• Title/Summary/Keyword: Signature recognition

Search Result 83, Processing Time 0.028 seconds

High Performance Object Recognition with Application of the Size and Rotational Invariant Feature of the Fourier Descriptor to the 3D Information of Edges (푸리에 표현자의 크기와 회전 불변 특징을 에지에 대한 3차원 정보에 응용한 고효율의 물체 인식)

  • Wang, Shi;Chen, Hongxin;I, Jun-Ho;Lin, Haiping;Kim, Hyong-Suk;Kim, Jong-Man
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.170-178
    • /
    • 2008
  • A high performance object recognition algorithm using Fourier description of the 3D information of the objects is proposed. Object boundaries contain sufficient information for recognition in most of objects. However, it is not well utilized as the key solution of the object recognition since obtaining the accurate boundary information is not easy. Also, object boundaries vary highly depending on the size or orientation of object. The proposed object recognition algorithm is based on 1) the accurate object boundaries extracted from the 3D shape which is obtained by the laser scan device, and 2) reduction of the required database using the size and rotational invariant feature of the Fourier Descriptor. Such Fourier information is compared with the database and the recognition is done by selecting the best matching object. The experiments have been done on the rich database of MPEG 7 Part B.

Object detection in financial reporting documents for subsequent recognition

  • Sokerin, Petr;Volkova, Alla;Kushnarev, Kirill
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.1-11
    • /
    • 2021
  • Document page segmentation is an important step in building a quality optical character recognition module. The study examined already existing work on the topic of page segmentation and focused on the development of a segmentation model that has greater functional significance for application in an organization, as well as broad capabilities for managing the quality of the model. The main problems of document segmentation were highlighted, which include a complex background of intersecting objects. As classes for detection, not only classic text, table and figure were selected, but also additional types, such as signature, logo and table without borders (or with partially missing borders). This made it possible to pose a non-trivial task of detecting non-standard document elements. The authors compared existing neural network architectures for object detection based on published research data. The most suitable architecture was RetinaNet. To ensure the possibility of quality control of the model, a method based on neural network modeling using the RetinaNet architecture is proposed. During the study, several models were built, the quality of which was assessed on the test sample using the Mean average Precision metric. The best result among the constructed algorithms was shown by a model that includes four neural networks: the focus of the first neural network on detecting tables and tables without borders, the second - seals and signatures, the third - pictures and logos, and the fourth - text. As a result of the analysis, it was revealed that the approach based on four neural networks showed the best results in accordance with the objectives of the study on the test sample in the context of most classes of detection. The method proposed in the article can be used to recognize other objects. A promising direction in which the analysis can be continued is the segmentation of tables; the areas of the table that differ in function will act as classes: heading, cell with a name, cell with data, empty cell.

Biometric identification of Black Bengal goat: unique iris pattern matching system vs deep learning approach

  • Menalsh Laishram;Satyendra Nath Mandal;Avijit Haldar;Shubhajyoti Das;Santanu Bera;Rajarshi Samanta
    • Animal Bioscience
    • /
    • v.36 no.6
    • /
    • pp.980-989
    • /
    • 2023
  • Objective: Iris pattern recognition system is well developed and practiced in human, however, there is a scarcity of information on application of iris recognition system in animals at the field conditions where the major challenge is to capture a high-quality iris image from a constantly moving non-cooperative animal even when restrained properly. The aim of the study was to validate and identify Black Bengal goat biometrically to improve animal management in its traceability system. Methods: Forty-nine healthy, disease free, 3 months±6 days old female Black Bengal goats were randomly selected at the farmer's field. Eye images were captured from the left eye of an individual goat at 3, 6, 9, and 12 months of age using a specialized camera made for human iris scanning. iGoat software was used for matching the same individual goats at 3, 6, 9, and 12 months of ages. Resnet152V2 deep learning algorithm was further applied on same image sets to predict matching percentages using only captured eye images without extracting their iris features. Results: The matching threshold computed within and between goats was 55%. The accuracies of template matching of goats at 3, 6, 9, and 12 months of ages were recorded as 81.63%, 90.24%, 44.44%, and 16.66%, respectively. As the accuracies of matching the goats at 9 and 12 months of ages were low and below the minimum threshold matching percentage, this process of iris pattern matching was not acceptable. The validation accuracies of resnet152V2 deep learning model were found 82.49%, 92.68%, 77.17%, and 87.76% for identification of goat at 3, 6, 9, and 12 months of ages, respectively after training the model. Conclusion: This study strongly supported that deep learning method using eye images could be used as a signature for biometric identification of an individual goat.

