SlideShare a Scribd company logo
1 of 7
Download to read offline
TELKOMNIKA, Vol.17, No.1, February 2019, pp. 103~109
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI:10.12928/TELKOMNIKA.v17i1.11713 ๏ฎ103
Received May 30, 2018; Revised October 24, 2018; Accepted November 26, 2018
Biometric identification using augmented database
Regina Lionnie*1
, Ellisa Agustina2
, Wahju Sediono3
, Mudrik Alaydrus4
1,2,3,4
Department of Electrical Engineering, Universitas Mercu Buana Jakarta,
Jalan Menteng Raya No. 29, Jakarta Pusat, Indonesia
3
Department of Mechatronics Engineering, Kulliyyah of Engineering,
International Islamic University Malaysia, Jalan Gombak, 53100 Kuala Lumpur, Malaysia
*Corresponding author, e-mail: regina.lionnie@mercubuana.ac.id1
, ellisa.agustina@gmail.com2
,
wsediono@iium.edu.my3
, mudrikalaydrus@mercubuana.ac.id4
Abstract
Androgenic hair pattern is one of the newest soft biometric trait that can be used to identify
criminals when their faces are covered in the evidences of criminal investigation. In real-life situation,
sometimes the available evidence is limited thus creating problems for authorities to identify criminal based
on the limited data. This research developed the recognition system to identify individuals based on their
androgenic hair pattern in a limited data situation in such a way that the limited images were expanded by
the augmentation process. There were 50 images studied and expanded into 2.000 images from the
augmentation process of rotating, reflecting, adjusting color and intensity. Furthermore, the effect of human
skin color extraction was investigated by employing HSV and YCbCr color spaces. The scale-space
hierarchy was built among the images with Gaussian function and produced 70% recognition precision that
was around more than 2 times higher compared to system of recognition with only limited data.
Keywords: androgenic hair pattern, augmented data, biometric identification, hierarchical Gaussian
scale-space, limited training
Copyright ยฉ 2019 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
Biometrics is the knowledge to certify the identity of people based on their physiological,
chemical and behavioral characteristics [1-2]. The purpose of biometrics discussed in this
research was to identify criminals based on their androgenic hair pattern. The androgenic hair
pattern became popular since it was first introduced as the soft biometric trait in [3]. Androgenic
hair is the hair that grows on human body since a person reaches his or her puberty era and is
influenced by androgens hormone [4].
When the evidence of criminalsโ€™ identity such as their face are captured in the digital
pictures and videos, they may be covered and thus creating problems for the authorities to do
the identification procedure. Normally, parts of their hands and legs are not covered and they
turn into a potential information to be learnt. Furthermore, the limited numbers of evidence arise
as other issues to be solved. There have been pursuits to overcome these two difficulties.
In [3], [5] the authors started to study the pattern by using the Gabor orientation histogram.
In [6-8], the authors applied transformation such as wavelet Haar, principal component analysis
and hierarchical Gaussian scale space as a method to help the recognize the androgenic hair
pattern and to produce better recognition precision. The results were produced by analyzing 400
images in the database. These studies are not for recognition system with limited dataset.
Though the rate of precisions is quite satisfactory, the case in the real-life situation of limited
data are not yet implemented in the recognition system. In [9], the performance of color spaces
was investigated to extract human skin color area. In order to improve the recognition rate, the
rules of extracting human skin color area by using color spaces such as RGB, HSV, YCbCr, CIE
Lab and YIQ were studied. In [10], the authors applied class-specific partial least squares (PLS)
models to utilize the features of androgenic hair pattern. The research on androgenic hair
pattern is expanding and in the next development in [11], the authors learned to develop the
recognition system based on real-life situation and limited the data for the system.
This research attempted to design a recognition system to identify individuals based on
their androgenic hair pattern in a limited data situation in such a way that the limited images
were expanded by the augmentation process. The scale-space hierarchy was built among the
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol.17, No. 1, February 2019: 103-109
104
augmented images by using Gaussian function. Moreover, we also studied the effect of HSV
and YCbCr color spaces to the augmented data to extract human skin color area in the images.
The rest of this paper is defined as follow: section 2 describes the research method conducted
in this paper. In section 3, the results are discussed and analyzed. Finally, conclusion is
summed up in section 4.
2. Research Method
The research method implemented in this research was built based upon three parts
processes. The first part was to build the augmented data base from limited data in the system.
The second part was to build the scaling hierarchical structure using Gaussian filter and the
third part was to find the closest matching of the training and the testing data. Figure 1 below
explains the three part processes of research method executed in this research.
Figure 1. Research method for biometric identification
2.1. Augmented Database
In real life condition, sometimes there are limited data that can be acquired. The limited
data explains as only a few images acquired for the same person from the acquiring device
such as digital camera. In this research there were only two images from the same person in the
system. The two images varied in pose, lighting condition, angle, background information and
noise. There were 25 male respondents with two images each, there were total 50 images in the
early limited data base. In this research, the data augmentation technique was applied to the
limited data base, producing more images derived from the original one. The technique to
augment the data was based on geometric transformation such as rotation (1), reflection (2),
color adjustment and intensity adjustment [12]. The color adjustment limits and enhances the
contrast of the images while the intensity adjustment is proposed to make the images darker
than earlier.
[
๐‘š2
๐‘›2
] = [
๐‘๐‘œ๐‘ ๐œƒ โˆ’๐‘ ๐‘–๐‘›๐œƒ
๐‘ ๐‘–๐‘›๐œƒ ๐‘๐‘œ๐‘ ๐œƒ
] [
๐‘š1
๐‘›1
] (1)
[
๐‘š2
๐‘›2
] = [
โˆ’1 0
0 1
] [
๐‘š1
๐‘›1
] (2)
The two original images in the early database were divided into training and testing
images. The augmented data were derived from both division but the augmented images from
testing images were notincluded to the training phase. There were 39 augmented images from 1
original image. Figure 2 describes the augmented process that took place in this research.
Figure 2. Data augmentation process
Scale-Space Matching
Identification System
Precision of
System
Limited
Data
Augmented
Database
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Biometric identification using augmented database (Regina Lionnie)
