首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
This work focusses on exploitation of the notion of writer dependent parameters for online signature verification. Writer dependent parameters namely features, decision threshold and feature dimension have been well exploited for effective verification. For each writer, a subset of the original set of features are selected using different filter based feature selection criteria. This is in contrast to writer independent approaches which work on a common set of features for all writers. Once features for each writer are selected, they are represented in the form of an interval valued symbolic feature vector. Number of features and the decision threshold to be used for each writer during verification are decided based on the equal error rate (EER) estimated with only the signatures considered for training the system. To demonstrate the effectiveness of the proposed approach, extensive experiments are conducted on both MCYT (DB1) and MCYT (DB2) benchmarking online signature datasets consisting of signatures of 100 and 330 individuals respectively using the available 100 global parametric features.  相似文献   

3.
The aim of writer identification is determining the writer of a piece of handwriting from a set of writers. In this paper, we present an architecture for writer identification in old handwritten music scores. Even though an important amount of music compositions contain handwritten text, the aim of our work is to use only music notation to determine the author. The main contribution is therefore the use of features extracted from graphical alphabets. Our proposal consists in combining the identification results of two different approaches, based on line and textural features. The steps of the ensemble architecture are the following. First of all, the music sheet is preprocessed for removing the staff lines. Then, music lines and texture images are generated for computing line features and textural features. Finally, the classification results are combined for identifying the writer. The proposed method has been tested on a database of old music scores from the seventeenth to nineteenth centuries, achieving a recognition rate of about 92% with 20 writers.  相似文献   

4.
We describe how oriented Basic Image Feature Columns (oBIF Columns) can be used for writer identification and how this texture-based scheme can be enhanced by encoding a writer's style as the deviation from the mean encoding for a population of writers. We hypothesise that this deviation, the Delta encoding, provides a more informative encoding than the texture-based encoding alone. The methods have been evaluated using the IAM dataset and by making entries to two top international competitions for assessing the state-of-the-art in writer identification. We demonstrate that the oBIF Column scheme on its own is sufficient to gain a performance level of 99% when tested using 300 writers from the IAM dataset. However, on the more challenging competition datasets, significantly improved performance was obtained using the Delta encoding scheme, which achieved first place in both competitions. In our characterisation of the Delta encoding, we demonstrate that the method is making use of information contained in the correlation between the written style of different textual elements, which may not be used by other methods.  相似文献   

5.
纹理相似度计算是大数据分析和数据挖掘的基本手段之一。为现有纹理特征对彩色图像鉴别能力不强的问题,提出了一种改进LBP特征的纹理相似度计算方法。该方法提出了极值模式、求和模式和编码模式三种特征融合模式,对彩色图像的H、S和V三个通道上获取的LBP特征进行融合,得到彩色图像的纹理描述特征。融合操作在邻域像素点LBP计算、中心像素点LBP计算、直方图特征提取三个阶段进行,提高特征鉴别能力。在VisTex纹理数据库上进行纹理相似度计算实验,结果表明该方法的错误接受率、错误拒绝率和等错误率明显低于文献[7,8,9]所述方法。  相似文献   

6.
In this paper, we propose a new method of representing on-line signatures by interval valued symbolic features. Global features of on-line signatures are used to form an interval valued feature vectors. Methods for signature verification and recognition based on the symbolic representation are also proposed. We exploit the notions of writer dependent threshold and introduce the concept of feature dependent threshold to achieve a significant reduction in equal error rate. Several experiments are conducted to demonstrate the ability of the proposed scheme in discriminating the genuine signatures from the forgeries. We investigate the feasibility of the proposed representation scheme for signature verification and also signature recognition using all 16500 signatures from 330 individuals of the MCYT bimodal biometric database. Further, extensive experimentations are conducted to evaluate the performance of the proposed methods by projecting features onto Eigenspace and Fisherspace. Unlike other existing signature verification methods, the proposed method is simple and efficient. The results of the experimentations reveal that the proposed scheme outperforms several other existing verification methods including the state-of-the-art method for signature verification.  相似文献   

7.
In this work we address two important issues of off-line signature verification. The first one regards feature extraction. We introduce a new graphometric feature set that considers the curvature of the most important segments, perceptually speaking, of the signature. The idea is to simulate the shape of the signature by using Bezier curves and then extract features from these curves. The second important aspect is the use of an ensemble of classifiers based on graphometric features to improve the reliability of the classification, hence reducing the false acceptance. The ensemble was built using a standard genetic algorithm and different fitness functions were assessed to drive the search. Two different scenarios were considered in our experiments. In the former, we assume that only genuine signatures and random forgeries are available to guide the search. In the latter, on the other hand, we assume that simple and simulated forgeries also are available during the optimization of the ensemble. The pool of base classifiers is trained using only genuine signatures and random forgeries. Thorough experiments were conduct on a database composed of 100 writers and the results compare favorably.  相似文献   

