Você está na página 1de 60

A PROJECT REPORT ON Wavelet Based Palmprint Authentication System

Abstract: Palmprint based personal verification has quickly entered the biometric family due to its ease of acquisition, high user acceptance and reliability. This paper proposes a palm print based identification system using the textural information, employing different wavelet transforms. The transforms employed have been analyzed for their individual as well as combined performances at feature level. The wavelets used for the analysis are Biorthogonal, Symlet and Discrete Meyer. The analysis of these wavelets is carried out on 500 images, acquired through indigenously made image acquisition sys-tem.

Acknowledgement
2

We are very grateful to our head of the Department of Electronics and communication Engineering, Mr. -------, ------------ College of Engineering & Technology for having provided the opportunity for taking up this project.

We would like to express our sincere gratitude and thanks to Mr. ---------Department of Computer Science & Engineering, -------College of Engineering & Technology for having allowed doing this project.

Special thanks to Krest Technologies, for permitting us to do this project work in their esteemed organization, and also for guiding us through the entire project We also extend our sincere thanks to our parents and friends for their moral support throughout the project work. Above all we thank god almighty for his manifold mercies in carrying out the project successfully

INTRODUCTION:
3

Biometrics based personal identification is getting wide acceptance in the networked society, replacing passwords and keys due to its reliability, uniqueness and the ever in-creasing demand of security. Common modalities being used are fingerprint and face but for face authentication people are still working with the problem of pose and illumination invariance where as fingerprint does not have a good psychological effect on the user because of its wide use in crime investigations. If any biometric modality is to succeed in the future it should have the traits like uniqueness, accuracy, richness, ease of acquisition, reliability and above all user acceptance. Palm print based personal identification is a new biometric modality which is getting wide acceptance and has all the necessary traits to make it a part of our daily life. This project investigates the use of palm print for personal identification using combination of different wavelets. Palm print not only has the unique information available as on the fingerprint but has far more amount of details in terms of principal lines, wrinkles and creases. Moreover it can easily be combined with hand shape bio-metric so as to form a highly accurate and reliable biometric based personal identification system. Palm print based personal verification has become an increasingly active research topic over the years. The Palm-print is rich in information and has been analyzed for discriminating features like where wavelet transform has been used for feature extraction has motivated us to investigate the effectiveness of using combination of multiple wavelets for the textural analysis of palm print. Personal identification is ubiquitous in our daily lives. For example, we often have to prove our identity for getting access to bank account, entering a protected site, drawing cash from an ATM, logging in to a computer, and so on. Conventionally, we identify ourselves and gain access by physically carrying passports, keys, access cards or by remembering passwords, secret codes, and personal identification numbers (PINs). Unfortunately, passport, keys, access cards can be lost, duplicated, stolen, or forgotten; and password, secret codes, and personal identification numbers (PINs) can easily be forgotten,

Compromised, shared, or observed. Such loopholes or deficiencies of conventional personal identification techniques have caused major problems to all concerned. For example, hackers often disrupt computer networks, credit card fraud is estimated at billions dollars per year worldwide. The cost of forgotten passwords is high and accounts for 40%-80% of all the IT help desk calls and resetting the forgotten or compromised passwords costs as much as US$ 340/user/year. Therefore, robust, reliable, and foolproof personal identification solutions must be sought in order to address the deficiencies of conventional techniques, something that could verify that some one is physically the person he/she claims to be. A biometric is a unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity. By using a biometric identification, the individual verification can be done by doing the statistical analysis of biological characteristic. This measurable characteristic can be physical, e.g. eye, face, finger image and hand, or behavioral, e.g. signature and typing rhythm. Besides bolstering security, biometric systems also enhance user convenience by alleviating the need to design and remember multiple complex passwords. No wonder large scale systems have been deployed in such diverse applications as US-VISIT and entry to Disney Park, Orlando. In spite of the fact that automatic biometric recognition systems based on fingerprints (called AFIS) have been used by law enforcement agencies worldwide for over 40 years, biometric recognition continues to remain a very difficult pattern recognition problem. A biometric system has to contend with problems related to noisy images (failure to enroll), lack of distinctiveness (finite error rate), large intra-class variations (false reject), and spoof attacks (system security). Therefore, a proper system design is needed to verify a person quickly and automatically. In this project, a multibiometric system is proposed for human verification i.e. authenticating the identity of an individual. The proposed multibiometric system uses both hand

and finger stripe geometry for verification process. Artificial Neural Network (ANN) is applied for feature learning and verification.

DEVELOPMENT OF IMAGE ACQUISITION PLAT-FORM:


There are two types of systems available for capturing the palmprint of individuals i.e., scanners and the pegged systems. Scanners are hygienically not safe whereas the pegged systems cause considerable inconvenience to the user. Hence both of these systems suffer from low user acceptability. The attributes of ease of acquisition and hygienic safety are of paramount importance for any biometric modality. The proposed image acquisition setup satisfies the mentioned criteria by proposing a contactless, peg free system, Figure 2. It is an enclosed black box, simple in architecture and employs ring source light for uniform illumination. Two plates are kept inside the image acquisition setup. The upper plate holds the camera and the light source while the bottom plate is used to place individuals hand. The distance between these two plates is kept constant to avoid any mismatch due to scale invariance. The distance between the two plates after empirical testing is kept at 14 inches. The Palmprint images have been collected from 50 individuals with 10 images each making a total dataset of 500 images. The dataset contains all images of males with age distribution between 22 to 56 years, with a high percentage between 22 to 25 years. A low resolution of 72 dpi has been used employing SONY DSC W-35 CY-BER SHOT for Palmprint images acquisition.

IMAGE REGISTRATION
Our image registration approach follows the technique proposed and is summarized as follows: The acquired color (RGB) parameters of Palmprint are changed to HSI parameters. The hue value of skin is same so it was safely neglected along with the less discriminating saturation value. The Palmprint has been analyzed for its texture using the gray level or intensity values, I among the HSI values. Gray level images retain all the useful discriminating information required for personal identification, along with considerable reduction in processing time. The color images using following are changed to gray level imthe equation:

I= (0.2989 R) + (0.5870 G) + (

B)

(1)

The gray level images are normalized and thresholded to get a binary image. Hysteresis thresholding has been adopted due to its effectiveness in varying illumination conditions and undesirable background noise.

