SlideShare a Scribd company logo
TELKOMNIKA, Vol.17, No.1, February 2019, pp. 103~109
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI:10.12928/TELKOMNIKA.v17i1.11713 103
Received May 30, 2018; Revised October 24, 2018; Accepted November 26, 2018
Biometric identification using augmented database
Regina Lionnie*1
, Ellisa Agustina2
, Wahju Sediono3
, Mudrik Alaydrus4
1,2,3,4
Department of Electrical Engineering, Universitas Mercu Buana Jakarta,
Jalan Menteng Raya No. 29, Jakarta Pusat, Indonesia
3
Department of Mechatronics Engineering, Kulliyyah of Engineering,
International Islamic University Malaysia, Jalan Gombak, 53100 Kuala Lumpur, Malaysia
*Corresponding author, e-mail: regina.lionnie@mercubuana.ac.id1
, ellisa.agustina@gmail.com2
,
wsediono@iium.edu.my3
, mudrikalaydrus@mercubuana.ac.id4
Abstract
Androgenic hair pattern is one of the newest soft biometric trait that can be used to identify
criminals when their faces are covered in the evidences of criminal investigation. In real-life situation,
sometimes the available evidence is limited thus creating problems for authorities to identify criminal based
on the limited data. This research developed the recognition system to identify individuals based on their
androgenic hair pattern in a limited data situation in such a way that the limited images were expanded by
the augmentation process. There were 50 images studied and expanded into 2.000 images from the
augmentation process of rotating, reflecting, adjusting color and intensity. Furthermore, the effect of human
skin color extraction was investigated by employing HSV and YCbCr color spaces. The scale-space
hierarchy was built among the images with Gaussian function and produced 70% recognition precision that
was around more than 2 times higher compared to system of recognition with only limited data.
Keywords: androgenic hair pattern, augmented data, biometric identification, hierarchical Gaussian
scale-space, limited training
Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
Biometrics is the knowledge to certify the identity of people based on their physiological,
chemical and behavioral characteristics [1-2]. The purpose of biometrics discussed in this
research was to identify criminals based on their androgenic hair pattern. The androgenic hair
pattern became popular since it was first introduced as the soft biometric trait in [3]. Androgenic
hair is the hair that grows on human body since a person reaches his or her puberty era and is
influenced by androgens hormone [4].
When the evidence of criminals’ identity such as their face are captured in the digital
pictures and videos, they may be covered and thus creating problems for the authorities to do
the identification procedure. Normally, parts of their hands and legs are not covered and they
turn into a potential information to be learnt. Furthermore, the limited numbers of evidence arise
as other issues to be solved. There have been pursuits to overcome these two difficulties.
In [3], [5] the authors started to study the pattern by using the Gabor orientation histogram.
In [6-8], the authors applied transformation such as wavelet Haar, principal component analysis
and hierarchical Gaussian scale space as a method to help the recognize the androgenic hair
pattern and to produce better recognition precision. The results were produced by analyzing 400
images in the database. These studies are not for recognition system with limited dataset.
Though the rate of precisions is quite satisfactory, the case in the real-life situation of limited
data are not yet implemented in the recognition system. In [9], the performance of color spaces
was investigated to extract human skin color area. In order to improve the recognition rate, the
rules of extracting human skin color area by using color spaces such as RGB, HSV, YCbCr, CIE
Lab and YIQ were studied. In [10], the authors applied class-specific partial least squares (PLS)
models to utilize the features of androgenic hair pattern. The research on androgenic hair
pattern is expanding and in the next development in [11], the authors learned to develop the
recognition system based on real-life situation and limited the data for the system.
This research attempted to design a recognition system to identify individuals based on
their androgenic hair pattern in a limited data situation in such a way that the limited images
were expanded by the augmentation process. The scale-space hierarchy was built among the
 ISSN: 1693-6930
TELKOMNIKA Vol.17, No. 1, February 2019: 103-109
104
augmented images by using Gaussian function. Moreover, we also studied the effect of HSV
and YCbCr color spaces to the augmented data to extract human skin color area in the images.
The rest of this paper is defined as follow: section 2 describes the research method conducted
in this paper. In section 3, the results are discussed and analyzed. Finally, conclusion is
summed up in section 4.
2. Research Method
The research method implemented in this research was built based upon three parts
processes. The first part was to build the augmented data base from limited data in the system.
The second part was to build the scaling hierarchical structure using Gaussian filter and the
third part was to find the closest matching of the training and the testing data. Figure 1 below
explains the three part processes of research method executed in this research.
Figure 1. Research method for biometric identification
2.1. Augmented Database
In real life condition, sometimes there are limited data that can be acquired. The limited
data explains as only a few images acquired for the same person from the acquiring device
such as digital camera. In this research there were only two images from the same person in the
system. The two images varied in pose, lighting condition, angle, background information and
noise. There were 25 male respondents with two images each, there were total 50 images in the
early limited data base. In this research, the data augmentation technique was applied to the
limited data base, producing more images derived from the original one. The technique to
augment the data was based on geometric transformation such as rotation (1), reflection (2),
color adjustment and intensity adjustment [12]. The color adjustment limits and enhances the
contrast of the images while the intensity adjustment is proposed to make the images darker
than earlier.
[
𝑚2
𝑛2
] = [
𝑐𝑜𝑠𝜃 −𝑠𝑖𝑛𝜃
𝑠𝑖𝑛𝜃 𝑐𝑜𝑠𝜃
] [
𝑚1
𝑛1
] (1)
[
𝑚2
𝑛2
] = [
−1 0
0 1
] [
𝑚1
𝑛1
] (2)
The two original images in the early database were divided into training and testing
images. The augmented data were derived from both division but the augmented images from
testing images were notincluded to the training phase. There were 39 augmented images from 1
original image. Figure 2 describes the augmented process that took place in this research.
Figure 2. Data augmentation process
Scale-Space Matching
Identification System
Precision of
System
Limited
Data
Augmented
Database
TELKOMNIKA ISSN: 1693-6930 
Biometric identification using augmented database (Regina Lionnie)
105
