Experiment and Analysis Services in a Fingerprint Digital Library Sung Hee Park 1, Jonathan P. Leidig 1, Lin Tzy Li 1;3;4, Edward A. Fox 1, Nathan J. Short.

Slides:



Advertisements
Similar presentations
Kensington Oracle Edition: Open Discovery Workflow Meets Oracle 10g Professor Yike Guo.
Advertisements

Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Automatically Annotating and Integrating Spatial Datasets Chieng-Chien Chen, Snehal Thakkar, Crail Knoblock, Cyrus Shahabi Department of Computer Science.
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
All Hands Meeting, 2006 Title: Grid Workflow Scheduling in WOSE (Workflow Optimisation Services for e- Science Applications) Authors: Yash Patel, Andrew.
ELPUB 2006 June Bansko Bulgaria1 Automated Building of OAI Compliant Repository from Legacy Collection Kurt Maly Department of Computer.
GENERATING AUTOMATIC SEMANTIC ANNOTATIONS FOR RESEARCH DATASETS AYUSH SINGHAL AND JAIDEEP SRIVASTAVA CS DEPT., UNIVERSITY OF MINNESOTA, MN, USA.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
Funding Networks Abdullah Sevincer University of Nevada, Reno Department of Computer Science & Engineering.
Applications Chapter 9, Cimiano Ontology Learning Textbook Presented by Aaron Stewart.
SimDL: A Model Ontology Driven Digital Library for Simulation Systems Jonathan Leidig - Edward A. Fox Kevin Hall Madhav Marathe Henning Mortveit.
1 CHCI Visit by Dean Benson, Associate Dean Lesko KW II Rm – 10/10/2011 Digital Library Research Laboratory Torgersen Hall Rm 2030 –
Ontology Classifications Acknowledgement Abstract Content from simulation systems is useful in defining domain ontologies. We describe a digital library.
Presentation Outline  Project Aims  Introduction of Digital Video Library  Introduction of Our Work  Considerations and Approach  Design and Implementation.
Image Search Presented by: Samantha Mahindrakar Diti Gandhi.
ADVISE: Advanced Digital Video Information Segmentation Engine
A Study of Approaches for Object Recognition
CPSC 695 Future of GIS Marina L. Gavrilova. The future of GIS.
Supervised by Prof. LYU, Rung Tsong Michael Department of Computer Science & Engineering The Chinese University of Hong Kong Prepared by: Chan Pik Wah,
CS335 Principles of Multimedia Systems Content Based Media Retrieval Hao Jiang Computer Science Department Boston College Dec. 4, 2007.
Presentation Outline  Project Aims  Introduction of Digital Video Library  Introduction of Our Work  Considerations and Approach  Design and Implementation.
Sparsity, Scalability and Distribution in Recommender Systems
Online Stacked Graphical Learning Zhenzhen Kou +, Vitor R. Carvalho *, and William W. Cohen + Machine Learning Department + / Language Technologies Institute.
Component-based Authoring of Complex, Petri net-based Digital Library Infrastructure Yung Ah Park, Unmil P. Karadkar, and Richard Furuta Department of.
Knowledge Science & Engineering Institute, Beijing Normal University, Analyzing Transcripts of Online Asynchronous.
A Semantic Workflow Mechanism to Realise Experimental Goals and Constraints Edoardo Pignotti, Peter Edwards, Alun Preece, Nick Gotts and Gary Polhill School.
Query Planning for Searching Inter- Dependent Deep-Web Databases Fan Wang 1, Gagan Agrawal 1, Ruoming Jin 2 1 Department of Computer.
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
IE 594 : Research Methodology – Discrete Event Simulation David S. Kim Spring 2009.
Guillaume Rivalle APRIL 2014 MEASURE YOUR RESEARCH PERFORMANCE WITH INCITES.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
CONTI’2008, 5-6 June 2008, TIMISOARA 1 Towards a digital content management system Gheorghe Sebestyen-Pal, Tünde Bálint, Bogdan Moscaliuc, Agnes Sebestyen-Pal.
VTT-STUK assessment method for safety evaluation of safety-critical computer based systems - application in BE-SECBS project.
CJ328 Unit 3-Review Things you should know Fingerprints contain unique, individual characteristics Galton details are level two details or individual characteristics.