105
All original images and augmented images were 203x352 in pixels. The skin color
extraction in this research ran on two color spaces, HSV and YCbCr that was studied before
in [9]. These color spaces worked best for extracting human skin color component. Both HSV
and YCbCr are the color spaces that separate luminance and chrominance components. It is
shown that pixels with the range of human skin color have similarity in chrominance component
and it is best to discriminate color of skin and not skin area [13]. The rules of HSV skin color
area extraction is shown in (3) while the YCbCr in (4) [9]. The extraction process removed the
background (area that was not detected as human skin color) and replaced it with black and
white color.
S > 0.35 (3)
101 < Cb < 125
130 < Cr < 155 (4)
2.2. Scale-space with Hierarchical Gaussian Filter
By building scale-space of an image, it permits us to analyse an image at multi
resolutions [14]. The different resolution improves the system of identification by representing
original images in different scale. The idea behind Gaussian scale-space [15] is to filter the
original image with Gaussian function of desired width and decimates the last output from the
filter process to start again as the next scale from the same image.
The process began with convolving the input image with Gaussian function with the
width ๐œŽ as it can be seen in (5) until (8). These equations can be seen in more detail
explanation in previous work in [8]. The width of the Gaussian was๐œŽ0 = 1.6 and ๐œŽ๐‘  = 0.5 as it
was used before in [8], [16]. The total level for this research was V=3 while vvaried in each
level. There were also 4 octaves (U) that was constructed. In one octave, the image was
convolved by the Gaussian with the width in (7) and (8). If it reached the last level, the octave
went higher and the base level for the next level was to decimate the image by the factor of 2.
The process continued until it reached the 4th octave with the 3rd level. The process of building
Gaussian scale space can be seen in Figure 3 below. For the base octave (u=0) and level
(v=0), the input image was convolved by Gaussian with the width in (7). To create the next level
(v=1,2,3) within the same octave (u=0), the base level was convolved with the Gaussian with
the width in (8). For the base level in the next octave, the process just decimated (by the factor
of two) the last level from the previous octave and did not convolve the image with the
Gaussian. To build the next level (v=1,2,3) for the next octave (uโ‰  0), the image on the base
level in each octave was convolved with the Gaussian with the width in (8).
Figure 3. Building the scale-space [8]
G(m,n,ฯƒ) = H(m,n,ฯƒ) โˆ— I(m,n) (5)
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol.17, No. 1, February 2019: 103-109
106
H(m,n,ฯƒ) =
1
2ฯ€ฯƒ
e
โˆ’
(m2+n2)
2ฯƒ2
(6)
ฯƒ0ฬ‚ = โˆšฯƒ0
2
โˆ’ ฯƒs
2 (7)
ฯƒvฬ‚ = ฯƒ0. โˆš22v/V โˆ’ 1 (8)
In [8], the authors adopted the method Hierarchical Gaussian Scale-Space for
androgenic hair pattern recognition. There were 400 original varied images were studied without
any augmented images. In this research the same method was applied to study the
performance of the augmented images in the data base for a limited data recognition system.
2.3. Matching Algorithm
The matching algorithm in this research employed the nearest distance calculation
using Euclidean distance. It matched the closest data of testing set to the training set. The
configuration of the testing set and the training set are illustrated in Figure 4. Both testing and
training images were augmented for 39 augmented images for each original image. When the
testing image was being processed, the augmented images derived from the testing set were
not included into the system while the 39 augmented images each from remaining 49 images of
training images and the original 49 images themselves were included into the matching process.
The total testing set for one matching process was 1 image while the training set was 49x39
augmented images+49 original images=1.960 images. There were 50 matching processes in
total.
Figure 4. The configuration of training and testing set
3. Results and Analysis
The results are shown in Table 1 and Figure 5 and Figure 6. Table 1 presents the
recognition system precision in percentage of how much accurate the system identifies the
testing images to the right class of training images. The alphabet on each row represents the
type of the dataset meanwhile the number on each column represents the type of augmented
data base that were created. All type of databases were 2000 images in total with 50 original
images and 1950 augmented images. The A and B types means the database with the variety
of original images with different pose, lighting condition, background different noise. The number
1 until 5 for type A and B means the original augmented database for A1 and B1, the skin
extracted using HSV rule from (3) with black background for A2 and B2 and white background
for A3 and B3, the skin extracted using YCbCr rule from (4) with black background for A4 and
B4 and white background for A5 and B5. Meanwhile type C until L is the database of
scale-space from A1 to B5 with 4 octaves and 3 levels of hierarchical Gaussian scale-space.
The C1-C13 is the scale-space images from A1 with C1 is the base octave and base level and
C13 is the 4th octave and the 3rd level. The L1-L13 is the scale-spaces images from B5 with L1
is the base octave and base level and L13 is the 4th octave and the 3rd level.
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Biometric identification using augmented database (Regina Lionnie)
107
Figure 5. The precision recognition system with augmented database and scale-space
Figure 6. The performance comparison for augmented database
Figure 5 describes the performance result focuses on the scale-space by Gaussian
function on each octave and level. The horizontal axis gives the information about the type of
level and octaves. Axis one means base octave and level while axis 13 means last octave and
last level. Meanwhile different type of line gives the information about the database type.
Figure 6 shows the performance comparison for the best recognition result from each type of
data base.
From Figure 5 and Figure 6, we can see the performance of scale-space images to the
recognition system. The performance of recognition using the scale-space database (C-L) was
better than using the database only with augmented images (A-B). The best performance result
came from using the base octave and the level 4th database images with the type augmentation
D4, F4 and K4 which was 70%. The D4, F4 and K4 types of database were respectively the
scale-space version of the A2, A4 and B4 from the base octave and the last level. The
recognition precision from A2, A4 and B4 were 42%, 24% and 24% respectively. The A2
database was the database of augmented images with skin extraction from the background
using the rule (3) of HSV color space. The background of non-human skin color was converted
into black color. The A4 database was the database of augmented images with also skin
