• Title/Summary/Keyword: Biometric Software

Search Result 81, Processing Time 0.024 seconds

Adaptive Hybrid Fingerprint Matching Method Based on Minutiae and Filterbank (특징점과 필터뱅크에 기반한 적응적 혼합형 지문정합 방법)

  • 정석재;박상현;문성림;김동윤
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.7
    • /
    • pp.959-967
    • /
    • 2004
  • Jain et al. proposed the hybrid matching method which was combined the minutia-based matching method and the filter-bank based matching method. And, their experimental results proved the hybrid matching method was more effective than each of them. However, this hybrid method cannot utilize each peculiar advantage of two methods. The reason is that it gets the matching score by simply summing up each weighted matching score after executing two methods individually. In this paper, we propose new hybrid matching method. It mixes two matching methods during the feature extraction process. This new hybrid method has lower ERR than the filter-bank based method and higher ERR than the minutia-based method. So, we propose the adaptive hybrid scoring method, which selects the matching score in order to preserve the characteristics of two matching methods. Using this method, we can get lower ERR than the hybrid matcher by Jain et al. Experimental results indicate that the proposed methods can improve the matching performance up to about 1% in ERR.

A Flexible Model-Based Face Region Detection Method (유연한 모델 기반의 얼굴 영역 검출 방법)

  • Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.251-256
    • /
    • 2021
  • Unlike general cameras, a high-speed camera capable of capturing a large number of frames per second can enable the advancement of some image processing technologies that have been limited so far. This paper proposes a method of removing undesirable noise from an high-speed input color image, and then detecting a human face from the noise-free image. In this paper, noise pixels included in the ultrafast input image are first removed by applying a bidirectional filter. Then, using RetinaFace, a region representing the person's personal information is robustly detected from the image where noise was removed. The experimental results show that the described algorithm removes noise from the input image and then robustly detects a human face using the generated model. The model-based face-detection method presented in this paper is expected to be used as basic technology for many practical application fields related to image processing and pattern recognition, such as indoor and outdoor building monitoring, door opening and closing management, and mobile biometric authentication.

The Interface between Wearable Devices and Metaverse: A Study on Soccer Game Character Ability Mapping using Mi Band (웨어러블 디바이스와 메타버스의 접점: 미밴드를 이용한 축구 게임 캐릭터 능력치 매핑 연구)

  • Hyun-Su Kim;Mi-Kyeong Moon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1345-1352
    • /
    • 2023
  • With the development of virtual reality (VR) and blockchain technology, Metaverse is being used in various fields such as games, education, and social networking. At the same time, shipments of wearable devices such as smartwatches are growing every year, becoming more and more integrated into people's daily lives. This study presents a new possibility of reflecting the user's body signals measured through the combination of the two phenomena in the metaverse character. Various biometric information such as the user's heart rate and amount of exercise collected through the smartwatch are reflected on the character in the metaverse, allowing the user's physical condition to be reflected in the virtual world. Through this, Metaverse is expected to provide a new experience that can be called 'extended reality' beyond simple virtual reality, improve user's satisfaction with Metaverse, and suggest a direction for the development of smartwatches.

Software development for the visualization of brain fiber tract by using 24-bit color coding in diffusion tensor image

