WorldWideScience

Sample records for robust video fingerprinting

  1. Towards a Video Passive Content Fingerprinting Method for Partial-Copy Detection Robust against Non-Simulated Attacks.

    Directory of Open Access Journals (Sweden)

    Zobeida Jezabel Guzman-Zavaleta

    Full Text Available Passive content fingerprinting is widely used for video content identification and monitoring. However, many challenges remain unsolved especially for partial-copies detection. The main challenge is to find the right balance between the computational cost of fingerprint extraction and fingerprint dimension, without compromising detection performance against various attacks (robustness. Fast video detection performance is desirable in several modern applications, for instance, in those where video detection involves the use of large video databases or in applications requiring real-time video detection of partial copies, a process whose difficulty increases when videos suffer severe transformations. In this context, conventional fingerprinting methods are not fully suitable to cope with the attacks and transformations mentioned before, either because the robustness of these methods is not enough or because their execution time is very high, where the time bottleneck is commonly found in the fingerprint extraction and matching operations. Motivated by these issues, in this work we propose a content fingerprinting method based on the extraction of a set of independent binary global and local fingerprints. Although these features are robust against common video transformations, their combination is more discriminant against severe video transformations such as signal processing attacks, geometric transformations and temporal and spatial desynchronization. Additionally, we use an efficient multilevel filtering system accelerating the processes of fingerprint extraction and matching. This multilevel filtering system helps to rapidly identify potential similar video copies upon which the fingerprint process is carried out only, thus saving computational time. We tested with datasets of real copied videos, and the results show how our method outperforms state-of-the-art methods regarding detection scores. Furthermore, the granularity of our method makes

  2. Robust efficient video fingerprinting

    Science.gov (United States)

    Puri, Manika; Lubin, Jeffrey

    2009-02-01

    We have developed a video fingerprinting system with robustness and efficiency as the primary and secondary design criteria. In extensive testing, the system has shown robustness to cropping, letter-boxing, sub-titling, blur, drastic compression, frame rate changes, size changes and color changes, as well as to the geometric distortions often associated with camcorder capture in cinema settings. Efficiency is afforded by a novel two-stage detection process in which a fast matching process first computes a number of likely candidates, which are then passed to a second slower process that computes the overall best match with minimal false alarm probability. One key component of the algorithm is a maximally stable volume computation - a three-dimensional generalization of maximally stable extremal regions - that provides a content-centric coordinate system for subsequent hash function computation, independent of any affine transformation or extensive cropping. Other key features include an efficient bin-based polling strategy for initial candidate selection, and a final SIFT feature-based computation for final verification. We describe the algorithm and its performance, and then discuss additional modifications that can provide further improvement to efficiency and accuracy.

  3. Fingerprint multicast in secure video streaming.

    Science.gov (United States)

    Zhao, H Vicky; Liu, K J Ray

    2006-01-01

    Digital fingerprinting is an emerging technology to protect multimedia content from illegal redistribution, where each distributed copy is labeled with unique identification information. In video streaming, huge amount of data have to be transmitted to a large number of users under stringent latency constraints, so the bandwidth-efficient distribution of uniquely fingerprinted copies is crucial. This paper investigates the secure multicast of anticollusion fingerprinted video in streaming applications and analyzes their performance. We first propose a general fingerprint multicast scheme that can be used with most spread spectrum embedding-based multimedia fingerprinting systems. To further improve the bandwidth efficiency, we explore the special structure of the fingerprint design and propose a joint fingerprint design and distribution scheme. From our simulations, the two proposed schemes can reduce the bandwidth requirement by 48% to 87%, depending on the number of users, the characteristics of video sequences, and the network and computation constraints. We also show that under the constraint that all colluders have the same probability of detection, the embedded fingerprints in the two schemes have approximately the same collusion resistance. Finally, we propose a fingerprint drift compensation scheme to improve the quality of the reconstructed sequences at the decoder's side without introducing extra communication overhead.

  4. Robust Watermarking of Video Streams

    Directory of Open Access Journals (Sweden)

    T. Polyák

    2006-01-01

    Full Text Available In the past few years there has been an explosion in the use of digital video data. Many people have personal computers at home, and with the help of the Internet users can easily share video files on their computer. This makes possible the unauthorized use of digital media, and without adequate protection systems the authors and distributors have no means to prevent it.Digital watermarking techniques can help these systems to be more effective by embedding secret data right into the video stream. This makes minor changes in the frames of the video, but these changes are almost imperceptible to the human visual system. The embedded information can involve copyright data, access control etc. A robust watermark is resistant to various distortions of the video, so it cannot be removed without affecting the quality of the host medium. In this paper I propose a video watermarking scheme that fulfills the requirements of a robust watermark. 

  5. A Secure and Robust Object-Based Video Authentication System

    Directory of Open Access Journals (Sweden)

    He Dajun

    2004-01-01

    Full Text Available An object-based video authentication system, which combines watermarking, error correction coding (ECC, and digital signature techniques, is presented for protecting the authenticity between video objects and their associated backgrounds. In this system, a set of angular radial transformation (ART coefficients is selected as the feature to represent the video object and the background, respectively. ECC and cryptographic hashing are applied to those selected coefficients to generate the robust authentication watermark. This content-based, semifragile watermark is then embedded into the objects frame by frame before MPEG4 coding. In watermark embedding and extraction, groups of discrete Fourier transform (DFT coefficients are randomly selected, and their energy relationships are employed to hide and extract the watermark. The experimental results demonstrate that our system is robust to MPEG4 compression, object segmentation errors, and some common object-based video processing such as object translation, rotation, and scaling while securely preventing malicious object modifications. The proposed solution can be further incorporated into public key infrastructure (PKI.

  6. Robust sliding-window reconstruction for Accelerating the acquisition of MR fingerprinting.

    Science.gov (United States)

    Cao, Xiaozhi; Liao, Congyu; Wang, Zhixing; Chen, Ying; Ye, Huihui; He, Hongjian; Zhong, Jianhui

    2017-10-01

    To develop a method for accelerated and robust MR fingerprinting (MRF) with improved image reconstruction and parameter matching processes. A sliding-window (SW) strategy was applied to MRF, in which signal and dictionary matching was conducted between fingerprints consisting of mixed-contrast image series reconstructed from consecutive data frames segmented by a sliding window, and a precalculated mixed-contrast dictionary. The effectiveness and performance of this new method, dubbed SW-MRF, was evaluated in both phantom and in vivo. Error quantifications were conducted on results obtained with various settings of SW reconstruction parameters. Compared with the original MRF strategy, the results of both phantom and in vivo experiments demonstrate that the proposed SW-MRF strategy either provided similar accuracy with reduced acquisition time, or improved accuracy with equal acquisition time. Parametric maps of T 1 , T 2 , and proton density of comparable quality could be achieved with a two-fold or more reduction in acquisition time. The effect of sliding-window width on dictionary sensitivity was also estimated. The novel SW-MRF recovers high quality image frames from highly undersampled MRF data, which enables more robust dictionary matching with reduced numbers of data frames. This time efficiency may facilitate MRF applications in time-critical clinical settings. Magn Reson Med 78:1579-1588, 2017. © 2016 International Society for Magnetic Resonance in Medicine. © 2016 International Society for Magnetic Resonance in Medicine.

  7. Wavelet packet transform-based robust video watermarking technique

    Indian Academy of Sciences (India)

    If any conflict happens to the copyright identification and authentication, ... the present work is concentrated on the robust digital video watermarking. .... the wavelet decomposition, resulting in a new family of orthonormal bases for function ...

  8. Robust and Imperceptible Watermarking of Video Streams for Low Power Devices

    Science.gov (United States)

    Ishtiaq, Muhammad; Jaffar, M. Arfan; Khan, Muhammad A.; Jan, Zahoor; Mirza, Anwar M.

    With the advent of internet, every aspect of life is going online. From online working to watching videos, everything is now available on the internet. With the greater business benefits, increased availability and other online business advantages, there is a major challenge of security and ownership of data. Videos downloaded from an online store can easily be shared among non-intended or unauthorized users. Invisible watermarking is used to hide copyright protection information in the videos. The existing methods of watermarking are less robust and imperceptible and also the computational complexity of these methods does not suit low power devices. In this paper, we have proposed a new method to address the problem of robustness and imperceptibility. Experiments have shown that our method has better robustness and imperceptibility as well as our method is computationally efficient than previous approaches in practice. Hence our method can easily be applied on low power devices.

  9. Watermarking textures in video games

    Science.gov (United States)

    Liu, Huajian; Berchtold, Waldemar; Schäfer, Marcel; Lieb, Patrick; Steinebach, Martin

    2014-02-01

    Digital watermarking is a promising solution to video game piracy. In this paper, based on the analysis of special challenges and requirements in terms of watermarking textures in video games, a novel watermarking scheme for DDS textures in video games is proposed. To meet the performance requirements in video game applications, the proposed algorithm embeds the watermark message directly in the compressed stream in DDS files and can be straightforwardly applied in watermark container technique for real-time embedding. Furthermore, the embedding approach achieves high watermark payload to handle collusion secure fingerprinting codes with extreme length. Hence, the scheme is resistant to collusion attacks, which is indispensable in video game applications. The proposed scheme is evaluated in aspects of transparency, robustness, security and performance. Especially, in addition to classical objective evaluation, the visual quality and playing experience of watermarked games is assessed subjectively in game playing.

  10. Application of robust face recognition in video surveillance systems

    Science.gov (United States)

    Zhang, De-xin; An, Peng; Zhang, Hao-xiang

    2018-03-01

    In this paper, we propose a video searching system that utilizes face recognition as searching indexing feature. As the applications of video cameras have great increase in recent years, face recognition makes a perfect fit for searching targeted individuals within the vast amount of video data. However, the performance of such searching depends on the quality of face images recorded in the video signals. Since the surveillance video cameras record videos without fixed postures for the object, face occlusion is very common in everyday video. The proposed system builds a model for occluded faces using fuzzy principal component analysis (FPCA), and reconstructs the human faces with the available information. Experimental results show that the system has very high efficiency in processing the real life videos, and it is very robust to various kinds of face occlusions. Hence it can relieve people reviewers from the front of the monitors and greatly enhances the efficiency as well. The proposed system has been installed and applied in various environments and has already demonstrated its power by helping solving real cases.

  11. A new method for robust video watermarking resistant against key estimation attacks

    Science.gov (United States)

    Mitekin, Vitaly

    2015-12-01

    This paper presents a new method for high-capacity robust digital video watermarking and algorithms of embedding and extraction of watermark based on this method. Proposed method uses password-based two-dimensional pseudonoise arrays for watermark embedding, making brute-force attacks aimed at steganographic key retrieval mostly impractical. Proposed algorithm for 2-dimensional "noise-like" watermarking patterns generation also allows to significantly decrease watermark collision probability ( i.e. probability of correct watermark detection and extraction using incorrect steganographic key or password).. Experimental research provided in this work also shows that simple correlation-based watermark detection procedure can be used, providing watermark robustness against lossy compression and watermark estimation attacks. At the same time, without decreasing robustness of embedded watermark, average complexity of the brute-force key retrieval attack can be increased to 1014 watermark extraction attempts (compared to 104-106 for a known robust watermarking schemes). Experimental results also shows that for lowest embedding intensity watermark preserves it's robustness against lossy compression of host video and at the same time preserves higher video quality (PSNR up to 51dB) compared to known wavelet-based and DCT-based watermarking algorithms.

  12. How Robust Are the Surface Temperature Fingerprints of the Atlantic Overturning Meridional Circulation on Monthly Time Scales?

    Science.gov (United States)

    Alexander-Turner, R.; Ortega, P.; Robson, J. I.

    2018-04-01

    It has been suggested that changes in the Atlantic Meridional Overturning Circulation (AMOC) can drive sea surface temperature (SST) on monthly time scales (Duchez et al., 2016, https://doi.org/10.1002/2017GB005667). However, with only 11 years of continuous observations, the validity of this result over longer, or different, time periods is uncertain. In this study, we use a 120 yearlong control simulation from a high-resolution climate model to test the robustness of the AMOC fingerprints. The model reproduces the observed AMOC seasonal cycle and its variability, and the observed 5-month lagged AMOC-SST fingerprints derived from 11 years of data. However, the AMOC-SST fingerprints are very sensitive to the particular time period considered. In particular, both the Florida current and the upper mid-ocean transport produce highly inconsistent fingerprints when using time periods shorter than 30 years. Therefore, several decades of RAPID observations will be necessary to determine the real impact of the AMOC on SSTs at monthly time scales.

  13. H.264/AVC digital fingerprinting based on spatio-temporal just noticeable distortion

    Science.gov (United States)

    Ait Saadi, Karima; Bouridane, Ahmed; Guessoum, Abderrezak

    2014-01-01

    This paper presents a robust adaptive embedding scheme using a modified Spatio-Temporal noticeable distortion (JND) model that is designed for tracing the distribution of the H.264/AVC video content and protecting them from unauthorized redistribution. The Embedding process is performed during coding process in selected macroblocks type Intra 4x4 within I-Frame. The method uses spread-spectrum technique in order to obtain robustness against collusion attacks and the JND model to dynamically adjust the embedding strength and control the energy of the embedded fingerprints so as to ensure their imperceptibility. Linear and non linear collusion attacks are performed to show the robustness of the proposed technique against collusion attacks while maintaining visual quality unchanged.

  14. Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics

    Science.gov (United States)

    Kucukgoz, Mehmet; Harmanci, Oztan; Mihcak, Mehmet K.; Venkatesan, Ramarathnam

    2005-03-01

    In this paper, we propose a novel semi-blind video watermarking scheme, where we use pseudo-random robust semi-global features of video in the three dimensional wavelet transform domain. We design the watermark sequence via solving an optimization problem, such that the features of the mark-embedded video are the quantized versions of the features of the original video. The exact realizations of the algorithmic parameters are chosen pseudo-randomly via a secure pseudo-random number generator, whose seed is the secret key, that is known (resp. unknown) by the embedder and the receiver (resp. by the public). We experimentally show the robustness of our algorithm against several attacks, such as conventional signal processing modifications and adversarial estimation attacks.

  15. Robust Video Stabilization Using Particle Keypoint Update and l1-Optimized Camera Path

    Directory of Open Access Journals (Sweden)

    Semi Jeon

    2017-02-01

    Full Text Available Acquisition of stabilized video is an important issue for various type of digital cameras. This paper presents an adaptive camera path estimation method using robust feature detection to remove shaky artifacts in a video. The proposed algorithm consists of three steps: (i robust feature detection using particle keypoints between adjacent frames; (ii camera path estimation and smoothing; and (iii rendering to reconstruct a stabilized video. As a result, the proposed algorithm can estimate the optimal homography by redefining important feature points in the flat region using particle keypoints. In addition, stabilized frames with less holes can be generated from the optimal, adaptive camera path that minimizes a temporal total variation (TV. The proposed video stabilization method is suitable for enhancing the visual quality for various portable cameras and can be applied to robot vision, driving assistant systems, and visual surveillance systems.

  16. Towards Robust Face Recognition from Video

    International Nuclear Information System (INIS)

    Price, JR

    2001-01-01

    A novel, template-based method for face recognition is presented. The goals of the proposed method are to integrate multiple observations for improved robustness and to provide auxiliary confidence data for subsequent use in an automated video surveillance system. The proposed framework consists of a parallel system of classifiers, referred to as observers, where each observer is trained on one face region. The observer outputs are combined to yield the final recognition result. Three of the four confounding factors-expression, illumination, and decoration-are specifically addressed in this paper. The extension of the proposed approach to address the fourth confounding factor-pose-is straightforward and well supported in previous work. A further contribution of the proposed approach is the computation of a revealing confidence measure. This confidence measure will aid the subsequent application of the proposed method to video surveillance scenarios. Results are reported for a database comprising 676 images of 160 subjects under a variety of challenging circumstances. These results indicate significant performance improvements over previous methods and demonstrate the usefulness of the confidence data

  17. Robust feedback zoom tracking for digital video surveillance.

    Science.gov (United States)

    Zou, Tengyue; Tang, Xiaoqi; Song, Bao; Wang, Jin; Chen, Jihong

    2012-01-01

    Zoom tracking is an important function in video surveillance, particularly in traffic management and security monitoring. It involves keeping an object of interest in focus during the zoom operation. Zoom tracking is typically achieved by moving the zoom and focus motors in lenses following the so-called "trace curve", which shows the in-focus motor positions versus the zoom motor positions for a specific object distance. The main task of a zoom tracking approach is to accurately estimate the trace curve for the specified object. Because a proportional integral derivative (PID) controller has historically been considered to be the best controller in the absence of knowledge of the underlying process and its high-quality performance in motor control, in this paper, we propose a novel feedback zoom tracking (FZT) approach based on the geometric trace curve estimation and PID feedback controller. The performance of this approach is compared with existing zoom tracking methods in digital video surveillance. The real-time implementation results obtained on an actual digital video platform indicate that the developed FZT approach not only solves the traditional one-to-many mapping problem without pre-training but also improves the robustness for tracking moving or switching objects which is the key challenge in video surveillance.

  18. A robust fusion method for multiview distributed video coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Ascenso, Joao; Brites, Catarina

    2014-01-01

    Distributed video coding (DVC) is a coding paradigm which exploits the redundancy of the source (video) at the decoder side, as opposed to predictive coding, where the encoder leverages the redundancy. To exploit the correlation between views, multiview predictive video codecs require the encoder...... with a robust fusion system able to improve the quality of the fused SI along the decoding process through a learning process using already decoded data. We shall here take the approach to fuse the estimated distributions of the SIs as opposed to a conventional fusion algorithm based on the fusion of pixel...... values. The proposed solution is able to achieve gains up to 0.9 dB in Bjøntegaard difference when compared with the best-performing (in a RD sense) single SI DVC decoder, chosen as the best of an inter-view and a temporal SI-based decoder one....

  19. Robust efficient estimation of heart rate pulse from video

    Science.gov (United States)

    Xu, Shuchang; Sun, Lingyun; Rohde, Gustavo Kunde

    2014-01-01

    We describe a simple but robust algorithm for estimating the heart rate pulse from video sequences containing human skin in real time. Based on a model of light interaction with human skin, we define the change of blood concentration due to arterial pulsation as a pixel quotient in log space, and successfully use the derived signal for computing the pulse heart rate. Various experiments with different cameras, different illumination condition, and different skin locations were conducted to demonstrate the effectiveness and robustness of the proposed algorithm. Examples computed with normal illumination show the algorithm is comparable with pulse oximeter devices both in accuracy and sensitivity. PMID:24761294

  20. Three-dimensional fingerprint recognition by using convolution neural network

    Science.gov (United States)

    Tian, Qianyu; Gao, Nan; Zhang, Zonghua

    2018-01-01

    With the development of science and technology and the improvement of social information, fingerprint recognition technology has become a hot research direction and been widely applied in many actual fields because of its feasibility and reliability. The traditional two-dimensional (2D) fingerprint recognition method relies on matching feature points. This method is not only time-consuming, but also lost three-dimensional (3D) information of fingerprint, with the fingerprint rotation, scaling, damage and other issues, a serious decline in robustness. To solve these problems, 3D fingerprint has been used to recognize human being. Because it is a new research field, there are still lots of challenging problems in 3D fingerprint recognition. This paper presents a new 3D fingerprint recognition method by using a convolution neural network (CNN). By combining 2D fingerprint and fingerprint depth map into CNN, and then through another CNN feature fusion, the characteristics of the fusion complete 3D fingerprint recognition after classification. This method not only can preserve 3D information of fingerprints, but also solves the problem of CNN input. Moreover, the recognition process is simpler than traditional feature point matching algorithm. 3D fingerprint recognition rate by using CNN is compared with other fingerprint recognition algorithms. The experimental results show that the proposed 3D fingerprint recognition method has good recognition rate and robustness.

