1,315 research outputs found
Face recognition using color local binary pattern from mutually independent color channels
In this paper, a high performance face recognition system based on local
binary pattern (LBP) using the probability distribution functions (PDF) of
pixels in different mutually independent color channels which are robust to
frontal homogenous illumination and planer rotation is proposed. The
illumination of faces is enhanced by using the state-of-the-art technique which
is using discrete wavelet transform (DWT) and singular value decomposition
(SVD). After equalization, face images are segmented by use of local Successive
Mean Quantization Transform (SMQT) followed by skin color based face detection
system. Kullback-Leibler Distance (KLD) between the concatenated PDFs of a
given face obtained by LBP and the concatenated PDFs of each face in the
database is used as a metric in the recognition process. Various decision
fusion techniques have been used in order to improve the recognition rate. The
proposed system has been tested on the FERET, HP, and Bosphorus face databases.
The proposed system is compared with conventional and thestate-of-the-art
techniques. The recognition rates obtained using FVF approach for FERET
database is 99.78% compared with 79.60% and 68.80% for conventional gray scale
LBP and Principle Component Analysis (PCA) based face recognition techniques
respectively.Comment: 11 pages in EURASIP Journal on Image and Video Processing, 201
Multibiometric security in wireless communication systems
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and
WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition.
First is the enrolment phase by which the database of watermarked fingerprints with
memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel.
Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present oneâs fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user.
The following three steps then involve speaker recognition including the user
responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user.
In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint
image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and
sliding neighborhood) have been followed with further two steps for embedding, and
extracting the watermark into the enhanced fingerprint image utilising Discrete
Wavelet Transform (DWT).
In the speaker recognition stage, the limitations of this technique in wireless
communication have been addressed by sending voice feature (cepstral coefficients)
instead of raw sample. This scheme is to reap the advantages of reducing the
transmission time and dependency of the data on communication channel, together
with no loss of packet. Finally, the obtained results have verified the claims
Histogram equalization for robust text-independent speaker verification in telephone environments
Word processed copy.
Includes bibliographical references
Robust and Effective Banknote Recognition Model for Aiding Visual Impaired People
Visual disabled Ethiopians find great difficulty in recognizing banknotes. Each Ethiopian banknote has an identical feel, with no Braille markings, irregular edges, or other tangible features that make it easily recognizable by blind persons. In Ethiopia, there's only one device available that will assist blind people to acknowledge their notes. Internationally, there are devices available; however, they're expensive, complex, and haven't been developed to cater to Ethiopian currency. Because of these facts, visually impaired people may suffer from recognizing each folding money. This fact necessitates a higher authentication and verification system that will help visually disabled people to simply identify and recognize the banknotes. This paper presents a denomination-specific component-based framework for a banknote recognition system. Within the study, the dominant color of the banknotes was first identified and so the exclusive feature for every denomination-specific ROI was calculated. Finally, the Colour-Momentum, dominant color, and GLCM features were calculated from each denomination-specific ROI. Designing the recognition system by thereby considering the denomination-specific ROI is simpler as compared to considering the entire note in collecting more class-specific information and robust in copying with partial occlusion and viewpoint changes. The performance of the proposed model was verified by using a larger dataset of which containing banknotes in several conditions including occlusion, cluttered background, rotation, and changes of illumination, scaling, and viewpoints. The proposed algorithm achieves a 98% recognition rate on our challenging datasets
- âŠ