SlideShare a Scribd company logo
Lips Recognition
                   Based on DTW Algorithm




                    Presented by-

                    Piyush Mittal
                    (211CS2281)
                    Information Security
                    Computer Science and
06/24/12            Engineering Department   1
2

                                   National Institute of Technology, Rourkela   06/24/12




Overview
  French criminologist, Edmond Locard, first recommended
  the use of lip prints for criminal identification in 1932.
  Lip prints are impressions of human lips left on the objects
  such as drinking glasses, cigarettes, drink containers,
  aluminium foils, etc.
  Study of human lips as a means of personal identification
  was started in 1970s by two Japanese scientists Yasuo and
  Kazuo Suzuki.
  The uniqueness of lip prints makes cheiloscopy especially
  effective when evidence is discovered at the crime scene such
  as for example lipstick blot marks, cups or glasses and even
  envelopes.
3

                                    National Institute of Technology, Rourkela   06/24/12




Overview
 Similarly to fingerprint patterns, lip prints have the following
 particular properties: permanence, indestructibility and
 uniqueness.
  Lip prints are genotypically determined and therefore and
 unique and stable throughout life of human being.
  Additionally, lip prints are not only unique to an individual
 but also offer the potential for recognition of an individual’s
 gender.
  The lip imprints can be captured by special police materials
 (paper, special cream and magnetic powder). Such obtained
 imprint pictures are then scanned.
4

                     National Institute of Technology, Rourkela   06/24/12




FEATURE EXTRACTION
5

                  National Institute of Technology, Rourkela   06/24/12




1 Image normalization
6
                                                                                                  06/24/12

1.1 Detection of lip area
                                                     National Institute of Technology, Rourkela




 It consists of several steps –
     In the first step, normalization of the image histogram is carried out.
    Then, pixels whose value is greater than the accepted threshold (180) are
    converted to the white color.
    Next, median filter with mask 7×7 is used to blur the image.
    In the last step, binarization is conducted according to the following formula:


                                                    0.516.I ( x, y )
               I BIN ( x, y ) = 1 − round(                           )
                                                        I AVG

where:
      I ( x, y )– value of the pixel at coordinates (x,y) before Binarization,
      I AVG– average value of the all image pixels before binarization,
      I BIN ( x, y ) – value of the pixel at coordinates (x,y) after binarization.

The value of 0.516 in the formula was experimentally determined.
7

National Institute of Technology, Rourkela   06/24/12
8
                                                                              06/24/12
                                 National Institute of Technology, Rourkela



1.2 Separation of Upper and Lower Lip
 Separation is determined by a curve that runs through the
 centre of the space between the lips Designated curve divides
 the lip print into an upper and lower lip.
9

                                       National Institute of Technology, Rourkela   06/24/12




1.3 Lip Print Rotation
 The curve obtained in the previous stage is then approximated
 by a straight line (Fig. 3a). For a given straight line equation, a
 rotation angle towards the X – axis can be determined. It
 allows obtaining a separation line which will be parallel to the
 Cartesian OX axis. Rotated lip print image is shown in Fig. 3b.
10

                         National Institute of Technology, Rourkela   06/24/12




Based on the data obtained in the steps (1)-(3)
we get a lip print image rotated and divided
into upper and lower lip (Fig. 4).
11

                     National Institute of Technology, Rourkela   06/24/12




2. Lip pattern extraction
12

                            National Institute of Technology, Rourkela   06/24/12



2.1 Lip pattern smoothing
  This process aims to improve the quality level of the
 lines forming the lip pattern. The smoothing masks
 5×5 are depicted in the Fig. 5.
13

                                 National Institute of Technology, Rourkela   06/24/12




The procedure is repeated for the all masks depicted on the
Fig. 5. Then, the mask with the largest cumulative value of
the sum is ultimately selected. For the selected in the
previous step mask, the average value of the pixels lying on
the elements of the mask is calculated and copied to the
central point of the analyzed source image. The effect of the
image smoothing inside of the interest region is shown in
Fig. 6.
14

                                   National Institute of Technology, Rourkela   06/24/12


2.2 Top-hat transformation

 The purpose of this procedure is to emphasize lines of the lip
 pattern and separate them from the background. To increase
 effectiveness of the algorithm, transformation is applied
 twice using different mask sizes. The following masks are
 used: 2×2 to highlight thin lines (up to 3 pixels) and 6×6 to
 highlight thick lines (more than 3 pixels). The results of the
 top-hat transformation are depicted in the Fig. 7.
15

2.3 Binarization
                                            National Institute of Technology, Rourkela   06/24/12




 This procedure is applied according to the formula below for
 both images resulted from the top-hat transformation. For
 the thin lines binarization threshold value was set to t=15,
 while for the thick lines this parameter was established to
 t=100.