  1. Robust Adaptable Video Copy Detection

    DEFF Research Database (Denmark)

    Assent, Ira; Kremer, Hardy

    2009-01-01

    in contrast). Our query processing combines filtering and indexing structures for efficient multistep computation of video copies under this model. We show that our model successfully identifies altered video copies and does so more reliably than existing models.......Video copy detection should be capable of identifying video copies subject to alterations e.g. in video contrast or frame rates. We propose a video copy detection scheme that allows for adaptable detection of videos that are altered temporally (e.g. frame rate change) and/or visually (e.g. change...

  2. Information Theoretical Analysis of Identification based on Active Content Fingerprinting

    OpenAIRE

    Farhadzadeh, Farzad; Willems, Frans M. J.; Voloshinovskiy, Sviatoslav

    2014-01-01

    Content fingerprinting and digital watermarking are techniques that are used for content protection and distribution monitoring. Over the past few years, both techniques have been well studied and their shortcomings understood. Recently, a new content fingerprinting scheme called {\\em active content fingerprinting} was introduced to overcome these shortcomings. Active content fingerprinting aims to modify a content to extract robuster fingerprints than the conventional content fingerprinting....

  3. Robust video object cosegmentation.

    Science.gov (United States)

    Wang, Wenguan; Shen, Jianbing; Li, Xuelong; Porikli, Fatih

    2015-10-01

    With ever-increasing volumes of video data, automatic extraction of salient object regions became even more significant for visual analytic solutions. This surge has also opened up opportunities for taking advantage of collective cues encapsulated in multiple videos in a cooperative manner. However, it also brings up major challenges, such as handling of drastic appearance, motion pattern, and pose variations, of foreground objects as well as indiscriminate backgrounds. Here, we present a cosegmentation framework to discover and segment out common object regions across multiple frames and multiple videos in a joint fashion. We incorporate three types of cues, i.e., intraframe saliency, interframe consistency, and across-video similarity into an energy optimization framework that does not make restrictive assumptions on foreground appearance and motion model, and does not require objects to be visible in all frames. We also introduce a spatio-temporal scale-invariant feature transform (SIFT) flow descriptor to integrate across-video correspondence from the conventional SIFT-flow into interframe motion flow from optical flow. This novel spatio-temporal SIFT flow generates reliable estimations of common foregrounds over the entire video data set. Experimental results show that our method outperforms the state-of-the-art on a new extensive data set (ViCoSeg).

  4. Robust audio-visual speech recognition under noisy audio-video conditions.

    Science.gov (United States)

    Stewart, Darryl; Seymour, Rowan; Pass, Adrian; Ming, Ji

    2014-02-01

    This paper presents the maximum weighted stream posterior (MWSP) model as a robust and efficient stream integration method for audio-visual speech recognition in environments, where the audio or video streams may be subjected to unknown and time-varying corruption. A significant advantage of MWSP is that it does not require any specific measurements of the signal in either stream to calculate appropriate stream weights during recognition, and as such it is modality-independent. This also means that MWSP complements and can be used alongside many of the other approaches that have been proposed in the literature for this problem. For evaluation we used the large XM2VTS database for speaker-independent audio-visual speech recognition. The extensive tests include both clean and corrupted utterances with corruption added in either/both the video and audio streams using a variety of types (e.g., MPEG-4 video compression) and levels of noise. The experiments show that this approach gives excellent performance in comparison to another well-known dynamic stream weighting approach and also compared to any fixed-weighted integration approach in both clean conditions or when noise is added to either stream. Furthermore, our experiments show that the MWSP approach dynamically selects suitable integration weights on a frame-by-frame basis according to the level of noise in the streams and also according to the naturally fluctuating relative reliability of the modalities even in clean conditions. The MWSP approach is shown to maintain robust recognition performance in all tested conditions, while requiring no prior knowledge about the type or level of noise.

  5. Spatiotemporal Super-Resolution Reconstruction Based on Robust Optical Flow and Zernike Moment for Video Sequences

    Directory of Open Access Journals (Sweden)

    Meiyu Liang

    2013-01-01

    Full Text Available In order to improve the spatiotemporal resolution of the video sequences, a novel spatiotemporal super-resolution reconstruction model (STSR based on robust optical flow and Zernike moment is proposed in this paper, which integrates the spatial resolution reconstruction and temporal resolution reconstruction into a unified framework. The model does not rely on accurate estimation of subpixel motion and is robust to noise and rotation. Moreover, it can effectively overcome the problems of hole and block artifacts. First we propose an efficient robust optical flow motion estimation model based on motion details preserving, then we introduce the biweighted fusion strategy to implement the spatiotemporal motion compensation. Next, combining the self-adaptive region correlation judgment strategy, we construct a fast fuzzy registration scheme based on Zernike moment for better STSR with higher efficiency, and then the final video sequences with high spatiotemporal resolution can be obtained by fusion of the complementary and redundant information with nonlocal self-similarity between the adjacent video frames. Experimental results demonstrate that the proposed method outperforms the existing methods in terms of both subjective visual and objective quantitative evaluations.

  6. A robust H.264/AVC video watermarking scheme with drift compensation.

    Science.gov (United States)

    Jiang, Xinghao; Sun, Tanfeng; Zhou, Yue; Wang, Wan; Shi, Yun-Qing

    2014-01-01

    A robust H.264/AVC video watermarking scheme for copyright protection with self-adaptive drift compensation is proposed. In our scheme, motion vector residuals of macroblocks with the smallest partition size are selected to hide copyright information in order to hold visual impact and distortion drift to a minimum. Drift compensation is also implemented to reduce the influence of watermark to the most extent. Besides, discrete cosine transform (DCT) with energy compact property is applied to the motion vector residual group, which can ensure robustness against intentional attacks. According to the experimental results, this scheme gains excellent imperceptibility and low bit-rate increase. Malicious attacks with different quantization parameters (QPs) or motion estimation algorithms can be resisted efficiently, with 80% accuracy on average after lossy compression.

  7. Distortion Estimation in Compressed Music Using Only Audio Fingerprints

    NARCIS (Netherlands)

    Doets, P.J.O.; Lagendijk, R.L.

    2008-01-01

    An audio fingerprint is a compact yet very robust representation of the perceptually relevant parts of an audio signal. It can be used for content-based audio identification, even when the audio is severely distorted. Audio compression changes the fingerprint slightly. We show that these small

  8. A generic flexible and robust approach for intelligent real-time video-surveillance systems

    Science.gov (United States)

    Desurmont, Xavier; Delaigle, Jean-Francois; Bastide, Arnaud; Macq, Benoit

    2004-05-01

    In this article we present a generic, flexible and robust approach for an intelligent real-time video-surveillance system. A previous version of the system was presented in [1]. The goal of these advanced tools is to provide help to operators by detecting events of interest in visual scenes and highlighting alarms and compute statistics. The proposed system is a multi-camera platform able to handle different standards of video inputs (composite, IP, IEEE1394 ) and which can basically compress (MPEG4), store and display them. This platform also integrates advanced video analysis tools, such as motion detection, segmentation, tracking and interpretation. The design of the architecture is optimised to playback, display, and process video flows in an efficient way for video-surveillance application. The implementation is distributed on a scalable computer cluster based on Linux and IP network. It relies on POSIX threads for multitasking scheduling. Data flows are transmitted between the different modules using multicast technology and under control of a TCP-based command network (e.g. for bandwidth occupation control). We report here some results and we show the potential use of such a flexible system in third generation video surveillance system. We illustrate the interest of the system in a real case study, which is the indoor surveillance.

  9. Fingerprinting with Wow

    Science.gov (United States)

    Yu, Eugene; Craver, Scott

    2006-02-01

    Wow, or time warping caused by speed fluctuations in analog audio equipment, provides a wealth of applications in watermarking. Very subtle temporal distortion has been used to defeat watermarks, and as components in watermarking systems. In the image domain, the analogous warping of an image's canvas has been used both to defeat watermarks and also proposed to prevent collusion attacks on fingerprinting systems. In this paper, we explore how subliminal levels of wow can be used for steganography and fingerprinting. We present both a low-bitrate robust solution and a higher-bitrate solution intended for steganographic communication. As already observed, such a fingerprinting algorithm naturally discourages collusion by averaging, owing to flanging effects when misaligned audio is averaged. Another advantage of warping is that even when imperceptible, it can be beyond the reach of compression algorithms. We use this opportunity to debunk the common misconception that steganography is impossible under "perfect compression."

  10. Identifying hidden voice and video streams

    Science.gov (United States)

    Fan, Jieyan; Wu, Dapeng; Nucci, Antonio; Keralapura, Ram; Gao, Lixin

    2009-04-01

    Given the rising popularity of voice and video services over the Internet, accurately identifying voice and video traffic that traverse their networks has become a critical task for Internet service providers (ISPs). As the number of proprietary applications that deliver voice and video services to end users increases over time, the search for the one methodology that can accurately detect such services while being application independent still remains open. This problem becomes even more complicated when voice and video service providers like Skype, Microsoft, and Google bundle their voice and video services with other services like file transfer and chat. For example, a bundled Skype session can contain both voice stream and file transfer stream in the same layer-3/layer-4 flow. In this context, traditional techniques to identify voice and video streams do not work. In this paper, we propose a novel self-learning classifier, called VVS-I , that detects the presence of voice and video streams in flows with minimum manual intervention. Our classifier works in two phases: training phase and detection phase. In the training phase, VVS-I first extracts the relevant features, and subsequently constructs a fingerprint of a flow using the power spectral density (PSD) analysis. In the detection phase, it compares the fingerprint of a flow to the existing fingerprints learned during the training phase, and subsequently classifies the flow. Our classifier is not only capable of detecting voice and video streams that are hidden in different flows, but is also capable of detecting different applications (like Skype, MSN, etc.) that generate these voice/video streams. We show that our classifier can achieve close to 100% detection rate while keeping the false positive rate to less that 1%.

  11. A Robust H.264/AVC Video Watermarking Scheme with Drift Compensation

    Directory of Open Access Journals (Sweden)

    Xinghao Jiang

    2014-01-01

    Full Text Available A robust H.264/AVC video watermarking scheme for copyright protection with self-adaptive drift compensation is proposed. In our scheme, motion vector residuals of macroblocks with the smallest partition size are selected to hide copyright information in order to hold visual impact and distortion drift to a minimum. Drift compensation is also implemented to reduce the influence of watermark to the most extent. Besides, discrete cosine transform (DCT with energy compact property is applied to the motion vector residual group, which can ensure robustness against intentional attacks. According to the experimental results, this scheme gains excellent imperceptibility and low bit-rate increase. Malicious attacks with different quantization parameters (QPs or motion estimation algorithms can be resisted efficiently, with 80% accuracy on average after lossy compression.

  12. Robust and efficient fiducial tracking for augmented reality in HD-laparoscopic video streams

    Science.gov (United States)

    Mueller, M.; Groch, A.; Baumhauer, M.; Maier-Hein, L.; Teber, D.; Rassweiler, J.; Meinzer, H.-P.; Wegner, In.

    2012-02-01

    Augmented Reality (AR) is a convenient way of porting information from medical images into the surgical field of view and can deliver valuable assistance to the surgeon, especially in laparoscopic procedures. In addition, high definition (HD) laparoscopic video devices are a great improvement over the previously used low resolution equipment. However, in AR applications that rely on real-time detection of fiducials from video streams, the demand for efficient image processing has increased due to the introduction of HD devices. We present an algorithm based on the well-known Conditional Density Propagation (CONDENSATION) algorithm which can satisfy these new demands. By incorporating a prediction around an already existing and robust segmentation algorithm, we can speed up the whole procedure while leaving the robustness of the fiducial segmentation untouched. For evaluation purposes we tested the algorithm on recordings from real interventions, allowing for a meaningful interpretation of the results. Our results show that we can accelerate the segmentation by a factor of 3.5 on average. Moreover, the prediction information can be used to compensate for fiducials that are temporarily occluded or out of scope, providing greater stability.

  13. Secure and Robust Iris Recognition Using Random Projections and Sparse Representations.

    Science.gov (United States)

    Pillai, Jaishanker K; Patel, Vishal M; Chellappa, Rama; Ratha, Nalini K

    2011-09-01

    Noncontact biometrics such as face and iris have additional benefits over contact-based biometrics such as fingerprint and hand geometry. However, three important challenges need to be addressed in a noncontact biometrics-based authentication system: ability to handle unconstrained acquisition, robust and accurate matching, and privacy enhancement without compromising security. In this paper, we propose a unified framework based on random projections and sparse representations, that can simultaneously address all three issues mentioned above in relation to iris biometrics. Our proposed quality measure can handle segmentation errors and a wide variety of possible artifacts during iris acquisition. We demonstrate how the proposed approach can be easily extended to handle alignment variations and recognition from iris videos, resulting in a robust and accurate system. The proposed approach includes enhancements to privacy and security by providing ways to create cancelable iris templates. Results on public data sets show significant benefits of the proposed approach.

  14. Fingerprint recognition with identical twin fingerprints.

    Science.gov (United States)

    Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  15. Fingerprint recognition with identical twin fingerprints.

    Directory of Open Access Journals (Sweden)

    Xunqiang Tao

    Full Text Available Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6 images. Compared to the previous work, our contributions are summarized as follows: (1 Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2 Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3 A larger sample (83 pairs was collected. (4 A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5 A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  16. Robust embryo identification using first polar body single nucleotide polymorphism microarray-based DNA fingerprinting.

    Science.gov (United States)

    Treff, Nathan R; Su, Jing; Kasabwala, Natasha; Tao, Xin; Miller, Kathleen A; Scott, Richard T

    2010-05-01

    This study sought to validate a novel, minimally invasive system for embryo tracking by single nucleotide polymorphism microarray-based DNA fingerprinting of the first polar body. First polar body-based assignments of which embryos implanted and were delivered after multiple ET were 100% consistent with previously validated embryo DNA fingerprinting-based assignments. Copyright 2010 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  17. Cleaning and Processing RSS measurements for Location Fingerprinting

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2007-01-01

    Handling variations in sampled Received Signal Strength (RSS) is neassary for achieving robust location fingerprinting (LF). Current research has only proposed limited system-specific models for how to handle the cleaning of RSS variations. However, this paper propose a novel model for both...

  18. Semantically transparent fingerprinting for right protection of digital cinema

    Science.gov (United States)

    Wu, Xiaolin

    2003-06-01

    Digital cinema, a new frontier and crown jewel of digital multimedia, has the potential of revolutionizing the science, engineering and business of movie production and distribution. The advantages of digital cinema technology over traditional analog technology are numerous and profound. But without effective and enforceable copyright protection measures, digital cinema can be more susceptible to widespread piracy, which can dampen or even prevent the commercial deployment of digital cinema. In this paper we propose a novel approach of fingerprinting each individual distribution copy of a digital movie for the purpose of tracing pirated copies back to their source. The proposed fingerprinting technique presents a fundamental departure from the traditional digital watermarking/fingerprinting techniques. Its novelty and uniqueness lie in a so-called semantic or subjective transparency property. The fingerprints are created by editing those visual and audio attributes that can be modified with semantic and subjective transparency to the audience. Semantically-transparent fingerprinting or watermarking is the most robust kind among all existing watermarking techniques, because it is content-based not sample-based, and semantically-recoverable not statistically-recoverable.

  19. Efficient Filtering of Noisy Fingerprint Images

    Directory of Open Access Journals (Sweden)

    Maria Liliana Costin

    2016-01-01

    Full Text Available Fingerprint identification is an important field in the wide domain of biometrics with many applications, in different areas such: judicial, mobile phones, access systems, airports. There are many elaborated algorithms for fingerprint identification, but none of them can guarantee that the results of identification are always 100 % accurate. A first step in a fingerprint image analysing process consists in the pre-processing or filtering. If the result after this step is not by a good quality the upcoming identification process can fail. A major difficulty can appear in case of fingerprint identification if the images that should be identified from a fingerprint image database are noisy with different type of noise. The objectives of the paper are: the successful completion of the noisy digital image filtering, a novel more robust algorithm of identifying the best filtering algorithm and the classification and ranking of the images. The choice about the best filtered images of a set of 9 algorithms is made with a dual method of fuzzy and aggregation model. We are proposing through this paper a set of 9 filters with different novelty designed for processing the digital images using the following methods: quartiles, medians, average, thresholds and histogram equalization, applied all over the image or locally on small areas. Finally the statistics reveal the classification and ranking of the best algorithms.

  20. Temporal Scalability through Adaptive -Band Filter Banks for Robust H.264/MPEG-4 AVC Video Coding

    Directory of Open Access Journals (Sweden)

    Pau G

    2006-01-01

    Full Text Available This paper presents different structures that use adaptive -band hierarchical filter banks for temporal scalability. Open-loop and closed-loop configurations are introduced and illustrated using existing video codecs. In particular, it is shown that the H.264/MPEG-4 AVC codec allows us to introduce scalability by frame shuffling operations, thus keeping backward compatibility with the standard. The large set of shuffling patterns introduced here can be exploited to adapt the encoding process to the video content features, as well as to the user equipment and transmission channel characteristics. Furthermore, simulation results show that this scalability is obtained with no degradation in terms of subjective and objective quality in error-free environments, while in error-prone channels the scalable versions provide increased robustness.

  1. Holistic processing of fingerprints by expert forensic examiners.

    Science.gov (United States)

    Vogelsang, Macgregor D; Palmeri, Thomas J; Busey, Thomas A

    2017-01-01

    Holistic processing is often characterized as a process by which objects are perceived as a whole rather than a compilation of individual features. This mechanism may play an important role in the development of perceptual expertise because it allows for rapid integration across image regions. The present work explores whether holistic processing is present in latent fingerprint examiners, who compare fingerprints collected from crime scenes against a set of standards taken from a suspect. We adapted a composite task widely used in the face recognition and perceptual expertise literatures, in which participants were asked to match only a particular half of a fingerprint with a previous image while ignoring the other half. We tested both experts and novices, using both upright and inverted fingerprints. For upright fingerprints, we found weak evidence for holistic processing, but with no differences between experts and novices with respect to holistic processing. For inverted fingerprints, we found stronger evidence of holistic processing, with weak evidence for differences between experts and novices. These relatively weak holistic processing effects contrast with robust evidence for holistic processing with faces and with objects in other domains of perceptual expertise. The data constrain models of holistic processing by demonstrating that latent fingerprint experts and novices may not substantively differ in terms of the amount of holistic processing and that inverted stimuli actually produced more evidence for holistic processing than upright stimuli. Important differences between the present fingerprint stimuli and those in the literature include the lack of verbal labels for experts and the absence of strong vertical asymmetries, both of which might contribute to stronger holistic processing signatures in other stimulus domains.