Although the user training ensures optimal and standard acquisition of palmprint, a rotational alignment is incorporated in our proposed approach to cater inadvertent rotations. The longest line in a palm passes through the middle finger, and any rotation is considered with reference to this line. The second order moment helps analyzing the elongation or eccentricity of any binary shape. By finding the Ei-gen values and eigenvectors, we can determine the eccentricity of the shape by analyzing the ratio of the Eigen values. We can determine the direction of elongation by using the direction of the eigenvector with corresponding highest Eigen value. The parameters of the best fitting ellipse have been extracted using second order statistical moments on the binarized palm print corresponding to the longest line. Consequently, the offset (theta) between the normal axis and the longest line passing through the middle finger is calculated. The theta is calculated using the following equation

Where a, b and c are the second order normalized moments of the pixels and are calculated using the following equations:

Palmprint is adversely affected by the variations in illumination. The problem has been addressed by computing normalized energy of the decomposition blocks so as to minimize feature variance due to non-uniform illumination. The energy computed from each block for the three wavelet types is concatenated to form a feature vector of length 27 for an individual Palmprint. The normalized energy of the ROI image block B associated with subband is defined as

Where the normalize energy is given as

Where n equals the total number of blocks present in the image Matching is performed by calculating the Euclidean Distance between the input feature vector and template feature vector. Euclidean distance between two vectors is calculated by squaring the difference between corresponding elements. For p(x, y) and q(s, t) the Euclidean distance between p and q is defined as:

A detailed analysis of results revealed that rotation of the palmprint caused considerable blur in the vertical aligned images due to interpolation.

FEATURE EXTRACTION AND CLASSIFICATION


We obtained ten images of each individual of which five were used for training and the rest of them were used for validation. The obtained registered palm print image has been analysed for its texture using different symmetrical wavelet families namely biorthogonal 3.9, symmelt 8 and demeyer 5. The palm print region 256x256 has been decom-posed into three scales for each wavelet type.

An intelligent solution to this problem is devised by rotating the axis of region instead of the palm

A reverse transformation is computed from the affine transform, as follows:

Using the above equations, a rotation invariant region of interest is cropped from the palm print. The approximation or interpolation error still exists but the results show im-proved performance and accuracy. The selected wavelets have been analyzed for their individual performance by formulating similar energy based feature vectors of length 27, using 9 levels decomposition.

NORMALIZED ENERGY:
We denote the additional energy for performing certain computation-intensive jobs in each system as the energy unit (EU). The computation-intensive job we chose was the jpeg fdct islow routine in file jfdctint.c from Independent JPEG Group's implementation of JPEG, which comes with the Mibench benchmarks. It performs a forward discrete cosine transform (DCT) on an eight-by-eight block of integers. Three different sets of inputs are randomly chosen from the large image file included in Mibench. The job is memory-intensive as well since input data are read from memory each time before a DCT is performed. To obtain the additional energy for

10

performing one such DCT, we repeat the DCT a total of

times over the set of chosen

input data. This is assumed to be the target, which takes our systems about four seconds to complete. The context in this case simply involves making the system idle. The energy of every benchmark is measured with a companion measurement of the EU. In most cases, we report experimental results normalized to the EU thus obtained. This accounts for differences in the hardware and OS. The EU for the three systems we studied is between and Joules. The

benefits of using the EU are as follows. Experiments were conducted on different days for different benchmarks. The absolute energy figure for an event varied slightly from day to day. However, the energy remained quite constant if normalized to the corresponding EU (within 1%). Moreover, since the EU is only dependent on the SOC and memory, the comparison of non-LCD energy consumption of different systems is fairer after normalization.

CONCEPT OF PALM JUST LIKE FINGER:

Palm identification, just like fingerprint identification, is based on the aggregate of information presented in a friction ridge impression. This information includes the flow of the friction ridges, the presence or absence of features along the individual friction ridge paths and their sequences, and the intricate detail of a single ridge. To understand this recognition concept, one must first understand the physiology of the ridges and valleys of a fingerprint or palm. When recorded, a fingerprint or palm print appears as a series of dark lines and represents the high, peaking portion of the friction ridged skin while the valley between these ridges appears as a white space and is the low, shallow portion of the friction ridged skin. This is shown in Figure.

11

Figure: Fingerprint Ridges (Dark Lines) vs. Fingerprint Valleys (White Lines).

Palm recognition technology exploits some of these palm features. Friction ridges do not always flow continuously throughout a pattern and often result in specific characteristics such as ending ridges or dividing ridges and dots. A palm recognition system is designed to interpret the flow of the overall ridges to assign a classification and then extract the minutiae detail a subset of the total amount of information available, yet enough information to effectively search a large repository of palm prints. Minutiae are limited to the location, direction, and orientation of the ridge endings and bifurcations (splits) along a ridge path. The images in Figure 2 present a pictorial representation of the regions of the palm, two types of minutiae, and examples of other detailed characteristics used during the automatic classification and minutiae extraction processes.

Palm showing two types of minuates and characteristics

TEXTURE ANALYSIS:
In many machine vision and image processing algorithms, simplifying assumptions are made about the uniformity of intensities in local image regions. However, images of real objects often do not exhibit regions of uniform intensities. For example, the image of a wooden surface is not uniform but contains variations of intensities which form certain repeated patterns called visual texture. The patterns can be the result of physical surface properties such as roughness or oriented strands which often have a tactile quality, or they could be the result of reflectance
12

differences such as the color on a surface. We recognize texture when we see it but it is very difficult to define. This difficulty is demonstrated by the number of different texture definitions attempted by vision researchers. Coggins has compiled a catalogue of texture definitions in the computer vision literature and we give some examples here. We may regard texture as what constitutes a macroscopic region. Its structure is simply attributed to the repetitive patterns in which elements or primitives are arranged according to a placement rule. A region in an image has a constant texture if a set of local statistics or other local properties of the picture function are constant, slowly varying, or approximately periodic. The image texture we consider is nonfigurative and cellular... An image texture is described by the number and types of its (tonal) primitives and the spatial organization or layout of its (tonal) primitives... A fundamental characteristic of texture: it cannot be analyzed without a frame of reference of tonal primitive being stated or implied. For any smooth gray-tone surface, there exists a scale such that when the surface is examined, it has no texture. Then as resolution increases, it takes on a fine texture and then a coarse texture. Texture is defined for our purposes as an attribute of a field having no components that appear enumerable. The phase relations between the components are thus not apparent. Nor should the field contain an obvious gradient. The intent of this definition is to direct attention of the observer to the global properties of the display i.e., its overall coarseness, bumpiness, or fineness. Physically, none numerable (a periodic) patterns are generated by stochastic as opposed to deterministic processes. Perceptually, however, the set of all patterns without obvious enumerable components will include many deterministic (and even periodic) textures. Texture is an apparently paradoxical notion. On the one hand, it is commonly used in the early processing of visual information, especially for practical classification purposes. On the other hand, no one has succeeded in producing a commonly accepted definition of texture. The resolution of this paradox, we feel, will depend on a richer, more developed model for early
13