    IBIN(x,y) =                   1 for I(x,y)>t
                                  0 for I(x,y)<=t
  where:
     I(x,y) – value of the pixel at the coordinates (x, y) before binarization,
     t – binarization threshold,
    IBIN(x,y)-value of the pixel at the coordinates (x, y) after binarization.
16

                            National Institute of Technology, Rourkela   06/24/12




The effect of the lip print image binarization is
shown in Fig. 8.
17

                                 National Institute of Technology, Rourkela   06/24/12




In the last stage, sub-images for the thin and thick lines are
combined into a single image, and then the obtained
global image is denoised. For the noise reduction,
appropriate 7×7 dimensional masks have been designed. It is
depicted on Fig.9.
18

                                   National Institute of Technology, Rourkela   06/24/12




For each of the masks number of black pixels in the
highlighted area of the mask is counted. If the number of the
black pixels is less than 5, then the central pixel of the mask
is converted to the white color.

Additionally, the area of the 11×11 pixels around the central
point of the mask is searched. If there are less than 11 pixels
inside of defined area, then the value of the central point of
the mask is converted to the white color. Example of the
noise reduction is shown in the Fig.10.
19

National Institute of Technology, Rourkela   06/24/12
20

                                   National Institute of Technology, Rourkela   06/24/12




3 Feature extraction
 The feature extraction algorithm is carried out for both the
 upper and lower lip. This process relies on determination of
 the vertical, horizontal and diagonal projections of the lip
 pattern image. The exemplary projections of the image lip
 print pixels towards the appropriate axes are presented in
 Fig.11.

 Projections are one-dimensional vectors represented in a form
 of specialized histograms. Each projection shows number of
 the black pixels which lie towards the appropriate direction:
 horizontal, vertical, oblique for 45° and 135°angles.
21

National Institute of Technology, Rourkela   06/24/12
22

                                    National Institute of Technology, Rourkela   06/24/12




THE DTW METHOD
 Two sequences Q={q1, …, qn} and U={u1, …, um} being
 compared, the D matrix of the size n×m is built in the first
 stage. It allows to align the two sequences Q and U. The
 matrix element D(i, j) contains the distance between the
 points qi and uj, so D(i, j)=d(qi,uj).

 In this study, the Euclidean distance was applied.

 On the basis of the elements D(i, j) so-called sequences
 matching cost have to be determined. When cost matching is
 lower then both sequences Q and U are more similar.
23

                                 National Institute of Technology, Rourkela   06/24/12




In the next stage, the warping path W is determined. The path
 W consists of a set of the some elements of the matrix D what
 allows to define a mapping between the sequences Q and U.

  The warping path can be determined as follows:

      W=w1,w2,...,wl ,    max(n,m) ≤l≤n+m−1

   The wh element of the path W is defined as:

    Wh =D(i ,j), h=1,....l i=1,.....,n                  j=1,.....,m
24

                                 National Institute of Technology, Rourkela   06/24/12




A correctly determined path W has to fulfill a few
conditions:

   The first element of the sequence Q must be matched to
the first element of the sequence U:
           w1 =w(1,1)=D(1,1)
   The last element of the sequence Q must be matched to
the last element of the sequence U:
           wl=w(n , m)=D(n , m)
   Next assignments in the path cannot concern elements
of sequences that are distant from each other more than
one instant t:
           it - it-1<=1   and    jt - jt-1<=1
   Points of the warping path W must be arranged
monotonically in time:
            it - it-1 >=0 and     jt - jt-1 >=0
25

                         National Institute of Technology, Rourkela   06/24/12




The D matrix together with the warping path for
two sample sequences is shown in Fig. 12.
26
                                                                             06/24/12
                                National Institute of Technology, Rourkela




The elements wk of the path W can be found very efficiently
using dynamic programming. The path W determination starts
from the upper right corner of the populated matrix D. In the
first step i=m and j=n, so wl = D(n,m) . Then the next
coordinates of the cell of the matrix D will be fixed from the
formula:
27

                          National Institute of Technology, Rourkela   06/24/12




Now, on the basis of the all elements w1,w2,…,wl
of the path W the total (cumulative) matching
cost γ can be calculated:
28

                                     National Institute of Technology, Rourkela   06/24/12




Comparison of the lip print projections was done using
the following algorithm:

1. Matching of horizontal, vertical and oblique (angle of 45° and
   135°) projections from the tested and template lip prints using
   the DTW algorithm (separately for the upper and lower lip).

2. Computation of the matching cost of all corresponding
  projections by means of the formula (i,j) and averaging the
  result.
29

                                   National Institute of Technology, Rourkela   06/24/12




DTW path for projections of two different sample lip
prints are shown in the Fig.13.
30

                                   National Institute of Technology, Rourkela   06/24/12




CONCLUSIONS AND FUTURE WORKS
  Considering this fact it can be stated that the results obtained
 by the proposed method are good and indicate the possibility
 of using this approach in forensic identification systems.

 In future studies, further improvement of lip print image
 quality will be also performed. It is also planned to compare a
 larger number of projections generated for different angles.