  2. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  3. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  4. VIDEO DENOISING USING SWITCHING ADAPTIVE DECISION BASED ALGORITHM WITH ROBUST MOTION ESTIMATION TECHNIQUE

    Directory of Open Access Journals (Sweden)

    V. Jayaraj

    2010-08-01

    Full Text Available A Non-linear adaptive decision based algorithm with robust motion estimation technique is proposed for removal of impulse noise, Gaussian noise and mixed noise (impulse and Gaussian with edge and fine detail preservation in images and videos. The algorithm includes detection of corrupted pixels and the estimation of values for replacing the corrupted pixels. The main advantage of the proposed algorithm is that an appropriate filter is used for replacing the corrupted pixel based on the estimation of the noise variance present in the filtering window. This leads to reduced blurring and better fine detail preservation even at the high mixed noise density. It performs both spatial and temporal filtering for removal of the noises in the filter window of the videos. The Improved Cross Diamond Search Motion Estimation technique uses Least Median Square as a cost function, which shows improved performance than other motion estimation techniques with existing cost functions. The results show that the proposed algorithm outperforms the other algorithms in the visual point of view and in Peak Signal to Noise Ratio, Mean Square Error and Image Enhancement Factor.

  5. Forensic Discrimination of Latent Fingerprints Using Laser-Induced Breakdown Spectroscopy (LIBS) and Chemometric Approaches.

    Science.gov (United States)

    Yang, Jun-Ho; Yoh, Jack J

    2018-01-01

    A novel technique is reported for separating overlapping latent fingerprints using chemometric approaches that combine laser-induced breakdown spectroscopy (LIBS) and multivariate analysis. The LIBS technique provides the capability of real time analysis and high frequency scanning as well as the data regarding the chemical composition of overlapping latent fingerprints. These spectra offer valuable information for the classification and reconstruction of overlapping latent fingerprints by implementing appropriate statistical multivariate analysis. The current study employs principal component analysis and partial least square methods for the classification of latent fingerprints from the LIBS spectra. This technique was successfully demonstrated through a classification study of four distinct latent fingerprints using classification methods such as soft independent modeling of class analogy (SIMCA) and partial least squares discriminant analysis (PLS-DA). The novel method yielded an accuracy of more than 85% and was proven to be sufficiently robust. Furthermore, through laser scanning analysis at a spatial interval of 125 µm, the overlapping fingerprints were reconstructed as separate two-dimensional forms.

  6. Robust Pedestrian Tracking and Recognition from FLIR Video: A Unified Approach via Sparse Coding

    Directory of Open Access Journals (Sweden)

    Xin Li

    2014-06-01

    Full Text Available Sparse coding is an emerging method that has been successfully applied to both robust object tracking and recognition in the vision literature. In this paper, we propose to explore a sparse coding-based approach toward joint object tracking-and-recognition and explore its potential in the analysis of forward-looking infrared (FLIR video to support nighttime machine vision systems. A key technical contribution of this work is to unify existing sparse coding-based approaches toward tracking and recognition under the same framework, so that they can benefit from each other in a closed-loop. On the one hand, tracking the same object through temporal frames allows us to achieve improved recognition performance through dynamical updating of template/dictionary and combining multiple recognition results; on the other hand, the recognition of individual objects facilitates the tracking of multiple objects (i.e., walking pedestrians, especially in the presence of occlusion within a crowded environment. We report experimental results on both the CASIAPedestrian Database and our own collected FLIR video database to demonstrate the effectiveness of the proposed joint tracking-and-recognition approach.

  7. Application of DNA fingerprints for cell-line individualization.

    Science.gov (United States)

    Gilbert, D A; Reid, Y A; Gail, M H; Pee, D; White, C; Hay, R J; O'Brien, S J

    1990-09-01

    DNA fingerprints of 46 human cell lines were derived using minisatellite probes for hypervariable genetic loci. The incidence of 121 HaeIII DNA fragments among 33 cell lines derived from unrelated individuals was used to estimate allelic and genotypic frequencies for each fragment and for composite individual DNA fingerprints. We present a quantitative estimate of the extent of genetic difference between individuals, an estimate based on the percentage of restriction fragments at which they differ. The average percent difference (APD) among pairwise combinations from the population of 33 unrelated cell lines was 76.9%, compared with the APD in band sharing among cell lines derived from the same individual (less than or equal to 1.2%). Included in this survey were nine additional cell lines previously implicated as HeLa cell derivatives, and these lines were clearly confirmed as such by DNA fingerprints (APD less than or equal to 0.6%). On the basis of fragment frequencies in the tested cell line population, a simple genetic model was developed to estimate the frequencies of each DNA fingerprint in the population. The median incidence was 2.9 X 10(-17), and the range was 2.4 X 10(-21) to 6.6 X 10(-15). This value approximates the probability that a second cell line selected at random from unrelated individuals will match a given DNA fingerprint. Related calculations address the chance that any two DNA fingerprints would be identical among a large group of cell lines. This estimate is still very slight; for example, the chance of two or more common DNA fingerprints among 1 million distinct individuals is less than .001. The procedure provides a straightforward, easily interpreted, and statistically robust method for identification and individualization of human cells.

  8. An atomistic fingerprint algorithm for learning ab initio molecular force fields

    Science.gov (United States)

    Tang, Yu-Hang; Zhang, Dongkun; Karniadakis, George Em

    2018-01-01

    Molecular fingerprints, i.e., feature vectors describing atomistic neighborhood configurations, is an important abstraction and a key ingredient for data-driven modeling of potential energy surface and interatomic force. In this paper, we present the density-encoded canonically aligned fingerprint algorithm, which is robust and efficient, for fitting per-atom scalar and vector quantities. The fingerprint is essentially a continuous density field formed through the superimposition of smoothing kernels centered on the atoms. Rotational invariance of the fingerprint is achieved by aligning, for each fingerprint instance, the neighboring atoms onto a local canonical coordinate frame computed from a kernel minisum optimization procedure. We show that this approach is superior over principal components analysis-based methods especially when the atomistic neighborhood is sparse and/or contains symmetry. We propose that the "distance" between the density fields be measured using a volume integral of their pointwise difference. This can be efficiently computed using optimal quadrature rules, which only require discrete sampling at a small number of grid points. We also experiment on the choice of weight functions for constructing the density fields and characterize their performance for fitting interatomic potentials. The applicability of the fingerprint is demonstrated through a set of benchmark problems.

  9. SSR marker based DNA fingerprinting and diversity study in rice ...

    African Journals Online (AJOL)

    The genetic diversity and DNA fingerprinting of 15 elite rice genotypes using 30 SSR primers on chromosome numbers 7-12 was investigated. The results revealed that all the primers showed distinct polymorphism among the cultivars studied indicating the robust nature of microsatellites in revealing polymorphism. Cluster ...

  10. Collusion-resistant audio fingerprinting system in the modulated complex lapped transform domain.

    Directory of Open Access Journals (Sweden)

    Jose Juan Garcia-Hernandez

    Full Text Available Collusion-resistant fingerprinting paradigm seems to be a practical solution to the piracy problem as it allows media owners to detect any unauthorized copy and trace it back to the dishonest users. Despite the billionaire losses in the music industry, most of the collusion-resistant fingerprinting systems are devoted to digital images and very few to audio signals. In this paper, state-of-the-art collusion-resistant fingerprinting ideas are extended to audio signals and the corresponding parameters and operation conditions are proposed. Moreover, in order to carry out fingerprint detection using just a fraction of the pirate audio clip, block-based embedding and its corresponding detector is proposed. Extensive simulations show the robustness of the proposed system against average collusion attack. Moreover, by using an efficient Fast Fourier Transform core and standard computer machines it is shown that the proposed system is suitable for real-world scenarios.

  11. Advanced Fingerprint Analysis Project Fingerprint Constituents

    Energy Technology Data Exchange (ETDEWEB)

    GM Mong; CE Petersen; TRW Clauss

    1999-10-29

    The work described in this report was focused on generating fundamental data on fingerprint components which will be used to develop advanced forensic techniques to enhance fluorescent detection, and visualization of latent fingerprints. Chemical components of sweat gland secretions are well documented in the medical literature and many chemical techniques are available to develop latent prints, but there have been no systematic forensic studies of fingerprint sweat components or of the chemical and physical changes these substances undergo over time.

  12. Evaluation of chromatographic conditions in reversed phase liquid chromatography-mass spectrometry systems for fingerprinting of polar and amphiphilic plant metabolites

    DEFF Research Database (Denmark)

    Nielsen, Nikoline Juul; Tomasi, Giorgio; Christensen, Jan H.

    2016-01-01

    Metabolic fingerprinting is a relatively young scientific discipline requiring robust, yet flexible and fit-for-purpose analytical methods. Here, we introduce a simple approach to select reversed phase LC systems with electrospray MS detection for fingerprinting of polar and amphiphilic plant met...

  13. Reference Device-Assisted Adaptive Location Fingerprinting

    Directory of Open Access Journals (Sweden)

    Dongjin Wu

    2016-06-01

    Full Text Available Location fingerprinting suffers in dynamic environments and needs recalibration from time to time to maintain system performance. This paper proposes an adaptive approach for location fingerprinting. Based on real-time received signal strength indicator (RSSI samples measured by a group of reference devices, the approach applies a modified Universal Kriging (UK interpolant to estimate adaptive temporal and environmental radio maps. The modified UK can take the spatial distribution characteristics of RSSI into account. In addition, the issue of device heterogeneity caused by multiple reference devices is further addressed. To compensate the measuring differences of heterogeneous reference devices, differential RSSI metric is employed. Extensive experiments were conducted in an indoor field and the results demonstrate that the proposed approach not only adapts to dynamic environments and the situation of changing APs’ positions, but it is also robust toward measuring differences of heterogeneous reference devices.

  14. Capacity and optimal collusion attack channels for Gaussian fingerprinting games

    Science.gov (United States)

    Wang, Ying; Moulin, Pierre

    2007-02-01

    In content fingerprinting, the same media covertext - image, video, audio, or text - is distributed to many users. A fingerprint, a mark unique to each user, is embedded into each copy of the distributed covertext. In a collusion attack, two or more users may combine their copies in an attempt to "remove" their fingerprints and forge a pirated copy. To trace the forgery back to members of the coalition, we need fingerprinting codes that can reliably identify the fingerprints of those members. Researchers have been focusing on designing or testing fingerprints for Gaussian host signals and the mean square error (MSE) distortion under some classes of collusion attacks, in terms of the detector's error probability in detecting collusion members. For example, under the assumptions of Gaussian fingerprints and Gaussian attacks (the fingerprinted signals are averaged and then the result is passed through a Gaussian test channel), Moulin and Briassouli1 derived optimal strategies in a game-theoretic framework that uses the detector's error probability as the performance measure for a binary decision problem (whether a user participates in the collusion attack or not); Stone2 and Zhao et al. 3 studied average and other non-linear collusion attacks for Gaussian-like fingerprints; Wang et al. 4 stated that the average collusion attack is the most efficient one for orthogonal fingerprints; Kiyavash and Moulin 5 derived a mathematical proof of the optimality of the average collusion attack under some assumptions. In this paper, we also consider Gaussian cover signals, the MSE distortion, and memoryless collusion attacks. We do not make any assumption about the fingerprinting codes used other than an embedding distortion constraint. Also, our only assumptions about the attack channel are an expected distortion constraint, a memoryless constraint, and a fairness constraint. That is, the colluders are allowed to use any arbitrary nonlinear strategy subject to the above

  15. Nucleus fingerprinting for the unique identification of Feulgen-stained nuclei

    Science.gov (United States)

    Friedrich, David; Brozio, Matthias; Bell, André; Biesterfeld, Stefan; Böcking, Alfred; Aach, Til

    2012-03-01

    DNA Image Cytometry is a method for non-invasive cancer diagnosis which measures the DNA content of Feulgen-stained nuclei. DNA content is measured using a microscope system equipped with a digital camera as a densitometer and estimating the DNA content from the absorption of light when passing through the nuclei. However, a DNA Image Cytometry measurement is only valid if each nucleus is only measured once. To assist the user in preventing multiple measurements of the same nucleus, we have developed a unique digital identifier for the characterization of Feulgen-stained nuclei, the so called Nucleus Fingerprint. Only nuclei with a new fingerprint can be added to the measurement. This fingerprint is based on basic nucleus features, the contour of the nucleus and the spatial relationship to nuclei in the vicinity. Based on this characterization, a classifier for testing two nuclei for identity is presented. In a pairwise comparison of ~40000 pairs of mutually different nuclei, 99.5% were classified as different. In another 450 tests, the fingerprints of the same nucleus recorded a second time were in all cases judged identical. We therefore conclude that our Nucleus Fingerprint approach robustly prevents the repeated measurement of nuclei in DNA Image Cytometry.

  16. Hierarchical resource allocation for robust in-home video streaming

    NARCIS (Netherlands)

    Stok, van der P.D.V.; Jarnikov, D.; Kozlov, S.; Hartskamp, van M.A.; Lukkien, J.J.

    2007-01-01

    High quality video streaming puts high demands on network and processor resources. The bandwidth of the communication medium and the timely arrival of the frames necessitate a tight resource allocation. Given the dynamic environment where videos are started and stopped and electro-magnetic

  17. Towards secondary fingerprint classification

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-07-01

    Full Text Available an accuracy figure of 76.8%. This small difference between the two figures is indicative of the validity of the proposed secondary classification module. Keywords?fingerprint core; fingerprint delta; primary classifi- cation; secondary classification I..., namely, the fingerprint core and the fingerprint delta. Forensically, a fingerprint core is defined as the innermost turning point where the fingerprint ridges form a loop, while the fingerprint delta is defined as the point where these ridges form a...

  18. CSI Frequency Domain Fingerprint-Based Passive Indoor Human Detection

    Directory of Open Access Journals (Sweden)

    Chong Han

    2018-04-01

    Full Text Available Passive indoor personnel detection technology is now a hot topic. Existing methods have been greatly influenced by environmental changes, and there are problems with the accuracy and robustness of detection. Passive personnel detection based on Wi-Fi not only solves the above problems, but also has the advantages of being low cost and easy to implement, and can be better applied to elderly care and safety monitoring. In this paper, we propose a passive indoor personnel detection method based on Wi-Fi, which we call FDF-PIHD (Frequency Domain Fingerprint-based Passive Indoor Human Detection. Through this method, fine-grained physical layer Channel State Information (CSI can be extracted to generate feature fingerprints so as to help determine the state in the scene by matching online fingerprints with offline fingerprints. In order to improve accuracy, we combine the detection results of three receiving antennas to obtain the final test result. The experimental results show that the detection rates of our proposed scheme all reach above 90%, no matter whether the scene is human-free, stationary or a moving human presence. In addition, it can not only detect whether there is a target indoors, but also determine the current state of the target.

  19. A Support Vector Machine Approach for Truncated Fingerprint Image Detection from Sweeping Fingerprint Sensors

    Science.gov (United States)

    Chen, Chi-Jim; Pai, Tun-Wen; Cheng, Mox

    2015-01-01

    A sweeping fingerprint sensor converts fingerprints on a row by row basis through image reconstruction techniques. However, a built fingerprint image might appear to be truncated and distorted when the finger was swept across a fingerprint sensor at a non-linear speed. If the truncated fingerprint images were enrolled as reference targets and collected by any automated fingerprint identification system (AFIS), successful prediction rates for fingerprint matching applications would be decreased significantly. In this paper, a novel and effective methodology with low time computational complexity was developed for detecting truncated fingerprints in a real time manner. Several filtering rules were implemented to validate existences of truncated fingerprints. In addition, a machine learning method of supported vector machine (SVM), based on the principle of structural risk minimization, was applied to reject pseudo truncated fingerprints containing similar characteristics of truncated ones. The experimental result has shown that an accuracy rate of 90.7% was achieved by successfully identifying truncated fingerprint images from testing images before AFIS enrollment procedures. The proposed effective and efficient methodology can be extensively applied to all existing fingerprint matching systems as a preliminary quality control prior to construction of fingerprint templates. PMID:25835186

  20. A Support Vector Machine Approach for Truncated Fingerprint Image Detection from Sweeping Fingerprint Sensors

    Directory of Open Access Journals (Sweden)

    Chi-Jim Chen

    2015-03-01

    Full Text Available A sweeping fingerprint sensor converts fingerprints on a row by row basis through image reconstruction techniques. However, a built fingerprint image might appear to be truncated and distorted when the finger was swept across a fingerprint sensor at a non-linear speed. If the truncated fingerprint images were enrolled as reference targets and collected by any automated fingerprint identification system (AFIS, successful prediction rates for fingerprint matching applications would be decreased significantly. In this paper, a novel and effective methodology with low time computational complexity was developed for detecting truncated fingerprints in a real time manner. Several filtering rules were implemented to validate existences of truncated fingerprints. In addition, a machine learning method of supported vector machine (SVM, based on the principle of structural risk minimization, was applied to reject pseudo truncated fingerprints containing similar characteristics of truncated ones. The experimental result has shown that an accuracy rate of 90.7% was achieved by successfully identifying truncated fingerprint images from testing images before AFIS enrollment procedures. The proposed effective and efficient methodology can be extensively applied to all existing fingerprint matching systems as a preliminary quality control prior to construction of fingerprint templates.

  1. Fingerprint pores extractor

    CSIR Research Space (South Africa)

    Mngenge, NA

    2012-11-01

    Full Text Available , this is not always the case because of diseases and hash working conditions that affect fingerprints. In order to maintain high level of security independent of varying fingerprint image quality research suggests the use of other fingerprint features to compliment...

  2. Touchless fingerprint biometrics

    CERN Document Server

    Labati, Ruggero Donida; Scotti, Fabio

    2015-01-01

    Offering the first comprehensive analysis of touchless fingerprint-recognition technologies, Touchless Fingerprint Biometrics gives an overview of the state of the art and describes relevant industrial applications. It also presents new techniques to efficiently and effectively implement advanced solutions based on touchless fingerprinting.The most accurate current biometric technologies in touch-based fingerprint-recognition systems require a relatively high level of user cooperation to acquire samples of the concerned biometric trait. With the potential for reduced constraints, reduced hardw

  3. Distorted Fingerprint Verification System

    Directory of Open Access Journals (Sweden)

    Divya KARTHIKAESHWARAN

    2011-01-01

    Full Text Available Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.

  4. Longitudinal study of fingerprint recognition.

    Science.gov (United States)

    Yoon, Soweon; Jain, Anil K

    2015-07-14

    Human identification by fingerprints is based on the fundamental premise that ridge patterns from distinct fingers are different (uniqueness) and a fingerprint pattern does not change over time (persistence). Although the uniqueness of fingerprints has been investigated by developing statistical models to estimate the probability of error in comparing two random samples of fingerprints, the persistence of fingerprints has remained a general belief based on only a few case studies. In this study, fingerprint match (similarity) scores are analyzed by multilevel statistical models with covariates such as time interval between two fingerprints in comparison, subject's age, and fingerprint image quality. Longitudinal fingerprint records of 15,597 subjects are sampled from an operational fingerprint database such that each individual has at least five 10-print records over a minimum time span of 5 y. In regard to the persistence of fingerprints, the longitudinal analysis on a single (right index) finger demonstrates that (i) genuine match scores tend to significantly decrease when time interval between two fingerprints in comparison increases, whereas the change in impostor match scores is negligible; and (ii) fingerprint recognition accuracy at operational settings, nevertheless, tends to be stable as the time interval increases up to 12 y, the maximum time span in the dataset. However, the uncertainty of temporal stability of fingerprint recognition accuracy becomes substantially large if either of the two fingerprints being compared is of poor quality. The conclusions drawn from 10-finger fusion analysis coincide with the conclusions from single-finger analysis.