All original images and augmented images were 203x352 in pixels. The skin color
extraction in this research ran on two color spaces, HSV and YCbCr that was studied before
in [9]. These color spaces worked best for extracting human skin color component. Both HSV
and YCbCr are the color spaces that separate luminance and chrominance components. It is
shown that pixels with the range of human skin color have similarity in chrominance component
and it is best to discriminate color of skin and not skin area [13]. The rules of HSV skin color
area extraction is shown in (3) while the YCbCr in (4) [9]. The extraction process removed the
background (area that was not detected as human skin color) and replaced it with black and
white color.
S > 0.35 (3)
101 < Cb < 125
130 < Cr < 155 (4)
2.2. Scale-space with Hierarchical Gaussian Filter
By building scale-space of an image, it permits us to analyse an image at multi
resolutions [14]. The different resolution improves the system of identification by representing
original images in different scale. The idea behind Gaussian scale-space [15] is to filter the
original image with Gaussian function of desired width and decimates the last output from the
filter process to start again as the next scale from the same image.
The process began with convolving the input image with Gaussian function with the
width 𝜎 as it can be seen in (5) until (8). These equations can be seen in more detail
explanation in previous work in [8]. The width of the Gaussian was𝜎0 = 1.6 and 𝜎𝑠 = 0.5 as it
was used before in [8], [16]. The total level for this research was V=3 while vvaried in each
level. There were also 4 octaves (U) that was constructed. In one octave, the image was
convolved by the Gaussian with the width in (7) and (8). If it reached the last level, the octave
went higher and the base level for the next level was to decimate the image by the factor of 2.
The process continued until it reached the 4th octave with the 3rd level. The process of building
Gaussian scale space can be seen in Figure 3 below. For the base octave (u=0) and level
(v=0), the input image was convolved by Gaussian with the width in (7). To create the next level
(v=1,2,3) within the same octave (u=0), the base level was convolved with the Gaussian with
the width in (8). For the base level in the next octave, the process just decimated (by the factor
of two) the last level from the previous octave and did not convolve the image with the
Gaussian. To build the next level (v=1,2,3) for the next octave (u≠ 0), the image on the base
level in each octave was convolved with the Gaussian with the width in (8).
Figure 3. Building the scale-space [8]
G(m,n,σ) = H(m,n,σ) ∗ I(m,n) (5)
 ISSN: 1693-6930
TELKOMNIKA Vol.17, No. 1, February 2019: 103-109
106
H(m,n,σ) =
1
2πσ
e
−
(m2+n2)
2σ2
(6)
σ0̂ = √σ0
2
− σs
2 (7)
σv̂ = σ0. √22v/V − 1 (8)
In [8], the authors adopted the method Hierarchical Gaussian Scale-Space for
androgenic hair pattern recognition. There were 400 original varied images were studied without
any augmented images. In this research the same method was applied to study the
performance of the augmented images in the data base for a limited data recognition system.
2.3. Matching Algorithm
The matching algorithm in this research employed the nearest distance calculation
using Euclidean distance. It matched the closest data of testing set to the training set. The
configuration of the testing set and the training set are illustrated in Figure 4. Both testing and
training images were augmented for 39 augmented images for each original image. When the
testing image was being processed, the augmented images derived from the testing set were
not included into the system while the 39 augmented images each from remaining 49 images of
training images and the original 49 images themselves were included into the matching process.
The total testing set for one matching process was 1 image while the training set was 49x39
augmented images+49 original images=1.960 images. There were 50 matching processes in
total.
Figure 4. The configuration of training and testing set
3. Results and Analysis
The results are shown in Table 1 and Figure 5 and Figure 6. Table 1 presents the
recognition system precision in percentage of how much accurate the system identifies the
testing images to the right class of training images. The alphabet on each row represents the
type of the dataset meanwhile the number on each column represents the type of augmented
data base that were created. All type of databases were 2000 images in total with 50 original
images and 1950 augmented images. The A and B types means the database with the variety
of original images with different pose, lighting condition, background different noise. The number
1 until 5 for type A and B means the original augmented database for A1 and B1, the skin
extracted using HSV rule from (3) with black background for A2 and B2 and white background
for A3 and B3, the skin extracted using YCbCr rule from (4) with black background for A4 and
B4 and white background for A5 and B5. Meanwhile type C until L is the database of
scale-space from A1 to B5 with 4 octaves and 3 levels of hierarchical Gaussian scale-space.
The C1-C13 is the scale-space images from A1 with C1 is the base octave and base level and
C13 is the 4th octave and the 3rd level. The L1-L13 is the scale-spaces images from B5 with L1
is the base octave and base level and L13 is the 4th octave and the 3rd level.
TELKOMNIKA ISSN: 1693-6930 
Biometric identification using augmented database (Regina Lionnie)
107
Figure 5. The precision recognition system with augmented database and scale-space
Figure 6. The performance comparison for augmented database
Figure 5 describes the performance result focuses on the scale-space by Gaussian
function on each octave and level. The horizontal axis gives the information about the type of
level and octaves. Axis one means base octave and level while axis 13 means last octave and
last level. Meanwhile different type of line gives the information about the database type.
Figure 6 shows the performance comparison for the best recognition result from each type of
data base.
From Figure 5 and Figure 6, we can see the performance of scale-space images to the
recognition system. The performance of recognition using the scale-space database (C-L) was
better than using the database only with augmented images (A-B). The best performance result
came from using the base octave and the level 4th database images with the type augmentation
D4, F4 and K4 which was 70%. The D4, F4 and K4 types of database were respectively the
scale-space version of the A2, A4 and B4 from the base octave and the last level. The
recognition precision from A2, A4 and B4 were 42%, 24% and 24% respectively. The A2
database was the database of augmented images with skin extraction from the background
using the rule (3) of HSV color space. The background of non-human skin color was converted
into black color. The A4 database was the database of augmented images with also skin
extraction background process but with the rule (4) from YCbCr color space. The background of