  • Oh, Jung-Su;Song, In-Chan;Ik hwan Cho;Kim, Jong-Hyo;Chang, Kee-Hyun;Park, Kwang-Suk
    • Proceedings of the KSMRM Conference
    • /
    • 2002.11a
    • /
    • pp.133-133
    • /
    • 2002
  • Purpose: The purpose of paper is to implement software to visualize brain fiber tract using a 24-bit color coding scheme and to test its feasibility. Materials and Methods: MR imaging was performed on GE 1.5 T Signa scanner. For diffusion tensor image, we used a single shot spin-echo EPI sequence with 7 non-colinear pulsed-field gradient directions: (x, y, z):(1,1,0),(-1,1,0),(1,0,1),(-1,0,1),(0,1,1),(0,1,-1) and without diffusion gradient. B-factor was 500 sec/$\textrm{mm}^2$. Acquisition parameters are as follows: TUTE=10000ms/99ms, FOV=240mm, matrix=128${\times}$128, slice thickness/gap=6mm/0mm, total slice number=30. Subjects consisted of 10 normal young volunteers (age:21∼26 yrs, 5 men, 5 women). All DTI images were smoothed with Gaussian kernel with the FWHM of 2 pixels. Color coding schemes for visualization of directional information was as follows. HSV(Hue, Saturation, Value) color system is appropriate for assigning RGB(Red, Green, and Blue) value for every different directions because of its volumetric directional expression. Each of HSV are assigned due to (r,$\theta$,${\Phi}$) in spherical coordinate. HSV calculated by this way can be transformed into RGB color system by general HSV to RGB conversion formula. Symmetry schemes: It is natural to code the antipodal direction to be same color(antipodal symmetry). So even with no symmetry scheme, the antipodal symmetry must be included. With no symmetry scheme, we can assign every different colors for every different orientation.(H =${\Phi}$, S=2$\theta$/$\pi$, V=λw, where λw is anisotropy). But that may assign very discontinuous color even between adjacent yokels. On the other hand, Full symmetry or absolute value scheme includes symmetry for 180$^{\circ}$ rotation about xy-plane of color coordinate (rotational symmetry) and for both hemisphere (mirror symmetry). In absolute value scheme, each of RGB value can be expressed as follows. R=λw|Vx|, G=λw|Vy|, B=λw|Vz|, where (Vx, Vy, Vz) is eigenvector corresponding to the largest eigenvalue of diffusion tensor. With applying full symmetry or absolute value scheme, we can get more continuous color coding at the expense of coding same color for symmetric direction. For better visualization of fiber tract directions, Gamma and brightness correction had done. All of these implementations were done on the IDL 5.4 platform.

  • PDF

An Effective Face Authentication Method for Resource - Constrained Devices (제한된 자원을 갖는 장치에서 효과적인 얼굴 인증 방법)

  • Lee Kyunghee;Byun Hyeran
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1233-1245
    • /
    • 2004
  • Though biometrics to authenticate a person is a good tool in terms of security and convenience, typical authentication algorithms using biometrics may not be executed on resource-constrained devices such as smart cards. Thus, to execute biometric processing on resource-constrained devices, it is desirable to develop lightweight authentication algorithm that requires only small amount of memory and computation. Also, among biological features, face is one of the most acceptable biometrics, because humans use it in their visual interactions and acquiring face images is non-intrusive. We present a new face authentication algorithm in this paper. Our achievement is two-fold. One is to present a face authentication algorithm with low memory requirement, which uses support vector machines (SVM) with the feature set extracted by genetic algorithms (GA). The other contribution is to suggest a method to reduce further, if needed, the amount of memory required in the authentication at the expense of verification rate by changing a controllable system parameter for a feature set size. Given a pre-defined amount of memory, this capability is quite effective to mount our algorithm on memory-constrained devices. The experimental results on various databases show that our face authentication algorithm with SVM whose input vectors consist of discriminating features extracted by GA has much better performance than the algorithm without feature selection process by GA has, in terms of accuracy and memory requirement. Experiment also shows that the number of the feature ttl be selected is controllable by a system parameter.

