SlideShare a Scribd company logo
Ear Biometrics for Human Identification Based on Image Analysis Micha l  Chora s Image Processing Group Institute of Telecommunication ATR Bydgoszcz, Poland Presentation for ELCVIA Journal
  INTRODUCTION TO  HUMAN IDENTIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION TO BIOMETRICS ,[object Object],[object Object],[object Object]
INTRODUCTION TO BIOMETRICS ,[object Object],[object Object],[object Object],[object Object],[object Object],BEHAVIOURAL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PHYSIOLOGICAL
GENERAL MOTIVATION FOR EAR BIOMETRICS ,[object Object],passive physiological biometrics FACE AND EAR BIOMETRICS MIGHT BE THE ANSWER
FACE BIOMETRICS – GENERAL OVERVIEW ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EAR BIOMETRICS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PASSIVE BIOMETRICS: EAR vs. FACE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SAMPLE EAR IMAGES FROM OUR DATABASE Ear s  differ „at a first glance”.  We lack in vocabulary - humans just don’t look at ears . „ easy ear images”
SAMPLE EAR IMAGES FROM OUR DATABASE Removing hair for access control is simple and takes just single seconds. „ difficult ear images”
EAR BIOMETRICS  – OBVIOUS APPROACH How to find specific points? The method based on geometrical distances.
IANNARELLI’S MANUAL MEASUREMENTS ,[object Object],[object Object],[object Object]
EAR BIOMETRICS – KNOWN METHODS ,[object Object],[object Object],[object Object],[object Object]
EAR BIOMETRICS – KNOWN METHODS  ,[object Object],[object Object],[object Object]
EAR BIOMETRICS – KNOWN METHODS  ,[object Object],[object Object]
EAR BIOMETRICS – KNOWN METHODS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EAR BIOMETRICS – OUR APPROACH ,[object Object],[object Object],[object Object],[object Object]
GEOMETRICAL FEATURE EXTRACTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONCLUSIONS & WORK-IN-PROGRESS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONCLUSIONS & WORK-IN-PROGRESS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
christywong1234
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
Aalaa Khattab
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
Tushar Kayande
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
varsha mohite
 
Facial reconstruction
Facial reconstructionFacial reconstruction
Facial reconstruction
Anjali Awasthi
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
Anjali Awasthi
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
scg121433
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
Usman Siddique
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
amee yaami
 
RETINA IDENTIFICATION
RETINA IDENTIFICATIONRETINA IDENTIFICATION
RETINA IDENTIFICATION
islam_injamul
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
Joy Dutta
 
Forensic audio
Forensic audioForensic audio
Forensic audio
Tejasvi Bhatia
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
Mazin Alwaaly
 
Audio and Video Forensics
Audio and Video ForensicsAudio and Video Forensics
Audio and Video ForensicsDipika Sengupta
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
Vishak Illath veed
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
Vivek Kumar
 

What's hot (20)

Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Facial reconstruction
Facial reconstructionFacial reconstruction
Facial reconstruction
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
RETINA IDENTIFICATION
RETINA IDENTIFICATIONRETINA IDENTIFICATION
RETINA IDENTIFICATION
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Forensic audio
Forensic audioForensic audio
Forensic audio
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Audio and Video Forensics
Audio and Video ForensicsAudio and Video Forensics
Audio and Video Forensics
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 

Viewers also liked

Ear Biometrics shritosh kumar
Ear Biometrics shritosh kumarEar Biometrics shritosh kumar
Ear Biometrics shritosh kumar
shritosh kumar
 
Face And Ear Composite Recognition Tool
Face And Ear Composite Recognition ToolFace And Ear Composite Recognition Tool
Face And Ear Composite Recognition Tool
Abhineet Bhamra
 
Gait Recognition Using Infrared
Gait Recognition Using InfraredGait Recognition Using Infrared
Gait Recognition Using Infrared
BirunthaG
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Review of Detection & Recognition Techniques for 2D Ear Biometrics System
Review of Detection & Recognition Techniques for 2D Ear Biometrics SystemReview of Detection & Recognition Techniques for 2D Ear Biometrics System
Review of Detection & Recognition Techniques for 2D Ear Biometrics System
shritosh kumar
 
F04724954
F04724954F04724954
F04724954
IOSR-JEN
 
Silent speech recognition
Silent speech recognitionSilent speech recognition
Silent speech recognition
Jay Patel
 
Multispectral imaging in Forensics with VideometerLab 3
Multispectral imaging in Forensics with VideometerLab 3Multispectral imaging in Forensics with VideometerLab 3
Multispectral imaging in Forensics with VideometerLab 3
Adrian Waltho
 
gait analysis
gait analysisgait analysis
gait analysis
Manoz Kumar
 
Iris ppt
Iris pptIris ppt
Iris ppt
Sri Harati K
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 
PatSeer Introduction
PatSeer IntroductionPatSeer Introduction
PatSeer Introduction
Gridlogics
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
Human Re-identification using Soft Biometrics in Video Surveillance
Human Re-identification using Soft Biometrics in Video SurveillanceHuman Re-identification using Soft Biometrics in Video Surveillance
Human Re-identification using Soft Biometrics in Video Surveillance
Shengzhe Li
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
rajarose89
 

Viewers also liked (20)

Ear Biometrics shritosh kumar
Ear Biometrics shritosh kumarEar Biometrics shritosh kumar
Ear Biometrics shritosh kumar
 