non-human skin color was also converted into black color. Meanwhile, the B4 database was
also augmented database but with different type of noise compare to A database with human
skin color extraction process using YCbCr in rule (4) and converted into black color.
 ISSN: 1693-6930
TELKOMNIKA Vol.17, No. 1, February 2019: 103-109
108
Table 1. Recognition Precision for Augmented Database
Recognition Precision (%)
1 2 3 4 5 6 7 8 9 10 11 12 13
A 12 42 10 24 12 - - - - - - - -
B 14 46 8 24 14 - - - - - - - -
C 50 52 56 60 48 48 46 46 46 46 46 46 46
D 68 68 68 70 56 56 56 56 54 54 52 50 50
E 26 26 26 28 46 46 46 46 44 44 42 42 40
F 66 68 70 70 56 56 56 56 54 54 52 52 52
G 26 26 26 28 46 46 46 46 44 44 42 40 40
H 48 52 56 60 48 48 46 46 44 44 44 46 46
I 66 68 68 68 58 58 56 56 54 54 54 50 50
J 28 28 28 30 48 48 46 46 44 44 46 42 40
K 66 68 70 70 58 58 56 56 54 54 54 52 52
L 28 28 28 30 48 48 46 46 44 44 44 42 40
From here, we examined that the best recognition rate came from the images from the
same octave in the scale-space which meant that the decimation process to create the next
octave lowered the recognition rate. The process to decimate the image or to lower the
resolution of the image took adverse effect to the recognition system. Especially from Figure 5,
we can see this as the abrupt changes from 4 to 5 on the database type C, D, F, H, I and K.
While for the database type E, G, J and L, the decimation process of going from the base
octave to the next octave by changing the image resolution took advantage for the recognition
system. This was studied as the effect of the removal of background of non-human skin color
and changed it to white color. The white color needed the decimation process and reduced the
images in resolution to give the beneficial effect to the recognition system. The case for
database type E, G J and L although did not produce recognition rate as high as the type C, D,
F, H, I and K.
Figure 7 shows the example of augmented images for each database. As it was
explained earlier, there were 39 augmented images in each type of database. After further
investigation, we found that the type of the augmented images that gave the closest match to
the testing processes were mostly the type of the images with the augmented process of
intensity adjustment and with rotation transformation.
Figure 7. The Examples of 39 Augmented Images from Type A and B Database
In [11], the authors studied the performance of several methods for limited data
recognition system. It was shown that the SIFT algorithm was the best method and gave higher
performance of recognition precision which was 38% compared to Haar wavelet transformation,
principal component analysis and hierarchical Gaussian scale-space which each of them
produced around 30-32%. The total images that were studied in the research were 50 images
with one testing image and one training image only from the same class / person. By developing
the augmented database for the recognition system, we experimented on the images and
multiplied the numbers into 39 times bigger. The recognition precision with the augmented
database went more than two times higher than the recognition system with limited training
TELKOMNIKA ISSN: 1693-6930 
Biometric identification using augmented database (Regina Lionnie)
109
data. The obstacle for getting higher precision was coming from choosing the type of
augmented process that used in the recognition system.
4. Conclusion
In this research, the augmented databases were created with different type of human
skin color extraction by employing HSV, YCbCr color spaces and scale-space using Gaussian
function. The best recognition performance which was 70%, obtained from D4, F4 and K4, the
database that scaled-spaces the images with base octave and 4th level of Gaussian function
and was extracted the human skin color component using HSV and YCbCr and changed it into
the black background images. The decimation process of reducing the resolution of images in
the scale-space structures gave adverse effect on the black background extracted human skin
color. On the contrary, it gave beneficial effect on white background extracted human skin color.
The type of augmented process that produced the best recognition mostly from intensity
adjustment process and rotation transformation. The augmented database compared to limited
data recognition system resulted in advantageous outcome on the recognition performance. It
improves the precision rate until more than 2 times higher.
Acknowledgement
This work was supported by Indonesia Ministry of Research, Technology and Higher
Education, RISTEKDIKTI 2018 Research Fund.
References
[1] Tariq A, Akram M U. Personal identification using ear recognition. TELKOMNIKA Telecommunication
Computing Electronics and Control. 2012; 10(2): 321-326.
[2] Jain AK. Editor. Handbook of Biometrics. Springer. 2008.
[3] Su H, Kong A W K. A Study on Low Resolution Androgenic Hair Patterns for Criminal and Victim
Identification. IEEE Transactions on Information Forensics and Security. 2014; 9(4): 666-680.
[4] Palastanga N, Soames R. Anatomy and Human Movement: Structure and Function. Sixth Edition.
Elsevier Churchill Livingstone. 2012: 541.
[5] Chan F K S, Kong AWK. Using Hair Follicles with Leg Geometry to Align Androgenic Hair Patterns.
Intelligence and Security Informatics Conference. Manchester. 2015: 137-140.
[6] Lionnie R, Alaydrus M. An Analysis of Haar Wavelet Transform for Androgenic Hair Pattern
Recognition. Proceedings of The First International Conference on Informatics and Computing.
Lombok. 2016.
[7] Lionnie R, Alaydrus M. Biometric Identification System based on Principal Component Analysis.
Proceedings of The 12th
IMT-GT International Conference on Mathematics, Statistics and Their
Applications. Banda Aceh. 2016.
[8] Lionnie R, Alaydrus M. Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition.
TELKOMNIKA Telecommunication Computing Electronics and Control. 2017; 15(1): 522-530.
[9] Lionnie R, Alaydrus M. A comparison of human skin color detection for biometrie identification.
Broadband Communication, Wireless Sensors and Powering (BCWSP), 2017 International
Conference. 2017: 1-5.
[10] Chan F K S, Kong AWK. A further study of low resolution androgenic hair patterns as a soft biometric
trait. Image and Vision Computing. 2017.
[11] Lionnie, R. Androgenic Hair Recognition For Biometric Identification. Master Thesis. Jakarta:
Postgraduate UMB; 2017.
[12] Solomon B. Linear Algebra Geometry and Transformation. CRC Press. 2015.
[13] Anwar N, Kit CW, John S. RGB-H-CbCr Skin Colour Model for Human Face Detection. Proceedings of
the MMU International Symposium on Information & Communications Technologies. Petaling Jaya.
2006.
[14] Sporring J, Nielsen M, Florack L and Johansen P. Editors. Gaussian Scale Space Theory. Springer.
1997.
[15] Lindeberg T. Scale-Space Theory in Computer Vision. Kluwer Academic Publishers. 1994: 48.
[16] Lowe DG. Distinctive Image Features from Scale-Invariant Keypoints. International Journal of
Computer Vision. 2004; 60(2): 91-110.

