SlideShare a Scribd company logo
Multispectral Palm Image Fusion for
Biometric Authentication using Ant
       Colony Optimization


 D. R. Kisku, P. Gupta, J. K. Sing, C. J. Hwang
Asansol Engineering College, Asansol – 713305, India
             Email: drkisku@ieee.org


                                                       1
Outline of the Talk:
  Introduction
    Intra-modal fusion
    Advantages over Uni-biometrics systems
    Palmprint features
    Advantages of palmprint biometrics
    Multi-spectral palm image fusion
  Detection of ROI
  Wavelet based multi-spectral palm image fusion
  Gabor representation of fused image
  Feature selection using ant colony optimization
  Classification with SVM
  Experimental results
  Conclusion



                                                    2
Background: Intra-modal Fusion
 Intra-modal fusion refers to fusion of multiple instances obtained from
 same modality are linearly combined.

 Variations of intra-modal fusion:
    Matching scores obtained from multiple instances of the same modality are
    fused linearly.

    Feature level fusion of feature vectors obtained from multiple instances of the
    same modality

    Sensor level fusion or image fusion of multiple instances of the same modality




                                                                                 3
Advantages of Intra-modal Fusion:
 Combining the evidences obtained in different forms from the same or
 different sources using an effective fusion scheme can significantly
 improve the overall accuracy of the biometric system.

 Intra-modal fusion can address the problem of non-universality which
 often occurs in uni-modal system.

 Intra-modal systems can provide certain degrees of flexibility.

 The availability of multiple sources of information can reduce the
 redundancy in uni-modal system.




                                                                        4
Palmprint Features:
 Wrinkles
    wrinkles are thinner than the principal lines and much more irregular
 Creases
    Creases are detailed textures, like the ridges in a fingerprint, all over the
    palmprint. Creases can only be captured using high resolution cameras.
 Heart line (a-b)
 Head line (c-d)
 Life line (e-f)




                                                                                    5
Advantages of Palmprint Biometrics:
 Stability

 User friendliness
    One may feel comfort to give palmprint images to capturing devices.


 Acceptability
    Palmprint is suitable for everyone and it is also non-intrusive as it does not
    require any personal information of the user. It requires low resolution
    capturing devices, not like fingerprint devices.


 Uniqueness
    Palmprint features do not change over time.




                                                                                     6
Multi-spectral Palm Image Fusion:

         Biometric palm image fusion at low level [1] refers to a process that
         fuses multispectral palm images captured by identical or different
         biometric sensors.

         The fusion performed at low level produces a fused image in the
         spatially enhanced form which contains richer, intrinsic and
         complementary information.




[1] D. R. Kisku, J. K. Sing, M. Tistarelli, and P. Gupta, “Multisensor biometric evidence fusion for person authentication
using wavelet decomposition and monotonic-decreasing graph,” 7th IEEE International Conference on Advances in
                                                                                                                             7
Pattern Recognition, pp. 205—208, 2009.
Detection of ROI:
      Method of ROI (region of interest) detection [2] is employed to reduce
      the error caused by translation and rotation.

      This process roughly aligns the palmprint and it does not reduce the
      effect of palmprint distortion.

      The main steps of preprocessing -
             original image,
             binary image,
             boundary tracking,
             building a coordinate system,
             extracting the central part as a sub-image
             preprocessed result.



[2] D. Zhang, W. K. Kong, J. You, and M. Wong, “On-line palmprint identification,” IEEE Transactions on Pattern
Analysis and Machine Intelligence, vol. 25, pp. 1041 – 1050, 2003.                                                8
9
Wavelet based Multi-spectral Palm Image
 Fusion:
   The wavelet transform [3] provides a multi-resolution decomposition of an
   image.
   In wavelet based palm image fusion, decomposition is done with high
   resolution palmprint images.
   Decomposition generates a set of low resolution images with wavelet
   coefficients for each level where the basis functions are generated from one
   single basis function known as the mother wavelet.
   The mother wavelet is shifted and scaled to obtain the basis functions.
   Then, it replaces a low resolution image with a multispectral (MS) band at
   the same spatial resolution level.
   Finally, a reverse wavelet transformation is performed to convert the
   decomposed and set to the original resolution level.
   The operations of a wavelet fusion scheme are outlined in Fig. 2.


[3] T. S. Lee, “Image representation using 2D Gabor wavelets,” IEEE Transactions on Pattern Analysis and Machine
Intelligence, vol. 18, pp. 959 – 971, 1996.                                                                        10
Contd…
       The input images are decomposed by a discrete wavelet transform and
       the wavelet coefficients are selected using a wavelet fusion rule (viz.
       ‘maximum’ rule) [4] and an inverse discrete wavelet transform is
       performed to reconstruct the fused image.



