1,315 research outputs found

    Robust Face Localization Using Dynamic Time Warping Algorithm

    Get PDF

    Face recognition using color local binary pattern from mutually independent color channels

    Get PDF
    In this paper, a high performance face recognition system based on local binary pattern (LBP) using the probability distribution functions (PDF) of pixels in different mutually independent color channels which are robust to frontal homogenous illumination and planer rotation is proposed. The illumination of faces is enhanced by using the state-of-the-art technique which is using discrete wavelet transform (DWT) and singular value decomposition (SVD). After equalization, face images are segmented by use of local Successive Mean Quantization Transform (SMQT) followed by skin color based face detection system. Kullback-Leibler Distance (KLD) between the concatenated PDFs of a given face obtained by LBP and the concatenated PDFs of each face in the database is used as a metric in the recognition process. Various decision fusion techniques have been used in order to improve the recognition rate. The proposed system has been tested on the FERET, HP, and Bosphorus face databases. The proposed system is compared with conventional and thestate-of-the-art techniques. The recognition rates obtained using FVF approach for FERET database is 99.78% compared with 79.60% and 68.80% for conventional gray scale LBP and Principle Component Analysis (PCA) based face recognition techniques respectively.Comment: 11 pages in EURASIP Journal on Image and Video Processing, 201

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims

    Histogram equalization for robust text-independent speaker verification in telephone environments

    Get PDF
    Word processed copy. Includes bibliographical references

    Robust and Effective Banknote Recognition Model for Aiding Visual Impaired People

    Get PDF
    Visual disabled Ethiopians find great difficulty in recognizing banknotes. Each Ethiopian banknote has an identical feel, with no Braille markings, irregular edges, or other tangible features that make it easily recognizable by blind persons. In Ethiopia, there's only one device available that will assist blind people to acknowledge their notes. Internationally, there are devices available; however, they're expensive, complex, and haven't been developed to cater to Ethiopian currency. Because of these facts, visually impaired people may suffer from recognizing each folding money. This fact necessitates a higher authentication and verification system that will help visually disabled people to simply identify and recognize the banknotes. This paper presents a denomination-specific component-based framework for a banknote recognition system. Within the study, the dominant color of the banknotes was first identified and so the exclusive feature for every denomination-specific ROI was calculated. Finally, the Colour-Momentum, dominant color, and GLCM features were calculated from each denomination-specific ROI. Designing the recognition system by thereby considering the denomination-specific ROI is simpler as compared to considering the entire note in collecting more class-specific information and robust in copying with partial occlusion and viewpoint changes. The performance of the proposed model was verified by using a larger dataset of which containing banknotes in several conditions including occlusion, cluttered background, rotation, and changes of illumination, scaling, and viewpoints. The proposed algorithm achieves a 98% recognition rate on our challenging datasets
    • 

    corecore