More Related Content

What's hot

50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
idescitation
 
Comparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesComparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniques
IAEME Publication
 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
sipij
 
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACESSEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
IJCSEA Journal
 
Pollination based optimization for color image segmentation
Pollination based optimization for color image segmentationPollination based optimization for color image segmentation
Pollination based optimization for color image segmentation
IAEME Publication
 
MEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTER
MEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTERMEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTER
MEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTER
cscpconf
 
Ja3416401643
Ja3416401643Ja3416401643
Ja3416401643
IJERA Editor
 
Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...
Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...
Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...
Associate Professor in VSB Coimbatore
 
An efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection basedAn efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection based
ssairayousaf
 
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSOBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
ijcseit
 
Image Compression based on DCT and BPSO for MRI and Standard Images
Image Compression based on DCT and BPSO for MRI and Standard ImagesImage Compression based on DCT and BPSO for MRI and Standard Images
Image Compression based on DCT and BPSO for MRI and Standard Images
IJERA Editor
 
Breast boundary detection in mammogram using entropy
Breast boundary detection in mammogram using entropyBreast boundary detection in mammogram using entropy
Breast boundary detection in mammogram using entropy
International Journal of Science and Research (IJSR)
 
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
ijcsit
 
Genetic Algorithm based Analysis of Rigid and Non Rigid Medical Images
Genetic Algorithm based Analysis of Rigid and Non Rigid Medical ImagesGenetic Algorithm based Analysis of Rigid and Non Rigid Medical Images
Genetic Algorithm based Analysis of Rigid and Non Rigid Medical Images
IRJET Journal
 
Clustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringClustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clustering
eSAT Journals
 
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...
csandit
 
Explicit Content Image Detection
Explicit Content Image DetectionExplicit Content Image Detection
Explicit Content Image Detection
sipij
 
Texture features from Chaos Game Representation Images of Genomes
Texture features from Chaos Game Representation Images of GenomesTexture features from Chaos Game Representation Images of Genomes
Texture features from Chaos Game Representation Images of Genomes
CSCJournals
 
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGMULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
ijistjournal
 

What's hot (19)

50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
 
Comparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesComparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniques
 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
 
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACESSEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACES
 
Pollination based optimization for color image segmentation
Pollination based optimization for color image segmentationPollination based optimization for color image segmentation
Pollination based optimization for color image segmentation
 
MEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTER
MEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTERMEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTER
MEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTER
 
Ja3416401643
Ja3416401643Ja3416401643
Ja3416401643
 
Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...
Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...
Supraorbital Margins for Identification of Sexual Dimorphism and Age Detectio...
 
An efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection basedAn efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection based
 
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSOBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
 
Image Compression based on DCT and BPSO for MRI and Standard Images
Image Compression based on DCT and BPSO for MRI and Standard ImagesImage Compression based on DCT and BPSO for MRI and Standard Images
Image Compression based on DCT and BPSO for MRI and Standard Images
 
Breast boundary detection in mammogram using entropy
Breast boundary detection in mammogram using entropyBreast boundary detection in mammogram using entropy
Breast boundary detection in mammogram using entropy
 
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
 
Genetic Algorithm based Analysis of Rigid and Non Rigid Medical Images
Genetic Algorithm based Analysis of Rigid and Non Rigid Medical ImagesGenetic Algorithm based Analysis of Rigid and Non Rigid Medical Images
Genetic Algorithm based Analysis of Rigid and Non Rigid Medical Images
 
Clustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringClustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clustering
 
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...
 
