2009 10 jan RFID 2

Transcription

2009 10 jan RFID 2
SEVENTH ANNUAL NATIONAL CONFERENCE
on
“BIOMETRICS,
RFID AND EMERGING TECHNOLOGIES
FOR
AUTOMATIC IDENTIFICATION”
th
DATE : 10 JANUARY, 2009
VENUE
Thorale Bajirao Peshwe Sabhagruha,
“Jnanadweepa” Thane College Campus, Chendani Bunder Road, Thane - 400601
Editorial Committee
Mrs. Suhasini Shukla
Mrs. Anita S. Diwakar
Mrs. Archana Mohite
Mrs. Reena Khairnar
Mrs. Neelima Gajare
Mrs. Medha Patki
Mrs. Vibhavari Ikhe
Mrs. Nandini Pusalkar
Ms. Swati Ganar
Supporting Staff
Mr. R. D. Patil
Mr. V. K. Vichare
Organised by
VPM’s POLYTECHNIC, THANE
‘Jnanadweepa’ Bunder Road, Chendani, College Campus,Thane (w) - 400 601
Tel. : 2536 4494, 2533 9872. URL - www.vpmthane.org
VISION : ENSURING QUALITY TECHNICAL EDUCATION
V. P. M’s POLYTECHNIC, THANE.
We take immense pleasure in cordially inviting you for the
Seventh National Conference
on
Biometrics,
RFID and Emerging Technologies for
Automatic Identification
Inaugurl Function
on Saturday 10th January, 2009 at 9-00 am
Chief Guest
Prof. G. B. Dhanokar
Director, Maharashtra State Board of Technical Education
Guest of Honour
Mr. T. Vasu
Director, Tandan Group of Companies
Keynote Speaker
Mr. Harish Aiyer
Director. Softcell Ltd.
Dr. V. V. Bedekar
Chairman, Vidya Prasarak Mandal, Thane.
will preside over the function
Prof. D. K. Nayak
Convener/Principal
V.P.M’s Polytechnic, Thane
Mrs. A. S. Diwakar
Jt. Secretary
Computer. Engg. Dept.
Mrs. S. K. Shukla
Organising Secretary
HOD - Computer. Engg. Dept.
Conference Venue
Thorale Bajirao Peshwe Sabhagruha
‘Jnanadweepa’, College Campus, Chendani Bunder Road, Thane (W) - 400 601
Maharashtra State, India.
Patron
Dr. V. V. Bedekar
Chairman,
Vidya Prasarak Mandal, Thane.
ADVISORY COMMITTEE
Dr. Siddhan
Mr. N. S. Barse
Business Advisor
Pharmalabs Limited
Mumbai
Librarian
K. G. Joshi College of Arts
Convener
Mr. N. K. Marwah
Prof. D.K. Nayak
Managing Director
Magna Services Pvt. Ltd
Principal,
VPM's Polytechnic, Thane
Mrs. S. K. Shukla
Mrs. A. S. Diwakar
Organising Secretary
HOD, Computer Engineering,
VPM's Polytechnic, Thane
Joint Secretary
Computer Engineering,
VPM's Polytechnic, Thane
Mr. Kaustubh Kale
Mr. Ashish Hastak
Anant Corporation
Manager, Airtel Ltd
iii
LIST OF ANNUAL NATIONAL CONFERENCES
ORGANIZED BY THE POLYTECHNIC IN THE PAST
Sr.
Name of the Conference
Date /Year
1
Pollution of Water Bodies in the Urban Areas
8th August 2004
2
Alternative Energy Sources
27th and 28th August 2005
3
Geo Informatics
8th and 9th December 2006
4
Innovations in Safety, Health & Environment
3rd February 2007
5
Latest Trends in Nanotechnology
5th January 2008
6
Corrosion Prevention Through
18th October 2008
No.
Advanced Technologies
Please note :
The Authors of the papers are alone responsible for technical contents of the papers and references cited
therein.
Published by :
V. P. M.’ Polytechnic,
“Jnanadweepa” Chendani Bunder Road,
Thane (W), Maharashtra
Tel. : 2536 4494
E-mail : [email protected]
URL : www.vpmthane.org
Printed by :
Jayesh Patel
“Three Art”
Hilari Compound, Left to Rajashree Tower,
Nr. Pratap Talkies, Kolbad, Thane (W) - 400601
Mo. : 98928 30581
Email : designer [email protected]
iv
Message
Dear friends,
I have a great pleasure in presenting the proceedings of one day national conference
on “Biometrics, RFID and Emerging Technologies for Automatic
Identification”. It is the seventh national conference being organized by the
polytechnic with the aim of creating awareness on futuristic subjects amongst students
and teachers. The theme of the conference is the latest development in the field of
science and technology and is extremely relevant at this point in time when limitations of
manual tracking and locating a specific item speedily and without error are of prime
importance.
The conference theme is one of the most developing areas in Indian industries as they are increasingly
using these techniques in transportation, storage and manufacture in many areas like electronics, airlines,
malls, cargo services and plenty of new applications are coming up.
Automatic Identification is an interdisciplinary area with faculty from Mathematics, Physics and
Computer group playing their role. For students of this generation knowledge of Automatic Identification
techniques will definitely bring success.Emergence of Automatic Identification techniques for humans leads
to greater sense of security and hence is gaining more importance. Some of the identification techniques
currently being used in the industry are smart cards for attendance, RFID for supply chain management, RFID
for library book management.
The development of cost effective and reliable devices, their processes and their installation in newer
applications and fields will be the next step in the growth of Indian industry.
The seminar on “Biometrics, RFID and Emerging Technologies for Automatic
Identification” is our small step in imparting knowledge regarding this technology to one and all. I am
sure the dedicated and coordinated efforts of all of us will succeed in fulfilling the very objective of the
conference. I am sure the souvenir of the conference would help the participants in coming up with their own
innovative ideas and develop the identification techniques further.
With best wishes
Dr. Vijay V. Bedekar
Chairman
Vidya Prasarak Mandal, Thane.
v
National Conference on
Biometrics, RFID and Emerging Technologies for Automatic
Identification.
Message from the Director, MSBTE
I am delighted to know that V.P.M.'s Polytechnic has organized 7th National conference on Biometrics,
RFID and Emerging Technologies for Automatic Identification on 10th January 2009.
As we all know Automatic Identification offers a powerful platform that leads to various aspects such as
supply chain management using RFID, biometrics, smart cards etc. This presents immense opportunities to
various industries by way of improving the object monitoring system.
Realizing the importance and potential of Automatic Identification many industries are actively
implementing these technologies. RFID (Radio Frequency Identification) is one such method being used all
over the world in various applications such as vehicular tracking, healthcare. postal services etc. Even
educational institutes are using automatic identification techniques in various projects.
Automatic Identification techniques will gain further importance in the current scenario of global
recession. The techniques used for identification of human being by identifying characteristics such as finger
image, palm image, facial image, iris print etc will be fast gaining importance as the security issues come
forward.
MSBTE has always extended its support to such kind of national conferences. It organizes various
training programs for faculties for imparting current knowledge, technology and for curriculum content
updating.
I sincerely appreciate the efforts of organizers and hope that the publication of this souvenir will go long
way in fulfilling the very objective. I wish the conference all the success.
Prof. G. B. Dhanokar
Director,
Maharashtra State Board of Technical Education.
vi
25.12.2008
Preface
Dear Participants,
Kindly accept my Season's Greetings. The Seventh National Conference
Organized by Polytechnic is focusing on Emerging trends in Automatic
Identification. The IT revolution has created extensive dependence on technology
infrastructure for every Business Enterprise and it has become the backbone of the
industry. With the Business activities getting integrated into Latest technologies,
Advanced security features are finding their place for reliability, Integration, and
Productivity enhancement.
Today Information Security cannot be ensured just with traditional methods. In addition to conventional
methods, features are being introduced to make Authentication accurate. Biometrics has become essential
part of HR Management in Organizations to maintain accountability of staff services. RFID is used in
Resource & Materials Management in Stores, Libraries, Airlines, Cargo systems and many Global
applications. These technologies help to reduce inaccuracies in the Information Processing.
The Conference theme is chosen to enrich the students especially from Electronics and Computer group
Diploma Programmes. These are the sunrise technologies in ITES and will be used in large scale in
Organizations. New technologies of identification will help the students and professionals to continue their
innovative instincts for adding features to existing technologies.
The invited speakers will definitely be enthused to interact with the participants to share their knowledge
& expertise. It will be an enriching experience at the end of the Conference to visualize the emerging
technology with renewed perspective.
All the invited speakers, & exhibitors contributions are note worthy and they deserve compliments. On
behalf of the Polytechnic. I convey my sincere gratitude's for their valuable support to this conference,
Special thanks to Prof. P. A. Naik Secretary, Prof. G. B. Dhanokar, Director Maharastra State Board of
Technical Education for their Valuable support and sponsorship.
Sincere thanks to Dr. V. V. Bedekar, Chairman & all members of V.P.M for their encouragement in
organizing such National Conferences.
Warm Regards,
Prof. D. K. Nayak
Principal & Convener
vii
Biometrics, RFID and Emerging Technologies for
Automatic Identification
It gives me great pleasure to present this souvenir to you that covers various issues
ranging from RFID and its applications, Standards developed for RFID use,
Biometrics applications such as face detection, signature recognition to Fuzzy
decision trees etc.
Automatic Identification refers to the methods of automatically identifying
objects, collecting data about them and entering the data into computer system without
human intervention. Technologies considered to be part of Automatic Identification
are RFID, Biometrics, and Smart Cards etc.
Automatic Identification has become the need of the day for various reasons. The first and the foremost
reason is the global recession that the world is now facing. Secondly the security aspect of data and the
authentication of user become essential in the current scenario.
The most commonly used automatic Identification techniques being RFID (Radio Frequency
Identification) which is being used in various applications such as Automatic Vehicular Tracking, Library
Management, and Supply Chain Management etc.
Another common technique used in automatic identification is the use of smart cards which are being
introduced by almost all the companies for staff attendance.
Biometrics with finger print, iris, palm, voice, signature recognition has become essential when we look
at the current situation in the world.
Necessity is the mother of all inventions: Greater demands for new products is so ever increasing that it is
necessary for the industry to keep up with the requirements. However we must also keep in mind the negative
aspects of Automatic Identification such as initial high investment, dependence on other technologies such as
sensor readers for security, privacy concerns etc.
As an organizing secretary I express my sincere thanks to all the speakers for accepting our invitation,
delegates for their response and the sponsors for their generosity. I am also grateful to the authors who have
contributed to the souvenir to augment its utility for the students, technical teachers and practitioners in the
field.
I wish to express my gratitude Mr. Marwah for his help and encouragement.
I am thankful to our Chairman Dr. V.V. Bedekar and Principal, Prof D.K.Nayak, who provided the needed
academic and other support and were constant source of encouragement to me in facing the challenges in the
organization of the seminar. Thanks are also due to my colleagues for their constant support and
encouragement.
Mrs. Suhasini Shukla
Organizing Secretary
H.O.D.
Department of Computer Engineering
viii
V. P. M's Polytechnic Thane.
7th ANNUAL NATIONAL CONFERENCE
On
BIOMETRICS, RFID AND EMERGING TECHNOLOGIES FOR
AUTOMATIC IDENTIFICATION
(10th January 2009)
Program Schedule
Session
Name of Person
Inaugural
Registration
Session
Inaugural Function
Chief Guest :
Prof. G. B. Dhanokar
Director, MSBTE.
Guest of Honour :
Mr. T. Vasu, Tandan Group of
Companies
Dr. V. V. Bedekar, Chairman,
Vidya Prasarak Mandal, will
preside over the function.
9.00 - 10.00am
Keynote Address
RFID
Mr. S. Kalyanaraman,
G.M. (Engg.) Tandan Group of
Companies
Biometrics :
Mr. Harish Aiyer,
Director, Softcell Ltd.
10.00 - 10.45 am
TEA BREAK
Plenary Session Presentations by dignitaries
from Industry
Chair Person :
Dr. Siddhan
Session II
Chairperson
Mr. Sameer
Phanse
LUNCH BREAK
Paper 1
Paper 2
Paper Details
Time
08.00 - 10.00 am
Industry Perspective of
Biometrics :
M. Anand, GM, Godrej & Boyce
RFID :
Mr. Nalawade, IIT Mumbai.
RFID : A tool for Library Security
Mr. N. S. Barse, Librarian.
K. G. Joshi College of Arts.
Multimodel Recognition based on
Fuzzy Decision Trees
Susmita Deb and M. Gopal
Dept. of Electrical Engg. Indian
Institute of Technology, Delhi.
ix
10.45 - 11.00 am
11.00 - 1.00 pm
01.00 - 2.00 pm
02.00 - 2.20 pm
02.20 - 2.40 pm
Paper 3
Session III
TEA BREAK
Technical Presentation
Paper 4
Chairperson
Prof. Uday
Pandit Khot
Paper 5
Paper 6
Valedictory Function
Specialized GlobalFeatures for
Off-line Signature Recognition
H. B. Kekre, V. A. Bharadi,
Dept. Of Computer Engg., Dept.
Of E & TC., Thadomal Shahani
Engg. College.
