SlideShare a Scribd company logo
1 of 8
Download to read offline
TELKOMNIKA, Vol.15, No.1, March 2017, pp. 478~485
ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013
DOI: 10.12928/TELKOMNIKA.v15i1.4443  478
Received October 5, 2016; Revised December 23, 2016; Accepted January 16, 2017
Multi-feature Fusion Using SIFT and LEBP for Finger
Vein Recognition
Hardika Khusnuliawati, Chastine Fatichah, Rully Soelaiman
Department of Informatics Faculty of Information Technology, Institut Teknologi Sepuluh Nopember
ITS Campus Sukolilo, Surabaya, 60111, Indonesia
*Corresponding author, e-mail: hardika.khusnulia@gmail.com, chastine@cs.its.ac.id, rully@if.its.ac.id
Abstract
In this paper, multi-feature fusion using Scale Invariant Feature Transform (SIFT) and Local
Extensive Binary Pattern (LEBP) was proposed to obtain a feature that could resist degradation problems
such as scaling, rotation, translation and varying illumination conditions. SIFT feature had a capability to
withstand degradation due to changes in the condition of the image scale, rotation and translation.
Meanwhile, LEBP feature had resistance to gray level variations with richer and discriminatory local
characteristics information. Therefore the fusion technique is used to collect important information from
SIFT and LEBP feature.The resulting feature of multi-feature fusion using SIFT and LEBP feature would be
processed by Learning Vector Quantization (LVQ) method to determine whether the testing image could
be recognized or not. The accuracy value could achieve 97.50%, TPR at 0.9400 and FPR at 0.0128 in
optimum condition. That was a better result than only use SIFT or LEBP feature.
Keywords: finger vein, scale invariant feature transform, local extensive binary pattern, multi-feature
fusion, learning vector quantization
Copyright © 2017 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
The finger vein pattern is one of biometric fields that has recently received much
attention as an alternative for human recognition. Compared with other biometric fields, human
recognition based on finger vein has distinct advantages, such as hard to copy or forge and little
external factors can damage it [1].
In general, finger-vein recognition consists four stages: image capturing, preprocessing,
feature extraction and recognition [2]. Feature extraction is a critical step in the finger vein
recognition process [3,4]. Various methods have been proposed for feature extraction stage.
The examples of feature extraction methods which already used for finger vein recognition are
line tracking [1], maximum curvature [5], and mean curvature [6]. Those methods are more
focus on capturing vein pattern from a segmented blood vessel network, meanwhile the scaling,
rotation, transition, and varying illumination problems remain unsolved. Unfortunately, finger
vein images are susceptible to scaling, rotation, transition, and varying illumination conditions
[7,8]. It may affect recognition process and degrades recognition accuracy. So that, it is
important to pay attention to the selection of features that are resistant to these conditions.
SIFT feature have proven to give a better performance compared with other features to
the case of extracting feature from images with scaling, rotation, and transition effects [9]. This
feature has been implemented on several cases, such as object matching [10], image retrieval
[11], palm vein recognition [12], ear recognition [13], and face recognition [14]. However, SIFT
feature gives a poor performance if extracted from the image with varying illumination conditions
which caused by differences in lighting intensity [15]. This is because the SIFT feature highly
dependent on the result of keypoints. While the number of keypoints can be influenced by
differences in lighting intensity.
Local Binary Pattern (LBP) is a feature that resist variations of illumination conditions
[8]. LBP stores the texture pattern into the binary vector where each binary value is obtained by
the result of the difference between the central pixel with the neighboring pixels. The result of
this difference is not influenced by varying illumination conditions. Some of other methods are
proposed to improve the performance of LBP features, such as Local derivative Pattern (LDP)
[16], Local Line Binary Pattern (LLBP) [17], and Local Directional Code (LDC) [18]. The newer
TELKOMNIKA ISSN: 1693-6930 
Multi-feature Fusion Using SIFT and LEBP for … (Hardika Khusnuliawati)
479
one is LEBP feature that resist variations of illumination conditions with richer and discriminatory
local characteristics information [7]. Therefore, LEBP feature can be used to cover the lack of
SIFT feature that gives a poor performance if extracted from the image with varying illumination
conditions.
It is necessary to process SIFT and LEBP feature with a certain method to obtain a
single feature that is resistant to scaling, rotation, transition, and varying illumination conditions.
That single feature must provide an information that can not be gained with only using one of
two features which already previously mentioned, SIFT or LEBP feature. Previously, there is a
method called fusion method that has been used to obtain the new representation of feature
resulted from multiple features processing [19]. In [19], SIFT feature and color histogram are
used in video matching problem. Fusion method combines multiple sources of data through
particular process to obtain a better information [20]. This method can be used to obtain
information from SIFT and LEBP feature and produces a single feature that is resistant to
scaling, rotation, transition, and varying illumination conditions.
Therefore, this study proposes a multi-feature fusion using SIFT feature and LEBP
feature for finger vein recognition. SIFT feature are used to produce feature that are resistant to
scaling, rotation, and transition. Meanwhile LEBP feature is used to produce feature that are
resistant to variations illumination conditions. After SIFT and LEBP feature extracted, both
features are processed by fusion method. The resulting feature is represented into histogram
vector and classified by Learning Vector Quantization (LVQ). LVQ is used to determine whether
the finger vein image can be recognized or not. Multi-feature fusion using SIFT and LEBP
feature is expected to improve the performance of the finger vein recognition that extracted from
images with scaling, rotation, transition, and varying illumination problems.
The structure of this paper is as follows: the first part is the introduction, the second part
explains the proposed algorithms along with the methods that are used, the third part is the
experiment results and the last part is conclusion.
2. Research Method
There are four stages of the finger vein recognition that will be explained in this paper.
These stages consist of preprocessing, base feature extraction, multi-feature fusion and
recognition. A flowchart of finger-vein recognition system is provided in Figure 1.
Figure 1. Design of Finger-Vein Recognition System
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 1, March 2017 : 478 – 485
480
2.1. Preprocessing
Finger vein images which were taken with infrared rays cause human body tissues can
easily be fetched. So that the pattern of finger vein will be captured as shadows and looked
sketchy. It will be difficult to differentiate between background and foreground. To overcome
these difficulties, there is preprocessing stage which consist of median filter, frangi filter,
CLAHE, morphology operation, extracting ROI, and size normalization.
CLAHE is used to improve image contrast, so that we can differentiate between
foreground and background clearly. Frangi filter is used to accentuate the pattern of finger vein.
Median filter is used to reduce noise from the image. Meanwhile, morphological operations is
used to get the pattern of finger vein in the representation of the binary image. Then, the next
step is selecting ROI to reduce a portion of the background image. The last step of
