SlideShare a Scribd company logo
1 of 28
+
Vito Gentile, Alessandro Bruno, Marco La Cascia
{vito.gentile,alessadro.bruno15,marco.lacascia}@unipa.it
Dipartimento di Ingegneria Chimica, Gestionale, Informatica, Meccanica
Università degli Studi di Palermo
Italy
+
Introduction
! The representation of palmprint is still an
open issue
! Main topics of this talk:
! A simple, efficient, and accurate palmprint
principal lines extraction method (six steps
method)
! How we aim to use these features in our future
works
+
Palmprint based biometry
!  Palmprint-based biometric technology generally is
composed of two steps: feature extraction and recognition
!  Image features are extracted and collected as input vector
while the remaining step is to recognize or classify that
vector into the suitable class to identify people
!  We focused our attention on first step, more precisely, on
principal palm lines extraction
+
Pipeline of our algorithm
!  The method consists of six steps:
! 1) normalization,
! 2) median filtering;
! 3) average filters (along 0°, 45°, 90°, 135°
directions);
! 4) grayscale bottom-hat filtering;
! 5) combinations of bottom-hat operations;
! 6) binarization and post processing.
+
Sample Images
!  The ROI (region of interest) image is the central part of the
hand palm.
!  We select the blue channel which showed best results,
compared to other choices
!  128 x 128 spatial resolution and 256 gray levels
(8 bit)
+
ROI Images
All the highlighted principal lines are oriented along directions
between 15° and 165°
+1. Normalization
2. Median Filter
3. Fi Filters
4. Grayscale bottom-hat
operation
5. Combination of
bottom-hat operations
6. Normalization
7. Binarization
8. Post Processing
+
1. Normalization
!  The normalization aims to minimize the differences among
the contrast of input Images.
Input Image Output Image
The contrast is stretched
+
2. Median Filter
!  To clean up the image, we use a median filter instead of a low
pass filter.
!  Why Median Filter?
!  minor effect on detail smoothing with respect to a low pass one,
while still reducing the salt and pepper noise, removing spikes.
+
3. Fi Filters
!  Four average filters along four directions (0°,45°,90°,135°)
that we call F0, F45, F90 and F135
+
3. Fi Filters
!  ImgX is filtered along the direction at X degrees from the
horizontal.
Img0 Img45
Img90
Img135
• Median filter is not applied to all images;
• Only to Img0, that is filtered with F0;
• At (0°) direction, rarely there are significant lines to be highlited
+
3. Fi Filters
!  OutX is the filtered ImgX along the direction at X degrees
from the horizontal.
Out0
Out90
Out45
Out135
+
4. Bottom-hat Operation
!  Bottom hat filtering is tipically used for binary images;
(1)
(2)
Subtracting the original image from the closing of it (from
morphological viewpoint)
Si(j,k) represent the value at (j,k) of the structural
element used for each operation.
+
4. Bottom-hat filtering (BHF)
!  The result of bottom-hat operation is a low key image
Out0 BHF0
+
!  We need to combine bottom-hat operations and product a
single image, that sum up the results included in each image.
!  To this end, we decided to compute the average of the four
images
BHF0 BHF45
BHF90 BHF135
5. Combining bottom-hat operations
+
!  The result of combination of bottom-hat filterings is a low
key image (very noisy)
!  To improve the binarization we apply the eq. (3):
(3)
M is the mean value of the whole image, and k is a scaling coefficient
5. Combining bottom-hat operations
+
6. Thresholding & Binarization
!  Binarization can be summarized with the following formula.
!  Simple threshold method for the binarization (Threshold
Value = M)
(4)
ImgBW(x,y)
+
7. Post processing
!  Simple Post processing is used to remove all the white and
isolated spikes (and blocks) in the image:
!  Non-linear filter removing white, isolated spikes;
!  For each pixel ImgBW(x,y), consider a 5x5 matrix
centered on it.
!  If the first and last columns and rows contains only black
pixels, set all pixels of the matrix to be black (0).
Binarized Image Post processed Image
+
Experimental Results
Binarized Image Post processed ImageInput Image
+
Experimental Results
!  The dataset consists of 1000 images, taken from CASIA, COEP
and randomly from internet;
!  the groundtruth consists of 1000 binary hand labeled palmprint
images
!  Test Images are 128 x128 grayscale images.
!  Output of the system is a binary image
!  Comparisons with 3 state of the art methods
+
Experimental Results
!  True Positives, False Positives, False Negatives are evaluated
with respect to the ground truth (binary hand labeled palmprint
images)
!  The evaluation of the performance of the approach is done by
using statistical indices, such as Precision (P), Recall (R),
F-measure (F):
!  MD is the binary version of the detected palmprint map, while
MR is the binary version of the reference hand labeled principal
lines (ground truth).
(5) (6) (7)
+
Experimental Results
+
Future Works:
palmprint-based identification
!  We aim to integrate our algorithm in a recognizer system
1.  Store users’ palmprint-based features in a database
2.  Use a template matching algorithm for the identification
!  Palm print identification seeks to answer the question “who is
this person?” by examining his or her palm print.
!  User’s palm lines are matched against each ones stored in the
database and the most similar template is obtained as the
identification result
+
Future Works:
palmprint-based identification
!  Template matching: which distance measure?
!  Hausdorff distance: a non-linear operator which measures the
mismatch of the two sets.
+
+
Conclusions
!  The method we proposed is simple, efficient and accurate
with respect to some state of the art method;
!  Precision, Recall, F-measure values are encouraging enough
to extend the test to the full dataset;
!  Other Future Works:
!  improvement of post processing for a better accuracy
+
References
!  Our method:
Bruno,A.,Carminetti,P.,Gentile,V.,La Cascia,M.,& Mancino,E.
(2014,October).Palmprint principal lines extraction.In
Biometric Measurements and Systems for Security and Medical
Applications (BIOMS) Proceedings,2014 IEEEWorkshop on
(pp.50-56).IEEE
!  Template matching based on Hausdorff distance:
You,J.,Li,W.,& Zhang,D.(2002).Hierarchical palmprint
identification via multiple feature extraction.Pattern
recognition,35(4),847-859
!  Palm line matching:
Wu,X.,Zhang,D.,&Wang,K.(2006).Palm line extraction and
matching for personal authentication.Systems,Man and
Cybernetics,Part A: Systems and Humans,IEEE Transactions on,
36(5),978-987.
+
Thanks for your attention

