Illumination-invariant Ear Authentication - Core

8 downloads 0 Views 867KB Size Report
Ear biometric research can be traced back as early as 1949. Off late, more work ..... Kumar A, Wu C. Automated human identification using ear imaging. Pattern ...
Available online at www.sciencedirect.com

ScienceDirect Procedia Computer Science 42 (2014) 271 – 278

,QWHUQDWLRQDO&RQIHUHQFHRQ5RERW35,'(0HGLFDODQG5HKDELOLWDWLRQ5RERWLFVDQG ,QVWUXPHQWDWLRQ&RQI35,'(

,OOXPLQDWLRQ,QYDULDQW(DU$XWKHQWLFDWLRQ 1XUVXULDWL-DPLOD$OL$O0LVUHED$OILDQ$EGXO+DOLQE b

a Faculty of Computer and Mathematical Sciences, Universit Teknologi MARA, 40450 Shah Alam, Selangor, Malaysia Faculty of Computer Science and Information Technology, 43400 Universiti Putra Malaysia, Serdang, Selangor, Malaysia

$EVWUDFW Ear biometric research can be traced back as early as 1949. Off late, more work of ear biometrics has been done mainly focusing within constrained environment. Illumination invariant problem in unconstrained environment remains less explored for ear biometric. In this paper, we propose an illumination-invariant ear authentication approach using biometric authentication methods. Ear regions are firstly segmented from side face images using biased normalized cuts and morphological operations. Shape features are then extracted using Log-Gabor filters where the Hamming distance is finally applied for authentication. A authentication rate of 92.66% is reported for intra-class matching on 50 subjects. ‹7KH$XWKRUV3XEOLVKHGE\(OVHYLHU%9 © 2014 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license 3HHUUHYLHZXQGHUUHVSRQVLELOLW\RIWKH&HQWHUIRU+XPDQRLG5RERWVDQG%LR6HQVLQJ +X5R%V  (http://creativecommons.org/licenses/by-nc-nd/3.0/).

Peer-review under responsibility of the Center for Humanoid Robots and Bio-Sensing (HuRoBs) Keywords:%LDVHGQRUPDOL]HGFXWVHDUELRPHWULFHDUDXWKHQWLFDWLRQLOOXPLQDWLRQLQYDULDQW

,QWURGXFWLRQ $V DELRPHWULF PDUNHU WKH HDUKDVJDLQHGHQRUPRXV UHVHDUFK DWWHQWLRQZKHUH HPHUJLQJZRUNV FDQEH IRXQG LQ 7KLVFDQSUREDEO\EHDWWULEXWHGWRWKHHDU¶VWKUHHSURSHUWLHVQDPHO\ L KDYLQJVWDEOHDQGGHILQLWLYHVWUXFWXUH ZKLFKLVSUHVHUYHGVLQFHRQH¶VFRQFHSWLRQ LL LQYDULDQWWRIDFLDOH[SUHVVLRQDQGLVSRVHLQYDULDQWDQG LLL UHODWLYHO\ FRQVWDQWDOEHLWRQH¶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

1877-0509 © 2014 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/3.0/). Peer-review under responsibility of the Center for Humanoid Robots and Bio-Sensing (HuRoBs) doi:10.1016/j.procs.2014.11.062

272

Nursuriati Jamil et al. / Procedia Computer Science 42 (2014) 271 – 278

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

 (DU LPDJH



 (DUVHJPHQWDWLRQ

,PDJHSUH SURFHVVLQJ



 )HDWXUHH[WUDFWLRQ

0DWFKLQJ 3HUVRQ  DXWKHQWLFDWHG

  