A Verification Method for Handwritten text in Off-line Environment Using Dynamic Programming (동적 프로그래밍을 이용한 오프라인 환경의 문서에 대한 필적 분석 방법)

  • Kim, Se-Hoon;Kim, Gye-Young;Choi, Hyung-Il
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.12
    • /
    • pp.1009-1015
    • /
    • 2009
  • Handwriting verification is a technique of distinguishing the same person's handwriting specimen from imitations with any two or more texts using one's handwriting individuality. This paper suggests an effective verification method for the handwritten signature or text on the off-line environment using pattern recognition technology. The core processes of the method which has been researched in this paper are extraction of letter area, extraction of features employing structural characteristics of handwritten text, feature analysis employing DTW(Dynamic Time Warping) algorithm and PCA(Principal Component Analysis). The experimental results show a superior performance of the suggested method.

A Feature-Based Malicious Executable Detection Approach Using Transfer Learning

  • Zhang, Yue;Yang, Hyun-Ho;Gao, Ning
    • Journal of Internet Computing and Services
    • /
    • v.21 no.5
    • /
    • pp.57-65
    • /
    • 2020
  • At present, the existing virus recognition systems usually use signature approach to detect malicious executable files, but these methods often fail to detect new and invisible malware. At the same time, some methods try to use more general features to detect malware, and achieve some success. Moreover, machine learning-based approaches are applied to detect malware, which depend on features extracted from malicious codes. However, the different distribution of features oftraining and testing datasets also impacts the effectiveness of the detection models. And the generation oflabeled datasets need to spend a significant amount time, which degrades the performance of the learning method. In this paper, we use transfer learning to detect new and previously unseen malware. We first extract the features of Portable Executable (PE) files, then combine transfer learning training model with KNN approachto detect the new and unseen malware. We also evaluate the detection performance of a classifier in terms of precision, recall, F1, and so on. The experimental results demonstrate that proposed method with high detection rates andcan be anticipated to carry out as well in the real-world environment.

Deep learning based mobile dynamic signature recognition for skilled forgery division (숙련된 위조서명 구분이 가능한 딥러닝 기반의 모바일 동적 서명 인식)

  • Nam, Seung-Soo;Choi, Dae-Seon;Seo, Chang-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.186-188
    • /
    • 2016
  • 본 논문에서는 모바일 환경에서 동적서명인식에 관해 원본서명과 숙련된 위조서명의 구분을 검증하는 방법을 제안한다. 속도/거리 정보 실험(Data1)과 속도/거리정보와 가속도계를 추가 실험(Data2)을 원본 서명과 위조서명에 대한 테이블을 만들고, 비교하여 원본 서명의 인식률 확인한다. 제시한 방법은 각각 모바일 환경에서 10명이 20 번삑 손가락으로 테스트 하였다. 원본서명에서 딥 러닝중의 하나인 MLP를 실험한 결과 원본 서명에서 Data1은 92%, Data2는 95%의 정확도를 보였으며, 위조서명에서 Data1은 82%, Data2는 85%를 보였다. 그리고 AE에서 실험한 결과 Data1은 원본 서명에서 Data1은 95%, Data2는 97%의 정확도를 보였으며, 위조서명에서 Data1은 91.5%, Data2는 93%의 정확도가 보였다. 실험결과 위조서명에 대해서는 MLP로 위조서명을 분류하는 것보다 OAE에서 분류하는 것이 더 좋은 정확도를 보여준다.

Experimental Study of Drone Detection and Classification through FMCW ISAR and CW Micro-Doppler Analysis (고해상도 FMCW 레이더 영상 합성과 CW 신호 분석 실험을 통한 드론의 탐지 및 식별 연구)

  • Song, Kyoungmin;Moon, Minjung;Lee, Wookyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.2
    • /
    • pp.147-157
    • /
    • 2018
  • There are increasing demands to provide early warning against intruding drones and cope with potential threats. Commercial anti-drone systems are mostly based on simple target detection by radar reflections. In real scenario, however, it becomes essential to obtain drone radar signatures so that hostile targets are recognized in advance. We present experimental test results that micro-Doppler radar signature delivers partial information on multi-rotor platforms and exhibits limited performance in drone recognition and classification. Afterward, we attempt to generate high resolution profile of flying drone targets. To this purpose, wide bands radar signals are employed to carry out inverse synthetic aperture radar(ISAR) imaging against moving drones. Following theoretical analysis, experimental field tests are carried out to acquire real target signals. Our preliminary tests demonstrate that high resolution ISAR imaging provides effective measures to detect and classify multiple drone targets in air.