                                                                                            IDWT
                                           DWT


                        First Palm Image




                                                                                                   Fused Image
                                                                             Fusion of
                                           DWT                             Decompositions


                      Second Palm Image
                                                Wavelet Coefficients



[4] D. R. Kisku, J. K. Sing, M. Tistarelli, and P. Gupta, “Multisensor biometric evidence fusion for person authentication
using wavelet decomposition and monotonic-decreasing graph,” 7th IEEE International Conference on Advances in                11
Pattern Recognition, pp. 205—208, 2009.
Gabor Representation of Fused Image:
    Fundamentally, 2D Gabor filter [5] can be defined as a linear filter whose
    impulse response function is the multiplication of harmonic function and
    Gaussian function in which Gaussian function is modulated by a complex
    sinusoid.
    In this regard, the convolution theorem states that the Fourier transform of
    a Gabor filter's impulse response is the convolution of the Fourier
    transform of the harmonic function and the Fourier transform of the
    Gaussian function.
    Gabor function is a non-orthogonal wavelet and it can be specified by the
    frequency of the sinusoid and the standard deviations of and. The 2D
    Gabor wavelet Filter can be defined as

                                                      1 (m ) 2 (n) 2
                          g ( x , y : f , θ ) = exp( − ( 2 +         ) cos( 2 π f ( m )))
                                                      2 σ x    σ 2y
                          m = x sin θ + y cos θ ;
                          n = x cos θ − y sin θ ;
[5] T. S. Lee, “Image representation using 2D Gabor wavelets,” IEEE Transactions on Pattern Analysis and Machine
Intelligence, vol. 18, pp. 959 – 971, 1996.                                                                        12
Contd…
where –
  f is the frequency of the sinusoidal plane wave along the direction from the
  x-axis, and specify the Gaussian envelop along x-axis and along y-axis,
  respectively.
  This can be used to determine the bandwidth of the Gabor filter.
  For the sake of experiment, 200 dpi gray scale fused palm image with the
  size of 40 × 40 has been used.
  Along with this, 40 spatial frequencies are used with, f = π / 2 (i = 1,2,…,5)
                                                                  i


  and θ = kπ / 8, (k = 1,2,...,8) .




                                                                             13
Ant Colony Optimization: Concepts




                                    14
ACO Background:
  Ants [6] navigate from nest to food source

  Shortest path is discovered via pheromone trails
        each ant moves at random

        pheromone is deposited on path

        ants detect lead ant’s path, inclined to follow

        more pheromone on path increases probability of path being followed




[6] M. Dorigo, L. M. Gambardella, M. Birattari, A. Martinoli, R. Poli, and T. Stützle, “Ant colony optimization and swarm
intelligence,” 5th International Workshop ANTS, LNCS 4150, Springer Verlag, 2006.                                           15
ACO Algorithm:
Starting node is selected randomly
Path selected at random
   based on amount of “trail” present on possible paths from starting node
   higher probability for paths with more “trail”
Ant reaches next node, selects next path
Continues until reaches starting node
Finished “tour” is a solution
A completed tour is analyzed for optimality
“Trail” amount adjusted to favor better solutions
   better solutions receive more trail
   worse solutions receive less trail
   higher probability of ant selecting path that is part of a better-performing tour
New cycle is performed
Repeated until most ants select the same tour on every cycle (convergence
to solution)

                                                                                   16
Features Selection using Ant Colony
Optimization:
An ant chooses the new feature point according to the following
                                        β
               arg     max { Pil H          }        if q ≤ q 0
                       l∈ N i
                          k             il
          j = 
              S                                      otherwise
              

A random variable selected according to the following probabilistic rule
                               β
                    P ij H ij
                                                if     j ∈ N         k

               ∑ P il H il
                                   β                              i

          S =  l ∈ N ik
              
              0                                 otherwise
              


                                                                           17
Contd…
Global pheromone update



           Pij = (1 − σ ) Pij + σ ∆ p          bs
                                               ij


              bs
             1/ L
             
                      if (i, j) belongs to the best tour
      ∆pij = 
        bs

             0           otherwise
             
             




                                                           18
Contd…
 Local pheromone update



       Pij = (1 − γ ) Pij + γ p 0




                                    19
Classification with SVM:
   SVM [7] is known as statistical learning theory which can be used for
   classification of test samples with respect to training samples.
   SVMs are built based on the principle of structural risk minimization.
   The aim is to minimize the upper bound on expected or actual risk which is
   defined as

                                                   1
                          R (α ) =             ∫     z − f ( x , α ) dP ( x , z )
                                                   2

        where α is a set of parameters which can be used to define a trained machine
        z is a class label associated with a training sample x
        f(x, α) is a function which can be used to mapping training sample to class labels
        P(x, z) is the unknown probability distribution associating a class label with each
        training sample.