visual information processing, a central aspect of which will be representational systems at many different levels of abstraction. These levels will most probably include actual intensities at the bottom and will progress through edge and orientation descriptors to surface, and perhaps volumetric descriptors. Given these multi-level structures, it seems clear that they should be included in the definition of, and in the computation of, texture descriptors. This collection of definitions demonstrates that the definition of texture is formulated by different people depending upon the particular application and that there is no generally agreed upon definition. Some are perceptually motivated, and others are driven completely by the application in which the definition will be used. Image texture, defined as a function of the spatial variation in pixel intensities (gray values), is useful in a variety of applications and has been a subject of intense study by many researchers. One immediate application of image texture is the recognition of image regions using texture properties. Texture is the most important visual cue in identifying these types of homogeneous regions. This is called texture classification. The goal of texture classification then is to produce a classification map of the input image where each uniform textured region is identified with the texture class it belongs. We could also find the texture boundaries even if we could not classify these textured surfaces. This is then the second type of problem that texture analysis research attempts to solve texture segmentation. Texture synthesis is often used for image compression applications. It is also important in computer graphics where the goal is to render object surfaces which are as realistic looking as possible. The shape from texture problem is one instance of a general class of vision problems known as shape from X. This was first formally pointed out in the perception literature by Gibson. The goal is to extract threedimensional shape information from various cues such as shading, stereo, and texture. The texture features (texture elements) are distorted due to the imaging process and the perspective projection which provide information about surface orientation and shape.

14

WAVELETS
FOURIER ANALYSIS Signal analysts already have at their disposal an impressive arsenal of tools. Perhaps the most well-known of these is Fourier analysis, which breaks down a signal into constituent sinusoids of different frequencies. Another way to think of Fourier analysis is as a mathematical technique for transforming our view of the signal from time-based to frequency-based.

15

For many signals, Fourier analysis is extremely useful because the signals frequency content is of great importance. So why do we need other techniques, like wavelet analysis? Fourier analysis has a serious drawback. In transforming to the frequency domain, time information is lost. When looking at a Fourier transform of a signal, it is impossible to tell when a particular event took place. If the signal properties do not change much over time that is, if it is what is called a stationary signalthis drawback isnt very important. However, most interesting signals contain numerous non stationary or transitory characteristics: drift, trends, abrupt changes, and beginnings and ends of events. These characteristics are often the most important part of the signal, and Fourier analysis is not suited to detecting them.

SHORT-TIME FOURIER ANALYSIS: In an effort to correct this deficiency, Dennis Gabor (1946) adapted the Fourier transform to analyze only a small section of the signal at a timea technique called windowing the signal. Gabors adaptation, called the Short-Time Fourier Transform (STFT), maps a signal into a two-dimensional function of time and frequency.

16

The STFT represents a sort of compromise between the time- and frequency-based views of a signal. It provides some information about both when and at what frequencies a signal event occurs. However, you can only obtain this information with limited precision, and that precision is determined by the size of the window. While the STFT compromise between time and frequency information can be useful, the drawback is that once you choose a particular size for the time window, that window is the same for all frequencies. Many signals require a more flexible approachone where we can vary the window size to determine more accurately either time or frequency.

WAVELET ANALYSIS
Wavelet analysis represents the next logical step: a windowing technique with variablesized regions. Wavelet analysis allows the use of long time intervals where we want more precise low-frequency information, and shorter regions where we want high-frequency information.

Heres what this looks like in contrast with the time-based, frequency-based, and STFT views of a signal:

17

You may have noticed that wavelet analysis does not use a time-frequency region, but rather a time-scale region. For more information about the concept of scale and the link between scale and frequency, see How to Connect Scale to Frequency?

What Can Wavelet Analysis Do? One major advantage afforded by wavelets is the ability to perform local analysis, that is, to analyze a localized area of a larger signal. Consider a sinusoidal signal with a small discontinuity one so tiny as to be barely visible. Such a signal easily could be generated in the real world, perhaps by a power fluctuation or a noisy switch.

A plot of the Fourier coefficients (as provided by the fft command) of this signal shows nothing particularly interesting: a flat spectrum with two peaks representing a single frequency. However, a plot of wavelet coefficients clearly shows the exact location in time of the discontinuity.

18

Wavelet analysis is capable of revealing aspects of data that other signal analysis techniques miss, aspects like trends, breakdown points, discontinuities in higher derivatives, and selfsimilarity. Furthermore, because it affords a different view of data than those presented by traditional techniques, wavelet analysis can often compress or de-noise a signal without appreciable degradation. Indeed, in their brief history within the signal processing field, wavelets have already proven themselves to be an indispensable addition to the analysts collection of tools and continue to enjoy a burgeoning popularity today.

WHAT IS WAVELET ANALYSIS? Now that we know some situations when wavelet analysis is useful, it is worthwhile asking What is wavelet analysis? and even more fundamentally, What is a wavelet? A wavelet is a waveform of effectively limited duration that has an average value of zero. Compare wavelets with sine waves, which are the basis of Fourier analysis.

19

Sinusoids do not have limited duration they extend from minus to plus infinity. And where sinusoids are smooth and predictable, wavelets tend to be irregular and asymmetric.

Figure 2.7 Fourier analysis consists of breaking up a signal into sine waves of various frequencies. Similarly, wavelet analysis is the breaking up of a signal into shifted and scaled versions of the original (or mother) wavelet. Just looking at pictures of wavelets and sine waves, you can see intuitively that signals with sharp changes might be better analyzed with an irregular wavelet than with a smooth sinusoid, just as some foods are better handled with a fork than a spoon. It also makes sense that local features can be described better with wavelets that have local extent.

NUMBER OF DIMENSIONS: Thus far, weve discussed only one-dimensional data, which encompasses most ordinary signals. However, wavelet analysis can be applied to two-dimensional data (images) and, in principle, to higher dimensional data. This toolbox uses only one and two-dimensional analysis techniques. THE CONTINUOUS WAVELET TRANSFORM: Mathematically, the process of Fourier analysis is represented by the Fourier transform:

20

Which is the sum over all time of the signal f(t) multiplied by a complex exponential. (Recall that a complex exponential can be broken down into real and imaginary sinusoidal components.) The results of the transform are the Fourier coefficients F(w), which when multiplied by a sinusoid of frequency w yields the constituent sinusoidal components of the original signal. Graphically, the process looks like:

Figure 2.8 Similarly, the continuous wavelet transform (CWT) is defined as the sum over all time of signal multiplied by scaled, shifted versions of the wavelet function.

The result of the CWT is a series many wavelet coefficients C, which are a function of scale and position. Multiplying each coefficient by the appropriately scaled and shifted wavelet yields the constituent wavelets of the original signal:

21

Figure 2.9 SCALING Weve already alluded to the fact that wavelet analysis produces a time-scale view of a signal and now were talking about scaling and shifting wavelets. What exactly do we mean by scale in this context? Scaling a wavelet simply means stretching (or compressing) it. To go beyond colloquial descriptions such as stretching, we introduce the scale factor, often denoted by the letter a. If were talking about sinusoids, for example the effect of the scale factor is very easy to see:

The scale factor works exactly the same with wavelets. The smaller the scale factor, the more compressed the wavelet.
22

Figure 2.11 It is clear from the diagrams that for a sinusoid sin (wt) the scale factor a is related (inversely) to the radian frequency w. Similarly, with wavelet analysis the scale is related to the frequency of the signal. SHIFTING Shifting a wavelet simply means delaying (or hastening) its onset.