2.40 - 3.00 pm
3.00 - 3.20 pm
3.20 - 3.40 pm
3.40 - 4.00 pm
Gunnebo Industries
Fingerprint Recognition in DCT
Domain,
M. P. Dale, S. N. Dharwadkar and
M. A. Joshi (HOD) COEPMES’s
College of Engg., Pune.
Automatic Identification
4.00 - 4.20 pm
Techniques Frequency Ranges
and Radio Liscensing Regulations
Rahul Kulkarni, Siemens.
Kirti Agashe, HOD, IE Dept.
V.P.M’s Polytechnic, Thane
RFID, Its Applications and
4-20 - 4.40 pm
Integrating RFID in WSN
Anuradha Kamble and Anita S.
Diwakar, Lecturer, SIES Institute
Of Technilogy, Nerul, NaviMumbai, V.P.M.’s Polytechnic.
Thane.
Chief.Guest :
4-40 - 5-00 pm
Mr Marwah MD, Magna Services.
x
Mr. T. Vasu
Profile
A Mechanical Engineering graduate from the University of Madras.
Mr. T. Vasu, started his professional career with a public sector company in
Madras making teleprinters and other telecom related equipments, from late
60's.
Having joined in the field of Electronic Manufacturing, he got trained in
Electronics with M/s. Olivetti, Ivrea, Italy, for 6 months and was awarded a
technical diploma. Had exposure in various functions of the business
operations like manufacturing, quality, supply chain, customer service,
Industrial Engineering & Systems taking part in the management discussions
as well moving up in the higher echelons in Management before he joined
Tandon Group, a large Hardware manufacturer- exporter at their Madras Export Processing Zone (MEPZ)
plant in 1989, as the Head of Operations.
While in MEPZ, he contributed to the exporting community by serving as Honorable Secretary to the MEPZ
Manufacturer's Association.
During the period, he was also a member of the Gill Committee formulated by the Ministry of Commerce to
go into the simplification of various procedures related to the Export Processing Zone in the country.
After serving the Celetronix Group Companies in various capacities for including Managing Director of
Celetronix Power India Pvt. Ltd., and jabil Circuits for nearly 20 years, currently serving
Tandon Group in the capacity of Director, Corporate Affairs.
Mr. Vasu is the immediate past Chairman,
Export Promotion Council for Export Oriented Units and Special Economic Zones (EPCES) sponsored
by the Ministry of Commerce of Industry, Government of India, and
Vice President, Elcina Electronic Industries Association.
xi
S. Kalyanaraman
General Manager (Engineering)
Tandon Group of Companies,
SEEPZ-Special Special Economic Zone, Mumbai.
Profile
Starting the career as Engineer (design and development) in Modular
electronics Chennai (India) which made head gimble assemblies,
headstacks, voice coils and hard disc drives in high voloume.
Moved up in the value chain as Senior Engineer and currently functions as
Gen. Manager (Engineering) in design and development services in the areas
of
1.
2.
3.
4.
5.
6.
7.
8.
Combination of Solar- Stirling Engine based Power Generation.
Concentrated Solar Photo voltaic technology.
Various Defense Products.
Test Equipments for Mobile Tower Antenna Testing.
ATE for UPS & Panel accessories Testing.
Compressed Air motor.
Tyre Pressure Management system for Trucks & Cars.
Low cost method for Silicon extraction for Photo voltaic.
Key expertise
Overall 18 years of hands on experience in the field of Design, Automation, Integration, Maintenance in
Electronics and Communication.
 Design & Development of Products for High End Car Audio Digital Amplfiers,
 Development of RFID Active & Passive Tags, Set top box related..
 Design and development of various Test equipments in high volume manufacturing of Hard disc
drive &
 Multiple mode Switchmode Power Supplies and Set top Boxes..
 Data acquisition systems.
 Combi tester. ELCINA AWARD WINNING PROJECT.
 Customer Level Tester.
 Fully automated and temp./humidity controlled Burn in systems.
 Power supply and front panel testers.
 Static tester for Headstack assembly.
 Quasi static tester for Headstack assembly.
 PLC Based swaging machine.
 PLC based Pivot Installation machine.
 Alarm Annunciate for ESD Outbreak.
 SCADA system for facilities department.
 Personal Monitoring system for Cleanrooms.
 ESD Monitoring system.
 DAS system
 Static R/W Tester.
 Static Attitude Tester.
xii
Harish Aiyer
Email : [email protected] Mobile 9821013093
Residence: Plot 100, Sector 8 Vashi Navi Mumbai 400 703
Career Steps :
u Director, Softcell Technologies, Ltd. (2000-Present);
u President, Softcell T & T Inc USA (1998-2000);
u Executive Director, Somatico (1988-1998),
u Tech Support Manager, Sonata Software, Systems analyst, Team
leader, Project leader Unisys (1985-1988) Holland/ France/ USA/
Canada.
Business Background :
Softcell : (current) One of founders of Softcell Technologies, Ltd.
in 1989, and currently one the board of Director. Turnover of over
350 crores 2007-08and expected to cross Re 350 cores 2006 07.
Specializes in the BFSI systems and an expert in Credit Bureau
Operations.
Somatico Laboratories Pvt Ltd : (Pharmaceutical company) till 1999.
Harish as Executive Director was instrumental in setting up the entire manufacturing Somatico laboratories
PVT ltd. and Somatico Pharma Pvt ltd. As the executive director of Somatico
Laboratories Pvt Ltd
Other Professional Exposure :
 He has been a visiting / guest lecturer in many colleges and universities on
Corporate Strategy, Computer Science, Marketing, Knowledge Management,
Brain yoga and Change management. Personal development.
 He has extensive knowledge on Software architecture, Expert systems, ERP
Solutions, Health care systems,
Financial and Banking applications, Group ware systems and knowledge
Management.
 He is closely connected with corporate governance and Strategy formulation
with at least half a dozen of ltd
companies as part of their Board.
 Working with over a dozen international startup organizations as Advisor.
Associations & Honors :
 Bharatiya Vidya Bhavan's: Hon. Secretary Navi Mumbai Kendra,
 National Center for Leadership founder.
 Board of Management of SIES college of Management,
 Brain Yoga Institute Managing Trustee,
 Joint Secretary Awaz, An NGO helping Citizens issues of Navi Mumbai.
 Member of International Association of Business Leaders NC USA since 2001,
 Member of international who's who historical society London since 2003.
 Ex Vice Chairman of Bombay Management Association Navi Mumbai chapter,
 Mahatma Gandhi Institute of Computer Education, founding Committee Member;
 Ex president of all India association of college going scientist.
 Ex Sec of IES education Society's Alumni Association.
xiii
Education :
SP Jain Institute of Management, Master's Degree in Management Science (1985); APICS, Certification
(USA); The Project Management Institute, Certification (USA), internal auditor for CMM 1999, Lead
auditor for ISO 9000, Knowledge Management from Harvard 1999-2000. Certificate in Intellectual Property
laws 2006.
Personal Information :
Mr. Aiyer enjoys reading in his personal time. He practices martial arts, meditation and Brahma Vidya. He is
an amateur Astronomer, archeologist and Photography.
He is currently involved in research on Brain, Brain Development and Yoga. He has interests in Robotics,
Artificial intelligence and Knowledge management. Owns a personal library of over 7500 books [non fiction]
on various subjects.
Few of the invites for Lectures :
1.Speaker at the Conference on the issues on “year 2000” and computer systems in 1999 in Chicago USA.
2.Chief guest for the IEEE conference of Wireless technology in India 2007.
3.Speaker at the international seminar on Project management at KL Malaysia 2006
4.Key note speaker for National Seminar for Security NSA, IEEE 2008,
5.Chief Guest for launching the Management Courses by MET Mumbai 2008.
6.Chief Guest For launching the Management courses in SIES COMS 2008.
7.Speaker at the international Entrepreneurial forum in Singapore University 2007.
Mr. Marwah
Profile
A passionate recruitment Professional with over 20 years of extensive
Executive Search and Career Counseling experience, Mr. Marwah is Founder
& Managing Director of Magna Services (India) Pvt.Ltd., a company engaged
in providing ethical & innovating executive search and Recruitment consulting
in India and overseas..
Before Founding Magna, Mr.Marwah was the Dy CEO & Vice President of
Datamatics Staffing Services.Mr. Marwah, launched world's first job portal
like e services Employers Club in 1988 he also ran an Employment Newspaper
Employers' Dispatch & Courier. Mr. Marwah also writes on Recruitment
related subjects and his articles have appeared in some of the leading
newspapers.
During his two decades of profession, Mr.Marwah has worked in Asia, Africa and USA and was also
associated with organizations like Magna industries Australia, SM Dyechem, Empire Industries and NES UK
in different capacities.
Currently He is also engaged in incubating an innovating e- Human Capital Exchange which can
revolutionize recruitment by integrating and automating many of the recruitment processes
Mr Marwah is also an active Rotarian and member of NHRD and ERA other associations
Mr. Marwah is the Head Special Interest Group & member of Executive Council of Executive Recruiters
Association.
xiv
Contents
1
Industry perspective of Biometrics
M.Anand, GM, Godrej & Boyce
1
2
RFID: A tool for Library Security
Mr. N Barse, Librarian, K.G.Joshi College of Arts
3
3
Multimodel Recognition based on Fuzzy Decision Trees
Susmita Deb and M. Gopal,
Department of Electrical Engineering, Indian Institute of Technology, Delhi
6
4
Specialized Global Features for Off-line Signature Recognition
H B Kekre,V A Bharadi, Dept of Computer Eng, Department of E & TC.
Thadomal Shahani Engineering College
10
5
Fingerprint Recognition in DCT Domain
M.P.Dale, S.N.Dharwadkar and M.A.Joshi (HOD) COEP ,
MES's College of Engineering, Pune
16
6
Automatic Identification Techniques Frequency Ranges and
Radio Liscensing Regulations
Rahul Kulkarni, Siemens.
Kirti Agashe, HOD,Department of IE,V.P.M's Polytechnic,Thane
20
7
RFID, Its Applications and Integrating RFID in WSN
Anuradha Kamble and Anita S Diwakar,
Lecturer, SIES Institute Of Technology, Nerul, Navi Mumbai,
V.P.M's Polytechnic,Thane
25
8
A Skin Color Segmentation Approach towards Face Detection
Ashwani Kumar,
Dept. Of Electrical and Instrumentation Engg.
Sant Longowal Institute of Engg. And Technology,
Sangrur, Punjab.
29
xv
About the Theme of the conference
Automatic Identification refers to the methods of automatically identifying objects, collecting data about
them and entering that data into computer system without human involvement. Technologies considered as a
part of Automatic Identification are Barcodes, Radio Frequency Identification (RFID), Biometrics, Optical
Character Recognition (OCR), Smart cards, Voice Recognition.
Automatic Identification is the process or means of obtaining external data, through analysis of images, sound
and videos. In biometric security systems, capture is the acquisition of or the process of acquiring and
identifying characteristics such as finger image, palm image, facial image, iris print or voice print which
involves audio data and the rest all involves video data. . The technology acts as a base in automated data
collection, identification and analysis systems worldwide.
Biometrics are the oldest form of identification. Dogs have distinctive barks. Humans recognize faces. On
the telephone, your voice identifies you. Your signature identifies you as the person who signed a
contract. Your voiceprint unlocks the door of your house. Your iris scan lets you into the corporate offices.
You are your own key.
In order to be useful, biometrics must be stored in a database. You can verify a signature only if you
recognize it. To solve this problem, banks keep signature cards. The user signs his/her name on a card
when he/she opens the account, and the bank can verify the signature against the stored signature to
ensure that the check was signed by the user.
There is a variety of different biometrics. In addition to the three mentioned above, there are hand
geometry, fingerprints, iris scans, DNA, typing patterns, signature geometry (not just the look of the
signature, but the pen pressure, signature speed, etc.). The technologies are different, some are more
reliable, and they'll all improve with time.
Biometrics are hard to forge: it's hard to put a false fingerprint on your finger. The moral is that biometrics
work well only if the verifier can verify two things: one, that the biometric came from the person at the
time of verification, and two, that the biometric matches the master biometric on file. If the system can't
do that, it can't work. Biometrics are unique identifiers, but they are not secrets. You leave your
fingerprints on everything you touch, and your iris patterns can be observed anywhere you look.
RFID has found its importance in a wide range of markets including livestock identification and Automated
Vehicle Identification (AVI) systems because of its capability to track moving objects. These automated
wireless Automatic Identification Systems are effective in manufacturing environments where barcode labels
could not survive.
RFID is more advanced technology because data can be scanned from a distance, which is not possible in a
barcode. Barcodes are also not different for each item lying in a store but all the RFID stickers will have
different id numbers, which makes it altogether unique. Some airlines are also experimenting with baggage
tracking systems as well with these tags.
xvi
Biometrics : A perspective from the Security Industry
Mr. M. Anand
General Manager
Godrej & Boyce Ltd.
Biometrics: Derived from “bios” meaning “life” and “metron” meaning measure, is literally the field of
identifying and recognizing human beings through their biological attributes.
Biometrics, finds applications in mainly three areas:
u Forensics
u Security
u Human Comfort
As the subject is a wide ranging one, we cannot do much justice to it on a two page writeup. Hence, we will
restrict our discussion to an overview of the various biometric solutions that find applications in the Security
Domain and the challenges posed.