[7] C. J. C. Burges, “A tutorial on support vector machines for pattern recognition,” Data Mining and Knowledge
Discovery, vol. 2, no. 2, pp. 121–167, 1998.                                                                      20
Contd…
Let l denote the number of training samples and choose some η such that 0
≤ η ≤ 1.
On expected risks with the probability 1 - η, the following bound holds


                         h(log( 2l / h) + 1) − log(η / 4)
    R (α ) ≤ Remp (α ) +
                                         l
  where h is a non-negative integer called Vapnik Charvonenkis (VC) dimension
  [14] and is a measure of the complexity of the given decision function.
  The term in R.H.S. is known as VC bound.
  Risk can be minimized by minimizing the empirical risk as well as VC
  dimension.




                                                                           21
Contd…




         22
Contd…
 To separate a given training sample, an optimal hyperplane is chosen
 from a set of hyperplane.
 This optimal hyperplane minimizes the VC confidence that provides
 best generalization capabilities.
 The optimal hyperplane is used to minimize the sum of the distances to
 the closest positive and negative training samples.
 This sum is known as the margin of the separating hyperplane.
 It can be shown that the optimal hyperplane w—x + b = 0 is obtained by
 minimizing ||w||2 subject to a set of constraints.
 Classifiers

   K ( xi , x j ) = x i • x j                K ( xi , x j ) = e
                                                                  − γ || xi − x j || 2



                                          | xT ωk |
                        d C ( x, ω k ) =
                                         | x || ω k |

                                                                                         23
Database and Experimental Protocol:
  Database:
        CASIA [8] Multispectral Palm Images
        3600 Palm Image and 100 Subjects
        Palm images captured in two different sessions
        In each session 3 different sets of images captured
        Each set contains 6 images
        Between two sets, a certain degree of posture variations is allowed.
  Experimental protocol:
        Database is divided into 3 disjoints sets
        First set (training set) contains 1985 palm images
        Second set (evaluation set) contains 966 palm images
        Third set (query set) contains 649 palm images
        The training set is used to build client models
        The evaluation set is used to obtain the client and imposter scores for
        verification thresholds
        The query set of palm images are used to obtain the verification rates.

[8] Y. Hao, Z. Sun, T. Tan, and C. Ren, “Multi spectral palm image fusion for accurate contact free palmprint
recognition,” 15th International Conference on Image Processing, pp. 281 – 284, 2008.                           24
Experimental Results:

 Table1. Verification Performance determined on the CASIA MultiSpectral Palm Database

CLASSIFIER    KERNEL         KERNEL          EVALUATION SET               QUERY SET
             FUNCTION      PARAMETER
                                                EER          TE      FA      FR       TE
   NC           --------       --------         6.19%        12.38   4.51%   6.27%   10.78%
                                                              %
   SVM          Linear         --------         5.02%        10.04   3.09%   5.11%   8.2%
                                                              %

                 RBF          γ = 0.015         3.97%        7.94%   2.21%   4.04%   6.25%




                                                                                           25
Comparative Study:

                                                  Table 2. Comparison Table

          Method                      Fusion Rule                 Database                 Classifier                 EER (%)

        Method – I [9]                      CT                      CASIA               Hamming distance                  0.5

       Method – II [9]                   SIDWT                      CASIA               Hamming distance                  0.58

      Proposed Method               Haar wavelet with               CASIA                 SVM with RBF                    3.97
                                      maximum fusion                                        (Evaluation set)
                                            rule

                                                                                      SVM with RBF (Query                3.125
                                                                                                set)




[9] Y. Hao, Z. Sun, T. Tan, and C. Ren, “Multi spectral palm image fusion for accurate contact free palmprint recognition,” 15th
International Conference on Image Processing, pp. 281 – 284, 2008.                                                                 26
Conclusion:
An efficient palmprint authentication system has presented by fusion of
multispectral palm images.
Multispectral palm images are fused at low level by wavelet transform and
decomposition.
This fused palm image is further represented by Gabor wavelet transform to
capture the minimal intra-class diversity of the same instances and
maximized the inter-class differences between the different subjects in
terms of neighborhood pixel intensity changes.
Gabor palm responses contain high dimensionality features and due to this
high dimensionality, ant colony optimization (ACO) algorithm is applied to
choose a set of distinct features.
Finally, two different classifiers are used, namely, normalized correlation
and SVM with linear and RBF kernels.
To measure the efficacy and robustness of the proposed system, CASIA
multispectral palm database is used.
The results are found to be encouraging.