THE DISCRETE WAVELET TRANSFORM: Calculating wavelet coefficients at every possible scale is a fair amount of work, and it generates an awful lot of data. What if we choose only a subset of scales and positions at which to make our calculations? It turns out rather remarkably that if we choose scales and positions based on powers of two so-called dyadic scales and positionsthen our analysis will be much

23

more efficient and just as accurate. We obtain such an analysis from the discrete wavelet transform (DWT). An efficient way to implement this scheme using filters was developed in 1988 by Mallat. The Mallat algorithm is in fact a classical scheme known in the signal processing community as a two-channel sub band coder. This very practical filtering algorithm yields a fast wavelet transform a box into which a signal passes, and out of which wavelet coefficients quickly emerge. Lets examine this in more depth.

ONE-STAGE FILTERING: APPROXIMATIONS AND DETAILS: For many signals, the low-frequency content is the most important part. It is what gives the signal its identity. The high-frequency content on the other hand imparts flavor or nuance. Consider the human voice. If you remove the high-frequency components, the voice sounds different but you can still tell whats being said. However, if you remove enough of the lowfrequency components, you hear gibberish. In wavelet analysis, we often speak of approximations and details. The approximations are the high-scale, low-frequency components of the signal. The details are the low-scale, high-frequency components. The filtering process at its most basic level looks like this:

24

The original signal S passes through two complementary filters and emerges as two signals. Unfortunately, if we actually perform this operation on a real digital signal, we wind up with twice as much data as we started with. Suppose, for instance that the original signal S consists of 1000 samples of data. Then the resulting signals will each have 1000 samples, for a total of 2000. These signals A and D are interesting, but we get 2000 values instead of the 1000 we had. There exists a more subtle way to perform the decomposition using wavelets. By looking carefully at the computation, we may keep only one point out of two in each of the two 2000length samples to get the complete information. This is the notion of own sampling. We produce two sequences called cA and cD.

The process on the right which includes down sampling produces DWT Coefficients To gain a better appreciation of this process lets perform a one-stage discrete wavelet transform of a signal. Our signal will be a pure sinusoid with high- frequency noise added to it. Here is our schematic diagram with real signals inserted into it:

25

Notice that the detail coefficients cD is small and consist mainly of a high-frequency noise, while the approximation coefficients cA contains much less noise than does the original signal. You may observe that the actual lengths of the detail and approximation coefficient vectors are slightly more than half the length of the original signal. This has to do with the filtering process, which is implemented by convolving the signal with a filter. The convolution smears the signal, introducing several extra samples into the result.

MULTIPLE-LEVEL DECOMPOSITION: The decomposition process can be iterated, with successive approximations being decomposed in turn, so that one signal is broken down into many lower resolution components. This is called the wavelet decomposition tree.

26

Looking at a signals wavelet decomposition tree can yield valuable information.

NUMBER OF LEVELS: Since the analysis process is iterative, in theory it can be continued indefinitely. In reality, the decomposition can proceed only until the individual details consist of a single sample or pixel. In practice, youll select a suitable number of levels based on the nature of the signal, or on a suitable criterion such as entropy.

27

WAVELET RECONSTRUCTION: Weve learned how the discrete wavelet transform can be used to analyze or decompose signals and images. This process is called decomposition or analysis. The other half of the story is how those components can be assembled back into the original signal without loss of information. This process is called reconstruction, or synthesis. The mathematical manipulation that effects synthesis is called the inverse discrete wavelet transforms (IDWT). To synthesize a signal in the Wavelet Toolbox, we reconstruct it from the wavelet coefficients:

Where wavelet analysis involves filtering and down sampling, the wavelet reconstruction process consists of up sampling and filtering. Up sampling is the process of lengthening a signal component by inserting zeros between samples:

The Wavelet Toolbox includes commands like idwt and waverec that perform singlelevel or multilevel reconstruction respectively on the components of one-dimensional signals. These commands have their two-dimensional analogs, idwt2 and waverec2.
28

RECONSTRUCTION FILTERS: The filtering part of the reconstruction process also bears some discussion, because it is the choice of filters that is crucial in achieving perfect reconstruction of the original signal. The down sampling of the signal components performed during the decomposition phase introduces a distortion called aliasing. It turns out that by carefully choosing filters for the decomposition and reconstruction phases that are closely related (but not identical), we can cancel out the effects of aliasing. The low- and high pass decomposition filters (L and H), together with their associated reconstruction filters (L' and H'), form a system of what is called Quadrature mirror filters:

RECONSTRUCTING APPROXIMATIONS AND DETAILS: We have seen that it is possible to reconstruct our original signal from the coefficients of the approximations and details.

29

It is also possible to reconstruct the approximations and details themselves from their coefficient vectors. As an example, lets consider how we would reconstruct the first-level approximation A1 from the coefficient vector cA1. We pass the coefficient vector cA1 through the same process we used to reconstruct the original signal. However, instead of combining it with the level-one detail cD1, we feed in a vector of zeros in place of the detail coefficients vector:

The process yields a reconstructed approximation A1, which has the same length as the original signal S and which is a real approximation of it. Similarly, we can reconstruct the firstlevel detail D1, using the analogous process:

The reconstructed details and approximations are true constituents of the original signal. In fact, we find when we combine them that:
30

A1 + D1 = S Note that the coefficient vectors cA1 and cD1because they were produced by down sampling and are only half the length of the original signal cannot directly be combined to reproduce the signal. It is necessary to reconstruct the approximations and details before combining them. Extending this technique to the components of a multilevel analysis, we find that similar relationships hold for all the reconstructed signal constituents. That is, there are several ways to reassemble the original signal:

Relationship of Filters to Wavelet Shapes: In the section Reconstruction Filters, we spoke of the importance of choosing the right filters. In fact, the choice of filters not only determines whether perfect reconstruction is possible, it also determines the shape of the wavelet we use to perform the analysis. To construct a wavelet of some practical utility, you seldom start by drawing a waveform. Instead, it usually makes more sense to design the appropriate Quadrature mirror filters, and then use them to create the waveform. Lets see how this is done by focusing on an example. Consider the low pass reconstruction filter (L') for the db2 wavelet. Wavelet function position

31

The filter coefficients can be obtained from the dbaux command: Lprime = dbaux(2) Lprime = 0.3415 0.5915 0.1585 0.0915 If we reverse the order of this vector (see wrev), and then multiply every even sample by 1, we obtain the high pass filter H': Hprime = 0.0915 0.1585 0.5915 0.3415 Next, up sample Hprime by two (see dyadup), inserting zeros in alternate positions: HU =0.0915 0 0.1585 0 0.5915 0 0.3415 0 Finally, convolve the up sampled vector with the original low pass filter: H2 = conv(HU,Lprime); plot(H2)

If we iterate this process several more times, repeatedly up sampling and convolving the resultant vector with the four-element filter vector Lprime, a pattern begins to emerge:

32

The curve begins to look progressively more like the db2 wavelet. This means that the wavelets shape is determined entirely by the coefficients of the reconstruction filters. This relationship has profound implications. It means that you cannot choose just any shape, call it a wavelet, and perform an analysis. At least, you cant choose an arbitrary wavelet waveform if you want to be able to reconstruct the original signal accurately. You are compelled to choose a shape determined by Quadrature mirror decomposition filters.

