A Thermal Hand Vein Pattern Verification System Lingyu Wang & Graham Leedham Forensic and Security Lab, Nanyang Technological University, Singapore.

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

Document Examiner Feature Extraction: Thinned vs Skeletonised Images
QR Code Recognition Based On Image Processing
Change Detection C. Stauffer and W.E.L. Grimson, “Learning patterns of activity using real time tracking,” IEEE Trans. On PAMI, 22(8): , Aug 2000.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Discrete Finger and Palmar Feature Extraction for Personal Authentication Junta Doi, Member, IEEE,and Masaaki Yamanaka Advisor:Wen-Shiung Chen Student:
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
1 Video Processing Lecture on the image part (8+9) Automatic Perception Volker Krüger Aalborg Media Lab Aalborg University Copenhagen
Automatic Feature Extraction for Multi-view 3D Face Recognition
IIIT Hyderabad Pose Invariant Palmprint Recognition Chhaya Methani and Anoop Namboodiri Centre for Visual Information Technology IIIT, Hyderabad, INDIA.
April 14, Infrared Identification Instructor: Natalia Schmid BIOM 426: Biometrics Systems.
A Review of “Adaptive fingerprint image enhancement with fingerprint image quality analysis”, by Yun & Cho Malcolm McMillan.
Sreya Chakraborty Under the guidance of Dr. K. R. Rao Multimedia Processing Lab (MPL) University of Texas at Arlington.
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
A Study of Approaches for Object Recognition
Automatic Face Recognition Using Color Based Segmentation and Intelligent Energy Detection Michael Padilla and Zihong Fan Group 16 EE368, Spring
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Retinal Scanning Biometrics Presentation by Ajinkya Bhave 30 th April, 2003.
PALM VEIN TECHNOLOGY.
Object Detection and Tracking Mike Knowles 11 th January 2005
Highlights Lecture on the image part (10) Automatic Perception 16
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Image Classification and its Applications
Image Pattern Recognition The identification of animal species through the classification of hair patterns using image pattern recognition: A case study.
ENDA MOLLOY, ELECTRONIC ENG. FINAL PRESENTATION, 31/03/09. Automated Image Analysis Techniques for Screening of Mammography Images.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Topic 10 - Image Analysis DIGITAL IMAGE PROCESSING Course 3624 Department of Physics and Astronomy Professor Bob Warwick.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
資訊工程系智慧型系統實驗室 iLab 南台科技大學 1 A Static Hand Gesture Recognition Algorithm Using K- Mean Based Radial Basis Function Neural Network 作者 :Dipak Kumar Ghosh,
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Video Segmentation Prepared By M. Alburbar Supervised By: Mr. Nael Abu Ras University of Palestine Interactive Multimedia Application Development.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
Biometric Technologies
Autonomous Robots Vision © Manfred Huber 2014.
Performance Comparison of Speaker and Emotion Recognition
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Pushpita Biswas Under the guidance of Prof. S.Mukhopadhyay and Prof. P.K.Biswas.
October 1, 2013Computer Vision Lecture 9: From Edges to Contours 1 Canny Edge Detector However, usually there will still be noise in the array E[i, j],
A Recognition Method of Restricted Hand Shapes in Still Image and Moving Image Hand Shapes in Still Image and Moving Image as a Man-Machine Interface Speaker.
Morphological Image Processing Robotics. 2/22/2016Introduction to Machine Vision Remember from Lecture 12: GRAY LEVEL THRESHOLDING Objects Set threshold.
WCPM 1 Chang-Tsun Li Department of Computer Science University of Warwick UK Image Clustering Based on Camera Fingerprints.
Preliminary Transformations Presented By: -Mona Saudagar Under Guidance of: - Prof. S. V. Jain Multi Oriented Text Recognition In Digital Images.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Portable Camera-Based Assistive Text and Product Label Reading From Hand-Held Objects for Blind Persons.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Content Based Coding of Face Images
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Hand Geometry Recognition
Improving the Performance of Fingerprint Classification
Digital Image Processing
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Facial Recognition in Biometrics
Hu Li Moments for Low Resolution Thermal Face Recognition
Object Recognition Today we will move on to… April 12, 2018
Presented by: k.ramya krishna
Morphological Filters Applications and Extension Morphological Filters
Presentation transcript:

A Thermal Hand Vein Pattern Verification System Lingyu Wang & Graham Leedham Forensic and Security Lab, Nanyang Technological University, Singapore

Outlines Overview Background Vein patterns as biometrics Proposed system model for hand vein pattern verification Details of the system Stage I : Data Acquisition Stage II: ROI selection and image enhancement Stage III: Background separation Stage IV: Skeletonization Stage V: Matching Testing Summaries and Conclusions

Overview Background Many biometric features have been utilized for this purpose. (e.g. fingerprints, retina pattern, voice etc.) Each of them has its strengths and weaknesses. Vein Patterns as a Biometric Feature A vein pattern refers to the vast network of blood vessels underneath the skin of a certain part of a persons body Properties of vein patterns Uniqueness : a persons vascular patterns are distinct. Stability : relatively unaffected by aging, except for predictable growth as with fingerprints. The shape of the pattern keeps unchanged. Tolerance to forgery : the blood vessels are hidden and much harder for intruders to copy. A potentially good biometric feature…

