Biometrics & Security Tutorial 9. 1 (a) What is palmprint and palmprint authentication? (P10: 9-10)

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

Face Recognition Sumitha Balasuriya.
3D Model Matching with Viewpoint-Invariant Patches(VIP) Reporter :鄒嘉恆 Date : 10/06/2009.
Biometrics and Security Tutorial 3. 1 (a) What is the scatter matrix (P4: 21)? Understand what about eigenvector and eigenvalue as well as their functions?
Presented by Xinyu Chang
RGB-D object recognition and localization with clutter and occlusions Federico Tombari, Samuele Salti, Luigi Di Stefano Computer Vision Lab – University.
Computer Vision Lecture 18: Object Recognition II
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Discrete Finger and Palmar Feature Extraction for Personal Authentication Junta Doi, Member, IEEE,and Masaaki Yamanaka Advisor:Wen-Shiung Chen Student:
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Contactless and Pose Invariant Biometric Identification Using Hand Surface Vivek Kanhangad, Ajay Kumar, Senior Member, IEEE, and David Zhang, Fellow, IEEE.
IIIT Hyderabad Pose Invariant Palmprint Recognition Chhaya Methani and Anoop Namboodiri Centre for Visual Information Technology IIIT, Hyderabad, INDIA.
Kiyoshi Irie, Tomoaki Yoshida, and Masahiro Tomono 2011 IEEE International Conference on Robotics and Automation Shanghai International Conference Center.
Computational Geometry & Collision detection
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Biometrics & Security Tutorial 5. 1 (a) Understand two stages (Enrollment and Authentication) in a fingerprint system. (P6: 12)
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
Virtual Dart: An Augmented Reality Game on Mobile Device Supervisor: Professor Michael R. Lyu Prepared by: Lai Chung Sum Siu Ho Tung.
Robust and large-scale alignment Image from
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
(1) Feature-point matching by D.J.Duff for CompVis Online: Feature Point Matching Detection,
Biometrics & Security Tutorial (a) Why multi-biometrics? (P13: 3-6)
Symmetric hash functions for fingerprint minutiae
Biometrics and Security Tutorial 8. 1 (a) Understand the enrollment and verification of hand geometry? (P9: 8)
Biometrics & Security Tutorial (a) What is “Pattern”? According to its definition in (P3:4-7), could you list some patterns in your daily life?
3D Hand Pose Estimation by Finding Appearance-Based Matches in a Large Database of Training Views
E.G.M. PetrakisTexture1 Repeative patterns of local variations of intensity on a surface –texture pattern: texel Texels: similar shape, intensity distribution.
Iris localization algorithm based on geometrical features of cow eyes Menglu Zhang Institute of Systems Engineering
MULTIPLE MOVING OBJECTS TRACKING FOR VIDEO SURVEILLANCE SYSTEMS.
Reconstructing Orientation Field From Fingerprint Minutiae to Improve Minutiae-Matching Accuracy 吳思穎.
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
Biometrics & Security Tutorial 6. 1 (a) Understand why use face (P7: 3-4) and face recognition system (P7: 5-10)
Multiple Object Class Detection with a Generative Model K. Mikolajczyk, B. Leibe and B. Schiele Carolina Galleguillos.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
Uba Anydiewu, Shane Bilinski, Luis Garcia, Lauren Ragland, Debracca Thornton, Joe Tubesing, Kevin Chan, Steve Elliott, and Ben Petry EXAMINING INTRA-VISIT.
Facial Feature Detection
Introduction to Biometric Systems
Multiclass object recognition
1 Template-Based Classification Method for Chinese Character Recognition Presenter: Tienwei Tsai Department of Informaiton Management, Chihlee Institute.
Following the work of John Daugman University of Cambridge
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Presented by Tienwei Tsai July, 2005
Ajay Kumar, Member, IEEE, and David Zhang, Senior Member, IEEE.
Video Based Palmprint Recognition Chhaya Methani and Anoop M. Namboodiri Center for Visual Information Technology International Institute of Information.
EDGE DETECTION IN COMPUTER VISION SYSTEMS PRESENTATION BY : ATUL CHOPRA JUNE EE-6358 COMPUTER VISION UNIVERSITY OF TEXAS AT ARLINGTON.
A Comparison in Handmetric between Quaternion Euclidean Product Distance and Cauchy Schwartz Inequality Distance Di Liu Dong-mei Sun Zheng-ding Qiu Institute.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
Event retrieval in large video collections with circulant temporal encoding CVPR 2013 Oral.
2005/12/021 Fast Image Retrieval Using Low Frequency DCT Coefficients Dept. of Computer Engineering Tatung University Presenter: Yo-Ping Huang ( 黃有評 )
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
IRIS RECOGNITION SYSTEM
Final Year Project Vision based biometric authentication system By Padraic ó hIarnain.
A New Method for Crater Detection Heather Dunlop November 2, 2006.
Iris Recognition.
Course 5 Edge Detection. Image Features: local, meaningful, detectable parts of an image. edge corner texture … Edges: Edges points, or simply edges,
Lecture 3 Template Matching Edge Detection. 2 Processes for Assignment 1  Understand Image Format  Pre Processing - Gaussian, Mean Filter to clean up.
An attempt at license plate recognition Using edge tracing and tangent curves.
Error Detecting and Error Correcting Codes
Robodog Frontal Facial Recognition AUTHORS GROUP 5: Jing Hu EE ’05 Jessica Pannequin EE ‘05 Chanatip Kitwiwattanachai EE’ 05 DEMO TIMES: Thursday, April.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
April 21, 2016Introduction to Artificial Intelligence Lecture 22: Computer Vision II 1 Canny Edge Detector The Canny edge detector is a good approximation.
IRIS RECOGNITION 1 CITY ENGINEERING COLLEGE Technical Seminar On “IRIS RECOGNITION” By NANDAN.T.MURTHY 1CE06EC043.
FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM.
FACE RECOGNITION TECHNOLOGY
Following the work of John Daugman University of Cambridge
Detection of salient points
第 九 章 影像邊緣偵測 9-.
Fourier Transform of Boundaries
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometrics & Security Tutorial 9

