People involved: - Li Fang (Lecturer) - Maylor Karhang Leung (Assoc Prof) - Kean Fatt Choon (Final Year Project student) Palmprint Classification.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

BIOMETRIC VOTING SYSTEM
4 Uses and Abuses of Statistics 4.1 Introduction to Statistics
September 2010 USER NEEDS IDENTIFICATION FOR CONTENT MODEL DEVELOPMENT OIDAP Quarterly Meeting Boston, MA Shirleen Roth Social Security Administration.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
4. FREQUENCY DISTRIBUTION
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
The Quest for a Perfect World UTOPIA UNIT INTRODUCTION.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
Advanced Manufacturing Laboratory Department of Industrial Engineering Sharif University of Technology Session # 12.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Funding Networks Abdullah Sevincer University of Nevada, Reno Department of Computer Science & Engineering.
UPM, Faculty of Computer Science & IT, A robust automated attendance system using face recognition techniques PhD proposal; May 2009 Gawed Nagi.
PALM VEIN TECHNOLOGY.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Introduction to Machine Learning Approach Lecture 5.
SW318 Social Work Statistics Slide 1 Using SPSS for Graphic Presentation  Various Graphics in SPSS  Pie chart  Bar chart  Histogram  Area chart 
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
1.3 System Design Parts of a System InputProcessOutput Input Devices Central Processing Unit Output Devices The main parts of any computer system.
Objectives (BPS chapter 1)
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
KYLE PATTERSON Automatic Age Estimation and Interactive Museum Exhibits Advisors: Prof. Cass and Prof. Lawson.
Chapter 11: Applications of Chi-Square. Chapter Goals Investigate two tests: multinomial experiment, and the contingency table. Compare experimental results.
Monday, January 31, 2000 Aiming Wu Department of Computing and Information Sciences, KSU Readings: Chown and Dietterich.
Metadata Models in Survey Computing Some Results of MetaNet – WG 2 METIS 2004, Geneva W. Grossmann University of Vienna.
Artificial Intelligence Techniques Multilayer Perceptrons.
1 Multiple Classifier Based on Fuzzy C-Means for a Flower Image Retrieval Keita Fukuda, Tetsuya Takiguchi, Yasuo Ariki Graduate School of Engineering,
Supporting Researchers and Institutions in Exploiting Administrative Databases for Statistical Purposes: Istat’s Strategy G. D’Angiolini, P. De Salvo,
Chapter Twelve Copyright © 2006 John Wiley & Sons, Inc. Data Processing, Fundamental Data Analysis, and Statistical Testing of Differences.
Copyright 2010, The World Bank Group. All Rights Reserved. Energy statistics, part 2 Production and use of energy 1 Business statistics and registers.
Chapter 4: Pattern Recognition. Classification is a process that assigns a label to an object according to some representation of the object’s properties.
Basic problem solving CSC 111.
CONTENTS INTRODUCTION TO A.I. WORKING OF A.I. APPLICATIONS OF A.I. CONCLUSIONS ON A.I.
Action and Gait Recognition From Recovered 3-D Human Joints IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS— PART B: CYBERNETICS, VOL. 40, NO. 4, AUGUST.
AdvisorStudent Dr. Jia Li Shaojun Liu Dept. of Computer Science and Engineering, Oakland University Automatic 3D Image Segmentation of Internal Lung Structures.
Biometric Technologies
A NOVEL METHOD FOR COLOR FACE RECOGNITION USING KNN CLASSIFIER
CS425: Algorithms for Web Scale Data Most of the slides are from the Mining of Massive Datasets book. These slides have been modified for CS425. The original.
12/23/2015Slide 1 The chi-square test of independence is one of the most frequently used hypothesis tests in the social sciences because it can be used.
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
Big traffic data processing framework for intelligent monitoring and recording systems 學生 : 賴弘偉 教授 : 許毅然 作者 : Yingjie Xia a, JinlongChen a,b,n, XindaiLu.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Organization of statistical investigation. Medical Statistics Commonly the word statistics means the arranging of data into charts, tables, and graphs.
Algorithms and Pseudocode
An Efficient Implementation of File Sharing Systems on the Basis of WiMAX and Wi-Fi Jingyuan Li, Liusheng Huang, Weijia Jia, Mingjun Xiao and Peng Du Joint.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Collecting Primary Data: Survey Research Design Lecture & Seminar.
Data Structures.
Lecture 7 Constructing hypotheses
Session 7: Face Detection (cont.)
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
R-CNN region By Ilia Iofedov 11/11/2018 BGU, DNN course 2016.
Biometric technology.
Presented by :- Vishal Vijayshankar Mishra
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
Hybrid Finger print recognition
A maximum likelihood estimation and training on the fly approach
SDLC Phases Systems Design.
Concept Development and End Product Description
Presentation transcript:

People involved: - Li Fang (Lecturer) - Maylor Karhang Leung (Assoc Prof) - Kean Fatt Choon (Final Year Project student) Palmprint Classification

Task Create a hierarchical system to improve the speed of palmprint recognition

Contents Victor - Victor - Introduction, Research, conventional process Tejas - Tejas - Algorithm, explanation of various categories