Explicit Content Image Detection
Explicit Content Image DetectionExplicit Content Image Detection
Explicit Content Image Detection
 
Texture features from Chaos Game Representation Images of Genomes
Texture features from Chaos Game Representation Images of GenomesTexture features from Chaos Game Representation Images of Genomes
Texture features from Chaos Game Representation Images of Genomes
 
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGMULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
 

Similar to Biometric identification using augmented database

Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition
Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern RecognitionHierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition
Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition
TELKOMNIKA JOURNAL
 
Wavelet-Based Color Histogram on Content-Based Image Retrieval
Wavelet-Based Color Histogram on Content-Based Image RetrievalWavelet-Based Color Histogram on Content-Based Image Retrieval
Wavelet-Based Color Histogram on Content-Based Image Retrieval
TELKOMNIKA JOURNAL
 
Human Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural NetworkHuman Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural Network
TELKOMNIKA JOURNAL
 
I045034956
I045034956I045034956
I045034956
IJERA Editor
 
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ijitjournal
 
Filter technique of medical image on multiple morphological gradient method
Filter technique of medical image on multiple morphological gradient methodFilter technique of medical image on multiple morphological gradient method
Filter technique of medical image on multiple morphological gradient method
TELKOMNIKA JOURNAL
 
Ag044216224
Ag044216224Ag044216224
Ag044216224
IJERA Editor
 
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
acijjournal
 
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSIONCOLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
acijjournal
 
A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...
A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...
A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...
TELKOMNIKA JOURNAL
 
Statistical Feature-based Neural Network Approach for the Detection of Lung C...
Statistical Feature-based Neural Network Approach for the Detection of Lung C...Statistical Feature-based Neural Network Approach for the Detection of Lung C...
Statistical Feature-based Neural Network Approach for the Detection of Lung C...
CSCJournals
 
Detection of skin diasease using curvlets
Detection of skin diasease using curvletsDetection of skin diasease using curvlets
Detection of skin diasease using curvlets
eSAT Publishing House
 
Face Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of InternetFace Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of Internet
ijceronline
 
A Novel Efficient Medical Image Segmentation Methodology
A Novel Efficient Medical Image Segmentation MethodologyA Novel Efficient Medical Image Segmentation Methodology
A Novel Efficient Medical Image Segmentation Methodology
aciijournal
 
FULL PAPER.PDF
FULL PAPER.PDFFULL PAPER.PDF
FULL PAPER.PDF
Jafar Emamipour
 
Skin Color Detection Using Region-Based Approach
Skin Color Detection Using Region-Based ApproachSkin Color Detection Using Region-Based Approach
Skin Color Detection Using Region-Based Approach
CSCJournals
 
Content based image retrieval based on shape with texture features
Content based image retrieval based on shape with texture featuresContent based image retrieval based on shape with texture features
Content based image retrieval based on shape with texture features
Alexander Decker
 
Multi Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image RetrievalMulti Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image Retrieval
IDES Editor
 
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
International Journal of Technical Research & Application
 
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
IJERA Editor
 

Similar to Biometric identification using augmented database (20)

Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition
Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern RecognitionHierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition
Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition
 
Wavelet-Based Color Histogram on Content-Based Image Retrieval
Wavelet-Based Color Histogram on Content-Based Image RetrievalWavelet-Based Color Histogram on Content-Based Image Retrieval
Wavelet-Based Color Histogram on Content-Based Image Retrieval
 
Human Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural NetworkHuman Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural Network
 
I045034956
I045034956I045034956
I045034956
 
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
 
Filter technique of medical image on multiple morphological gradient method
Filter technique of medical image on multiple morphological gradient methodFilter technique of medical image on multiple morphological gradient method
Filter technique of medical image on multiple morphological gradient method
 
Ag044216224
Ag044216224Ag044216224
Ag044216224
 
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
 
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSIONCOLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION
 
A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...
A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...
A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...
 
Statistical Feature-based Neural Network Approach for the Detection of Lung C...
Statistical Feature-based Neural Network Approach for the Detection of Lung C...Statistical Feature-based Neural Network Approach for the Detection of Lung C...
Statistical Feature-based Neural Network Approach for the Detection of Lung C...
 
Detection of skin diasease using curvlets
Detection of skin diasease using curvletsDetection of skin diasease using curvlets
Detection of skin diasease using curvlets
 
Face Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of InternetFace Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of Internet
 
A Novel Efficient Medical Image Segmentation Methodology
A Novel Efficient Medical Image Segmentation MethodologyA Novel Efficient Medical Image Segmentation Methodology
A Novel Efficient Medical Image Segmentation Methodology
 
FULL PAPER.PDF
FULL PAPER.PDFFULL PAPER.PDF
FULL PAPER.PDF
 
Skin Color Detection Using Region-Based Approach
Skin Color Detection Using Region-Based ApproachSkin Color Detection Using Region-Based Approach
Skin Color Detection Using Region-Based Approach
 
Content based image retrieval based on shape with texture features
Content based image retrieval based on shape with texture featuresContent based image retrieval based on shape with texture features
Content based image retrieval based on shape with texture features
 
Multi Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image RetrievalMulti Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image Retrieval
 
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
 
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
TELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
TELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
TELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
TELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
TELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
TELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
TELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
TELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
TELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.
supriyaDicholkar1
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
EMERSON EDUARDO RODRIGUES
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
OKORIE1
 
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEERDELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
EMERSON EDUARDO RODRIGUES
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
GiselleginaGloria
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
TeluguBadi
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Balvir Singh
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 

Recently uploaded (20)

Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
 
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEERDELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 