                                                                       27
Questions/Comments, if any !




                               28

More Related Content

What's hot

Extended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint RecognitionExtended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
CSCJournals
 
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATIONA SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
International Journal of Technical Research & Application
 
IEEE HST 2009
IEEE HST 2009IEEE HST 2009
IEEE HST 2009
Dakshina Ranjan Kisku
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
IJNSA Journal
 
Extraction of spots in dna microarrays using genetic algorithm
Extraction of spots in dna microarrays using genetic algorithmExtraction of spots in dna microarrays using genetic algorithm
Extraction of spots in dna microarrays using genetic algorithm
sipij
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IJERA Editor
 
Illumination Invariant Hand Gesture Classification against Complex Background...
Illumination Invariant Hand Gesture Classification against Complex Background...Illumination Invariant Hand Gesture Classification against Complex Background...
Illumination Invariant Hand Gesture Classification against Complex Background...
IJCSIS Research Publications
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extraction
iosrjce
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
iosrjce
 
237 240
237 240237 240
33 102-1-pb
33 102-1-pb33 102-1-pb
33 102-1-pb
Mahendra Sisodia
 
A Methodology for Extracting Standing Human Bodies from Single Images
A Methodology for Extracting Standing Human Bodies from Single ImagesA Methodology for Extracting Standing Human Bodies from Single Images
A Methodology for Extracting Standing Human Bodies from Single Images
journal ijrtem
 
MSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching TechniquesMSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching Techniques
CSCJournals
 
Implementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupilsImplementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupils
sipij
 
IRIS Based Human Recognition System
IRIS Based Human Recognition SystemIRIS Based Human Recognition System
IRIS Based Human Recognition System
CSCJournals
 
Visual character n grams for classification and retrieval of radiological images
Visual character n grams for classification and retrieval of radiological imagesVisual character n grams for classification and retrieval of radiological images
Visual character n grams for classification and retrieval of radiological images
ijma
 
Human identification using finger images
Human identification using finger imagesHuman identification using finger images
Human identification using finger images
eSAT Publishing House
 
Defect Fruit Image Analysis using Advanced Bacterial Foraging Optimizing Algo...
Defect Fruit Image Analysis using Advanced Bacterial Foraging Optimizing Algo...Defect Fruit Image Analysis using Advanced Bacterial Foraging Optimizing Algo...
Defect Fruit Image Analysis using Advanced Bacterial Foraging Optimizing Algo...
IOSR Journals
 
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBPHybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
CSCJournals
 

What's hot (19)

Extended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint RecognitionExtended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
 
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATIONA SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
 
IEEE HST 2009
IEEE HST 2009IEEE HST 2009
IEEE HST 2009
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 
Extraction of spots in dna microarrays using genetic algorithm
Extraction of spots in dna microarrays using genetic algorithmExtraction of spots in dna microarrays using genetic algorithm
Extraction of spots in dna microarrays using genetic algorithm
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBP
 
Illumination Invariant Hand Gesture Classification against Complex Background...
Illumination Invariant Hand Gesture Classification against Complex Background...Illumination Invariant Hand Gesture Classification against Complex Background...
Illumination Invariant Hand Gesture Classification against Complex Background...
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extraction
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
237 240
237 240237 240
237 240
 
33 102-1-pb
33 102-1-pb33 102-1-pb
33 102-1-pb
 
A Methodology for Extracting Standing Human Bodies from Single Images
A Methodology for Extracting Standing Human Bodies from Single ImagesA Methodology for Extracting Standing Human Bodies from Single Images
A Methodology for Extracting Standing Human Bodies from Single Images
 
MSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching TechniquesMSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching Techniques
 
Implementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupilsImplementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupils
 
IRIS Based Human Recognition System
IRIS Based Human Recognition SystemIRIS Based Human Recognition System
IRIS Based Human Recognition System
 
Visual character n grams for classification and retrieval of radiological images
Visual character n grams for classification and retrieval of radiological imagesVisual character n grams for classification and retrieval of radiological images
Visual character n grams for classification and retrieval of radiological images
 
Human identification using finger images
Human identification using finger imagesHuman identification using finger images
Human identification using finger images
 
Defect Fruit Image Analysis using Advanced Bacterial Foraging Optimizing Algo...
Defect Fruit Image Analysis using Advanced Bacterial Foraging Optimizing Algo...Defect Fruit Image Analysis using Advanced Bacterial Foraging Optimizing Algo...
Defect Fruit Image Analysis using Advanced Bacterial Foraging Optimizing Algo...
 