Why Biometric Solution?
A biometric characteristic cannot be forgotten, lost, stolen or copied. Thus it directly resolves the challenges
faced with regards to verifying the person's claim concerning their identity. A password or ID card does not
provide the same level of security as they can be easily compromised.
Pre-requisites for a successful implementation:
For a successful implementation of a biometric solution - in a commercial application - it should meet the
following criteria :
1. Error rates : FAR and FRR: The system should be robust enough to yield very low False Acceptance
Rates and False Rejection Rates.
2. Scalability : The system should be scalable easily for the user to benefit from the implementation.
3. User Privacy : Privacy concerns should be kept in mind while designing the system as biometric
characteristics, by its definition, generally cannot be changed.
4.System Security : The system should be secured so that the confidentiality of biometric data are
maintained with proper authorizations clearly defined.
5.Social acceptance: The system should be accepted by the users. Biometric characteristics like Fingerprint
/ Iris Scanning etc can generate concerns in the minds of the users regarding their effects and hence
confidence should be built up.
6.System Cost: For a successful implementation, the perceived benefits should not only outweigh the costs
incurred, but also the costs should be low enough to encourage trial in the first place
7.Ease of use: And finally, the system should be easy to use.
Biometric Characteristics :
The biometric characteristic that is chosen for deployment can be amongst the following available currently.
Depending on the need, the system can be designed to be a multi modal type requiring authentications by
multiple characteristics or unimodal.
Fingerprint : This is the most common solution under implementation today. The costs are considerably
low due to the high volumes.
Face Recognition: After fingerprint, this is the second most widely deployed solution. Main application
areas are access control, time and attendance applications and law enforcement.
Iris scanning : A solution with very low levels of FAR and FRR, it is gaining increasing levels of acceptance
for indoor applications.
1
Voice Recognition : This helps in identifying persons for remote access, through telephones or internet.
Vein Pattern : It is an emerging technology and we will have to see how it is going to evolve
Hand Geometry: Proven systems for difficult environment, especially in a 1: 1 environment.
Attributes of Biometric Characteristics :
While choosing the suitable characteristic to be considered, the following requirements should be kept in
mind.
Uniqueness : The characteristic should be unique to the individual.
Universality : The characteristic should be available across the entire human population.
Permanence : The characteristic should not change with time.
Measurable : It should be measurable repeatedly with a high level of accuracy.
User friendly : Should be easy to use.
Application areas :
Biometric solutions find application predominantly in the physical access control domain. Solutions have
been tailored to meet the demanding needs of handling thousands of passengers in a busy airport, critical
nuclear installations etc etc.
The benefits that accrue to its users are mainly
Compliance to national and international standards
Risk Mitigation with respect to data thefts
Accurate time data logging and avoidance of buddy punching
Challenges for deployment :
Lack of an uniform industrywide standard : The main roadblock is the lack of uniform international
standards for comparison of the effectiveness of the different biometric technologies / manufacturers. The
claims of FAR / FRR, enrolment time, speed of authentication are critical parameters which a deployer
considers when deciding on the technology and vendor. However, due to lack of uniform evaluation
protocols, one is left to sift and verify the the claims and counterclaims of the various competing technologies.
Costs of deployment : Another significant barrier for widespread acceptance is that the cost of deploying
a biometric solution is still quite high. With technological breakthroughs the costs can come down
significantly in the near future leading to a quantum jump in the usage.
References :
Resources from L1 Identify solutions and IIT Kanpur
Name : M. Anand
Designation : General Manager ( Mktg ) - Electronic Security Solutions
Organisation : Godrej & Boyce Mfg Co Ltd, Mumbai
Education: B Tech in Chemical Engineering and MBA from IIM Bangalore in
Marketing
An industry expert with 14 years of rich experience in designing and deploying
electronic security solutions across a wide gamut of industries, corporates, defence establishments and other
mission critical research centres.
2
RFID (Radio Frequency Identification) : A Tool for Library Security
Prof. N. Barse
Librarian
K. G, Joshi College of Arts, Thane
There have been many technological developments in the last 5o years. The Information Communication
Technology (ICT) revolution in the last decade has had a drastic and far-reaching impact on all aspects of
professional endeavor particularly in the knowledge and information sector. Due to rapid developments in
ICT and its application to the library work libraries have evolve from traditional libraries to automated
libraries, electronic libraries, hybrid libraries, digital libraries and now we are talking about virtual library.
The new technologies have not only transformed the shape of modern libraries but also created many exciting
possibilities and opportunities.
Advances in ICT have increased capabilities such as high resolution capture devices, dramatic increase of
digital storage media, explosive growth of internet and www, fast processing power and reducing cost of
computer, high band with networks and increasing number of security system in digital domain. The digital
developments include infrastructure, acceptability, access, restriction, readability, standardization,
authentication, preservation, copyright, user interface etc. Due to these developments and its impact on
libraries the library collection has undergone many changes. Now days along with books, CDs, VCDs,
DVDs Subscribed online collection (databases) have become important part of the library collection. Most of
the expensive information sources are available in different medias viz. print, electronic and online format.
New technologies have always been of interest for libraries both for increasing the quality of service and for
improving administrative efficiency. Libraries are applying various technological tools for book
identification, self-checkout, automated circulation, theft control and inventory control. These applications
can lead to significant saving in labour; enhance customer services, lower book theft-rate and provide of
updated library statistics for administrative purpose.
Security of library collection has been always a major concern for libraries. Security problems, such as theft
and other kind of misbehavior have become challenges today. Libraries have been using various means for
preventive security measures. Bar code is fundamental technology for library circulation and other
operations.
RFID Technology
Radio Frequency Identification (RFID) is a generic term for technologies that use radio waves. It is an
automatic identification method, relying on storing and retrieving data using electronic tags.
RFID (Radio Frequency IDentification) is the latest technology to be used in library theft detection systems.
Unlike EM (Electro-Mechanical) and RF (Radio Frequency) systems, which have been used in libraries for
decades, RFID-based systems move beyond security to become tracking systems that combines security with
more efficient tracking of materials throughout the library including easier and faster charge and discharge,
inventory (stock checking), and materials handling. RFID is a combination of radio-frequency-based
technology and microchip technology. RFID technology is useful in taking inventory, finding missing items
and identifying misfiled items.
Radio Frequency Identification (RFID) technology collects, uses, stores, and broadcasts data. Components of
RFID systems include tags, tag readers, computer hardware (such as servers and security gates) and RFIDspecific software such as RFID system administration programs, inventory software, etc.
RFID technology can enable efficient and ergonomic inventory, security, and circulation operations in
libraries. In addition like other technologies that enable self-checkout of library materials, RFID can enhance
individual privacy by allowing users to checkout materials without relying on library staff.
3
RFID tag used in a library is a small object, like an adhesive sticker, that can be attaché to or incorporated into
a product. RFID tags contain microchip that is attached to an antenna. The chip and the antenna together are
called an RFID transponder or an RFID tag. The antenna enables the chip to transmit the identification
information to a reader. The reader converts the radio waves reflected back from the RFID tag, into digital
information that can be passed on to a computer that can make use of it.
RFID Use in Libraries
RFID technology can be used in libraries with its greatest advantages for reducing material handling time,
accurate inventory, better collection management, and avoidance routine repetitive tasks of library
professionals. The saved time can be used for quality enhancement in reader oriented and value added
services to its users.
Advantages RFID Technology
® RFID labels or tags can be attached to divergent media in library such as CDs, DVDs, and other printed
materials.
® It can help in speedy circulation because multiple items can be read at a time.
® It combines both material identification and security in one single tag or transponder, thus saving cost and
time.
® Tags are read/write, provides facility for encoding and decoding.
® Tags are durable and can last lifetime of the item they identify.
® RFID provides superior security coverage. It prevents unauthorized removal of library materials from the
premises.
® Stock management such as managing materials on the shelves, finding items that are missing and
identifying miss-shelved items.
® Can be useful in providing improved patron services by spending minimal time on circulation operations
allows library staff to assist users.
® Library items identification and security bit is comibined into a single tag, there by eliminating the need to
attach additional security strip, hence minimizing labeling time and its associated cost.
® Security bit is automatically deactivated and reactivated as materials checked out and in; hence no
separate security procedures are required.
® RFID emit a radio signal that can be picked up from a remote site. Line of sight that involved in barcodes is
not necessary for capturing the item data.
Disadvantages of RFID
High cost : The major disadvantage of RFID technology is its cost.
Chances of removal of tags : RFID tags are typically affixed to the inside back cover and are exposed
for removal.
Depends on other technology like sensor readers for security
While the short-range readers used for circulation charge and discharge and inventorying appear to read the
4
tags 100 percent of the time, the performance of the exit sensors is more problematic. They must read tags at
up to twice the distance of the other readers. The author knows of no library that has done a before and after
inventory to determine the loss rate when RFID is used for security. Lacking data, one can only conjecture that
the performance of exist sensors is better when the antennae on the tags are larger.
Some issues of privacy concerns
Since this technology is capable of tacking the location of an item carrying the tag there is debate on the
privacy related issues
Conclusion :
RFID technology is very useful for all the libraries of the modern world where security of library material is
serious issue. It has the capability of making our professional activities with ease and convenience. Use of
RFID will certainly increase the functional capabilities of the library professionals because they will get more
time for planning and providing better services to the users. It can play significant role in bringing user
satisfaction, and convenience. If we keep aside the cost factor involved in this technology it the best suitable
technology for library management.
Bibliography :
Sahu, Ashok Kumar. 2008. information management in new millennium. New Delhi, Ess.
Sukula, Shiva. 2008. Information technology: bridge to the wired virtuality. New Delhi, Ess.
Carr, Reg. 2007. The academic research library in a decade of change. Oxford, Chandos Publishing.
Webliography :
http://www.ala.org/a/2008la/aboutala/offices/oif/statementspols/otherpolicies/rfidguidelines.cfm
accessed on 14/11/2008
http://www.rfid-library.com/?gclid=CISqoZ3Q55cCFcIupAodxThsDg accessed on 16/11/2008
http://www.rfidgazette.org/libraries/ Accessed on 25/12/2008
5
Multimodel Recognition Implementating Fuzzy Decision Trees
+
M. Gopal and Susmita Deb*
Abstract
It has been found that crisp decision about genuine and imposter match is not efficient enough to implement for
practical purpose. More ever single model is not reliable for genetic factors, aging, environmental or
occupational reasons.
So multi model fuzzy decision based recognition is suggested to take into account the uncertainities. It is
observed that accuracy of recognition is high. Three models are considered: Iris, Fingerprint and Palmprint.
Keywords
Fuzzy Decision Tree, Iris, Fingerprint, Palm Print, FAR, FRR, Matching Score, WEF.
Fuzzy Decision Trees
Fingerprint Recognition
A statistical property known as information gain is
used to measure the worth of attribute and based on
worth of attribute a decision tree is grown.
A fingerprint is the pattern of ridges and valleys on
the surface of a fingertip.
Fingerprint images is converted to gray-scale
image, then normalized, oriented and converted to
binary image. The image is then thinned and
complemented. Only ridge ending and ridge
bifurcation minutiae are considered[2]. Their
position and orientation is found out. Spur, border
minutiae, hole, bridges are eliminated[5].
Fuzzy Id3 is the extension of this classical decision
tree to extract knowledge in uncertain classification
problems which applies fuzzy set theory to
determine the structure of the tree[1].
Fuzzy C-mean clustering algorithm is applied.
Example:
Ridge Oriented Finger Print
0
Scanned Finger Print
Normalised Finger Print
50
100
For 3 attributes A 1, A 2,A3.
150
200
250
300
0
Filtered Image of Finger-Print
50
100
150
200
250
Thinned Image of Finger Print
Post-processed Finger-print
Finger Print with Minutiae (Ridge End & Ridge Bifurcation)
________________________________________________________
+
*
Professor, Indian Institute of Technology, Delhi
PhD fellow, Indian Institute of Technology, Delhi
6
Processed Image of Finger-print
300
350
400
Fingerprintt under test is translated, ro
otated, scaled
and matcheed with a fingeerprint image in
n database.
Histogram of genuine
g
finger-print
Histogram of imp
poster finger-print
80
5000
70
4500
4000
60
3500
50
3000
40
2500
2000
30
1500
20
1000
10
0
500
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
0
1
0
0.1
0.2
Matching Score
0.3
0..4
0.5
0.6
0.7
0.8
Matching
g Score
False Rejection Ratio & False Acceptance Ratio plot
Wavelet Energy Function (WEF) is used as feature
vector (4)
100
90
80
FAR& FRR
70
60
The wavelet energy in horizontal, vertical and
diagonal directions at ith level can be, respectively,
defined as :
50
40
30
FR
RR
20
FAR
10
0
0.1
T
0.2
0.3
0.4
0.5
0.6
0.7
0.8
hreshold
Palm Prin
nt Recognition
n
Principal liines, wrinkles and ridges are the features
in a palm pprint. Principall lines, wrinkles and ridges
can be aanalyzed in low, medium and high
resolution respectively as principal lines are
thickest, w
wrinkles are thinner and ridges are the
thinnest. T
Therefore a multi resolution method is
used to anaalyze the palm print.
Pre-processsing is done to
o capture the same
s
area of
palm.
Where M is the total wavelet decomposition level,
can describe the global details feature of a palm
effectively.