(DUFRGH





(DUFRGH FROOHFWLRQV

)LJ(DUDXWKHQWLFDWLRQVWDJHV

2.1. Ear Image Acquisition and Pre-Processing $&DQRQ3RZHU6KRW$GLJLWDOFDPHUDZDVXVHGWRFDSWXUHWKHHDULPDJHV,QGRRUDQGRXWGRRULPDJHVZHUH WDNHQ UHVXOWLQJ LQ D GDWDVHW FRQVLVWLQJ RI HDU LPDJHV XQGHU GLIIHUHQW OLJKWLQJ FRQGLWLRQV 7KH LQGRRU OLJKWLQJ LV VWDQGDUGIOXRUHVFHQW ZKLWH OLJKWZKHUHDVWKHRXWGRRULPDJHVKDGUDQGRPVXQOLJKW LHGLIIHUHQWVXQOLJKWLQWHQVLWLHV GXULQJPRUQLQJDIWHUQRRQDQGHYHQLQJ (DULPDJHVZHUHWDNHQZLWKVXEMHFWIDFLQJOHIWLQDVWDQGLQJSRVLWLRQ:H GLGQRWFRQVLGHUDQ\VSHFLILFDQJOHEXWVXEMHFWVVWRRGZLWKLQWRIHHWDZD\IURPWKHFDPHUD)LIW\VXEMHFWVDJHG

273

Nursuriati Jamil et al. / Procedia Computer Science 42 (2014) 271 – 278

EHWZHHQ  WR \HDUV ROG YROXQWHHUHG IRU WKH SKRWRJUDSKV ZKHUH IRXU LPDJHV RI HDFK YROXQWHHU IURP GLIIHUHQW DQJOHVZHUHWDNHQ$WRWDORILPDJHVZHUHILQDOO\DFTXLUHG)LJVKRZVVDPSOHVRIWKHHDULPDJHV 7KHSUHSURFHVVLQJVWDJHLQYROYHGDXWRPDWLFDOO\UHVL]LQJWKHFDSWXUHGHDULPDJHWR[DQGFRQYHUWLQJLW LQWR DQ ELW JUD\ VFDOH LPDJH 7KH SXUSRVH RI LPDJH SUHSURFHVVLQJ LV WR UHGXFH FRPSXWDWLRQ WLPH GXULQJ VHJPHQWDWLRQ      )LJ(DULPDJHV

)RUHDFKLQGLYLGXDOWKUHHRXWRIIRXULPDJHVDUHXVHGDVEHQFKPDUNHGWHPSODWHV7KHHDUFRGHVRIWKHVHLPDJHV DUHH[WUDFWHGDQGXVHGIRUPDWFKLQJGXULQJWKHDXWKHQWLFDWLRQSKDVH7KHIRXUWKLPDJHLVXVHGIRUWHVWLQJ,QDOO HDU LPDJHV x  DUH VWRUHG IRU IHDWXUH HQFRGLQJ ZKHUHDV LPDJHV DUH XVHG IRU WHVWLQJ GXULQJ DXWKHQWLFDWLRQ 'HWDLOVRIIHDWXUHH[WUDFWLRQDQGDXWKHQWLFDWLRQDUHIXUWKHUGLVFXVVHGLQVHFWLRQVDQGUHVSHFWLYHO\ 2.2. Ear Segmentation 7KHHDUVHJPHQWDWLRQVWDJHLVFUXFLDOVLQFHVXFFHVVIXODXWKHQWLFDWLRQGHSHQGVRQDFFXUDWHVHJPHQWDWLRQ0RVWRI WKH RFFOXVLRQV DQG RWKHU XQQHFHVVDU\ LQIRUPDWLRQ QHHG WR EH HOLPLQDWHG WR UHWDLQ RQO\ WKH HDU UHJLRQ Biased normalized cut %1&  LV WKH PDLQ VHJPHQWDWLRQ DOJRULWKP IROORZHG E\ VXFFHVVLYH VWDWLVWLFDO DQG PRUSKRORJLFDO RSHUDWLRQVUHPRYHXQZDQWHGQRLVH%1&ZDVSURSRVHGE\ DVDPRGLILFDWLRQWRWKHQRUPDOL]HGFXWVDSSURDFKE\  %1&FDQEHFRQVLGHUHGDVDVXPPDU\RIWZRJUDSKWHFKQLTXHV x %RWWRPXS&RQWRXUVDUHORFDWHGFRUUHVSRQGLQJWRVXEVWDQWLDOFKDQJHVLQEULJKWQHVVFRORUDQGWH[WXUHDQG x 8SGRZQ6WURQJDFWLYDWLRQVWKDWPLJKWEHLQDGHTXDWHDUHVRXJKWDIWHUDQGWKHRXWSXWLVQRWVKDUSO\ORFDOL]HG %1&ILUVWO\FRPSXWHVHLJHQYHFWRUVRIDJUDSK¶VQRUPDOL]HG/DSODFLDQ7KHHGJHZHLJKW FRUUHVSRQGVWRWKH ³DIILQLW\´EHWZHHQWZRSL[HOVEDVHGRQORZOHYHOVLPLODULW\FXHV7KHLPDJHLVFRQVLGHUHGDVDZHLJKWHGXQGLUHFWHG ZKHUHQRGHVDUHSRLQWVLQWKHIHDWXUHVSDFHDQGDQHGJHLVIRUPHGEHWZHHQHYHU\QRGHSDLUV7KH JUDSK LVDIXQFWLRQWKDWPHDVXUHVWKHVLPLODULW\EHWZHHQWKHHQGSRLQWVRIWKH ZHLJKWIXQFWLRQRQWKHHGJHV HGJH7KHYROXPHRIDVHWRIYHUWLFHV LVWKHWRWDOZHLJKWRIWKHHGJHVLQFLGHQWWRLW  