The Scaling Function: Weve seen the interrelation of wavelets and Quadrature mirror filters. The wavelet function is determined by the high pass filter, which also produces the details of the wavelet decomposition. There is an additional function associated with some, but not all wavelets. This is the socalled scaling function. The scaling function is very similar to the wavelet function. It is determined by the low pass Quadrature mirror filters, and thus is associated with the approximations of the wavelet decomposition. In the same way that iteratively up- sampling and convolving the high pass filter produces a shape approximating the wavelet function, iteratively

33

up-sampling and convolving the low pass filter produces a shape approximating the scaling function.

Multi-step Decomposition and Reconstruction: A multi step analysis-synthesis process can be represented as:

This process involves two aspects: breaking up a signal to obtain the wavelet coefficients, and reassembling the signal from the coefficients. Weve already discussed decomposition and reconstruction at some length. Of course, there is no point breaking up a signal merely to have the satisfaction of immediately reconstructing it. We may modify the wavelet coefficients before performing the reconstruction step. We perform wavelet analysis because the coefficients thus obtained have many known uses, de-noising and compression being foremost among them. But wavelet analysis is still a new and emerging field. No doubt, many uncharted uses of the wavelet coefficients lie in wait. The Wavelet Toolbox can be a means of exploring possible uses and hitherto unknown applications of wavelet analysis. Explore the toolbox functions and see what you discover.

34

DIGITAL IMAGE PROCESSING

BACKGROUND: Digital image processing is an area characterized by the need for extensive experimental work to establish the viability of proposed solutions to a given problem. An important characteristic underlying the design of image processing systems is the significant level of testing & experimentation that normally is required before arriving at an acceptable solution. This characteristic implies that the ability to formulate approaches &quickly prototype candidate solutions generally plays a major role in reducing the cost & time required to arrive at a viable system implementation.

What is DIP

An image may be defined as a two-dimensional function f(x, y), where x & y are spatial coordinates, & the amplitude of f at any pair of coordinates (x, y) is called the intensity or gray level of the image at that point. When x, y & the amplitude values of f are all finite discrete quantities, we call the image a digital image. The field of DIP refers to processing digital image by means of digital computer. Digital image is composed of a finite number of elements, each of which has a particular location & value. The elements are called pixels. Vision is the most advanced of our sensor, so it is not surprising that image play the single most important role in human perception. However, unlike humans, who are limited to the visual band of the EM spectrum imaging machines cover almost the entire EM spectrum, ranging from gamma to radio waves. They can operate also on images generated by sources that humans are not accustomed to associating with image.

There is no general agreement among authors regarding where image processing stops & other related areas such as image analysis& computer vision start. Sometimes a distinction is made by defining image processing as a discipline in which both the input & output at a process
35

are images. This is limiting & somewhat artificial boundary. The area of image analysis (image understanding) is in between image processing & computer vision.

There are no clear-cut boundaries in the continuum from image processing at one end to complete vision at the other. However, one useful paradigm is to consider three types of computerized processes in this continuum: low-, mid-, & high-level processes. Low-level process involves primitive operations such as image processing to reduce noise, contrast enhancement & image sharpening. A low- level process is characterized by the fact that both its inputs & outputs are images. Mid-level process on images involves tasks such as segmentation, description of that object to reduce them to a form suitable for computer processing & classification of individual objects. A mid-level process is characterized by the fact that its inputs generally are images but its outputs are attributes extracted from those images. Finally higherlevel processing involves Making sense of an ensemble of recognized objects, as in image analysis & at the far end of the continuum performing the cognitive functions normally associated with human vision. Digital image processing, as already defined is used successfully in a broad range of areas of exceptional social & economic value. What is an image? An image is represented as a two dimensional function f(x, y) where x and y are spatial co-ordinates and the amplitude of f at any pair of coordinates (x, y) is called the intensity of the image at that point. Gray scale image: A grayscale image is a function I (xylem) of the two spatial coordinates of the image plane. I(x, y) is the intensity of the image at the point (x, y) on the image plane. I (xylem) takes non-negative values assume the image is bounded by a rectangle [0, a] [0, b]I: [0, a] [0, b] [0, info)
36

Color image: It can be represented by three functions, R (xylem) for red, G (xylem) for green and B (xylem) for blue. An image may be continuous with respect to the x and y coordinates and also in

amplitude. Converting such an image to digital form requires that the coordinates as well as the amplitude to be digitized. Digitizing the coordinates values is called sampling. Digitizing the amplitude values is called quantization. Coordinate convention: The result of sampling and quantization is a matrix of real numbers. We use two principal ways to represent digital images. Assume that an image f(x, y) is sampled so that the resulting image has M rows and N columns. We say that the image is of size M X N. The values of the coordinates (xylem) are discrete quantities. For notational clarity and convenience, we use integer values for these discrete coordinates. In many image processing books, the image origin is defined to be at (xylem)=(0,0).The next coordinate values along the first row of the image are (xylem)=(0,1).It is important to keep in mind that the notation (0,1) is used to signify the second sample along the first row. It does not mean that these are the actual values of physical coordinates when the image was sampled. Following figure shows the coordinate convention. Note that x ranges from 0 to M-1 and y from 0 to N-1 in integer increments. The coordinate convention used in the toolbox to denote arrays is different from the preceding paragraph in two minor ways. First, instead of using (xylem) the toolbox uses the notation (race) to indicate rows and columns. Note, however, that the order of coordinates is the same as the order discussed in the previous paragraph, in the sense that the first element of a coordinate topples, (alb), refers to a row and the second to a column. The other difference is that the origin of the coordinate system is at (r, c) = (1, 1); thus, r ranges from 1 to M and c from 1 to N in integer increments. IPT documentation refers to the coordinates. Less frequently the toolbox also employs another coordinate convention called spatial coordinates which uses x to refer to columns and y to refers to rows. This is the opposite of our use of variables x and y.