Introduction What is palmprint recognition? Form of computer-aided personal recognition Capturing images of palmprint and matching it with the database Use for security purposes in many countries

Definitions Introduction to principal lines Life Line Head Line Heart Line

Rationale Why palmprint? Widely used by many security agencies. Cost effective Non-intrusive Possible to build highly accurate biometric system

Rationale Why others methods such as iris and fingerprint are not highly effective Why others methods such as iris and fingerprint are not highly effective ? Iris input devices are expensive. Iris is intrusive Fingerprint require high definition capturing devices. Some may be finger deficient

Contains 1000 images Palmprint Capture Input Database Result Output BEGIN Match with users registered palm print in the database? END False True

Limitations Image captured has to be matched with every single image in database Time consuming Too high computational complexity to be applicable

Aims & Expectations Our aim is to speed up this process by adding in 2 extra filters before the palm print is matched We expect to increase the speed of the recognition which is one of the most deterring limitation

Survey Conducted a survey among people living in Singapore Gender Age Nationality Survey can be used in our study and design of algorithm which will suit the residents here.

Survey Result From our survey, The population palms can be classified into 6 categories (elaborated in the later slide) Majority of the population lies in one category. However, significant amount of the population still falls under the other categories

Studies have shown... According to the algorithm proposed on the research paper According to the algorithm proposed on the research paper The algorithm proposed categorizes the palmprints into 6 categories Palm Categories

Cat 1 Cat 5Cat 4 Cat 3 Cat 2 Cat 6 Palm Categories

Result Algorithm proposed by the research paper

Category 5

New Algorithm Why a new algorithm is required? 78% of the people lie in the 5th category Based on the current system, the input image has to be matched with every image in the database before the result is obtained

Flowchart Image matching with the images in same category in data base Categories with the new algorithm Result Categories with the initial algorithm Belong to Category 5? N Input Palmprint Y Image matching with the images in same category in data base Categories with the new algorithm Result Categories with the initial algorithm Belong to Category 5? N Input Palmprint Y

Flowchart Image matching with the images in same category in data base Categories with the new algorithm Result Categories with the initial algorithm Belong to Category 5? N Input Palmprint Y

Flowchart In Cat. 1 Image matching with the images in same category in data base Categories with the new algorithm Result Categories with the initial algorithm Belong to Category 5? N Input Palmprint Y

Flowchart In Cat. 1 NOT CAT. 5 Image matching with the images in same category in data base Categories with the new algorithm Result Categories with the initial algorithm Belong to Category 5? N Input Palmprint Y

Flowchart Image matching with the images in same category in data base Categories with the new algorithm Result Categories with the initial algorithm Belong to Category 5? N Input Palmprint Y In Cat. 1 NOT CAT. 5 Not Cat 5 Compare Result

Flowchart Image matching with the images in same category in data base Categories with the new algorithm Result Categories with the initial algorithm Belong to Category 5? N Input Palmprint Y

Flowchart Image matching with the images in same category in data base Categories with the new algorithm Result Categories with the initial algorithm Belong to Category 5? N Input Palmprint Y In Cat. 5

Flowchart Image matching with the images in same category in data base Categories with the new algorithm Result Categories with the initial algorithm Belong to Category 5? N Input Palmprint Y In Cat. 5 True

Flowchart Image matching with the images in same category in data base Categories with the new algorithm Result Categories with the initial algorithm Belong to Category 5? N Input Palmprint Y In Cat. 5 E.g cat. A

Flowchart Image matching with the images in same category in data base Categories with the new algorithm Result Categories with the initial algorithm Belong to Category 5? N Input Palmprint Y In Cat. 5 Cat A. Compare Cat A Result

New Process Contains 1000 Images Palmprint Capture Input Database Result Cat A Cat BCat C Cat D Cat E Not Cat 5

New Algorithm Step 1 The first line connected from the end of the little finger to the intersection of the life line and head line (green line) The second line is connected from the end of life line to intersection of life and head line (red line) The third line is connected from point of intersection green line and heart line to midpoint of red line (purple line)

New Algorithm Step 2 Draw a triangle inside the triangle by connecting the mid points of the each line Divide the two triangle into 4 parts as shown

New Algorithm Step 3 Draw a line from end of heart line to end of life line Draw a line from beginning of heart line to the intersection of life line and head line The location of the point of intersection of these 2 lines can then be used to categorize the palm

Implementation Category A Category B Category C Category D Category E

Result We tried this algorithm on 100 subjects The pie chart above shows the percentage of each category It can be concluded that algorithm proposed is effective

Summary Our research showed that process of palmprint recognition is inefficient and can be improved Our research showed that process of palmprint recognition is inefficient and can be improved Our survey analysis revealed that most people lie in one particular category Our survey analysis revealed that most people lie in one particular category Proposed a robust algorithm via study of characteristics of principal lines to reinforce the method of palmprint classification Proposed a robust algorithm via study of characteristics of principal lines to reinforce the method of palmprint classification Tried out the proposed algorithm on 100 subjects to investigate its effectiveness Tried out the proposed algorithm on 100 subjects to investigate its effectiveness

The End