  5. Fast Aerial Video Stitching

    Directory of Open Access Journals (Sweden)

    Jing Li

    2014-10-01

    Full Text Available The highly efficient and robust stitching of aerial video captured by unmanned aerial vehicles (UAVs is a challenging problem in the field of robot vision. Existing commercial image stitching systems have seen success with offline stitching tasks, but they cannot guarantee high-speed performance when dealing with online aerial video sequences. In this paper, we present a novel system which has an unique ability to stitch high-frame rate aerial video at a speed of 150 frames per second (FPS. In addition, rather than using a high-speed vision platform such as FPGA or CUDA, our system is running on a normal personal computer. To achieve this, after the careful comparison of the existing invariant features, we choose the FAST corner and binary descriptor for efficient feature extraction and representation, and present a spatial and temporal coherent filter to fuse the UAV motion information into the feature matching. The proposed filter can remove the majority of feature correspondence outliers and significantly increase the speed of robust feature matching by up to 20 times. To achieve a balance between robustness and efficiency, a dynamic key frame-based stitching framework is used to reduce the accumulation errors. Extensive experiments on challenging UAV datasets demonstrate that our approach can break through the speed limitation and generate an accurate stitching image for aerial video stitching tasks.

  6. Fast compressed domain motion detection in H.264 video streams for video surveillance applications

    DEFF Research Database (Denmark)

    Szczerba, Krzysztof; Forchhammer, Søren; Støttrup-Andersen, Jesper

    2009-01-01

    This paper presents a novel approach to fast motion detection in H.264/MPEG-4 advanced video coding (AVC) compressed video streams for IP video surveillance systems. The goal is to develop algorithms which may be useful in a real-life industrial perspective by facilitating the processing of large...... on motion vectors embedded in the video stream without requiring a full decoding and reconstruction of video frames. To improve the robustness to noise, a confidence measure based on temporal and spatial clues is introduced to increase the probability of correct detection. The algorithm was tested on indoor...

  7. High-speed biometrics ultrasonic system for 3D fingerprint imaging

    Science.gov (United States)

    Maev, Roman G.; Severin, Fedar

    2012-10-01

    The objective of this research is to develop a new robust fingerprint identification technology based upon forming surface-subsurface (under skin) ultrasonic 3D images of the finger pads. The presented work aims to create specialized ultrasonic scanning methods for biometric purposes. Preliminary research has demonstrated the applicability of acoustic microscopy for fingerprint reading. The additional information from internal skin layers and dermis structures contained in the scan can essentially improve confidence in the identification. Advantages of this system include high resolution and quick scanning time. Operating in pulse-echo mode provides spatial resolution up to 0.05 mm. Technology advantages of the proposed technology are the following: • Full-range scanning of the fingerprint area "nail to nail" (2.5 x 2.5 cm) can be done in less than 5 sec with a resolution of up to 1000 dpi. • Collection of information about the in-depth structure of the fingerprint realized by the set of spherically focused 50 MHz acoustic lens provide the resolution ~ 0.05 mm or better • In addition to fingerprints, this technology can identify sweat porous at the surface and under the skin • No sensitivity to the contamination of the finger's surface • Detection of blood velocity using Doppler effect can be implemented to distinguish living specimens • Utilization as polygraph device • Simple connectivity to fingerprint databases obtained with other techniques • The digitally interpolated images can then be enhanced allowing for greater resolution • Method can be applied to fingernails and underlying tissues, providing more information • A laboratory prototype of the biometrics system based on these described principles was designed, built and tested. It is the first step toward a practical implementation of this technique.

  8. Photogrammetric fingerprint unwrapping

    Science.gov (United States)

    Paar, Gerhard; del Pilar Caballo Perucha, Maria; Bauer, Arnold; Nauschnegg, Bernhard

    2008-04-01

    Fingerprints are important biometric cues. Compared to conventional fingerprint sensors the use of contact-free stereoscopic image acquisition of the front-most finger segment has a set of advantages: Finger deformation is avoided, the entire relevant area for biometric use is covered, some technical aspects like sensor maintenance and cleaning are facilitated, and access to a three-dimensional reconstruction of the covered area is possible. We describe a photogrammetric workflow for nail-to-nail fingerprint reconstruction: A calibrated sensor setup with typically 5 cameras and dedicated illumination acquires adjacent stereo pairs. Using the silhouettes of the segmented finger a raw cylindrical model is generated. After preprocessing (shading correction, dust removal, lens distortion correction), each individual camera texture is projected onto the model. Image-to-image matching on these pseudo ortho images and dense 3D reconstruction obtains a textured cylindrical digital surface model with radial distances around the major axis and a grid size in the range of 25-50 µm. The model allows for objective fingerprint unwrapping and novel fingerprint matching algorithms since 3D relations between fingerprint features are available as additional cues. Moreover, covering the entire region with relevant fingerprint texture is particularly important for establishing a comprehensive forensic database. The workflow has been implemented in portable C and is ready for industrial exploitation. Further improvement issues are code optimization, unwrapping method, illumination strategy to avoid highlights and to improve the initial segmentation, and the comparison of the unwrapping result to conventional fingerprint acquisition technology.

  9. Bayesian estimation of multicomponent relaxation parameters in magnetic resonance fingerprinting.

    Science.gov (United States)

    McGivney, Debra; Deshmane, Anagha; Jiang, Yun; Ma, Dan; Badve, Chaitra; Sloan, Andrew; Gulani, Vikas; Griswold, Mark

    2018-07-01

    To estimate multiple components within a single voxel in magnetic resonance fingerprinting when the number and types of tissues comprising the voxel are not known a priori. Multiple tissue components within a single voxel are potentially separable with magnetic resonance fingerprinting as a result of differences in signal evolutions of each component. The Bayesian framework for inverse problems provides a natural and flexible setting for solving this problem when the tissue composition per voxel is unknown. Assuming that only a few entries from the dictionary contribute to a mixed signal, sparsity-promoting priors can be placed upon the solution. An iterative algorithm is applied to compute the maximum a posteriori estimator of the posterior probability density to determine the magnetic resonance fingerprinting dictionary entries that contribute most significantly to mixed or pure voxels. Simulation results show that the algorithm is robust in finding the component tissues of mixed voxels. Preliminary in vivo data confirm this result, and show good agreement in voxels containing pure tissue. The Bayesian framework and algorithm shown provide accurate solutions for the partial-volume problem in magnetic resonance fingerprinting. The flexibility of the method will allow further study into different priors and hyperpriors that can be applied in the model. Magn Reson Med 80:159-170, 2018. © 2017 International Society for Magnetic Resonance in Medicine. © 2017 International Society for Magnetic Resonance in Medicine.

  10. Physics and fingerprints

    Science.gov (United States)

    Voss-de Haan, Patrick

    2006-08-01

    This article discusses a variety of aspects in the detection and development of fingerprints and the physics involved in it. It gives an introduction to some basic issues like composition and properties of fingerprint deposits and a rudimentary framework of dactyloscopy; it covers various techniques for the visualization of latent fingerprints; and it concludes with a view of current research topics. The techniques range from very common procedures, such as powdering and cyanoacrylate fuming, to more demanding methods, for example luminescence and vacuum metal deposition, to fairly unusual approaches like autoradiography. The emphasis is placed on the physical rather than the forensic aspects of these topics while trying to give the physicist—who is not dealing with fingerprinting and forensic science on a daily basis—a feeling for the problems and solutions in the visualization of latent fingerprints.

  11. Gabor filter based fingerprint image enhancement

    Science.gov (United States)

    Wang, Jin-Xiang

    2013-03-01

    Fingerprint recognition technology has become the most reliable biometric technology due to its uniqueness and invariance, which has been most convenient and most reliable technique for personal authentication. The development of Automated Fingerprint Identification System is an urgent need for modern information security. Meanwhile, fingerprint preprocessing algorithm of fingerprint recognition technology has played an important part in Automatic Fingerprint Identification System. This article introduces the general steps in the fingerprint recognition technology, namely the image input, preprocessing, feature recognition, and fingerprint image enhancement. As the key to fingerprint identification technology, fingerprint image enhancement affects the accuracy of the system. It focuses on the characteristics of the fingerprint image, Gabor filters algorithm for fingerprint image enhancement, the theoretical basis of Gabor filters, and demonstration of the filter. The enhancement algorithm for fingerprint image is in the windows XP platform with matlab.65 as a development tool for the demonstration. The result shows that the Gabor filter is effective in fingerprint image enhancement technology.

  12. Fingerprints in cancer cells

    International Nuclear Information System (INIS)

    Servomaa, K.

    1994-01-01

    Gene research has shown that factors causing cancer, or carcinogens, may leave marks typical of each particular carcinogen (fingerprints) in the genotype of the cell. Radiation, for instance, may leave such fingerprints in a cancer cell. In particular, the discovery of a gene called p53 has yielded much new information on fingerprints. It has been discovered, for example, that toxic fungus and UV-radiation each leave fingerprints in the p53 gene. Based on the detection of fingerprints, it may be possible in the future to tell a cancer patient what factor had trigged the maglinancy

  13. Coordinate-Based Clustering Method for Indoor Fingerprinting Localization in Dense Cluttered Environments

    Directory of Open Access Journals (Sweden)

    Wen Liu

    2016-12-01

    Full Text Available Indoor positioning technologies has boomed recently because of the growing commercial interest in indoor location-based service (ILBS. Due to the absence of satellite signal in Global Navigation Satellite System (GNSS, various technologies have been proposed for indoor applications. Among them, Wi-Fi fingerprinting has been attracting much interest from researchers because of its pervasive deployment, flexibility and robustness to dense cluttered indoor environments. One challenge, however, is the deployment of Access Points (AP, which would bring a significant influence on the system positioning accuracy. This paper concentrates on WLAN based fingerprinting indoor location by analyzing the AP deployment influence, and studying the advantages of coordinate-based clustering compared to traditional RSS-based clustering. A coordinate-based clustering method for indoor fingerprinting location, named Smallest-Enclosing-Circle-based (SEC, is then proposed aiming at reducing the positioning error lying in the AP deployment and improving robustness to dense cluttered environments. All measurements are conducted in indoor public areas, such as the National Center For the Performing Arts (as Test-bed 1 and the XiDan Joy City (Floors 1 and 2, as Test-bed 2, and results show that SEC clustering algorithm can improve system positioning accuracy by about 32.7% for Test-bed 1, 71.7% for Test-bed 2 Floor 1 and 73.7% for Test-bed 2 Floor 2 compared with traditional RSS-based clustering algorithms such as K-means.

  14. Coordinate-Based Clustering Method for Indoor Fingerprinting Localization in Dense Cluttered Environments.

    Science.gov (United States)

    Liu, Wen; Fu, Xiao; Deng, Zhongliang

    2016-12-02

    Indoor positioning technologies has boomed recently because of the growing commercial interest in indoor location-based service (ILBS). Due to the absence of satellite signal in Global Navigation Satellite System (GNSS), various technologies have been proposed for indoor applications. Among them, Wi-Fi fingerprinting has been attracting much interest from researchers because of its pervasive deployment, flexibility and robustness to dense cluttered indoor environments. One challenge, however, is the deployment of Access Points (AP), which would bring a significant influence on the system positioning accuracy. This paper concentrates on WLAN based fingerprinting indoor location by analyzing the AP deployment influence, and studying the advantages of coordinate-based clustering compared to traditional RSS-based clustering. A coordinate-based clustering method for indoor fingerprinting location, named Smallest-Enclosing-Circle-based (SEC), is then proposed aiming at reducing the positioning error lying in the AP deployment and improving robustness to dense cluttered environments. All measurements are conducted in indoor public areas, such as the National Center For the Performing Arts (as Test-bed 1) and the XiDan Joy City (Floors 1 and 2, as Test-bed 2), and results show that SEC clustering algorithm can improve system positioning accuracy by about 32.7% for Test-bed 1, 71.7% for Test-bed 2 Floor 1 and 73.7% for Test-bed 2 Floor 2 compared with traditional RSS-based clustering algorithms such as K-means.

  15. [Research on UPLC-PDA fingerprint of andrographis paniculata and quantitative determination of 4 major constituents].

    Science.gov (United States)

    Huang, Jing-Yi; Liu, Xiao-Lin; Zhou, Shui-Ping; Tong, Ling; Ding, Li

    2014-11-01

    Andrographis paniculata from different parts and origins were analyzed by UPLC-PDA fingerprint to provide refererice for related preparation technology. Using the peak of andrographolide as reference, 27 common peaks were identified, and digitized UPLC-PDA fingerprints for 23 batches of andrographis paniculata were established in this research. Principal component analysis (PCA) was carried out after feature extraction. The contents of andrographolide, neoandrographolide, deoxyandrographolide, dehydroandrographolide were determined by external standard method. The Plackett-Burman design combined with pareto chart was used to analyze the factors influencing the robustness of the method. It was found that the medicinal part has a more remarkable influence on the quality of andrographis paniculata than the origin. The contents of the 4 lactones the differ greatly in the different parts of andrographis paniculata, and the pH of the mobile phase is an important factor that influenced the robustness of the method.

  16. Review of passive-blind detection in digital video forgery based on sensing and imaging techniques

    Science.gov (United States)

    Tao, Junjie; Jia, Lili; You, Ying

    2016-01-01

    Advances in digital video compression and IP communication technologies raised new issues and challenges concerning the integrity and authenticity of surveillance videos. It is so important that the system should ensure that once recorded, the video cannot be altered; ensuring the audit trail is intact for evidential purposes. This paper gives an overview of passive techniques of Digital Video Forensics which are based on intrinsic fingerprints inherent in digital surveillance videos. In this paper, we performed a thorough research of literatures relevant to video manipulation detection methods which accomplish blind authentications without referring to any auxiliary information. We presents review of various existing methods in literature, and much more work is needed to be done in this field of video forensics based on video data analysis and observation of the surveillance systems.

  17. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD) Scheme.

    Science.gov (United States)

    Idbeaa, Tarik; Abdul Samad, Salina; Husain, Hafizah

    2016-01-01

    This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD). Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs) of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES) algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.

  18. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD Scheme.

    Directory of Open Access Journals (Sweden)

    Tarik Idbeaa

    Full Text Available This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD. Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.

  19. Visual hashing of digital video : applications and techniques

    NARCIS (Netherlands)

    Oostveen, J.; Kalker, A.A.C.M.; Haitsma, J.A.; Tescher, A.G.

    2001-01-01

    his paper present the concept of robust video hashing as a tool for video identification. We present considerations and a technique for (i) extracting essential perceptual features from a moving image sequences and (ii) for identifying any sufficiently long unknown video segment by efficiently

  20. Improving Video Generation for Multi-functional Applications

    OpenAIRE

    Kratzwald, Bernhard; Huang, Zhiwu; Paudel, Danda Pani; Dinesh, Acharya; Van Gool, Luc

    2017-01-01

    In this paper, we aim to improve the state-of-the-art video generative adversarial networks (GANs) with a view towards multi-functional applications. Our improved video GAN model does not separate foreground from background nor dynamic from static patterns, but learns to generate the entire video clip conjointly. Our model can thus be trained to generate - and learn from - a broad set of videos with no restriction. This is achieved by designing a robust one-stream video generation architectur...

  1. Low rank alternating direction method of multipliers reconstruction for MR fingerprinting.

    Science.gov (United States)

    Assländer, Jakob; Cloos, Martijn A; Knoll, Florian; Sodickson, Daniel K; Hennig, Jürgen; Lattanzi, Riccardo

    2018-01-01

    The proposed reconstruction framework addresses the reconstruction accuracy, noise propagation and computation time for magnetic resonance fingerprinting. Based on a singular value decomposition of the signal evolution, magnetic resonance fingerprinting is formulated as a low rank (LR) inverse problem in which one image is reconstructed for each singular value under consideration. This LR approximation of the signal evolution reduces the computational burden by reducing the number of Fourier transformations. Also, the LR approximation improves the conditioning of the problem, which is further improved by extending the LR inverse problem to an augmented Lagrangian that is solved by the alternating direction method of multipliers. The root mean square error and the noise propagation are analyzed in simulations. For verification, in vivo examples are provided. The proposed LR alternating direction method of multipliers approach shows a reduced root mean square error compared to the original fingerprinting reconstruction, to a LR approximation alone and to an alternating direction method of multipliers approach without a LR approximation. Incorporating sensitivity encoding allows for further artifact reduction. The proposed reconstruction provides robust convergence, reduced computational burden and improved image quality compared to other magnetic resonance fingerprinting reconstruction approaches evaluated in this study. Magn Reson Med 79:83-96, 2018. © 2017 International Society for Magnetic Resonance in Medicine. © 2017 International Society for Magnetic Resonance in Medicine.

  2. Are Associations Between "Sexist" Video Games and Decreased Empathy Toward Women Robust? A Reanalysis of Gabbiadini et al. 2016.

    Science.gov (United States)

    Ferguson, Christopher J; Donnellan, M Brent

    2017-12-01

    Gabbiadini, A., Riva, P., Andrighetto, L., Volpato, C., & Bushman, B, (PloS ONE, 2016) provided evidence for a connection between "sexist" video games and decreased empathy toward girls using an experimental paradigm. These claims are based on a moderated mediation model. They reported a three-way interaction between game condition, gender, and avatar identification when predicting masculine ideology in their original study. Masculine ideology was associated, in turn, with decreased empathy. However, there were no main experimental effects for video game condition on empathy. The current analysis considers the strength of the evidence for claims made in the original study on a sample of 153 adolescents (M age  = 16.812, SD = 1.241; 44.2% male). We confirmed that there was little evidence for an overall effect of game condition on empathy toward girls or women. We tested the robustness of the original reported moderated mediation models against other, theoretically derived alternatives, and found that effects differed based on how variables were measured (using alternatives in their public data file) and the statistical model used. The experimental groups differed significantly and substantially in terms of age suggesting that there might have been issues with the procedures used to randomly assign participants to conditions. These results highlight the need for preregistration of experimental protocols in video game research and raise some concerns about how moderated mediation models are used to support causal inferences. These results call into question whether use of "sexist" video games is a causal factor in the development of reduced empathy toward girls and women among adolescents.

  3. Dealing with Insufficient Location Fingerprints in Wi-Fi Based Indoor Location Fingerprinting

    Directory of Open Access Journals (Sweden)

    Kai Dong

    2017-01-01

    Full Text Available The development of the Internet of Things has accelerated research in the indoor location fingerprinting technique, which provides value-added localization services for existing WLAN infrastructures without the need for any specialized hardware. The deployment of a fingerprinting based localization system requires an extremely large amount of measurements on received signal strength information to generate a location fingerprint database. Nonetheless, this requirement can rarely be satisfied in most indoor environments. In this paper, we target one but common situation when the collected measurements on received signal strength information are insufficient, and show limitations of existing location fingerprinting methods in dealing with inadequate location fingerprints. We also introduce a novel method to reduce noise in measuring the received signal strength based on the maximum likelihood estimation, and compute locations from inadequate location fingerprints by using the stochastic gradient descent algorithm. Our experiment results show that our proposed method can achieve better localization performance even when only a small quantity of RSS measurements is available. Especially when the number of observations at each location is small, our proposed method has evident superiority in localization accuracy.