Wavelet Energy Feature
The detail images are divided into SS non-overlap
Blocks equally and then the energy of each block
Are computed. The energies of all the blocks are
used to construct a vector. Finally, the vector is
normalized by the total energy. This normalized
vector is named Wavelet Engery Feature (WEF). If
an image is decomposed to J level, the length of its
WEF is 3SSJ.
a b cd
a.
b.
c.
d.
Captured palm
moothen palm
Sm
Paalm with boundary
Seegmented portion is highlighted.
City block distance between two palm print feature
vector is used as matching criterion.
7
Plot of city block distanc
ce of imposter & genuine
e palm
boundaary) the outer bboundary is thee edge of a circcle
with a radius
r
of ri = 34 + rp.
0.9
9
0.8
8
City Block Distance
0.7
7
0.6
6
Imposter Palm
0.5
5
0.4
4
0.3
3
0.2
2
Genuine Palm
0.1
0
0
50
100
150
200
250
300
350
400
45
50
500
P
Palm
No.
Histogram of im
mposter palm
3000
Histogra
am of genuine palm
Norma
alization
45
2500
40
35
2000
30
25
The no
ormalization prrocess projectss iris region in
nto
a consttant dimension
nal ribbon so that
t
two imag
ges
of the same iris under different conditions hav
ve
charactteristic featuress at the same sp
patial location..
Cartesiian to polar ttransformation is done whicch
projectts the iris diskk to a rectangu
ular region wiith
prefixeed size.
1500
20
1000
15
10
500
5
0
0
0
0.1
0.2
0.3
3
0.4
0.5
0.6
0.7
0.8
0
0.2
0.4
0.6
0.8
1
1.2
1.4
City Block Distance
Cityy Block Distance
False Rejection Ratio & False Acceptance Ratio Plot
45
40
35
FRR & FAR
30
25
FRR
20
15
FAR
10
5
0
0.4
0.45
0.5
0.55
0.6
0.65
T
Threshold
Iris Recognition
Iris is high
hly reliable bio
ometric technollogy because
of its stabiility, and the high
h
degree of variations in
irises betw
ween individ
duals. Iris is prefiltered,
localized, normalized,
n
deenoised, enhanced and then
feature is extracted
e
using
g Wavelet.
De-no
oising and en
nhancement
For sy
ymmetry of iriis half of the iris with som
me
upper and lower boundary is considered is
consideered.
High frequency noise is remov
ved, contrast is
improv
ved with the heelp of histogram
m equalization..
Prefilterin
ng
abcd
a.
b.
c.
d.
Original Image
O
Complemented Image
Fiilling holes
Prreprocessed Im
mage
Featurre extraction
Localization
ure vector connsists of 4-leveel decompositio
on
A featu
coefficients of image via wavelet allong vertical an
nd
ntal direction.
horizon
a two nonIris bounddaries can bee supposed as
concentric circles. We must determin
ne the inner
b
witth their relevan
nt radius and
and outer boundaries
centers. Our method is based on iris localization
using imag
ge morphologiical operators and suitable
threshold (50). After pu
upil edge deteection (inner
8
Recognition
Hamming distance between two iris codes is used
as matching criterion.
HD =
1
N
∑
( XOR (CodeA(i ), CodeB (i )) length ( code )
Histogram of imposter iris
Histogram of genuine iris
4000
35
3500
30
3000
25
2500
20
2000
15
1500
10
0
Conclusion
1000
5
500
0.2
0.25
0.3
0.35
0.4
0.45
0.5
0.55
0.6
0
0.4
0.65
0.45
0.5
0.55
0.6
0.65
0.7
Our work involves application of fuzzy decision
trees in biometric. As every biometric recognition
method suffers from some loaf holes, like synthetic
finger print, palm print can replace original one,
dilation of eye can affect iris recognition but in our
case we have put a check for dilation, if it found to
be dilated, image is rejected. Deciding threshold for
declaration of genuine and imposter is quite a
difficult task. For any threshold point FAR (False
Acceptance Rate) & FRR (False Rejection Rate)
are not ignorable. So we are suggesting a
hybridization of the methods, fuzzyfying the
thresholds and taking decision of “
matching”
or
“
not matching”
using fuzzy decision trees.
References
0.75
Hamming Distance
Hamming Distance
False Rejection Ratio & False Acceptance Ratio plot
50
45
40
FAR & FRR
35
30
25
FAR
20
FRR
15
10
5
0
0.38
0.4
0.42
0.44
0.46
0.48
0.5
0.52
0.54
Threshold
Result
Database
5 different images for iris, palm print, finger print
are collected from 50 persons.
1.
Data 62250 x 3, 2 classes.
2.
Hamming Distance between one iris image of a
person and rest four iris images of the same person
(genuine class), 49X5= 245 iris images of different
persons (imposter class) are found out. Similarly
city block distance and matching score for palm
print and fingerprint are found out. Database is
constructed with these data and specified classes.
3.
Randomly chosen 80% data is used for training and
rest 20% data used for testing.
4.
Randomly uncertainity of data is also considered.
The time taken for growing whole tree is
159.386000 seconds
----------------Testing started--------------ans =The time taken for testing is 1.201000
seconds
leaf_no =
5.
3
Accuracy = 98.2892
9
Guoxiu Liang, A comparative study of
three Decision Tree algorithms: ID3,
Fuzzy ID3 and Probabilistic Fuzzy ID3,
Informatics & Economics, Erasmus
University, Rotterdam, Augustus, 2005.
Anil K. Jain, Arun Ross, and Sharath
Pankanti,: A Tool for Information
Security,
IEEE
transactions
on
information forensics and security, vol. 1,
no. 2, June 2006.
Ahmad N. Al-Raisi, Ali M. Al-Khouri,
Iris recognition and the challenge of
homeland and border control security in
UAE, Abu Dhabi Police GHQ, Ministry of
Interior, Abu Dhabi, United Arab
Emirates, Telematics and Informatics,
June 2006.
Xian-Qian WU, Kuan-Quan Wang, David
Zhang, “
Wavelet Based Palmprint
Recognition”
,
First
International
Conference on Machine Learning and
Cybernetics, Beijing, 4-5 November 2002,
0-7803-7508-4/02/ 2002 IEEE.
Raymond Thai, Fingerprint Image
Enhancement and Minutiae Extraction,
The University of Western Australia,2003
Specialized Global Features for Off-line Signature Recognition
H. B. Kekre
Department of Computer Engineering,
V A Bharadi
Department of Electronics and Telecommunication.
Thadomal Shahani Engineering College, Bandra (West), Mumbai-50.
[email protected], [email protected]
verification of signature. We divide the features in
Abstract
two types
In this paper we discuss specialised global features
1. Standard Global features
that can be used for off-line signature recognition.
These features are mainly morphological features.
2. Special features
These features can be used to develop an accurate
We discuss four specialized features they are
off-line signature recognition system. These
1. Signature Trisurface area
features are cluster based features they include
2. Grid & Texture Information features
Walsh coefficients of pixel distribution, Vector
3. Walsh Coefficients of Horizontal and vertical
Quantization based codeword histogram, Grid &
pixel distributions.
texture information features and Geometric centers
4. Vector Quantization based-Codeword Histogram
of a signatures. We present the FAR, FRR achieved
These features are used and tested in development of
by the system using these features.
an offline signature system. In this paper we provide
an overview of this feature set.
INTRODUCTION
Signature verification is an important research area
CONVENTIONAL GLOBAL FEATURES
in the field of authentication of a person [3]. We can
Pre-processing is the first step of any signature
generally distinguish between two different
recognition system, where we normalize the
categories of verification systems: online, for which
signature to make it a binary template. This
the signature signal is captured during the writing
normalized template is then used for feature
process, thus making the dynamic information
extraction. The extracted feature vector is used for
available, and offline for which the signature is
comparison and classification of signatures. The
captured once the writing process is over and thus,
performance of signature recognition system is
only a static image is available. In this paper we deal
greatly influenced by the feature set. The prewith Off-line signature verification System. Here
processing is shown in Fig. 1. Signature on the left is
we discuss a set of parameters that can be used in any
original scanned signature; the signature on the right
of the signature verification system for
is the pre-processed signature.
classification of the signatures.
The steps in pre-processing are as follows
Over the years, many features have been proposed
1. Noise Removal
[7-10] to represent signatures in verification tasks.
2. Intensity Normalization
We distinguish between local features, where one
3. Scaling
feature is extracted for each sample point in the input
4. Thinning
domain, global features, where one feature is
This signature template is then used for feature
extracted for a whole signature, based on all sample
extraction.
points in the input domain, and segmental features,
where the signature is subdivided into segments and
one feature is extracted for each segment.
Here we focus on global features. Signature
Figure 1 Pre-processing of a signature
verification can be considered as a two-class pattern
recognition problem, where the authentic user is a
The conventional features that are considered are as
class and all the forgers are the second class. Feature
follows
selection refers to the process by which descriptors
1. Number of pixels - Total Number of black pixels
(features) extracted from the input-domain data are
in a signature template
selected to provide maximal discrimination
2. Picture height - The height of the signature image
capability between classes.
after horizontal blank spaces removed.
Here we consider only global features for
10
3. Picture width - The width of the image with
vertical horizontal blank spaces removed
4. Maximum horizontal projection - The
horizontal projection histogram is calculated and
the highest value of it is considered as the maximum
horizontal projection.
5. Maximum vertical projection - The vertical
projection of the skeletonized signature image is
calculated. The highest value of the projection
histogram is taken as the maximum vertical
projection.
6. Baseline shift - This is the difference between the
y-coordinate of centre of mass of left and right part.
7. Dominant Angle feature - Dominant angle of the
signature.
8. Signature surface area - here we consider the
modified tri-area feature [26]
Features 1 to 6 are self explanatory, we elaborate
feature 7 & 8 in detail.
Figure 3 : Extraction of the 'trisurface' feature signature
(a) original Signature (b) Normalized Signature (c) trisurface
area calculation
The trisurface area calculation requires area
generation for the signature. This gives the three
components of signature area a1, a2, a3. It was
found that the trisurface area feature gives better
classification rate. The features discussed above as
shown in Table I for the signature shown in fig 3.
Table I
Feature Extracted from signature shown in Fig.3
Sr.
Feature
Extracted Value
No.
1
Number of Pixels
547
2
Picture Width (in pixels)
166
3 Picture Height (in pixels)
137
4 Horizontal max Projections
12
5
Vertical max Projections
15
6 Dominant Angle-normalized
0.694
7
Baseline Shift (in pixels)
47
8
Area 1
0.151325
9
Area 2
0.253030
10
Area 3
0.062878
DOMINANT ANGLE FEATURE
First, the signature image was separated vertically
into two equal parts. The position of the centre of
gravity in each part was calculated (A and B in Fig.
2). The angle between the horizontal axis and the
line obtained by linking the two centres of gravity
was the feature added to convert this angle in the
range of 0 to 1. A right triangle was considered using
the centres of gravity as the extreme points of its
hypotenuse, the row of the first centre of gravity and
the column of the other, intersecting to form the right
angle.
GRID & TEXTURE INFORMATION
FEATURE EXTRACTION
Grid and texture feature provide information
about the distribution of pixels and the distribution
density of the pixels [4]. Texture feature provide
information about the occurrence of specific pattern
in the signature template. These features are not
based on single pixel or whole signature but they are
based on group of pixels or signature segments,
hence these are cluster features. Grid feature gives
information about the pixel density in a segment and
texture feature gives information about the
distribution of specific pixel pattern. These features
are discussed in detail here.
Grid information feature
We have the pre-processed signature template. The
resolution is 200*160 pixels. To extract the grid
information feature from the signature we use the
following algorithm.
Algorithm for grid feature extraction
1. Divide the skeletonized image into 10 X 10 Pixels
blocks. We get total 320 blocks.
Figure 2 : Extraction of the 'Dominant Angle' features
SIGNATURE TRISURFACE FEATURE
The surface area of two visually different signatures
could be the same. For the purpose of increasing the
accuracy of a feature describing the surface area of a
signature, the 'trisurface' [4] feature is implemented,
as an extension, in which the signature is separated
into three equal parts, vertically. Fig. 3 illustrates
this concept. The surface area feature is the surface
covered by the signature, including the holes
contained in it. The number of black pixels in the
surface is counted, and the proportion of the
signature's surface over the total surface of the
image is calculated. This process is used for the three
equal parts of the signature, giving three values
between 0 and 1.
11
2. For each block segment, calculate the area (the
sum of foreground pixels). This gives a grid feature
matrix (gf) of size 20 X 16
3. Find minimum and maximum (min, max) values
for pixels block. Ignore block with no pixels.
4. Normalize the grid feature matrix by replacing
each nonzero element 'e i, j' by
of specific pixel pattern.
To extract the texture feature group, the cooccurrence matrices of the signature image are used.
In a grey-level image, the co-occurrence matrix pd
[i, j] is defined by first specifying a displacement
vector d = (dx, dy) and counting all pairs of pixels
separated by d and having grey level values i and j.
In our case, the signature image is binary and
therefore the co-occurrence matrix is a 2 X 2 matrix
describing the transition of black and white pixels.