 Additionally, are planed studies where only part of the lip
 print will be analyzed .
31

                                 National Institute of Technology, Rourkela   06/24/12




REFERENCES
• Lukasz Smacki, Krzysztof Wrobel, Piotr Porwik, “Lip Print
  Recognition Based on DTW Algorithm,” Department of
  Computer Systems, University of Silesia, Katowice, Poland,
  2011

• E.J. Keogh, and M.J. Pazzani, “Computer Derivative
  Dynamic Time Warping,” Proc. First SIAM International
  Conference on Data Mining, Chicago, USA, 2001, pp. 1-11.
32

          National Institute of Technology, Rourkela   06/24/12




Any Suggestions?
33

                                                  National Institute of Technology, Rourkela   06/24/12




For more information visit- www.piyushmittal.in

More Related Content

What's hot

LIP PRINTS
LIP PRINTSLIP PRINTS
LIP PRINTS
vishnu raj
 
Unit1_PAINT.pptx
Unit1_PAINT.pptxUnit1_PAINT.pptx
Unit1_PAINT.pptx
Suchita Rawat
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
sunjaysahu
 
Study of Soil and Paint
Study of Soil and PaintStudy of Soil and Paint
Study of Soil and Paint
Ketan Patil
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
Ankit Kumar
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Development and lifting of Ear print.pptx
Development and lifting of Ear print.pptxDevelopment and lifting of Ear print.pptx
Development and lifting of Ear print.pptx
Shreya Ramteke
 
TOOL MARKS
TOOL MARKSTOOL MARKS
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
Faimin Khan
 
8._Ink_Examination.ppt
8._Ink_Examination.ppt8._Ink_Examination.ppt
8._Ink_Examination.ppt
PallaviKumari112
 
Biometric
Biometric Biometric
Biometric
Pratish Sardar
 
Lip print 2018
Lip print 2018Lip print 2018
Lip print 2018
Shivam Gupta
 
voice recognition
voice recognition voice recognition
voice recognition
Hemant Jain
 
Automated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsAutomated Fingerprint Identification Systems
Automated Fingerprint Identification Systems
Rmcauley
 
Decipherment of indented writting
Decipherment of indented writtingDecipherment of indented writting
Decipherment of indented writting
ShanmukhaValli3
 
ppt
 ppt ppt
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
Mazin Alwaaly
 
Single Metal Deposition : Technique of Latent Fingerprint Development
Single Metal Deposition : Technique of Latent Fingerprint DevelopmentSingle Metal Deposition : Technique of Latent Fingerprint Development
Single Metal Deposition : Technique of Latent Fingerprint Development
RitujaGharote
 

What's hot (20)

LIP PRINTS
LIP PRINTSLIP PRINTS
LIP PRINTS
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
Unit1_PAINT.pptx
Unit1_PAINT.pptxUnit1_PAINT.pptx
Unit1_PAINT.pptx
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Study of Soil and Paint
Study of Soil and PaintStudy of Soil and Paint
Study of Soil and Paint
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
Biometrics
BiometricsBiometrics
Biometrics
 
Development and lifting of Ear print.pptx
Development and lifting of Ear print.pptxDevelopment and lifting of Ear print.pptx
Development and lifting of Ear print.pptx
 
TOOL MARKS
TOOL MARKSTOOL MARKS
TOOL MARKS
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
8._Ink_Examination.ppt
8._Ink_Examination.ppt8._Ink_Examination.ppt
8._Ink_Examination.ppt
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Lip print 2018
Lip print 2018Lip print 2018
Lip print 2018
 
voice recognition
voice recognition voice recognition
voice recognition
 
Automated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsAutomated Fingerprint Identification Systems
Automated Fingerprint Identification Systems
 
Decipherment of indented writting
Decipherment of indented writtingDecipherment of indented writting
Decipherment of indented writting
 
ppt
 ppt ppt
ppt
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Single Metal Deposition : Technique of Latent Fingerprint Development
Single Metal Deposition : Technique of Latent Fingerprint DevelopmentSingle Metal Deposition : Technique of Latent Fingerprint Development
Single Metal Deposition : Technique of Latent Fingerprint Development
 

Viewers also liked

Lip print
Lip printLip print
Lip print
Dr. Hanjala
 
Forensic Odontology
Forensic OdontologyForensic Odontology
Forensic Odontologyrineekhanna
 
Dpa attacks by piyush mittal (211 cs2281)
Dpa attacks by piyush mittal (211 cs2281)Dpa attacks by piyush mittal (211 cs2281)
Dpa attacks by piyush mittal (211 cs2281)Piyush Mittal
 
Forensic odontology
Forensic odontologyForensic odontology
Forensic odontology
Hina Qaiser
 
Basics of Coding Theory
Basics of Coding TheoryBasics of Coding Theory
Basics of Coding TheoryPiyush Mittal
 
Forensic Odontology Dentistry
Forensic Odontology DentistryForensic Odontology Dentistry
Forensic Odontology Dentistry
drkhalidaboalshamat
 
FORENSIC ODONTOLOGY ppt
FORENSIC ODONTOLOGY pptFORENSIC ODONTOLOGY ppt
FORENSIC ODONTOLOGY ppt
K BHATTACHARJEE
 
Forensic Odontology
Forensic OdontologyForensic Odontology
Forensic Odontology
Saurabh Bhargava
 