8.
9.
Research on biometrics for high security applications has not attracted as much attention as civilian or forensic applications. Limited research and deficient analysis so far has led to a lack of general solutions and leaves this as a challenging issue. This work provides a systematic analysis and identification of the problems to be solved in order to meet the performance requirements for high security applications, a double low problem. A hybrid ensemble framework is proposed to solve this problem. Setting an adequately high threshold for each matcher can guarantee a zero false acceptance rate (FAR) and then use the hybrid ensemble framework makes the false reject rate (FRR) as low as possible. Three experiments are performed to verify the effectiveness and generalization of the framework. First, two fingerprint verification algorithms are fused. In this test only 10.55% of fingerprints are falsely rejected with zero false acceptance rate, this is significantly lower than other state of the art methods. Second, in face verification, the framework also results in a large reduction in incorrect classification. Finally, assessing the performance of the framework on a combination of face and gait verification using a heterogeneous database show this framework can achieve both 0% false rejection and 0% false acceptance simultaneously.  相似文献   

10.

The traditional watermarking algorithms prove the rightful ownership via embedding of independent watermarks like copyright logos, random noise sequences, text etc into the cover images. Coupling biometrics with watermarking evolved as new and secure approach as it embeds user specific biometric traits and thus, narrows down the vulnerability to impostor attacks. A multimodal biometric watermarking system has been proposed in this paper in the redundant discrete wavelet transform(RDWT). Two biometric traits of the user i.e. the iris and facial features are embedded independently into the sub-bands of the RDWT of cover image taking advantage of its translation invariant property and sufficient embedding capacity. The ownership verification accuracy of the proposed system is tested based on the individual biometric traits as well as the fused trait. The accuracy was enhanced while using the fused score for evaluation. The security of the scheme is strengthened with usage of non-linear chaotic maps, randomization via Hessenberg decomposition, Arnold scrambling and multiple secret keys. The robustness of the scheme has been tested against various attacks and the verification accuracy evaluated based on false acceptance rate, false rejection rate, area under curve and equal error rate to validate the efficacy of the proposed scheme.

  相似文献   

11.
: This paper presents a new three-stage verification system which is based on three types of features: global features; local features of the corner points; and function features that contain information of each point of the signatures. The first verification stage implements a parameter-based method, in which the Mahalanobis distance is used as a dissimilarity measure between the signatures. The second verification stage involves corner extraction and corner matching. It also performs signature segmentation. The third verification stage implements a function-based method, which is based on an elastic matching algorithm establishing a point-to-point correspondence between the compared signatures. By combining the three different types of verification, a high security level can be reached. According to our experiments, the rates of false rejection and false acceptance are, respectively, 5.8% and 0%. Received: 12 Febuary 2001, Received in revised form: 24 May 2001, Accepted: 03 July 2001  相似文献   

12.
13.
基于结构极坐标变换的指纹识别   总被引:5,自引:2,他引:3  
文章针对指纹识别系统存在的问题提出了一种利用指纹的结构特征和指纹线特征相结合确定参照点(极坐标原点)的方法,克服了传统自动指纹鉴别中寻找指纹中心点不够精确和耗时过多的缺点,同时利用极坐标变换将指纹特征矢量化,很好地解决了指纹图像本身非线性时变等因素对指纹识别的影响,算法具有相当高的识别率和较强的鲁棒性。  相似文献   

14.
Biometric computing offers an effective approach to identify personal identity by using individual's unique, reliable and stable physical or behavioral characteristics. This paper describes a new method to authenticate individuals based on palmprint identification and verification. Firstly, a comparative study of palmprint feature extraction is presented. The concepts of texture feature and interesting points are introduced to define palmprint features. A texture-based dynamic selection scheme is proposed to facilitate the fast search for the best matching of the sample in the database in a hierarchical fashion. The global texture energy, which is characterized with high convergence of inner-palm similarities and good dispersion of inter-palm discrimination, is used to guide the dynamic selection of a small set of similar candidates from the database at coarse level for further processing. An interesting point based image matching is performed on the selected similar patterns at fine level for the final confirmation. The experimental results demonstrate the effectiveness and accuracy of the proposed method.  相似文献   