Therefore, the co-occurrence matrix Pd [i, j] is
defined as
This gives matrix with all elements within the
range of 0 and 1. The results are normalized so that
the lowest value (for the rectangle with the smallest
number of black pixels) would be zero and the
highest value (for the rectangle with the highest
number of black pixels) would be one.
5. The resulting 320 elements of the matrix (gf) form
the grid feature vector.
A representation of a signature image and the
corresponding grid feature vector is shown in Fig.
5.1. A darker rectangle indicates that for the
corresponding area of the skeletonized image we
had the maximum number of black pixels. On the
contrary, a white rectangle indicates that we had the
smallest number of black pixels.
Where p00 is the number of times that two white
pixels occurs, separated by d. p01 is the number of
times that a combination of a white and a black pixel
occurs, separated by d. p10 is the same as p01. The
element p11 is the number of times that two black
pixels occur, separated by d. The image is divided
into eight rectangular segments (4 X 2). For each
region the P (1, 0), P (1, 1), P (0, 1) and P (-1, 1)
matrices are calculated and the p01 and p11
elements of these matrices are used as texture
features of the signature.
Figure 5 shows the grid feature matrix. These values
are scaled by 100 and converted to integer type for
representation purpose only. While processing the
feature vector we use the normalized values only.
Texture feature [4]
Texture feature gives information about occurrence
Figure 6 Pixel positions while scanning for the displacement vector.
We use this procedure to calculate the texture feature
matrix the signature template is divided in eight
segments as follows,
12
similarity between to sequences of the
coefficients and hence the similarity of the two
signatures.
VECTOR QUANTIZATION BASED-CODEWORD
HISTOGRAM
Next we propose a parameter based on Vector
Quantization of a signature template. We segment
the signature into blocks to form the vectors. These
vectors are represented by codewords from the
codebook. Here the codebook used for mapping the
image block plays very important role. Here the
objective of the vector quantization is not to
compress the image but to classify the signature and
verify the authenticity. Hence we extend the
approach to serve our purpose. We use the codeword
distribution pattern as a characteristic of the
signature.
Figure 7 Pixel positions while scanning for the displacement vector
(representation).
Figure 8 Texture feature matrix for signature shown in Fig 7.
WALSH TRANSFORM OF PIXEL
DISTRIBUTION
Here we propose a novel parameter for
signature recognition. This parameter is derived
from the Pixel Distribution of the signature. This is
shown in Fig. 9.
Figure10 Hadamard Coefficients of Horizontal pixel distribution
(Upper Plot) and their sequenced arrangement (Lower Plot) of the
signature mentioned in Fig3
The frequency of the codewords occurring in the
distribution is calculated and the histogram is plotted
for the codeword group against the number of
occurrences and finally these distributions are
compared using a similarity measure used in [5],
which is based on Euclidian distance.
The normalized Signature template is taken, the
image size considered is 200 x 160 Pixels, this image
is divided into 4 x 4 pixel blocks; each block is
treated as a code vector. Overall 2000 blocks will be
there.
The codebook is having all the 216 codewords
initially then the invalid code vectors are removed
by thinning process as shown in Fig 11., and the
remaining code vectors are sorted as there
appearance in gray code table so that the consecutive
code vectors will have minimal change. Such similar
code vectors are grouped to form a vector groups.
The codeword histogram is generated for given
signature template which will be used for
comparison. This operation is illustrated in Fig. 12.
Figure 9 Signature and its horizontal and vertical pixel
distributions
We use Hadamard transform to the horizontal
pixel distribution points (Hi) and vertical pixel
distribution points (Vi); Hadamard transform is fast
to calculate and gives moderate energy compaction.
This operation gives the horizontal Hadamard
coefficients (HH i ) and vertical Hadamard
coefficients (VHi). We use Kekre's [10] algorithm to
get the Walsh coefficients from the Hadamard
coefficients. This operation yields Walsh
coefficients of the histograms (SHHi, SVHi). The
coefficients are plotted and shown in figure 4.
These coefficients are calculated for the test
signature as well as standard signature and
Euclidian Distance is evaluated to measure the
13
The thinning operation gives 11756 valid
codewords. This is the set of codewords used for
group formation. Next step is to form codeword
groups. To form codeword groups we start with
initial codeword chosen from the set and compare
with the other codewords to find group of
codewords with minimum hamming distance. For
current scenario we have constructed 240 groups of
50 codewords each. We form one extra group for the
codewords which do not participate in any group.
The observed intra group hamming distance is in the
range 2-6 and in extreme case distance such as 8-9
are observed.
The codeword histograms can be compared using
the similarity measure shown in Equation 5.3. For
all these features we have used user specific
thresholds which give better results as compared to
the common thresholds. We have used set of training
signatures containing 8 signatures. The thresholds
are calculated by using training procedure discussed
in [1].
RESULTS
For testing we have used total 800 signatures from
75 users and 150 forgery signatures including
skilled as well as simple forgeries. We have tested
individual modules for each cluster based feature
discussed above and the final system implementing
the feature set together. The final system uses user
specific thresholds and training mechanism
discussed in [1].We have implemented a weighted
comparator based classifier in the final system. The
metrics FAR & FRR [4] are evaluated for each
feature. They are as follows,
Table I
False Acceptance and False Rejection Ratios reported by the
Figure 12 Vector Quantization applied for signature template
Similarity Measure [5]
Given an encoded image having similar
representation as a text document, image features
can be extracted based on codevectors frequency.
The feature vector for signature template I1 and the
feature vector for test signature I2 are given below,
For I1, It is given by I1= {W11, W21, … Wn1} (5.1)
For I2, It is given by I2= {W12 , W22 , … WN2 }
(5.2)
In the histogram model, Wij = Fij , where Fij is the
frequency of group Ci appearing in Ij .Thus, the
feature vectors I1 and I2 are the codeword
histograms. The similarity measure is defined as
Sr.
No.
1
2
3
4
5
6
Feature
Geometric Centres
Walsh Coefficients
Vector Histogram
Grid Feature
Texture Feature
Final System
FAR
FRR
16%
40%
12%
8%
14%
5.70%
14%
42%
22%
12%
20%
8.80%
CONCLUSION
In this paper we have discussed specialized
global features. These feature set can be used to
develop an Off-Line signature recognition system.
We have developed an Off-line signature
recognition system based on these features. The
system uses all these features and user specific
thresholds. The system is having accuracy of 94.3%.
These features are easy to implement and can be
explored in a deeper approach to achieve higher
recognition rates.
(5.3)
Where the distance function is
(5.4)
We get the codeword histogram as shown in Fig. 13
REFERENCE
[1] B. Majhi, Y S Reddy, D Prasanna Babu,
“NovelFeatures for Off-line Signature verification”,
International Journal of Computers,
Communications & Control Vol. I (2006), No. 1, pp.
Figure 13 Codeword Histogram for Signature shown in Fig. 9
14
17-24.
[2] H. Lei, S. Palla, V. Govindrajalu, “ER2- an
Intuitive similarity measure for online signature
verification”, State University of New York at
Buffalo, Amherst NY 14260, USA, Research paper
by CEDAR
[3] A. Kholmatov , “Biometric Identity Verification
Using On-Line & Off-Line Signature
Verification”,Master of Science thesis, Sabanci
University,S 2003
[4] H. Baltzakis, N. Papamarkos, A new signature
verification technique based on a two-stage neural
network classifier, Engineering Applications of
Artificial Intelligence 14 (2001), 0952- 1976/01/$ PII: S0952
[5] L. Zhu, A. Rao & A. Zhang, “Theory of
Keyblock-based Image retrieval”, ACM Journal,
Volume V, No. N, March 2002, PP 1-32
[6] H B Kekre, T. Sarode, “Clustering Algorithm for
codebook generation using Vector Quantization”,
Proceedings of National Conference on Image
Processing 2005, TSEC, Mumbai.
[7] A. K. Jain, A. Ross, S. Prabhakar, “An
Introduction to Biometric Recognition”, IEEE
Transactions On Circuits And Systems For Video
Technology, Vol. 14, No. 1, January 2004
[8] J. Soldek, Shmerko, et.al, “Image Analysis and
Pattern Recognition in Biometric Technologies”,
Proceedings International Conference on the
Biometrics: Fraud Prevention, Enhanced Service,
Las Vegas, Nevada, USA, 1997, pp. 270-286
[9] H. Dullink, B. van Daalen, J. Nijhuis, L.
Spaanenburg, H. Zuidhof, “Implementing a DSP
Kernel for Online Dynamic Handwritten Signature
Verification using the TMS320 DSP Family”,
EFRIE, France December 1995 SPRA304.
[10] J. K. Solanki, “Image Processing using fast
orthogonal transform”, PhD Thesis Submitted to
IIT Mumbai, 1978, pp. 30, 31
15
Fingerprint Recognition in DCT Domain
1
M. P. Dale, 2S. N. Dharwadkar, 3M. A. Joshi
1,2 MES’s College of Engineering, Pune
3 College of Engineering, Pune
used to compare the corresponding pixels of the
fingerprint images in many of rotating and shifting.
In ridge feature based matching, the feature of ridge
is extracted from the gray scale image and
represented by other parameters. Those parameters,
depending on tools used in feature extraction
process are then used for matching fingerprints. The
GABOR filter-based method is an example of ridge
feature based matching [4]. Using the similar
approach transforms can be employed for feature
extraction. Ridge structure of fingerprint can be
considered as oriented texture pattern having
dominant spatial frequency. Transform coefficient
of an image tend themselves as new feature, which
have the ability to represent the regularity,
complexity and some texture feature of an image.
This paper present the fingerprint recognition
method based on Discrete Cosine Transform (DCT)
approach. This approach is applied first on cropped
images in experiment I while the same approach is
applied on resized images in experiment II. With
proper selection of DCT based features, a superior
performance is achieved compared to the Discrete
Wavelet Transform (DWT) based method proposed
in [3]. To demonstrate the efficiency of our
approach, the performance in terms of % Genuine
Acceptance Rate (%GAR) andprocessing time
required for training and testing between DCT and
DWT are compared. Section 2 describes the
experimental settings and database creation. The
DCT and DWT basics are discussed section 3.
Feature description using DCT is briefed in section
4. Results and discussions are presented in detail in
section 5. Conclusions are finally drawn in section 6.
Abstract
Fingerprint verification is one of the most reliable
personal identification methods and it plays a very
important role in forensic and civilian applications.
This paper proposes DCT features for fingerprint
matching. In the feature extraction process,
fingerprint image is cropped and quartered around
core point. Each quartered sub-image is DCT
transformed and standard deviation of properly
grouped transformed coefficients is calculated as
feature. Such standard deviations from four subimages gives feature final vector Euclidean and
Canberra distance are used for final matching in
identification mode. The results are represented in
terms of % Genuine Acceptance Rate (GAR). The
training and testing time is also compared.
Results are further improved using resizing of
fingerprint images.
1. Introduction
Fingerprint recognition is considered one of the
most reliable and mature technologies and has been
extensively used in personal identification.
Fingerprints are graphical patterns of ridges and
valleys on the surface of fingertips, the formation of
which is determined during the first seven months of
fetal development. One kind of widely used feature
is minutiae, which is usually defined as the ridge
ending and the ridge bifurcation. Most of the studies
of fingerprint recognition are based on minutiae
features [1]. Despite its simplicity and efficiency in
storage, minutiae-based representation has its
drawbacks in practical usage. As a kind of local
feature, the minutiae is difficult to be extracted
robustly due to various factors such as large
displacement, different pressure, noise etc. Further
the spurious minutiae will degrade the performance
seriously [2]. Also in the matching step of minutiae
based algorithm, minutiae need to be revised
according to the template to conquer the
translational and the rotational distortion of the
fingerprint images which is time consuming and
make the fingerprint identification system
unpractical on large fingerprint database.
Other approaches used for fingerprint matching are
correlation based and ridge feature based matching.
The correlation based matching is a straight method
2. Experimental settings and database creation.
To extract transform (DCT) features from
fingerprint, gray- scale fingerprint images from 72
individuals were collected using Biodesk
fingerprint optical scanner from NITGEN company
having the resolution of 500dpi. The subjects mainly
consisted of student and staff volunteers from our
Institute in the age group of 20 to 50 and 40% are
male. The size of the original image grabbed is
248x292 as shown in Figure 1. Eight images per
person are collected at different timings. Out of
those 8 images k (2, 4 or 6) images are used for
16
training and all the images in database (72 X 8 =
576) are used for testing.
like Discrete Fourier Transform (DFT), DCT can be
factored as Kronecker products of several smaller
sized matrices, which leads to fast algorithms for
their implementation.
The DCT is similar to DFT, since it decomposes a
signal into a series of harmonic cosine functions
given by
where 0 ≤ u ≤ M-1, 0 ≤ v ≤ N-1. The DCT is real,
orthogonal, fast and separable transform. It has
excellent energy compaction for highly correlated
data. DCT convert images from time (spatial)
domain to frequency domain to decorrelate pixels
while DWT provides good localization both in time
and spatial frequency domain. The DWT refers to a
class of transformations that differ not only in
transformation kernel employed but also in the
fundamental nature of those functions and the way
in which they are applied. The various transforms
are related by the fact that their expansion functions
are “small waves” kernels (hence the name
wavelets). The DWT is identical to hierarchical sub
band system where the sub bands are
logarithmically spaced in frequency and represent
octave band decomposition.
