Instructor: Dr. G. Bebis Reza Amayeh Fall 2005

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

EigenFaces and EigenPatches Useful model of variation in a region –Region must be fixed shape (eg rectangle) Developed for face recognition Generalised.
QR Code Recognition Based On Image Processing
Road-Sign Detection and Recognition Based on Support Vector Machines Saturnino, Sergio et al. Yunjia Man ECG 782 Dr. Brendan.
November 12, 2013Computer Vision Lecture 12: Texture 1Signature Another popular method of representing shape is called the signature. In order to compute.
Robust statistical method for background extraction in image segmentation Doug Keen March 29, 2001.
Discrete Finger and Palmar Feature Extraction for Personal Authentication Junta Doi, Member, IEEE,and Masaaki Yamanaka Advisor:Wen-Shiung Chen Student:
PCA + SVD.
Lecture 07 Segmentation Lecture 07 Segmentation Mata kuliah: T Computer Vision Tahun: 2010.
Automatic Feature Extraction for Multi-view 3D Face Recognition
Contactless and Pose Invariant Biometric Identification Using Hand Surface Vivek Kanhangad, Ajay Kumar, Senior Member, IEEE, and David Zhang, Fellow, IEEE.
IIIT Hyderabad Pose Invariant Palmprint Recognition Chhaya Methani and Anoop Namboodiri Centre for Visual Information Technology IIIT, Hyderabad, INDIA.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
Instructor: Mircea Nicolescu Lecture 13 CS 485 / 685 Computer Vision.
Symmetric hash functions for fingerprint minutiae
Biometrics and Security Tutorial 8. 1 (a) Understand the enrollment and verification of hand geometry? (P9: 8)
Multiple Human Objects Tracking in Crowded Scenes Yao-Te Tsai, Huang-Chia Shih, and Chung-Lin Huang Dept. of EE, NTHU International Conference on Pattern.
3D Hand Pose Estimation by Finding Appearance-Based Matches in a Large Database of Training Views
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
PalmPrint Identification System
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Biometrics and Authentication Shivani Kirubanandan.
Face Processing System Presented by: Harvest Jang Group meeting Fall 2002.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Introduction to Biometric Systems
PCA & LDA for Face Recognition
February 11, Hand Geometry BIOM 426 Instructor: Natalia A. Schmid.
Prakash Chockalingam Clemson University Non-Rigid Multi-Modal Object Tracking Using Gaussian Mixture Models Committee Members Dr Stan Birchfield (chair)
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
OBJECT RECOGNITION. The next step in Robot Vision is the Object Recognition. This problem is accomplished using the extracted feature information. The.
BACKGROUND LEARNING AND LETTER DETECTION USING TEXTURE WITH PRINCIPAL COMPONENT ANALYSIS (PCA) CIS 601 PROJECT SUMIT BASU FALL 2004.
Loop Investigation for Cursive Handwriting Processing and Recognition By Tal Steinherz Advanced Seminar (Spring 05)
Ajay Kumar, Member, IEEE, and David Zhang, Senior Member, IEEE.
Gait Recognition Guy Bar-hen Tal Reis. Introduction Gait – is defined as a “manner of walking”. Gait recognition – –is the term typically used to refer.
Chapter 14 Speaker Recognition 14.1 Introduction to speaker recognition 14.2 The basic problems for speaker recognition 14.3 Approaches and systems 14.4.
ENT 273 Object Recognition and Feature Detection Hema C.R.
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Intelligent Vision Systems ENT 496 Object Shape Identification and Representation Hema C.R. Lecture 7.
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Image Modeling & Segmentation Aly Farag and Asem Ali Lecture #2.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
A Face processing system Based on Committee Machine: The Approach and Experimental Results Presented by: Harvest Jang 29 Jan 2003.
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: ML and Simple Regression Bias of the ML Estimate Variance of the ML Estimate.
Machines that Make Decisions Instructor: Edmondo Trentin
2005/12/021 Content-Based Image Retrieval Using Grey Relational Analysis Dept. of Computer Engineering Tatung University Presenter: Tienwei Tsai ( 蔡殿偉.
ECE-7000: Nonlinear Dynamical Systems Overfitting and model costs Overfitting  The more free parameters a model has, the better it can be adapted.
PalmPrint Identification System
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
Autonomous Robots Vision © Manfred Huber 2014.
Biometric for Network Security. Finger Biometrics.
1 Machine Vision. 2 VISION the most powerful sense.
MIT AI Lab / LIDS Laboatory for Information and Decision Systems & Artificial Intelligence Laboratory Massachusetts Institute of Technology A Unified Multiresolution.
By Pushpita Biswas Under the guidance of Prof. S.Mukhopadhyay and Prof. P.K.Biswas.
1 Overview representing region in 2 ways in terms of its external characteristics (its boundary)  focus on shape characteristics in terms of its internal.
Chapter 6 Skeleton & Morphological Operation. Image Processing for Pattern Recognition Feature Extraction Acquisition Preprocessing Classification Post.
FieldTraining Seminar on Field Training Seminar on “Hand-Geometry Based Person Authentication System ” By By Ullesh Chavadi M Ullesh Chavadi M.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
CS262: Computer Vision Lect 09: SIFT Descriptors
Hand Geometry Recognition
Fitting Curve Models to Edges
Presented by :- Vishal Vijayshankar Mishra
PRAKASH CHOCKALINGAM, NALIN PRADEEP, AND STAN BIRCHFIELD
Presentation transcript:

Instructor: Dr. G. Bebis Reza Amayeh Fall 2005 Anil K. Jain, Arun Ross and Sharath Pankanti, “A Prototype Hand Geometry-based Verification System” Slobodan Ribaric and Ivan Fratric, “A Biometric Identification System Based on Eigen-palm and Eigen-finger Features” Instructor: Dr. G. Bebis Reza Amayeh Fall 2005

Why Hand Geometry Each biometrics has its strengths and limitation What is the most effective biometric measurement? Each biometrics has its strengths and limitation It’s depend on application User acceptability is the most significant factor For many access control applications, like dormitory meal plan access, very distinctive biometrics, e.g., fingerprint and iris, may not be acceptable Hand geometry-based verification systems are not new and have been available since the early 1970s

A Prototype Hand Geometry-based Verification System A technique to measure of hand geometry is introduced by using probability function Outines: Image Acquisition Feature Extraction Verification Phase

Image Acquisition The image acquisition system comprises of a light source, a camera, a single mirror and a surface (with five pegs on it) Pegs serve as control points for appropriate placement of the right hand of the user A 640 by 480 8-bit grayscale image of the hand is captured

Feature Extraction Typically features include length and width of the fingers, aspect ratio of the palm or fingers, thickness of the hand, etc. 16 axes along which the various features mentioned above have been measured The hand is represented as a vector of the measurements selected above

Feature Extraction is the gray values of the pixels along a axis A sequence of pixels along a measurement axis will not have an ideal gray scale profile Background lighting, color of the skin, noise and etc.

Feature Extraction Modeling profile: Assumption: The observed profile is obtained from the ideal profile by the addition of Gaussian noise to each of the pixels The gray level of an arbitrary pixel along a particular axis is independent of the gray level of other pixels in the line Operating under these assumptions, we can write the joint distribution of all the pixel values along a particular axis as

Feature Extraction The goal now is to estimate using the observed pixel values along the chosen axis Use the Maximum Likelihood Estimate (MLE) method to estimate parameters q likelihood function:

Feature Extraction The parameters can now be estimated iteratively The initial estimates of parameters are obtained as follows: are estimated using the gray values of the first pixels along the axis are estimated using the gray values of the pixels from are estimated using the gray values of the pixels between The values of are fixed for the system

Feature Extraction Result:

Verification Phase Let represent the d-dimensional feature vector in the database associated with the claimed identity and be the feature vector of the hand whose identity has to be verified.

Exp. Result The hand geometry authentication system was trained and tested using a database of 50 users Ten images of each user's hand were captured over two sessions In each session the background lighting of the acquisition device was changed Thus a total of 500 images were made available

Questions?

A Biometric Identification System Based on Eigen-palm and Eigen-finger Features The identification process can be divided into the following phases: Capturing the image Preprocessing, extracting and normalizing the palm and strip-like finger subimages Extracting the eigenpalm and eigenfinger features based on the PCA Matching and fusion A decision based on the (k, l)-NN classifier and thresholding

System Description

Preprocessing and Sub-images Extraction (a) Example of a scanned hand image. (b) Binerized hand image.

Preprocessing and Sub-images Extraction (a) The hand contour and the relevant points for finding the regions of interest. (b) Processed finger on the hand contour.

Geometry and Lighting Normalization (a) Original hand image with the regions of interest marked on it. (b) Palm subimage. (c) Little-finger subimage. (d) Ring-finger subimage. (e) Middle-finger subimage. (f) Index-finger subimage. (g) Thumb subimage.

Geometry and Lighting Normalization After the subimages have been extracted, a lighting normalization using histogram fitting is applied. In this process, a target histogram G(l) is selected for each of the six subimage Subimages (a) before and (b) after the histogram fitting.

Lighting Normalization Palm subimages with the corresponding histograms (a) before and (b) after the histogram fitting.

Extraction of the Eigenpalm and Eigenfinger Features Average palm and finger images from database. Eigenpalms and eigenfingers obtained from the database (indicated by the corresponding ordinal numbers): (a) the eigenpalms and (b) the little-finger eigenfingers.

MATCHING AND FUSION AT THE MATCHING-SCORE LEVEL The matching between corresponding feature vectors is based on the Euclidean distance The distances are normalized and transformed into similarity measures The frequency distribution of the distances of templates of the same person is calculated.

MATCHING AND FUSION AT THE MATCHING-SCORE LEVEL The normalized outputs of the six matching modules are combined using fusion at the matching-score level.

Experimental Results (Recognition) 110 People and 5 templates per person. Minimum Euclidean distance.

Experimental Results (Recognition) Recognition results as a function of the subspace dimensionality for (a) palm subspace and (b) finger subspaces.

Experimental Results (Identification I ) 57 people (10 TPP) as clients and 70 people (10 TPP) as imposter The first 7 templates as a train set for each client

Experimental Results (Identification II ) 127 people and 10 templates per person