37

Image as Matrices: The preceding discussion leads to the following representation for a digitized image function: f (0,0) f (1,0) f (xylem)= . . . f(0,1) f(1,1) . . .. f(0,N-1) f(1,N-1) .

f (M-1,0) f(M-1,1) f(M-1,N-1) The right side of this equation is a digital image by definition. Each element of this array is called an image element, picture element, pixel or pel. The terms image and pixel are used throughout the rest of our discussions to denote a digital image and its elements. A digital image can be represented naturally as a MATLAB matrix: f (1,1) f(1,2) . f(1,N) f (2,1) . f= . . f(2,2) .. f (2,N) . . .

f (M,1) f(M,2) .f(M,N) Where f (1,1) = f(0,0) (note the use of a monoscope font to denote MATLAB quantities). Clearly the two representations are identical, except for the shift in origin. The notation f(p ,q) denotes the element located in row p and the column q. For example f(6,2) is the element in the sixth row and second column of the matrix f. Typically we use the letters M and N respectively to denote the number of rows and columns in a matrix. A 1xN matrix is called a row vector whereas an Mx1 matrix is called a column vector. A 1x1 matrix is a scalar.

38

Matrices in MATLAB are stored in variables with names such as A, a, RGB, real array and so on. Variables must begin with a letter and contain only letters, numerals and underscores. As noted in the previous paragraph, all MATLAB quantities are written using mono-scope characters. We use conventional Roman, italic notation such as f(x ,y), for mathematical expressions

Reading Images: Images are read into the MATLAB environment using function imread whose syntax is Imread (filename) Format name TIFF JPEG GIF BMP PNG XWD Description Tagged Image File Format Joint Photograph Experts Group Graphics Interchange Format Windows Bitmap Portable Network Graphics X Window Dump recognized extension .tif, .tiff .jpg, .jpeg .gif .bmp .png .xwd

Here filename is a spring containing the complete of the image file(including any applicable extension).For example the command line >> f = imread (8. jpg); Reads the JPEG (above table) image chestxray into image array f. Note the use of single quotes () to delimit the string filename. The semicolon at the end of a command line is used by MATLAB for suppressing output If a semicolon is not included. MATLAB displays the results of the operation(s) specified in that line. The prompt symbol (>>) designates the beginning of a command line, as it appears in the MATLAB command window.
39

Data Classes: Although we work with integers coordinates the values of pixels themselves are not restricted to be integers in MATLAB. Table above list various data classes supported by MATLAB and IPT are representing pixels values. The first eight entries in the table are refers to as numeric data classes. The ninth entry is the char class and, as shown, the last entry is referred to as logical data class. All numeric computations in MATLAB are done in double quantities, so this is also a frequent data class encounter in image processing applications. Class unit 8 also is encountered frequently, especially when reading data from storages devices, as 8 bit images are most common representations found in practice. These two data classes, classes logical, and, to a lesser degree, class unit 16 constitute the primary data classes on which we focus. Many ipt functions however support all the data classes listed in table. Data class double requires 8 bytes to represent a number uint8 and int 8 require one byte each, uint16 and int16 requires 2bytes and unit 32. Name Double Uint8 Element). Uint16 Uint 32 Int8 Int 16 Int 32 element). Single single _precision floating _point numbers with values unsigned 16_bit integers in the range [0, 65535] (2byte per element). unsigned 32_bit integers in the range [0, 4294967295](4 bytes per element). Description Double _ precision, floating_ point numbers the Approximate. unsigned 8_bit integers in the range [0,255] (1byte per

signed 8_bit integers in the range [-128,127] 1 byte per element) signed 16_byte integers in the range [32768, 32767] (2 bytes per element). Signed 32_byte integers in the range [-2147483648, 21474833647] (4 byte per

In the approximate range (4 bytes per elements)


40

Char Logical

characters (2 bytes per elements). values are 0 to 1 (1byte per element).

Int 32 and single required 4 bytes each. The char data class holds characters in Unicode representation. A character string is merely a 1*n array of characters logical array contains only the values 0 to 1,with each element being stored in memory using function logical or by using relational operators. Image Types: The toolbox supports four types of images: 1 .Intensity images; 2. Binary images; 3. Indexed images; 4. R G B images. Most monochrome image processing operations are carried out using binary or intensity images, so our initial focus is on these two image types. Indexed and RGB colour images. Intensity Images: An intensity image is a data matrix whose values have been scaled to represent intentions. When the elements of an intensity image are of class unit8, or class unit 16, they have integer values in the range [0,255] and [0, 65535], respectively. If the image is of class double, the values are floating point numbers. Values of scaled, double intensity images are in the range [0, 1] by convention. Binary Images: Binary images have a very specific meaning in MATLAB.A binary image is a logical array 0s and1s.Thus, an array of 0s and 1s whose values are of data class, say unit8, is not considered as a binary image in MATLAB .A numeric array is converted to binary using function logical. Thus, if A is a numeric array consisting of 0s and 1s, we create an array B using the statement.
41

B=logical (A) If A contains elements other than 0s and 1s.Use of the logical function converts all nonzero quantities to logical 1s and all entries with value 0 to logical 0s. Using relational and logical operators also creates logical arrays. To test if an array is logical we use the I logical function: islogical(c).

If c is a logical array, this function returns a 1.Otherwise returns a 0. Logical array can be converted to numeric arrays using the data class conversion functions.

Indexed Images: An indexed image has two components: A data matrix integer, x A color map matrix, map Matrix map is an m*3 arrays of class double containing floating point values in the range [0, 1].The length m of the map are equal to the number of colors it defines. Each row of map specifies the red, green and blue components of a single color. An indexed images uses direct mapping of pixel intensity values color map values. The color of each pixel is determined by using the corresponding value the integer matrix x as a pointer in to map. If x is of class double ,then all of its components with values less than or equal to 1 point to the first row in map, all components with value 2 point to the second row and so on. If x is of class units or unit 16, then all components value 0 point to the first row in map, all components with value 1 point to the second and so on. RGB Image: An RGB color image is an M*N*3 array of color pixels where each color pixel is triplet corresponding to the red, green and blue components of an RGB image, at a specific spatial location. An RGB image may be viewed as stack of three gray scale images that when fed in to the red, green and blue inputs of a color monitor
42

Produce a color image on the screen. Convention the three images forming an RGB color image are referred to as the red, green and blue components images. The data class of the components images determines their range of values. If an RGB image is of class double the range of values is [0, 1]. Similarly the range of values is [0,255] or [0, 65535].For RGB images of class units or unit 16 respectively. The number of bits use to represents the pixel values of the component images determines the bit depth of an RGB image. For example, if each component image is an 8bit image, the corresponding RGB image is said to be 24 bits deep. Generally, the number of bits in all component images is the same. In this case the number of possible color in an RGB image is (2^b) ^3, where b is a number of bits in each component image. For the 8bit case the number is 16,777,216 colors.