Biometric identification using augmented database

  • 1. TELKOMNIKA, Vol.17, No.1, February 2019, pp. 103~109 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI:10.12928/TELKOMNIKA.v17i1.11713 103 Received May 30, 2018; Revised October 24, 2018; Accepted November 26, 2018 Biometric identification using augmented database Regina Lionnie*1 , Ellisa Agustina2 , Wahju Sediono3 , Mudrik Alaydrus4 1,2,3,4 Department of Electrical Engineering, Universitas Mercu Buana Jakarta, Jalan Menteng Raya No. 29, Jakarta Pusat, Indonesia 3 Department of Mechatronics Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Jalan Gombak, 53100 Kuala Lumpur, Malaysia *Corresponding author, e-mail: regina.lionnie@mercubuana.ac.id1 , ellisa.agustina@gmail.com2 , wsediono@iium.edu.my3 , mudrikalaydrus@mercubuana.ac.id4 Abstract Androgenic hair pattern is one of the newest soft biometric trait that can be used to identify criminals when their faces are covered in the evidences of criminal investigation. In real-life situation, sometimes the available evidence is limited thus creating problems for authorities to identify criminal based on the limited data. This research developed the recognition system to identify individuals based on their androgenic hair pattern in a limited data situation in such a way that the limited images were expanded by the augmentation process. There were 50 images studied and expanded into 2.000 images from the augmentation process of rotating, reflecting, adjusting color and intensity. Furthermore, the effect of human skin color extraction was investigated by employing HSV and YCbCr color spaces. The scale-space hierarchy was built among the images with Gaussian function and produced 70% recognition precision that was around more than 2 times higher compared to system of recognition with only limited data. Keywords: androgenic hair pattern, augmented data, biometric identification, hierarchical Gaussian scale-space, limited training Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction Biometrics is the knowledge to certify the identity of people based on their physiological, chemical and behavioral characteristics [1-2]. The purpose of biometrics discussed in this research was to identify criminals based on their androgenic hair pattern. The androgenic hair pattern became popular since it was first introduced as the soft biometric trait in [3]. Androgenic hair is the hair that grows on human body since a person reaches his or her puberty era and is influenced by androgens hormone [4]. When the evidence of criminals’ identity such as their face are captured in the digital pictures and videos, they may be covered and thus creating problems for the authorities to do the identification procedure. Normally, parts of their hands and legs are not covered and they turn into a potential information to be learnt. Furthermore, the limited numbers of evidence arise as other issues to be solved. There have been pursuits to overcome these two difficulties. In [3], [5] the authors started to study the pattern by using the Gabor orientation histogram. In [6-8], the authors applied transformation such as wavelet Haar, principal component analysis and hierarchical Gaussian scale space as a method to help the recognize the androgenic hair pattern and to produce better recognition precision. The results were produced by analyzing 400 images in the database. These studies are not for recognition system with limited dataset. Though the rate of precisions is quite satisfactory, the case in the real-life situation of limited data are not yet implemented in the recognition system. In [9], the performance of color spaces was investigated to extract human skin color area. In order to improve the recognition rate, the rules of extracting human skin color area by using color spaces such as RGB, HSV, YCbCr, CIE Lab and YIQ were studied. In [10], the authors applied class-specific partial least squares (PLS) models to utilize the features of androgenic hair pattern. The research on androgenic hair pattern is expanding and in the next development in [11], the authors learned to develop the recognition system based on real-life situation and limited the data for the system. This research attempted to design a recognition system to identify individuals based on their androgenic hair pattern in a limited data situation in such a way that the limited images were expanded by the augmentation process. The scale-space hierarchy was built among the
  • 2.  ISSN: 1693-6930 TELKOMNIKA Vol.17, No. 1, February 2019: 103-109 104 augmented images by using Gaussian function. Moreover, we also studied the effect of HSV and YCbCr color spaces to the augmented data to extract human skin color area in the images. The rest of this paper is defined as follow: section 2 describes the research method conducted in this paper. In section 3, the results are discussed and analyzed. Finally, conclusion is summed up in section 4. 2. Research Method The research method implemented in this research was built based upon three parts processes. The first part was to build the augmented data base from limited data in the system. The second part was to build the scaling hierarchical structure using Gaussian filter and the third part was to find the closest matching of the training and the testing data. Figure 1 below explains the three part processes of research method executed in this research. Figure 1. Research method for biometric identification 2.1. Augmented Database In real life condition, sometimes there are limited data that can be acquired. The limited data explains as only a few images acquired for the same person from the acquiring device such as digital camera. In this research there were only two images from the same person in the system. The two images varied in pose, lighting condition, angle, background information and noise. There were 25 male respondents with two images each, there were total 50 images in the early limited data base. In this research, the data augmentation technique was applied to the limited data base, producing more images derived from the original one. The technique to augment the data was based on geometric transformation such as rotation (1), reflection (2), color adjustment and intensity adjustment [12]. The color adjustment limits and enhances the contrast of the images while the intensity adjustment is proposed to make the images darker than earlier. [ 𝑚2 𝑛2 ] = [ 𝑐𝑜𝑠𝜃 −𝑠𝑖𝑛𝜃 𝑠𝑖𝑛𝜃 𝑐𝑜𝑠𝜃 ] [ 𝑚1 𝑛1 ] (1) [ 𝑚2 𝑛2 ] = [ −1 0 0 1 ] [ 𝑚1 𝑛1 ] (2) The two original images in the early database were divided into training and testing images. The augmented data were derived from both division but the augmented images from testing images were notincluded to the training phase. There were 39 augmented images from 1 original image. Figure 2 describes the augmented process that took place in this research. Figure 2. Data augmentation process Scale-Space Matching Identification System Precision of System Limited Data Augmented Database