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBPHybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
 

Viewers also liked

3 d image processsing operations
3 d image processsing operations3 d image processsing operations
3 d image processsing operations
MUTHUKUMAR MANIVANNAN
 
IEEE ICAPR 2009
IEEE ICAPR 2009IEEE ICAPR 2009
IEEE ICAPR 2009
Dakshina Ranjan Kisku
 
Palmprint verification using lagrangian decomposition and invariant interest
Palmprint verification using lagrangian decomposition and invariant interestPalmprint verification using lagrangian decomposition and invariant interest
Palmprint verification using lagrangian decomposition and invariant interest
Dakshina Kisku
 
phase2 FINAL
phase2 FINALphase2 FINAL
phase2 FINAL
Ashok Sharma
 
Biometric authentication reiew
Biometric authentication reiewBiometric authentication reiew
Biometric authentication reiew
MUTHUKUMAR MANIVANNAN
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
Prashant Singh
 
PPT (2)
PPT (2)PPT (2)

Viewers also liked (7)

3 d image processsing operations
3 d image processsing operations3 d image processsing operations
3 d image processsing operations
 
IEEE ICAPR 2009
IEEE ICAPR 2009IEEE ICAPR 2009
IEEE ICAPR 2009
 
Palmprint verification using lagrangian decomposition and invariant interest
Palmprint verification using lagrangian decomposition and invariant interestPalmprint verification using lagrangian decomposition and invariant interest
Palmprint verification using lagrangian decomposition and invariant interest
 
phase2 FINAL
phase2 FINALphase2 FINAL
phase2 FINAL
 
Biometric authentication reiew
Biometric authentication reiewBiometric authentication reiew
Biometric authentication reiew
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 

Similar to ICPR Workshop ETCHB 2010

Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
 
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
IDES Editor
 
CONTOURLET-BASED FINGERPRINT ANTISPOOFING
CONTOURLET-BASED FINGERPRINT ANTISPOOFINGCONTOURLET-BASED FINGERPRINT ANTISPOOFING
CONTOURLET-BASED FINGERPRINT ANTISPOOFING
cscpconf
 
Contourlet based fingerprint antispoofing
Contourlet based fingerprint antispoofingContourlet based fingerprint antispoofing
Contourlet based fingerprint antispoofing
csandit
 
Super Resolution of Image
Super Resolution of ImageSuper Resolution of Image
Super Resolution of Image
Satheesh K
 
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
IOSR Journals
 
An Enhanced Biometric System for Personal Authentication
An Enhanced Biometric System for Personal AuthenticationAn Enhanced Biometric System for Personal Authentication
An Enhanced Biometric System for Personal Authentication
IOSR Journals
 
An Enhanced Biometric System for Personal Authentication
An Enhanced Biometric System for Personal AuthenticationAn Enhanced Biometric System for Personal Authentication
An Enhanced Biometric System for Personal Authentication
IOSR Journals
 
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKRECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
ijaia
 
J010245458
J010245458J010245458
J010245458
IOSR Journals
 
A Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur ClassificationA Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur Classification
ijeei-iaes
 
Report medical image processing image slice interpolation and noise removal i...
Report medical image processing image slice interpolation and noise removal i...Report medical image processing image slice interpolation and noise removal i...
Report medical image processing image slice interpolation and noise removal i...
Shashank
 
E1803053238
E1803053238E1803053238
E1803053238
IOSR Journals
 
Survey Paper on Image Denoising Using Spatial Statistic son Pixel
Survey Paper on Image Denoising Using Spatial Statistic son PixelSurvey Paper on Image Denoising Using Spatial Statistic son Pixel
Survey Paper on Image Denoising Using Spatial Statistic son Pixel
IJERA Editor
 
Palmprint Identification Using FRIT
Palmprint Identification Using FRITPalmprint Identification Using FRIT
Palmprint Identification Using FRIT
Dakshina Ranjan Kisku
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
IJERA Editor
 
Person re-identification, PhD Day 2011
Person re-identification, PhD Day 2011Person re-identification, PhD Day 2011
Person re-identification, PhD Day 2011
Riccardo Satta
 
Multiresolution SVD based Image Fusion
Multiresolution SVD based Image FusionMultiresolution SVD based Image Fusion
Multiresolution SVD based Image Fusion
IOSRJVSP
 
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSION
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSIONINFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSION
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSION
IJCI JOURNAL
 

Similar to ICPR Workshop ETCHB 2010 (20)

Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
 
CONTOURLET-BASED FINGERPRINT ANTISPOOFING
CONTOURLET-BASED FINGERPRINT ANTISPOOFINGCONTOURLET-BASED FINGERPRINT ANTISPOOFING
CONTOURLET-BASED FINGERPRINT ANTISPOOFING
 
Contourlet based fingerprint antispoofing
Contourlet based fingerprint antispoofingContourlet based fingerprint antispoofing
Contourlet based fingerprint antispoofing
 