Developing a Concept Extraction Technique with Ensemble Pathway Prat Tanapaisankit (NJIT), Min Song (NJIT), and Edward A. Fox (Virginia Tech) Abstract.
Domain-Specific Languages for Composing Signature Discovery Workflows Ferosh Jacob*, Adam Wynne+, Yan Liu+, Nathan Baker+, and Jeff Gray* *Department of.
PLoS ONE Application Journal Publishing System (JPS) First application built on Topaz application framework Web 2.0 –Uses a template engine to display.
Workflow Project Status Update Luciano Piccoli - Fermilab, IIT Nov
Relevance Feedback in Image Retrieval Systems: A Survey Part II Lin Luo, Tao Huang, Chengcui Zhang School of Computer Science Florida International University.
A Novel Local Patch Framework for Fixing Supervised Learning Models Yilei Wang 1, Bingzheng Wei 2, Jun Yan 2, Yang Hu 2, Zhi-Hong Deng 1, Zheng Chen 2.
BEHAVIORAL TARGETING IN ON-LINE ADVERTISING: AN EMPIRICAL STUDY AUTHORS: JOANNA JAWORSKA MARCIN SYDOW IN DEFENSE: XILING SUN & ARINDAM PAUL.
Exploit of Online Social Networks with Community-Based Graph Semi-Supervised Learning Mingzhen Mo and Irwin King Department of Computer Science and Engineering.
Probabilistic Latent Query Analysis for Combining Multiple Retrieval Sources Rong Yan Alexander G. Hauptmann School of Computer Science Carnegie Mellon.
1 Limitations of BLAST Can only search for a single query (e.g. find all genes similar to TTGGACAGGATCGA) What about more complex queries? “Find all genes.
Department of Information Science and Applications Hsien-Jung Wu 、 Shih-Chieh Huang Asia University, Taiwan An Intelligent E-learning system for Improving.
Digital Library The networked collections of digital text, documents, images, sounds, scientific data, and software that are the core of today’s Internet.
Digital Libraries1 David Rashty. Digital Libraries2 “A library is an arsenal of liberty” Anonymous.
Towards a Reference Quality Model for Digital Libraries Maristella Agosti Nicola Ferro Edward A. Fox Marcos André Gonçalves Bárbara Lagoeiro Moreira.
Exploring in the Weblog Space by Detecting Informative and Affective Articles Xiaochuan Ni, Gui-Rong Xue, Xiao Ling, Yong Yu Shanghai Jiao-Tong University.
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
Ask a Librarian: The Role of Librarians in the Music Information Retrieval Community Jenn Riley, Indiana University Constance A. Mayer, University of Maryland.
Soon Joo Hyun Database Systems Research and Development Lab. US-KOREA Joint Workshop on Digital Library t Introduction ICU Information and Communication.
Collaborative Query Previews in Digital Libraries Lin Fu, Dion Goh, Schubert Foo Division of Information Studies School of Communication and Information.
Learning Photographic Global Tonal Adjustment with a Database of Input / Output Image Pairs.
Satisfying Requirements BPF for DRA shall address: –DAQ Environment (Eclipse RCP): Gumtree ISEE workbench integration; –Design Composing and Configurability,
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Learning to Rank: From Pairwise Approach to Listwise Approach Authors: Zhe Cao, Tao Qin, Tie-Yan Liu, Ming-Feng Tsai, and Hang Li Presenter: Davidson Date:
Text Information Management ChengXiang Zhai, Tao Tao, Xuehua Shen, Hui Fang, Azadeh Shakery, Jing Jiang.
Event-Based Model for Reconciling Digital Entities Ahmet Fatih Mustacoglu Ahmet E. Topcu Aurel Cami Geoffrey C. Fox Indiana University Computer Science.
CTRnet Digital Library for Disaster Information Services Seungwon Yang 1, Andrea Kavanaugh 1, Nádia P. Kozievitch 4, Lin Tzy Li 1,4,5, Venkat Srinivasan.
Information Storage and Retrieval(CS 5604) Collaborative Filtering 4/28/2016 Tianyi Li, Pranav Nakate, Ziqian Song Department of Computer Science Blacksburg,
Liang Chen Advisor: Gagan Agrawal Computer Science & Engineering
CSc4730/6730 Scientific Visualization
Assoc. Prof. Dr. Syed Abdul-Rahman Al-Haddad
Karrie L. Casada University of California, Irvine
Ch 14 Fingerprints part 2.
A General Approach to Real-time Workflow Monitoring
Bug Localization with Combination of Deep Learning and Information Retrieval A. N. Lam et al. International Conference on Program Comprehension 2017.
Presentation transcript:

Experiment and Analysis Services in a Fingerprint Digital Library Sung Hee Park 1, Jonathan P. Leidig 1, Lin Tzy Li 1;3;4, Edward A. Fox 1, Nathan J. Short 2, Kevin E. Hoyle 2, A. Lynn Abbott 2, and Michael S. Hsiao 2 1 Digital Library Research Laboratory, Virginia Tech, USA 2 Department of Electrical and Computer Engineering, Virginia Tech, USA 3 Institute of Computing, University of Campinas, Brazil 4 CPqD Foundation, Campinas, Brazil TPDL: Sept 25-29, 2011, Berlin, Germany Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Contents Introduction Fingerprint Image Collections Algorithms, Analyses, and Experiments Services Framework and Prototype Related Work Conclusion & Future Work Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Introduction Lack of a fingerprint digital library Focus: –human expert training: DOJ, FBI –the developing, testing, and training of fingerprint identification algorithms: VT, Campinas Fingerprint DL services manage –collections –image processing and matching algorithms –experiment results –experiment analyses The goal of this work –end-to-end image-based experimentation and analysis services, framework, and implementation Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Experimentation Workflow Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Fingerprint Image Collections Fingerprint features –Minutiae –Ridges Classifications –Humidity –Pressure Distortion –Skin distortion –Rolling Analysis challenges –Ridges merged –Pressured impressions –Humidity on fingertips –Partial prints –Simultaneous prints Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Fingerprint Minutiae Features Termination Bifurcation Ridge

Ridge Tracing Classifications Proper Dry Wet Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Physical Distortions Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Rotation and Displacement Distortions Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Analysis and Experiment Services in DL Framework Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Basic Notation – 5S Formalisms Term DefinitionTermDefinition DO i ;DO j digital objects i, j  C VVertex C a collection  Coll Stm i  ij.Dom Colla set of collections  ij.DomV  Streams stm j a streamS3S3 Streams Structures Spaces st j a structuretfr S 3  Spaces V  Streams  (N  N) sp j a space j St 2 a set of functions  Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Distortion Generation & Image Processing Function –Generate modified images based on a distortion function based on: –streams, –structures, or –structured streams as defined in the 5S framework Input –a function f and a digital object (DO) do i Product –a distorted version of the DO do j Pre-condition and post-condition –  C  Coll : do i  C and  C  Coll : do j  C Definition –f : do i  do j, given a digital object do i Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Function –identify the locations and quality of major features –e.g., ridge bifurcation and termination Input –stm i Product –st j ;  ij Pre-condition and post-condition –stm i  Streams and st j  Structs;  ij  St 2 ; stm i  ij.Dom; stj.V   ij.Dom, respectively Definition –given a digital object (stm i ) produce a descriptor from the object (st j ;  ij ) that represents the digital object Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech Ridge Tracing & Minutiae Extraction

Matching Algorithms & Searching Function –identify matches between two images as groups of minutiae –use 3, 6, or 9-point triangles of high-quality minutiae locations –less susceptible to distortions –reduce the effects of small distortions on the identification of minutiae location and quality Input –two images, do i ; do j Product –similarity score k based on minutiae matches Definition –binary operation service f(do i ; do j ) = k; k  R, –unary services (e.g., rating and measuring) f(do i ) = k; k  R, where a real number k is a similarity score Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech Match

Service Specific Evaluating (Sufficiency) Function –given an image, determine if there is sufficient data for a match Input –do i Output –do i ;w i Pre-condition –  C  Coll : do i  C Post-condition –w i  [a; b]  R Definition –given a digital object an evaluating service produces an evaluation (i.e., a real number) for it Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech 49,234 / 51,294