Proposed Hand Vein Pattern Verification System We proposed a new system that recognizes the human hand vein pattern images acquired by a far-infrared (thermal) camera, which consists of five individual stages The key difference against the others The system directly recognizes geometric shape of a vein pattern by measuring its Line-segment Hausdorff Distance against a template Image Acquisition Vein Pattern Segmentation Skeletonization Shape Match Decision RawImagesFinerImages Database VeinPattern Template Image Enhancement & ROI Selection Data Collection Vein Pattern Extraction

Data Acquisition Stage I Data of interest is limited to the vein pattern in the back of the hand Less invasive Concerns for potential integration with other hand biometrics Vein pattern images are captured using Far-Infrared (Thermal) imaging technology Superficial veins have higher temperature than the surrounding tissues The thermal detector inside the Infrared camera forms images with the infrared radiation (typically within the Far Infrared region of 8~14 m) emitted by the human body

Sample Images Collected Stage I Images captured in an air- conditioned office environment (20-25 °C and <50% humidity ) Images captured in a tropical outdoor environment (30-34°C and >80% humidity)

Analysis on the Data Quality Stage I Factors affecting image quality Nearness of the vein to the surface Body temperature Unevenly distribution of heat Heat radiation Ambient temperature and humidity Focusing Camera calibration Impossible to capture the complete vascular network however, the information contained possessed by the superficial vein pattern is sufficient to perform personal verification tasks for a reasonable sized user group

Region of Interest (ROI) Location Stage II Technique proposed by Lin & Fan[1] Extract the contour of the hand Calculate the distance profile between the contour points and the midpoint of the wrist Locate the landmark points (tips and valleys) of the hand Define a fixed sized rectangular region as the ROI [1] Chih-Lung Lin and K.-C. Fan, Biometric Verification Using Thermal Images Of Palm-dorsa Vein Patterns. IEEE Trans. Circuits and Systems for Video Technology, (2): p

Image Enhancement Stage II Removing the speckling noise using a order statistic median filter with a 5x5 neighborhood region. Reduce the effect of undesired high frequency noise with a 2-D Low Pass Gaussian Filter with 0.8 standard deviation. Finally, all the images are normalized so as to suppress the possible imperfections in the image due to the sensor noise and other effects, where the desired mean and variance of the images are both set to be 100.

Vein Pattern Segmentation Stage III The purpose is to separate the vein pattern from the image background, and it is done by locally adaptive thresholding The threshold is calculated at each pixel, which depends on some local statistics of the pixel neighborhood. The threshold over here is set as the mean value of a local 13x13 neighborhood. Morphological erosion and dilation is needed to clean up the images after thresholding.

Skeletonization Stage IV The size of the vein varies as human grows, and hence, the shape of the pattern is the sole feature for later recognition A good representation of the patterns shape is via extracting its skeleton. the vein pattern images go through the thinning algorithm to obtained its skeleton Pruning is taken to remove the spurs branches and clean up isolated pixels

Vein Pattern Matching Stage V The purpose is to match the geometric shape of the incoming vein pattern against the template Hausdorff Distance can be calculated for the spatial similarity of the vein patterns lacks local structure representation such as orientation when it comes to comparing the shapes of curves Line-Segment Hausdorff Distance (LHD) is calculated instead. Line Segment Hausdorff Distance (LHD) is firstly used in a face matching application by Gao and Leung [2] Incorporates the structural information of line segment orientation More effective for comparisons of shapes consisting of a number of curve segments [2] Y.Gao and M.K.H. Leung, Line Segment Hausdorff Distance on Face Matching. Pattern Recognition. 35 (2002)

LHD For Vein Pattern Shape Matching Stage V A number of sampling points are taken on the skeleton of the vein pattern Using the sampling points as end points, the shape of the vein pattern is then represented by a set of line segments d Comparisons between the testing pattern and the template is carried out based on the calculation of vector d. h H The directed and undirected LHD is then defined as h and H respectively on the rightside.

Testing Results Database containing 108 images from 12 people (9 for each person) 3 images for each person were selected randomly to form the templates for that person (overall template set size 36) The rest is used as the testing set (size 72) At verification stage, three undirected LHDs (H 1, H 2, H 3 ) are computed between the testing vein pattern and the three templates. The Average value H of H 1, H 2 and H 3 is the similarity measure.

Testing Results Choosing 9.0 as the threshold, all the images in the testing set are correctly recognized The results of the experiment are encouraging However, the images are taken in a more controlled manner For a real life application, the surrounding conditions are unknown The image quality of the vein pattern may reduce, and as a result, a decrease of verification accuracy can be expected

Summaries and Conclusions A personal verification system using the Far-Infrared vein pattern in the back of the hand as the biometric feature is proposed Unlike other approaches, the system directly recognizes the geometric shapes of the vein patterns The testing results of the system are encouraging A potentially good biometrics to be integrated with other hand based system to become a multi-modal biometric system.

Alternative Imaging Technology Stage I Near-Infrared Imaging Near Infrared region refers to the spectrum from 0.7um to 1.4 um The haemoglobin in veinous blood absorbs more of the incident IR radiation than the surrounding tissue Thus appearing darker when viewed on a conventional video monitor Under Investigation…