 



 

LV WKH WRWDO ZHLJKW RI WKH JUDSK¶V HGJHV 7KH QRUPDOL]HG FXWV PHDVXUH LV XVHG WR PHDVXUH WKH ZKHUH OHW GHQRWH /HWFXW GLVVLPLODULW\ GHJUHH EHWZHHQWZRUHJLRQVZLWKLQDQLPDJH)RU 



EHWKHZHLJKWRIHGJHVFURVVLQJWKHFXW

7KHQWKHQRUPDOL]HGFXWYDOXHFRUUHVSRQGLQJWR

  FDQEHGHILQHG

DV





 

274

Nursuriati Jamil et al. / Procedia Computer Science 42 (2014) 271 – 278

)LJLOOXVWUDWHVWKUHHVDPSOHUHVXOWVZLWKYDULRXVQXPEHUVRIFXWV LHDQGFXWVUHVSHFWLYHO\      )LJ6DPSOHVRIELDVHGQRUPDOL]HGFXWVRIDQGFXWV

Intensity slicing::KLOHLJQRULQJLUUHOHYDQWSDUWVIURPWKHIDFHWKHHDUORFDWLRQQHHGVWREHDVFHUWDLQHG7KLVLV GRQHE\XVLQJWKHHDUERXQGDU\LQIRUPDWLRQDFTXLUHGIURPDSSO\LQJWKH%1&+HUHLQWHQVLW\VOLFLQJLVSHUIRUPHGWR HOLPLQDWHWKHEDFNJURXQGLQRUGHUWRUHWDLQRQO\WKHHDUERXQGDULHV )LJ  





)LJ6DPSOHRXWFRPHRILQWHQVLW\VOLFLQJ

Entropy7KHDSSOLFDWLRQRI%1&PLJKWQRWEHHQWLUHO\VXIILFLHQWVLQFHGLVMRLQWHGSL[HOVPD\VWLOOEHSUHVHQWLQ WKHUHVXOWDQWLPDJH HJ)LJ 7KLVFDQOHDGWRLQDFFXUDWHVHJPHQWDWLRQ+HQFHZHVROYHWKLVSUREOHPE\XVLQJ WKHHQWURS\IXQFWLRQ7KHHQWURS\RIDQLPDJHLVDVFDODUYDOXHIRUHDFKRIWKHLQSXWLPDJHLQWHQVLWLHVDQGFDQEH FDOFXODWHGDV ݊

ܲሺ‫ݔ‬ǡ ‫ݕ‬ሻ ൌ െ ෍ሺ‫݌‬Ǥ‫ ʹ݃݋݈ כ‬ሺ‫݌‬ሻሻ



݅ൌͳ



  

ZKHUHWKHKLVWRJUDPFRXQWVRIWKHLQWHQVLW\VOLFHGLPDJHLVUHSUHVHQWHGE\p)LJVKRZVWKHUHVXOWDIWHUDSSO\LQJ WKHHQWURS\IXQFWLRQ   'LVFRQQHFWHG  SL[HOV   )LJ'HIHFWVFDXVHGE\ELDVHGQRUPDOL]HGFXW