(A)
(B)
4. Feature description using DCT
In experiment I, the algorithm first find out the core
point of the image using slope technique described
in paper [5]. Image is then cropped around the core
point into size of 64x64. This gives translation
invariance and also considers that area of fingerprint
around the core point where most of the information
is concentrated. Figure 2(a) shows original image
and Figure 2(b) shows the cropped image around
core point which is further divided into four sub non
overlappingsub-images as shown.
(c)
Figure 1 (a). Original Fingerprint Image of size 248x292 1
(b) 8 images cropped around core point. 1 (c) 8 resized
images.
Considering most of the information of fingerprint
is near the core point, in experiment I we first
detected the core point with slope technique [5] and
then fingerprint image is cropped around it of size
64X64. Figure 1(b) shows 8 image samples of one
person cropped around core point. For experiment II
instead of using the core point and cropping, we
used resizing of whole fingerprint image to a size of
64X64. Figure 1(c) shows an example of resized
images of one person. This not only reduced large
time of core point detection but also improved
%GAR.
3. DCT and DWT basics
The term image transform refers to a class of unitary
matrices used for representing images. Images are
expanded in terms of a discrete set of basis arrays
called basis images[8]. Energy conservation, energy
compaction, decorrelation are the important
properties of these transforms. Image transforms
(a)
(b)
Figure 2. (a) Fingerprint image (b) Four 32x32 pixel
sub−images, cropped and quartered at its centre.
The 2-D transform (DCT) is applied on each
subimage separately [7]. The DCT transformed
17
coefficients are now grouped into different
frequency bands (blocks) as shown in Figure 3. For
eachnumbered block the standard deviation is
calculated using formulas given in equation (2) and
stored as feature vector.
Table 1 (a) and (b) shows the % GAR based on
above mentioned two distances respectively. The
DWT results are obtained according to paper [3]
with 3 level decomposition of each sub-image and
taking standard deviation as feature of each
decomposed detail band. Table 2 shows the time
required for training with 2 images per person and
testing time in identification mode with all (576)
images without considering the core point detection
time. Timings are calculated. In our test machine
used is Pentium R D CPU 2.8 GHz.
where p(i.j) is the transformed value in (i,j) for any
block or sub-band of size N x N. Such features are
calculated from four images and hence form a total
of 36 features will form feature vector which is used
in enrollment as well as in matching phase. These
are stored as float values so take 144 bytes to store
the feature vector for one person.
Table 1(a). %GAR for cropped images with
Euclidean distance (TS − Training set)
Method
DCT
Wavelet-db9
Figure 3. Grouping of bands in DCT
%GAR
TS=2
TS=4
72.39 78.99
66.14 75.52
TS=6
82.81
79.16
Table 1(b). %GAR for cropped images with
Canberra distance (TS− Training set)
It is found from fingerprint image that, as image is
traversed towards core point from outer periphery,
the distance between ridges becomes less and area
surrounding the core is denser. From recognition
point of view, it is better to extract more information
of ridges and core area. In the DCT domain this area
corresponds to top right, bottom left and bottom
right corner, that is nothing but mid and high
frequency region. In this area, by considering only 9
blocks per sub-image and their corresponding
standard deviations as feature vector the recognition
rate is calculated.
Method
DCT
Wavelet-db9
%GAR
TS=2
TS=4
78.12 82.29
75
79.16
TS=6
85.93
84.89
Table 2. Training and testing time.
Method
DCT
Wavelet-db9
5. Results and discussion
During the training phase 72 person images are
given as input. The training set used per person may
be 2, 4 or 6 fingerprint images per person. Because
more than one image is used in training phase the
final feature vector is taken as average standard
deviation. Euclidean distance and Canberra
distance given by (3) and (4) is used to find out the
minimum distance match between two dimensional
feature vectors of database image (x) and query
image (y).
Time in seconds
Training
Testing
5.76
6.6
18
53
As seen from the tables, the DCT results are better in
terms of recognition rate (%GAR) as well as training
and testing time as compared to wavelet. Further
Canberra distance gives better results as compared
to Euclidean results [9].
The major drawback of above method is time
consuming task of core point detection and still the
%GAR is required to be improved. In experiment II,
to try out the algorithm for whole image at the same
time to restrict the size of image to 64X64, resizing
of images is done as shown in Figure 1(c). After
resizing of images the above three algorithms are
applied as it is. Results in terms of %GAR are shown
in Table 3 (a) and (b).
18
Table 3(a). %GAR for resized images with
Euclidean distance (TS− Training set)
Method
DCT
Wavelet-db9
%GAR
TS=2
TS=4
71.35 86.11
70.83 82.98
presented, it is concluded that DCT coefficients and
their proper combination (bands) results in very
informative description for fingerprint pattern
recognition. The experimental results also shows
that, with method discussed applied on resized
images, a higher recognition rate together with a
lower complexity could be achieved in fingerprint
matching system as compared to the wavelet
features. The results are obtained without any
preprocessing (enhancement) of images. In future,
the algorithms will be implemented on standard
database and investigation will be carried out in
terms of the possibilities of feature fusion to
improve %GAR.
TS=6
90.75
89.93
Table 3(a). %GAR for resized images with
Canberra distance (TS− Training set)
Method
DCT
Wavelet-db9
%GAR
TS=2
TS=4
73.78 86.28
74.62 85.76
TS=6
93.75
91.66
7. References
The obtained results after resizing clearly shows
improvements in %GAR with DCT again giving the
better results. The second major advantage here is in
terms of time. The core point detection
approximately takes 10 sec for one fingerprint
image while resizing takes only 16 msec. Further
DCT implemented with FFT approach takes 4 times
less time in training and testing phase. From the
results it is obvious that the DCT coefficients have
more variations than the DWT, which provides a
higher resolution for fingerprint features matching.
Hence the informative features derived from DCT
coefficients are then more distinguishable than that
from the DWT coefficients. According to study , the
impact of image quality degradation on
performance of on fingerprint matching systems
shows that this type of ridge based methods perform
better than minutiae based method on lesser quality
images.
[1] D. Maltoni, D. Maio, A.K. Jain and S. Prabhakar,
Handbook of Fingerprint Recognition, Springer, New
York, 2003.
[2] Dingrui Wan and Jie Zhou, “Fingerprint Recognition
Using Model-Based density Map,” IEEE Transaction on
Image Processing, Vol. 15, No. 6, 2006
[3] M. Tico, E. Immonen, P. Ramo, P. Kuosmanen and J.
Saarinen, “Fingerprint Recognition Using Wavelet
Features”, The 2001 IEEE International Symposium on
Circuits and Systems, Vol.2, pp. 21-24, 2001.
[4] Muhammad Umer Munir and Muhammad Younas
Javed, “Fingerprint Matching using Gabor Filters”,
National Conference on Emerging Technologies 2004.
[5] Anil K. Jain, Salil Prabhakar, Lin Hong and Sharad
Pankanti, “Filterbank based Fingerprint Matching”, IEEE
Transaction on Image Processing, Vol. 9, No. 5, May
2000.
[6] S. Tachphetpiboon and T. Amornraksa, “Applying FFT
Features for Fingerprint Matching,” IEEE Trans., 2006.
[7] T. Amornraksa and S. Tachaphetpiboon, “Fingeprint
Recognition using DCT Feature,” Electronic Letters, Vol.
42, No. 9, 2006.
[8] A. Jain, Fundamentals of Digital Image Processing,
Englewood Cliffs, NJ: Prentice-Hall, 1989.
[9] Mahesh Kokare, B. N. Chatterji and P. K. Biswas,
6. Conclusions and Future work
From the exhaustive experiments conducted with
actually captured fingerprint images and the results
19
AUTOMATIC IDENTIFICATION TECHNIQUES
Frequency Ranges and Radio Licensing Regulations
Mr. Rahul Kulkarni
Senior Manager
Siemens
Mrs. Kirti S. Agashe
HOD, Industrial Electronics Dept.
V.P.M.'s Polytechnic,
Chendani Bunder Road, Thane 400601, Email: [email protected]
Abstract
Automatic Identification and Data Capture (AIDC) is the method of automatically identifying objects, collecting
data and storing that data directly into computer systems for further processing and analysis. These
technologies typically include bar code, OCR, Biometrics, Smart card, Voice Recognition and Radio
Frequency Identification (RFID). These all techniques are commonly referred to as AIDC “Automatic
Identification,” “Auto-ID,” or "Automatic Data Capture."
Radio frequency identification (RFID) is comparatively a new AIDC technology, first developed in 1980's.
RFID has found its importance in a wide range of applications because of its capability to track moving objects.
These automated wireless AIDC systems are effective in environments where barcode labels could not
survive.
This paper highlights on the various techniques of Auto Identification in brief and about the Frequency ranges
and radio licensing regulations for the widely accepted Auto Identification methods and other communication
applications implemented in the same range.
Automatic identification procedures (Auto-ID) have become very popular in many service industries,
purchasing and distribution, industry, manufacturing companies and material flow systems. Automatic
identification provides the information about people, animals, goods and products in transit.
The most important automatic identification techniques include
 Barcode Systems
 Optical Character Recognition (OCR)
 Biometric Procedures: Voice Identification & Fingerprinting Procedures (Dactyloscopy)
 Smart Cards
 Radio Frequency Identification (RFID)
Identification with extremely cheap barcode labels was a revolution in identification system and has proved to
be successful over last 20 years. The barcode is a binary code comprising a field of bars and gaps arranged in a
parallel configuration. They are arranged in a predetermined pattern and represent data elements related to an
associated symbol. The sequence, comprising of wide and narrow bars and gaps, can be interpreted
numerically and alphanumerically. The optical laser scanner read it. Approximately ten different barcode
types are in use at present. The most popular barcode is the EAN code (European Article Number), which
was designed to fulfill the requirements of the grocery industry in 1976.
The constraints of this technique are their low storage capacity and the inability in reprogramming.
Optical character recognition (OCR) technique was first used in the 1960s. Special fonts were
developed for this application so that they could be read by human being as well as by machines,
automatically. The most important advantage of OCR systems is the high density of information and the
possibility of reading data visually in an emergency.
Presently OCR is found to be useful in production, service, and administrative fields, banks for the
registration of cheques.
However, OCR technique has failed to become universally applicable due to the high price and the
complicated reading procedures.
20
Biometric procedures
Biometrics is defined as the science of counting and measurement procedures involving living beings.
Biometry is the general term for all procedures that identify people by comparing unmistakable and
physical characteristics of an individual. Such as, fingerprints and handprints, voice identification and, less
commonly used, retina (or iris) identification.
Voice identification
Recently, specialized systems have become available to identify individuals using voice verification (voice
recognition). In such systems, the user voice is stored in a digital form in computer and the identity of that
speaker is preserved. Next time the user is identified with the existing reference file.
Fingerprinting procedures (dactyloscopy)
For the identification of criminals, fingerprinting procedures are used since the early twentieth century. This
process applies the comparison of papillae and dermal ridges of the fingertips. This can be obtained from the
finger itself, as well as, from objects that the individual has touched.
When fingerprinting technique is used for personal identification, for example entrance procedures, the
fingertip is placed upon a special reader. The system forms a data record from the pattern it has read and
compares it with an existing stored reference pattern. Latest fingerprint ID systems require less than half a
second to identify a fingerprint.
Smart cards
A smart card is an electronic data storage system with additional computing facilities. It is incorporated into
a plastic card, which resembles a credit card. In 1984,the first smart card in the form of prepaid telephone
smart card was launched.
Smart cards are placed in a reader .The contact springs in the reader make a galvanic connection to the contact
surfaces of the smart card. The smart card is supplied with power and a clock pulse from the reader via the
contact surfaces. Data transfer between the reader and the card is via a bi-directional serial interface (I/O port).
The primary advantage of the smart card is the fact that the data stored on it can be protected against
unauthorized (read) access and manipulation. Smart cards provide all required information especially for
financial transactions and make it simpler, safer and Cheaper. But disadvantage of contact-based smart cards
is its vulnerability of the contacts to wear, corrosion and dirt. Its maintenance is expensive and shows
malfunctioning sometimes. In addition, readers that are accessible to the public cannot be protected against
vandalism.
Based upon the internal functionality two types of cards are available which are the memory card and the
microprocessor card.
Memory cards
In memory cards usually an EEPROM is used. Sometimes simple security algorithms are also incorporated.
These memory cards are very cost effective.
For this reason, memory cards are predominantly used in price sensitive, large-scale applications.
Microprocessor cards
Microprocessor cards contain a microprocessor along with a segmented memory (ROM, RAM , EEPROM
segments).
The mask programmed ROM stores an operating system for the microprocessor and is provided by the
manufacturer and can not be altered. The EEPROM usually contains application data and application
oriented programs.The RAM is the volatile temporary working memory.
21
Microprocessor cards are very flexible and are primarily used in security sensitive applications, for GSM
mobile phones and the new electronic cash cards.
RFID systems
The mechanical contact used in the smart card is not very practical. It is desired to have a contact less transfer
of data between the data-carrying device and its reader . In the ideal case, the power required to operate the
electronic data-carrying device should also be transferred from the reader using contact less technology. Such
procedures for the transfer of power and data,are offered in the contact less ID systems which are called RFID
systems (Radio Frequency Identification).