Visualizing & Plotting Function –projection of information into measurable spaces –charts, histograms, plots, or meshes –visualization techniques: analyze the appearance and disappearance of minutiae over distortion degrees Input –a collection C and a transformation k Output –a space j Pre-conditions and post-conditions –C  Coll and tfr k(C) = sp j  Metric Definition –given a collection C –produce visualizations in a space j Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Example DL Experiment Scenarios Matching score accuracy experiment –How are minutiae relocated after distortions? Minutiae count and reliability –Are minutiae still identifiable after distortions? –How confidently can minutiae be matched after distortions? Minutiae plotting on fingerprint –What can we learn from minutiae analysis? Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Matching Score Accuracy Experiment Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Minutia Count Experiment Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Minutiae Reliability Experiment Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Minutiae Plotting on a Fingerprint Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Experimentation, Workflow, and Analysis Framework Image-based experimentation steps –User selects a collection of images, algorithms, and inputs –Algorithm-specific analysis scripts identify and extract the phenomenon being tested from the algorithm output Experimentation workflow –Execute each algorithm with a specific collection –Visualization services display the results based on distortion parameters Framework consists of building workflows or compositions –Collections, algorithms, and analyses Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Prototype Overview Image-based DL services –Manage a real and distorted image collection –Automated generation of distorted images from real fingerprints –Select and execute image-based algorithms –Match automated analyses Prototype and web-interface –Online collection of original and distorted images –System for selecting and composing service workflows –Google chart API presents the results of completed analysis tasks Images: 137,785 prints –FVC 2000/02: 3520, 3520 –SD27: 516 –Self-collected: 629 –Distorted: 129,600 (<1 sec generation) Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Prototype Training A web-interface –Browse the image collection, image information, distortion parameters used to generate specific images, extracted minutiae, and ridge information Successful minutia extraction visualizations –Humidity –x-translations –y-translations –Rotations –Skin plasticity Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Related Work – Existing Fingerprint Databases FBI's Integrated Automated Fingerprint Identification System (IAFIS) –Large fingerprint management system –Tens of millions of images –Search capabilities against both latent and ten prints –Digitized images –Lacks: training experts experiment setting distorting plotting visualizing The Universal Latent Workstation (ULW) –First latent workstation –Supports interoperability –Shares latent identification services with local and state authorities, and with the FBI IAFIS, all with a single encoding Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Related Work – Fingerprint Experimentation Experiment Database & Collaboration Framework –Penatti et al. [9] proposed an experiment management tool - Eva evaluates descriptors in content-base image retrieval provides image descriptors image management runs comparative experiments stimulated the development of our holistic DL experiment framework Previous work also supported scientific communities in a web- based integration framework [10] Workflow systems: Kepler, Pegasus, Traverna, Triana Simulation system models and analyses Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Related Work – Fingerprint Analysis The Analysis, Comparison, Evaluation and Verification (ACE-V) –Scientific Working Group on Friction Ridge Analysis, Study and Technology (SWGFAST) groups Oliveira et al. [8] –Novel tools for reconnecting broken ridges in fingerprint images Huang et al. [1] –Singular point detection Kozievitch et al. [4] –Compound object (CO) scheme based on the 5S framework to integrate four different very-large fingerprint digital libraries –Allows uniform use in an integrated DL Our work: –DL framework design from a services perspective –Delivers experimentation and analytical results –Integrates related services designed by different researchers Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Conclusion & Future Work Contribution –DL supports collaborative research for DOJ/FBI trainers and researchers –Services generating distorted image datasets testing different algorithms (e.g., for minutia detection and matching) managing and work-flowing scientific research datasets, algorithms, and analysis results ridge tracing: improve poor images, sharpen, predict distortion events based on profile, train existing algorithms and people, predict failures Status & Future Work –Algorithm development and analysis –Incorporate (training and development) algorithms from other types of fingerprint DLs –Experiment e.g., Identify the distortion chain between two images –Teach the effect of distortions on minutiae points Other Applications –Astronomy and geo-location identification image processing –Useful for cross-domain generalization Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Jonathan Leidig - Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Analysis and Experiment Services Fingerprint-specific services Analysis and experiment setting Distortion generation & image processing Minutiae extraction & ridge tracing Matching & searching Evaluating Visualizing & plotting Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Analysis and Experiment Setting Algorithms in experiments require an algorithm-specific description Distortion generation algorithm Minutiae extraction algorithm Ridge tracing algorithm Matching algorithm Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech

Example Workflow Minutiae extraction algorithm –# of minutiae located by distortion parameters –The assigned quality score (0.0 to 1.0) for each minutiae Executing this algorithm –On the entire set of distorted images –From a base image –With respect to distortion parameters Statistical significance test –Identify factors hindering the identification of minutiae Pre-requisite –The distortion generation algorithm prior to forming a workflow involving algorithmic executions and subsequent analysis Network Dynamics and Simulation Science Laboratory Digital Library Research Laboratory Virginia Tech