Parallel aes implementation
Parallel aes implementationParallel aes implementation
Parallel aes implementationPiyush Mittal
 
Lip Service Print Portfolio Presentation
Lip Service Print Portfolio PresentationLip Service Print Portfolio Presentation
Lip Service Print Portfolio PresentationWilliam Pilipchuk
 
Shape Recognition and Retrieval Based on Edit Distance and Dynamic Programming
Shape Recognition and Retrieval Based on Edit Distance and  Dynamic ProgrammingShape Recognition and Retrieval Based on Edit Distance and  Dynamic Programming
Shape Recognition and Retrieval Based on Edit Distance and Dynamic Programming
Kaidul Islam
 
Paper presentation: The relative distance of key point based iris recognition
Paper presentation: The relative distance of key point based iris recognitionPaper presentation: The relative distance of key point based iris recognition
Paper presentation: The relative distance of key point based iris recognition
Yun-Yan Chi
 
Bite mark impression
Bite mark impressionBite mark impression
Bite mark impressionJansen Calibo
 
Human Computer Interaction using Eye Gesture Recognition : ElectroOcculography
Human Computer Interaction using Eye Gesture Recognition : ElectroOcculographyHuman Computer Interaction using Eye Gesture Recognition : ElectroOcculography
Human Computer Interaction using Eye Gesture Recognition : ElectroOcculography
Athira Jay
 
19 Forensic Science Powerpoint Chapter 19 Forensic Footwear Evi
19  Forensic Science Powerpoint Chapter 19 Forensic Footwear Evi19  Forensic Science Powerpoint Chapter 19 Forensic Footwear Evi
19 Forensic Science Powerpoint Chapter 19 Forensic Footwear EviGrossmont College
 
Bitemarks
BitemarksBitemarks
blue_eye_technology_jeevagan
blue_eye_technology_jeevaganblue_eye_technology_jeevagan
blue_eye_technology_jeevagan
jeevagan nagarajan
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis zaidsalfawzan
 

Viewers also liked (20)

Lip print
Lip printLip print
Lip print
 
Forensic Odontology
Forensic OdontologyForensic Odontology
Forensic Odontology
 
Dpa attacks by piyush mittal (211 cs2281)
Dpa attacks by piyush mittal (211 cs2281)Dpa attacks by piyush mittal (211 cs2281)
Dpa attacks by piyush mittal (211 cs2281)
 
Forensic odontology
Forensic odontologyForensic odontology
Forensic odontology
 
Basics of Coding Theory
Basics of Coding TheoryBasics of Coding Theory
Basics of Coding Theory
 
Forensic Odontology Dentistry
Forensic Odontology DentistryForensic Odontology Dentistry
Forensic Odontology Dentistry
 
FORENSIC ODONTOLOGY ppt
FORENSIC ODONTOLOGY pptFORENSIC ODONTOLOGY ppt
FORENSIC ODONTOLOGY ppt
 
Forensic Odontology
Forensic OdontologyForensic Odontology
Forensic Odontology
 
Parallel aes implementation
Parallel aes implementationParallel aes implementation
Parallel aes implementation
 
Lip Service Print Portfolio Presentation
Lip Service Print Portfolio PresentationLip Service Print Portfolio Presentation
Lip Service Print Portfolio Presentation
 
Shape Recognition and Retrieval Based on Edit Distance and Dynamic Programming
Shape Recognition and Retrieval Based on Edit Distance and  Dynamic ProgrammingShape Recognition and Retrieval Based on Edit Distance and  Dynamic Programming
Shape Recognition and Retrieval Based on Edit Distance and Dynamic Programming
 
Paper presentation: The relative distance of key point based iris recognition
Paper presentation: The relative distance of key point based iris recognitionPaper presentation: The relative distance of key point based iris recognition
Paper presentation: The relative distance of key point based iris recognition
 
Eye Recognition
Eye RecognitionEye Recognition
Eye Recognition
 
Bite mark impression
Bite mark impressionBite mark impression
Bite mark impression
 
Human Computer Interaction using Eye Gesture Recognition : ElectroOcculography
Human Computer Interaction using Eye Gesture Recognition : ElectroOcculographyHuman Computer Interaction using Eye Gesture Recognition : ElectroOcculography
Human Computer Interaction using Eye Gesture Recognition : ElectroOcculography
 
19 Forensic Science Powerpoint Chapter 19 Forensic Footwear Evi
19  Forensic Science Powerpoint Chapter 19 Forensic Footwear Evi19  Forensic Science Powerpoint Chapter 19 Forensic Footwear Evi
19 Forensic Science Powerpoint Chapter 19 Forensic Footwear Evi
 
Bitemarks
BitemarksBitemarks
Bitemarks
 
blue_eye_technology_jeevagan
blue_eye_technology_jeevaganblue_eye_technology_jeevagan
blue_eye_technology_jeevagan
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis
 