Fast Fingerprint Alignment Method and Weighted Feature Vector Extraction Method in Filterbank-Based Fingerprint Matching (필터뱅크 기반 지문정합에서 빠른 지문 정렬 방법 및 가중치를 부여한 특징 벡터 추출 방법)

  • 정석재;김동윤
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.1
    • /
    • pp.71-81
    • /
    • 2004
  • Minutiae-based fingerprint identification systems use minutiae points, which cannot completely characterize local ridge structures. Further, this method requires many methods for matching two fingerprint images containing different number of minutiae points. Therefore, to represent the fired length information for one fingerprint image, the filterbank-based method was proposed as an alternative to minutiae-based fingerprint representation. However, it has two shortcomings. One shortcoming is that similar feature vectors are extracted from the different fingerprints which have the same fingerprint type. Another shortcoming is that this method has overload to reduce the rotation error in the fingerprint image acquisition. In this paper, we propose the minutia-weighted feature vector extraction method that gives more weight in extracting feature value, if the region has minutiae points. Also, we Propose new fingerprint alignment method that uses the average local orientations around the reference point. These methods improve the fingerprint system's Performance and speed, respectively. Experimental results indicate that the proposed methods can reduce the FRR of the filterbank-based fingerprint matcher by approximately 0.524% at a FAR of 0.967%, and improve the matching performance by 5% in ERR. The system speed is over 1.28 times faster.

Eyelid Detection Algorithm Based on Parabolic Hough Transform for Iris Recognition (홍채 인식을 위한 포물 허프 변환 기반 눈꺼풀 영역 검출 알고리즘)

  • Jang, Young-Kyoon;Kang, Byung-Jun;Park, Kang-Ryoung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.1
    • /
    • pp.94-104
    • /
    • 2007
  • Iris recognition is biometric technology which uses a unique iris pattern of user in order to identify person. In the captured iris image by conventional iris recognition camera, it is often the case with eyelid occlusion, which covers iris information. The eyelids are unnecessary information that causes bad recognition performance, so this paper proposes robust algorithm in order to detect eyelid. This research has following three advantages compared to previous works. First, we remove the detected eyelash and specular reflection by linear interpolation method because they act as noise factors when locating eyelid. Second, we detect the candidate points of eyelid by using mask in limited eyelid searching area, which is determined by searching the cross position of eyelid and the outer boundary of iris. And our proposed algorithm detects eyelid by using parabolic hough transform based on the detected candidate points. Third, there have been many researches to detect eyelid, but they did not consider the rotation of eyelid in an iris image. Whereas, we consider the rotation factor in parabolic hough transform to overcome such problem. We tested our algorithm with CASIA Database. As the experimental results, the detection accuracy were 90.82% and 96.47% in case of detecting upper and lower eyelid, respectively.

Development of Authentication Service Model Based Context-Awareness for Accessing Patient's Medical Information (환자 의료정보 접근을 위한 상황인식 기반의 인증서비스 모델 개발)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • With the recent establishment of a ubiquitous-based medical and healthcare environment, the medical information system for obtaining situation information from various sensors is increasing. In the medical information system environment based on context-awareness, the patient situation can be determined as normal or emergency using situational information. In addition, medical staff can easily access patient information after simple user authentication using ID and Password through applications on smart devices. However, these services of authentication and patient information access are staff-oriented systems and do not fully consider the ubiquitous-based healthcare information system environment. In this paper, we present a authentication service model based context-awareness system for providing situational information-driven authentication services to users who access medical information, and implemented proposed system. The authentication service model based context-awareness system is a service that recognizes patient situations through sensors and the authentication and authorization of medical staff proceed differently according to patient situations. It was implemented using wearables, biometric data measurement modules, camera sensors, etc. to configure various situational information measurement environments. If the patient situation was emergency situation, the medical information server sent an emergency message to the smart device of the medical staff, and the medical staff that received the emergency message tried to authenticate using the application of the smart device to access the patient information. Once all authentication was completed, medical staff will be given access to high-level medical information and can even checked patient medical information that could not be seen under normal situation. The authentication service model based context-awareness system not only fully considered the ubiquitous medical information system environment, but also enhanced patient-centered systematic security and access transparency.