Super Resolution of Image
Super Resolution of ImageSuper Resolution of Image
Super Resolution of Image
 
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
 
An Enhanced Biometric System for Personal Authentication
An Enhanced Biometric System for Personal AuthenticationAn Enhanced Biometric System for Personal Authentication
An Enhanced Biometric System for Personal Authentication
 
An Enhanced Biometric System for Personal Authentication
An Enhanced Biometric System for Personal AuthenticationAn Enhanced Biometric System for Personal Authentication
An Enhanced Biometric System for Personal Authentication
 
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKRECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
 
J010245458
J010245458J010245458
J010245458
 
A Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur ClassificationA Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur Classification
 
Report medical image processing image slice interpolation and noise removal i...
Report medical image processing image slice interpolation and noise removal i...Report medical image processing image slice interpolation and noise removal i...
Report medical image processing image slice interpolation and noise removal i...
 
E1803053238
E1803053238E1803053238
E1803053238
 
Survey Paper on Image Denoising Using Spatial Statistic son Pixel
Survey Paper on Image Denoising Using Spatial Statistic son PixelSurvey Paper on Image Denoising Using Spatial Statistic son Pixel
Survey Paper on Image Denoising Using Spatial Statistic son Pixel
 
Palmprint Identification Using FRIT
Palmprint Identification Using FRITPalmprint Identification Using FRIT
Palmprint Identification Using FRIT
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
 
Person re-identification, PhD Day 2011
Person re-identification, PhD Day 2011Person re-identification, PhD Day 2011
Person re-identification, PhD Day 2011
 
Multiresolution SVD based Image Fusion
Multiresolution SVD based Image FusionMultiresolution SVD based Image Fusion
Multiresolution SVD based Image Fusion
 
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSION
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSIONINFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSION
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSION
 

Recently uploaded

Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 

Recently uploaded (20)

Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 

ICPR Workshop ETCHB 2010

  • 1. Multispectral Palm Image Fusion for Biometric Authentication using Ant Colony Optimization D. R. Kisku, P. Gupta, J. K. Sing, C. J. Hwang Asansol Engineering College, Asansol – 713305, India Email: drkisku@ieee.org 1
  • 2. Outline of the Talk: Introduction Intra-modal fusion Advantages over Uni-biometrics systems Palmprint features Advantages of palmprint biometrics Multi-spectral palm image fusion Detection of ROI Wavelet based multi-spectral palm image fusion Gabor representation of fused image Feature selection using ant colony optimization Classification with SVM Experimental results Conclusion 2
  • 3. Background: Intra-modal Fusion Intra-modal fusion refers to fusion of multiple instances obtained from same modality are linearly combined. Variations of intra-modal fusion: Matching scores obtained from multiple instances of the same modality are fused linearly. Feature level fusion of feature vectors obtained from multiple instances of the same modality Sensor level fusion or image fusion of multiple instances of the same modality 3
  • 4. Advantages of Intra-modal Fusion: Combining the evidences obtained in different forms from the same or different sources using an effective fusion scheme can significantly improve the overall accuracy of the biometric system. Intra-modal fusion can address the problem of non-universality which often occurs in uni-modal system. Intra-modal systems can provide certain degrees of flexibility. The availability of multiple sources of information can reduce the redundancy in uni-modal system. 4
  • 5. Palmprint Features: Wrinkles wrinkles are thinner than the principal lines and much more irregular Creases Creases are detailed textures, like the ridges in a fingerprint, all over the palmprint. Creases can only be captured using high resolution cameras. Heart line (a-b) Head line (c-d) Life line (e-f) 5
  • 6. Advantages of Palmprint Biometrics: Stability User friendliness One may feel comfort to give palmprint images to capturing devices. Acceptability Palmprint is suitable for everyone and it is also non-intrusive as it does not require any personal information of the user. It requires low resolution capturing devices, not like fingerprint devices. Uniqueness Palmprint features do not change over time. 6
  • 7. Multi-spectral Palm Image Fusion: Biometric palm image fusion at low level [1] refers to a process that fuses multispectral palm images captured by identical or different biometric sensors. The fusion performed at low level produces a fused image in the spatially enhanced form which contains richer, intrinsic and complementary information. [1] D. R. Kisku, J. K. Sing, M. Tistarelli, and P. Gupta, “Multisensor biometric evidence fusion for person authentication using wavelet decomposition and monotonic-decreasing graph,” 7th IEEE International Conference on Advances in 7 Pattern Recognition, pp. 205—208, 2009.
  • 8. Detection of ROI: Method of ROI (region of interest) detection [2] is employed to reduce the error caused by translation and rotation. This process roughly aligns the palmprint and it does not reduce the effect of palmprint distortion. The main steps of preprocessing - original image, binary image, boundary tracking, building a coordinate system, extracting the central part as a sub-image preprocessed result. [2] D. Zhang, W. K. Kong, J. You, and M. Wong, “On-line palmprint identification,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, pp. 1041 – 1050, 2003. 8
  • 9. 9
  • 10. Wavelet based Multi-spectral Palm Image Fusion: The wavelet transform [3] provides a multi-resolution decomposition of an image. In wavelet based palm image fusion, decomposition is done with high resolution palmprint images. Decomposition generates a set of low resolution images with wavelet coefficients for each level where the basis functions are generated from one single basis function known as the mother wavelet. The mother wavelet is shifted and scaled to obtain the basis functions. Then, it replaces a low resolution image with a multispectral (MS) band at the same spatial resolution level. Finally, a reverse wavelet transformation is performed to convert the decomposed and set to the original resolution level. The operations of a wavelet fusion scheme are outlined in Fig. 2. [3] T. S. Lee, “Image representation using 2D Gabor wavelets,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 18, pp. 959 – 971, 1996. 10
  • 11. Contd… The input images are decomposed by a discrete wavelet transform and the wavelet coefficients are selected using a wavelet fusion rule (viz. ‘maximum’ rule) [4] and an inverse discrete wavelet transform is performed to reconstruct the fused image. IDWT DWT First Palm Image Fused Image Fusion of DWT Decompositions Second Palm Image Wavelet Coefficients [4] D. R. Kisku, J. K. Sing, M. Tistarelli, and P. Gupta, “Multisensor biometric evidence fusion for person authentication using wavelet decomposition and monotonic-decreasing graph,” 7th IEEE International Conference on Advances in 11 Pattern Recognition, pp. 205—208, 2009.
  • 12. Gabor Representation of Fused Image: Fundamentally, 2D Gabor filter [5] can be defined as a linear filter whose impulse response function is the multiplication of harmonic function and Gaussian function in which Gaussian function is modulated by a complex sinusoid. In this regard, the convolution theorem states that the Fourier transform of a Gabor filter's impulse response is the convolution of the Fourier transform of the harmonic function and the Fourier transform of the Gaussian function. Gabor function is a non-orthogonal wavelet and it can be specified by the frequency of the sinusoid and the standard deviations of and. The 2D Gabor wavelet Filter can be defined as 1 (m ) 2 (n) 2 g ( x , y : f , θ ) = exp( − ( 2 + ) cos( 2 π f ( m ))) 2 σ x σ 2y m = x sin θ + y cos θ ; n = x cos θ − y sin θ ; [5] T. S. Lee, “Image representation using 2D Gabor wavelets,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 18, pp. 959 – 971, 1996. 12
  • 13. Contd… where – f is the frequency of the sinusoidal plane wave along the direction from the x-axis, and specify the Gaussian envelop along x-axis and along y-axis, respectively. This can be used to determine the bandwidth of the Gabor filter. For the sake of experiment, 200 dpi gray scale fused palm image with the size of 40 × 40 has been used. Along with this, 40 spatial frequencies are used with, f = π / 2 (i = 1,2,…,5) i and θ = kπ / 8, (k = 1,2,...,8) . 13