  • 3. TELKOMNIKA ISSN: 1693-6930  Biometric identification using augmented database (Regina Lionnie) 105 All original images and augmented images were 203x352 in pixels. The skin color extraction in this research ran on two color spaces, HSV and YCbCr that was studied before in [9]. These color spaces worked best for extracting human skin color component. Both HSV and YCbCr are the color spaces that separate luminance and chrominance components. It is shown that pixels with the range of human skin color have similarity in chrominance component and it is best to discriminate color of skin and not skin area [13]. The rules of HSV skin color area extraction is shown in (3) while the YCbCr in (4) [9]. The extraction process removed the background (area that was not detected as human skin color) and replaced it with black and white color. S > 0.35 (3) 101 < Cb < 125 130 < Cr < 155 (4) 2.2. Scale-space with Hierarchical Gaussian Filter By building scale-space of an image, it permits us to analyse an image at multi resolutions [14]. The different resolution improves the system of identification by representing original images in different scale. The idea behind Gaussian scale-space [15] is to filter the original image with Gaussian function of desired width and decimates the last output from the filter process to start again as the next scale from the same image. The process began with convolving the input image with Gaussian function with the width 𝜎 as it can be seen in (5) until (8). These equations can be seen in more detail explanation in previous work in [8]. The width of the Gaussian was𝜎0 = 1.6 and 𝜎𝑠 = 0.5 as it was used before in [8], [16]. The total level for this research was V=3 while vvaried in each level. There were also 4 octaves (U) that was constructed. In one octave, the image was convolved by the Gaussian with the width in (7) and (8). If it reached the last level, the octave went higher and the base level for the next level was to decimate the image by the factor of 2. The process continued until it reached the 4th octave with the 3rd level. The process of building Gaussian scale space can be seen in Figure 3 below. For the base octave (u=0) and level (v=0), the input image was convolved by Gaussian with the width in (7). To create the next level (v=1,2,3) within the same octave (u=0), the base level was convolved with the Gaussian with the width in (8). For the base level in the next octave, the process just decimated (by the factor of two) the last level from the previous octave and did not convolve the image with the Gaussian. To build the next level (v=1,2,3) for the next octave (u≠ 0), the image on the base level in each octave was convolved with the Gaussian with the width in (8). Figure 3. Building the scale-space [8] G(m,n,σ) = H(m,n,σ) ∗ I(m,n) (5)
  • 4.  ISSN: 1693-6930 TELKOMNIKA Vol.17, No. 1, February 2019: 103-109 106 H(m,n,σ) = 1 2πσ e − (m2+n2) 2σ2 (6) σ0̂ = √σ0 2 − σs 2 (7) σv̂ = σ0. √22v/V − 1 (8) In [8], the authors adopted the method Hierarchical Gaussian Scale-Space for androgenic hair pattern recognition. There were 400 original varied images were studied without any augmented images. In this research the same method was applied to study the performance of the augmented images in the data base for a limited data recognition system. 2.3. Matching Algorithm The matching algorithm in this research employed the nearest distance calculation using Euclidean distance. It matched the closest data of testing set to the training set. The configuration of the testing set and the training set are illustrated in Figure 4. Both testing and training images were augmented for 39 augmented images for each original image. When the testing image was being processed, the augmented images derived from the testing set were not included into the system while the 39 augmented images each from remaining 49 images of training images and the original 49 images themselves were included into the matching process. The total testing set for one matching process was 1 image while the training set was 49x39 augmented images+49 original images=1.960 images. There were 50 matching processes in total. Figure 4. The configuration of training and testing set 3. Results and Analysis The results are shown in Table 1 and Figure 5 and Figure 6. Table 1 presents the recognition system precision in percentage of how much accurate the system identifies the testing images to the right class of training images. The alphabet on each row represents the type of the dataset meanwhile the number on each column represents the type of augmented data base that were created. All type of databases were 2000 images in total with 50 original images and 1950 augmented images. The A and B types means the database with the variety of original images with different pose, lighting condition, background different noise. The number 1 until 5 for type A and B means the original augmented database for A1 and B1, the skin extracted using HSV rule from (3) with black background for A2 and B2 and white background for A3 and B3, the skin extracted using YCbCr rule from (4) with black background for A4 and B4 and white background for A5 and B5. Meanwhile type C until L is the database of scale-space from A1 to B5 with 4 octaves and 3 levels of hierarchical Gaussian scale-space. The C1-C13 is the scale-space images from A1 with C1 is the base octave and base level and C13 is the 4th octave and the 3rd level. The L1-L13 is the scale-spaces images from B5 with L1 is the base octave and base level and L13 is the 4th octave and the 3rd level.
  • 5. TELKOMNIKA ISSN: 1693-6930  Biometric identification using augmented database (Regina Lionnie) 107 Figure 5. The precision recognition system with augmented database and scale-space Figure 6. The performance comparison for augmented database Figure 5 describes the performance result focuses on the scale-space by Gaussian function on each octave and level. The horizontal axis gives the information about the type of level and octaves. Axis one means base octave and level while axis 13 means last octave and last level. Meanwhile different type of line gives the information about the database type. Figure 6 shows the performance comparison for the best recognition result from each type of data base. From Figure 5 and Figure 6, we can see the performance of scale-space images to the recognition system. The performance of recognition using the scale-space database (C-L) was better than using the database only with augmented images (A-B). The best performance result came from using the base octave and the level 4th database images with the type augmentation D4, F4 and K4 which was 70%. The D4, F4 and K4 types of database were respectively the scale-space version of the A2, A4 and B4 from the base octave and the last level. The recognition precision from A2, A4 and B4 were 42%, 24% and 24% respectively. The A2 database was the database of augmented images with skin extraction from the background using the rule (3) of HSV color space. The background of non-human skin color was converted into black color. The A4 database was the database of augmented images with also skin extraction background process but with the rule (4) from YCbCr color space. The background of non-human skin color was also converted into black color. Meanwhile, the B4 database was also augmented database but with different type of noise compare to A database with human skin color extraction process using YCbCr in rule (4) and converted into black color.