preprocessing stage is size normalization of the result images become 250x95 pixels. Figure 2
shows the Preprocessing steps of finger-vein recognition.
Figure 2. Preprocessing Steps of Finger-Vein Recognition
2.2. SIFT Feature Extraction
Grayscale images which are the result from the preprocessing stage becomes the input
images for SIFT feature extraction stage. The result of SIFT feature extraction is the set of
keypoints along with their descriptors. The main steps to obtain SIFT features are as follows [9]:
1. Scale-space detection using difference-of Gaussian (DoG) methods.
If scale-space image is defined as a function ( ) with the input image ( ) and a
scale factor σ, then scale-space ( ) can be obtained from the convolution with variable-
scale Gaussian ( ) which follows the equation(1).
( ) ( ) ( ) (1)
Whereas to detect stable keypoints efficiently, it is used equation(2). This equation is a
calculation of the difference between the nearest scale space separated by a constant
multiplier .
( ) ( ( ) ( )) ( ) ( ) ( ) (2)
In order to detect the local extrema of ( ), each sample point is compared to its eight
neighbors in the current image and nine neighbors in the scale above and below it. Local
extrema is selected only if it is larger or smaller than all of these neighbors.
2. Keypoint localization.
Adjusting the model as detailed as possible using 3D quadratic function so that the
candidate keypoints which have low contrast, sensitive to noise, and are located around the
edge can be eliminated. Hessian matrix is used to remove candidat keypoints which poorly
localized along on edge. Hessian matrix with size is followed the equation(3).
Meanwhile the standard measurement of the stable keypoints is followed equation(4) with
values define comparison between largest and smallest eigenvalue.
[ ]
(3)
( ) ( ) (4)
TELKOMNIKA ISSN: 1693-6930 
Multi-feature Fusion Using SIFT and LEBP for … (Hardika Khusnuliawati)
481
3. Orientation assigment.
The gradient value m (x, y) and the orientation value θ (x, y) is obtained from the result of
pixels calculation on each sample image ( ) which is followed equation and equation.
( ) √( ( ) ( )) ( ( ) ( ))
(5)
( ) ( ( ) ( )) ( ( ) ( ))⁄
(6)
4. Representation of Keypoint Descriptor. Descriptors for each keypoint is divided into 4x4
subregions. An histogram with 8 bins is used for representing the orientation of the points in
each of the sub-regions. The descriptor vector has (4x4)x 8 = 128 entries.
2.3. LEBP Feature Extraction
Features LEBP is one of the feature that is extracted based on the local characteristics
of a finger vein image. LEBP features is a combination of features LmBP (Multilayer Local
Binary Pattern) and features LdBP (Directional Local Binary Pattern) [7]. LmBP feature is the
variation of LBP feature and LdBP feature is modification of the LDC feature. This combination
can capture the local characteristics of the finger vein better.
To extract LmBP feature, it is used window kernel with a size , . For this
case, LmBP feature use n=7. The center pixel is compared with the neighboring pixels in the
first, second, and third layer. Then, the pixels in the first layer are compared with the second
layer and the pixels in the second layer are compared with the third layer. The comparison
result can be valued at 0 or 1. If the gray value of the center pixel is more than the gray value of
neighboring pixel then the result is 1, whereas if the gray value of the center pixel is less than
the gray value of neighboring pixel then the result is 0. The same thing also applies to the
comparison result between inner layer and outer layer. LmBP feature will be represented in
feature vector length of 64 ( ) .
The first step to get LdBP feature is calculating the LDC value. It uses the difference of
the neighbours of a pixel as the two components and of the local direction [18]. The
equation(7) and equation(8) is followed to obtain and value.
(7)
(8)
LdBP feature is the result of the comparison of value on the central pixels with value of
neighbour pixels, where the value obtained from equation(9) with the value of is the number
of neighboring pixels that are involved. The value of is obtained from equation(10). While the
value of the gradient orientation obtained from equation(11).
(
⁄
)
(9)
( ) ( ) {
(10)
( ) ( ) (11)
Finally, we can get a feature vector . Thus, the LEBP can be defined as
.
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 1, March 2017 : 478 – 485
482
2.4. Fusion SIFT-LEBP Feature
In order to make the process of fusion, SIFT and LEBP feature need to be converted
into a similar vector representation. Vector representation that is used is histogram vector. A
flowchart of feature fusion process is provided in Figure 3.
The process to obtain the SIFT feature descriptor in the histogram representation uses
a collection keypoint as a reference. The keypoints will be processed by Bag Of Visual Words
(BVW) algorithms. BVW is an algorithm to obtain the so-called visual vocabulary by utilizing
local descriptor of an image [21]. There are two main stages to represent an image into a
histogram with BVW algorithms. First stage is visual words construction. The steps to obtain
visual words are shown as follows:
1. Form a matrix with size for each image where is the number of keypoints obtained
from SIFT feature extraction and is the length dimension of SIFT feature descriptors.
2. Cluster the overall descriptors from training image to obtain visual descriptor words of SIFT
features. Visual words are a set of keypoints as the center of each cluster which is obtained
from the K-Means algorithm.
The last step to get the histogram representation of SIFT feature is the retrieval step which
followes:
1. Classifying each keypoint of the matrix for each testing images as a member of the
visual words.
2. Mapping the visual words as the x-axis histogram that shows the number of bin histogram.
While the y-axis is the frequency which states the number of members of each visual word
as a cluster center.
Meanwhile the process to obtain the histogram representation of LEBP feature is described in
the following steps.
1. Dividing the vector into smaller vectors with a length of 8 bits ( ). Each vector
contains a binary value representing a particular pattern.
2. Converting each binary vector pattern to decimal value in the range of 0 to 255. This
value is expressed a gray level value which will be mapped into the histogram.
3. Mapping the gray level values into histogram with the the number of bin is 256.
After obtaining the histogram of SIFT and LEBP feature, then the next step is concatening both
histogram into one.
Figure 3. Design of SIFT-LEBP Feature Fusion Process
TELKOMNIKA ISSN: 1693-6930 
Multi-feature Fusion Using SIFT and LEBP for … (Hardika Khusnuliawati)
483
3. Results and Analysis
The images of finger vein are obtained from finger-vein dataset from Hong Kong
Polytechnic University [22]. The number of images that were used in the experiments is 300
finger vein images from 50 persons. After that, the data images are divided into two groups: 200
images were taken as a training dataset and the remaining 100 images are used as testing
dataset for checking recognition performance. There were three models that are conducted in
these experiments. The first and second model use one feature, SIFT or LEBP feature only. The
last model use SIFT-LEBP feature fusion which is proposed in this paper. The performance of
the three models compared by evaluation metrics: accuracy, FPR (False Positive Rate), and
TPR (True Positive Rate). The value of those evaluation metrics are derived from the analysis of
the confusion matrix that can be seen in Table 1. From the results of the analysis, the equation
to calculate the accuracy, FPR, and TPR shown in equation(12), equation(13), and equation(14)
respectively.
Table 1. Table of Confussion Matrix [23]
Prediction
Actual
Within Class Between Class
Within Class
True Positive
(True Accept, Hit)
False Positive
(False Accept, False Alarm)
Between Class
False Negative