An RFID system comprises of two components
The transponder, which is located on the object tobe identified. Data is stored on this electronic datacarrying device and it normally consists of a coupling element and an electronic microchip
The interrogator or reader, which is the data capture device and is also called as the reader.
A reader typically contains a radio frequency module comprising of a transmitter and a receiver, a control unit
and a coupling element to the transponder. Many times readers are provided with an additional interface (RS
232, RS 485, etc.) to enable their communication with PCs and related systems.
Data
Contactless
RFID
Reader
Clock
Energy
Data carrier =
Transponder
Coupling Element
Application
(Coil, microwave
Antenna)
Frequency Ranges and Radio Licensing Regulations
5.1 Frequency Ranges Used
RFID systems generate and radiate electromagnetic waves hence they are legally classified as radio systems.
It is thus essential to ensure that under no circumstances, the function of other radio services such as radio,
television, mobile radio services (including police, security services, industry) marine radio services,
aeronautical radio services and mobile telephones should be disturbed by the operation of RFID systems.
Therefore the radio services are specifically reserved for industrial, scientific or medical applications. These
frequencies are classified worldwide as ISM frequency ranges (Industrial Scientific Medical), and they can
also be used for RFID applications. In addition to ISM frequencies, the entire frequency range below 135 kHz
(in North and South America) and <400 kHz (in Japan) is also suggested. This is because it is possible to
work with high magnetic field strengths in this range and particularly with inductively coupled RFID
systems. Thus the most important frequency ranges for RFID systems are 0135 kHz, and the ISM frequencies
around 6.78, 13.56 Hz, 27.125 MHz, 40.68 MHz, 433.92 MHz, 869.0MHz, 915.0MHz (not in Europe), 2.45
GHz, 5.8 GHz and 24.125 GHz.
Frequency range 9135kHz
The range below 135 kHz is mainly used by other radio services, as it has not been reserved as an ISM
frequency range. These frequencies can propagate within 1000 km continuously, at a low technical cost.
Aeronautical and marine navigational radio services operate in this range.
22
Frequency range 6.78MHz
The range 6.7656.795MHz is used as the short wave frequencies. The daytime propagation of these
frequencies range is up to a few 100 km and during nighttime transcontinental propagation is possible. This
frequency range is used by a wide range of radio services, like broadcasting, weather reports, aeronautical
radio services and press agencies.
Frequency range 13.56MHz
The range 13.55313.567MHz is situated in the middle of the short wavelength range. This range allows the
transcontinental connections during day time and is used by a wide variety of radio services like press
agencies and telecommunications (PTP) and remote control systems, radio equipment and pagers.
Frequency range 27.125MHz
The frequency range 26.56527.405 is allocated to CB radio across the entire European continent, in the USA
and in Canada.
The ISM range between 26.957 and 27.283MHz is situated approximately in the middle of the CB radio
range. Applications like inductive radio system, diathermic apparatus medical
application, high frequency welding equipment, remote controlled models and pagers are possible in this
range.
Frequency range 40.680MHz
The range 40.66040.700 MHz is situated at the lower end of the VHF range. In this range the propagation of
waves is limited to the ground wave. This frequency range is used by mobile commercial radio systems for
forestry, motorway management and by television broadcasting .The major ISM applications that are
operated in this range are telemetry and remote control applications.
Frequency range 433.920MHz
The frequency range 430.000440.000MHz is allotted to amateur radio services. Radio amateurs use this
range for voice as well as data transmission and for communication via relay radio stations and home-built
space satellites.
The ISM range 433.050434.790MHz is located approximately in the middle of the amateur radio band and is
used by a wide range of ISM applications.
Applications like backscatter (RFID) systems, baby intercoms, telemetry transmitters, cordless headphones,
unregistered LPD walkie-talkies for short range radio, vehicle central locking and many other applications
are possible in this frequency range.
Frequency range 869.0MHz
In 1997 in Europe, the frequency range of 868870 MHz was passed for Short Range Devices (SRDs) in and is
thus available for RFID applications in the 43 member states of CEPT.
Frequency range 869.0MHz
In 1997 in Europe, the frequency range of 868870 MHz was passed for Short Range Devices (SRDs) in and is
thus available for RFID applications in the 43 member states of CEPT.
Frequency range 915.0MHz
This frequency range is not available for ISMapplications in Europe but in USA and Australia the frequency
ranges 888889MHz and 902928 MHz are available and are used by backscatter (RFID) systems.
Frequency range 2.45GHz
The ISM range 2.4002.4835 GHz partially overlaps with the frequency ranges used by amateur radio and
radiolocation services. For this UHF frequency range, buildings and other obstacles behave as good LAN
23
reflectors and damp electromagnetic waves at transmission. Applications like backscatter (RFID) systems,
telemetry transmitters and PC LAN systems for the wireless networking of PCs are carried out in this
frequency range.
Frequency range 5.8GHz
The ISM range 5.7255.875 GHz partially overlaps with the frequency ranges used by amateur radio and
radiolocation services.
Typical ISM applications for this frequency range include movement sensors, used as door openers or contact
less toilet flushing and also for backscatter (RFID) systems.
Frequency range 24.125GHz
The ISM range 24.0024.25 GHz overlaps partially with the frequency ranges used by amateur radio and radio
location services and also by earth resources services via satellite.
This frequency range is used by movement sensors, directional radio systems for data transmission.
References:
 En.wikipedia.org/wiki/automatic_identification and_data_capture-29k
 en.wikipedia.org/wiki/Automatic_Identification _System
 en.wikipedia.org/wiki/RFID -*
24
RFID, Its Applications and Integrating RFID in WSN
Anuradha Kamble (Lecturer)
SIES Institute of Technology, Nerul, Navi Mumbai
Anita Diwakar (Lecturer)
V. P. M’s Polytechnic, Thane
ABSTRACT :
Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important components
of pervasive computing, since both technologies can be used for coupling the physical and the virtual world.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely
retrieving data using devices called RFID tags or transponders. The technology requires some extent of
cooperation of an RFID reader and an RFID tag. Here in this paper, section 1 deal with the basics of RFID
systems and its applications. Section 2 discusses architecture of wireless senor network and section 3 defines
the way to integrate RFID in wireless sensor network.
Keywords : RFID, Wireless sensor network, wireless network, smart nodes etc.
INTRODUCTION :
It is widely believed that the next revolution in computing technology will be that the widespread small
wireless computing and communication devices will integrate seamlessly into daily life. We can therefore
expect in the near future lots of devices to grow by multiple orders of magnitude such as tags, sensors etc.
They gather information about the current environment, which means sensing and processing information.
In recent years, automatic identification procedures (Auto-ID) have become very popular in many service
industries, purchasing and distribution logistics, manufacturing systems etc. Automatic identification
procedures exist to provide information about people, animals, goods and products in transit.
Currently available barcode labels that triggered a revolution in identification systems, some considerable
time ago, are being found to be inadequate in an increasing number of cases. Barcodes are extremely cheap
but problem is with their low storage capacity and the fact that they can not be reprogrammed.
The technically optimal solution would be storage of data in a silicon chip. The most common form of
electronic data carrying device in use in everyday life is the smart card based on contact field. However
mechanical contact used in smart card is often impractical. A contact less transfer of data is more flexible,
which suggests use of RFID (Radio frequency identification.) [2]
1. RFID Overview :
An RFID tag is an object that can be applied to or incorporated into a product, animal or person for purpose of
identification and tracking using radio waves.
RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part is a
database where information about tagged objects is stored.
The chip, usually made of silicon, contains information about the item to which it is attached. Chips used by
retailers and manufactures to identify consumer goods may contain 'Electronic Product code'. The EPC is the
RFID equivalent of the familiar Universal Product Code or the barcode. Barcodes must be optically scanned
and contain only generic product information .By contrast , EPC chips are encrypted with a unique product
code that identifies the individual product to which the tag is attached and can be read using radio frequency.
The antenna, attached to the chip is responsible for transmitting information from the chip to the reader,
using radio waves. The chip and the antenna combination is refereed to as a transponder or, more commonly
as a tag.
25
1
The reader, or scanning device, also has its own antenna, which it uses to communicate with the tag.
Reading tags refers to the communication between the tag and the reader via radio waves operating at a certain
frequency. In contrast to bar codes, one of the RFID's principal distinctions is tags and readers can
communicate with each other without being in each other's line of sight.
The database, or other back end logistics system, stores information about RFID tagged objects.
Operating Procedures :
RFID systems operate according to one of two basic procedures :
In half duplex procedure (HDX), data transfer from transponder to the reader alternates with data transfer
from reader to transponder. At frequency below 30MHz this is most often used with load modulation
procedure.
In full duplex procedure (FDX), data transfer from transponder to reader takes place at same time as data
transfer from reader to transponder. However both procedures have in common the fact that transfer of energy
from reader to transponder is continuous i.e. it is independent of direction of data flow. In sequential systems,
transfer of energy from transponder to reader takes place for limited period of time only. Data transfer from
transponder to reader occurs in pauses between power supply to transponder.[2]
RFID Applications :
 Inventory Control : Currently, most material tracking systems employ two-dimensional barcodes that
must be close to and within the "line of sight" of the barcode reader. This requires manual scanning or a
conveyor-like process to position the barcode and scanner. Barcodes can run the risk of getting wet or
scratched due to mishandling or a harsh environment, which often prevents accurate reading by the scanner.
Manual intervention is labor intensive, costly, and error-prone. In addition, scheduled scanning or manual
methods cannot ensure the inventory remains up-to-date, due to oversights, errors, and internal shrinkage.
RFID solution, inventory can be updated in real time without product movement, scanning or human
involvement. Our fully automated system allows inventory status to be determined and shipping & receiving
documents to be generated automatically. The system could also trigger automatic orders for products that are
low in inventory.
 Container and pallet tracking : RFID active tags can be programmed with contents and assigned
locations and then placed on containers and pallets that are stored in a warehouse. Additional information can
be collected and added to the RFID tags as the pallets move through the warehouse. The tracking system can
identify unscheduled movement, so managers and security can be alerted to possible theft.This system can
also reduce theft and other forms of inventory shrinkage by immediately alerting the operations manager
when a product is moved from its assigned area.
 Airports and high Security : RFID access control and personnel tracking and location systems can
help to assure the security of restricted areas in airports, such as flight lines, baggage handling areas, customs,
employee lounges, and other sensitive areas. These techniques could also be applied at maritime ports,
railway stations and passenger bus terminals. RFID systems can be used to track employee and passengers in
real time. Unlike other access control systems, RFID solutions are completely hands free so they have
minimal interference with the busy work schedules and flow of employees and passengers.
 Equipment tracking in hospitals : RFID system can be used to track patients, doctors and
expensive equipments in hospitals in real time. RFID tags can be attached to the ID bracelets of all patients, or
just patients requiring special attention, so their location can be tracked continuously. RFID technology can
also provide an electronic link for wirelessly communicating patient data. An instant assessment of critical
equipment and personnel locations is also possible through RFID technology.
 Parking lot control : RFID technology can provide independent, non-stop systems for security,
parking, and access control. RFID technology provides businesses and communities with hands-free control
to ensure only authorized vehicles have entry. The system can also provide access data for administering
periodic access charges or parking fees. [1][2]
 Manufacturing Lines : Manufacturers can track and record in-process assembly information into the
RFID tag as an item progresses along the line. For example, as features are added to a personal computer
26
assembly, they could be recorded on the tag. In this case, the tag would keep a current "inventory" of the PC's
contents. The tag information could later be read to produce a shipping list and invoice. The tag could also
remain with the item for later use by field personnel during installation and maintenance.
2. Wireless Sensor Network:
Advances in hardware and wireless network technologies have created low-cost, low-power, multifunctional
miniature sensor devices. These devices make up hundreds or thousands of ad hoc tiny sensor nodes spread
across a geographical area. These sensor nodes collaborate among themselves to establish a sensing network.
A sensor network that can provide access to information anytime, anywhere by collecting, processing,
analyzing and disseminating data. Thus, the network actively participates in creating a smart environment.
The figure shows the complexity of wireless sensor networks, which generally consist of a data acquisition
network and a data distribution network, monitored and controlled by a management center. [3]
Figure 3: Wireless Sensor Network [2]
Data is sensed by the sensors placed at various applications. They transmit time series of the sensed
phenomenon to the central nodes where computations are performed and data are fused. A sensor network is
composed of a large number of sensor nodes, which are densely deployed either inside the phenomenon or
very close to it. The position of sensor nodes need not be engineered or pre-determined. This allows random
deployment in inaccessible terrains or disaster relief operations. On the other hand, this also means that sensor
network protocols and algorithms must possess self-organizing capabilities. Another unique feature of sensor
networks is the cooperative effort of sensor nodes. Sensor nodes are fitted with an on-board processor. Instead
of sending the raw data to the nodes responsible for the fusion, sensor nodes use their processing abilities to
locally carry out simple computations and transmit only the required and partially processed data.[4]
3. Integration of RFID Reader and WSN Base Station :
One trend of the development of RFID is integrating
it into network. RFID network is very mature now
such as Real Time Locating System (RTLS), which
implies us to integrating sensor nodes into RFID to
get more environment information we need. A mix of
tags and sensor nodes are deployed in detected area.