Similar to Lip recognition

Effective segmentation of sclera, iris and pupil in noisy eye images
Effective segmentation of sclera, iris and pupil in noisy eye imagesEffective segmentation of sclera, iris and pupil in noisy eye images
Effective segmentation of sclera, iris and pupil in noisy eye images
TELKOMNIKA JOURNAL
 
Feature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A SurveyFeature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A SurveyShashank Dhariwal
 
IRJET- Automatic Detection of Diabetic Retinopathy using R-CNN
IRJET- Automatic Detection of Diabetic Retinopathy using R-CNNIRJET- Automatic Detection of Diabetic Retinopathy using R-CNN
IRJET- Automatic Detection of Diabetic Retinopathy using R-CNN
IRJET Journal
 
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
inventionjournals
 
IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...
IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...
IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...
IRJET Journal
 
Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...
journalBEEI
 
A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...
A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...
A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...
IRJET Journal
 
REMOVING RAIN STREAKS FROM SINGLE IMAGES USING TOTAL VARIATION
REMOVING RAIN STREAKS FROM SINGLE IMAGES USING TOTAL VARIATIONREMOVING RAIN STREAKS FROM SINGLE IMAGES USING TOTAL VARIATION
REMOVING RAIN STREAKS FROM SINGLE IMAGES USING TOTAL VARIATION
ijma
 
Data-driven Ophthalmology
Data-driven OphthalmologyData-driven Ophthalmology
Data-driven Ophthalmology
PetteriTeikariPhD
 
Automated Diagnosis of Glaucoma using Haralick Texture Features
Automated Diagnosis of Glaucoma using Haralick Texture FeaturesAutomated Diagnosis of Glaucoma using Haralick Texture Features
Automated Diagnosis of Glaucoma using Haralick Texture Features
IOSR Journals
 
Glaucoma progressiondetection based on Retinal Features.pptx
 Glaucoma progressiondetection based on Retinal Features.pptx Glaucoma progressiondetection based on Retinal Features.pptx
Glaucoma progressiondetection based on Retinal Features.pptx
ssuser097984
 
Image Denoising Based On Sparse Representation In A Probabilistic Framework
Image Denoising Based On Sparse Representation In A Probabilistic FrameworkImage Denoising Based On Sparse Representation In A Probabilistic Framework
Image Denoising Based On Sparse Representation In A Probabilistic Framework
CSCJournals
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
ijistjournal
 
Regenerating face images from multi-spectral palm images using multiple fusio...
Regenerating face images from multi-spectral palm images using multiple fusio...Regenerating face images from multi-spectral palm images using multiple fusio...
Regenerating face images from multi-spectral palm images using multiple fusio...
TELKOMNIKA JOURNAL
 
Computationally Efficient Methods for Sonar Image Denoising using Fractional ...
Computationally Efficient Methods for Sonar Image Denoising using Fractional ...Computationally Efficient Methods for Sonar Image Denoising using Fractional ...
Computationally Efficient Methods for Sonar Image Denoising using Fractional ...
CSCJournals
 
3 d molding and casting
3 d molding and casting3 d molding and casting
3 d molding and castingFab Lab LIMA
 
Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...
IJECEIAES
 
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
IDES Editor
 
IRJET- Survey based on Detection of Optic Disc in Retinal Images using Segmen...
IRJET- Survey based on Detection of Optic Disc in Retinal Images using Segmen...IRJET- Survey based on Detection of Optic Disc in Retinal Images using Segmen...
IRJET- Survey based on Detection of Optic Disc in Retinal Images using Segmen...
IRJET Journal
 

Similar to Lip recognition (20)

Effective segmentation of sclera, iris and pupil in noisy eye images
Effective segmentation of sclera, iris and pupil in noisy eye imagesEffective segmentation of sclera, iris and pupil in noisy eye images
Effective segmentation of sclera, iris and pupil in noisy eye images
 
Feature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A SurveyFeature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A Survey
 
IRJET- Automatic Detection of Diabetic Retinopathy using R-CNN
IRJET- Automatic Detection of Diabetic Retinopathy using R-CNNIRJET- Automatic Detection of Diabetic Retinopathy using R-CNN
IRJET- Automatic Detection of Diabetic Retinopathy using R-CNN
 
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
 
IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...
IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...
IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...
 
Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...Proposition of local automatic algorithm for landmark detection in 3D cephalo...
Proposition of local automatic algorithm for landmark detection in 3D cephalo...
 
A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...
A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...
A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...
 
