• Title/Summary/Keyword: 스켈리톤 모델

Search Result 2, Processing Time 0.014 seconds

Movement Detection Algorithm Using Virtual Skeleton Model (가상 모델을 이용한 움직임 추출 알고리즘)

  • Joo, Young-Hoon;Kim, Se-Jin
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.6
    • /
    • pp.731-736
    • /
    • 2008
  • In this paper, we propose the movement detection algorithm by using virtual skeleton model. To do this, first, we eliminate error values by using conventioanl method based on RGB color model and eliminate unnecessary values by using the HSI color model. Second, we construct the virtual skeleton model with skeleton information of 10 peoples. After matching this virtual model to original image, we extract the real head silhouette by using the proposed circle searching method. Third, we extract the object by using the mean-shift algorithm and this head information. Finally, we validate the applicability of the proposed method through the various experiments in a complex environments.

An Algorithm of Fingerprint Image Restoration Based on an Artificial Neural Network (인공 신경망 기반의 지문 영상 복원 알고리즘)

  • Jang, Seok-Woo;Lee, Samuel;Kim, Gye-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.530-536
    • /
    • 2020
  • The use of minutiae by fingerprint readers is robust against presentation attacks, but one weakness is that the mismatch rate is high. Therefore, minutiae tend to be used with skeleton images. There have been many studies on security vulnerabilities in the characteristics of minutiae, but vulnerability studies on the skeleton are weak, so this study attempts to analyze the vulnerability of presentation attacks against the skeleton. To this end, we propose a method based on the skeleton to recover the original fingerprint using a learning algorithm. The proposed method includes a new learning model, Pix2Pix, which adds a latent vector to the existing Pix2Pix model, thereby generating a natural fingerprint. In the experimental results, the original fingerprint is restored using the proposed machine learning, and then, the restored fingerprint is the input for the fingerprint reader in order to achieve a good recognition rate. Thus, this study verifies that fingerprint readers using the skeleton are vulnerable to presentation attacks. The approach presented in this paper is expected to be useful in a variety of applications concerning fingerprint restoration, video security, and biometrics.