extraction background process but with the rule (4) from YCbCr color space. The background of
non-human skin color was also converted into black color. Meanwhile, the B4 database was
also augmented database but with different type of noise compare to A database with human
skin color extraction process using YCbCr in rule (4) and converted into black color.
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol.17, No. 1, February 2019: 103-109
108
Table 1. Recognition Precision for Augmented Database
Recognition Precision (%)
1 2 3 4 5 6 7 8 9 10 11 12 13
A 12 42 10 24 12 - - - - - - - -
B 14 46 8 24 14 - - - - - - - -
C 50 52 56 60 48 48 46 46 46 46 46 46 46
D 68 68 68 70 56 56 56 56 54 54 52 50 50
E 26 26 26 28 46 46 46 46 44 44 42 42 40
F 66 68 70 70 56 56 56 56 54 54 52 52 52
G 26 26 26 28 46 46 46 46 44 44 42 40 40
H 48 52 56 60 48 48 46 46 44 44 44 46 46
I 66 68 68 68 58 58 56 56 54 54 54 50 50
J 28 28 28 30 48 48 46 46 44 44 46 42 40
K 66 68 70 70 58 58 56 56 54 54 54 52 52
L 28 28 28 30 48 48 46 46 44 44 44 42 40
From here, we examined that the best recognition rate came from the images from the
same octave in the scale-space which meant that the decimation process to create the next
octave lowered the recognition rate. The process to decimate the image or to lower the
resolution of the image took adverse effect to the recognition system. Especially from Figure 5,
we can see this as the abrupt changes from 4 to 5 on the database type C, D, F, H, I and K.
While for the database type E, G, J and L, the decimation process of going from the base
octave to the next octave by changing the image resolution took advantage for the recognition
system. This was studied as the effect of the removal of background of non-human skin color
and changed it to white color. The white color needed the decimation process and reduced the
images in resolution to give the beneficial effect to the recognition system. The case for
database type E, G J and L although did not produce recognition rate as high as the type C, D,
F, H, I and K.
Figure 7 shows the example of augmented images for each database. As it was
explained earlier, there were 39 augmented images in each type of database. After further
investigation, we found that the type of the augmented images that gave the closest match to
the testing processes were mostly the type of the images with the augmented process of
intensity adjustment and with rotation transformation.
Figure 7. The Examples of 39 Augmented Images from Type A and B Database
In [11], the authors studied the performance of several methods for limited data
recognition system. It was shown that the SIFT algorithm was the best method and gave higher
performance of recognition precision which was 38% compared to Haar wavelet transformation,
principal component analysis and hierarchical Gaussian scale-space which each of them
produced around 30-32%. The total images that were studied in the research were 50 images
with one testing image and one training image only from the same class / person. By developing
the augmented database for the recognition system, we experimented on the images and
multiplied the numbers into 39 times bigger. The recognition precision with the augmented
database went more than two times higher than the recognition system with limited training
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Biometric identification using augmented database (Regina Lionnie)
109
data. The obstacle for getting higher precision was coming from choosing the type of
augmented process that used in the recognition system.
4. Conclusion
In this research, the augmented databases were created with different type of human
skin color extraction by employing HSV, YCbCr color spaces and scale-space using Gaussian
function. The best recognition performance which was 70%, obtained from D4, F4 and K4, the
database that scaled-spaces the images with base octave and 4th level of Gaussian function
and was extracted the human skin color component using HSV and YCbCr and changed it into
the black background images. The decimation process of reducing the resolution of images in
the scale-space structures gave adverse effect on the black background extracted human skin
color. On the contrary, it gave beneficial effect on white background extracted human skin color.
The type of augmented process that produced the best recognition mostly from intensity
adjustment process and rotation transformation. The augmented database compared to limited
data recognition system resulted in advantageous outcome on the recognition performance. It
improves the precision rate until more than 2 times higher.
Acknowledgement
This work was supported by Indonesia Ministry of Research, Technology and Higher
Education, RISTEKDIKTI 2018 Research Fund.
References
[1] Tariq A, Akram M U. Personal identification using ear recognition. TELKOMNIKA Telecommunication
Computing Electronics and Control. 2012; 10(2): 321-326.
[2] Jain AK. Editor. Handbook of Biometrics. Springer. 2008.
[3] Su H, Kong A W K. A Study on Low Resolution Androgenic Hair Patterns for Criminal and Victim
Identification. IEEE Transactions on Information Forensics and Security. 2014; 9(4): 666-680.
[4] Palastanga N, Soames R. Anatomy and Human Movement: Structure and Function. Sixth Edition.
Elsevier Churchill Livingstone. 2012: 541.
[5] Chan F K S, Kong AWK. Using Hair Follicles with Leg Geometry to Align Androgenic Hair Patterns.
Intelligence and Security Informatics Conference. Manchester. 2015: 137-140.
[6] Lionnie R, Alaydrus M. An Analysis of Haar Wavelet Transform for Androgenic Hair Pattern
Recognition. Proceedings of The First International Conference on Informatics and Computing.
Lombok. 2016.
[7] Lionnie R, Alaydrus M. Biometric Identification System based on Principal Component Analysis.
Proceedings of The 12th
IMT-GT International Conference on Mathematics, Statistics and Their
Applications. Banda Aceh. 2016.
[8] Lionnie R, Alaydrus M. Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition.
TELKOMNIKA Telecommunication Computing Electronics and Control. 2017; 15(1): 522-530.
[9] Lionnie R, Alaydrus M. A comparison of human skin color detection for biometrie identification.
Broadband Communication, Wireless Sensors and Powering (BCWSP), 2017 International
Conference. 2017: 1-5.
[10] Chan F K S, Kong AWK. A further study of low resolution androgenic hair patterns as a soft biometric
trait. Image and Vision Computing. 2017.
[11] Lionnie, R. Androgenic Hair Recognition For Biometric Identification. Master Thesis. Jakarta:
Postgraduate UMB; 2017.
[12] Solomon B. Linear Algebra Geometry and Transformation. CRC Press. 2015.
[13] Anwar N, Kit CW, John S. RGB-H-CbCr Skin Colour Model for Human Face Detection. Proceedings of
the MMU International Symposium on Information & Communications Technologies. Petaling Jaya.
2006.
[14] Sporring J, Nielsen M, Florack L and Johansen P. Editors. Gaussian Scale Space Theory. Springer.
1997.
[15] Lindeberg T. Scale-Space Theory in Computer Vision. Kluwer Academic Publishers. 1994: 48.
[16] Lowe DG. Distinctive Image Features from Scale-Invariant Keypoints. International Journal of
Computer Vision. 2004; 60(2): 91-110.