(False Reject, Miss)
True Negative
(True Reject)
accuracy = (TP + TN) / (TP+FN+ FP+TN)
(12)
TPR = TP / (TP + FN) (13)
FPR = FP / (FP + TN) (14)
The evaluation results are given in Table 2. From the table, it can be seen that the
accuracy value using SIFT-LEBP feature has exceeded the accuracy value using a single
feature. When using SIFT-LEBP feature, the accuracy is 97.50%, while using SIFT and LEBP
feature, the accuracy are 97.34% and 97.32%, respectively. So it can be said that the fusion
technique to obtain SIFT feature-LEBP is correct. In addition, a finger vein recognition system is
said to have a good performance when has a high true positive value and a low false negative
value. If we look at the results of finger vein recognition using SIFT-LEBP features in Table 2, it
can be seen that the value of true positive and false negative are relatively better when
compared to using only a single feature whether LEBP or SIFT feature. When using SIFT and
LEBP feature, the TPR are 0.8200 and 0.8300, respectively. While using SIFT-LEBP feature,
the TPR increase to 0.9400. For FPR value, when using SIFT and LEBP feature, it gets 0.0135
and 0.0137, while using SIFT-LEBP feature, the FPR decrease to 0.0128.
Table 2. The Performance Comparison of Finger Vein Recognition Using SIFT,
LEBP, and SIFT-LEBP Feature
Fitur FPR TPR Accuracy (%)
SIFT 0.0135 0.8200 97.34
LEBP 0.0137 0.8300 97.32
SIFT-LEBP 0.0128 0.9400 97.50
The high value of TPR is caused by the ability of SIFT-LEBP feature to recognize a
finger vein image with scaling, rotation, transition, and varying illumination conditions. While a
single feature only has a capability to overcome only some image degradation. For example, the
images in Figure 4 is able to be identified using SIFT features and SIFT-LEBP feature while
LEBP feature can not recognize them. The other example, the images in Figure 5 is able to be
identified using LEBP features and SIFT-LEBP feature but SIFT feature is not able to recognize
them. SIFT-LEBP feature also has capability to recognize images that are not able to be
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 1, March 2017 : 478 – 485
484
recognized by the SIFT feature and LEBP feature. The examples of the image are shown in
Figure 6.
(a) (b)
(c)
Figure 4. The Examples of Images which can be Recognized by the Finger Vein Recognition
System Using SIFT Feature (a) The Image with Translation Effect (b) The Image with Rotation
Effect (c) The Image with Translation and Rotation Effect
(a) (b)
Figure 5. The Examples of Images which can be Recognized by the Finger Vein Recognition
System Using LEBP Feature (a),(b) The Image with Varying Illumination Conditions
(a) (b)
(c)
Figure 6 The Examples of Images which can be Recognized by the Finger Vein Recognition
System Using SIFT-LEBP Feature (a),(b),(c) The Image with Geometric Degradation and
Varying Illumination Conditions
4. Conclusion
In this paper, we propose a multi-feature fusion using SIFT and LEBP feature for finger
vein recognition in images with scaling, rotation, translation and varying illumination conditions.
Fusion method that is used to form the SIFT-LEBP feature have shown relatively good results
with the accuracy value are not much different from the result that has been obtained if only
TELKOMNIKA ISSN: 1693-6930 
Multi-feature Fusion Using SIFT and LEBP for … (Hardika Khusnuliawati)
485
using a single feature whether SIFT or LEBP. The accuracy of finger vein recognition using
SIFT-LEBP feature at the optimum condition reach to 97.50%. Therefore, it can be said that the
multi-feature fusion using SIFT and LEBP is applicable for finger vein recognition in images with
scaling, rotation, translation and varying illumination conditions. In addition, SIFT-LEBP feature
provides relatively better results when compared to using only a single feature whether SIFT or
LEBP. This can be seen from the value of TPR and FPR that are 0.9400 and 0.0128,
respectively.
References
[1] Miura N, Nagasaka A, Miyatake T. Feature extraction of finger-vein patterns based on repeated line
tracking and its application to personal identification. Machine Vision and Applications. 2004; 15(4):
194-203.
[2] Yang L, Yang G, Yin Y, Zhou L. A survey of finger vein recognition. Chinese Conference on Biometric
Recognition. Springer International Publishing. Shenyang. 2014; 9: 234-243.
[3] Pang S, Yin Y, Yang G, Li Y. Rotation invariant finger vein recognition. Chinese Conference on
Biometric Recognition. Springer Berlin Heidelberg. Guangzhou. 2012; 7: 151-156.
[4] Yang W, Rao Q, Liao Q. Personal identification for single sample using finger vein location and
direction coding. Hand-Based Biometrics (ICHB). IEEE. Hong Kong. 2011: 1-6.
[5] Miura N, Nagasaka A, Miyatake T. Extraction of finger-vein patterns using maximum curvature points
in image profiles. IEICE TRANSACTIONS on Information and Systems. 2007; 90(8): 1185-94.
[6] Song W, Kim T, Kim HC, Choi JH, Kong HJ, Lee SR. A finger-vein verification system using mean
curvature. Pattern Recognition Letters. 2011; 32(11): 1541-7.
[7] Liu F, Yang G, Yin Y, Wang S. Singular value decomposition based minutiae matching method for
finger vein recognition. Neurocomputing. 2014; 145: 75-89.
[8] Ojala T, Pietikainen M, Maenpaa T. Multiresolution gray-scale and rotation invariant texture
classification with local binary patterns. IEEE Transactions on pattern analysis and machine
intelligence. 2002; 24(7): 971-87.
[9] Lowe DG. Distinctive image features from scale-invariant keypoints. International journal of computer
vision. 2004; 60(2): 91-110.
[10] Yi D, Jianguo L, Xilong Q. Video Object Matching Based on SIFT and Rotation Invariant LBP.
Indonesian Journal of Electrical Engineering and Computer Science. 2013; 11(10): 5876-83.
[11] Yu J, Qin Z, Wan T, Zhang X. Feature integration analysis of bag-of-features model for image
retrieval. Neurocomputing. 2013; 120: 355-64.
[12] Ladoux PO, Rosenberger C, Dorizzi B. Palm vein verification system based on SIFT matching.
International Conference on Biometrics. Springer Berlin Heidelberg. Alghero. 2009; 3:1290-1298.
[13] Chi M, Yongyong Z, Ying T. Ear Recognition based on Forstner and SIFT. Indonesian Journal of
Electrical Engineering and Computer Science. 2013; 11(12): 7131-7.
[14] Xu X, Zhao Y. Multimodal Face Recognition for Profile Views Based on SIFT and LBP. Face and
Facial Expression Recognition from Real World Videos. Springer International Publishing. Stockholm.
2015: 20-30.
[15] Kim HG, Lee EJ, Yoon GJ, Yang SD, Lee EC, Yoon SM. Illumination normalization for SIFT based
finger vein authentication. International Symposium on Visual Computing. Springer Berlin Heidelberg.
Rethymnon. 2012; 8: 21-30.
[16] Zhang B, Gao Y, Zhao S, Liu J. Local derivative pattern versus local binary pattern: face recognition
with high-order local pattern descriptor. IEEE transactions on image processing. 2010; 19(2): 533-44.
[17] Sari JY, Fatichah C, Suciati N. Local Line Binary Pattern For Feature Extraction on Palm Vein
Recognition. Jurnal Ilmu Komputer dan Informasi. 2015; 8(2): 116-23.
[18] Meng X, Yang G, Yin Y, Xiao R. Finger vein recognition based on local directional code. Sensors.
2012; 12(11): 14937-52.
[19] Wang H, Wang X, Zheng J, Deller JR, Peng H, Zhu L, Chen W, Li X, Liu R, Bao H. Video object
matching across multiple non-overlapping camera views based on multi-feature fusion and
incremental learning. Pattern Recognition. 2014; 47(12): 3841-51.
[20] Castanedo F. A review of data fusion techniques. The Scientific World Journal 2013. 2013.
[21] Haas S, Donner R, Burner A, Holzer M, Langs G. Superpixel-Based interest points for effective bags
of visual words medical image retrieval. MICCAI International Workshop on Medical Content-Based
Retrieval for Clinical Decision Support. Springer Berlin Heidelberg. Toronto. 2011; 2: 58-68.
[22] Kumar A, Zhou Y. Human identification using finger images. IEEE Transactions on Image
Processing. 2012; 21(4): 2228-44.
[23] Fawcett T. An introduction to ROC analysis. Pattern recognition letters. 2006; 27(8):861-74.

