657 research outputs found

    Prevention of Unauthorized Transport of Ore in Opencast Mines Using Automatic Number Plate Recognition

    Get PDF
    Security in mining is a primary concern, which mainly affects the production cost. An efficiently detecting and deterring theft will maximize the profitability of any mining organization. Many illegal transportation cases were registered in spite of rules imposed by central and state governments under Section 23 (c) of MMDR Act 1957. Use of an automated checkpoint gate based on license plate recognition and biometric fingerprint system for vehicle tracking enhances the security in mines. The method was tested on the number plates with various considerations like clean number plates, clean fingerprints, dusty and faded number plates, dusty fingerprints, and number plates captured by varying distance. By considering all the above conditions the pictures were processed by ANPR and bio-metric fingerprint modules. Vehicle license number plate was captured using a digital camera and the captured RGB image was converted to grayscale image. Thresholding was done to remove unwanted areas from the grayscale image. The characters of the number plate were segmented using Gabor filter. A track-sector matrix was generated by considering the number of pixels in each region and was matched with existing template to identify the character. The fingerprint scans the finger and matches with the template created at the time of fingerprint registration at the machine. The micro-controller accepted the processed output in binary form from ANPR and bio-metric fingerprint system. The micro-controller processed the binary output and the checkpoint gate was closed/open based on the output provided by the microcontroller to motor driver

    A Review: Person Identification using Retinal Fundus Images

    Get PDF
    In this paper a review on biometric person identification has been discussed using features from retinal fundus image. Retina recognition is claimed to be the best person identification method among the biometric recognition systems as the retina is practically impossible to forge. It is found to be most stable, reliable and most secure among all other biometric systems. Retina inherits the property of uniqueness and stability. The features used in the recognition process are either blood vessel features or non-blood vessel features. But the vascular pattern is the most prominent feature utilized by most of the researchers for retina based person identification. Processes involved in this authentication system include pre-processing, feature extraction and feature matching. Bifurcation and crossover points are widely used features among the blood vessel features. Non-blood vessel features include luminance, contrast, and corner points etc. This paper summarizes and compares the different retina based authentication system. Researchers have used publicly available databases such as DRIVE, STARE, VARIA, RIDB, ARIA, AFIO, DRIDB, and SiMES for testing their methods. Various quantitative measures such as accuracy, recognition rate, false rejection rate, false acceptance rate, and equal error rate are used to evaluate the performance of different algorithms. DRIVE database provides 100\% recognition for most of the methods. Rest of the database the accuracy of recognition is more than 90\%

    Multimedia Forensics

    Get PDF
    This book is open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field

    Visual Map Construction Using RGB-D Sensors for Image-Based Localization in Indoor Environments

    Get PDF
    RGB-D sensors capture RGB images and depth images simultaneously, which makes it possible to acquire the depth information at pixel level. This paper focuses on the use of RGB-D sensors to construct a visual map which is an extended dense 3D map containing essential elements for image-based localization, such as poses of the database camera, visual features, and 3D structures of the building. Taking advantage of matched visual features and corresponding depth values, a novel local optimization algorithm is proposed to achieve point cloud registration and database camera pose estimation. Next, graph-based optimization is used to obtain the global consistency of the map. On the basis of the visual map, the image-based localization method is investigated, making use of the epipolar constraint. The performance of the visual map construction and the image-based localization are evaluated on typical indoor scenes. The simulation results show that the average position errors of the database camera and the query camera can be limited to within 0.2 meters and 0.9 meters, respectively

    Recent Advances in Indoor Localization Systems and Technologies

    Get PDF
    Despite the enormous technical progress seen in the past few years, the maturity of indoor localization technologies has not yet reached the level of GNSS solutions. The 23 selected papers in this book present the recent advances and new developments in indoor localization systems and technologies, propose novel or improved methods with increased performance, provide insight into various aspects of quality control, and also introduce some unorthodox positioning methods
    corecore