More Related Content

What's hot (6)

Topology
TopologyTopology
Topology
 
54328034 vector-set2-2011
54328034 vector-set2-201154328034 vector-set2-2011
54328034 vector-set2-2011
 
A Probabilistic U-Net for Segmentation of Ambiguous Images
A Probabilistic U-Net for Segmentation of Ambiguous ImagesA Probabilistic U-Net for Segmentation of Ambiguous Images
A Probabilistic U-Net for Segmentation of Ambiguous Images
 
Morphological operations
Morphological operationsMorphological operations
Morphological operations
 
2D viewing & clipping
2D viewing & clipping2D viewing & clipping
2D viewing & clipping
 
Combing 3 d gesture with touch interface on mobile devices v2
Combing 3 d gesture with touch interface on mobile devices v2Combing 3 d gesture with touch interface on mobile devices v2
Combing 3 d gesture with touch interface on mobile devices v2
 

Similar to Features extraction for palmprint-based identification

Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
Paras Garg
 
DSP presentation_latest
DSP presentation_latestDSP presentation_latest
DSP presentation_latest
Haowei Jiang
 
Ijarcet vol-2-issue-7-2262-2267
Ijarcet vol-2-issue-7-2262-2267Ijarcet vol-2-issue-7-2262-2267
Ijarcet vol-2-issue-7-2262-2267
Editor IJARCET
 
Ijarcet vol-2-issue-7-2262-2267
Ijarcet vol-2-issue-7-2262-2267Ijarcet vol-2-issue-7-2262-2267
Ijarcet vol-2-issue-7-2262-2267
Editor IJARCET
 

Similar to Features extraction for palmprint-based identification (20)

"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
 
How do self driving cars detects lane lines so easily
How do self driving cars detects lane lines so easilyHow do self driving cars detects lane lines so easily
How do self driving cars detects lane lines so easily
 
Edge Detection Using Fuzzy Logic
Edge Detection Using Fuzzy LogicEdge Detection Using Fuzzy Logic
Edge Detection Using Fuzzy Logic
 
