Identity Verification using Shape and Geometry of Human Hands Expert Systems with Applications, Elsevier, 2015 Shefali Sharma1, Shiv Ram Dubey2, Satish Kumar Singh2, Rajiv Saxena3 and Rajat Kumar Singh2 1Jaypee

University of Engineering and Technology Guna, 2Indian Institute of Information Technology Allahabad, 3Jaypee University Anoopshahr

Introduction

Performance Evaluation

 A multimodal biometric system for identity verification is designed by fusingshape and geometry features at score level.  Shape and geometry features are derived with the help of only contour of the hand image.  Two shape based features are extracted using distance and orientation of hand contour points and wavelet decomposition.  Seven distances are used to encode the geometrical information of the hand.  All processing is done w.r.t. a stable reference point at wrist line which is more stable as compared to the centroid [1].

The experiments of identity verification are done over two datasets one created by us and other one is created by IITD [3]. The IITD dataset is having contactless hand images, whereas images in our dataset are captured after contacting the hand over a simple scanner. Our dataset consists of 250 images (5 images from 50 subjects). The 240 subjects with 5 images each are considered from IITD dataset.

(c)

(d)

Fig.3. Robustness of the stable and rotation invariant reference point extraction over wrist boundary of the hand.

The finger points obtained in Fig.2(g) is used to extract the geometrical feature as depicted in Fig.4. The ratio of each pair of distances is combined into a feature vector. p2

p3

p4

d3

Imposter

mm m2 3 4

d2 m5

d5

m1

d7 d6

(d)

(e)

Fig.1. Process of joining the disjoint finger to the hand, (a) original hand image, (b) generated hand mask using pre-processing, the ring finger is disjoint from hand, (c) hand mask is rotated such that ring finger became vertical, (d) ring finger is extended such that it became attached with the remaining hand, and (e) the hand mask is rotated to its original orientation back.

200

400 600 800 Number of scores

1000

1200

z-score max-division min-max

TAR

0.94

0.3 0.2 0.1

0.92 0.9 0

Genuine Imposter

0.4

0.05

0.1

0.15 FAR

0.2

0 0

0.25

0.5

1 1.5 min-max normalization

2

(a) (b) Fig.8. Effect of score normalization method over our hand dataset: (a) ROC plot using different score normalization methods, (b) the min-max normalized score density distribution. 0

1

p1

TAR

0.99

ф1

10

-1

d o g fused

m1

(b) Finger alignments at particular orientations

(c) Updated contour with reference point

Fig.5. Finger registration at a fixed orientation from the vertical axis.

(d) Hand Orientation Registration

-2

10

-4

10 FAR

-2

10

0.98

240 200 150 100 50

0.97

0

0.96 0

0.005

0.01 FAR

0.015

0.02

(a) (b) Fig.9. Results over IITD hand dataset: (a) ROC curve of score fusion and (b) performance comparison with varying number of subjects. Here, „d‟, „o‟, and „g‟ represent the distance, orientation, and geometrical features.

References

Shape based Feature (a) JUET contact dataset

Geometry based Feature (h) Feature extraction

Genuine

0 0

1.0

0.96

10

(c) Centroid and Orientation

0.8

0.98

10

(b) Hand Mask

0.4 0.6 Threshold

1

The finger registration is performed to align each finger at a fixed orientation (i.e. 60, 30, 10, -10, and -30 degrees from thumb to baby finger) from the vertical axis as illustrated in Fig.5. The updated contour after finger alignment is used to extract the shape features in terms of the wavelet decomposition of distance and orientation of each point of contour w.r.t. the reference point.A wavelet decomposition (1-D) at level 5 using Daubechies-1 wavelet filter is used in this work [2].

(a) Contour with known finger feature points

(a) Hand Image

0.2

(a) (b) Fig.7. Analysis over our hand dataset: (a) false rejection (FA) and false acceptance (FA) with different thresholds, and (b) genuine and imposter scores after score fusion of all three modalities.

Method The framework to find out rotation invariant hand contour with the peaks and valleys of each finger is demonstrated in Fig.2 with the help of an example hand image. Fig.3 shows the robustness of the reference point extraction over wrist boundary of the hand.

False Rejection False Acceptance

TAR

(c)

1 0.5

Fig.4. Calculation of geometrical features, (a) hand contour with finger feature points and (b) 7 distances used as geometrical features. (b)

0.4

0 0

d1

(a)

0.6

0.2

d4

p5

p1

1.5

0.8

Density

A thresholding and morphological operators are used to get the hand mask binary image from the original hand image. In this process, if any portion of hand gets disjoint from the rest of the hand portion then the scheme illustrated in Fig.1 is used to fix it for each disjoint portion.

1

Score

(b)

Probability

Preprocessing

(a)

(g) Finger feature points

(f) Peaks & Valleys

(e) Contour with reference point

Fig.2. Localization of rotation invariant hand contour and finger feature points such as peaks, valleys and mid-point of two adjacent valleys.

(b) IITD contactless dataset

Fig.6. Example images from (a) our dataset and (b) IITD dataset.

[1]E. Yoruk, E. Konukoglu, B. Sankur, and J. Darbon, “Shape-based hand recognition”, IEEE TIP, 15(7): 1803-1815, 2006. [2]S.G. Mallat, “A theory for multiresolution signal decomposition: the wavelet representation”, IEEE TPAMI, 11(7): 674-693, 1989. [3]A. Kumar, “Incorporating cohort information for reliable palmprint authentication”,Sixth ICVGIP, 2009.

Identity Verification using Shape and Geometry of ...

