Browse > Article
http://dx.doi.org/10.9717/kmms.2015.18.1.001

Individual Identification Using Ear Region Based on SIFT  

Kim, Min-Ki (Dept. of Computer Science, Gyeongsang National University, Engineering Research Institute)
Publication Information
Abstract
In recent years, ear has emerged as a new biometric trait, because it has advantage of higher user acceptance than fingerprint and can be captured at remote distance in an indoor or outdoor environment. This paper proposes an individual identification method using ear region based on SIFT(shift invariant feature transform). Unlike most of the previous studies using rectangle shape for extracting a region of interest(ROI), this study sets an ROI as a flexible expanded region including ear. It also presents an effective extraction and matching method for SIFT keypoints. Experiments for evaluating the performance of the proposed method were performed on IITD public database. It showed correct identification rate of 98.89%, and it showed 98.44% with a deformed dataset of 20% occlusion. These results show that the proposed method is effective in ear recognition and robust to occlusion.
Keywords
Ear region; Individual identification; SIFT;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Y. Guo and Z. Xu, "Ear Recognition using a New Local Matching Approach," Proceeding of the 15th International Conference on Image Processing, pp. 289-192, 2008.
2 Y. Wang, Z. Mu, and H. Zeng, "Block-based and Multi-resolution Methods for Ear Recognition using Wavelet Transform and Uniform Local Binary Pattern," Proceeding of the International Conference on Pattern Recognition, pp. 1-4, 2008.
3 J.D. Bustad and M.S. Nixon, "Robust 2D Ear Registration and Recognition Based on SIFT Point Matching," Proceeding of the IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp. 1-6, 2008.
4 D.R. Kisku, H. Mehrotra, P. Gupta, and J.K. SIng, "SIFT-based Ear Recognition by Fusion of Detectged Keypoints from Color Similarity Slice Regions," Proceeding of the International Conference on Advances in Computational Tools for Engineering Applications, pp. 380-385, 2009.
5 D.G. Lowe, "Distinctive Image Features from Scale-Invariant Keypoints," International Journal of Computer Vision, Vol. 60, No. 2, pp. 91-110, 2004.   DOI
6 D.J. Hurley, M.S. Nixon, and J.N. Carter, "Force Field Energy Functionals for Image Feature Extraction," Image and Vision Computing, Vol. 20, No. 5-6, pp. 311-317, 2002.   DOI
7 Otsu, "A Threshold Selection Method from Gray-level Histograms," IEEE Transactions on System, Man, and Cybernetics, Vol. 9, No. 1, pp. 62-66, 1979.   DOI   ScienceOn
8 M. Choras, "Ear Biometrics Based on Geometrical Feature Extraction," Electronic Letters on Computer Vision and Image Analysis, Vol. 5, No. 3, pp. 84-95, 2005.
9 J. Dougman, "High Confidence Personal Identification by Rapid Video Analysis of Iris Texture," Proceeding of the IEEE International Carnahan Conference of Security Technology, pp. 50-60, 1992.
10 S. Bharadwaj, H.S. Bhatt, M. Vatsa, and R. Singh, "Periocular Biometrics: When Iris Recognition Fails," Proceeding of the IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp. 1-6, 2010.
11 A. Abaza, A. Ross, C. Hebert, M.A.F. Harrison, and M.S. Nixon, "A Survey of Ear Biometrics," ACM Computing Surveys, Vol. 45, No. 2, Article 22, 2013.   DOI
12 A. Agarwal, M. Singhal, N. Sehgal, and S. Sharma, "Fusion of Geometrical and Statistical Techniques for Human Ear Recognition," International Journal of Emerging Technology and Advanced Engineering, Vol. 4, No. 1, pp. 636-641, 2014.
13 M. Burge and W. Burger, "Ear Biometrics," BIOMETRICS: Personal Identification in a Networked Society, pp. 273-286, 1998.
14 K. Chang, K.W. Bowyer, and S. Sarkar, "Comparision and Combination of Ear and Face Images in Appearance-Based Biometrics," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 25, No. 9, pp. 1160-1165, 2003.   DOI
15 H. Zhang, Z. Mu, W. Qu, L. Liu, and C. Zhang, "A Novel Approach for Ear Recognition based on ICA and RBF Network," Proceeding of the 4th International Conference on Machine Learning and Cybernetics, Vol. 7, pp. 4511-4515, 2005.
16 Mamta and M. Hanmandu, "Robust Ear based Authentication using Local Principal Independent Components," Expert Systems with Applications, Vol. 40, No. 16, pp. 6478-6490, 2013.   DOI
17 S. Sonkamble. R, Thool, and B. Sonkamble, "Survey of Biometric Recognition Systems and Their Applications," Journal of Theoretical and Applied Information Technology, Vol. 11, No. 1, pp. 45-51, 2010.
18 A. Kumar and C. Wu, "Automated Human Identification using Ear Imaging," Pattern Recognition, Vol. 45, No. 3, pp. 956-968, 2012.   DOI
19 A. Morales, M.A. Ferrer, and A. Kumar, "Towards Contactless Palmprint Authentication," IET Computer Vision, Vol. 5, No 6, pp. 407-416, 2011.   DOI   ScienceOn
20 M. Kim. “Finger-Knuckle-Print Verification Using Vector Similarity Matching of Keypoints,” Journal of Korea Multimedia Society, Vol. 16, No. 9, pp. 1057-1066, 2013.   DOI
21 M.I.S. Ibrahim, M.S. Nixon, and S. Mahmoodi, "The Effect of Time on Ear Biometrics," Proceeding of the International Joint Conference on Biometrics, pp. 1-6, 2011.