Face Detection and Recognition Using Back Propagation Neural Network and Four...
Face Detection and Recognition Using Back Propagation Neural Network and Four...Face Detection and Recognition Using Back Propagation Neural Network and Four...
Face Detection and Recognition Using Back Propagation Neural Network and Four...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
FPGA Implementation of Decision Based Algorithm for Removal of Impulse Noise
FPGA Implementation of Decision Based Algorithm for Removal of Impulse NoiseFPGA Implementation of Decision Based Algorithm for Removal of Impulse Noise
FPGA Implementation of Decision Based Algorithm for Removal of Impulse Noise
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
Bangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodBangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection Method
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
 
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
Gesture Recognition Based Video Game Controller
Gesture Recognition Based Video Game ControllerGesture Recognition Based Video Game Controller
Gesture Recognition Based Video Game Controller
 
DSP presentation_latest
DSP presentation_latestDSP presentation_latest
DSP presentation_latest
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
 
Tracking number plate from vehicle using
Tracking number plate from vehicle usingTracking number plate from vehicle using
Tracking number plate from vehicle using
 
Data hiding using image interpolation
Data hiding using image interpolationData hiding using image interpolation
Data hiding using image interpolation
 
Techniques of Brain Cancer Detection from MRI using Machine Learning
Techniques of Brain Cancer Detection from MRI using Machine LearningTechniques of Brain Cancer Detection from MRI using Machine Learning
Techniques of Brain Cancer Detection from MRI using Machine Learning
 
Ijarcet vol-2-issue-7-2262-2267
Ijarcet vol-2-issue-7-2262-2267Ijarcet vol-2-issue-7-2262-2267
Ijarcet vol-2-issue-7-2262-2267
 
Ijarcet vol-2-issue-7-2262-2267
Ijarcet vol-2-issue-7-2262-2267Ijarcet vol-2-issue-7-2262-2267
Ijarcet vol-2-issue-7-2262-2267
 

Recently uploaded

21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
benjamincojr
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
BalamuruganV28
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 

Recently uploaded (20)

Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 

Features extraction for palmprint-based identification

  • 1. + Vito Gentile, Alessandro Bruno, Marco La Cascia {vito.gentile,alessadro.bruno15,marco.lacascia}@unipa.it Dipartimento di Ingegneria Chimica, Gestionale, Informatica, Meccanica Università degli Studi di Palermo Italy
  • 2. + Introduction ! The representation of palmprint is still an open issue ! Main topics of this talk: ! A simple, efficient, and accurate palmprint principal lines extraction method (six steps method) ! How we aim to use these features in our future works
  • 3. + Palmprint based biometry !  Palmprint-based biometric technology generally is composed of two steps: feature extraction and recognition !  Image features are extracted and collected as input vector while the remaining step is to recognize or classify that vector into the suitable class to identify people !  We focused our attention on first step, more precisely, on principal palm lines extraction
  • 4. + Pipeline of our algorithm !  The method consists of six steps: ! 1) normalization, ! 2) median filtering; ! 3) average filters (along 0°, 45°, 90°, 135° directions); ! 4) grayscale bottom-hat filtering; ! 5) combinations of bottom-hat operations; ! 6) binarization and post processing.
  • 5. + Sample Images !  The ROI (region of interest) image is the central part of the hand palm. !  We select the blue channel which showed best results, compared to other choices !  128 x 128 spatial resolution and 256 gray levels (8 bit)
  • 6. + ROI Images All the highlighted principal lines are oriented along directions between 15° and 165°
  • 7. +1. Normalization 2. Median Filter 3. Fi Filters 4. Grayscale bottom-hat operation 5. Combination of bottom-hat operations 6. Normalization 7. Binarization 8. Post Processing
  • 8. + 1. Normalization !  The normalization aims to minimize the differences among the contrast of input Images. Input Image Output Image The contrast is stretched
  • 9. + 2. Median Filter !  To clean up the image, we use a median filter instead of a low pass filter. !  Why Median Filter? !  minor effect on detail smoothing with respect to a low pass one, while still reducing the salt and pepper noise, removing spikes.
  • 10. + 3. Fi Filters !  Four average filters along four directions (0°,45°,90°,135°) that we call F0, F45, F90 and F135
  • 11. + 3. Fi Filters !  ImgX is filtered along the direction at X degrees from the horizontal. Img0 Img45 Img90 Img135 • Median filter is not applied to all images; • Only to Img0, that is filtered with F0; • At (0°) direction, rarely there are significant lines to be highlited
  • 12. + 3. Fi Filters !  OutX is the filtered ImgX along the direction at X degrees from the horizontal. Out0 Out90 Out45 Out135
  • 13. + 4. Bottom-hat Operation !  Bottom hat filtering is tipically used for binary images; (1) (2) Subtracting the original image from the closing of it (from morphological viewpoint) Si(j,k) represent the value at (j,k) of the structural element used for each operation.
  • 14. + 4. Bottom-hat filtering (BHF) !  The result of bottom-hat operation is a low key image Out0 BHF0
  • 15. + !  We need to combine bottom-hat operations and product a single image, that sum up the results included in each image. !  To this end, we decided to compute the average of the four images BHF0 BHF45 BHF90 BHF135 5. Combining bottom-hat operations
  • 16. + !  The result of combination of bottom-hat filterings is a low key image (very noisy) !  To improve the binarization we apply the eq. (3): (3) M is the mean value of the whole image, and k is a scaling coefficient 5. Combining bottom-hat operations
  • 17. + 6. Thresholding & Binarization !  Binarization can be summarized with the following formula. !  Simple threshold method for the binarization (Threshold Value = M) (4) ImgBW(x,y)
  • 18. + 7. Post processing !  Simple Post processing is used to remove all the white and isolated spikes (and blocks) in the image: !  Non-linear filter removing white, isolated spikes; !  For each pixel ImgBW(x,y), consider a 5x5 matrix centered on it. !  If the first and last columns and rows contains only black pixels, set all pixels of the matrix to be black (0). Binarized Image Post processed Image
  • 19. + Experimental Results Binarized Image Post processed ImageInput Image
  • 20. + Experimental Results !  The dataset consists of 1000 images, taken from CASIA, COEP and randomly from internet; !  the groundtruth consists of 1000 binary hand labeled palmprint images !  Test Images are 128 x128 grayscale images. !  Output of the system is a binary image !  Comparisons with 3 state of the art methods
  • 21. + Experimental Results !  True Positives, False Positives, False Negatives are evaluated with respect to the ground truth (binary hand labeled palmprint images) !  The evaluation of the performance of the approach is done by using statistical indices, such as Precision (P), Recall (R), F-measure (F): !  MD is the binary version of the detected palmprint map, while MR is the binary version of the reference hand labeled principal lines (ground truth). (5) (6) (7)
  • 23. + Future Works: palmprint-based identification !  We aim to integrate our algorithm in a recognizer system 1.  Store users’ palmprint-based features in a database 2.  Use a template matching algorithm for the identification !  Palm print identification seeks to answer the question “who is this person?” by examining his or her palm print. !  User’s palm lines are matched against each ones stored in the database and the most similar template is obtained as the identification result
  • 24. + Future Works: palmprint-based identification !  Template matching: which distance measure? !  Hausdorff distance: a non-linear operator which measures the mismatch of the two sets.
  • 25. +
  • 26. + Conclusions !  The method we proposed is simple, efficient and accurate with respect to some state of the art method; !  Precision, Recall, F-measure values are encouraging enough to extend the test to the full dataset; !  Other Future Works: !  improvement of post processing for a better accuracy
  • 27. + References !  Our method: Bruno,A.,Carminetti,P.,Gentile,V.,La Cascia,M.,& Mancino,E. (2014,October).Palmprint principal lines extraction.In Biometric Measurements and Systems for Security and Medical Applications (BIOMS) Proceedings,2014 IEEEWorkshop on (pp.50-56).IEEE !  Template matching based on Hausdorff distance: You,J.,Li,W.,& Zhang,D.(2002).Hierarchical palmprint identification via multiple feature extraction.Pattern recognition,35(4),847-859 !  Palm line matching: Wu,X.,Zhang,D.,&Wang,K.(2006).Palm line extraction and matching for personal authentication.Systems,Man and Cybernetics,Part A: Systems and Humans,IEEE Transactions on, 36(5),978-987.
  • 28. + Thanks for your attention