More Related Content

What's hot

TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGKamana Tripathi
 
Lip Reading by Using 3-D Discrete Wavelet Transform with Dmey Wavelet
Lip Reading by Using 3-D Discrete Wavelet Transform with Dmey WaveletLip Reading by Using 3-D Discrete Wavelet Transform with Dmey Wavelet
Lip Reading by Using 3-D Discrete Wavelet Transform with Dmey WaveletCSCJournals
 
MSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching TechniquesMSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching TechniquesCSCJournals
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGKamana Tripathi
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Use of Illumination Invariant Feature Descriptor for Face Recognition
 Use of Illumination Invariant Feature Descriptor for Face Recognition Use of Illumination Invariant Feature Descriptor for Face Recognition
Use of Illumination Invariant Feature Descriptor for Face RecognitionIJCSIS Research Publications
 
Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...csandit
 
Video Manifold Feature Extraction Based on ISOMAP
Video Manifold Feature Extraction Based on ISOMAPVideo Manifold Feature Extraction Based on ISOMAP
Video Manifold Feature Extraction Based on ISOMAPinventionjournals
 
Implementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupilsImplementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupilssipij
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET Journal
 
IMAGE COMPOSITE DETECTION USING CUSTOMIZED
IMAGE COMPOSITE DETECTION USING CUSTOMIZEDIMAGE COMPOSITE DETECTION USING CUSTOMIZED
IMAGE COMPOSITE DETECTION USING CUSTOMIZEDijcga
 

What's hot (18)

TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
 
Lip Reading by Using 3-D Discrete Wavelet Transform with Dmey Wavelet
Lip Reading by Using 3-D Discrete Wavelet Transform with Dmey WaveletLip Reading by Using 3-D Discrete Wavelet Transform with Dmey Wavelet
Lip Reading by Using 3-D Discrete Wavelet Transform with Dmey Wavelet
 
MSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching TechniquesMSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching Techniques
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Use of Illumination Invariant Feature Descriptor for Face Recognition
 Use of Illumination Invariant Feature Descriptor for Face Recognition Use of Illumination Invariant Feature Descriptor for Face Recognition
Use of Illumination Invariant Feature Descriptor for Face Recognition
 
Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...
 
Video Manifold Feature Extraction Based on ISOMAP
Video Manifold Feature Extraction Based on ISOMAPVideo Manifold Feature Extraction Based on ISOMAP
Video Manifold Feature Extraction Based on ISOMAP
 
Matlab abstract 2016
Matlab abstract 2016Matlab abstract 2016
Matlab abstract 2016
 
F0164348
F0164348F0164348
F0164348
 
B221223
B221223B221223
B221223
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Implementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupilsImplementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupils
 
N026080083
N026080083N026080083
N026080083
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
 
50620130101001
5062013010100150620130101001
50620130101001
 
IMAGE COMPOSITE DETECTION USING CUSTOMIZED
IMAGE COMPOSITE DETECTION USING CUSTOMIZEDIMAGE COMPOSITE DETECTION USING CUSTOMIZED
IMAGE COMPOSITE DETECTION USING CUSTOMIZED
 
23-02-03[1]
23-02-03[1]23-02-03[1]
23-02-03[1]
 

Similar to Multi-feature Fusion Using SIFT and LEBP for Finger Vein Recognition

DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYDCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYIAEME Publication
 
Touchless Palmprint Verification using Shock Filter, SIFT, I-RANSAC, and LPD
Touchless Palmprint Verification using Shock Filter, SIFT, I-RANSAC, and LPD Touchless Palmprint Verification using Shock Filter, SIFT, I-RANSAC, and LPD
Touchless Palmprint Verification using Shock Filter, SIFT, I-RANSAC, and LPD iosrjce
 