More Related Content

What's hot

50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...idescitation
ย 
Comparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesComparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesIAEME Publication
ย 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...sipij
ย 
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACESSEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACESIJCSEA Journal
ย 
Pollination based optimization for color image segmentation
Pollination based optimization for color image segmentationPollination based optimization for color image segmentation
Pollination based optimization for color image segmentationIAEME Publication
ย 
MEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTER
MEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTERMEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTER
MEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTERcscpconf
ย 
Ja3416401643
Ja3416401643Ja3416401643
Ja3416401643IJERA Editor
ย 
Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...
Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...
Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...Associate Professor in VSB Coimbatore
ย 
An efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection basedAn efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection basedssairayousaf
ย 
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSOBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSijcseit
ย 
Image Compression based on DCT and BPSO for MRI and Standard Images
Image Compression based on DCT and BPSO for MRI and Standard ImagesImage Compression based on DCT and BPSO for MRI and Standard Images
Image Compression based on DCT and BPSO for MRI and Standard ImagesIJERA Editor
ย 
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...ijcsit
ย 
Genetic Algorithm based Analysis of Rigid and Non Rigid Medical Images
Genetic Algorithm based Analysis of Rigid and Non Rigid Medical ImagesGenetic Algorithm based Analysis of Rigid and Non Rigid Medical Images
Genetic Algorithm based Analysis of Rigid and Non Rigid Medical ImagesIRJET Journal
ย 
Clustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringClustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringeSAT Journals
ย 
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...csandit
ย 
Explicit Content Image Detection
Explicit Content Image DetectionExplicit Content Image Detection
Explicit Content Image Detectionsipij
ย 
Texture features from Chaos Game Representation Images of Genomes
Texture features from Chaos Game Representation Images of GenomesTexture features from Chaos Game Representation Images of Genomes
Texture features from Chaos Game Representation Images of GenomesCSCJournals
ย 
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGMULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGijistjournal
ย 

What's hot (19)

50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
ย 
Comparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesComparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniques
ย 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
ย 
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACESSEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
ย 
Pollination based optimization for color image segmentation
Pollination based optimization for color image segmentationPollination based optimization for color image segmentation
Pollination based optimization for color image segmentation
ย 
MEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTER
MEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTERMEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTER
MEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTER
ย 
Ja3416401643
Ja3416401643Ja3416401643
Ja3416401643
ย 
Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...
Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...
Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...
ย 
An efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection basedAn efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection based
ย 
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSOBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
ย 
Image Compression based on DCT and BPSO for MRI and Standard Images
Image Compression based on DCT and BPSO for MRI and Standard ImagesImage Compression based on DCT and BPSO for MRI and Standard Images
Image Compression based on DCT and BPSO for MRI and Standard Images
ย 
Breast boundary detection in mammogram using entropy
Breast boundary detection in mammogram using entropyBreast boundary detection in mammogram using entropy
Breast boundary detection in mammogram using entropy
ย 
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
ย 
Genetic Algorithm based Analysis of Rigid and Non Rigid Medical Images
Genetic Algorithm based Analysis of Rigid and Non Rigid Medical ImagesGenetic Algorithm based Analysis of Rigid and Non Rigid Medical Images
Genetic Algorithm based Analysis of Rigid and Non Rigid Medical Images
ย 
Clustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringClustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clustering
ย 
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...
ย 
Explicit Content Image Detection
Explicit Content Image DetectionExplicit Content Image Detection
Explicit Content Image Detection
ย 
Texture features from Chaos Game Representation Images of Genomes
Texture features from Chaos Game Representation Images of GenomesTexture features from Chaos Game Representation Images of Genomes
Texture features from Chaos Game Representation Images of Genomes
ย 
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGMULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
ย 