    )LJ'HIHFWVHOLPLQDWHGE\XVLQJHQWURS\

Global thresholding *OREDO WKUHVKROGLQJ LV DSSOLHG WR VHJPHQW WKH HDU ERXQGDULHV IURP LWV EDFNJURXQG 7KLV SURFHGXUHDOVRHQKDQFHVWKHHDUHGJHVZKLFKLVXVHIXOIRUSUHVHUYLQJWKHGHWDLOHGLQIRUPDWLRQRIWKHHDUERXQGDULHV )LJLOOXVWUDWHVWKHHDUHGJHVDIWHUWKUHVKROGLQJ      )LJ(DUHGJHVDIWHUJOREDOWKUHVKROGLQJ

275

Nursuriati Jamil et al. / Procedia Computer Science 42 (2014) 271 – 278

Morphological operations7KHILQDOVWDJHVRIHDUVHJPHQWDWLRQLQYROYHWKUHHW\SHVRIPRUSKRORJLFDORSHUDWLRQV QDPHO\ VNHOHWRQL]DWLRQ ILOOLQJ DQG RSHQLQJ 7KHVH RSHUDWLRQV SUHVHUYH WKH LQWULFDWH GHWDLOV RI WKH HDU ERXQGDULHV ZKLOHHQVXULQJWKHRQO\WKHZKROHHDUUHJLRQLVVHJPHQWHGZKLOHDYRLGLQJIDFLDOUHJLRQV$JUDSKLFDOH[DPSOHRI WKHVHWKUHHRSHUDWLRQVLVVKRZQLQ)LJDQGEULHIO\GLVFXVVHGLQWKHIROORZLQJSDUDJUDSKV      D 

E 

F 

)LJ D 6NHOHWRQL]DWLRQ E )LOOLQJ F 2SHQLQJ

x 6NHOHWRQL]DWLRQ ,Q )LJ  WKH HDU LPDJH HGJHV DUH WKLFN DQG LQWULFDWH GHWDLOV RI WKH HDU LQIRUPDWLRQ DUH QRW REYLRXV6NHOHWRQL]DWLRQFDQUHPRYHSL[HOVRQWKHERXQGDULHVRIREMHFWVZKLOHUHWDLQLQJLPSRUWDQWLQIRUPDWLRQRI WKHHDUVKDSHZKLFKLVODWHUVWRUHGDVHDUFRGH x )LOOLQJ2QFHWKHH[DFWHDUUHJLRQLVORFDWHGE\LGHQWLI\LQJWKHODUJHVWUHJLRQDUHDWKHILOOLQJRSHUDWLRQILOOVLQ HQFDSVXODWHG EODFN UHJLRQVZLWKWKHVDPHLQWHQVLW\YDOXHV7KLVSUHSDUHVWKHHDUUHJLRQIRUH[WUDFWLRQ x 2SHQLQJ7KHILQDOPRUSKRORJLFDORSHUDWLRQSULRUWRVHJPHQWDWLRQLVRSHQLQJ2SHQLQJFDQHOLPLQDWHSURWUXVLRQV DQGQRLVHVSURGXFHGGXULQJ%1&$VVKRZQLQ)LJ F H[WUDQHRXVOLQHVFDXVHGE\WKHFXWVDUHFRQVLGHUHGDV QRLVHDQGFDQEHHIIHFWLYHO\UHPRYHGXVLQJRSHQLQJ Image mapping$PDSSLQJIXQFWLRQLVLPSOHPHQWHGEHWZHHQWKHRULJLQDOHDULPDJHDQGWKHVHJPHQWHGELQDU\ LPDJHIURPWKHPRUSKRORJLFDOVWDJH7KLVVWHSFRQFOXGHVWKHVHJPHQWDWLRQSURFHVVZKHUHWKHDFWXDOHDUUHJLRQLV VHJPHQWHG7KHIROORZLQJHTXDWLRQGHILQHVWKHPDSSLQJ ‫ܫ‬ሺ‫ݔ‬ǡ ‫ݕ‬ሻǡ ݂ܴ݅ሺ‫ݔ‬ǡ ‫ݕ‬ሻ ൌ ͳ ܼሺ‫ݔ‬ǡ ‫ݕ‬ሻ ൌ ൜  Ͳ ǡ ݂ܴ݅ሺ‫ݔ‬ǡ ‫ݕ‬ሻ ൌ Ͳ