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...IRJET Journal
 
A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...IJSRD
 
Video Shot Boundary Detection Using The Scale Invariant Feature Transform and...
Video Shot Boundary Detection Using The Scale Invariant Feature Transform and...Video Shot Boundary Detection Using The Scale Invariant Feature Transform and...
Video Shot Boundary Detection Using The Scale Invariant Feature Transform and...IJECEIAES
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformIRJET Journal
 
A Spectral Domain Dominant Feature Extraction Algorithm for Palm-print Recogn...
A Spectral Domain Dominant Feature Extraction Algorithm for Palm-print Recogn...A Spectral Domain Dominant Feature Extraction Algorithm for Palm-print Recogn...
A Spectral Domain Dominant Feature Extraction Algorithm for Palm-print Recogn...CSCJournals
 
IRJET- Sign Language Interpreter using Image Processing and Machine Learning
IRJET- Sign Language Interpreter using Image Processing and Machine LearningIRJET- Sign Language Interpreter using Image Processing and Machine Learning
IRJET- Sign Language Interpreter using Image Processing and Machine LearningIRJET Journal
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Editor IJCATR
 
Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...
Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...
Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...IOSR Journals
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEditor IJMTER
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmIJARIIT
 
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET Journal
 
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...journalBEEI
 
Remote Sensing Image Fusion Using Contourlet Transform With Sharp Frequency L...
Remote Sensing Image Fusion Using Contourlet Transform With Sharp Frequency L...Remote Sensing Image Fusion Using Contourlet Transform With Sharp Frequency L...
Remote Sensing Image Fusion Using Contourlet Transform With Sharp Frequency L...Zac Darcy
 
Remote sensing image fusion using contourlet transform with sharp frequency l...
Remote sensing image fusion using contourlet transform with sharp frequency l...Remote sensing image fusion using contourlet transform with sharp frequency l...
Remote sensing image fusion using contourlet transform with sharp frequency l...Zac Darcy
 

Similar to Multi-feature Fusion Using SIFT and LEBP for Finger Vein Recognition (20)

DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYDCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
 
A05610109
A05610109A05610109
A05610109
 
A017330108
A017330108A017330108
A017330108
 
Touchless Palmprint Verification using Shock Filter, SIFT, I-RANSAC, and LPD
Touchless Palmprint Verification using Shock Filter, SIFT, I-RANSAC, and LPD Touchless Palmprint Verification using Shock Filter, SIFT, I-RANSAC, and LPD
Touchless Palmprint Verification using Shock Filter, SIFT, I-RANSAC, and LPD
 
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
 
A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...
 
Video Shot Boundary Detection Using The Scale Invariant Feature Transform and...
Video Shot Boundary Detection Using The Scale Invariant Feature Transform and...Video Shot Boundary Detection Using The Scale Invariant Feature Transform and...
Video Shot Boundary Detection Using The Scale Invariant Feature Transform and...
 
K0704059064
K0704059064K0704059064
K0704059064
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
 
A Spectral Domain Dominant Feature Extraction Algorithm for Palm-print Recogn...
A Spectral Domain Dominant Feature Extraction Algorithm for Palm-print Recogn...A Spectral Domain Dominant Feature Extraction Algorithm for Palm-print Recogn...
A Spectral Domain Dominant Feature Extraction Algorithm for Palm-print Recogn...
 
IRJET- Sign Language Interpreter using Image Processing and Machine Learning
IRJET- Sign Language Interpreter using Image Processing and Machine LearningIRJET- Sign Language Interpreter using Image Processing and Machine Learning
IRJET- Sign Language Interpreter using Image Processing and Machine Learning
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
 
Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...
Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...
Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Usi...
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithm
 
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
 
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...
 
Remote Sensing Image Fusion Using Contourlet Transform With Sharp Frequency L...
Remote Sensing Image Fusion Using Contourlet Transform With Sharp Frequency L...Remote Sensing Image Fusion Using Contourlet Transform With Sharp Frequency L...
Remote Sensing Image Fusion Using Contourlet Transform With Sharp Frequency L...
 
Remote sensing image fusion using contourlet transform with sharp frequency l...
Remote sensing image fusion using contourlet transform with sharp frequency l...Remote sensing image fusion using contourlet transform with sharp frequency l...
Remote sensing image fusion using contourlet transform with sharp frequency l...
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