Modeling and Analysis of Radar Target Signatures in the VHF-Band Using Fast Chirplet Decomposition (고속 Chirplet 분리기법을 이용한 VHF 대역 레이더 표적신호 모델링 및 해석)

  • Park, Ji-hoon;Kim, Si-ho;Chae, Dae-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.4
    • /
    • pp.475-483
    • /
    • 2019
  • Although radar target signatures(RTS), such as range profiles have played an important role for target recognition in the X-band radar, they would be less effective when a target is designed to have low radar cross section(RCS). Recently, a number of research groups have conducted the studies on the RTS in the VHF-band where such targets can be better detected than in the X-band. However, there is a lack of work carried out on the mathematical description of the VHF-band RTS. In this paper, chirplet decomposition is employed for modeling of the VHF-band RTS and its performance is compared with that of existing scattering center model generally used for the X-band. In addition, the discriminative signal analysis is performed by chirplet parameterization of range profiles from in an ISAR image. Because the chirplet decomposition takes long computation time, its fast form is further proposed for enhanced practicality.

CD72 is a Negative Regulator of B Cell Responses to Nuclear Lupus Self-antigens and Development of Systemic Lupus Erythematosus

  • Takeshi Tsubata
    • IMMUNE NETWORK
    • /
    • v.19 no.1
    • /
    • pp.1.1-1.13
    • /
    • 2019
  • Systemic lupus erythematosus (SLE) is the prototypic systemic autoimmune disease characterized by production of autoantibodies to various nuclear antigens and overexpression of genes regulated by IFN-I called IFN signature. Genetic studies on SLE patients and mutational analyses of mouse models demonstrate crucial roles of nucleic acid (NA) sensors in development of SLE. Although NA sensors are involved in induction of antimicrobial immune responses by recognizing microbial NAs, recognition of self NAs by NA sensors induces production of autoantibodies to NAs in B cells and production of IFN-I in plasmacytoid dendritic cells. Among various NA sensors, the endosomal RNA sensor TLR7 plays an essential role in development of SLE at least in mouse models. CD72 is an inhibitory B cell co-receptor containing an immunoreceptor tyrosine-based inhibition motif (ITIM) in the cytoplasmic region and a C-type lectin like-domain (CTLD) in the extracellular region. CD72 is known to regulate development of SLE because CD72 polymorphisms associate with SLE in both human and mice and CD72-/- mice develop relatively severe lupus-like disease. CD72 specifically recognizes the RNA-containing endogenous TLR7 ligand Sm/RNP by its extracellular CTLD, and inhibits B cell responses to Sm/RNP by ITIM-mediated signal inhibition. These findings indicate that CD72 inhibits development of SLE by suppressing TLR7-dependent B cell response to self NAs. CD72 is thus involved in discrimination of self-NAs from microbial NAs by specifically suppressing autoimmune responses to self-NAs.

Effect of Evasive Maneuver Against Air to Air Infrared Missile on Survivability of Aircraft (공대공 적외선 위협에 대한 회피기동이 항공기 생존성에 미치는 영향)

  • Bae, Ji-Yeul;Bae, Hyung Mo;Kim, Jihyuk;Jung, Dae Yoon;Cho, Hyung Hee
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.30 no.6
    • /
    • pp.501-506
    • /
    • 2017
  • An infrared seeking missile does not emit any signal by itself as it is guided by passive heat signature from an aircraft. Therefore, it is difficult for the target aircraft to notice the existence of incoming missile, making it a serious threat. The usage of MAW(missile approach warning) that can notify the approaching infrared seeking missile is currently limited due to its high cost. Furthermore, effectiveness of MAW against infrared seeking missile is not available in open literature. Therefore, effect of evasive maneuver by MAW on the survivability of the aircraft is simulated to evaluate the benefit of the MAW in this research. The lethal range is used as a measure of aircraft survivability. An aircraft flying at an altitude of 5km with Mach 0.9 being tracked by air-launched AIM-9 infrared seeking missile is considered in this research. As a variable for the evasive maneuver, the MAW recognition distance of 5~7km and the G-force of 3~7G that limits maximum directional change of the aircraft are considered. Simulation results showed that the recognition of incoming missile by MAW and following evasive maneuver can reduce the lethal range considerably. Maximum reduction in lethal range is found to be 29.4%. Also, the MAW recognition distance have a greater importance than the aircraft maneuverability that is limited by structural limit of the aircraft.