 

ZKHUH LVWKHFURSSHGJUD\VFDOHHDULPDJHDQG LVWKHVHJPHQWHGELQDU\LPDJH7KHSURFHVVRILPDJHPDSSLQJLV VKRZQLQ)LJ     )LJ)LQDOHDUVHJPHQWDWLRQ¶VRXWFRPH

2.3. Feature Extraction 2QO\ WKH PRVW VLJQLILFDQW IHDWXUHV DUH FRQVLGHUHG IRU WKH HDU FRGHV WHPSODWHV 7KH JHQHUDWHG WHPSODWH GXULQJ IHDWXUHHQFRGLQJUHTXLUHVDFRUUHVSRQGLQJVLPLODULW\PHDVXUHPHQWEHWZHHQWKHWHPSODWHDQGWKHTXHU\LPDJH7KLV PHWULFVKRXOGJLYHDUDQJHRIYDOXHVZKHQFRPSDULQJWHPSODWHVIURPWKHVDPHHDU LHLQWUDFODVVFRPSDULVRQ  Feature encoding )HDWXUH HQFRGLQJ FRQYROYHV WKH QRUPDOL]HG HDU SDWWHUQ ZLWK ' /RJ*DERU ZDYHOHWV 7KH WZRGLPHQVLRQDO QRUPDOL]HG SDWWHUQ LV EURNHQ XS LQWR D QXPEHU RI ' VLJQDOV DQG DUH FRQYROYHG ZLWK ' *DERU ZDYHOHWV 7KH URZV RI WKH ' QRUPDOL]HG SDWWHUQ DUH WDNHQ DV WKH ' VLJQDO ZKHUH WKH YDOXH LQ HDFK URZ FRUUHVSRQGV WR LQWHQVLW\ RQ WKH HDU UHJLRQ 7KH DQJXODU GLUHFWLRQ LV WDNHQ UDWKHU WKDQ WKH UDGLDO GLUHFWLRQ ZKLFK FRUUHVSRQGVWRFROXPQVRIWKHQRUPDOL]HGSDWWHUQ7KHIUHTXHQF\UHVSRQVHRI/RJ*DERUILOWHULVJLYHQDV ‫ܩ‬ሺ݂ሻ ൌ ݁‫ ݌ݔ‬ቆ

െሺŽ‘‰ሺ݂Τ݂Ͳ ሻሻʹ ቇ ʹሺ݈‫݃݋‬ሺߪ Τ݂Ͳ ሻሻʹ





ZKHUHWKHFHQWHUIUHTXHQF\LVUHSUHVHQWHGDV DQG LVWKHILOWHU¶VEDQGZLGWK

 

276

Nursuriati Jamil et al. / Procedia Computer Science 42 (2014) 271 – 278

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earcodes EHLQJ JHQHUDWHGDUHVKRZQLQ)LJ      )LJ(DUFRGHWHPSODWHV

2.4. Matching $PRGLILHG+DPPLQJGLVWDQFH +' ZDVXVHGIRUPDWFKLQJZKLFKDFWVDVDPHWULFIRUUHFRJQLWLRQ7KH+'DOVR LQFRUSRUDWHVQRLVHPDVNLQJVRWKDWRQO\WKHVLJQLILFDQWELWVDUHFRQVLGHUHGLQFRPSDULQJWZRHDUWHPSODWHV1RWHWKDW ZKHQFDOFXODWLQJWKH+'RQO\ELWVLQWKHHDUSDWWHUQFRUUHVSRQGLQJWRµ¶LQWKHQRLVHPDVNVRIERWKHDUSDWWHUQVDUH XVHG7KH+'LVDOVRRQO\FDOFXODWHGXVLQJELWVJHQHUDWHGIURPWKHWUXHHDUUHJLRQ7KLVPRGLILHG+'LVJLYHQLQ(T 

