attacks. Biometric systems have readily embraced cryptography to encrypt the data extracted from the scanning of anatomical features. Significant amounts of research have also gone into the integration of biometrics with steganography to add a layer to the defence-in-depth security model, and this has the potential to augment both access control parameters and the secure transmission of sensitive biometric data. However, despite these efforts, the amalgamation of biometric and steganographic methods has failed to transition from the research lab into real-world applications. In light of this review of both academic and industry literature, we suggest that future research should focus on identifying an acceptable level steganographic embedding for biometric applications, securing exchange of steganography keys, identifying and address legal implications, and developing industry standards

    Complications of arteriovenous hemodialysis access: Recognition and management

    Get PDF
    English language citations reporting complications of arteriovenous access for hemodialysis are critically reviewed and discussed. Venous hypertension, arterial steal syndrome, and high-output cardiac failure occur as a result of hemodynamic alterations potentiated by access flow. Uremic and diabetic neuropathies are common but may obfuscate recognition of potentially correctable problems such as compression or ischemic neuropathy. Mechanical complications include pseudoaneurysm, which may develop from a puncture hematoma, degeneration of the wall, or infection. Dysfunctional hemostasis, hemorrhage, noninfectious fluid collections, and access-related infections are, in part, manifestations of the adverse effects of uremia on the function of circulating hematologic elements. Impaired erythropoiesis is successfully managed with hormonal stimulation; perhaps, similar therapies can be devised to reverse platelet and leukocyte dysfunction and reduce bleeding and infectious complications

    The incidence of scarring on the dorsum of the hand

    Get PDF
    When undertaking image comparison of the hand between accused and perpetrator, it is not unusual for scars to be identified on the back of the hand. To investigate the occurrence of scarring in a discreet sample, a database of 238 individuals was examined, and the dorsum of the right and left hands was gridded for each individual. The position, size and type of scar were recorded within each grid. It was found that, in general, males exhibited a higher incidence of scarring than females. However, males were more likely to show scarring on their left hand whereas females were more likely to exhibit scarring on their right hand. Contrary to the literature, scarring was not most prevalent along the borders of the hand but occurred more frequently in association with the index and middle finger corridor regions. Surgical scars were rare as were large scars whereas linear scars smaller than 6 mm were the most frequently identified. Close to half of the sample did not exhibit scarring on one hand. The importance of understanding the pattern of scarring on the back of the hand is discussed in the light of forensic image comparison analysis

    Long term outcomes of ‘Christmas Tree’ banding for haemodialysis access induced distal ischemia: A 13-year experience

    Get PDF
    Background: The reduction in distal arterial flow following arteriovenous fistula (AVF) creation can cause a perfusion deficit known as haemodialysis access induced distal ischemia (HAIDI). Various techniques have been advocated to treat this difficult problem with varying success. We present the long-term outcomes following a novel banding technique. Methods: 46 patients in this cohort from 2008 to 2021 underwent a novel banding procedure using a Dacron™ patch shaped with one slit-end and saw-tooth edges (resulting in a ‘Christmas-tree’ pattern) to provide a ratchet mechanism to progressively constrict the fistula outflow. Real-time finger perfusion pressure monitoring allowed an accurate reduction in AVF flow whilst increasing distal arterial perfusion pressure. Baseline characteristic were recorded and Kaplan-Meier survival curves were obtained to calculate the post-intervention primary, assisted primary and secondary patency. Results: 29 patients presented with rest pain and 11 presented with tissue loss due to distal ischemia. The post-intervention primary access patency was 100%, 98%, 78% and 61% at 30, 60 and 180 days and 1 year respectively. Complete resolution of symptoms was achieved in 74% (n = 34) of patients and a partial response needing no further intervention was achieved in 11% (n = 5) of patients. A Youden index calculation suggested that digital pressures of 41 mm Hg or lower in an open AVF were highly sensitive for symptomatic hand ischemia whereas pressures greater than 65 mm Hg ruled out distal ischemia. Conclusion: ‘Christmas-tree’ banding with on table finger systolic pressures is not only an efficacious and durable method for treating HAIDI but also preserves fistula patency

    IEEE Access Special Section Editorial: Biologically Inspired Image Processing Challenges and Future Directions

    Get PDF
    Human kind is exposed to large amounts of data. According to statistics, more than 80% of information received by humans comes from the visual system. Therefore, image information processing is not only an important research topic but also a challenging task. The unique information processing mechanism of the human visual system provides it with fast, accurate, and efficient image processing capabilities. At present, many advanced image analysis and processing techniques have been widely used in image communication, geographic information systems, medical image analysis, and virtual reality. However, there is still a large gap between these technologies and the human visual system. Therefore, building an image system research mechanism based on the biological vision system is an attractive but difficult target. Although it is a challenge, it can also be considered as an opportunity which utilizes biologically inspired ideas. Meanwhile, through the integration of neural biology, biological perception mechanisms, and computer science and mathematical science, related research can bridge biological vision and computer vision. Finally, the biologically inspired image analysis and processing system is expected to be built on the basis of further consideration of the learning mechanism of the human brain
    corecore