130 research outputs found

    Fingerprint Enhancement Algorithm Based-on Gradient Magnitude for the Estimation of Orientation Fields

    Get PDF
    An accurate estimation of fingerprint orientation fields is an important step in the fingerprint classification process. Gradient-based approaches are often used for estimating orientation fields of ridge structures but this method is susceptible to noise. Enhancement of fingerprint images improves the ridge-valley structure and increases the number of correct features thereby conducing the overall performance of the classification process. In this paper, we propose an algorithm to improve ridge orientation textures using gradient magnitude. That algorithm has four steps; firstly, normalization of fingerprint image, secondly, foreground extraction, thirdly, noise areas identification and marking using gradient coherence and finally, enhancement of grey level. We have used standard fingerprint database NIST-DB14 for testing of proposed algorithm to verify the degree of efficiency of algorithm. The experiment results suggest that our enhanced algorithm achieves visibly better noise resistance with other methods

    Segmentation of Fingerprint Image Based on Gradient Magnitude and Coherence

    Get PDF
    Fingerprint image segmentation is an important pre-processing step in automatic fingerprint recognition system. A well-designed fingerprint segmentation technique can improve the accuracy in collecting clear fingerprint area and mark noise areas. The traditional grey variance segmentation method is widely and easily used, but it can hardly segment fingerprints with low contrast of high noise. To overcome the low image contrast, combining two-block feature; mean of gradient magnitude and coherence, where the fingerprint image is segmented into background, foreground or noisy regions,  has been done. Except for the noisy regions in the foreground, there are still such noises existed in the background whose coherences are low, and are mistakenly assigned as foreground. A novel segmentation method based on combination local mean of grey-scale and local variance of gradient magnitude is presented in this paper. The proposed extraction begins with normalization of the fingerprint. Then, it is followed by foreground region separation from the background. Finally, the gradient coherence approach is used to detect the noise regions existed in the foreground. Experimental results on NIST-Database14 fingerprint images indicate that the proposed method gives the impressive results

    Review on passive approaches for detecting image tampering

    Get PDF
    This paper defines the presently used methods and approaches in the domain of digital image forgery detection. A survey of a recent study is explored including an examination of the current techniques and passive approaches in detecting image tampering. This area of research is relatively new and only a few sources exist that directly relate to the detection of image forgeries. Passive, or blind, approaches for detecting image tampering are regarded as a new direction of research. In recent years, there has been significant work performed in this highly active area of research. Passive approaches do not depend on hidden data to detect image forgeries, but only utilize the statistics and/or content of the image in question to verify its genuineness. The specific types of forgery detection techniques are discussed below

    Review on tools for image detection forgery

    Get PDF
    This paper defines the presently used methods and approaches in the domain of digital image forgery detection. A survey of a recent study is explored including an examination of the current techniques and passive approaches in detecting image tampering. This area of research is relatively new and only a few sources exist that directly relate to the detection of image forgeries. Fake images have become widespread in society today. The accessibility to powerful simple to use image editing computer software to end users helps make the job of manipulating image incredibly easy. One can find forged images used to sensationalize news, spread political propaganda and rumors, introduce psychological bias, etc. in all forms of media

    HUMAN EAR CLASSIFICATION SCHEME BASED ON LOBULE CHAIN CODE AND HELIX DIMENSIONALITY

    Get PDF
    In this paper, a human ear classification approach which uses the ear image contour was proposed. Basically, the scheme has four classification groups which are based on only two concepts namely: Chain code (Lobed and Lobeless Ear) and Dimensionality of Helix (Big and Small Ear). Using the chain code feature vectors extracted from the ear contour after necessary pre-processing activities, the ear were classified based on the code pattern of the last twenty or fifteen codes which uses the rule of thumb classifier we built. Similarly, the second classification process implored the Helix dimensional features which were a product of the Angular Points and landmark space, using the Square of Sum Difference. Therefore, the experimental result showed about 94.80% and 92.20% accuracy respectively

    Offline handwritten signature identification using adaptive window positioning techniques

    Full text link
    The paper presents to address this challenge, we have proposed the use of Adaptive Window Positioning technique which focuses on not just the meaning of the handwritten signature but also on the individuality of the writer. This innovative technique divides the handwritten signature into 13 small windows of size nxn(13x13).This size should be large enough to contain ample information about the style of the author and small enough to ensure a good identification performance.The process was tested with a GPDS data set containing 4870 signature samples from 90 different writers by comparing the robust features of the test signature with that of the user signature using an appropriate classifier. Experimental results reveal that adaptive window positioning technique proved to be the efficient and reliable method for accurate signature feature extraction for the identification of offline handwritten signatures.The contribution of this technique can be used to detect signatures signed under emotional duress.Comment: 13 pages, 9 figures, 2 tables, Offline Handwritten Signature, GPDS dataset, Verification, Identification, Adaptive window positionin

    Vehicle Detection and Tracking Techniques: A Concise Review

    Get PDF
    Vehicle detection and tracking applications play an important role for civilian and military applications such as in highway traffic surveillance control, management and urban traffic planning. Vehicle detection process on road are used for vehicle tracking, counts, average speed of each individual vehicle, traffic analysis and vehicle categorizing objectives and may be implemented under different environments changes. In this review, we present a concise overview of image processing methods and analysis tools which used in building these previous mentioned applications that involved developing traffic surveillance systems. More precisely and in contrast with other reviews, we classified the processing methods under three categories for more clarification to explain the traffic systems
    corecore