  • 6.  ISSN: 1693-6930 TELKOMNIKA Vol.17, No. 1, February 2019: 103-109 108 Table 1. Recognition Precision for Augmented Database Recognition Precision (%) 1 2 3 4 5 6 7 8 9 10 11 12 13 A 12 42 10 24 12 - - - - - - - - B 14 46 8 24 14 - - - - - - - - C 50 52 56 60 48 48 46 46 46 46 46 46 46 D 68 68 68 70 56 56 56 56 54 54 52 50 50 E 26 26 26 28 46 46 46 46 44 44 42 42 40 F 66 68 70 70 56 56 56 56 54 54 52 52 52 G 26 26 26 28 46 46 46 46 44 44 42 40 40 H 48 52 56 60 48 48 46 46 44 44 44 46 46 I 66 68 68 68 58 58 56 56 54 54 54 50 50 J 28 28 28 30 48 48 46 46 44 44 46 42 40 K 66 68 70 70 58 58 56 56 54 54 54 52 52 L 28 28 28 30 48 48 46 46 44 44 44 42 40 From here, we examined that the best recognition rate came from the images from the same octave in the scale-space which meant that the decimation process to create the next octave lowered the recognition rate. The process to decimate the image or to lower the resolution of the image took adverse effect to the recognition system. Especially from Figure 5, we can see this as the abrupt changes from 4 to 5 on the database type C, D, F, H, I and K. While for the database type E, G, J and L, the decimation process of going from the base octave to the next octave by changing the image resolution took advantage for the recognition system. This was studied as the effect of the removal of background of non-human skin color and changed it to white color. The white color needed the decimation process and reduced the images in resolution to give the beneficial effect to the recognition system. The case for database type E, G J and L although did not produce recognition rate as high as the type C, D, F, H, I and K. Figure 7 shows the example of augmented images for each database. As it was explained earlier, there were 39 augmented images in each type of database. After further investigation, we found that the type of the augmented images that gave the closest match to the testing processes were mostly the type of the images with the augmented process of intensity adjustment and with rotation transformation. Figure 7. The Examples of 39 Augmented Images from Type A and B Database In [11], the authors studied the performance of several methods for limited data recognition system. It was shown that the SIFT algorithm was the best method and gave higher performance of recognition precision which was 38% compared to Haar wavelet transformation, principal component analysis and hierarchical Gaussian scale-space which each of them produced around 30-32%. The total images that were studied in the research were 50 images with one testing image and one training image only from the same class / person. By developing the augmented database for the recognition system, we experimented on the images and multiplied the numbers into 39 times bigger. The recognition precision with the augmented database went more than two times higher than the recognition system with limited training
  • 7. TELKOMNIKA ISSN: 1693-6930  Biometric identification using augmented database (Regina Lionnie) 109 data. The obstacle for getting higher precision was coming from choosing the type of augmented process that used in the recognition system. 4. Conclusion In this research, the augmented databases were created with different type of human skin color extraction by employing HSV, YCbCr color spaces and scale-space using Gaussian function. The best recognition performance which was 70%, obtained from D4, F4 and K4, the database that scaled-spaces the images with base octave and 4th level of Gaussian function and was extracted the human skin color component using HSV and YCbCr and changed it into the black background images. The decimation process of reducing the resolution of images in the scale-space structures gave adverse effect on the black background extracted human skin color. On the contrary, it gave beneficial effect on white background extracted human skin color. The type of augmented process that produced the best recognition mostly from intensity adjustment process and rotation transformation. The augmented database compared to limited data recognition system resulted in advantageous outcome on the recognition performance. It improves the precision rate until more than 2 times higher. Acknowledgement This work was supported by Indonesia Ministry of Research, Technology and Higher Education, RISTEKDIKTI 2018 Research Fund. References [1] Tariq A, Akram M U. Personal identification using ear recognition. TELKOMNIKA Telecommunication Computing Electronics and Control. 2012; 10(2): 321-326. [2] Jain AK. Editor. Handbook of Biometrics. Springer. 2008. [3] Su H, Kong A W K. A Study on Low Resolution Androgenic Hair Patterns for Criminal and Victim Identification. IEEE Transactions on Information Forensics and Security. 2014; 9(4): 666-680. [4] Palastanga N, Soames R. Anatomy and Human Movement: Structure and Function. Sixth Edition. Elsevier Churchill Livingstone. 2012: 541. [5] Chan F K S, Kong AWK. Using Hair Follicles with Leg Geometry to Align Androgenic Hair Patterns. Intelligence and Security Informatics Conference. Manchester. 2015: 137-140. [6] Lionnie R, Alaydrus M. An Analysis of Haar Wavelet Transform for Androgenic Hair Pattern Recognition. Proceedings of The First International Conference on Informatics and Computing. Lombok. 2016. [7] Lionnie R, Alaydrus M. Biometric Identification System based on Principal Component Analysis. Proceedings of The 12th IMT-GT International Conference on Mathematics, Statistics and Their Applications. Banda Aceh. 2016. [8] Lionnie R, Alaydrus M. Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition. TELKOMNIKA Telecommunication Computing Electronics and Control. 2017; 15(1): 522-530. [9] Lionnie R, Alaydrus M. A comparison of human skin color detection for biometrie identification. Broadband Communication, Wireless Sensors and Powering (BCWSP), 2017 International Conference. 2017: 1-5. [10] Chan F K S, Kong AWK. A further study of low resolution androgenic hair patterns as a soft biometric trait. Image and Vision Computing. 2017. [11] Lionnie, R. Androgenic Hair Recognition For Biometric Identification. Master Thesis. Jakarta: Postgraduate UMB; 2017. [12] Solomon B. Linear Algebra Geometry and Transformation. CRC Press. 2015. [13] Anwar N, Kit CW, John S. RGB-H-CbCr Skin Colour Model for Human Face Detection. Proceedings of the MMU International Symposium on Information & Communications Technologies. Petaling Jaya. 2006. [14] Sporring J, Nielsen M, Florack L and Johansen P. Editors. Gaussian Scale Space Theory. Springer. 1997. [15] Lindeberg T. Scale-Space Theory in Computer Vision. Kluwer Academic Publishers. 1994: 48. [16] Lowe DG. Distinctive Image Features from Scale-Invariant Keypoints. International Journal of Computer Vision. 2004; 60(2): 91-110.