  • 15. ACO Background: Ants [6] navigate from nest to food source Shortest path is discovered via pheromone trails each ant moves at random pheromone is deposited on path ants detect lead ant’s path, inclined to follow more pheromone on path increases probability of path being followed [6] M. Dorigo, L. M. Gambardella, M. Birattari, A. Martinoli, R. Poli, and T. Stützle, “Ant colony optimization and swarm intelligence,” 5th International Workshop ANTS, LNCS 4150, Springer Verlag, 2006. 15
  • 16. ACO Algorithm: Starting node is selected randomly Path selected at random based on amount of “trail” present on possible paths from starting node higher probability for paths with more “trail” Ant reaches next node, selects next path Continues until reaches starting node Finished “tour” is a solution A completed tour is analyzed for optimality “Trail” amount adjusted to favor better solutions better solutions receive more trail worse solutions receive less trail higher probability of ant selecting path that is part of a better-performing tour New cycle is performed Repeated until most ants select the same tour on every cycle (convergence to solution) 16
  • 17. Features Selection using Ant Colony Optimization: An ant chooses the new feature point according to the following β  arg max { Pil H } if q ≤ q 0  l∈ N i k il j =  S otherwise  A random variable selected according to the following probabilistic rule β  P ij H ij  if j ∈ N k  ∑ P il H il β i S =  l ∈ N ik  0 otherwise  17
  • 18. Contd… Global pheromone update Pij = (1 − σ ) Pij + σ ∆ p bs ij  bs 1/ L  if (i, j) belongs to the best tour ∆pij =  bs 0 otherwise   18
  • 19. Contd… Local pheromone update Pij = (1 − γ ) Pij + γ p 0 19
  • 20. Classification with SVM: SVM [7] is known as statistical learning theory which can be used for classification of test samples with respect to training samples. SVMs are built based on the principle of structural risk minimization. The aim is to minimize the upper bound on expected or actual risk which is defined as 1 R (α ) = ∫ z − f ( x , α ) dP ( x , z ) 2 where α is a set of parameters which can be used to define a trained machine z is a class label associated with a training sample x f(x, α) is a function which can be used to mapping training sample to class labels P(x, z) is the unknown probability distribution associating a class label with each training sample. [7] C. J. C. Burges, “A tutorial on support vector machines for pattern recognition,” Data Mining and Knowledge Discovery, vol. 2, no. 2, pp. 121–167, 1998. 20
  • 21. Contd… Let l denote the number of training samples and choose some η such that 0 ≤ η ≤ 1. On expected risks with the probability 1 - η, the following bound holds h(log( 2l / h) + 1) − log(η / 4) R (α ) ≤ Remp (α ) + l where h is a non-negative integer called Vapnik Charvonenkis (VC) dimension [14] and is a measure of the complexity of the given decision function. The term in R.H.S. is known as VC bound. Risk can be minimized by minimizing the empirical risk as well as VC dimension. 21
  • 22. Contd… 22
  • 23. Contd… To separate a given training sample, an optimal hyperplane is chosen from a set of hyperplane. This optimal hyperplane minimizes the VC confidence that provides best generalization capabilities. The optimal hyperplane is used to minimize the sum of the distances to the closest positive and negative training samples. This sum is known as the margin of the separating hyperplane. It can be shown that the optimal hyperplane w—x + b = 0 is obtained by minimizing ||w||2 subject to a set of constraints. Classifiers K ( xi , x j ) = x i • x j K ( xi , x j ) = e − γ || xi − x j || 2 | xT ωk | d C ( x, ω k ) = | x || ω k | 23
  • 24. Database and Experimental Protocol: Database: CASIA [8] Multispectral Palm Images 3600 Palm Image and 100 Subjects Palm images captured in two different sessions In each session 3 different sets of images captured Each set contains 6 images Between two sets, a certain degree of posture variations is allowed. Experimental protocol: Database is divided into 3 disjoints sets First set (training set) contains 1985 palm images Second set (evaluation set) contains 966 palm images Third set (query set) contains 649 palm images The training set is used to build client models The evaluation set is used to obtain the client and imposter scores for verification thresholds The query set of palm images are used to obtain the verification rates. [8] Y. Hao, Z. Sun, T. Tan, and C. Ren, “Multi spectral palm image fusion for accurate contact free palmprint recognition,” 15th International Conference on Image Processing, pp. 281 – 284, 2008. 24
  • 25. Experimental Results: Table1. Verification Performance determined on the CASIA MultiSpectral Palm Database CLASSIFIER KERNEL KERNEL EVALUATION SET QUERY SET FUNCTION PARAMETER EER TE FA FR TE NC -------- -------- 6.19% 12.38 4.51% 6.27% 10.78% % SVM Linear -------- 5.02% 10.04 3.09% 5.11% 8.2% % RBF γ = 0.015 3.97% 7.94% 2.21% 4.04% 6.25% 25
  • 26. Comparative Study: Table 2. Comparison Table Method Fusion Rule Database Classifier EER (%) Method – I [9] CT CASIA Hamming distance 0.5 Method – II [9] SIDWT CASIA Hamming distance 0.58 Proposed Method Haar wavelet with CASIA SVM with RBF 3.97 maximum fusion (Evaluation set) rule SVM with RBF (Query 3.125 set) [9] Y. Hao, Z. Sun, T. Tan, and C. Ren, “Multi spectral palm image fusion for accurate contact free palmprint recognition,” 15th International Conference on Image Processing, pp. 281 – 284, 2008. 26
  • 27. Conclusion: An efficient palmprint authentication system has presented by fusion of multispectral palm images. Multispectral palm images are fused at low level by wavelet transform and decomposition. This fused palm image is further represented by Gabor wavelet transform to capture the minimal intra-class diversity of the same instances and maximized the inter-class differences between the different subjects in terms of neighborhood pixel intensity changes. Gabor palm responses contain high dimensionality features and due to this high dimensionality, ant colony optimization (ACO) algorithm is applied to choose a set of distinct features. Finally, two different classifiers are used, namely, normalized correlation and SVM with linear and RBF kernels. To measure the efficacy and robustness of the proposed system, CASIA multispectral palm database is used. The results are found to be encouraging. 27