1 (a) What is palmprint and palmprint authentication? (P10: 9-10)

1 (b) What kinds of features can be extracted from a palm? (P10:11)

1 (c) How to get Datum Point in P10: 14?

1 (d) Given two lines in a palmprint image, please explain how to get their Euclidean distance (P10: 21). If we mark each line as orientation features, how to understand their matching score: S(C1, C2) in P10:33?

C1=[ ] C2=[ ] C3=[ ] N=4 H(C1,C2)=4 S(C1,C2)=0 H(C1,C3)=0 S(C1,C3)=1

1 (e) What are the advantages and disadvantages of palmprint recognition? (P10: 58)

2. In line feature based offline palmprint recognition, four different directional templates are defined. Please try to explain why they can detect the corresponding directional line segments (See P10:19). Can you design another set of four different directional templates to determine line segments?

A line segment Its cross-section Our line detector Its cross-section 121 The inner product of two vectors increases with their similarity !

Line detector  Zero sum  Similar cross-section to a line segment  Larger than a line segment  The better similarity, the better detection How many directions we need?  The more directions, the more accuracy, the less efficiency  A tradeoff is made according to experience

3. In P10:28-29, a segmentation approach, Tangent Points of the Finger Hole, is introduced. The line passing though the two points, (x1, y1) and (x2, y2), satisfies the inequality, for all i and j. Please understand this method and check the determinant rule.

4. Assume that there is a Palmprint Code with 256 bytes by using texture feature. Please compute the number of features represented by the Palmprint Code (See P10:36). (256 * 8 / 2 == 1,024)

Tut 7, 2. There are four steps in the Daugman’s approach (P8: 32-36). The third step generates IrisCode with 512 bytes. If 2 bits represent a feature, please compute the total number of features. (512*(8/2)=2,048)

5. In texture features matching stage, hamming distance is used to measure the similarity of two palmprints, as shown in P10:37. What conclusion can you get from the normalized distance D 0 ? Hint: Consider the normalized distance with the experimental results in P10:38. (The smaller in the normalized distance, the closer in two palmprints)

C1=[ ] C2=[ ] C3=[ ] N=4 H(C1,C2)=4 S(C1,C2)=0 H(C1,C3)=0 S(C1,C3)=1

N=3 D 0 = 0.11