Smart stations gather information from tags and
sensor nodes then transmit it to local host PC or
remote LAN. Here RFID and WSN information can
be integrated in the base station, which will be more
intelligent. For example, WSN data triggers RFID
reader for certain unusual event. The new system will
be composed of three classes of devices. The first
Figure 4:
class is that of wireless devices with no serious power
27
Heterogeneous network architecture [1]
class is that of wireless devices with no serious power constraints named as smart stations. The device will
contain an RFID reader, a 32- bit microprocessor for local data processing and a network connection. They
are nearly identified with the wired devices but use wireless connections to the backbone network for more
convenient deployment.
 Distributed Smart Node :
As no network stack is embedded into the reader in a RFID system at present, the reader can only be operated
passively and all of its behaviors are controlled by local control system. Its very big volume also makes it
difficult to move around. Moreover, the position of antennas of an RFID reader must be computed carefully to
cover all the tags in range and not to conflict with other antennas or readers. All of these disadvantages limit
the applications of RFID. If functions of a reader are cut short, an RFID reader might get much smaller, less
expensive and easy to deploy. We propose a new smart node containing less functional reader. For now there
seems to be no counterpart in RFID systems for this device.
 Smart node :
The smart node contains three parts: sensing part which makes use of kinds of sensors to detect interested
physical scenario, reading part which reads fewer tags comparing with a normal RFID reader, and radio
transceiver which transporting sensed data. Smart nodes read fewer tags and can be deployed densely as selforganizing WSN. Smart nodes run autonomously and translate data information to the sink node. The
gathered information is transmitted through multi-hops.
Figure 5: Smart Node Platform [4]
As information of tags in the same area is similar, it can be compressed with simple and high effective data
compressing methods in each smart node. Consequently, flexible communication protocol is necessary.
Presently, ZigBee protocol is the best candidate for the proposed architecture.
Conclusion :
RFID is an efficient technique for numerous applications, and combining RFID with WSN gives better
results. Here in this paper we propose the network architecture, which has consequent features as different
functional nodes integrated RFID tags or readers with sensor nodes. It consists smart stations mixed RFID
readers and WSN base stations. Base stations are complicated and costly and its very big volume also makes it
difficult to move around. If there is something wrong with a smart station the whole system will break up and
therefore reliability of the system is decreased.
References :
[1] 'Integrating RFID in WSN' by lei zhang and lei wang
[2] RFID handbook by kluas Finkinzeller
[3] 'Survey on wireless sensor network devices' by Marco Augusto M.Vieria and Diogenes 0-7803-79373/03-2003 IEEE
[4] 'Wireless integrated senor network' by G.J. Pottie and W.J. Kaiser Communication of the ACM May 2000
/ Vol. 43, No. 5 51
[5] www.rfidjournal.com
28
A Skin Color Segmentation Approach towards Face Detection
Ashwani Kumar
Department of Electrical and Instrumentation Engineering,
Sant Longowal Institute of Engineering and Technology,
SLIET, Longowal, Sangrur, Punjab, India
Email: [email protected]
In contrast to template matching, the models (or
templates) are learned from a set of training images
which should capture the representative variability
of facial appearance [4]. These learned models are
then used for detection. These methods are designed
mainly for face detection.
Abstract :
The field of computer vision involves developing
techniques to detect objects in a digital image. One
of the main applications of the object detection is
human face detection. In this paper, skin color
segmentation approach has been discussed in face
detection system. It is mostly used as a first
approximate localization and segmentation of faces
in the camera image, in order to reduce the search
area for other more precise and computationally
expensive facial feature detection methods. The
advantage of using skin color for segmentation is
that it is invariant of orientation of the human face.
This method can be used for online face detection.
Keywords : face detection; segmentation; edge
detection.
2. Color Segmentation
Detection of skin color in color images is a very
popular and useful technique for face detection [5].
Many techniques have reported for locating skin
color regions in the input image. While the input
color image is typically in the RGB format, these
techniques usually use color components in the
color space, such as the HSV or YIQ formats [6].
That is because RGB components are subject to the
lighting conditions thus the face detection may fail if
the lighting condition changes. Among many color
spaces, YCbCr components have been used. In the
YCbCr color space, the luminance information is
contained in Y component and the chrominance
information is in Cb and Cr. Therefore, the luminance
information can be easily de-embedded [7]. The
RGB components were converted to the YCbCr
components using the following formula. In the skin
color detection process, each pixel was classified as
skin or non-skin based on its color components. The
detection window for skin color was determined
based on the mean and standard deviation of Cb and
Cr component, obtained using 32 training faces in 3
input images. The color segmentation has been
applied to a training image [8]. Some non-skin
objects are inevitably observed in the result as their
colors fall into the skin color space.
1. Introduction
To detect faces from a single intensity or color
image, single image detection methods can be
classified into four categories.
1.1. Knowledge-based methods.
These rule-based methods encode human
knowledge of what constitutes a typical face[1].
Usually, the rules capture the relationships between
facial features. These methods are designed mainly
for face localization.
1.2. Feature invariant approaches.
These algorithms aim to find structural features that
exist even when the pose, viewpoint, or lighting
conditions vary, and then use these to locate faces.
These methods are designed mainly for face
localization [2].
Y = 0.299R + 0.587G + 0.114B
Cb = - 0.169R - 0.332G + 0.500B
Cr = 0.500R - 0.419G - 0.081B
1.3. Template matching methods.
Several standard patterns of a face are stored to
describe the face as a whole or the facial features
separately. The correlations between an input image
and the stored patterns are computed for detection
[3]. These methods have been used for both face
localization and detection.
3. Image Segmentation
The next step is to separate the image blobs in the
color filtered binary image into individual regions.
The process consists of three steps. The first step is
to fill up black isolated holes and to remove white
1.4. Appearance-based methods.
29
isolated regions which are smaller than the
minimum face area in training images [9]. The
threshold, 140 pixels is set conservatively. The
filtered image followed by initial erosion only
leaves the white regions with reasonable areas.
Secondly, to separate some integrated regions into
individual faces, the Roberts Cross Edge detection
algorithm is used. The Roberts Cross Operator
performs a simple, quick to compute, 2-D spatial
gradient measurement on an image. It thus
highlights regions of high spatial gradients that
often correspond to edges [10]. The highlighted
region is converted into black lines and eroded to
connect crossly separated pixels. Finally, the
previous images are integrated into one binary
image and relatively small black and white areas are
removed. The difference between this process and
the initial small area elimination is that the edges
connected to black areas remain even after filtering.
And those edges play important roles as boundaries
between face areas after erosion. The final binary
images and some candidate spots that are compared
with the representative face templates.
in the image and solid background. It is having the
problem when the color of the background is similar
to the human skin color neighboring skin like can
also combined with other skin regions which can
change the shape if the area not to depict the actual
object. Labeling of regions in the image helps in
eliminating the area which is smaller than the
required value. Here the face region of the image is
detected first and then eye and mouth are located for
those regions to confirm that the region is a face
region.
5. Conclusion and Future Scope of work
This work could be expanded and can be used for the
face recognition in real time application. Additional
work would be to find the distances between the
eyes and to calculate the area of the triangle made by
joining the centers of two eyes and mouth. Then
matching the distance between eyes with the
database images. This can filtered out images whose
distance matches with the distance of input image.
Then, the area of the triangle can be matched with
the filtered out images. And these steps can be
further implemented from the database with the
input image.
4. Results and Discussion
The Image with large areas excluding small areas is
shown in Figure 1 and Image after Median Filtering
is shown in Figure 2.
References
1. Ming Husan Yang Narendra Ahuja "Face Detection
Using a Mixing factor Analyzers" University of Illinoisat
Urbana Campaign, Urbana IL 61801
2. Chiunhsiun Lin, Kuo-Chin Fan "Human Face Detection
using Geometric Triangle Relationship" National center
University, Chung-Li,Taiwan. 32054 R.O.C
3. Son Lam Phung, Douglas Chai And Abdesselam
Bouzerdoum "Skin Color Based Face Detection" 100
JoondalUp Drive, Joondalu.Western Australia 6027
4. Rein-Lein Hsu "Face Detection in Color Images"
Mohamed Abdel-Mottaleb, IEEE and Anil K.Jain IEEE
5. Zhongfei Zhang Rohini K. Srihari Aibing Rao "Face
Detection and its Application in intelligent and Focused
Image Retrieval" Binghamton N.Y. 13902, Buffalo
NewYork
6. Rong Xiao, Ming-Jing Li, and Hong-Jiang Zhang
"Robust Multiose Face Detection in Images" Vol 14, No 1, January 2004 Retrieval
7. G. Yang and T. S. Huang, “Human Face Detection in
Complex Background,” Pattern Recognition, vol. 27, no. 1,
pp. 53-63, 1994.
8. C. Kotropoulos and I. Pitas, “Rule-Based Face Detection
in Frontal Views,” Proc. Int'l Conf. Acoustics, Speech and
Signal Processing, vol. 4, pp. 2537-2540, 1997.
9. D. Chetverikov and A. Lerch, “Multiresolution Face
Detection,” Theoretical Foundations of Computer Vision,
vol. 69, pp. 131-140, 1993.
10. Face detection by Inseong Kim,Joon Hyung Shim, and
Jinkyu Yang.
Figure 1. Image with large areas excluding small areas
Figure 2. Image after Median filtering
Human face detection is a first step in the field of
face recognition. Human face detection has many
applications in routine security checks passport for
driving license validation etc. Additional techniques
to remove or smooth out noise in the image were
required, median filter was used for that purpose.
This algorithm finds the instances of front faces in
color images. This works very well with one person
30
VPM CalUniversity Alliance Agreement
Dr. VN BRIMS has entered into educational collaboration with California University of
Technology, USA, (CalUniversity) for conducting value added, professional courses namely, Master of
Business Administration (MBA) and Doctor of Business Administration (DBA).
The CalUniversity, incorporated in USA, is a distance education Institution of higher learning
dedicated to the study of Business Administration and Management promoting quality learning, critical
thinking, and the discovery of new knowledge for the benefit of diverse business communities. There is a
formal procedure for screening the aspirants to be selected for admission for CalUniversity courses. The
institute will provide lecturers, facilitators and state-of-the-art facilities. CalUniversity will also send their
lecturers to VPM as guest lecturers. The MBA (CalUniversity) instruction includes amongst other things,
class contact hours, self-study and tutorials/facilitators sessions. Candidates will get the benefit of high
quality lectures and tutorials directly from the University using teleconferencing & videoconferencing
systems.
The various MBA programs covered under this agreement are as follows : 1.
Master of Business Administration Program with the following emphasis options
a.
International Management and Marketing (IMM)
b.
Information Systems and Knowledge Management (ISKM)
c.
Healthcare Management and Leadership (HCML)
d.
Banking and Finance (BF)
e.
Organizational Development and Human Resource Management (OHRM)
f.
Project and Quality Management (PQM)
2.
Doctor of Business Administration Program with the following emphasis options
a.
Global Business and Leadership (GBL)
b.
Entrepreneurship and Business Management (EBM)
c.
Healthcare Management and Leadership (HCML)
d.
Information System and Enterprise Resource Management (ISERM)
Centre For Foreign Languages
Understanding the need and importance of students to learn foreign languages, Dr. VN BRIMS has started a
Centre for Foreign Languages. The languages offered are Japanese, French, German. There are regular
batches and weekend batches and as of now there are 40 students being trained in various languages. There is
also a separate library in the institute premises for foreign languages.
Seminar on Consolidation-The New Business Mantra
Dr. VN BRIMS is organizing a seminar on 14th February 2009 on the topic “Consolidation-The New Business
Mantra”. The seminar seeks to address the multi-farious issues arising from the new business mantras viz.
Consolidation. The coveted list of speakers for the workshop includes stalwarts like Dr. Vishnu Kanhere, Dr.
Keshab Nandy, Dr. Guruprasad Murthy etc.
31
EIGHT ANNUAL NATIONAL CONFERENCE
'Industrial Safety Practices for
Peace, Productivity and Profits
10th October 2009”
The main objective of VPM is to disseminate knowledge to the next generation. Keeping this in mind, we are
associating this activity with other institutes in and around Thane for maximum participation. Experts from
the following industries would share the practices followed keeping the above theme in mind.

Agriculture

Pharmaceutical/Food

Power

Infrastructure

Chemicals

Engineering

RefineriesAll the above Industries are covered under MSBTE syllabus. At least 3-4 papers will be from
our Alumni. We also look forward for your active interest and make the conference a grand success.
V.P.M.'s Polytechnic has set a trend in conducting annual conferences on subjects of tropical interest. “An
Advanced Diploma in Industrial Safety” curriculum is conducted at our Institute for the last 6 years. This
course is for industrial working personnel who are experienced minimum of 2 years after their Degree or
Diploma in Engineering and Technology or Science graduate. Even some of the students have reached senior
management cadre. Thus this conference is exclusively dedicated to the students, by the students and for the
students of safety.
The current industrial slow down demands, increased productivity, higher efficiency at low cost. In addition
there is a paradigm shift from “Economics” to “Environment”. Today if you can achieve all the above but
environment is polluted, it is not acceptable. Hence we have selected the topic.
Prof. D.K. Nayak
Convener/Principal
V.P.M.'s Polytechnic, Thane
Prof. V. S. Bhakre
Co-convener
Prof. - Industry Institute Interaction
32