Similar to Augmented Biometric Identification Using Hair Patterns

Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition
Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern RecognitionHierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition
Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern RecognitionTELKOMNIKA JOURNAL
ย 
Wavelet-Based Color Histogram on Content-Based Image Retrieval
Wavelet-Based Color Histogram on Content-Based Image RetrievalWavelet-Based Color Histogram on Content-Based Image Retrieval
Wavelet-Based Color Histogram on Content-Based Image RetrievalTELKOMNIKA JOURNAL
ย 
Human Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural NetworkHuman Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural NetworkTELKOMNIKA JOURNAL
ย 
I045034956
I045034956I045034956
I045034956IJERA Editor
ย 
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...ijitjournal
ย 
Filter technique of medical image on multiple morphological gradient method
Filter technique of medical image on multiple morphological gradient methodFilter technique of medical image on multiple morphological gradient method
Filter technique of medical image on multiple morphological gradient methodTELKOMNIKA JOURNAL
ย 
Ag044216224
Ag044216224Ag044216224
Ag044216224IJERA Editor
ย 
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSIONCOLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSIONacijjournal
ย 
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION acijjournal
ย 
A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...
A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...
A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...TELKOMNIKA JOURNAL
ย 
Statistical Feature-based Neural Network Approach for the Detection of Lung C...
Statistical Feature-based Neural Network Approach for the Detection of Lung C...Statistical Feature-based Neural Network Approach for the Detection of Lung C...
Statistical Feature-based Neural Network Approach for the Detection of Lung C...CSCJournals
ย 
Detection of skin diasease using curvlets
Detection of skin diasease using curvletsDetection of skin diasease using curvlets
Detection of skin diasease using curvletseSAT Publishing House
ย 
Face Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of InternetFace Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of Internetijceronline
ย 
A Novel Efficient Medical Image Segmentation Methodology
A Novel Efficient Medical Image Segmentation MethodologyA Novel Efficient Medical Image Segmentation Methodology
A Novel Efficient Medical Image Segmentation Methodologyaciijournal
ย 
Skin Color Detection Using Region-Based Approach
Skin Color Detection Using Region-Based ApproachSkin Color Detection Using Region-Based Approach
Skin Color Detection Using Region-Based ApproachCSCJournals
ย 
Content based image retrieval based on shape with texture features
Content based image retrieval based on shape with texture featuresContent based image retrieval based on shape with texture features
Content based image retrieval based on shape with texture featuresAlexander Decker
ย 
Multi Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image RetrievalMulti Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image RetrievalIDES Editor
ย 
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...IJERA Editor
ย 

Similar to Augmented Biometric Identification Using Hair Patterns (20)

Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition
Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern RecognitionHierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition
Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition
ย 
Wavelet-Based Color Histogram on Content-Based Image Retrieval
Wavelet-Based Color Histogram on Content-Based Image RetrievalWavelet-Based Color Histogram on Content-Based Image Retrieval
Wavelet-Based Color Histogram on Content-Based Image Retrieval
ย 
Human Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural NetworkHuman Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural Network
ย 
I045034956
I045034956I045034956
I045034956
ย 
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ย 
Filter technique of medical image on multiple morphological gradient method
Filter technique of medical image on multiple morphological gradient methodFilter technique of medical image on multiple morphological gradient method
Filter technique of medical image on multiple morphological gradient method
ย 
Ag044216224
Ag044216224Ag044216224
Ag044216224
ย 
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSIONCOLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
ย 
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
ย 
A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...
A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...
A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...
ย 
Statistical Feature-based Neural Network Approach for the Detection of Lung C...
Statistical Feature-based Neural Network Approach for the Detection of Lung C...Statistical Feature-based Neural Network Approach for the Detection of Lung C...
Statistical Feature-based Neural Network Approach for the Detection of Lung C...
ย 
Detection of skin diasease using curvlets
Detection of skin diasease using curvletsDetection of skin diasease using curvlets
Detection of skin diasease using curvlets
ย 
Face Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of InternetFace Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of Internet
ย 
A Novel Efficient Medical Image Segmentation Methodology
A Novel Efficient Medical Image Segmentation MethodologyA Novel Efficient Medical Image Segmentation Methodology
A Novel Efficient Medical Image Segmentation Methodology
ย 
FULL PAPER.PDF
FULL PAPER.PDFFULL PAPER.PDF
FULL PAPER.PDF
ย 
Skin Color Detection Using Region-Based Approach
Skin Color Detection Using Region-Based ApproachSkin Color Detection Using Region-Based Approach
Skin Color Detection Using Region-Based Approach
ย 
Content based image retrieval based on shape with texture features
Content based image retrieval based on shape with texture featuresContent based image retrieval based on shape with texture features
Content based image retrieval based on shape with texture features
ย 
Multi Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image RetrievalMulti Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image Retrieval
ย 
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
ย 
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
ย 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
ย 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
ย 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
ย 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
ย 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
ย 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
ย 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
ย 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
ย 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
ย 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
ย 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
ย 
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...TELKOMNIKA JOURNAL
ย 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
ย 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
ย 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
ย 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
ย 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
ย 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
ย 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
ย 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
ย 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
ย 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
ย 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
ย 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
ย 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
ย 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
ย 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
ย 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
ย 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
ย 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
ย 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
ย 
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
ย 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
ย 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
ย 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
ย 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
ย 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
ย 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
ย 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
ย 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
ย 

Recently uploaded

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
ย 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
ย 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
ย 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
ย 
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort serviceGurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort servicejennyeacort
ย 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
ย 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
ย 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
ย 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
ย 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
ย 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
ย 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
ย 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
ย 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
ย 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
ย 
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Study on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube ExchangerAnamika Sarkar
ย 

Recently uploaded (20)

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
ย 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ย 
young call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
young call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Serviceyoung call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
young call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
ย 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
ย 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
ย 
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort serviceGurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
ย 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
ย 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
ย 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
ย 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
ย 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
ย 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
ย 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
ย 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
ย 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
ย 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
ย 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
ย 
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
ย 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
ย 
Study on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube Exchanger
ย 