  4. Problems in the fingerprints based polycyclic aromatic hydrocarbons source apportionment analysis and a practical solution

    International Nuclear Information System (INIS)

    Zou, Yonghong; Wang, Lixia; Christensen, Erik R.

    2015-01-01

    This work intended to explain the challenges of the fingerprints based source apportionment method for polycyclic aromatic hydrocarbons (PAH) in the aquatic environment, and to illustrate a practical and robust solution. The PAH data detected in the sediment cores from the Illinois River provide the basis of this study. Principal component analysis (PCA) separates PAH compounds into two groups reflecting their possible airborne transport patterns; but it is not able to suggest specific sources. Not all positive matrix factorization (PMF) determined sources are distinguishable due to the variability of source fingerprints. However, they constitute useful suggestions for inputs for a Bayesian chemical mass balance (CMB) analysis. The Bayesian CMB analysis takes into account the measurement errors as well as the variations of source fingerprints, and provides a credible source apportionment. Major PAH sources for Illinois River sediments are traffic (35%), coke oven (24%), coal combustion (18%), and wood combustion (14%). - Highlights: • Fingerprint variability poses challenges in PAH source apportionment analysis. • PCA can be used to group compounds or cluster measurements. • PMF requires results validation but is useful for source suggestion. • Bayesian CMB provide practical and credible solution. - A Bayesian CMB model combined with PMF is a practical and credible fingerprints based PAH source apportionment method

  5. Total organic carbon, an important tool in an holistic approach to hydrocarbon source fingerprinting

    Energy Technology Data Exchange (ETDEWEB)

    Boehm, P.D.; Burns, W.A.; Page, D.S.; Bence, A.E.; Mankiewicz, P.J.; Brown, J.S.; Douglas, G.S. [Battelle Member Inst., Waltham, MA (United States)

    2002-07-01

    The identification and allocation of multiple hydrocarbon sources in marine sediments is best achieved using an holistic approach. Total organic carbon (TOC) is one important tool that can constrain the contributions of specific sources and rule out incorrect source allocations in cases where inputs are dominated by fossil organic carbon. In a study of the benthic sediments from Prince William Sound (PWS) and the Gulf of Alaska (GOA), we find excellent agreement between measured TOC and TOC calculated from hydrocarbon fingerprint matches of polycyclic aromatic hydrocarbons (PAH) and chemical biomarkers. Confirmation by two such independent source indicators (TOC and fingerprint matches) provides evidence that source allocations determined by the fingerprint matches are robust and that the major TOC sources have been correctly identified. Fingerprint matches quantify the hydrocarbon contributions of various sources to the benthic sediments and the degree of hydrocarbon winnowing by waves and currents. TOC contents are then calculated using source allocation results from fingerprint matches and the TOCs of contributing sources. Comparisons of the actual sediment TOC values and those calculated from source allocation support our earlier published findings that the natural petrogenic hydrocarbon background in sediments in this area comes from eroding Tertiary shales and associated oil seeps along the northern GOA coast and exclude thermally mature area coals from being important contributors to the PWS background due to their high TOC content.

  6. Fingerprint Change: Not Visible, But Tangible.

    Science.gov (United States)

    Negri, Francesca V; De Giorgi, Annamaria; Bozzetti, Cecilia; Squadrilli, Anna; Petronini, Pier Giorgio; Leonardi, Francesco; Bisogno, Luigi; Garofano, Luciano

    2017-09-01

    Hand-foot syndrome, a chemotherapy-induced cutaneous toxicity, can cause an alteration in fingerprints causing a setback for cancer patients due to the occurrence of false rejections. A colon cancer patient was fingerprinted after not having been able to use fingerprint recognition devices after 6 months of adjuvant chemotherapy. The fingerprint images were digitally processed to improve fingerprint definition without altering the papillary design. No evidence of skin toxicity was present. Two months later, the situation returned to normal. The fingerprint evaluation conducted on 15 identification points highlighted the quantitative and qualitative fingerprint alteration details detected after the end of chemotherapy and 2 months later. Fingerprint alteration during chemotherapy has been reported, but to our knowledge, this particular case is the first ever reported without evident clinical signs. Alternative fingerprint identification methods as well as improved biometric identification systems are needed in case of unexpected situations. © 2017 American Academy of Forensic Sciences.

  7. FINGERPRINT VERIFICATION IN PERSONAL IDENTIFICATION BY APPLYING LOCAL WALSH HADAMARD TRANSFORM AND GABOR COEFFICIENTS

    Directory of Open Access Journals (Sweden)

    K N Pushpalatha

    2017-05-01

    Full Text Available In an era of advanced computer technology world where innumerable services such as access to bank accounts, or access to secured data or entry to some national important organizations require authentication of genuine individual. Among all biometric personal identification systems, fingerprint recognition system is most accurate and economical technology. In this paper we have proposed fingerprint recognition system using Local Walsh Hadamard Transform (LWHT with Phase Magnitude Histograms (PMHs for feature extraction. Fingerprints display oriented texture-like patterns. Gabor filters have the property of capturing global and local texture information from blur or unclear images and filter bank provides the orientation features which are robust to image distortion and rotation. The LWHT algorithm is compared with other two approaches viz., Gabor Coefficients and Directional Features. The three methods are compared using FVC 2006 Finger print database images. It is found from the observation that the values of TSR, FAR and FRR have improved results compared to existing algorithm.

  8. Online fingerprint verification.

    Science.gov (United States)

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  9. A robust approach towards unknown transformation, regional adjacency graphs, multigraph matching, segmentation video frames from unnamed aerial vehicles (UAV)

    Science.gov (United States)

    Gohatre, Umakant Bhaskar; Patil, Venkat P.

    2018-04-01

    In computer vision application, the multiple object detection and tracking, in real-time operation is one of the important research field, that have gained a lot of attentions, in last few years for finding non stationary entities in the field of image sequence. The detection of object is advance towards following the moving object in video and then representation of object is step to track. The multiple object recognition proof is one of the testing assignment from detection multiple objects from video sequence. The picture enrollment has been for quite some time utilized as a reason for the location the detection of moving multiple objects. The technique of registration to discover correspondence between back to back casing sets in view of picture appearance under inflexible and relative change. The picture enrollment is not appropriate to deal with event occasion that can be result in potential missed objects. In this paper, for address such problems, designs propose novel approach. The divided video outlines utilizing area adjancy diagram of visual appearance and geometric properties. Then it performed between graph sequences by using multi graph matching, then getting matching region labeling by a proposed graph coloring algorithms which assign foreground label to respective region. The plan design is robust to unknown transformation with significant improvement in overall existing work which is related to moving multiple objects detection in real time parameters.

  10. GIF Video Sentiment Detection Using Semantic Sequence

    Directory of Open Access Journals (Sweden)

    Dazhen Lin

    2017-01-01

    Full Text Available With the development of social media, an increasing number of people use short videos in social media applications to express their opinions and sentiments. However, sentiment detection of short videos is a very challenging task because of the semantic gap problem and sequence based sentiment understanding problem. In this context, we propose a SentiPair Sequence based GIF video sentiment detection approach with two contributions. First, we propose a Synset Forest method to extract sentiment related semantic concepts from WordNet to build a robust SentiPair label set. This approach considers the semantic gap between label words and selects a robust label subset which is related to sentiment. Secondly, we propose a SentiPair Sequence based GIF video sentiment detection approach that learns the semantic sequence to understand the sentiment from GIF videos. Our experiment results on GSO-2016 (GIF Sentiment Ontology data show that our approach not only outperforms four state-of-the-art classification methods but also shows better performance than the state-of-the-art middle level sentiment ontology features, Adjective Noun Pairs (ANPs.

  11. Pseudo Steady-State Free Precession for MR-Fingerprinting.

    Science.gov (United States)

    Assländer, Jakob; Glaser, Steffen J; Hennig, Jürgen

    2017-03-01

    This article discusses the signal behavior in the case the flip angle in steady-state free precession sequences is continuously varied as suggested for MR-fingerprinting sequences. Flip angle variations prevent the establishment of a steady state and introduce instabilities regarding to magnetic field inhomogeneities and intravoxel dephasing. We show how a pseudo steady state can be achieved, which restores the spin echo nature of steady-state free precession. Based on geometrical considerations, relationships between the flip angle, repetition and echo time are derived that suffice to the establishment of a pseudo steady state. The theory is tested with Bloch simulations as well as phantom and in vivo experiments. A typical steady-state free precession passband can be restored with the proposed conditions. The stability of the pseudo steady state is demonstrated by comparing the evolution of the signal of a single isochromat to one resulting from a spin ensemble. As confirmed by experiments, magnetization in a pseudo steady state can be described with fewer degrees of freedom compared to the original fingerprinting and the pseudo steady state results in more reliable parameter maps. The proposed conditions restore the spin-echo-like signal behavior typical for steady-state free precession in fingerprinting sequences, making this approach more robust to B 0 variations. Magn Reson Med 77:1151-1161, 2017. © 2016 International Society for Magnetic Resonance in Medicine. © 2016 International Society for Magnetic Resonance in Medicine.

  12. Face Recognition and Tracking in Videos

    Directory of Open Access Journals (Sweden)

    Swapnil Vitthal Tathe

    2017-07-01

    Full Text Available Advancement in computer vision technology and availability of video capturing devices such as surveillance cameras has evoked new video processing applications. The research in video face recognition is mostly biased towards law enforcement applications. Applications involves human recognition based on face and iris, human computer interaction, behavior analysis, video surveillance etc. This paper presents face tracking framework that is capable of face detection using Haar features, recognition using Gabor feature extraction, matching using correlation score and tracking using Kalman filter. The method has good recognition rate for real-life videos and robust performance to changes due to illumination, environmental factors, scale, pose and orientations.

  13. Fingerprint separation: an application of ICA

    Science.gov (United States)

    Singh, Meenakshi; Singh, Deepak Kumar; Kalra, Prem Kumar

    2008-04-01

    Among all existing biometric techniques, fingerprint-based identification is the oldest method, which has been successfully used in numerous applications. Fingerprint-based identification is the most recognized tool in biometrics because of its reliability and accuracy. Fingerprint identification is done by matching questioned and known friction skin ridge impressions from fingers, palms, and toes to determine if the impressions are from the same finger (or palm, toe, etc.). There are many fingerprint matching algorithms which automate and facilitate the job of fingerprint matching, but for any of these algorithms matching can be difficult if the fingerprints are overlapped or mixed. In this paper, we have proposed a new algorithm for separating overlapped or mixed fingerprints so that the performance of the matching algorithms will improve when they are fed with these inputs. Independent Component Analysis (ICA) has been used as a tool to separate the overlapped or mixed fingerprints.

  14. Fingerprints in Compressed Strings

    DEFF Research Database (Denmark)

    Bille, Philip; Cording, Patrick Hagge; Gørtz, Inge Li

    2013-01-01

    The Karp-Rabin fingerprint of a string is a type of hash value that due to its strong properties has been used in many string algorithms. In this paper we show how to construct a data structure for a string S of size N compressed by a context-free grammar of size n that answers fingerprint queries...... derivative that captures LZ78 compression and its variations) we get O(loglogN) query time. Hence, our data structures has the same time and space complexity as for random access in SLPs. We utilize the fingerprint data structures to solve the longest common extension problem in query time O(logNlogℓ) and O....... That is, given indices i and j, the answer to a query is the fingerprint of the substring S[i,j]. We present the first O(n) space data structures that answer fingerprint queries without decompressing any characters. For Straight Line Programs (SLP) we get O(logN) query time, and for Linear SLPs (an SLP...

  15. Study on internal to surface fingerprint correlation using optical coherence tomography and internal fingerprint extraction

    CSIR Research Space (South Africa)

    Darlow, LN

    2015-11-01

    Full Text Available of, the above-mentioned works. Internal fingerprint zone detection is an improvement as it uses fuzzy c-means to improve clustering performance, uses better cluster result postprocessing, and improves upon the fine-tuning procedure through... Internal fingerprint extraction consists of two main parts: fingerprint zone detection and extraction. Zone detection uses fuzzy c-means clustering to approximate the location of the papillary junction (i.e., the internal fingerprint zone). Edge detection...

  16. Modeling Audio Fingerprints : Structure, Distortion, Capacity

    NARCIS (Netherlands)

    Doets, P.J.O.

    2010-01-01

    An audio fingerprint is a compact low-level representation of a multimedia signal. An audio fingerprint can be used to identify audio files or fragments in a reliable way. The use of audio fingerprints for identification consists of two phases. In the enrollment phase known content is fingerprinted,

  17. A blind video watermarking scheme resistant to rotation and collusion attacks

    Directory of Open Access Journals (Sweden)

    Amlan Karmakar

    2016-04-01

    Full Text Available In this paper, Discrete Cosine Transform (DCT based blind video watermarking algorithm is proposed, which is perceptually invisible and robust against rotation and collusion attacks. To make the scheme resistant against rotation, watermark is embedded within the square blocks, placed on the middle position of every luminance channel. Then Zernike moments of those square blocks are calculated. The rotation invariance property of the Complex Zernike moments is exploited to predict the rotation angle of the video at the time of extraction of watermark bits. To make the scheme robust against collusion, design of the scheme is done in such a way that the embedding blocks will vary for the successive frames of the video. A Pseudo Random Number (PRN generator and a permutation vector are used to achieve the goal. The experimental results show that the scheme is robust against conventional video attacks, rotation attack and collusion attacks.

  18. Fingerprint re-alignment: a solution based on the true fingerprint center point

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-02-01

    Full Text Available Solution Based on the True Fingerprint Center Point Ishmael S. Msiza, Brain Leke-Betechuoh, and Tendani Malumedzha Biometrics Research Group ? Information Security CSIR, Modelling & Digital Science Unit Pretoria, Republic of South Africa e... with a pattern that belongs to the Tented Arch (TA) fingerprint class. Fingerprints that belong to the TA class have a single core and a single delta, with the core located almost directly above the delta, as depicted in figure 3 (b). Many singular...

  19. Problems in the fingerprints based polycyclic aromatic hydrocarbons source apportionment analysis and a practical solution.

    Science.gov (United States)

    Zou, Yonghong; Wang, Lixia; Christensen, Erik R

    2015-10-01

    This work intended to explain the challenges of the fingerprints based source apportionment method for polycyclic aromatic hydrocarbons (PAH) in the aquatic environment, and to illustrate a practical and robust solution. The PAH data detected in the sediment cores from the Illinois River provide the basis of this study. Principal component analysis (PCA) separates PAH compounds into two groups reflecting their possible airborne transport patterns; but it is not able to suggest specific sources. Not all positive matrix factorization (PMF) determined sources are distinguishable due to the variability of source fingerprints. However, they constitute useful suggestions for inputs for a Bayesian chemical mass balance (CMB) analysis. The Bayesian CMB analysis takes into account the measurement errors as well as the variations of source fingerprints, and provides a credible source apportionment. Major PAH sources for Illinois River sediments are traffic (35%), coke oven (24%), coal combustion (18%), and wood combustion (14%). Copyright © 2015. Published by Elsevier Ltd.

  20. Fingerprint fake detection by optical coherence tomography

    Science.gov (United States)

    Meissner, Sven; Breithaupt, Ralph; Koch, Edmund

    2013-03-01

    The most established technique for the identification at biometric access control systems is the human fingerprint. While every human fingerprint is unique, fingerprints can be faked very easily by using thin layer fakes. Because commercial fingerprint scanners use only a two-dimensional image acquisition of the finger surface, they can only hardly differentiate between real fingerprints and fingerprint fakes applied on thin layer materials. A Swept Source OCT system with an A-line rate of 20 kHz and a lateral and axial resolution of approximately 13 μm, a centre wavelength of 1320 nm and a band width of 120 nm (FWHM) was used to acquire fingerprints and finger tips with overlying fakes. Three-dimensional volume stacks with dimensions of 4.5 mm x 4 mm x 2 mm were acquired. The layering arrangement of the imaged finger tips and faked finger tips was analyzed and subsequently classified into real and faked fingerprints. Additionally, sweat gland ducts were detected and consulted for the classification. The manual classification between real fingerprints and faked fingerprints results in almost 100 % correctness. The outer as well as the internal fingerprint can be recognized in all real human fingers, whereby this was not possible in the image stacks of the faked fingerprints. Furthermore, in all image stacks of real human fingers the sweat gland ducts were detected. The number of sweat gland ducts differs between the test persons. The typical helix shape of the ducts was observed. In contrast, in images of faked fingerprints we observe abnormal layer arrangements and no sweat gland ducts connecting the papillae of the outer fingerprint and the internal fingerprint. We demonstrated that OCT is a very useful tool to enhance the performance of biometric control systems concerning attacks by thin layer fingerprint fakes.

  1. A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rössler Map

    Directory of Open Access Journals (Sweden)

    F. Abundiz-Pérez

    2016-01-01

    Full Text Available Currently, biometric identifiers have been used to identify or authenticate users in a biometric system to increase the security in access control systems. Nevertheless, there are several attacks on the biometric system to steal and recover the user’s biometric trait. One of the most powerful attacks is extracting the fingerprint pattern when it is transmitted over communication lines between modules. In this paper, we present a novel fingerprint image encryption scheme based on hyperchaotic Rössler map to provide high security and secrecy in user’s biometric trait, avoid identity theft, and increase the robustness of the biometric system. A complete security analysis is presented to justify the secrecy of the biometric trait by using our proposed scheme at statistical level with 100% of NPCR, low correlation, and uniform histograms. Therefore, it can be used in secure biometric access control systems.

  2. Tracing catchment fine sediment sources using the new SIFT (SedIment Fingerprinting Tool) open source software.

    Science.gov (United States)

    Pulley, S; Collins, A L

    2018-09-01

    The mitigation of diffuse sediment pollution requires reliable provenance information so that measures can be targeted. Sediment source fingerprinting represents one approach for supporting these needs, but recent methodological developments have resulted in an increasing complexity of data processing methods rendering the approach less accessible to non-specialists. A comprehensive new software programme (SIFT; SedIment Fingerprinting Tool) has therefore been developed which guides the user through critical data analysis decisions and automates all calculations. Multiple source group configurations and composite fingerprints are identified and tested using multiple methods of uncertainty analysis. This aims to explore the sediment provenance information provided by the tracers more comprehensively than a single model, and allows for model configurations with high uncertainties to be rejected. This paper provides an overview of its application to an agricultural catchment in the UK to determine if the approach used can provide a reduction in uncertainty and increase in precision. Five source group classifications were used; three formed using a k-means cluster analysis containing 2, 3 and 4 clusters, and two a-priori groups based upon catchment geology. Three different composite fingerprints were used for each classification and bi-plots, range tests, tracer variability ratios and virtual mixtures tested the reliability of each model configuration. Some model configurations performed poorly when apportioning the composition of virtual mixtures, and different model configurations could produce different sediment provenance results despite using composite fingerprints able to discriminate robustly between the source groups. Despite this uncertainty, dominant sediment sources were identified, and those in close proximity to each sediment sampling location were found to be of greatest importance. This new software, by integrating recent methodological developments in

  3. Classical and quantum fingerprinting strategies

    International Nuclear Information System (INIS)

    Scott, A.; Walgate, J.; Sanders, B.