15.
Reliable online human signature verification systems   总被引:3,自引:0,他引:3  
Online dynamic signature verification systems were designed and tested. A database of more than 10,000 signatures in (x(t), y(t))-form was acquired using a graphics tablet. We extracted a 42-parameter feature set at first, and advanced to a set of 49 normalized features that tolerate inconsistencies in genuine signatures while retaining the power to discriminate against forgeries. We studied algorithms for selecting and perhaps orthogonalizing features in accordance with the availability of training data and the level of system complexity. For decision making we studied several classifiers types. A modified version of our majority classifier yielded 2.5% equal error rate and, more importantly, an asymptotic performance of 7% false acceptance rate at zero false rejection rate, was robust to the speed of genuine signatures, and used only 15 parameter features  相似文献   

16.
Face recognition technology is of great significance for applications involving national security and crime prevention. Despite enormous progress in this field, machine-based system is still far from the goal of matching the versatility and reliability of human face recognition. In this paper, we show that a simple system designed by emulating biological strategies of human visual system can largely surpass the state-of-the-art performance on uncontrolled face recognition. In particular, the proposed system integrates dual retinal texture and color features for face representation, an incremental robust discriminant model for high level face coding, and a hierarchical cue-fusion method for similarity qualification. We demonstrate the strength of the system on the large-scale face verification task following the evaluation protocol of the Face Recognition Grand Challenge (FRGC) version 2 Experiment 4. The results are surprisingly well: Its modules significantly outperform their state-of-the-art counterparts, such as Gabor image representation, local binary patterns, and enhanced Fisher linear discriminant model. Furthermore, applying the integrated system to the FRGC version 2 Experiment 4, the verification rate at the false acceptance rate of 0.1 percent reaches to 93.12 percent.  相似文献   

17.
Using right equipment and well trained personnel, ultrasound of the neck can detect a large number of non-palpable thyroid nodules. However, this technique often suffers from subjective interpretations and poor accuracy in the differential diagnosis of malignant and benign thyroid lesions. Therefore, we developed an automated identification system based on knowledge representation techniques for characterizing the intra-nodular vascularization of thyroid lesions. Twenty nodules (10 benign and 10 malignant), taken from 3-D high resolution ultrasound (HRUS) images were used for this work. Malignancy was confirmed using fine needle aspiration biopsy and subsequent histological studies. A combination of discrete wavelet transformation (DWT) and texture algorithms were used to extract relevant features from the thyroid images. These features were fed to different configurations of AdaBoost classifier. The performance of these configurations was compared using receiver operating characteristic (ROC) curves. Our results show that the combination of texture features and DWT features presented an accuracy value higher than that reported in the literature. Among the different classifier setups, the perceptron based AdaBoost yielded very good result and the area under the ROC curve was 1 and classification accuracy, sensitivity and specificity were 100%. Finally, we have composed an Integrated Index called thyroid malignancy index (TMI) made up of these DWT and texture features, to facilitate distinguishing and diagnosing benign or malignant nodules using just one index or number. This index would help the clinicians in more quantitative assessment of the thyroid nodules.  相似文献   

18.
通过对在线签名认证算法的比较分析,提出了一种新的算法来实现在线签名认证。该算法通过计算图像上点坐标(x, y)的导数值为零得到极值点,把极值用来作为分段边界,得到一组基于所定义极值特征的规则。阐述了提取签名中的区域性特征。实验表明,该算法的错误拒绝率和错误接受率都明显下降。  相似文献   

19.
A scheme is proposed for classifier combination at decision level which stresses the importance of classifier selection during combination. The proposed scheme is optimal (in the Neyman-Pearson sense) when sufficient data are available to obtain reasonable estimates of the join densities of classifier outputs. Four different fingerprint matching algorithms are combined using the proposed scheme to improve the accuracy of a fingerprint verification system. Experiments conducted on a large fingerprint database (∼2700 fingerprints) confirm the effectiveness of the proposed integration scheme. An overall matching performance increase of ∼3% is achieved. We further show that a combination of multiple impressions or multiple fingers improves the verification performance by more than 4% and 5%, respectively. Analysis of the results provide some insight into the various decision-level classifier combination strategies.  相似文献   

20.
A method for the automatic verification of online handwritten signatures using both global and local features is described. The global and local features capture various aspects of signature shape and dynamics of signature production. We demonstrate that adding a local feature based on the signature likelihood obtained from Hidden Markov Models (HMM), to the global features of a signature, significantly improves the performance of verification. The current version of the program has 2.5% equal error rate. At the 1% false rejection (FR) point, the addition of the local information to the algorithm with only global features reduced the false acceptance (FA) rate from 13% to 5%. Received June 27, 1997/ Revised October 31, 1997  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号