Augmented Biometric Identification Using Hair Patterns

  • 1. TELKOMNIKA, Vol.17, No.1, February 2019, pp. 103~109 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI:10.12928/TELKOMNIKA.v17i1.11713 ๏ฎ103 Received May 30, 2018; Revised October 24, 2018; Accepted November 26, 2018 Biometric identification using augmented database Regina Lionnie*1 , Ellisa Agustina2 , Wahju Sediono3 , Mudrik Alaydrus4 1,2,3,4 Department of Electrical Engineering, Universitas Mercu Buana Jakarta, Jalan Menteng Raya No. 29, Jakarta Pusat, Indonesia 3 Department of Mechatronics Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Jalan Gombak, 53100 Kuala Lumpur, Malaysia *Corresponding author, e-mail: regina.lionnie@mercubuana.ac.id1 , ellisa.agustina@gmail.com2 , wsediono@iium.edu.my3 , mudrikalaydrus@mercubuana.ac.id4 Abstract Androgenic hair pattern is one of the newest soft biometric trait that can be used to identify criminals when their faces are covered in the evidences of criminal investigation. In real-life situation, sometimes the available evidence is limited thus creating problems for authorities to identify criminal based on the limited data. This research developed the recognition system to identify individuals based on their androgenic hair pattern in a limited data situation in such a way that the limited images were expanded by the augmentation process. There were 50 images studied and expanded into 2.000 images from the augmentation process of rotating, reflecting, adjusting color and intensity. Furthermore, the effect of human skin color extraction was investigated by employing HSV and YCbCr color spaces. The scale-space hierarchy was built among the images with Gaussian function and produced 70% recognition precision that was around more than 2 times higher compared to system of recognition with only limited data. Keywords: androgenic hair pattern, augmented data, biometric identification, hierarchical Gaussian scale-space, limited training Copyright ยฉ 2019 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction Biometrics is the knowledge to certify the identity of people based on their physiological, chemical and behavioral characteristics [1-2]. The purpose of biometrics discussed in this research was to identify criminals based on their androgenic hair pattern. The androgenic hair pattern became popular since it was first introduced as the soft biometric trait in [3]. Androgenic hair is the hair that grows on human body since a person reaches his or her puberty era and is influenced by androgens hormone [4]. When the evidence of criminalsโ€™ identity such as their face are captured in the digital pictures and videos, they may be covered and thus creating problems for the authorities to do the identification procedure. Normally, parts of their hands and legs are not covered and they turn into a potential information to be learnt. Furthermore, the limited numbers of evidence arise as other issues to be solved. There have been pursuits to overcome these two difficulties. In [3], [5] the authors started to study the pattern by using the Gabor orientation histogram. In [6-8], the authors applied transformation such as wavelet Haar, principal component analysis and hierarchical Gaussian scale space as a method to help the recognize the androgenic hair pattern and to produce better recognition precision. The results were produced by analyzing 400 images in the database. These studies are not for recognition system with limited dataset. Though the rate of precisions is quite satisfactory, the case in the real-life situation of limited data are not yet implemented in the recognition system. In [9], the performance of color spaces was investigated to extract human skin color area. In order to improve the recognition rate, the rules of extracting human skin color area by using color spaces such as RGB, HSV, YCbCr, CIE Lab and YIQ were studied. In [10], the authors applied class-specific partial least squares (PLS) models to utilize the features of androgenic hair pattern. The research on androgenic hair pattern is expanding and in the next development in [11], the authors learned to develop the recognition system based on real-life situation and limited the data for the system. This research attempted to design a recognition system to identify individuals based on their androgenic hair pattern in a limited data situation in such a way that the limited images were expanded by the augmentation process. The scale-space hierarchy was built among the
  • 2. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol.17, No. 1, February 2019: 103-109 104 augmented images by using Gaussian function. Moreover, we also studied the effect of HSV and YCbCr color spaces to the augmented data to extract human skin color area in the images. The rest of this paper is defined as follow: section 2 describes the research method conducted in this paper. In section 3, the results are discussed and analyzed. Finally, conclusion is summed up in section 4. 2. Research Method The research method implemented in this research was built based upon three parts processes. The first part was to build the augmented data base from limited data in the system. The second part was to build the scaling hierarchical structure using Gaussian filter and the third part was to find the closest matching of the training and the testing data. Figure 1 below explains the three part processes of research method executed in this research. Figure 1. Research method for biometric identification 2.1. Augmented Database In real life condition, sometimes there are limited data that can be acquired. The limited data explains as only a few images acquired for the same person from the acquiring device such as digital camera. In this research there were only two images from the same person in the system. The two images varied in pose, lighting condition, angle, background information and noise. There were 25 male respondents with two images each, there were total 50 images in the early limited data base. In this research, the data augmentation technique was applied to the limited data base, producing more images derived from the original one. The technique to augment the data was based on geometric transformation such as rotation (1), reflection (2), color adjustment and intensity adjustment [12]. The color adjustment limits and enhances the contrast of the images while the intensity adjustment is proposed to make the images darker than earlier. [ ๐‘š2 ๐‘›2 ] = [ ๐‘๐‘œ๐‘ ๐œƒ โˆ’๐‘ ๐‘–๐‘›๐œƒ ๐‘ ๐‘–๐‘›๐œƒ ๐‘๐‘œ๐‘ ๐œƒ ] [ ๐‘š1 ๐‘›1 ] (1) [ ๐‘š2 ๐‘›2 ] = [ โˆ’1 0 0 1 ] [ ๐‘š1 ๐‘›1 ] (2) The two original images in the early database were divided into training and testing images. The augmented data were derived from both division but the augmented images from testing images were notincluded to the training phase. There were 39 augmented images from 1 original image. Figure 2 describes the augmented process that took place in this research. Figure 2. Data augmentation process Scale-Space Matching Identification System Precision of System Limited Data Augmented Database