Biometry of width between labial transitional line angles in anterior teeth: an observational study

  • Wen, Chao;Ye, Hongqiang;Chen, Hu;Zhou, Yongsheng;Huang, Mingming;Sun, Yuchun
    • The Journal of Advanced Prosthodontics
    • /
    • v.14 no.1
    • /
    • pp.1-11
    • /
    • 2022
  • PURPOSE. The maximum width between the mesial and distal labial transitional line angles, described as "esthetic width" herein, could significantly influence the visual perception of the teeth and smile. This study aimed to conduct biometric research on esthetic width and to explore whether regular distribution exists in the esthetic width of human teeth. MATERIALS AND METHODS. A total of 4,264 maxillary and mandibular anterior teeth were measured using the Geomagic studio software program. The proportions of maxillary to mandibular homonymous teeth and proportions between the adjacent teeth were calculated. Bilateral symmetry and the correlation between the esthetic and mesiodistal widths were both accounted for during the measurement procedures. RESULTS. The mean esthetic widths were 6.773 ± 0.518 mm and 4.329 ± 0.331 mm for maxillary and mandibular central incisors, respectively, 5.451 ± 0.487 mm and 5.008 ± 0.351 mm for maxillary and mandibular lateral incisors, respectively, and 3.340 ± 0.353 mm and 5.958 ± 0.415 mm for maxillary and mandibular canines, respectively. Except for the mandibular canines, no significant difference in esthetic width was found among homonymous teeth from the same jaw. A high linear correlation was found between the esthetic and mesiodistal widths of the same tooth, except for the maxillary canines. Esthetic width proportions among different tooth categories showed some regular patterns, which were similar to those of the mesiodistal width. CONCLUSION. Esthetic width is regularly distributed among the teeth in the Chinese population. This could provide an important reference for anterior dental restorations and dimension recovery in esthetic reconstruction of anterior teeth.

Biometric analysis hand parameters in young adults for prosthetic hand and ergonomic product applications

  • Gkionoul Nteli Chatzioglou;Yelda Pinar;Figen Govsa
    • Anatomy and Cell Biology
    • /
    • v.57 no.2
    • /
    • pp.172-182
    • /
    • 2024
  • This study aimed to evaluate the superficial anatomy, kinesiology, and functions of the hand to reveal its morphometry and apply the findings in various fields such as prosthetic hand and protective hand support product design. We examined 51 young adults (32 females, 19 males) aged between 18-30. Hand photographs were taken, and measurements were conducted using ImageJ software. Pearson correlation analysis was performed to determine the relationship between personal information and the parameters. The results of the measurements showed the average lengths of finger segments: thumb (49.5±5.5 mm), index finger (63.9±4.1 mm), middle finger (70.7±5.2 mm), ring finger (65.5±4.8 mm), and little finger (53.3±4.3 mm). Both females and males, the left index finger was measured longer than the right index finger. The right ring finger was found to be longer than the left in both sexes. Additionally, length differences between fingers in extended and maximally adducted positions were determined: thumb-index finger (56.1±6.2 mm), index-middle finger (10.7±4.1 mm), middle-ring finger (10.8±1.4 mm), and ring-little finger (25.6±2.7 mm). Other findings included the average radial natural angle (56.4°±10.5°), ulnar natural angle (23.4°±7.1°), radial deviation angle (65.2°±8.2°), ulnar deviation angle (51.2°±9.6°), and grasping/gripping angle (49.1°±5.8°). The average angles between fingers in maximum abduction positions were also measured: thumb-index finger (53.4°±6.5°), index-middle finger (17.2°±2.6°), middle-ring finger (14.3°±2.3°), and ring-little finger (32.1°±7.0°). The study examined the variability in the positioning of proximal interphalangeal joints during maximum metacarpophalangeal and proximal interphalangeal flexion, coinciding with maximum distal interphalangeal extension movements. The focal points of our observations were the asymmetrical and symmetrical arches formed by these joints. This study provides valuable hand parameters in young adults, which can be utilized in various applications such as prosthetic design, ergonomic product development, and hand-related research. The results highlight the significance of considering individual factors when assessing hand morphology and function.