Biometrics system
Biometrics systemBiometrics system
Biometrics system
 
Face And Ear Composite Recognition Tool
Face And Ear Composite Recognition ToolFace And Ear Composite Recognition Tool
Face And Ear Composite Recognition Tool
 
Gait Recognition Using Infrared
Gait Recognition Using InfraredGait Recognition Using Infrared
Gait Recognition Using Infrared
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Review of Detection & Recognition Techniques for 2D Ear Biometrics System
Review of Detection & Recognition Techniques for 2D Ear Biometrics SystemReview of Detection & Recognition Techniques for 2D Ear Biometrics System
Review of Detection & Recognition Techniques for 2D Ear Biometrics System
 
F04724954
F04724954F04724954
F04724954
 
Silent speech recognition
Silent speech recognitionSilent speech recognition
Silent speech recognition
 
Multispectral imaging in Forensics with VideometerLab 3
Multispectral imaging in Forensics with VideometerLab 3Multispectral imaging in Forensics with VideometerLab 3
Multispectral imaging in Forensics with VideometerLab 3
 
gait analysis
gait analysisgait analysis
gait analysis
 
Voice Recognition
Voice RecognitionVoice Recognition
Voice Recognition
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
PatSeer Introduction
PatSeer IntroductionPatSeer Introduction
PatSeer Introduction
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Human Re-identification using Soft Biometrics in Video Surveillance
Human Re-identification using Soft Biometrics in Video SurveillanceHuman Re-identification using Soft Biometrics in Video Surveillance
Human Re-identification using Soft Biometrics in Video Surveillance
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 

Similar to Ear Biometrics

A Survey on Human Ear Recognition
A Survey on Human Ear RecognitionA Survey on Human Ear Recognition
A Survey on Human Ear Recognition
IJERA Editor
 
Adopting level set theory based algorithms to segment human ear
Adopting level set theory based algorithms to segment human earAdopting level set theory based algorithms to segment human ear
Adopting level set theory based algorithms to segment human ear
IJCI JOURNAL
 
Vol 5 No 1 - September 2013
Vol 5 No 1 - September 2013Vol 5 No 1 - September 2013
Vol 5 No 1 - September 2013
ijcsbi
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometric
Mazin Alwaaly
 
Feature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A SurveyFeature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A SurveyShashank Dhariwal
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
IRJET Journal
 
Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...
Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...
Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...
shritosh kumar
 
Overview of Image Based Ear Biometric with Smartphone App
Overview of Image Based Ear Biometric with Smartphone AppOverview of Image Based Ear Biometric with Smartphone App
Overview of Image Based Ear Biometric with Smartphone App
IRJET Journal
 
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...
IOSR Journals
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
Iasir Journals
 
Biometrics
BiometricsBiometrics
Biometrics
Sandeep Kamath
 
SEMINAR.pptx
SEMINAR.pptxSEMINAR.pptx
SEMINAR.pptx
jangalavanyareddy
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Rajesh Anupoju
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
IDES Editor
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
'Femi Akin-Laguda
 
EarAuthCam: Personal Identification and Authentication Method Using Ear Image...
EarAuthCam: Personal Identification and Authentication Method Using Ear Image...EarAuthCam: Personal Identification and Authentication Method Using Ear Image...
EarAuthCam: Personal Identification and Authentication Method Using Ear Image...
sugiuralab
 
Biometrics
BiometricsBiometrics
Biometrics
Bhupeshkumar Nanhe
 

Similar to Ear Biometrics (20)

A Survey on Human Ear Recognition
A Survey on Human Ear RecognitionA Survey on Human Ear Recognition
A Survey on Human Ear Recognition
 
Adopting level set theory based algorithms to segment human ear
Adopting level set theory based algorithms to segment human earAdopting level set theory based algorithms to segment human ear
Adopting level set theory based algorithms to segment human ear
 
Vol 5 No 1 - September 2013
Vol 5 No 1 - September 2013Vol 5 No 1 - September 2013
Vol 5 No 1 - September 2013
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometric
 
Feature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A SurveyFeature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A Survey
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 
Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...
Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...
Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Re...
 
Overview of Image Based Ear Biometric with Smartphone App
Overview of Image Based Ear Biometric with Smartphone AppOverview of Image Based Ear Biometric with Smartphone App
Overview of Image Based Ear Biometric with Smartphone App
 
Independent Research
Independent ResearchIndependent Research
Independent Research
 
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...
To Improve the Recognition Rate with High Security with Ear/Iris Biometric Re...
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Biometrics
BiometricsBiometrics
Biometrics
 
SEMINAR.pptx
SEMINAR.pptxSEMINAR.pptx
SEMINAR.pptx
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
 
EarAuthCam: Personal Identification and Authentication Method Using Ear Image...
EarAuthCam: Personal Identification and Authentication Method Using Ear Image...EarAuthCam: Personal Identification and Authentication Method Using Ear Image...
EarAuthCam: Personal Identification and Authentication Method Using Ear Image...
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

Ear Biometrics

  • 1. Ear Biometrics for Human Identification Based on Image Analysis Micha l Chora s Image Processing Group Institute of Telecommunication ATR Bydgoszcz, Poland Presentation for ELCVIA Journal
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. SAMPLE EAR IMAGES FROM OUR DATABASE Ear s differ „at a first glance”. We lack in vocabulary - humans just don’t look at ears . „ easy ear images”
  • 10. SAMPLE EAR IMAGES FROM OUR DATABASE Removing hair for access control is simple and takes just single seconds. „ difficult ear images”
  • 11. EAR BIOMETRICS – OBVIOUS APPROACH How to find specific points? The method based on geometrical distances.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.