  • 3. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Biometric identification using augmented database (Regina Lionnie) 105 All original images and augmented images were 203x352 in pixels. The skin color extraction in this research ran on two color spaces, HSV and YCbCr that was studied before in [9]. These color spaces worked best for extracting human skin color component. Both HSV and YCbCr are the color spaces that separate luminance and chrominance components. It is shown that pixels with the range of human skin color have similarity in chrominance component and it is best to discriminate color of skin and not skin area [13]. The rules of HSV skin color area extraction is shown in (3) while the YCbCr in (4) [9]. The extraction process removed the background (area that was not detected as human skin color) and replaced it with black and white color. S > 0.35 (3) 101 < Cb < 125 130 < Cr < 155 (4) 2.2. Scale-space with Hierarchical Gaussian Filter By building scale-space of an image, it permits us to analyse an image at multi resolutions [14]. The different resolution improves the system of identification by representing original images in different scale. The idea behind Gaussian scale-space [15] is to filter the original image with Gaussian function of desired width and decimates the last output from the filter process to start again as the next scale from the same image. The process began with convolving the input image with Gaussian function with the width ๐œŽ as it can be seen in (5) until (8). These equations can be seen in more detail explanation in previous work in [8]. The width of the Gaussian was๐œŽ0 = 1.6 and ๐œŽ๐‘  = 0.5 as it was used before in [8], [16]. The total level for this research was V=3 while vvaried in each level. There were also 4 octaves (U) that was constructed. In one octave, the image was convolved by the Gaussian with the width in (7) and (8). If it reached the last level, the octave went higher and the base level for the next level was to decimate the image by the factor of 2. The process continued until it reached the 4th octave with the 3rd level. The process of building Gaussian scale space can be seen in Figure 3 below. For the base octave (u=0) and level (v=0), the input image was convolved by Gaussian with the width in (7). To create the next level (v=1,2,3) within the same octave (u=0), the base level was convolved with the Gaussian with the width in (8). For the base level in the next octave, the process just decimated (by the factor of two) the last level from the previous octave and did not convolve the image with the Gaussian. To build the next level (v=1,2,3) for the next octave (uโ‰  0), the image on the base level in each octave was convolved with the Gaussian with the width in (8). Figure 3. Building the scale-space [8] G(m,n,ฯƒ) = H(m,n,ฯƒ) โˆ— I(m,n) (5)
  • 4. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol.17, No. 1, February 2019: 103-109 106 H(m,n,ฯƒ) = 1 2ฯ€ฯƒ e โˆ’ (m2+n2) 2ฯƒ2 (6) ฯƒ0ฬ‚ = โˆšฯƒ0 2 โˆ’ ฯƒs 2 (7) ฯƒvฬ‚ = ฯƒ0. โˆš22v/V โˆ’ 1 (8) In [8], the authors adopted the method Hierarchical Gaussian Scale-Space for androgenic hair pattern recognition. There were 400 original varied images were studied without any augmented images. In this research the same method was applied to study the performance of the augmented images in the data base for a limited data recognition system. 2.3. Matching Algorithm The matching algorithm in this research employed the nearest distance calculation using Euclidean distance. It matched the closest data of testing set to the training set. The configuration of the testing set and the training set are illustrated in Figure 4. Both testing and training images were augmented for 39 augmented images for each original image. When the testing image was being processed, the augmented images derived from the testing set were not included into the system while the 39 augmented images each from remaining 49 images of training images and the original 49 images themselves were included into the matching process. The total testing set for one matching process was 1 image while the training set was 49x39 augmented images+49 original images=1.960 images. There were 50 matching processes in total. Figure 4. The configuration of training and testing set 3. Results and Analysis The results are shown in Table 1 and Figure 5 and Figure 6. Table 1 presents the recognition system precision in percentage of how much accurate the system identifies the testing images to the right class of training images. The alphabet on each row represents the type of the dataset meanwhile the number on each column represents the type of augmented data base that were created. All type of databases were 2000 images in total with 50 original images and 1950 augmented images. The A and B types means the database with the variety of original images with different pose, lighting condition, background different noise. The number 1 until 5 for type A and B means the original augmented database for A1 and B1, the skin extracted using HSV rule from (3) with black background for A2 and B2 and white background for A3 and B3, the skin extracted using YCbCr rule from (4) with black background for A4 and B4 and white background for A5 and B5. Meanwhile type C until L is the database of scale-space from A1 to B5 with 4 octaves and 3 levels of hierarchical Gaussian scale-space. The C1-C13 is the scale-space images from A1 with C1 is the base octave and base level and C13 is the 4th octave and the 3rd level. The L1-L13 is the scale-spaces images from B5 with L1 is the base octave and base level and L13 is the 4th octave and the 3rd level.
  • 5. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Biometric identification using augmented database (Regina Lionnie) 107 Figure 5. The precision recognition system with augmented database and scale-space Figure 6. The performance comparison for augmented database Figure 5 describes the performance result focuses on the scale-space by Gaussian function on each octave and level. The horizontal axis gives the information about the type of level and octaves. Axis one means base octave and level while axis 13 means last octave and last level. Meanwhile different type of line gives the information about the database type. Figure 6 shows the performance comparison for the best recognition result from each type of data base. From Figure 5 and Figure 6, we can see the performance of scale-space images to the recognition system. The performance of recognition using the scale-space database (C-L) was better than using the database only with augmented images (A-B). The best performance result came from using the base octave and the level 4th database images with the type augmentation D4, F4 and K4 which was 70%. The D4, F4 and K4 types of database were respectively the scale-space version of the A2, A4 and B4 from the base octave and the last level. The recognition precision from A2, A4 and B4 were 42%, 24% and 24% respectively. The A2 database was the database of augmented images with skin extraction from the background using the rule (3) of HSV color space. The background of non-human skin color was converted into black color. The A4 database was the database of augmented images with also skin extraction background process but with the rule (4) from YCbCr color space. The background of non-human skin color was also converted into black color. Meanwhile, the B4 database was also augmented database but with different type of noise compare to A database with human skin color extraction process using YCbCr in rule (4) and converted into black color.
