Biometric Identification Based on Conjuctival Vasculature Pattern using Contourlet Transform
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2015, Vol 2, Issue 7
Abstract
The performance of any biometric system depends on the reliable and robust feature extraction. Biometric recognition refers to the use of distinctive anatomical (e.g., fingerprints, face, iris, palm) and behavioral (e.g., speech) characteristics for automatically recognizing individuals. Iris recognition was found to be most accurate bio-metrics technology. Apart from the red, green, and blue (RGB) format, we analyze significance of using HSV, Otsu’s multi thresholding is applied on V channel, K-means clustering is applied to merge over segmented region to get sclera mask. Pyramidal directional filtering approach (Contourlets) for feature extraction for ocular biometrics are proposed. In this paper, we pursue a “true” two-dimensional transform that can capture the intrinsic geometrical structure that is key in visual information. Our approach starts with a discrete domain construction. For Classification, linear discriminant analysis (LDA) is used
Authors and Affiliations
Nutan S. Jadhav
Simulation of Vedic Om: Monte Carlo Method in Operations Research
A sound is vibrating in the whole of Creation! It is diverting our mind from study of Matter, its limitations and advantages like pharmaceutical properties, for example , forcing us to believe that only by-products are W...
Projective Change between Special (α , β) - Finsler Metric and Rander’s Metric
Finsler geometry is originated from Differential geometry. Finsler geometry is Riemannian metric without quadratic restriction. In Finsler space we see special metrics such as Randers metric, Kropina metric and Matsumoto...
Energy Efficient Hierarchical Based Routing Protocol for Mobile Wireless Sensor Network
Many researches in wireless sensor network aims to minimize energy consumption, as energy is the primary life factor of a node. In this paper, hierarchical protocol, i.e. clustering concept is used to minimize energy con...
An Application Based Fault Detection and Restoration Algorithm for Wireless Sensor Actor Networks
Wireless Sensor and Actor Networks (WSANs) is a bunch of sensors and actors joined by wireless medium to perform distributed sensing and exploit tasks. In such a network, sensors gather data concerning the physical world...
Hacking in Social Media and Some Guidelines to Avoid It
Hacking in social media means to get private information of user without his permission. In this work, an attempt has been made to show you that what mistakes are generally done by users. So that hacker takes advantages...