REMOVING RAIN STREAKS FROM SINGLE IMAGES USING TOTAL VARIATION
REMOVING RAIN STREAKS FROM SINGLE IMAGES USING TOTAL VARIATIONREMOVING RAIN STREAKS FROM SINGLE IMAGES USING TOTAL VARIATION
REMOVING RAIN STREAKS FROM SINGLE IMAGES USING TOTAL VARIATION
 
Mold Oor
Mold OorMold Oor
Mold Oor
 
Data-driven Ophthalmology
Data-driven OphthalmologyData-driven Ophthalmology
Data-driven Ophthalmology
 
Automated Diagnosis of Glaucoma using Haralick Texture Features
Automated Diagnosis of Glaucoma using Haralick Texture FeaturesAutomated Diagnosis of Glaucoma using Haralick Texture Features
Automated Diagnosis of Glaucoma using Haralick Texture Features
 
Glaucoma progressiondetection based on Retinal Features.pptx
 Glaucoma progressiondetection based on Retinal Features.pptx Glaucoma progressiondetection based on Retinal Features.pptx
Glaucoma progressiondetection based on Retinal Features.pptx
 
Image Denoising Based On Sparse Representation In A Probabilistic Framework
Image Denoising Based On Sparse Representation In A Probabilistic FrameworkImage Denoising Based On Sparse Representation In A Probabilistic Framework
Image Denoising Based On Sparse Representation In A Probabilistic Framework
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
 
Regenerating face images from multi-spectral palm images using multiple fusio...
Regenerating face images from multi-spectral palm images using multiple fusio...Regenerating face images from multi-spectral palm images using multiple fusio...
Regenerating face images from multi-spectral palm images using multiple fusio...
 
Computationally Efficient Methods for Sonar Image Denoising using Fractional ...
Computationally Efficient Methods for Sonar Image Denoising using Fractional ...Computationally Efficient Methods for Sonar Image Denoising using Fractional ...
Computationally Efficient Methods for Sonar Image Denoising using Fractional ...
 
3 d molding and casting
3 d molding and casting3 d molding and casting
3 d molding and casting
 
Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...
 
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
 
IRJET- Survey based on Detection of Optic Disc in Retinal Images using Segmen...
IRJET- Survey based on Detection of Optic Disc in Retinal Images using Segmen...IRJET- Survey based on Detection of Optic Disc in Retinal Images using Segmen...
IRJET- Survey based on Detection of Optic Disc in Retinal Images using Segmen...
 

More from Piyush Mittal

Power mock
Power mockPower mock
Power mock
Piyush Mittal
 
Design pattern tutorial
Design pattern tutorialDesign pattern tutorial
Design pattern tutorialPiyush Mittal
 
Intro to parallel computing
Intro to parallel computingIntro to parallel computing
Intro to parallel computingPiyush Mittal
 
Cuda toolkit reference manual
Cuda toolkit reference manualCuda toolkit reference manual
Cuda toolkit reference manualPiyush Mittal
 
Matrix multiplication using CUDA
Matrix multiplication using CUDAMatrix multiplication using CUDA
Matrix multiplication using CUDAPiyush Mittal
 
Google app engine cheat sheet
Google app engine cheat sheetGoogle app engine cheat sheet
Google app engine cheat sheetPiyush Mittal
 
oracle 9i cheat sheet
oracle 9i cheat sheetoracle 9i cheat sheet
oracle 9i cheat sheetPiyush Mittal
 
Open ssh cheet sheat
Open ssh cheet sheatOpen ssh cheet sheat
Open ssh cheet sheatPiyush Mittal
 

More from Piyush Mittal (20)

Power mock
Power mockPower mock
Power mock
 
Design pattern tutorial
Design pattern tutorialDesign pattern tutorial
Design pattern tutorial
 
Reflection
ReflectionReflection
Reflection
 
Gpu archi
Gpu archiGpu archi
Gpu archi
 
Cuda Architecture
Cuda ArchitectureCuda Architecture
Cuda Architecture
 
Intel open mp
Intel open mpIntel open mp
Intel open mp
 
Intro to parallel computing
Intro to parallel computingIntro to parallel computing
Intro to parallel computing
 
Cuda toolkit reference manual
Cuda toolkit reference manualCuda toolkit reference manual
Cuda toolkit reference manual
 
Matrix multiplication using CUDA
Matrix multiplication using CUDAMatrix multiplication using CUDA
Matrix multiplication using CUDA
 
Channel coding
Channel codingChannel coding
Channel coding
 
Java cheat sheet
Java cheat sheetJava cheat sheet
Java cheat sheet
 
Google app engine cheat sheet
Google app engine cheat sheetGoogle app engine cheat sheet
Google app engine cheat sheet
 
Git cheat sheet
Git cheat sheetGit cheat sheet
Git cheat sheet
 
Vi cheat sheet
Vi cheat sheetVi cheat sheet
Vi cheat sheet
 
Css cheat sheet
Css cheat sheetCss cheat sheet
Css cheat sheet
 
Cpp cheat sheet
Cpp cheat sheetCpp cheat sheet
Cpp cheat sheet
 
Ubuntu cheat sheet
Ubuntu cheat sheetUbuntu cheat sheet
Ubuntu cheat sheet
 
Php cheat sheet
Php cheat sheetPhp cheat sheet
Php cheat sheet
 
oracle 9i cheat sheet
oracle 9i cheat sheetoracle 9i cheat sheet
oracle 9i cheat sheet
 
Open ssh cheet sheat
Open ssh cheet sheatOpen ssh cheet sheat
Open ssh cheet sheat
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Lip recognition

