100 research outputs found

    Application of Gaussian-Hermite Moments in License

    Get PDF

    Segmentation of Fingerprint Image Using Block-Wise Coherence Algorithm

    Full text link
    The Segmentation of fingerprint image is an important step in the fingerprint identification. The objective of the fingerprint image segmentation is to separating the foreground regions from the background regions. Accurate segmentation of fingerprint images influences directly the performance of minutiae extraction like minutiae and singular points. In this paper, an algorithm for the segmentation of fingerprint image is presented. The method uses block-wise coherence. Fingerprint data has been taken from NIST databases 14. The segmentation algorithm has been trained on fingerprints of this database, but not on these particular fingerprints. Human inspection shows that the block-wise coherence algorithm provides satisfactory result

    Segmentation Of Fingerprint Image Using Block-Wise Coherence Algorithm

    Get PDF
    The Segmentation of fingerprint image is an important step in the fingerprint identification. The objective of the fingerprint image segmentation is to separating the foreground regions from the background regions. Accurate segmentation of fingerprint images influences directly the performance of minutiae extraction like minutiae and singular points. In this paper, an algorithm for the segmentation of fingerprint image is presented. The method uses block-wise coherence. Fingerprint data has been taken from NIST databases 14. The segmentation algorithm has been trained on fingerprints of this database, but not on these particular fingerprints. Human inspection shows that the block-wise coherence algorithm provides satisfactory result. Keyword: fingerprint image segmentation, block-wise, coherence, minutiae, singular point

    Performances of proposed normalization algorithm for iris recognition

    Get PDF
    Iris recognition has very high recognition accuracy in comparison with many other biometric features. The iris pattern is not the same even right and left eye of the same person. It is different and unique. This paper proposes an algorithm to recognize people based on iris images. The algorithm consists of three stages. In the first stage, the segmentation process is using circular Hough transforms to find the region of interest (ROI) of given eye images. After that, a proposed normalization algorithm is to generate the polar images than to enhance the polar images using a modified Daugman’s Rubber sheet model. The last step of the proposed algorithm is to divide the enhance the polar image to be 16 divisions of the iris region. The normalized image is 16 small constant dimensions. The Gray-Level Co-occurrence Matrices (GLCM) technique calculates and extracts the normalized image’s texture feature. Here, the features extracted are contrast, correlation, energy, and homogeneity of the iris. In the last stage, a classification technique, discriminant analysis (DA), is employed for analysis of the proposed normalization algorithm. We have compared the proposed normalization algorithm to the other nine normalization algorithms. The DA technique produces an excellent classification performance with 100% accuracy. We also compare our results with previous results and find out that the proposed iris recognition algorithm is an effective system to detect and recognize person digitally, thus it can be used for security in the building, airports, and other automation in many applications

    -Means Based Fingerprint Segmentation with Sensor Interoperability

    Get PDF
    A critical step in an automatic fingerprint recognition system is the segmentation of fingerprint images. Existing methods are usually designed to segment fingerprint images originated from a certain sensor. Thus their performances are significantly affected when dealing with fingerprints collected by different sensors. This work studies the sensor interoperability of fingerprint segmentation algorithms, which refers to the algorithm's ability to adapt to the raw fingerprints obtained from different sensors. We empirically analyze the sensor interoperability problem, and effectively address the issue by proposing a k-means based segmentation method called SKI. SKI clusters foreground and background blocks of a fingerprint image based on the k-means algorithm, where a fingerprint block is represented by a 3-dimensional feature vector consisting of block-wise coherence, mean, and variance (abbreviated as CMV). SKI also employs morphological postprocessing to achieve favorable segmentation results. We perform SKI on each fingerprint to ensure sensor interoperability. The interoperability and robustness of our method are validated by experiments performed on a number of fingerprint databases which are obtained from various sensors

    Two-Level Evaluation on Sensor Interoperability of Features in Fingerprint Image Segmentation

    Get PDF
    Features used in fingerprint segmentation significantly affect the segmentation performance. Various features exhibit different discriminating abilities on fingerprint images derived from different sensors. One feature which has better discriminating ability on images derived from a certain sensor may not adapt to segment images derived from other sensors. This degrades the segmentation performance. This paper empirically analyzes the sensor interoperability problem of segmentation feature, which refers to the feature’s ability to adapt to the raw fingerprints captured by different sensors. To address this issue, this paper presents a two-level feature evaluation method, including the first level feature evaluation based on segmentation error rate and the second level feature evaluation based on decision tree. The proposed method is performed on a number of fingerprint databases which are obtained from various sensors. Experimental results show that the proposed method can effectively evaluate the sensor interoperability of features, and the features with good evaluation results acquire better segmentation accuracies of images originating from different sensors

    A survey of fingerprint classification Part II: experimental analysis and ensemble proposal

    Get PDF
    In the first part of this paper we reviewed the fingerprint classification literature from two different perspectives: the feature extraction and the classifier learning. Aiming at answering the question of which among the reviewed methods would perform better in a real implementation we end up in a discussion which showed the difficulty in answering this question. No previous comparison exists in the literature and comparisons among papers are done with different experimental frameworks. Moreover, the difficulty in implementing published methods was stated due to the lack of details in their description, parameters and the fact that no source code is shared. For this reason, in this paper we will go through a deep experimental study following the proposed double perspective. In order to do so, we have carefully implemented some of the most relevant feature extraction methods according to the explanations found in the corresponding papers and we have tested their performance with different classifiers, including those specific proposals made by the authors. Our aim is to develop an objective experimental study in a common framework, which has not been done before and which can serve as a baseline for future works on the topic. This way, we will not only test their quality, but their reusability by other researchers and will be able to indicate which proposals could be considered for future developments. Furthermore, we will show that combining different feature extraction models in an ensemble can lead to a superior performance, significantly increasing the results obtained by individual models.This work was supported by the Research Projects CAB(CDTI), TIN2011-28488, and TIN2013-40765-P

    Biometrics

    Get PDF
    Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The book consists of 13 chapters, each focusing on a certain aspect of the problem. The book chapters are divided into three sections: physical biometrics, behavioral biometrics and medical biometrics. The key objective of the book is to provide comprehensive reference and text on human authentication and people identity verification from both physiological, behavioural and other points of view. It aims to publish new insights into current innovations in computer systems and technology for biometrics development and its applications. The book was reviewed by the editor Dr. Jucheng Yang, and many of the guest editors, such as Dr. Girija Chetty, Dr. Norman Poh, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park, Dr. Sook Yoon and so on, who also made a significant contribution to the book
    • …
    corecore