  • 6. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol.17, No. 1, February 2019: 103-109 108 Table 1. Recognition Precision for Augmented Database Recognition Precision (%) 1 2 3 4 5 6 7 8 9 10 11 12 13 A 12 42 10 24 12 - - - - - - - - B 14 46 8 24 14 - - - - - - - - C 50 52 56 60 48 48 46 46 46 46 46 46 46 D 68 68 68 70 56 56 56 56 54 54 52 50 50 E 26 26 26 28 46 46 46 46 44 44 42 42 40 F 66 68 70 70 56 56 56 56 54 54 52 52 52 G 26 26 26 28 46 46 46 46 44 44 42 40 40 H 48 52 56 60 48 48 46 46 44 44 44 46 46 I 66 68 68 68 58 58 56 56 54 54 54 50 50 J 28 28 28 30 48 48 46 46 44 44 46 42 40 K 66 68 70 70 58 58 56 56 54 54 54 52 52 L 28 28 28 30 48 48 46 46 44 44 44 42 40 From here, we examined that the best recognition rate came from the images from the same octave in the scale-space which meant that the decimation process to create the next octave lowered the recognition rate. The process to decimate the image or to lower the resolution of the image took adverse effect to the recognition system. Especially from Figure 5, we can see this as the abrupt changes from 4 to 5 on the database type C, D, F, H, I and K. While for the database type E, G, J and L, the decimation process of going from the base octave to the next octave by changing the image resolution took advantage for the recognition system. This was studied as the effect of the removal of background of non-human skin color and changed it to white color. The white color needed the decimation process and reduced the images in resolution to give the beneficial effect to the recognition system. The case for database type E, G J and L although did not produce recognition rate as high as the type C, D, F, H, I and K. Figure 7 shows the example of augmented images for each database. As it was explained earlier, there were 39 augmented images in each type of database. After further investigation, we found that the type of the augmented images that gave the closest match to the testing processes were mostly the type of the images with the augmented process of intensity adjustment and with rotation transformation. Figure 7. The Examples of 39 Augmented Images from Type A and B Database In [11], the authors studied the performance of several methods for limited data recognition system. It was shown that the SIFT algorithm was the best method and gave higher performance of recognition precision which was 38% compared to Haar wavelet transformation, principal component analysis and hierarchical Gaussian scale-space which each of them produced around 30-32%. The total images that were studied in the research were 50 images with one testing image and one training image only from the same class / person. By developing the augmented database for the recognition system, we experimented on the images and multiplied the numbers into 39 times bigger. The recognition precision with the augmented database went more than two times higher than the recognition system with limited training
  • 7. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Biometric identification using augmented database (Regina Lionnie) 109 data. The obstacle for getting higher precision was coming from choosing the type of augmented process that used in the recognition system. 4. Conclusion In this research, the augmented databases were created with different type of human skin color extraction by employing HSV, YCbCr color spaces and scale-space using Gaussian function. The best recognition performance which was 70%, obtained from D4, F4 and K4, the database that scaled-spaces the images with base octave and 4th level of Gaussian function and was extracted the human skin color component using HSV and YCbCr and changed it into the black background images. The decimation process of reducing the resolution of images in the scale-space structures gave adverse effect on the black background extracted human skin color. On the contrary, it gave beneficial effect on white background extracted human skin color. The type of augmented process that produced the best recognition mostly from intensity adjustment process and rotation transformation. The augmented database compared to limited data recognition system resulted in advantageous outcome on the recognition performance. It improves the precision rate until more than 2 times higher. Acknowledgement This work was supported by Indonesia Ministry of Research, Technology and Higher Education, RISTEKDIKTI 2018 Research Fund. References [1] Tariq A, Akram M U. Personal identification using ear recognition. TELKOMNIKA Telecommunication Computing Electronics and Control. 2012; 10(2): 321-326. [2] Jain AK. Editor. Handbook of Biometrics. Springer. 2008. [3] Su H, Kong A W K. A Study on Low Resolution Androgenic Hair Patterns for Criminal and Victim Identification. IEEE Transactions on Information Forensics and Security. 2014; 9(4): 666-680. [4] Palastanga N, Soames R. Anatomy and Human Movement: Structure and Function. Sixth Edition. Elsevier Churchill Livingstone. 2012: 541. [5] Chan F K S, Kong AWK. Using Hair Follicles with Leg Geometry to Align Androgenic Hair Patterns. Intelligence and Security Informatics Conference. Manchester. 2015: 137-140. [6] Lionnie R, Alaydrus M. An Analysis of Haar Wavelet Transform for Androgenic Hair Pattern Recognition. Proceedings of The First International Conference on Informatics and Computing. Lombok. 2016. [7] Lionnie R, Alaydrus M. Biometric Identification System based on Principal Component Analysis. Proceedings of The 12th IMT-GT International Conference on Mathematics, Statistics and Their Applications. Banda Aceh. 2016. [8] Lionnie R, Alaydrus M. Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition. TELKOMNIKA Telecommunication Computing Electronics and Control. 2017; 15(1): 522-530. [9] Lionnie R, Alaydrus M. A comparison of human skin color detection for biometrie identification. Broadband Communication, Wireless Sensors and Powering (BCWSP), 2017 International Conference. 2017: 1-5. [10] Chan F K S, Kong AWK. A further study of low resolution androgenic hair patterns as a soft biometric trait. Image and Vision Computing. 2017. [11] Lionnie, R. Androgenic Hair Recognition For Biometric Identification. Master Thesis. Jakarta: Postgraduate UMB; 2017. [12] Solomon B. Linear Algebra Geometry and Transformation. CRC Press. 2015. [13] Anwar N, Kit CW, John S. RGB-H-CbCr Skin Colour Model for Human Face Detection. Proceedings of the MMU International Symposium on Information & Communications Technologies. Petaling Jaya. 2006. [14] Sporring J, Nielsen M, Florack L and Johansen P. Editors. Gaussian Scale Space Theory. Springer. 1997. [15] Lindeberg T. Scale-Space Theory in Computer Vision. Kluwer Academic Publishers. 1994: 48. [16] Lowe DG. Distinctive Image Features from Scale-Invariant Keypoints. International Journal of Computer Vision. 2004; 60(2): 91-110.