  • 1. Lips Recognition Based on DTW Algorithm Presented by- Piyush Mittal (211CS2281) Information Security Computer Science and 06/24/12 Engineering Department 1
  • 2. 2 National Institute of Technology, Rourkela 06/24/12 Overview French criminologist, Edmond Locard, first recommended the use of lip prints for criminal identification in 1932. Lip prints are impressions of human lips left on the objects such as drinking glasses, cigarettes, drink containers, aluminium foils, etc. Study of human lips as a means of personal identification was started in 1970s by two Japanese scientists Yasuo and Kazuo Suzuki. The uniqueness of lip prints makes cheiloscopy especially effective when evidence is discovered at the crime scene such as for example lipstick blot marks, cups or glasses and even envelopes.
  • 3. 3 National Institute of Technology, Rourkela 06/24/12 Overview Similarly to fingerprint patterns, lip prints have the following particular properties: permanence, indestructibility and uniqueness. Lip prints are genotypically determined and therefore and unique and stable throughout life of human being. Additionally, lip prints are not only unique to an individual but also offer the potential for recognition of an individual’s gender. The lip imprints can be captured by special police materials (paper, special cream and magnetic powder). Such obtained imprint pictures are then scanned.
  • 4. 4 National Institute of Technology, Rourkela 06/24/12 FEATURE EXTRACTION
  • 5. 5 National Institute of Technology, Rourkela 06/24/12 1 Image normalization
  • 6. 6 06/24/12 1.1 Detection of lip area National Institute of Technology, Rourkela It consists of several steps – In the first step, normalization of the image histogram is carried out. Then, pixels whose value is greater than the accepted threshold (180) are converted to the white color. Next, median filter with mask 7×7 is used to blur the image. In the last step, binarization is conducted according to the following formula: 0.516.I ( x, y ) I BIN ( x, y ) = 1 − round( ) I AVG where: I ( x, y )– value of the pixel at coordinates (x,y) before Binarization, I AVG– average value of the all image pixels before binarization, I BIN ( x, y ) – value of the pixel at coordinates (x,y) after binarization. The value of 0.516 in the formula was experimentally determined.
  • 7. 7 National Institute of Technology, Rourkela 06/24/12
  • 8. 8 06/24/12 National Institute of Technology, Rourkela 1.2 Separation of Upper and Lower Lip Separation is determined by a curve that runs through the centre of the space between the lips Designated curve divides the lip print into an upper and lower lip.
  • 9. 9 National Institute of Technology, Rourkela 06/24/12 1.3 Lip Print Rotation The curve obtained in the previous stage is then approximated by a straight line (Fig. 3a). For a given straight line equation, a rotation angle towards the X – axis can be determined. It allows obtaining a separation line which will be parallel to the Cartesian OX axis. Rotated lip print image is shown in Fig. 3b.
  • 10. 10 National Institute of Technology, Rourkela 06/24/12 Based on the data obtained in the steps (1)-(3) we get a lip print image rotated and divided into upper and lower lip (Fig. 4).
  • 11. 11 National Institute of Technology, Rourkela 06/24/12 2. Lip pattern extraction
  • 12. 12 National Institute of Technology, Rourkela 06/24/12 2.1 Lip pattern smoothing This process aims to improve the quality level of the lines forming the lip pattern. The smoothing masks 5×5 are depicted in the Fig. 5.
  • 13. 13 National Institute of Technology, Rourkela 06/24/12 The procedure is repeated for the all masks depicted on the Fig. 5. Then, the mask with the largest cumulative value of the sum is ultimately selected. For the selected in the previous step mask, the average value of the pixels lying on the elements of the mask is calculated and copied to the central point of the analyzed source image. The effect of the image smoothing inside of the interest region is shown in Fig. 6.
  • 14. 14 National Institute of Technology, Rourkela 06/24/12 2.2 Top-hat transformation The purpose of this procedure is to emphasize lines of the lip pattern and separate them from the background. To increase effectiveness of the algorithm, transformation is applied twice using different mask sizes. The following masks are used: 2×2 to highlight thin lines (up to 3 pixels) and 6×6 to highlight thick lines (more than 3 pixels). The results of the top-hat transformation are depicted in the Fig. 7.
  • 15. 15 2.3 Binarization National Institute of Technology, Rourkela 06/24/12 This procedure is applied according to the formula below for both images resulted from the top-hat transformation. For the thin lines binarization threshold value was set to t=15, while for the thick lines this parameter was established to t=100. IBIN(x,y) = 1 for I(x,y)>t 0 for I(x,y)<=t where: I(x,y) – value of the pixel at the coordinates (x, y) before binarization, t – binarization threshold, IBIN(x,y)-value of the pixel at the coordinates (x, y) after binarization.
  • 16. 16 National Institute of Technology, Rourkela 06/24/12 The effect of the lip print image binarization is shown in Fig. 8.
  • 17. 17 National Institute of Technology, Rourkela 06/24/12 In the last stage, sub-images for the thin and thick lines are combined into a single image, and then the obtained global image is denoised. For the noise reduction, appropriate 7×7 dimensional masks have been designed. It is depicted on Fig.9.
