Reconstructing Orientation Field From Fingerprint Minutiae to Improve Minutiae-Matching Accuracy 9977003 吳思穎.

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

Junzhou Huang, Shaoting Zhang, Dimitris Metaxas CBIM, Dept. Computer Science, Rutgers University Efficient MR Image Reconstruction for Compressed MR Imaging.
3D Model Matching with Viewpoint-Invariant Patches(VIP) Reporter :鄒嘉恆 Date : 10/06/2009.
Biometrics & Security Tutorial 9. 1 (a) What is palmprint and palmprint authentication? (P10: 9-10)
Automatic Fingerprint Acquisition System An example employing Hardware-Software Co- Design - Komal kasat Nalini Kumar Gaurav Chitroda.
Securing Fingerprint Template - Fuzzy Vault with Helper Data
Department of Electrical and Electronic Engineering, The University of Hong Kong, Pokfulam Road, Hong Kong Three-dimensional curve reconstruction from.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Proposed concepts illustrated well on sets of face images extracted from video: Face texture and surface are smooth, constraining them to a manifold Recognition.
Automatically Annotating and Integrating Spatial Datasets Chieng-Chien Chen, Snehal Thakkar, Crail Knoblock, Cyrus Shahabi Department of Computer Science.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Detecting Abandoned Objects With a Moving Camera 指導教授:張元翔 老師 學生:資訊碩一 吳思穎.
A Review of “Adaptive fingerprint image enhancement with fingerprint image quality analysis”, by Yun & Cho Malcolm McMillan.
A Parallel Matching Algorithm Based on Image Gray Scale Liang Zong, Yanhui Wu cso, vol. 1, pp , 2009 International Joint Conference on Computational.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Sreya Chakraborty Under the guidance of Dr. K. R. Rao Multimedia Processing Lab (MPL) University of Texas at Arlington.
We propose a successive convex matching method to detect actions in videos. The proposed scheme does not need foreground/background separation, works in.
Virtual Dart: An Augmented Reality Game on Mobile Device Supervisor: Professor Michael R. Lyu Prepared by: Lai Chung Sum Siu Ho Tung.
Introduction to Fingerprint Biometrics By Tamar Bar.
A new face detection method based on shape information Pattern Recognition Letters, 21 (2000) Speaker: M.Q. Jing.
Automatic Fingerprint Matching System Hsing-Hua Yu and Chaur-Chin Chen Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan.
3D Hand Pose Estimation by Finding Appearance-Based Matches in a Large Database of Training Views
Pores and Ridges: High- Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain Yi Chen Meltem Demirkus.
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
Sharif University of Technology A modified algorithm to obtain Translation, Rotation & Scale invariant Zernike Moment shape Descriptors G.R. Amayeh Dr.
Iris localization algorithm based on geometrical features of cow eyes Menglu Zhang Institute of Systems Engineering
Automatic Camera Calibration for Image Sequences of a Football Match Flávio Szenberg (PUC-Rio) Paulo Cezar P. Carvalho (IMPA) Marcelo Gattass (PUC-Rio)
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Introduction to Biometric Systems
Francois de Sorbier Hiroyuki Shiino Hideo Saito. I. Introduction II. Overview of our system III. Violin extraction and 3D registration IV. Virtual advising.
A Rapid Stereo Matching Algorithm Based on Disparity Interpolation Gang Yao Yong Liu Bangjun Lei Dong Ren Institute of Intelligent Vision and Image Information.
MESA LAB Multi-view image stitching Guimei Zhang MESA LAB MESA (Mechatronics, Embedded Systems and Automation) LAB School of Engineering, University of.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Fingerprint Analysis (part 2) Pavel Mrázek. Local ridge frequency.
Optimal Histogram-pair and Prediction-error Based Image Reversible Data Hiding 1 Computer Science, Tongji University, Shanghai, China 2 ECE, New Jersey.
GECCO Papers Same research group, different lead authors Same conference Paper 1: Embodied Distributed Evolutionary Algorithm (EDEA) for on-line, on-board.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Locality-constrained Linear Coding for Image Classification
Annotation techniques for Query-By-Concept Approach in Image Retrieval System Rakesh Kamatham Venkata.
Local Correlation-based Fingerprint Matching
An Effective Three-step Search Algorithm for Motion Estimation
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Quiz Week 8 Topical. Topical Quiz (Section 2) What is the difference between Computer Vision and Computer Graphics What is the difference between Computer.
Irfan Ullah Department of Information and Communication Engineering Myongji university, Yongin, South Korea Copyright © solarlits.com.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
THIRD CLASSIFICATION OF MICROCALCIFICATION STAGES IN MAMMOGRAPHIC IMAGES THIRD REVIEW Supervisor: Mrs.P.Valarmathi HOD/CSE Project Members: M.HamsaPriya( )
Zhaoxia Fu, Yan Han Measurement Volume 45, Issue 4, May 2012, Pages 650–655 Reporter: Jing-Siang, Chen.
Date of download: 6/26/2016 Copyright © ASME. All rights reserved. From: A Level Set Method for the Construction of Boundary Conforming Voronoi Regions.
Correspondence search using Delaunay triangulation Rishu Gupta
CONTENTS:  Introduction.  Face recognition task.  Image preprocessing.  Template Extraction and Normalization.  Template Correlation with image database.
Implementation of An Automatic Fingerprint Identification System
Source: Pattern Recognition, 37(5), P , 2004
FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM.
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Improving the Performance of Fingerprint Classification
Wavelets : Introduction and Examples
EDD 581 Innovative Education- -snaptutorial.com
IM 300 Competitive Success/snaptutorial.com
IM 300 Enthusiastic Studysnaptutorial.com
IM 300 Education for Service-- snaptutorial.com
IM 300 Teaching Effectively-- snaptutorial.com
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Stages of Coping with Data
Hybrid Finger print recognition
Solving Equations 3x+7 –7 13 –7 =.
Data hiding method using image interpolation
Presentation transcript:

Reconstructing Orientation Field From Fingerprint Minutiae to Improve Minutiae-Matching Accuracy 吳思穎

Introduction Tradition : store the minutiae template in the database. -> include two step : 1. minutiae extraction 2. minutiae matching This paper : reconstructing fingerprint’s orientation field from minutiae and further utilizing it in the matching stage to enhance the system’s performance. fusing the results of orientation field matching with conventional minutiae-based matching.

Fig. 1. Flowchart of the proposed algorithm.

Section II : the algorithm of reconstructing orientation field Section III : the algorithm of fingerprint recognition by minutiae and orientation field. Section IV : experimental results Section V : conclusion and discussion

The algorithm of reconstructing orientation field Interpolation Reconstruction Using an Orientation Model

Interpolation Triangulation Use Delaunay triangulation

Interpolation Producing “virtual” minutiae using interpolation (1) (2)

Interpolation Producing “virtual” minutiae using interpolation (3) (4)

Reconstruction Using an Orientation Model Polynomial model Reconstruction the orientation field using polynomial model

Fig. 5. Results of the proposed algorithm: (a) virtual minutiae by interpolation (the bigger red minutiae are “real,, while the smaller purple ones are “virtual,); (b) the reconstructed orientation field.

Fig. 6. Comparison result I: (a ) minutiae image with a wrong direction (marked with ellipse ) ; (b ) the corresponding poor result by interpolation (marked with ellipse ) ; (c ) the corresponding good result by the proposed IM method.

Fig. 7. Comparison result II: (a ) minutiae image with a sparse region (marked with ellipse ) ; (b ) the corresponding poor result by model-based algorithm (marked with ellipse ) ; (c ) the corresponding good result by the proposed IM method.

The algorithm of fingerprint recognition by minutiae and orientation field.

experimental results conclusion and discussion