The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A face recognition system which represents each image as a superposition of the dominant components in two transform domains is proposed. The Discrete Wavelet Transform (DWT) and the Discrete Cosine Transform (DCT) are the two domains. By the end of the Training mode, each pose in the gallery will have two final matrices. Feature Extraction step in the Training includes transforming the preprocessed...
The most common cause of human death is cardiovascular disease (CVD) in today's world. Electrocardiogram (ECG) is widely used techniques for diagnosing CVD. Several methods have been proposed to classify arrhythmia of ECG. In this paper, a new method of extracting features from ECG signals is proposed. This method is built on completely modifying MFCCs (Mel-Frequency Cepstral Coefficients). No filterbank...
The face recognition problem has been extensively studied by many researchers but accuracy is not satisfactory. This work presents analysis and performance evaluation of global methods (PCA, FLD, DCT, DWT), local methods (SIFT, LBP) and all possible fusions of two methods among them. The fusion is done by consolidating the output of multiple feature extraction algorithms at score levels using four...
Authentication is one of the significant issues in the era of information system. Among other things, human face recognition (HFR) is one of known techniques which can be used for user authentication. As an important branch of biometric verification, HFR has been widely used in many applications, such as video monitoring/surveillance system, human-computer interaction, door access control system and...
The palm-print verification system is based on two modes, viz, Enrollment mode and Recognition mode. In the enrollment mode, the palm-print features are acquired from the sensor and stored in a database along with the person's identity for the recognition of his/her identity. In the recognition mode, the palm-print features are re-acquired from the sensor and compared against the stored data to determine...
With rapid development in mobile devices with high quality image and video processing capabilities, it is desirable or necessary to implement steganography technology within such devices in some applications such as source authentication. In this paper, we propose a method of implementing information hiding within a video with less processing time and memory requirement. The message to be secretly...
In this paper, a robust technique to construct feature vector for gender classification has been proposed. Discrete Wavelet transform is used in concatenation with Discrete Cosine transform to form the feature vector. Initially, multi-level Discrete Wavelet transform is applied to images to obtain the approximation coefficients of image. Discrete Cosine transform are then calculated for the obtained...
Epilepsy is a neurological disorder including disorders of the nervous system caused by brain damage. In this paper Epileptic seizure detection is done using electroencephalogram signals (EEG). Discrete wavelet transform (DWT) method is a common method to extract four features from the (EEG) signal, and then classify them. To improve and increase the efficiency of extraction of features and to get...
Image registration has been widely used in many fields such as medical imaging, remote sensing, and computer vision. It transforms multiple images of the same subject that are taken either at different times or from different points of view to the same coordinate system. In this study, two novel neural network based approaches are investigated for the registration of magnetic resonance images (MRI)...
The statistical description of the iris varies drastically with changes in contrast. These variations make Iris Recognition (IR) even more challenging. In this paper, two novel techniques are proposed, viz., Contrast Enhancement using Top Hat and Bottom Hat filters for enhancing the gradience between brighter and darker pixels and DWT+DCT feature extractor to select the salient features. A Binary...
Handwritten and machine printed (H&P) text separation from document images is a precursor to advance the performance of the OCR system. This paper demonstrates the competence of frequency domain features for the classification of H&P text words. We propose wavelet-like discrete cosine transform (WDCT) based features. We conduct an experiment on a large dataset of 2000 text words of popular...
The sequence of operations for face recognition comprises of the pre-processing techniques, feature extraction, selection and classification for precise identification and substantiation of subject images. Initially, the face images are processed by Gaussian of Laplacian blurring with Median and Weiner filters for the removal of undesirable noise and frequencies, a unique approach in advancing the...
Recent studies have shown that it is possible to attack a finger vein (FV) based biometric system using printed materials. In this study, we propose a novel method to detect spoofing of static finger vein images using Windowed Dynamic mode decomposition (W-DMD). This is an atemporal variant of the recently proposed Dynamic Mode Decomposition for image sequences. The proposed method achieves better...
Iris based authentication is a pattern recognition technique that makes use of Iris patterns, which are analytically unique. In this paper, we propose a novel approach for enhanced Iris Recognition (IR) system using Segmentation based Background Removal (SBR) and Triangular shaped DCT (TriDCT) extraction techniques. Segmentation is a process of isolating the objects of interest from the rest of scene...
With use of different kinds of software's for high level image processing, nowadays tampering of original digital images is easily done by end users. Therefore this becomes research problem as one cannot know whether present digital image is original or forged. Common type of forgery used is Region Duplication Forgery. In Region Duplication forgery, one part of original image is copied and then pasted...
Face recognition is an existing and one of most prominent technique of biometrics that includes processing of an image and to be matched with different database. In this procedure, the user matches one person identity with several database images. Various approaches like Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), Local Ternary Pattern (LTP) have been used for the purpose of...
Researchers have made efforts to achieve age classification using spatial and transform domain techniques with various classifiers. Spatial Domain techniques are based on human perception and susceptible to noise and image processing operations. Transform domain techniques provide high flexibility and robustness in selection of features and better classification efficiency. This paper uses transform...
In this paper, an adaptive technique using Firefly Algorithm for feature selection in face recognition is proposed. The artificial fireflies are designed to represent the feature subset and they move in a hyper dimensional space to obtain the best features. The features are extracted using Discrete Cosine Transform (DCT) and Haar wavelets based Discrete Wavelet Transform (DWT). The algorithm is validated...
Digital image forgery is becoming easier to perform because of the rapid developments of various manipulation tools. Between the various image forgery techniques, image splicing is considered as one the most prevalent technique. In this paper, a low dimensional singular value decomposition (SVD) based feature extraction method applied in steganalysis is proposed as an image splicing detection method...
Ultrasound non-destructive testing is widely applied to identify defects in structures and equipment as it combines simplicity, fast execution and high efficiency in the detection of flaws. However, in many practical evaluations the accuracy of the obtained results relies on the experience of the operator. Some automatic decision support systems have been proposed in the literature aiming at helping...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.