Fingerprint Synthesis An Hong Tran. Outline Introduction Haar Wavelet Transform Fingerprint Synthesis Application Results Conclusion.

Slides:



Advertisements
Similar presentations
SPM – introduction & orientation introduction to the SPM software and resources introduction to the SPM software and resources.
Advertisements

Iris Recognition Under Various Degradation Models Hans Christian Sagbakken.
SPSC – Advandced Signal Processing (SE) Professor Horst Cerjak, Amir Rahimzadeh Fingerprint Features.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Automatic 3D Face Recognition System 邱彥霖 龔士傑 Biometric Authentication.
January 21, Fingerprint Identification BIOM 426 Instructor: Natalia A. Schmid.
1 Fingerprint verification Speaker: Shu-Fen Chiou ( 邱淑芬 ) Date:2005/06/03.
2005/6/16 by pj 1 Hiding Biometric Data Hiding Biometric Data IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 11, NOVEMBER.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
FINGERPRINT ENHANCEMENT BY DIRECTIONAL FILTERING - Sreya Chakraborty MS-EE Student, UTA Sreya Chakraborty 7 th Nov 2011.
Suggested Term Projects CSE 666, Fall Guidelines The described projects are suggestions; if you have desire, skills or idea to explore alternative.
Luvuyo Morris Supervisor: Mr. R. Dodds Co-Supervisor: Mr. M. Ghazi-Asgar Mentor: Mr. Mentor: Mr. Roland Foster.
Sreya Chakraborty Under the guidance of Dr. K. R. Rao Multimedia Processing Lab (MPL) University of Texas at Arlington.
Computer and Robot Vision I
Biometrics: Faces and Identity Verification in a Networked World
Geometric Algorithms in Biometrics: Theory and Recent Developments Prof. Marina L. Gavrilova BT Laboratory Dept of Computer Science, University of Calgary,
Information Fusion in Multibiometric Systems
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Exchanging Faces in Images SIGGRAPH ’04 Blanz V., Scherbaum K., Vetter T., Seidel HP. Speaker: Alvin Date: 21 July 2004.
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
Graphics-1 Gentle Introduction to Computer Graphics Based on: –David Brogan’s “Introduction to Computer Graphics” Course Slides, University of Virginia.
CPSC 601 Geometric Algorithms in Biometrics Dr. Marina L. Gavrilova.
Symmetric hash functions for fingerprint minutiae
Pattern Recognition Topic 1: Principle Component Analysis Shapiro chap
Enhancing Biometric Security Using Watermarking By Shivankush Aras.
Pores and Ridges: High- Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain Yi Chen Meltem Demirkus.
Scale Invariant Feature Transform (SIFT)
Face Recognition: A Comparison of Appearance-Based Approaches
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Computer Science Department Graduate Orientation 1 August 31, 2006 Center for Visual Computing.
Wavelet-based Image Fusion by Sitaram Bhagavathy Department of Electrical and Computer Engineering University of California, Santa Barbara Source: “Multisensor.
Biometrics: Ear Recognition
1.  Introduction  Gaussian and Laplacian pyramid  Application Salient region detection Edge-aware image processing  Conclusion  Reference 2.
Project submitted by: Swaroop Borukar Kinjal Patel Under the guidance of: Prof. K. T. Talele Electronics and Telecommunication Engineering Department.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Introduction to Biometric Systems
Revision Michael J. Watts
Learning Visual Similarity Measures for Comparing Never Seen Objects By: Eric Nowark, Frederic Juric Presented by: Khoa Tran.
Ajay Kumar, Member, IEEE, and David Zhang, Senior Member, IEEE.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Fingerprint Analysis (part 2) Pavel Mrázek. Local ridge frequency.
INDEPENDENT COMPONENT ANALYSIS OF TEXTURES based on the article R.Manduchi, J. Portilla, ICA of Textures, The Proc. of the 7 th IEEE Int. Conf. On Comp.
Face Recognition System By Arthur. Introduction  A facial recognition system is a computer application for automatically identifying or verifying a person.
Fitting: The Hough transform. Voting schemes Let each feature vote for all the models that are compatible with it Hopefully the noise features will not.
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
A Comparison in Handmetric between Quaternion Euclidean Product Distance and Cauchy Schwartz Inequality Distance Di Liu Dong-mei Sun Zheng-ding Qiu Institute.
Object Recognition in Images Slides originally created by Bernd Heisele.
Biometric Authentication in Infrastructure Security By: John Armington, Purdy Ho, Paul Koznek and Richard Martinez G. Davida, Y. Frankel and O. Rees (Eds.):
Master Thesis Presentation, 14Dec07 Pair Wise Distance Histogram Based Fingerprint Minutiae Matching Algorithm Developed By: Neeraj Sharma M.S. student,
Fitting: The Hough transform
Automated Solar Cavity Detection
By Brian Lam and Vic Ciesielski RMIT University
Automated Fingertip Detection
1 Machine Vision. 2 VISION the most powerful sense.
SIGNATURE RECOGNITION SYSTEM Group Number:10 Group Members: Richa Goyal(y08uc103) Rashmi Singhal(y08uc102)
Iris-based Authentication System Daniel Schonberg and Darko Kirovski, “Iris Compression for Cryptographically Secure Person Identification”, in Proceedings.
Medical Card System with Fingerprint Authentication Luvuyo Morris Supervisor: Mr. R. Dodds Co-Supervisor: Mr. M. Ghazi-Asgar Mentor: Mr. Roland Foster.
Institute of Telecommunication Image Processing Group Ear Biometrics for Human Identification Based on Image Analysis Michal Choras Image Processing Group.
Biometric Fingerprint Attendance Management System.
WLD: A Robust Local Image Descriptor Jie Chen, Shiguang Shan, Chu He, Guoying Zhao, Matti Pietikäinen, Xilin Chen, Wen Gao 报告人:蒲薇榄.
Fingerprint Identification
FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM.
Improving the Performance of Fingerprint Classification
Classification of Hand-Written Digits Using Scattering Convolutional Network Dongmian Zou Advisor: Professor Radu Balan.
Student: Wanli Ouyang (歐陽萬里) Supervisor: Prof. W.K. Cham
MOTION ESTIMATION AND VIDEO COMPRESSION
Using Association Rules as Texture features
Random Neural Network Texture Model
Presentation transcript:

Fingerprint Synthesis An Hong Tran

Outline Introduction Haar Wavelet Transform Fingerprint Synthesis Application Results Conclusion

Introduction Verification Test  Large Database Use Parameter Varying techniques New approach  Extract features from parents

Haar Wavelet Transform FC D F DecompositionReconstruction

Haar Wavelet Transform

Fingerprint Synthesis Application Direct (pixel value) Orientation map (O-map) switching Orientation map (O-map) manipulation Orientation map (O-map) merging

Fingerprint Synthesis Application Direct (pixel value) O-map switching O-map manipulation O-map merging

Fingerprint Synthesis Application – Direct (a) (b)

Fingerprint Synthesis Application – Direct

Fingerprint Synthesis Application Direct (pixel value) O-map Switching O-map manipulation O-map merging

Fingerprint Synthesis Application – O-map switch

Fingerprint Synthesis Application Direct (pixel value) O-map switching O-map manipulation O-map merging

Fingerprint Synthesis Application – O-map manip

Fingerprint Synthesis Application Direct (pixel value) O-map switching O-map manipulation O-map merging

Fingerprint Synthesis Application – O-map merge

Result N new = N + 3 Σ k=2 N C k,  N new is the number of sample in the new database,  N is number of original samples  N C k is the Combination operation, 6 C 2 = 15. N new = N + 3(2 n – 1)

Conclusion & Future Work Show good promises. Merging features from parents. Weight Vector analysis.  Balance between uniqueness and realism.

References 1.Local B-spline Multiresolution with Examples in Iris Synthesis and Volumetric Rendering, Faramarz F. Samavati, Richard.H. Bartels and Luke Olsen, Image Pattern Recognition: Synthesis and Analysis in Biometrics, Series in Machine Perception and Artificial Intelligence, Vol. 67, World Scientific Publishing, A. Adler, “Can Images Be Regenerated from Biometric Templates,” Proc. Biometrics Consortium Conf., Sept R. Cappelli, “Synthetic Fingerprint Generation,” Handbook of Fingerprint Recognition, D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar, eds., Springer, Anil K. Jain, David Maltoni, Handbook of Fingerprint Recognition, Springer-Verlag New York, Inc., Secaucus, NJ, B. Sherlock and D. Monro, “A Model for Interpreting Fingerprint Topology”, in Pattern Recognition, v. 26, no. 7, 1993, pp P. Vizcaya and L. Gerhardt, “A Nonlinear Orientation Model for Global Description of Fingerprints”, in Pattern Recognition, V29, no. 7, 1996, pp S. Yanushkevich, V. Shmerko, and D. Popel, Biometric Inverse Problem, CRC Press, 2005.