The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we address the challenging problem of single-view cross-season place recognition. A new approach is proposed for compact discriminative scene descriptor that helps in coping with changes in appearance in the environment. We focus on a simple effective strategy that uses objects whose appearance remain the same across seasons as valid landmarks. Unlike popular bag-of-words (BoW) scene...
This document represents a client server based application designed for the purpose of artefact recognition in a museum, based on photos made with the help of a mobile phone. Image recognition was conducted with the help of SURF (Speeded Up Robust Features) algorithm. Server was implemented with the usage of Netty library. Because of the parallel approach used both in the classification part and during...
In this paper, Krawtchouk invariant moments are used as features for object recognition. For hand images, the performance of Krawtchouk moments in terms of recognition accuracy, rotational invariance, scale invariance, computational time and feature vector size, has been analysed. A user independent dataset for 21 subjects under varying illumination conditions is created. A comparative analysis with...
Signature has been a distinguishing biometric feature. Today the human signature of a person is used as an identification of person because we are all know that the each person has distinct signature and every signature has its own physiology or behavioral characteristics. So the human signature used as a identification of person in various work like bank checks etc. The signature identification can...
Fingerphoto is an image of a human finger obtained with the help of an ordinary camera. Its acquisition is convenient and does not require any particular biometric scanner. The high degree of freedom in finger positioning introduces challenges to its recognition. This paper proposes a fingerphoto based human authentication system for mobile hand-held devices by using a non-conventional scale-invariant...
In recognition of urban buildings, conventional SIFT-based matching is highly prone to error when a large number of similar keypoints are extracted from the repetitive structure of a building. We propose a relaxation based matching of clusters of SIFT keypoints, followed by multi-frame verification. Two-step mean shift clustering is successful in grouping semantically homogeneous keypoints into a...
Robustness to variations in environmental conditions and camera viewpoint is essential for long-term place recognition, navigation and SLAM. Existing systems typically solve either of these problems, but invariance to both remains a challenge. This paper presents a training-free approach to lateral viewpoint- and condition-invariant, vision-based place recognition. Our successive frame patch-tracking...
In this paper, we propose to use Fourier descriptors (FD) for hand posture recognition in a vision-based approach. FD are widely used for shape representation and pattern recognition, they may also be well-adapted for hand posture recognition. The invariance properties of FD are discussed, and we provide a comparison of the performances with Hu moments. First, experiments are performed on the Triesch...
This paper presents a novel palmprint recognition scheme which utilizes directional representation of Anisotropic Filters (AFs) optimally followed by Local Binary Pattern (LBP) called Optimal Local direction Binary patterns (OLdirBP). Optimal orientation image from different orientation can be excavated by opting orientation corresponding to maximum of summed value of convoluted responses between...
A face recognition system based on 2-D DCT features and pseudo-2D Hidden Markov Models is presented. The system achieves a recognition rate of 99.5% on the Olivetti Research Laboratory (ORL) face database. This recognition rate is much better than the recognition rate of a previous pseudo 2-D HMM approach. Only one single face out of the 200 available test faces was not correctly recognized. The superiority...
Biometric-based identification and verification systems are poised to become a key technology, with applications including controlling access to buildings and computers, reducing fraudulent transactions in electronic commerce, and discouraging illegal immigration. There are at least eight image-based biometrics that are being actively considered. In image-based biometrics, the biometrie signature...
In this paper, we propose a new method that allows, by finding the convex hull of a character image, to set out in one pass only, the control parameters of a particular character distortion process. This character distortion method can then be applied to normalize the character image, i.e. to reduce the within-class scatter of images of handwritten characters, which could lead to a significant improvement...
Identifying and eliminating the limitations in the existing security systems by using the image based retrieval technique to provide an exquisite security application based on facial recognition to approve a person's identity. This security system gets a live query image and stores it temporarily into the database where the predefined images are already stored. A (energy) signature for key image as...
Biometric authentication techniques have seen a resurgence in popularity and application recently as the need for secure data access increases. In this paper, we present a novel method for authentication of palmprints, which are known to serve as a robust biometric trait, yet has remained underutilized. We propose a modification of the radon transform incorporating fuzzy membership function which...
GPS information has been applied to many fields, especially the navigation systems. With the popularity of smart mobiles, we proposed a novel method for navigation which combines mobile GPS location information with scene recognition. In our approach, three steps of filters are used. Firstly, we utilize GPS information to discard a large number of images that are not nearby the query image. Secondly,...
A sound signal produces a unique texture which can be visualized using a spectrogram image and analyzed for automatic sound recognition. In this paper, we explore the use of a well-known image texture analysis technique called the gray-level co-occurrence matrix (GLCM) for sound recognition in an audio surveillance application. The GLCM captures the distribution of co-occurring values at a given offset...
Local detail features of face are important bases for recognizing different persons. For its invariant to monotonic gray-scale transformations and it's a non-parametric kernel which summarizes the local special structure of an image, the Local Binary Pattern (LBP) has becoming a popular technique for face representation. In this paper, the LBP technique and its application for representing faces are...
Recent development in depth sensors opens up new challenging task in the field of computer vision research areas, including human-computer interaction, computer games and surveillance systems. This paper addresses shape and motion features approach to observe, track and recognize human silhouettes using a sequence of RGB-D images. Under our proposed activity recognition framework, the required procedure...
This paper presents a new approach for real-world gender recognition, where images are captured under uncontrolled environments with various poses, illuminations and expressions. While a large number of gender recognition methods have been introduced in recent years, most of them describe each image in a single feature space or simple combination of multiple individual spaces, which can not be powerful...
The vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of spoofing finger vein images has been created from real finger vein samples. Finger vein images are printed using a commercial printer and then, presented at an open source finger vein sensor. Experiments are carried out using an extensible framework, which allows fair and reproducible benchmarks. Experimental...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.