Biometrics and Security Tutorial 8. 1 (a) Understand the enrollment and verification of hand geometry? (P9: 8)

Slides:



Advertisements
Similar presentations
Biometrics and Security Tutorial 3. 1 (a) What is the scatter matrix (P4: 21)? Understand what about eigenvector and eigenvalue as well as their functions?
Advertisements

Biometrics & Security Tutorial 9. 1 (a) What is palmprint and palmprint authentication? (P10: 9-10)
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Discrete Finger and Palmar Feature Extraction for Personal Authentication Junta Doi, Member, IEEE,and Masaaki Yamanaka Advisor:Wen-Shiung Chen Student:
Fırat Onur Alsaran, Neşe Alyüz, Melike Esma İlter, Mürsel Taşgın, Ahmet Burak Yoldemir CmpE 58Z Term Project.
Contactless and Pose Invariant Biometric Identification Using Hand Surface Vivek Kanhangad, Ajay Kumar, Senior Member, IEEE, and David Zhang, Fellow, IEEE.
Computer Vision Detecting the existence, pose and position of known objects within an image Michael Horne, Philip Sterne (Supervisor)
As applied to face recognition.  Detection vs. Recognition.
Watching Unlabeled Video Helps Learn New Human Actions from Very Few Labeled Snapshots Chao-Yeh Chen and Kristen Grauman University of Texas at Austin.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Biometrics & Security Tutorial 5. 1 (a) Understand two stages (Enrollment and Authentication) in a fingerprint system. (P6: 12)
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
Biometrics & Security Tutorial (a) Understand the difference between voice biometrics and speech recognition? (P12: 10). What is text-dependent.
Biometrics & Security Tutorial (a) Why multi-biometrics? (P13: 3-6)
Symmetric hash functions for fingerprint minutiae
Biometrics & Security Tutorial (a) What is “Pattern”? According to its definition in (P3:4-7), could you list some patterns in your daily life?
Hand Geometry-based Biometric Systems
3D Hand Pose Estimation by Finding Appearance-Based Matches in a Large Database of Training Views
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Gait Recognition Simon Smith Jamie Hutton Thomas Moore David Newman.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Pattern Recognition. Introduction. Definitions.. Recognition process. Recognition process relates input signal to the stored concepts about the object.
Biometrics & Security Tutorial 6. 1 (a) Understand why use face (P7: 3-4) and face recognition system (P7: 5-10)
Multiple Object Class Detection with a Generative Model K. Mikolajczyk, B. Leibe and B. Schiele Carolina Galleguillos.
Support Vector Machines Exercise solutions Ata Kaban The University of Birmingham.
Oral Defense by Sunny Tang 15 Aug 2003
1 Interest Operators Find “interesting” pieces of the image Multiple possible uses –image matching stereo pairs tracking in videos creating panoramas –object.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Introduction to Biometric Systems
PCA & LDA for Face Recognition
Summarized by Soo-Jin Kim
Training Database Step 1 : In general approach of PCA, each image is divided into nxn blocks or pixels. Then all pixel values are taken into a single one.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Chapter 14 Speaker Recognition 14.1 Introduction to speaker recognition 14.2 The basic problems for speaker recognition 14.3 Approaches and systems 14.4.
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
A survey of different shape analysis techniques 1 A Survey of Different Shape Analysis Techniques -- Huang Nan.
Soft Biometrics 苏毅婧. Outline Introduction Application Case study.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Final Year Project Vision based biometric authentication system By Padraic ó hIarnain.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
A New Approach to Utterance Verification Based on Neighborhood Information in Model Space Author :Hui Jiang, Chin-Hui Lee Reporter : 陳燦輝.
Support Vector Machines Exercise solutions Ata Kaban The University of Birmingham.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
FieldTraining Seminar on Field Training Seminar on “Hand-Geometry Based Person Authentication System ” By By Ullesh Chavadi M Ullesh Chavadi M.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
A Tutorial on Speaker Verification First A. Author, Second B. Author, and Third C. Author.
Hand Geometry Recognition
M.A. Maraci, C.P. Bridge, R. Napolitano, A. Papageorghiou, J.A. Noble 
A Seminar Report On Face Recognition Technology
Hand Geometry By: Kieran Hepworth.
FACE RECOGNITION TECHNOLOGY
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Sharat.S.Chikkerur S.Anand Mantravadi Rajeev.K.Srinivasan
Application: Geometric Hashing
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRIC TECHNOLOGY LOGO BUS 237- D100 Group 1- Tut02 Mandy- Wondy
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometrics and Security Tutorial 8

1 (a) Understand the enrollment and verification of hand geometry? (P9: 8)

1 (b) Please check the definition of deviation in P9:16

1 (c) List the differences between the Raul Sanchez-Reillo’s approach and A.K. Jain’s approach. (P9:10-21)

Image capture of Raul

Image capture of Jain

Features defined by Raul

Features defined by Jain

Feature selection of Raul

Feature selection of Jain

1 (d) What are the advantages and disadvantages of hand geometry? (P9: 28)

1 (e) Understand Gaussian Mixture Modelling (GMM), Pre-processing and feature extraction (P9:22-23)

2. There are 31 features of hand geometry in Raul Sanchez-Reillo’s approach. Please try to list them. (P9:12-18)

3. As a general 3D hand geometry approach introduced in P9:5-9, there are 14 features defined. The matching score: Euclidean distance can be defined by Please try to make a figure like P8:37 (Euclidean Dis. – Percent).

4. In A.K. Jain’s approach, there are sixteen axes along which feature values are computed. Please try to define the corresponding hand features. (P9:21)

Let F = (f1; f2; … ; fd) represent the d - dimensional feature vector ( )

5. There are five steps defined by a finger recognition system (P9: 32-36). What kinds of features are used in this system? (joint line) Do you have any idea to compare two templates exactly? (shift to the best match) Based on the given input image in Q3 (Tutorial 4), we project it to the i-axis. What is its one-dimensional data? (17, 24, 43, 28, 45)