Fig.1. Process of joining the disjoint finger to the hand, (a) original hand image, (b) generated hand mask using pre-processing, the ring finger is disjoint from hand, (c) hand mask is rotated such that ring finger became vertical, (d) ring finger is extended such that it became attached with the remaining hand, and (e) the hand ...

664KB Sizes 0 Downloads 247 Views

Recommend Documents

speaker identification and verification using eigenvoices
approach, in which client and test speaker models are confined to a low-dimensional linear ... 100 client speakers for a high-security application, 60 seconds or more of ..... the development of more robust eigenspace training techniques. 5.

Shape Descriptor using Polar Plot for Shape ... - Clemson University
Experimental results are promising on silhouette images. ... image of the world, using object models .... The center of mass of any shape is .... ftlib/coil-100.html.

Shape discovering using tactile guidance
be used to teach simple geometric shapes to visually impaired peo- ple. The idea is to ... on the braille display, or by using a tactile codification based on the location of the ... want to provide a way to explore a shape, not by picturing it onto

Online Signature Verification using PCA and Neural ...
vision-based ones include voice recognition and signature verification. Signature has been a ... electronic payments, access control, and so on. In this paper ...

Online Signature Verification using PCA and Neural Network - IJRIT
includes online banking transactions, electronic payments, access control, and so on. ... prevalence of credit cards and bank cheques has long been the target of ...

Face Verification using Gabor Filtering and Adapted ...
2École Polytechnique Fédérale de Lausanne, Switzerland. 1. Abstract. ▷ Face authentication is difficult because of the high-variability of face images.

Speaker Verification Using Fisher Vector
Models-Universal Background Models(GMM-UBM)[1] lay the foundation of modeling speaker space and many approaches based on GMM-UBM framework has been proposed to improve the performance of speaker verification including Support Vec- tor Machine(SVM)[2]

Online Signature Verification using PCA and Neural Network - IJRIT
Signature verification can be applied in commercial fields such as E-business, which includes online banking transactions, electronic payments, access control, ...

speaker identification and verification using eigenvoices
(805) 687-0110; fax: (805) 687-2625; email: kuhn, nguyen, [email protected]. 1. ABSTRACT. Gaussian Mixture Models (GMMs) have been successfully ap- plied to the tasks of speaker ID and verification when a large amount of enrolment data is av

3D shape estimation and texture generation using ...
plausible depth illusions via local foreshortening of surface textures rendered from a stretched spatial frequency envelope. Texture foreshortening cues were exploited by a multi-stage image analysis method that revealed local dominant orientation, d

Efficient 3D shape matching and retrieval using a ...
software development which has greatly facilitated 3D model acquisition ..... tion (similar to PCA), is the use of singular value decomposi- tion (SVD) [28]. In [22 ...

Face Verification using Gabor Filtering and Adapted ...
This is a Gaussian whose center is at a distance f from the origin with an angle θ from the horizontal axis. .... instead fed with Gabor images as inputs. ... of the protocols, enrollment and test data is selected in matching scenarios, that is from

Online Signature Verification using PCA and ... - IJRIT
vision based techniques include face recognition, fingerprint recognition, iris scanning and retina scanning and the vision-based ones include voice recognition ...

Using Conjunctions and Adverbs for Author Verification
Mar 1, 2008 - computer science researchers to look to the problem of author identification from a different perspective. In this work ... Journal of Universal Computer Science, vol. 14, no. 18 (2008), 2967- ..... [Mosteller and Wallace, 1964] Mostell

3D shape estimation and texture generation using ... - Semantic Scholar
The surfaces of 3D objects may be represented as a connected distribution of surface patches that point in various directions with respect to the observer.

Partial identification of willingness-to-pay using shape ...
Jul 14, 2010 - For r>rn, it would have to decrease to take values lower than wn. Convexity rules θn out of the two triangular ˜C regions. Suppose the function passed through ...... Masters degree. 0.04. Professional degree. 0.01. PhD. 0.01. Less th

a design teaching method using shape grammars
Computer-aided design in architectural courses has also had an influence on ... Civil Engineering, Architecture and Urban Design at the State University of Campinas, ... Frank Lloyd Wright´s Prairie House Grammar (Koning and Eizenberg, 1981) .... Cr

NON-RIGID 3D SHAPE RETRIEVAL USING ...
rapid development of 3D shape retrieval systems that, given a query object .... methods for the application of non-rigid 3D shape retrieval. Moreover, the new ...

Visual Similarity based 3D Shape Retrieval Using Bag ...
nience and intuition), we call it “CM-BOF” algorithm in this paper. ... translate the center of its mass to the origin and ... given unit geodesic sphere whose mass center is also ...... Advanced in Computer Graphics and Computer Vision, pp. 44â€

Determination of volume, shape and refractive index of ...
Journal of Quantitative Spectroscopy &. Radiative Transfer 102 (2006) 37– ... cFaculty of Science, Section Computational Science of the University of Amsterdam, Kruislaan 403, 1098 SJ, Amsterdam, The Netherlands. Abstract. Light scattering ... and

The Vn801 Chip Verification Environment Using Verilog ...
processor core and peripherals such as watchdog-timer, timer0, timer1, timer2, ccp1, ... program which converts assembly code to VN801 instructions. Instruction ...

Shape Modeling by Sketching using Convolution ...
challenge for the modeling software. One of the simplest and .... August 1999, pages 409-416. [7] O. Karpenko, J. F. Hughes, and R. Raskar, “Free-form.

Speaker Verification Anti-Spoofing Using Linear ...
four major direct spoofing attack types against ASV systems. [11]. Among these ... training data. Therefore, SS and VC attacks are potential threats for falsifying ASV systems. For a detailed review and general information on spoofing attacks against