    2005-01-01

    Full text: Fingerprinting enables two parties to infer whether the messages they hold are the same or different when the cost of communication is high: each message is associated with a smaller fingerprint and comparisons between messages are made in terms of their fingerprints alone. When the two parties are forbidden access to a public coin, it is known that fingerprints composed of quantum information can be made exponentially smaller than those composed of classical information. We present specific constructions of classical fingerprinting strategies through the use of constant-weight codes and provide bounds on the worst-case error probability with the help of extremal set theory. These classical strategies are easily outperformed by quantum strategies constructed from line packings and equiangular tight frames. (author)

  4. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Benoit Macq

    2008-07-01

    Full Text Available Based on the analysis of real mobile ad hoc network (MANET traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS to wireless clients is demonstrated.

  5. Video surveillance using distance maps

    Science.gov (United States)

    Schouten, Theo E.; Kuppens, Harco C.; van den Broek, Egon L.

    2006-02-01

    Human vigilance is limited; hence, automatic motion and distance detection is one of the central issues in video surveillance. Hereby, many aspects are of importance, this paper specially addresses: efficiency, achieving real-time performance, accuracy, and robustness against various noise factors. To obtain fully controlled test environments, an artificial development center for robot navigation is introduced in which several parameters can be set (e.g., number of objects, trajectories and type and amount of noise). In the videos, for each following frame, movement of stationary objects is detected and pixels of moving objects are located from which moving objects are identified in a robust way. An Exact Euclidean Distance Map (E2DM) is utilized to determine accurately the distances between moving and stationary objects. Together with the determined distances between moving objects and the detected movement of stationary objects, this provides the input for detecting unwanted situations in the scene. Further, each intelligent object (e.g., a robot), is provided with its E2DM, allowing the object to plan its course of action. Timing results are specified for each program block of the processing chain for 20 different setups. So, the current paper presents extensive, experimentally controlled research on real-time, accurate, and robust motion detection for video surveillance, using E2DMs, which makes it a unique approach.

  6. Advances in fingerprint analysis.

    Science.gov (United States)

    Hazarika, Pompi; Russell, David A

    2012-04-10

    Fingerprints have been used in forensic investigations for the identification of individuals since the late 19th century. However, it is now clear that fingerprints can provide significantly more information about an individual. Here, we highlight the considerable advances in fingerprinting technology that can simultaneously provide chemical information regarding the drugs ingested and the explosives and drugs handled by a person as well as the identity of that individual. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Influence of Skin Diseases on Fingerprint Recognition

    Science.gov (United States)

    Drahansky, Martin; Dolezel, Michal; Urbanek, Jaroslav; Brezinova, Eva; Kim, Tai-hoon

    2012-01-01

    There are many people who suffer from some of the skin diseases. These diseases have a strong influence on the process of fingerprint recognition. People with fingerprint diseases are unable to use fingerprint scanners, which is discriminating for them, since they are not allowed to use their fingerprints for the authentication purposes. First in this paper the various diseases, which might influence functionality of the fingerprint-based systems, are introduced, mainly from the medical point of view. This overview is followed by some examples of diseased finger fingerprints, acquired both from dactyloscopic card and electronic sensors. At the end of this paper the proposed fingerprint image enhancement algorithm is described. PMID:22654483

  8. Influence of Skin Diseases on Fingerprint Recognition

    Directory of Open Access Journals (Sweden)

    Martin Drahansky

    2012-01-01

    Full Text Available There are many people who suffer from some of the skin diseases. These diseases have a strong influence on the process of fingerprint recognition. People with fingerprint diseases are unable to use fingerprint scanners, which is discriminating for them, since they are not allowed to use their fingerprints for the authentication purposes. First in this paper the various diseases, which might influence functionality of the fingerprint-based systems, are introduced, mainly from the medical point of view. This overview is followed by some examples of diseased finger fingerprints, acquired both from dactyloscopic card and electronic sensors. At the end of this paper the proposed fingerprint image enhancement algorithm is described.

  9. Fingerprints for main varieties of argentinean wines: terroir differentiation by inorganic, organic, and stable isotopic analyses coupled to chemometrics.

    Science.gov (United States)

    Di Paola-Naranjo, Romina D; Baroni, Maria V; Podio, Natalia S; Rubinstein, Hector R; Fabani, Maria P; Badini, Raul G; Inga, Marcela; Ostera, Hector A; Cagnoni, Mariana; Gallegos, Ernesto; Gautier, Eduardo; Peral-Garcia, Pilar; Hoogewerff, Jurian; Wunderlin, Daniel A

    2011-07-27

    Our main goal was to investigate if robust chemical fingerprints could be developed for three Argentinean red wines based on organic, inorganic, and isotopic patterns, in relation to the regional soil composition. Soils and wines from three regions (Mendoza, San Juan, and Córdoba) and three varieties (Cabernet Sauvignon, Malbec, and Syrah) were collected. The phenolic profile was determined by HPLC-MS/MS and multielemental composition by ICP-MS; (87)Sr/(86)Sr and δ(13)C were determined by TIMS and IRMS, respectively. Chemometrics allowed robust differentiation between regions, wine varieties, and the same variety from different regions. Among phenolic compounds, resveratrol concentration was the most useful marker for wine differentiation, whereas Mg, K/Rb, Ca/Sr, and (87)Sr/(86)Sr were the main inorganic and isotopic parameters selected. Generalized Procrustes analysis (GPA) using two studied matrices (wine and soil) shows consensus between them and clear differences between studied areas. Finally, we applied a canonical correlation analysis, demonstrating significant correlation (r = 0.99; p wine composition. To our knowledge this is the first report combining independent variables, constructing a fingerprint including elemental composition, isotopic, and polyphenol patterns to differentiate wines, matching part of this fingerprint with the soil provenance.

  10. Spatial Pyramid Covariance based Compact Video Code for Robust Face Retrieval in TV-series.

    Science.gov (United States)

    Li, Yan; Wang, Ruiping; Cui, Zhen; Shan, Shiguang; Chen, Xilin

    2016-10-10

    We address the problem of face video retrieval in TV-series which searches video clips based on the presence of specific character, given one face track of his/her. This is tremendously challenging because on one hand, faces in TV-series are captured in largely uncontrolled conditions with complex appearance variations, and on the other hand retrieval task typically needs efficient representation with low time and space complexity. To handle this problem, we propose a compact and discriminative representation for the huge body of video data, named Compact Video Code (CVC). Our method first models the face track by its sample (i.e., frame) covariance matrix to capture the video data variations in a statistical manner. To incorporate discriminative information and obtain more compact video signature suitable for retrieval, the high-dimensional covariance representation is further encoded as a much lower-dimensional binary vector, which finally yields the proposed CVC. Specifically, each bit of the code, i.e., each dimension of the binary vector, is produced via supervised learning in a max margin framework, which aims to make a balance between the discriminability and stability of the code. Besides, we further extend the descriptive granularity of covariance matrix from traditional pixel-level to more general patchlevel, and proceed to propose a novel hierarchical video representation named Spatial Pyramid Covariance (SPC) along with a fast calculation method. Face retrieval experiments on two challenging TV-series video databases, i.e., the Big Bang Theory and Prison Break, demonstrate the competitiveness of the proposed CVC over state-of-the-art retrieval methods. In addition, as a general video matching algorithm, CVC is also evaluated in traditional video face recognition task on a standard Internet database, i.e., YouTube Celebrities, showing its quite promising performance by using an extremely compact code with only 128 bits.

  11. Fingerprint start the next generation of payment method : Fingerprint payment: a new mode of mobile payment

    OpenAIRE

    Wu, Chong

    2016-01-01

    In the generation of mobile internet, fingerprint payment is one of the most popular topics at the moment. China has a big market and many users are using the mobile payment methods. There are a large number of mobile phones equipped with fingerprint recognition technology. As we know, fingerprint payment brings us more convenience and safety. We do not need to use many bankcards, and fingerprint also eliminates the users from the trouble of queuing to pay. However, users send traditional dig...

  12. Reference point detection for improved fingerprint matching

    NARCIS (Netherlands)

    Ignatenko, T.; Kalker, A.A.C.M.; Veen, van der M.; Bazen, A.; Delp, E.J.; Wong, P.W.

    2006-01-01

    One of the important stages of fingerprint recognition is the registration of the fingerprints with respect to the original template. This is not a straightforward task as fingerprint images may have been subject to rotations and translations. Popular techniques for fingerprint registration use a

  13. Using dynamic mode decomposition for real-time background/foreground separation in video

    Science.gov (United States)

    Kutz, Jose Nathan; Grosek, Jacob; Brunton, Steven; Fu, Xing; Pendergrass, Seth

    2017-06-06

    The technique of dynamic mode decomposition (DMD) is disclosed herein for the purpose of robustly separating video frames into background (low-rank) and foreground (sparse) components in real-time. Foreground/background separation is achieved at the computational cost of just one singular value decomposition (SVD) and one linear equation solve, thus producing results orders of magnitude faster than robust principal component analysis (RPCA). Additional techniques, including techniques for analyzing the video for multi-resolution time-scale components, and techniques for reusing computations to allow processing of streaming video in real time, are also described herein.

  14. Compact Visualisation of Video Summaries

    Directory of Open Access Journals (Sweden)

    Janko Ćalić

    2007-01-01

    Full Text Available This paper presents a system for compact and intuitive video summarisation aimed at both high-end professional production environments and small-screen portable devices. To represent large amounts of information in the form of a video key-frame summary, this paper studies the narrative grammar of comics, and using its universal and intuitive rules, lays out visual summaries in an efficient and user-centered way. In addition, the system exploits visual attention modelling and rapid serial visual presentation to generate highly compact summaries on mobile devices. A robust real-time algorithm for key-frame extraction is presented. The system ranks importance of key-frame sizes in the final layout by balancing the dominant visual representability and discovery of unanticipated content utilising a specific cost function and an unsupervised robust spectral clustering technique. A final layout is created using an optimisation algorithm based on dynamic programming. Algorithm efficiency and robustness are demonstrated by comparing the results with a manually labelled ground truth and with optimal panelling solutions.

  15. Data Compression of Fingerprint Minutiae

    OpenAIRE

    VISHAL SHRIVASTAVA; SUMIT SHARMA

    2012-01-01

    Biometric techniques have usual advantages over conventional personal identification technique. Among various commercially available biometric techniques such as face, fingerprint, Iris etc., fingerprint-based techniques are the most accepted recognition system. Fingerprints are trace or impression of patterns created byfriction ridges of the skin in the fingers and thumbs. Steganography usually used in smart card is a safe technique for authenticating a person. In steganography, biometric ch...

  16. Fingerprint Recognition Using Minutia Score Matching

    OpenAIRE

    J, Ravi.; Raja, K. B.; R, Venugopal. K.

    2010-01-01

    The popular Biometric used to authenticate a person is Fingerprint which is unique and permanent throughout a person’s life. A minutia matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper we projected Fingerprint Recognition using Minutia Score Matching method (FRMSM). For Fingerprint thinning, the Block Filter is used, which scans the image at the boundary to preserves the quality of the image and extract the minutiae ...

  17. Fingerprint verification prediction model in hand dermatitis.

    Science.gov (United States)

    Lee, Chew K; Chang, Choong C; Johor, Asmah; Othman, Puwira; Baba, Roshidah

    2015-07-01

    Hand dermatitis associated fingerprint changes is a significant problem and affects fingerprint verification processes. This study was done to develop a clinically useful prediction model for fingerprint verification in patients with hand dermatitis. A case-control study involving 100 patients with hand dermatitis. All patients verified their thumbprints against their identity card. Registered fingerprints were randomized into a model derivation and model validation group. Predictive model was derived using multiple logistic regression. Validation was done using the goodness-of-fit test. The fingerprint verification prediction model consists of a major criterion (fingerprint dystrophy area of ≥ 25%) and two minor criteria (long horizontal lines and long vertical lines). The presence of the major criterion predicts it will almost always fail verification, while presence of both minor criteria and presence of one minor criterion predict high and low risk of fingerprint verification failure, respectively. When none of the criteria are met, the fingerprint almost always passes the verification. The area under the receiver operating characteristic curve was 0.937, and the goodness-of-fit test showed agreement between the observed and expected number (P = 0.26). The derived fingerprint verification failure prediction model is validated and highly discriminatory in predicting risk of fingerprint verification in patients with hand dermatitis. © 2014 The International Society of Dermatology.

  18. Robust online face tracking-by-detection

    NARCIS (Netherlands)

    Comaschi, F.; Stuijk, S.; Basten, T.; Corporaal, H.

    2016-01-01

    The problem of online face tracking from unconstrained videos is still unresolved. Challenges range from coping with severe online appearance variations to coping with occlusion. We propose RFTD (Robust Face Tracking-by-Detection), a system which combines tracking and detection into a single

  19. An effective one-dimensional anisotropic fingerprint enhancement algorithm

    Science.gov (United States)

    Ye, Zhendong; Xie, Mei

    2012-01-01

    Fingerprint identification is one of the most important biometric technologies. The performance of the minutiae extraction and the speed of the fingerprint verification system rely heavily on the quality of the input fingerprint images, so the enhancement of the low fingerprint is a critical and difficult step in a fingerprint verification system. In this paper we proposed an effective algorithm for fingerprint enhancement. Firstly we use normalization algorithm to reduce the variations in gray level values along ridges and valleys. Then we utilize the structure tensor approach to estimate each pixel of the fingerprint orientations. At last we propose a novel algorithm which combines the advantages of onedimensional Gabor filtering method and anisotropic method to enhance the fingerprint in recoverable region. The proposed algorithm has been evaluated on the database of Fingerprint Verification Competition 2004, and the results show that our algorithm performs within less time.

  20. Human recognition in a video network

    Science.gov (United States)

    Bhanu, Bir

    2009-10-01

    Video networks is an emerging interdisciplinary field with significant and exciting scientific and technological challenges. It has great promise in solving many real-world problems and enabling a broad range of applications, including smart homes, video surveillance, environment and traffic monitoring, elderly care, intelligent environments, and entertainment in public and private spaces. This paper provides an overview of the design of a wireless video network as an experimental environment, camera selection, hand-off and control, anomaly detection. It addresses challenging questions for individual identification using gait and face at a distance and present new techniques and their comparison for robust identification.

  1. Efficient and robust pupil size and blink estimation from near-field video sequences for human-machine interaction.

    Science.gov (United States)

    Chen, Siyuan; Epps, Julien

    2014-12-01

    Monitoring pupil and blink dynamics has applications in cognitive load measurement during human-machine interaction. However, accurate, efficient, and robust pupil size and blink estimation pose significant challenges to the efficacy of real-time applications due to the variability of eye images, hence to date, require manual intervention for fine tuning of parameters. In this paper, a novel self-tuning threshold method, which is applicable to any infrared-illuminated eye images without a tuning parameter, is proposed for segmenting the pupil from the background images recorded by a low cost webcam placed near the eye. A convex hull and a dual-ellipse fitting method are also proposed to select pupil boundary points and to detect the eyelid occlusion state. Experimental results on a realistic video dataset show that the measurement accuracy using the proposed methods is higher than that of widely used manually tuned parameter methods or fixed parameter methods. Importantly, it demonstrates convenience and robustness for an accurate and fast estimate of eye activity in the presence of variations due to different users, task types, load, and environments. Cognitive load measurement in human-machine interaction can benefit from this computationally efficient implementation without requiring a threshold calibration beforehand. Thus, one can envisage a mini IR camera embedded in a lightweight glasses frame, like Google Glass, for convenient applications of real-time adaptive aiding and task management in the future.

  2. Robust digital image inpainting algorithm in the wireless environment

    Science.gov (United States)

    Karapetyan, G.; Sarukhanyan, H. G.; Agaian, S. S.

    2014-05-01

    Image or video inpainting is the process/art of retrieving missing portions of an image without introducing undesirable artifacts that are undetectable by an ordinary observer. An image/video can be damaged due to a variety of factors, such as deterioration due to scratches, laser dazzling effects, wear and tear, dust spots, loss of data when transmitted through a channel, etc. Applications of inpainting include image restoration (removing laser dazzling effects, dust spots, date, text, time, etc.), image synthesis (texture synthesis), completing panoramas, image coding, wireless transmission (recovery of the missing blocks), digital culture protection, image de-noising, fingerprint recognition, and film special effects and production. Most inpainting methods can be classified in two key groups: global and local methods. Global methods are used for generating large image regions from samples while local methods are used for filling in small image gaps. Each method has its own advantages and limitations. For example, the global inpainting methods perform well on textured image retrieval, whereas the classical local methods perform poorly. In addition, some of the techniques are computationally intensive; exceeding the capabilities of most currently used mobile devices. In general, the inpainting algorithms are not suitable for the wireless environment. This paper presents a new and efficient scheme that combines the advantages of both local and global methods into a single algorithm. Particularly, it introduces a blind inpainting model to solve the above problems by adaptively selecting support area for the inpainting scheme. The proposed method is applied to various challenging image restoration tasks, including recovering old photos, recovering missing data on real and synthetic images, and recovering the specular reflections in endoscopic images. A number of computer simulations demonstrate the effectiveness of our scheme and also illustrate the main properties

  3. An Introduction to DNA Fingerprinting.

    Science.gov (United States)

    Hepfer, Carol Ely; And Others

    1993-01-01

    Provides background information on DNA fingerprinting, and describes exercises for introducing general biology students at the high school or college level to the methodology and applications of DNA fingerprinting. (PR)

  4. An investigation of fake fingerprint detection approaches

    Science.gov (United States)

    Ahmad, Asraful Syifaa'; Hassan, Rohayanti; Othman, Razib M.

    2017-10-01

    The most reliable biometrics technology, fingerprint recognition is widely used in terms of security due to its permanence and uniqueness. However, it is also vulnerable to the certain type of attacks including presenting fake fingerprints to the sensor which requires the development of new and efficient protection measures. Particularly, the aim is to identify the most recent literature related to the fake fingerprint recognition and only focus on software-based approaches. A systematic review is performed by analyzing 146 primary studies from the gross collection of 34 research papers to determine the taxonomy, approaches, online public databases, and limitations of the fake fingerprint. Fourteen software-based approaches have been briefly described, four limitations of fake fingerprint image were revealed and two known fake fingerprint databases were addressed briefly in this review. Therefore this work provides an overview of an insight into the current understanding of fake fingerprint recognition besides identifying future research possibilities.

  5. Predicting the performance of fingerprint similarity searching.

    Science.gov (United States)

    Vogt, Martin; Bajorath, Jürgen

    2011-01-01

    Fingerprints are bit string representations of molecular structure that typically encode structural fragments, topological features, or pharmacophore patterns. Various fingerprint designs are utilized in virtual screening and their search performance essentially depends on three parameters: the nature of the fingerprint, the active compounds serving as reference molecules, and the composition of the screening database. It is of considerable interest and practical relevance to predict the performance of fingerprint similarity searching. A quantitative assessment of the potential that a fingerprint search might successfully retrieve active compounds, if available in the screening database, would substantially help to select the type of fingerprint most suitable for a given search problem. The method presented herein utilizes concepts from information theory to relate the fingerprint feature distributions of reference compounds to screening libraries. If these feature distributions do not sufficiently differ, active database compounds that are similar to reference molecules cannot be retrieved because they disappear in the "background." By quantifying the difference in feature distribution using the Kullback-Leibler divergence and relating the divergence to compound recovery rates obtained for different benchmark classes, fingerprint search performance can be quantitatively predicted.