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

Nursuriati Jamil et al. / Procedia Computer Science 42 (2014) 271 – 278

3.1. Image Segmentation Experiment ,PDJHVHJPHQWDWLRQZDVHYDOXDWHGRQDGDWDVHWRIHDULPDJHVWDNHQXQGHUYDULRXVOLJKWLQJFRQGLWLRQV)RU EHVW VHJPHQWDWLRQ UHVXOWV %1&V ZLWK GLIIHUHQW QXPEHU RI FXWV LH     DQG   ZHUH FRQVLGHUHG 6HJPHQWDWLRQ DFFXUDF\ LV VXEMHFWLYHO\ HVWDEOLVKHG E\ KXPDQ YLVXDO LQVSHFWLRQ EDVHG RQ WKH IROORZLQJ REMHFWLYH FULWHULD  $FFHSWHG7KHKHOL[DQWLKHOL[WUDJXVOREHLQFLVXUDDQWLUDJXVDQGFRQFKDDUHVHJPHQWHGSURSHUO\ LHDOORI WKHHDU¶VDQDWRPLFDOSDUWV 5HIHUWR)LJ D DQG  5HMHFWHG$WOHDVWRQHSDUWRIWKHHDUDQDWRP\LVQRWSURSHUO\VHJPHQWHG5HIHUWR)LJ E       

D 

E 

)LJ D $FFHSWHGDQG E 5HMHFWHGHDUVHJPHQWV

7DEOHVKRZVWKDWVHJPHQWDWLRQUDWHLQFUHDVHVZLWKWKHQXPEHURIFXWVLHIURPIRUFXWVWRIRU FXWV6HJPHQWDWLRQSURFHVVLQJWLPHDOVRLVFRQVLGHUHGVLQFHDVWKHQXPEHURIFXWVLQFUHDVH$WFXWVWKHKLJKHVW VHJPHQWDWLRQDFFXUDF\UDWHZDVDFKLHYHG  DWDQDYHUDJHRIVHFRQGVIRUHDFKLPDJH 7DEOH%LDVHGQRUPDOL]HGFXWVVHJPHQWDWLRQ &XWV     

$FFHSWHG     

5HMHFWHG     

6HJPHQWDWLRQUDWH     

3.2. Ear Authentication ,QWUDFODVV FRPSDULVRQV ZHUH GRQH IRU HDU DXWKHQWLFDWLRQ XVLQJ VXEMHFWV )RU HDFK SHUVRQ RQH HDU LPDJH LV XVHGDVDWHVWLPDJHDJDLQVWKLVKHUWKUHHEHQFKPDUNHGHDULPDJHV7KH+'LVFDOFXODWHGEHWZHHQWKHWHVWDQGWKH WKUHH EHQFKPDUNHG HDUFRGHV 7DEOH  VKRZV WKH UHVXOWV RI HDU DXWKHQWLFDWLRQ IRU WKH VXEMHFWV 7KH YDOXH µ¶ LQGLFDWHVDPDWFKHGSDLUZKHUHDVµ¶GHQRWHVDQXQPDWFKHGSDLU 7DEOH5HVXOWVRIHDUDXWKHQWLFDWLRQ ±PDWFKXQPDWFK  6XEMHFW                  

(DUFRGHV                                                      

0DWFK                  

6XEMHFW                  

(DUFRGHV                                                      

0DWFK                  

6XEMHFW (DUFRGHV 0DWFK                                                                                 $YHUDJHDXWKHQWLFDWLRQUDWH 

277

278

Nursuriati Jamil et al. / Procedia Computer Science 42 (2014) 271 – 278

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

'XH DFNQRZOHGJHPHQW LV DFFRUGHG WR WKH 0LQLVWU\ RI (GXFDWLRQ 0DOD\VLD IRU WKH IXQGLQJ UHFHLYHG WKURXJKWKH)XQGDPHQWDO5HVHDUFK*UDQW6FKHPHQR)5*6,&78,70 5HIHUHQFHV  $ED]D$5RVV$+HEHUW&+DUULVRQ0$)1L[RQ06$VXUYH\RQHDUELRPHWULFVACM Computing Surveys (CSUR)    +XDQJ = /LX

Suggest Documents