43

INTRODUCTION TO MATLAB What Is MATLAB? MATLAB is a high-performance language for technical computing. It integrates computation, visualization, and programming in an easy-to-use environment where problems and solutions are expressed in familiar mathematical notation. Typical uses include Typical uses of MATLAB Math and computation Algorithm development Data acquisition Modeling, simulation, and prototyping Data analysis, exploration, and visualization Scientific and engineering graphics Application development, including graphical user interface building.

44

The main features of MATLAB 1. Advance algorithm for high performance numerical computation ,especially in the Field matrix algebra 2. A large collection of predefined mathematical functions and the ability to define ones own functions. 3. Two-and three dimensional graphics for plotting and displaying data 4. A complete online help system 5. Powerful , matrix or vector oriented high level programming language for individual applications. 6. Toolboxes available for solving advanced problems in several application areas

45

MATLAB MATLAB Programming language User written / Built in functions Computation Linear algebra Signal processing Quadrature Etc Tool boxes Signal processing Image processing Control systems Neural Networks Communications Robust control Statistics External interface Interface with C and FORTRAN Programs

Graphics 2-D graphics 3-D graphics Color and lighting Animation

Features and capabilities of MATLAB

MATLAB is an interactive system whose basic data element is an array that does not require dimensioning. This allows you to solve many technical computing problems, especially

46

those with matrix and vector formulations, in a fraction of the time it would take to write a program in a scalar non interactive language such as C or FORTRAN. The name MATLAB stands for matrix laboratory. MATLAB was originally written to provide easy access to matrix software developed by the LINPACK and EISPACK projects. Today, MATLAB engines incorporate the LAPACK and BLAS libraries, embedding the state of the art in software for matrix computation. MATLAB has evolved over a period of years with input from many users. In university environments, it is the standard instructional tool for introductory and advanced courses in mathematics, engineering, and science. In industry, MATLAB is the tool of choice for highproductivity research, development, and analysis. MATLAB features a family of add-on application-specific solutions called toolboxes. Very important to most users of MATLAB, toolboxes allow you to learn and apply specialized technology. Toolboxes are comprehensive collections of MATLAB functions (M-files) that extend the MATLAB environment to solve particular classes of problems. Areas in which toolboxes are available include signal processing, control systems, neural networks, fuzzy logic, wavelets, simulation, and many others. The MATLAB System: The MATLAB system consists of five main parts: Development Environment: This is the set of tools and facilities that help you use MATLAB functions and files. Many of these tools are graphical user interfaces. It includes the MATLAB desktop and Command Window, a command history, an editor and debugger, and browsers for viewing help, the workspace, files, and the search path.

47

The MATLAB Mathematical Function: This is a vast collection of computational algorithms ranging from elementary functions like sum, sine, cosine, and complex arithmetic, to more sophisticated functions like matrix inverse, matrix eigen values, Bessel functions, and fast Fourier transforms. The MATLAB Language: This is a high-level matrix/array language with control flow statements, functions, data structures, input/output, and object-oriented programming features. It allows both "programming in the small" to rapidly create quick and dirty throw-away programs, and "programming in the large" to create complete large and complex application programs. Graphics: MATLAB has extensive facilities for displaying vectors and matrices as graphs, as well as annotating and printing these graphs. It includes high-level functions for two-dimensional and three-dimensional data visualization, image processing, animation, and presentation graphics. It also includes low-level functions that allow you to fully customize the appearance of graphics as well as to build complete graphical user interfaces on your MATLAB applications. The MATLAB Application Program Interface (API): This is a library that allows you to write C and Fortran programs that interact with MATLAB. It includes facilities for calling routines from MATLAB (dynamic linking), calling MATLAB as a computational engine, and for reading and writing MAT-files.

48

MATLAB WORKING ENVIRONMENT: MATLAB DESKTOP:Matlab Desktop is the main Matlab application window. The desktop contains five sub windows, the command window, the workspace browser, the current directory window, the command history window, and one or more figure windows, which are shown only when the user displays a graphic.

49

The command window is where the user types MATLAB commands and expressions at the prompt (>>) and where the output of those commands is displayed. MATLAB defines the workspace as the set of variables that the user creates in a work session. The workspace browser shows these variables and some information about them. Double clicking on a variable in the workspace browser launches the Array Editor, which can be used to obtain information and income instances edit certain properties of the variable. The current Directory tab above the workspace tab shows the contents of the current directory, whose path is shown in the current directory window For example, in the windows operating system the path might be as follows: C:\MATLAB\Work, indicating that directory work is a subdirectory of the main directory MATLAB; WHICH IS INSTALLED IN DRIVE C. clicking on the arrow in the current directory window shows a list of recently used paths. Clicking on the button to the right of the window allows the user to change the current directory. MATLAB uses a search path to find M-files and other MATLAB related files, which are organize in directories in the computer file system. Any file run in MATLAB must reside in the current directory or in a directory that is on search path. By default, the files supplied with MATLAB and math works toolboxes are included in the search path. The easiest way to see which directories are on the search path The easiest way to see which directories are soon the search paths, or to add or modify a search path, is to select set path from the File menu the desktop, and then use the set path dialog box. It is good practice to add any commonly used directories to the search path to avoid repeatedly having the change the current directory. The Command History Window contains a record of the commands a user has entered in the command window, including both current and previous MATLAB sessions. Previously entered MATLAB commands can be selected and re-executed from the command history window by right clicking on a command or sequence of commands. This action launches a menu from which to select various options in addition to executing the commands. This is useful to select various options in addition to executing the commands. This is a useful feature when experimenting with various commands in a work session.

50

Implementations Arithmetic operations Entering Matrices The best way for you to get started with MATLAB is to learn how to handle matrices. Start MATLAB and follow along with each example. You can enter matrices into MATLAB in several different ways: Enter an explicit list of elements. Load matrices from external data files. Generate matrices using built-in functions. Create matrices with your own functions in M-files. Start by entering Drers matrix as a list of its elements. You only have to follow a few basic conventions: Separate the elements of a row with blanks or commas. Use a semicolon, to indicate the end of each row. Surround the entire list of elements with square brackets, [ ]. To enter matrix, simply type in the Command Window A = [16 3 2 13; 5 10 11 8; 9 6 7 12; 4 15 14 1] MATLAB displays the matrix you just entered: A= 16 3 2 13 5 10 11 8 9 6 7 12
51

4 15 14 1 This matrix matches the numbers in the engraving. Once you have entered the matrix, it is automatically remembered in the MATLAB workspace. You can refer to it simply as A. Now that you have A in the workspace,