Multi-feature Fusion Using SIFT and LEBP for Finger Vein Recognition

  • 1. TELKOMNIKA, Vol.15, No.1, March 2017, pp. 478~485 ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013 DOI: 10.12928/TELKOMNIKA.v15i1.4443  478 Received October 5, 2016; Revised December 23, 2016; Accepted January 16, 2017 Multi-feature Fusion Using SIFT and LEBP for Finger Vein Recognition Hardika Khusnuliawati, Chastine Fatichah, Rully Soelaiman Department of Informatics Faculty of Information Technology, Institut Teknologi Sepuluh Nopember ITS Campus Sukolilo, Surabaya, 60111, Indonesia *Corresponding author, e-mail: hardika.khusnulia@gmail.com, chastine@cs.its.ac.id, rully@if.its.ac.id Abstract In this paper, multi-feature fusion using Scale Invariant Feature Transform (SIFT) and Local Extensive Binary Pattern (LEBP) was proposed to obtain a feature that could resist degradation problems such as scaling, rotation, translation and varying illumination conditions. SIFT feature had a capability to withstand degradation due to changes in the condition of the image scale, rotation and translation. Meanwhile, LEBP feature had resistance to gray level variations with richer and discriminatory local characteristics information. Therefore the fusion technique is used to collect important information from SIFT and LEBP feature.The resulting feature of multi-feature fusion using SIFT and LEBP feature would be processed by Learning Vector Quantization (LVQ) method to determine whether the testing image could be recognized or not. The accuracy value could achieve 97.50%, TPR at 0.9400 and FPR at 0.0128 in optimum condition. That was a better result than only use SIFT or LEBP feature. Keywords: finger vein, scale invariant feature transform, local extensive binary pattern, multi-feature fusion, learning vector quantization Copyright © 2017 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction The finger vein pattern is one of biometric fields that has recently received much attention as an alternative for human recognition. Compared with other biometric fields, human recognition based on finger vein has distinct advantages, such as hard to copy or forge and little external factors can damage it [1]. In general, finger-vein recognition consists four stages: image capturing, preprocessing, feature extraction and recognition [2]. Feature extraction is a critical step in the finger vein recognition process [3,4]. Various methods have been proposed for feature extraction stage. The examples of feature extraction methods which already used for finger vein recognition are line tracking [1], maximum curvature [5], and mean curvature [6]. Those methods are more focus on capturing vein pattern from a segmented blood vessel network, meanwhile the scaling, rotation, transition, and varying illumination problems remain unsolved. Unfortunately, finger vein images are susceptible to scaling, rotation, transition, and varying illumination conditions [7,8]. It may affect recognition process and degrades recognition accuracy. So that, it is important to pay attention to the selection of features that are resistant to these conditions. SIFT feature have proven to give a better performance compared with other features to the case of extracting feature from images with scaling, rotation, and transition effects [9]. This feature has been implemented on several cases, such as object matching [10], image retrieval [11], palm vein recognition [12], ear recognition [13], and face recognition [14]. However, SIFT feature gives a poor performance if extracted from the image with varying illumination conditions which caused by differences in lighting intensity [15]. This is because the SIFT feature highly dependent on the result of keypoints. While the number of keypoints can be influenced by differences in lighting intensity. Local Binary Pattern (LBP) is a feature that resist variations of illumination conditions [8]. LBP stores the texture pattern into the binary vector where each binary value is obtained by the result of the difference between the central pixel with the neighboring pixels. The result of this difference is not influenced by varying illumination conditions. Some of other methods are proposed to improve the performance of LBP features, such as Local derivative Pattern (LDP) [16], Local Line Binary Pattern (LLBP) [17], and Local Directional Code (LDC) [18]. The newer
  • 2. TELKOMNIKA ISSN: 1693-6930  Multi-feature Fusion Using SIFT and LEBP for … (Hardika Khusnuliawati) 479 one is LEBP feature that resist variations of illumination conditions with richer and discriminatory local characteristics information [7]. Therefore, LEBP feature can be used to cover the lack of SIFT feature that gives a poor performance if extracted from the image with varying illumination conditions. It is necessary to process SIFT and LEBP feature with a certain method to obtain a single feature that is resistant to scaling, rotation, transition, and varying illumination conditions. That single feature must provide an information that can not be gained with only using one of two features which already previously mentioned, SIFT or LEBP feature. Previously, there is a method called fusion method that has been used to obtain the new representation of feature resulted from multiple features processing [19]. In [19], SIFT feature and color histogram are used in video matching problem. Fusion method combines multiple sources of data through particular process to obtain a better information [20]. This method can be used to obtain information from SIFT and LEBP feature and produces a single feature that is resistant to scaling, rotation, transition, and varying illumination conditions. Therefore, this study proposes a multi-feature fusion using SIFT feature and LEBP feature for finger vein recognition. SIFT feature are used to produce feature that are resistant to scaling, rotation, and transition. Meanwhile LEBP feature is used to produce feature that are resistant to variations illumination conditions. After SIFT and LEBP feature extracted, both features are processed by fusion method. The resulting feature is represented into histogram vector and classified by Learning Vector Quantization (LVQ). LVQ is used to determine whether the finger vein image can be recognized or not. Multi-feature fusion using SIFT and LEBP feature is expected to improve the performance of the finger vein recognition that extracted from images with scaling, rotation, transition, and varying illumination problems. The structure of this paper is as follows: the first part is the introduction, the second part explains the proposed algorithms along with the methods that are used, the third part is the experiment results and the last part is conclusion. 2. Research Method There are four stages of the finger vein recognition that will be explained in this paper. These stages consist of preprocessing, base feature extraction, multi-feature fusion and recognition. A flowchart of finger-vein recognition system is provided in Figure 1. Figure 1. Design of Finger-Vein Recognition System