  • 18. 18 National Institute of Technology, Rourkela 06/24/12 For each of the masks number of black pixels in the highlighted area of the mask is counted. If the number of the black pixels is less than 5, then the central pixel of the mask is converted to the white color. Additionally, the area of the 11×11 pixels around the central point of the mask is searched. If there are less than 11 pixels inside of defined area, then the value of the central point of the mask is converted to the white color. Example of the noise reduction is shown in the Fig.10.
  • 19. 19 National Institute of Technology, Rourkela 06/24/12
  • 20. 20 National Institute of Technology, Rourkela 06/24/12 3 Feature extraction The feature extraction algorithm is carried out for both the upper and lower lip. This process relies on determination of the vertical, horizontal and diagonal projections of the lip pattern image. The exemplary projections of the image lip print pixels towards the appropriate axes are presented in Fig.11. Projections are one-dimensional vectors represented in a form of specialized histograms. Each projection shows number of the black pixels which lie towards the appropriate direction: horizontal, vertical, oblique for 45° and 135°angles.
  • 21. 21 National Institute of Technology, Rourkela 06/24/12
  • 22. 22 National Institute of Technology, Rourkela 06/24/12 THE DTW METHOD Two sequences Q={q1, …, qn} and U={u1, …, um} being compared, the D matrix of the size n×m is built in the first stage. It allows to align the two sequences Q and U. The matrix element D(i, j) contains the distance between the points qi and uj, so D(i, j)=d(qi,uj). In this study, the Euclidean distance was applied. On the basis of the elements D(i, j) so-called sequences matching cost have to be determined. When cost matching is lower then both sequences Q and U are more similar.
  • 23. 23 National Institute of Technology, Rourkela 06/24/12 In the next stage, the warping path W is determined. The path W consists of a set of the some elements of the matrix D what allows to define a mapping between the sequences Q and U. The warping path can be determined as follows: W=w1,w2,...,wl , max(n,m) ≤l≤n+m−1 The wh element of the path W is defined as: Wh =D(i ,j), h=1,....l i=1,.....,n j=1,.....,m
  • 24. 24 National Institute of Technology, Rourkela 06/24/12 A correctly determined path W has to fulfill a few conditions: The first element of the sequence Q must be matched to the first element of the sequence U: w1 =w(1,1)=D(1,1) The last element of the sequence Q must be matched to the last element of the sequence U: wl=w(n , m)=D(n , m) Next assignments in the path cannot concern elements of sequences that are distant from each other more than one instant t: it - it-1<=1 and jt - jt-1<=1 Points of the warping path W must be arranged monotonically in time: it - it-1 >=0 and jt - jt-1 >=0
  • 25. 25 National Institute of Technology, Rourkela 06/24/12 The D matrix together with the warping path for two sample sequences is shown in Fig. 12.
  • 26. 26 06/24/12 National Institute of Technology, Rourkela The elements wk of the path W can be found very efficiently using dynamic programming. The path W determination starts from the upper right corner of the populated matrix D. In the first step i=m and j=n, so wl = D(n,m) . Then the next coordinates of the cell of the matrix D will be fixed from the formula:
  • 27. 27 National Institute of Technology, Rourkela 06/24/12 Now, on the basis of the all elements w1,w2,…,wl of the path W the total (cumulative) matching cost γ can be calculated:
  • 28. 28 National Institute of Technology, Rourkela 06/24/12 Comparison of the lip print projections was done using the following algorithm: 1. Matching of horizontal, vertical and oblique (angle of 45° and 135°) projections from the tested and template lip prints using the DTW algorithm (separately for the upper and lower lip). 2. Computation of the matching cost of all corresponding projections by means of the formula (i,j) and averaging the result.
  • 29. 29 National Institute of Technology, Rourkela 06/24/12 DTW path for projections of two different sample lip prints are shown in the Fig.13.
  • 30. 30 National Institute of Technology, Rourkela 06/24/12 CONCLUSIONS AND FUTURE WORKS Considering this fact it can be stated that the results obtained by the proposed method are good and indicate the possibility of using this approach in forensic identification systems. In future studies, further improvement of lip print image quality will be also performed. It is also planned to compare a larger number of projections generated for different angles. Additionally, are planed studies where only part of the lip print will be analyzed .
  • 31. 31 National Institute of Technology, Rourkela 06/24/12 REFERENCES • Lukasz Smacki, Krzysztof Wrobel, Piotr Porwik, “Lip Print Recognition Based on DTW Algorithm,” Department of Computer Systems, University of Silesia, Katowice, Poland, 2011 • E.J. Keogh, and M.J. Pazzani, “Computer Derivative Dynamic Time Warping,” Proc. First SIAM International Conference on Data Mining, Chicago, USA, 2001, pp. 1-11.
  • 32. 32 National Institute of Technology, Rourkela 06/24/12 Any Suggestions?
  • 33. 33 National Institute of Technology, Rourkela 06/24/12 For more information visit- www.piyushmittal.in