Sum, transpose, and diag You are probably already aware that the special properties of a magic square have to do with the various ways of summing its elements. If you take the sum along any row or column, or along either of the two main diagonals, you will always get the same number. Let us verify that using MATLAB. The first statement to try is Sum (A) MATLAB replies with Ans = 34 34 34 34

52

When you do not specify an output variable, MATLAB uses the variable ans, short for answer, to store the results of a calculation. You have computed a row vector containing the sums of the columns of A. Sure enough, each of the columns has the same sum, the magic sum, 34. How about the row sums? MATLAB has a preference for working with the columns of a matrix, so one way to get the row sums is to transpose the matrix, compute the column sums of the transpose, and then transpose the result. For an additional way that avoids the double transpose use the dimension argument for the sum function. MATLAB has two transpose operators. The apostrophe operator (e.g., A') performs a complex conjugate transposition. It flips a matrix about its main diagonal, and also changes the sign of the imaginary component of any complex elements of the matrix. The apostrophe-dot operator (e.g., A'.), transposes without affecting the sign of complex elements. For matrices containing all real elements, the two operators return the same result. So A' Produces Ans = 16 5 9 4 3 10 6 15 2 11 7 14 13 8 12 1 and Sum (A')' Produces a column vector containing the row sums Ans = 34
53

34 34 34 The sum of the elements on the main diagonal is obtained with the sum and The diag functions: diag (A) Produces Ans = 16 10 7 1 and Sum (diag (A)) Produces Ans = 34 The other diagonal, the so-called anti diagonal, is not so important mathematically, so MATLAB does not have a ready-made function for it. But a function originally intended for use in graphics, fliplr, flips a matrix From left to right: Sum (diag (fliplr (A)))
54

Ans = 34 You have verified that the matrix in Drers engraving is indeed a magic Square and, in the process, have sampled a few MATLAB matrix operations. Operators Expressions use familiar arithmetic operators and precedence rules. + Addition - Subtraction * Multiplication / Division \ Left division (described in Matrices and Linear Algebra in the MATLAB documentation) . ^ Power Complex conjugate transpose ( ) Specify evaluation order Generating Matrices MATLAB provides four functions that generate basic matrices. Zeros all zeros Ones All ones rand Uniformly distributed random elements randn Normally distributed random elements

55

Here are some examples: Z = zeros (2, 4) Z= 0000 0000 F = 5*ones (3, 3) F= 555 555 555 N = fix (10*rand (1, 10)) N= 9264874084 R = randn (4, 4) R= 0.6353 0.0860 -0.3210 -1.2316 -0.6014 -2.0046 1.2366 1.0556 0.5512 -0.4931 -0.6313 -0.1132 -1.0998 0.4620 -2.3252 0.3792

Using the MATLAB Editor to create M-Files:


56

The MATLAB editor is both a text editor specialized for creating M-files and a graphical MATLAB debugger. The editor can appear in a window by itself, or it can be a sub window in the desktop. M-files are denoted by the extension .m, as in pixelup.m. The MATLAB editor window has numerous pull-down menus for tasks such as saving, viewing, and debugging files. Because it performs some simple checks and also uses color to differentiate between various elements of code, this text editor is recommended as the tool of choice for writing and editing Mfunctions. To open the editor, type edit at the prompt opens the M-file filename.m in an editor window, ready for editing. As noted earlier, the file must be in the current directory, or in a directory in the search path. Getting Help: The principal way to get help online is to use the MATLAB help browser, opened as a separate window either by clicking on the question mark symbol (?) on the desktop toolbar, or by typing help browser at the prompt in the command window. The help Browser is a web browser integrated into the MATLAB desktop that displays a Hypertext Markup Language (HTML) documents. The Help Browser consists of two panes, the help navigator pane, used to find information, and the display pane, used to view the information. Self-explanatory tabs other than navigator pane are used to perform a search

57

CONCLUSION:

This project investigates combination of multiple wavelets at feature level for Palmprint based authentication system using an indigenously developed peg-free image acquisition platform. The results depict the superiority of combined wavelets over individual wavelet feature for the Palmprint authentication, using coarse level information. The project also presented a new approach for rotation invariance, which proved its effectiveness by enhancing genuine acceptance rate.

58

REFERENCES: [1] Xiangqian Wu, David Zhang, and Kuanquan Wang Palm Line Ex-traction and Matching for Personal authentication. IEEE TRANSAC-TIONS ON SYSTEMS, MAN, AND CYBERNETICSPART A: SYS-TEMS AND HUMANS, vol. 36, no. 5, September 2006. [2] Ajay Kumar, David C. M. Wong, Helen C. Shen, Anil K. Jain. Per-sonal Verification using Palmprint and Hand Geometry Biometric Audio- and Video-Based Biometric Person Authentication. Vol 2688/2003, Springer Verlag Berlin Heidelberg 2003. [3] Junwei Tao, Wei Jiang, Zan Gao, Shuang Chen, and Chao Wang. Palmprint Recognition Based on Improved 2D PCA. Agent Computing and Multi-Agent Systems vol 4088/2006, Springer- Verlag Berlin Heidelberg 2006. School of Information Science & Engineering, Shandong University, Jinan. [4] Tee Connie, Andrew Teoh, Michael Goh, David Ngo. Palmprint Recognition with PCA and ICA. Image and Vision Computing New Zealand 2003, Palmerston North, New Zealand, 3 (2003) 232-227. [5] Jiang, W., Tao, J., Wang, L. A Novel Palmprint Recognition Algorithm Based on PCA and FLD. IEEE, Int. Conference. On Digital Telecommunications, IEEE Computer Society Press, Los Alamitos (2006).

59

[6] Murat Ekinci and Murat Aykut. Palmprint Recognition by Applying Wavelet Subband Representation and Kernel PCA. Computer Vision Lab. Department of Computer Engineering, Karadeniz Technical Uni-versity, Trabzon, Turkey. Machine Learning and Data Mining in Pattern Recognition vol 4571/2007, Springer-Verlag Berlin Heidelberg 2007. [7] Li Shang, De-Shuang Huang, Ji-Xiang Du, and Zhi-Kai Huang. Palmprint Recognition Using ICA Based on Winner-Take-All Net-work and Radial Basis Probabilistic Neural Network. Advances in Neural Networks - ISNN 2006, Volume 3972/2006, Springer-Verlag Berlin Heidelberg 2006. [8] G. Lu, D. Zhang, K.Q. Wang, Palmprint recognition using eigen-palms features., Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1473-1477, 2003. [9] David Zhang, Wai-kin kong, Jane You and Micheal Wong. Online Palmprint Identification. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, vol. 25, no. 9, September 2003. [10]Kumar, Shen, H. C. Recognition of Palmprints Using Wavelet-based Features. Proc. Intl. Conf. Sys., Cybern., SCI-2002, Orlando, Florida (2002).

60

Você também pode gostar