  • 3.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 1, March 2017 : 478 – 485 480 2.1. Preprocessing Finger vein images which were taken with infrared rays cause human body tissues can easily be fetched. So that the pattern of finger vein will be captured as shadows and looked sketchy. It will be difficult to differentiate between background and foreground. To overcome these difficulties, there is preprocessing stage which consist of median filter, frangi filter, CLAHE, morphology operation, extracting ROI, and size normalization. CLAHE is used to improve image contrast, so that we can differentiate between foreground and background clearly. Frangi filter is used to accentuate the pattern of finger vein. Median filter is used to reduce noise from the image. Meanwhile, morphological operations is used to get the pattern of finger vein in the representation of the binary image. Then, the next step is selecting ROI to reduce a portion of the background image. The last step of preprocessing stage is size normalization of the result images become 250x95 pixels. Figure 2 shows the Preprocessing steps of finger-vein recognition. Figure 2. Preprocessing Steps of Finger-Vein Recognition 2.2. SIFT Feature Extraction Grayscale images which are the result from the preprocessing stage becomes the input images for SIFT feature extraction stage. The result of SIFT feature extraction is the set of keypoints along with their descriptors. The main steps to obtain SIFT features are as follows [9]: 1. Scale-space detection using difference-of Gaussian (DoG) methods. If scale-space image is defined as a function ( ) with the input image ( ) and a scale factor σ, then scale-space ( ) can be obtained from the convolution with variable- scale Gaussian ( ) which follows the equation(1). ( ) ( ) ( ) (1) Whereas to detect stable keypoints efficiently, it is used equation(2). This equation is a calculation of the difference between the nearest scale space separated by a constant multiplier . ( ) ( ( ) ( )) ( ) ( ) ( ) (2) In order to detect the local extrema of ( ), each sample point is compared to its eight neighbors in the current image and nine neighbors in the scale above and below it. Local extrema is selected only if it is larger or smaller than all of these neighbors. 2. Keypoint localization. Adjusting the model as detailed as possible using 3D quadratic function so that the candidate keypoints which have low contrast, sensitive to noise, and are located around the edge can be eliminated. Hessian matrix is used to remove candidat keypoints which poorly localized along on edge. Hessian matrix with size is followed the equation(3). Meanwhile the standard measurement of the stable keypoints is followed equation(4) with values define comparison between largest and smallest eigenvalue. [ ] (3) ( ) ( ) (4)
  • 4. TELKOMNIKA ISSN: 1693-6930  Multi-feature Fusion Using SIFT and LEBP for … (Hardika Khusnuliawati) 481 3. Orientation assigment. The gradient value m (x, y) and the orientation value θ (x, y) is obtained from the result of pixels calculation on each sample image ( ) which is followed equation and equation. ( ) √( ( ) ( )) ( ( ) ( )) (5) ( ) ( ( ) ( )) ( ( ) ( ))⁄ (6) 4. Representation of Keypoint Descriptor. Descriptors for each keypoint is divided into 4x4 subregions. An histogram with 8 bins is used for representing the orientation of the points in each of the sub-regions. The descriptor vector has (4x4)x 8 = 128 entries. 2.3. LEBP Feature Extraction Features LEBP is one of the feature that is extracted based on the local characteristics of a finger vein image. LEBP features is a combination of features LmBP (Multilayer Local Binary Pattern) and features LdBP (Directional Local Binary Pattern) [7]. LmBP feature is the variation of LBP feature and LdBP feature is modification of the LDC feature. This combination can capture the local characteristics of the finger vein better. To extract LmBP feature, it is used window kernel with a size , . For this case, LmBP feature use n=7. The center pixel is compared with the neighboring pixels in the first, second, and third layer. Then, the pixels in the first layer are compared with the second layer and the pixels in the second layer are compared with the third layer. The comparison result can be valued at 0 or 1. If the gray value of the center pixel is more than the gray value of neighboring pixel then the result is 1, whereas if the gray value of the center pixel is less than the gray value of neighboring pixel then the result is 0. The same thing also applies to the comparison result between inner layer and outer layer. LmBP feature will be represented in feature vector length of 64 ( ) . The first step to get LdBP feature is calculating the LDC value. It uses the difference of the neighbours of a pixel as the two components and of the local direction [18]. The equation(7) and equation(8) is followed to obtain and value. (7) (8) LdBP feature is the result of the comparison of value on the central pixels with value of neighbour pixels, where the value obtained from equation(9) with the value of is the number of neighboring pixels that are involved. The value of is obtained from equation(10). While the value of the gradient orientation obtained from equation(11). ( ⁄ ) (9) ( ) ( ) { (10) ( ) ( ) (11) Finally, we can get a feature vector . Thus, the LEBP can be defined as .
  • 5.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 1, March 2017 : 478 – 485 482 2.4. Fusion SIFT-LEBP Feature In order to make the process of fusion, SIFT and LEBP feature need to be converted into a similar vector representation. Vector representation that is used is histogram vector. A flowchart of feature fusion process is provided in Figure 3. The process to obtain the SIFT feature descriptor in the histogram representation uses a collection keypoint as a reference. The keypoints will be processed by Bag Of Visual Words (BVW) algorithms. BVW is an algorithm to obtain the so-called visual vocabulary by utilizing local descriptor of an image [21]. There are two main stages to represent an image into a histogram with BVW algorithms. First stage is visual words construction. The steps to obtain visual words are shown as follows: 1. Form a matrix with size for each image where is the number of keypoints obtained from SIFT feature extraction and is the length dimension of SIFT feature descriptors. 2. Cluster the overall descriptors from training image to obtain visual descriptor words of SIFT features. Visual words are a set of keypoints as the center of each cluster which is obtained from the K-Means algorithm. The last step to get the histogram representation of SIFT feature is the retrieval step which followes: 1. Classifying each keypoint of the matrix for each testing images as a member of the visual words. 2. Mapping the visual words as the x-axis histogram that shows the number of bin histogram. While the y-axis is the frequency which states the number of members of each visual word as a cluster center. Meanwhile the process to obtain the histogram representation of LEBP feature is described in the following steps. 1. Dividing the vector into smaller vectors with a length of 8 bits ( ). Each vector contains a binary value representing a particular pattern. 2. Converting each binary vector pattern to decimal value in the range of 0 to 255. This value is expressed a gray level value which will be mapped into the histogram. 3. Mapping the gray level values into histogram with the the number of bin is 256. After obtaining the histogram of SIFT and LEBP feature, then the next step is concatening both histogram into one. Figure 3. Design of SIFT-LEBP Feature Fusion Process
  • 6. TELKOMNIKA ISSN: 1693-6930  Multi-feature Fusion Using SIFT and LEBP for … (Hardika Khusnuliawati) 483 3. Results and Analysis The images of finger vein are obtained from finger-vein dataset from Hong Kong Polytechnic University [22]. The number of images that were used in the experiments is 300 finger vein images from 50 persons. After that, the data images are divided into two groups: 200 images were taken as a training dataset and the remaining 100 images are used as testing dataset for checking recognition performance. There were three models that are conducted in these experiments. The first and second model use one feature, SIFT or LEBP feature only. The last model use SIFT-LEBP feature fusion which is proposed in this paper. The performance of the three models compared by evaluation metrics: accuracy, FPR (False Positive Rate), and TPR (True Positive Rate). The value of those evaluation metrics are derived from the analysis of the confusion matrix that can be seen in Table 1. From the results of the analysis, the equation to calculate the accuracy, FPR, and TPR shown in equation(12), equation(13), and equation(14) respectively. Table 1. Table of Confussion Matrix [23] Prediction Actual Within Class Between Class Within Class True Positive (True