  6. Studies on Chromatographic Fingerprint and Fingerprinting Profile-Efficacy Relationship of Saxifraga stolonifera Meerb.

    Directory of Open Access Journals (Sweden)

    Xing-Dong Wu

    2015-12-01

    Full Text Available This work investigated the spectrum-effect relationships between high performance liquid chromatography (HPLC fingerprints and the anti-benign prostatic hyperplasia activities of aqueous extracts from Saxifraga stolonifera. The fingerprints of S. stolonifera from various sources were established by HPLC and evaluated by similarity analysis (SA, hierarchical clustering analysis (HCA and principal component analysis (PCA. Nine samples were obtained from these 24 batches of different origins, according to the results of SA, HCA and the common chromatographic peaks area. A testosterone-induced mouse model of benign prostatic hyperplasia (BPH was used to establish the anti-benign prostatic hyperplasia activities of these nine S. stolonifera samples. The model was evaluated by analyzing prostatic index (PI, serum acid phosphatase (ACP activity, concentrations of serum dihydrotestosterone (DHT, prostatic acid phosphatase (PACP and type II 5α-reductase (SRD5A2. The spectrum-effect relationships between HPLC fingerprints and anti-benign prostatic hyperplasia activities were investigated using Grey Correlation Analysis (GRA and partial least squares regression (PLSR. The results showed that a close correlation existed between the fingerprints and anti-benign prostatic hyperplasia activities, and peak 14 (chlorogenic acid, peak 17 (quercetin 5-O-β-d-glucopyranoside and peak 18 (quercetin 3-O-β-l-rhamno-pyranoside in the HPLC fingerprints might be the main active components against anti-benign prostatic hyperplasia. This work provides a general model for the study of spectrum-effect relationships of S. stolonifera by combing HPLC fingerprints with a testosterone-induced mouse model of BPH, which can be employed to discover the principle components of anti-benign prostatic hyperplasia bioactivity.

  7. Fast and efficient search for MPEG-4 video using adjacent pixel intensity difference quantization histogram feature

    Science.gov (United States)

    Lee, Feifei; Kotani, Koji; Chen, Qiu; Ohmi, Tadahiro

    2010-02-01

    In this paper, a fast search algorithm for MPEG-4 video clips from video database is proposed. An adjacent pixel intensity difference quantization (APIDQ) histogram is utilized as the feature vector of VOP (video object plane), which had been reliably applied to human face recognition previously. Instead of fully decompressed video sequence, partially decoded data, namely DC sequence of the video object are extracted from the video sequence. Combined with active search, a temporal pruning algorithm, fast and robust video search can be realized. The proposed search algorithm has been evaluated by total 15 hours of video contained of TV programs such as drama, talk, news, etc. to search for given 200 MPEG-4 video clips which each length is 15 seconds. Experimental results show the proposed algorithm can detect the similar video clip in merely 80ms, and Equal Error Rate (ERR) of 2 % in drama and news categories are achieved, which are more accurately and robust than conventional fast video search algorithm.

  8. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  9. New robust algorithm for tracking cells in videos of Drosophila morphogenesis based on finding an ideal path in segmented spatio-temporal cellular structures.

    Science.gov (United States)

    Bellaïche, Yohanns; Bosveld, Floris; Graner, François; Mikula, Karol; Remesíková, Mariana; Smísek, Michal

    2011-01-01

    In this paper, we present a novel algorithm for tracking cells in time lapse confocal microscopy movie of a Drosophila epithelial tissue during pupal morphogenesis. We consider a 2D + time video as a 3D static image, where frames are stacked atop each other, and using a spatio-temporal segmentation algorithm we obtain information about spatio-temporal 3D tubes representing evolutions of cells. The main idea for tracking is the usage of two distance functions--first one from the cells in the initial frame and second one from segmented boundaries. We track the cells backwards in time. The first distance function attracts the subsequently constructed cell trajectories to the cells in the initial frame and the second one forces them to be close to centerlines of the segmented tubular structures. This makes our tracking algorithm robust against noise and missing spatio-temporal boundaries. This approach can be generalized to a 3D + time video analysis, where spatio-temporal tubes are 4D objects.

  10. Contextual analysis of videos

    CERN Document Server

    Thida, Myo; Monekosso, Dorothy

    2013-01-01

    Video context analysis is an active and vibrant research area, which provides means for extracting, analyzing and understanding behavior of a single target and multiple targets. Over the last few decades, computer vision researchers have been working to improve the accuracy and robustness of algorithms to analyse the context of a video automatically. In general, the research work in this area can be categorized into three major topics: 1) counting number of people in the scene 2) tracking individuals in a crowd and 3) understanding behavior of a single target or multiple targets in the scene.

  11. Latent fingerprints on different type of screen protective films

    Directory of Open Access Journals (Sweden)

    Yuttana Sudjaroen

    2016-07-01

    Full Text Available The purpose of this research was to study the quality of latent fingerprint on different types of screen protective films including screen protector, matte screen protector, anti-fingerprint clear screen protector and anti-fingerprint matte screen protector by using black powder method in developing latent fingerprints. The fingerprints were performed by 10 volunteers whose fingers (right index, right thumb, left index and left thumb were stubbing at different types of screen protective films and subsequently latent fingerprints were developed by brushing with black powder. Automated Fingerprint Identification System (AFIS counted the numbers of minutiae points from 320 latent fingerprints. Anti-fingerprint matte screen protective film produced the best quality of latent fingerprint with an average minutiae point 72.65, followed by matte screen protective film, clear screen protective film and anti-fingerprint clear screen protective film with an average minutiae point of 155.2, 135.0 and 72.65 respectively. The quality of latent fingerprints developed between a clear and a matte surface of screen protective films showed a significant difference (sig>0.05, whereas the coat and the non-coat with anti-fingerprint chemical revealed a non-significant difference (sig<0.05 in their number of minutiae points.

  12. Web-video-mining-supported workflow modeling for laparoscopic surgeries.

    Science.gov (United States)

    Liu, Rui; Zhang, Xiaoli; Zhang, Hao

    2016-11-01

    As quality assurance is of strong concern in advanced surgeries, intelligent surgical systems are expected to have knowledge such as the knowledge of the surgical workflow model (SWM) to support their intuitive cooperation with surgeons. For generating a robust and reliable SWM, a large amount of training data is required. However, training data collected by physically recording surgery operations is often limited and data collection is time-consuming and labor-intensive, severely influencing knowledge scalability of the surgical systems. The objective of this research is to solve the knowledge scalability problem in surgical workflow modeling with a low cost and labor efficient way. A novel web-video-mining-supported surgical workflow modeling (webSWM) method is developed. A novel video quality analysis method based on topic analysis and sentiment analysis techniques is developed to select high-quality videos from abundant and noisy web videos. A statistical learning method is then used to build the workflow model based on the selected videos. To test the effectiveness of the webSWM method, 250 web videos were mined to generate a surgical workflow for the robotic cholecystectomy surgery. The generated workflow was evaluated by 4 web-retrieved videos and 4 operation-room-recorded videos, respectively. The evaluation results (video selection consistency n-index ≥0.60; surgical workflow matching degree ≥0.84) proved the effectiveness of the webSWM method in generating robust and reliable SWM knowledge by mining web videos. With the webSWM method, abundant web videos were selected and a reliable SWM was modeled in a short time with low labor cost. Satisfied performances in mining web videos and learning surgery-related knowledge show that the webSWM method is promising in scaling knowledge for intelligent surgical systems. Copyright © 2016 Elsevier B.V. All rights reserved.

  13. Fingerprints in compressed strings

    DEFF Research Database (Denmark)

    Bille, Philip; Gørtz, Inge Li; Cording, Patrick Hagge

    2017-01-01

    In this paper we show how to construct a data structure for a string S of size N compressed into a context-free grammar of size n that supports efficient Karp–Rabin fingerprint queries to any substring of S. That is, given indices i and j, the answer to a query is the fingerprint of the substring S......[i,j]. We present the first O(n) space data structures that answer fingerprint queries without decompressing any characters. For Straight Line Programs (SLP) we get O(log⁡N) query time, and for Linear SLPs (an SLP derivative that captures LZ78 compression and its variations) we get O(log⁡log⁡N) query time...

  14. Case study of 3D fingerprints applications.

    Directory of Open Access Journals (Sweden)

    Feng Liu

    Full Text Available Human fingers are 3D objects. More information will be provided if three dimensional (3D fingerprints are available compared with two dimensional (2D fingerprints. Thus, this paper firstly collected 3D finger point cloud data by Structured-light Illumination method. Additional features from 3D fingerprint images are then studied and extracted. The applications of these features are finally discussed. A series of experiments are conducted to demonstrate the helpfulness of 3D information to fingerprint recognition. Results show that a quick alignment can be easily implemented under the guidance of 3D finger shape feature even though this feature does not work for fingerprint recognition directly. The newly defined distinctive 3D shape ridge feature can be used for personal authentication with Equal Error Rate (EER of ~8.3%. Also, it is helpful to remove false core point. Furthermore, a promising of EER ~1.3% is realized by combining this feature with 2D features for fingerprint recognition which indicates the prospect of 3D fingerprint recognition.

  15. Fingerprint Analysis with Marked Point Processes

    DEFF Research Database (Denmark)

    Forbes, Peter G. M.; Lauritzen, Steffen; Møller, Jesper

    We present a framework for fingerprint matching based on marked point process models. An efficient Monte Carlo algorithm is developed to calculate the marginal likelihood ratio for the hypothesis that two observed prints originate from the same finger against the hypothesis that they originate from...... different fingers. Our model achieves good performance on an NIST-FBI fingerprint database of 258 matched fingerprint pairs....

  16. Collusion-resistant multimedia fingerprinting: a unified framework

    Science.gov (United States)

    Wu, Min; Trappe, Wade; Wang, Z. Jane; Liu, K. J. Ray

    2004-06-01

    Digital fingerprints are unique labels inserted in different copies of the same content before distribution. Each digital fingerprint is assigned to an inteded recipient, and can be used to trace the culprits who use their content for unintended purposes. Attacks mounted by multiple users, known as collusion attacks, provide a cost-effective method for attenuating the identifying fingerprint from each coluder, thus collusion poses a reeal challenge to protect the digital media data and enforce usage policies. This paper examines a few major design methodologies for collusion-resistant fingerprinting of multimedia, and presents a unified framework that helps highlight the common issues and the uniqueness of different fingerprinting techniques.

  17. Dna fingerprinting - review paper

    OpenAIRE

    Blundell, Renald

    2006-01-01

    Before the Polymerase Chain Reaction (PCR) was established, DNA fingerprinting technology has relied for years on Restriction Fragment Length Polymorphism (RFLP) and Variable Number of Tandom Repeats (VNTR) analysis, a very efficient technique but quite laborious and not suitable for high throughput mapping. Since its, development, PCR has provided a new and powerful tool for DNA fingerprinting.

  18. Chromatographic fingerprint similarity analysis for pollutant source identification

    International Nuclear Information System (INIS)

    Xie, Juan-Ping; Ni, Hong-Gang

    2015-01-01

    In the present study, a similarity analysis method was proposed to evaluate the source-sink relationships among environmental media for polybrominated diphenyl ethers (PBDEs), which were taken as the representative contaminants. Chromatographic fingerprint analysis has been widely used in the fields of natural products chemistry and forensic chemistry, but its application to environmental science has been limited. We established a library of various sources of media containing contaminants (e.g., plastics), recognizing that the establishment of a more comprehensive library allows for a better understanding of the sources of contamination. We then compared an environmental complex mixture (e.g., sediment, soil) with the profiles in the library. These comparisons could be used as the first step in source tracking. The cosine similarities between plastic and soil or sediment ranged from 0.53 to 0.68, suggesting that plastic in electronic waste is an important source of PBDEs in the environment, but it is not the only source. A similarity analysis between soil and sediment indicated that they have a source-sink relationship. Generally, the similarity analysis method can encompass more relevant information of complex mixtures in the environment than a profile-based approach that only focuses on target pollutants. There is an inherent advantage to creating a data matrix containing all peaks and their relative levels after matching the peaks based on retention times and peak areas. This data matrix can be used for source identification via a similarity analysis without quantitative or qualitative analysis of all chemicals in a sample. - Highlights: • Chromatographic fingerprint analysis can be used as the first step in source tracking. • Similarity analysis method can encompass more relevant information of pollution. • The fingerprints strongly depend on the chromatographic conditions. • A more effective and robust method for identifying similarities is required

  19. Electronic fingerprinting of the dead.

    Science.gov (United States)

    Rutty, G N; Stringer, K; Turk, E E

    2008-01-01

    To date, a number of methods exist for the capture of fingerprints from cadavers that can then be used in isolation as a primary method for the identification of the dead. We report the use of a handheld, mobile wireless unit used in conjunction with a personal digital assistant (PDA) device for the capture of fingerprints from the dead. We also consider a handheld single-digit fingerprint scanner that utilises a USB laptop connection for the electronic capture of cadaveric fingerprints. Both are single-operator units that, if ridge detail is preserved, can collect a 10-set of finger pad prints in approximately 45 and 90 s, respectively. We present our observations on the restrictions as to when such devices can be used with cadavers. We do, however, illustrate that the images are of sufficient quality to allow positive identification from finger pad prints of the dead. With the development of mobile, handheld, biometric, PDA-based units for the police, we hypothesize that, under certain circumstances, devices such as these could be used for the accelerated acquisition of fingerprint identification data with the potential for rapid near-patient identification in the future.

  20. A Computational Discriminability Analysis on Twin Fingerprints

    Science.gov (United States)

    Liu, Yu; Srihari, Sargur N.

    Sharing similar genetic traits makes the investigation of twins an important study in forensics and biometrics. Fingerprints are one of the most commonly found types of forensic evidence. The similarity between twins’ prints is critical establish to the reliability of fingerprint identification. We present a quantitative analysis of the discriminability of twin fingerprints on a new data set (227 pairs of identical twins and fraternal twins) recently collected from a twin population using both level 1 and level 2 features. Although the patterns of minutiae among twins are more similar than in the general population, the similarity of fingerprints of twins is significantly different from that between genuine prints of the same finger. Twins fingerprints are discriminable with a 1.5%~1.7% higher EER than non-twins. And identical twins can be distinguished by examine fingerprint with a slightly higher error rate than fraternal twins.

  1. Tools for quality control of fingerprint databases

    Science.gov (United States)

    Swann, B. Scott; Libert, John M.; Lepley, Margaret A.

    2010-04-01

    Integrity of fingerprint data is essential to biometric and forensic applications. Accordingly, the FBI's Criminal Justice Information Services (CJIS) Division has sponsored development of software tools to facilitate quality control functions relative to maintaining its fingerprint data assets inherent to the Integrated Automated Fingerprint Identification System (IAFIS) and Next Generation Identification (NGI). This paper provides an introduction of two such tools. The first FBI-sponsored tool was developed by the National Institute of Standards and Technology (NIST) and examines and detects the spectral signature of the ridge-flow structure characteristic of friction ridge skin. The Spectral Image Validation/Verification (SIVV) utility differentiates fingerprints from non-fingerprints, including blank frames or segmentation failures erroneously included in data; provides a "first look" at image quality; and can identify anomalies in sample rates of scanned images. The SIVV utility might detect errors in individual 10-print fingerprints inaccurately segmented from the flat, multi-finger image acquired by one of the automated collection systems increasing in availability and usage. In such cases, the lost fingerprint can be recovered by re-segmentation from the now compressed multi-finger image record. The second FBI-sponsored tool, CropCoeff was developed by MITRE and thoroughly tested via NIST. CropCoeff enables cropping of the replacement single print directly from the compressed data file, thus avoiding decompression and recompression of images that might degrade fingerprint features necessary for matching.

  2. Content-based video indexing and searching with wavelet transformation

    Science.gov (United States)

    Stumpf, Florian; Al-Jawad, Naseer; Du, Hongbo; Jassim, Sabah

    2006-05-01

    Biometric databases form an essential tool in the fight against international terrorism, organised crime and fraud. Various government and law enforcement agencies have their own biometric databases consisting of combination of fingerprints, Iris codes, face images/videos and speech records for an increasing number of persons. In many cases personal data linked to biometric records are incomplete and/or inaccurate. Besides, biometric data in different databases for the same individual may be recorded with different personal details. Following the recent terrorist atrocities, law enforcing agencies collaborate more than before and have greater reliance on database sharing. In such an environment, reliable biometric-based identification must not only determine who you are but also who else you are. In this paper we propose a compact content-based video signature and indexing scheme that can facilitate retrieval of multiple records in face biometric databases that belong to the same person even if their associated personal data are inconsistent. We shall assess the performance of our system using a benchmark audio visual face biometric database that has multiple videos for each subject but with different identity claims. We shall demonstrate that retrieval of relatively small number of videos that are nearest, in terms of the proposed index, to any video in the database results in significant proportion of that individual biometric data.

  3. Enhance Criminal Investigation by Proposed Fingerprint Recognition System

    International Nuclear Information System (INIS)

    Hashem, S.H.; Maolod, A.T.; Mohammad, A.A.

    2014-01-01

    Law enforcement officers and forensic specialists spend hours thinking about how fingerprints solve crimes, and trying to find, collect, record and compare these unique identifiers that can connect a specific person to a specific crime. These individuals understand that a basic human feature that most people take for granted, can be one of the most effective tools in crime solving.This research exploits our previous work to be applicable in criminal investigation field. The present study aims to solve the advance crime by strength fingerprint’s criminal investigation to control the alterations happen intentionally to criminals’ fingerprint. That done by suggest strategy introduce an optimal fingerprint image feature’s vector to the person and then considers it to be stored in database for future matching. Selecting optimal fingerprint feature’s vector strategy deal with considering 10 fingerprints for each criminal person (take the fingerprint in different time and different circumstance of criminal such as finger is dirty, wet, trembling, etc.). Proposal begun with apply a proposed enrollment on all 10 fingerprint for each criminal, the enrollment include the following consequence steps; begin with preprocessing step for each of 10 images including enhancement, then two level of feature extraction (first level to extract arches, whorls, and loops, where second level extract minutiae), after that applying proposed Genetic Algorithm to select optimal fingerprint, master fingerprint, which in our point of view present the most universal image which include more detailed features to recognition. Master fingerprint will be feature’s vector which stored in database. Then apply the proposed matching by testing fingerprints with these stored in database.While, measuring of criminal fingerprint investigation performance by calculating False Reject Rate (FRR)and False Accept Rate (FAR) for the traditional system and the proposed in criminal detection field. The

  4. High efficiency video coding (HEVC) algorithms and architectures

    CERN Document Server

    Budagavi, Madhukar; Sullivan, Gary

    2014-01-01

    This book provides developers, engineers, researchers and students with detailed knowledge about the High Efficiency Video Coding (HEVC) standard. HEVC is the successor to the widely successful H.264/AVC video compression standard, and it provides around twice as much compression as H.264/AVC for the same level of quality. The applications for HEVC will not only cover the space of the well-known current uses and capabilities of digital video – they will also include the deployment of new services and the delivery of enhanced video quality, such as ultra-high-definition television (UHDTV) and video with higher dynamic range, wider range of representable color, and greater representation precision than what is typically found today. HEVC is the next major generation of video coding design – a flexible, reliable and robust solution that will support the next decade of video applications and ease the burden of video on world-wide network traffic. This book provides a detailed explanation of the various parts ...