Accept, Hit) False Positive (False Accept, False Alarm) Between Class False Negative (False Reject, Miss) True Negative (True Reject) accuracy = (TP + TN) / (TP+FN+ FP+TN) (12) TPR = TP / (TP + FN) (13) FPR = FP / (FP + TN) (14) The evaluation results are given in Table 2. From the table, it can be seen that the accuracy value using SIFT-LEBP feature has exceeded the accuracy value using a single feature. When using SIFT-LEBP feature, the accuracy is 97.50%, while using SIFT and LEBP feature, the accuracy are 97.34% and 97.32%, respectively. So it can be said that the fusion technique to obtain SIFT feature-LEBP is correct. In addition, a finger vein recognition system is said to have a good performance when has a high true positive value and a low false negative value. If we look at the results of finger vein recognition using SIFT-LEBP features in Table 2, it can be seen that the value of true positive and false negative are relatively better when compared to using only a single feature whether LEBP or SIFT feature. When using SIFT and LEBP feature, the TPR are 0.8200 and 0.8300, respectively. While using SIFT-LEBP feature, the TPR increase to 0.9400. For FPR value, when using SIFT and LEBP feature, it gets 0.0135 and 0.0137, while using SIFT-LEBP feature, the FPR decrease to 0.0128. Table 2. The Performance Comparison of Finger Vein Recognition Using SIFT, LEBP, and SIFT-LEBP Feature Fitur FPR TPR Accuracy (%) SIFT 0.0135 0.8200 97.34 LEBP 0.0137 0.8300 97.32 SIFT-LEBP 0.0128 0.9400 97.50 The high value of TPR is caused by the ability of SIFT-LEBP feature to recognize a finger vein image with scaling, rotation, transition, and varying illumination conditions. While a single feature only has a capability to overcome only some image degradation. For example, the images in Figure 4 is able to be identified using SIFT features and SIFT-LEBP feature while LEBP feature can not recognize them. The other example, the images in Figure 5 is able to be identified using LEBP features and SIFT-LEBP feature but SIFT feature is not able to recognize them. SIFT-LEBP feature also has capability to recognize images that are not able to be
  • 7.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 1, March 2017 : 478 – 485 484 recognized by the SIFT feature and LEBP feature. The examples of the image are shown in Figure 6. (a) (b) (c) Figure 4. The Examples of Images which can be Recognized by the Finger Vein Recognition System Using SIFT Feature (a) The Image with Translation Effect (b) The Image with Rotation Effect (c) The Image with Translation and Rotation Effect (a) (b) Figure 5. The Examples of Images which can be Recognized by the Finger Vein Recognition System Using LEBP Feature (a),(b) The Image with Varying Illumination Conditions (a) (b) (c) Figure 6 The Examples of Images which can be Recognized by the Finger Vein Recognition System Using SIFT-LEBP Feature (a),(b),(c) The Image with Geometric Degradation and Varying Illumination Conditions 4. Conclusion In this paper, we propose a multi-feature fusion using SIFT and LEBP feature for finger vein recognition in images with scaling, rotation, translation and varying illumination conditions. Fusion method that is used to form the SIFT-LEBP feature have shown relatively good results with the accuracy value are not much different from the result that has been obtained if only
  • 8. TELKOMNIKA ISSN: 1693-6930  Multi-feature Fusion Using SIFT and LEBP for … (Hardika Khusnuliawati) 485 using a single feature whether SIFT or LEBP. The accuracy of finger vein recognition using SIFT-LEBP feature at the optimum condition reach to 97.50%. Therefore, it can be said that the multi-feature fusion using SIFT and LEBP is applicable for finger vein recognition in images with scaling, rotation, translation and varying illumination conditions. In addition, SIFT-LEBP feature provides relatively better results when compared to using only a single feature whether SIFT or LEBP. This can be seen from the value of TPR and FPR that are 0.9400 and 0.0128, respectively. References [1] Miura N, Nagasaka A, Miyatake T. Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification. Machine Vision and Applications. 2004; 15(4): 194-203. [2] Yang L, Yang G, Yin Y, Zhou L. A survey of finger vein recognition. Chinese Conference on Biometric Recognition. Springer International Publishing. Shenyang. 2014; 9: 234-243. [3] Pang S, Yin Y, Yang G, Li Y. Rotation invariant finger vein recognition. Chinese Conference on Biometric Recognition. Springer Berlin Heidelberg. Guangzhou. 2012; 7: 151-156. [4] Yang W, Rao Q, Liao Q. Personal identification for single sample using finger vein location and direction coding. Hand-Based Biometrics (ICHB). IEEE. Hong Kong. 2011: 1-6. [5] Miura N, Nagasaka A, Miyatake T. Extraction of finger-vein patterns using maximum curvature points in image profiles. IEICE TRANSACTIONS on Information and Systems. 2007; 90(8): 1185-94. [6] Song W, Kim T, Kim HC, Choi JH, Kong HJ, Lee SR. A finger-vein verification system using mean curvature. Pattern Recognition Letters. 2011; 32(11): 1541-7. [7] Liu F, Yang G, Yin Y, Wang S. Singular value decomposition based minutiae matching method for finger vein recognition. Neurocomputing. 2014; 145: 75-89. [8] Ojala T, Pietikainen M, Maenpaa T. Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Transactions on pattern analysis and machine intelligence. 2002; 24(7): 971-87. [9] Lowe DG. Distinctive image features from scale-invariant keypoints. International journal of computer vision. 2004; 60(2): 91-110. [10] Yi D, Jianguo L, Xilong Q. Video Object Matching Based on SIFT and Rotation Invariant LBP. Indonesian Journal of Electrical Engineering and Computer Science. 2013; 11(10): 5876-83. [11] Yu J, Qin Z, Wan T, Zhang X. Feature integration analysis of bag-of-features model for image retrieval. Neurocomputing. 2013; 120: 355-64. [12] Ladoux PO, Rosenberger C, Dorizzi B. Palm vein verification system based on SIFT matching. International Conference on Biometrics. Springer Berlin Heidelberg. Alghero. 2009; 3:1290-1298. [13] Chi M, Yongyong Z, Ying T. Ear Recognition based on Forstner and SIFT. Indonesian Journal of Electrical Engineering and Computer Science. 2013; 11(12): 7131-7. [14] Xu X, Zhao Y. Multimodal Face Recognition for Profile Views Based on SIFT and LBP. Face and Facial Expression Recognition from Real World Videos. Springer International Publishing. Stockholm. 2015: 20-30. [15] Kim HG, Lee EJ, Yoon GJ, Yang SD, Lee EC, Yoon SM. Illumination normalization for SIFT based finger vein authentication. International Symposium on Visual Computing. Springer Berlin Heidelberg. Rethymnon. 2012; 8: 21-30. [16] Zhang B, Gao Y, Zhao S, Liu J. Local derivative pattern versus local binary pattern: face recognition with high-order local pattern descriptor. IEEE transactions on image processing. 2010; 19(2): 533-44. [17] Sari JY, Fatichah C, Suciati N. Local Line Binary Pattern For Feature Extraction on Palm Vein Recognition. Jurnal Ilmu Komputer dan Informasi. 2015; 8(2): 116-23. [18] Meng X, Yang G, Yin Y, Xiao R. Finger vein recognition based on local directional code. Sensors. 2012; 12(11): 14937-52. [19] Wang H, Wang X, Zheng J, Deller JR, Peng H, Zhu L, Chen W, Li X, Liu R, Bao H. Video object matching across multiple non-overlapping camera views based on multi-feature fusion and incremental learning. Pattern Recognition. 2014; 47(12): 3841-51. [20] Castanedo F. A review of data fusion techniques. The Scientific World Journal 2013. 2013. [21] Haas S, Donner R, Burner A, Holzer M, Langs G. Superpixel-Based interest points for effective bags of visual words medical image retrieval. MICCAI International Workshop on Medical Content-Based Retrieval for Clinical Decision Support. Springer Berlin Heidelberg. Toronto. 2011; 2: 58-68. [22] Kumar A, Zhou Y. Human identification using finger images. IEEE Transactions on Image Processing. 2012; 21(4): 2228-44. [23] Fawcett T. An introduction to ROC analysis. Pattern recognition letters. 2006; 27(8):861-74.