  5. ORIENTATION FIELD RECONSTRUCTION OF ALTERED FINGERPRINT USING ORTHOGONAL WAVELETS

    Directory of Open Access Journals (Sweden)

    Mini M.G.

    2016-11-01

    Full Text Available Ridge orientation field is an important feature for fingerprint matching and fingerprint reconstruction. Matching of the altered fingerprint against its unaltered mates can be done by extracting the available features in the altered fingerprint and using it along with approximated ridge orientation. This paper presents a method for approximating ridge orientation field of altered fingerprints. In the proposed method, sine and cosine of doubled orientation of the fingerprint is decomposed using orthogonal wavelets and reconstructed back using only the approximation coefficients. No prior information about the singular points is needed for orientation approximation. The method is found suitable for orientation estimation of low quality fingerprint images also.

  6. Three-dimensional imaging of artificial fingerprint by optical coherence tomography

    Science.gov (United States)

    Larin, Kirill V.; Cheng, Yezeng

    2008-03-01

    Fingerprint recognition is one of the popular used methods of biometrics. However, due to the surface topography limitation, fingerprint recognition scanners are easily been spoofed, e.g. using artificial fingerprint dummies. Thus, biometric fingerprint identification devices need to be more accurate and secure to deal with different fraudulent methods including dummy fingerprints. Previously, we demonstrated that Optical Coherence Tomography (OCT) images revealed the presence of the artificial fingerprints (made from different household materials, such as cement and liquid silicone rubber) at all times, while the artificial fingerprints easily spoofed the commercial fingerprint reader. Also we demonstrated that an analysis of the autocorrelation of the OCT images could be used in automatic recognition systems. Here, we exploited the three-dimensional (3D) imaging of the artificial fingerprint by OCT to generate vivid 3D image for both the artificial fingerprint layer and the real fingerprint layer beneath. With the reconstructed 3D image, it could not only point out whether there exists an artificial material, which is intended to spoof the scanner, above the real finger, but also could provide the hacker's fingerprint. The results of these studies suggested that Optical Coherence Tomography could be a powerful real-time noninvasive method for accurate identification of artificial fingerprints real fingerprints as well.

  7. 8 CFR 1236.5 - Fingerprints and photographs.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Fingerprints and photographs. 1236.5... ORDERED REMOVED Detention of Aliens Prior to Order of Removal § 1236.5 Fingerprints and photographs. Every... photographed. Such fingerprints and photographs shall be made available to Federal, State, and local law...

  8. Near-Optimal Fingerprinting with Constraints

    Directory of Open Access Journals (Sweden)

    Gulyás Gábor György

    2016-10-01

    Full Text Available Several recent studies have demonstrated that people show large behavioural uniqueness. This has serious privacy implications as most individuals become increasingly re-identifiable in large datasets or can be tracked, while they are browsing the web, using only a couple of their attributes, called as their fingerprints. Often, the success of these attacks depends on explicit constraints on the number of attributes learnable about individuals, i.e., the size of their fingerprints. These constraints can be budget as well as technical constraints imposed by the data holder. For instance, Apple restricts the number of applications that can be called by another application on iOS in order to mitigate the potential privacy threats of leaking the list of installed applications on a device. In this work, we address the problem of identifying the attributes (e.g., smartphone applications that can serve as a fingerprint of users given constraints on the size of the fingerprint. We give the best fingerprinting algorithms in general, and evaluate their effectiveness on several real-world datasets. Our results show that current privacy guards limiting the number of attributes that can be queried about individuals is insufficient to mitigate their potential privacy risks in many practical cases.

  9. Video context-dependent recall.

    Science.gov (United States)

    Smith, Steven M; Manzano, Isabel

    2010-02-01

    In two experiments, we used an effective new method for experimentally manipulating local and global contexts to examine context-dependent recall. The method included video-recorded scenes of real environments, with target words superimposed over the scenes. In Experiment 1, we used a within-subjects manipulation of video contexts and compared the effects of reinstatement of a global context (15 words per context) with effects of less overloaded context cues (1 and 3 words per context) on recall. The size of the reinstatement effects in Experiment 1 show how potently video contexts can cue recall. A strong effect of cue overload was also found; reinstatement effects were smaller, but still quite robust, in the 15 words per context condition. The powerful reinstatement effect was replicated for local contexts in Experiment 2, which included a no-contexts-reinstated group, a control condition used to determine whether reinstatement of half of the cues caused biased output interference for uncued targets. The video context method is a potent way to investigate context-dependent memory.

  10. Microbial DNA fingerprinting of human fingerprints: dynamic colonization of fingertip microflora challenges human host inferences for forensic purposes.

    Science.gov (United States)

    Tims, Sebastian; van Wamel, Willem; Endtz, Hubert P; van Belkum, Alex; Kayser, Manfred

    2010-09-01

    Human fingertip microflora is transferred to touched objects and may provide forensically relevant information on individual hosts, such as on geographic origins, if endogenous microbial skin species/strains would be retrievable from physical fingerprints and would carry geographically restricted DNA diversity. We tested the suitability of physical fingerprints for revealing human host information, with geographic inference as example, via microbial DNA fingerprinting. We showed that the transient exogenous fingertip microflora is frequently different from the resident endogenous bacteria of the same individuals. In only 54% of the experiments, the DNA analysis of the transient fingertip microflora allowed the detection of defined, but often not the major, elements of the resident microflora. Although we found microbial persistency in certain individuals, time-wise variation of transient and resident microflora within individuals was also observed when resampling fingerprints after 3 weeks. While microbial species differed considerably in their frequency spectrum between fingerprint samples from volunteers in Europe and southern Asia, there was no clear geographic distinction between Staphylococcus strains in a cluster analysis, although bacterial genotypes did not overlap between both continental regions. Our results, though limited in quantity, clearly demonstrate that the dynamic fingerprint microflora challenges human host inferences for forensic purposes including geographic ones. Overall, our results suggest that human fingerprint microflora is too dynamic to allow for forensic marker developments for retrieving human information.

  11. Attendance fingerprint identification system using arduino and single board computer

    Science.gov (United States)

    Muchtar, M. A.; Seniman; Arisandi, D.; Hasanah, S.

    2018-03-01

    Fingerprint is one of the most unique parts of the human body that distinguishes one person from others and is easily accessed. This uniqueness is supported by technology that can automatically identify or recognize a person called fingerprint sensor. Yet, the existing Fingerprint Sensor can only do fingerprint identification on one machine. For the mentioned reason, we need a method to be able to recognize each user in a different fingerprint sensor. The purpose of this research is to build fingerprint sensor system for fingerprint data management to be centralized so identification can be done in each Fingerprint Sensor. The result of this research shows that by using Arduino and Raspberry Pi, data processing can be centralized so that fingerprint identification can be done in each fingerprint sensor with 98.5 % success rate of centralized server recording.

  12. Security and matching of partial fingerprint recognition systems

    Science.gov (United States)

    Jea, Tsai-Yang; Chavan, Viraj S.; Govindaraju, Venu; Schneider, John K.

    2004-08-01

    Despite advances in fingerprint identification techniques, matching incomplete or partial fingerprints still poses a difficult challenge. While the introduction of compact silicon chip-based sensors that capture only a part of the fingerprint area have made this problem important from a commercial perspective, there is also considerable interest on the topic for processing partial and latent fingerprints obtained at crime scenes. Attempts to match partial fingerprints using singular ridge structures-based alignment techniques fail when the partial print does not include such structures (e.g., core or delta). We present a multi-path fingerprint matching approach that utilizes localized secondary features derived using only the relative information of minutiae. Since the minutia-based fingerprint representation, is an ANSI-NIST standard, our approach has the advantage of being directly applicable to already existing databases. We also analyze the vulnerability of partial fingerprint identification systems to brute force attacks. The described matching approach has been tested on one of FVC2002"s DB1 database11. The experimental results show that our approach achieves an equal error rate of 1.25% and a total error rate of 1.8% (with FAR at 0.2% and FRR at 1.6%).

  13. Entropy based fingerprint for local crystalline order

    Science.gov (United States)

    Piaggi, Pablo M.; Parrinello, Michele

    2017-09-01

    We introduce a new fingerprint that allows distinguishing between liquid-like and solid-like atomic environments. This fingerprint is based on an approximate expression for the entropy projected on individual atoms. When combined with local enthalpy, this fingerprint acquires an even finer resolution and it is capable of discriminating between different crystal structures.

  14. Forensic Chemistry: The Revelation of Latent Fingerprints

    Science.gov (United States)

    Friesen, J. Brent

    2015-01-01

    The visualization of latent fingerprints often involves the use of a chemical substance that creates a contrast between the fingerprint residues and the surface on which the print was deposited. The chemical-aided visualization techniques can be divided into two main categories: those that chemically react with the fingerprint residue and those…

  15. FINGERPRINT DETECTION AND RECOGNIZATION TECHNIQUES USING GABOR FILTER

    OpenAIRE

    Yogita Verma*, Prof. Bhagwati Charan Patel

    2017-01-01

    Fingerprints are most extensively and effectively appropriate for the proof of identity in present days. Mostly because of their uniqueness among the people, public acceptance, originality, stability through life, and their least risk of invasion. Fingerprint technology, which is basically a biometric system, is utilized to identify an individual based on their physical qualities. Fingerprint matching is the trendiest biometric method appropriate to provide authentication. Fingerprint verific...

  16. Interoperability between Fingerprint Biometric Systems: An Empirical Study

    OpenAIRE

    Gashi, I.; Mason, S.; Lugini, L.; Marasco, E.; Cukic, B.

    2014-01-01

    Fingerprints are likely the most widely used biometric in commercial as well as law enforcement applications. With the expected rapid growth of fingerprint authentication in mobile devices their importance justifies increased demands for dependability. An increasing number of new sensors,applications and a diverse user population also intensify concerns about the interoperability in fingerprint authentication. In most applications, fingerprints captured for user enrollment with one device may...

  17. A medium resolution fingerprint matching system

    Directory of Open Access Journals (Sweden)

    Ayman Mohammad Bahaa-Eldin

    2013-09-01

    Full Text Available In this paper, a novel minutiae based fingerprint matching system is proposed. The system is suitable for medium resolution fingerprint images obtained by low cost commercial sensors. The paper presents a new thinning algorithm, a new features extraction and representation, and a novel feature distance matching algorithm. The proposed system is rotation and translation invariant and is suitable for complete or partial fingerprint matching. The proposed algorithms are optimized to be executed on low resource environments both in CPU power and memory space. The system was evaluated using a standard fingerprint dataset and good performance and accuracy were achieved under certain image quality requirements. In addition, the proposed system was compared favorably to that of the state of the art systems.

  18. Fingerprint matching with optical coherence tomography

    CSIR Research Space (South Africa)

    Moolla, Y

    2015-12-01

    Full Text Available Fingerprint recognition is an important security technique with a steadily growing usage for the identification and verification of individuals. However, current fingerprint acquisition systems have certain disadvantages, which include...

  19. Sex Determination from Fingerprint Ridge Density | Gungadin ...

    African Journals Online (AJOL)

    This study was conducted with an aim to establish a relationship between sex and fingerprint ridge density. The fingerprints were taken from 500 subjects (250 males and 250 females) in the age group of 18-60 years. After taking fingerprints, the ridges were counted in the upper portion of the radial border of each print for all ...

  20. Integrated fingerprinting in secure digital cinema projection

    Science.gov (United States)

    Delannay, Damien; Delaigle, Jean-Francois; Macq, Benoit M. M.; Quisquater, Jean-Jacques; Mas Ribes, Joan M.; Boucqueau, Jean M.; Nivart, Jean-Francois

    2001-12-01

    This paper describes the functional model of a combined conditional access and fingerprinting copyright (-or projectionright) protection system in a digital cinema framework. In the cinema industry, a large part of early movie piracy comes from copies made in the theater itself with a camera. The evolution towards digital cinema broadcast enables watermark based fingerprinting protection systems. Besides an appropriate fingerprinting technology, a number of well defined security/cryptographic tools are integrated in order to guaranty the integrity of the whole system. The requirements are two-fold: On one side, we must ensure that the media content is only accessible at exhibition time (under specific authorization obtained after an ad-hoc film rental agreement) and contains the related exhibition fingerprint. At the other end, we must prove our ability to retrieve the fingerprint information from an illegal copy of the media.

  1. Enhancing security of fingerprints through contextual biometric watermarking.

    Science.gov (United States)

    Noore, Afzel; Singh, Richa; Vatsa, Mayank; Houck, Max M

    2007-07-04

    This paper presents a novel digital watermarking technique using face and demographic text data as multiple watermarks for verifying the chain of custody and protecting the integrity of a fingerprint image. The watermarks are embedded in selected texture regions of a fingerprint image using discrete wavelet transform. Experimental results show that modifications in these locations are visually imperceptible and maintain the minutiae details. The integrity of the fingerprint image is verified through the high matching scores obtained from an automatic fingerprint identification system. There is also a high degree of visual correlation between the embedded images, and the extracted images from the watermarked fingerprint. The degree of similarity is computed using pixel-based metrics and human visual system metrics. The results also show that the proposed watermarked fingerprint and the extracted images are resilient to common attacks such as compression, filtering, and noise.

  2. Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept

    Directory of Open Access Journals (Sweden)

    Atul S. CHAUDHARI

    2014-01-01

    Full Text Available Biometric system is essentially a pattern recognition system which recognizes a person by determining the authenticity of a specific physiological (e.g., fingerprints, face, retina, iris or behavioral (e.g., gait, signature characteristic possessed by that person. Among all the presently employed biometric techniques, fingerprint identification systems have received the most attention due to the long history of fingerprints and its extensive use in forensics. Fingerprint is reliable biometric characteristic as it is unique and persistence. Fingerprint is the pattern of ridges and valleys on the surface of fingertip. However, recognizing fingerprints in poor quality images is still a very complex job, so the fingerprint image must be preprocessed before matching. It is very difficult to extract fingerprint features directly from gray scale fingerprint image. In this paper we have proposed the system which uses minutiae based matching algorithm for fingerprint identification. There are three main phases in proposed algorithm. First phase enhance the input fingerprint image by preprocessing it. The enhanced fingerprint image is converted into thinned binary image and then minutiae are extracted by using Crossing Number Concept in second phase. Third stage compares input fingerprint image (after preprocessing and minutiae extraction with fingerprint images enrolled in database and makes decision whether the input fingerprint is matched with the fingerprint stored in database or not.

  3. An Efficient Reconfigurable Architecture for Fingerprint Recognition

    Directory of Open Access Journals (Sweden)

    Satish S. Bhairannawar

    2016-01-01

    Full Text Available The fingerprint identification is an efficient biometric technique to authenticate human beings in real-time Big Data Analytics. In this paper, we propose an efficient Finite State Machine (FSM based reconfigurable architecture for fingerprint recognition. The fingerprint image is resized, and Compound Linear Binary Pattern (CLBP is applied on fingerprint, followed by histogram to obtain histogram CLBP features. Discrete Wavelet Transform (DWT Level 2 features are obtained by the same methodology. The novel matching score of CLBP is computed using histogram CLBP features of test image and fingerprint images in the database. Similarly, the DWT matching score is computed using DWT features of test image and fingerprint images in the database. Further, the matching scores of CLBP and DWT are fused with arithmetic equation using improvement factor. The performance parameters such as TSR (Total Success Rate, FAR (False Acceptance Rate, and FRR (False Rejection Rate are computed using fusion scores with correlation matching technique for FVC2004 DB3 Database. The proposed fusion based VLSI architecture is synthesized on Virtex xc5vlx30T-3 FPGA board using Finite State Machine resulting in optimized parameters.

  4. The behavioural characteristics of sediment properties and their implications for sediment fingerprinting as an approach for identifying sediment sources in river basins

    Science.gov (United States)

    Koiter, A. J.; Owens, P. N.; Petticrew, E. L.; Lobb, D. A.

    2013-10-01

    Sediment fingerprinting is a technique that is increasingly being used to improve the understanding of sediment dynamics within river basins. At present, one of the main limitations of the technique is the ability to link sediment back to their sources due to the non-conservative nature of many of the sediment properties. The processes that occur between the sediment source locations and the point of collection downstream are not well understood or quantified and currently represent a black-box in the sediment fingerprinting approach. The literature on sediment fingerprinting tends to assume that there is a direct connection between sources and sinks, while much of the broader environmental sedimentology literature identifies that numerous chemical, biological and physical transformations and alterations can occur as sediment moves through the landscape. The focus of this paper is on the processes that drive particle size and organic matter selectivity and biological, geochemical and physical transformations and how understanding these processes can be used to guide sampling protocols, fingerprint selection and data interpretation. The application of statistical approaches without consideration of how unique sediment fingerprints have developed and how robust they are within the environment is a major limitation of many recent studies. This review summarises the current information, identifies areas that need further investigation and provides recommendations for sediment fingerprinting that should be considered for adoption in future studies if the full potential and utility of the approach are to be realised.

  5. Fingerprint and Face Identification for Large User Population

    Directory of Open Access Journals (Sweden)

    Teddy Ko

    2003-06-01

    Full Text Available The main objective of this paper is to present the state-of-the-art of the current biometric (fingerprint and face technology, lessons learned during the investigative analysis performed to ascertain the benefits of using combined fingerprint and facial technologies, and recommendations for the use of current available fingerprint and face identification technologies for optimum identification performance for applications using large user population. Prior fingerprint and face identification test study results have shown that their identification accuracies are strongly dependent on the image quality of the biometric inputs. Recommended methodologies for ensuring the capture of acceptable quality fingerprint and facial images of subjects are also presented in this paper.

  6. Effects of grown origin, genotype, harvest year, and their interactions of wheat kernels on near infrared spectral fingerprints for geographical traceability.

    Science.gov (United States)

    Zhao, Haiyan; Guo, Boli; Wei, Yimin; Zhang, Bo

    2014-01-01

    The effects of origin, genotype, harvest year, and their interactions on wheat near infrared (NIR) spectra were studied to find the reasons for differences in NIR fingerprints of wheat from different geographical origins and the stability of NIR fingerprints among different years. Ten varieties were grown in three regions of China for 2 years. 180 kernel samples were analysed by NIR. The spectra after pre-treatment were analysed by principal component analysis, multi-way analysis of variance, and discriminant partial least-squares. The results showed that origin, genotype, year, and their interactions all had significant effects on wheat NIR fingerprints. The second overtones of N-H and C-H stretching vibrations and a combination of stretch and deformation of C-H group in wheat were mainly influenced by the geographical origin. The wavelength ranges 975-990 nm, 1200 nm, and 1355-1380 nm contained plenty of origin information to build robust discriminant models of wheat geographical origin. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. Fingerprint: A Unique and Reliable Method for Identification

    Directory of Open Access Journals (Sweden)

    Palash Kumar Bose

    2017-01-01

    Full Text Available Fingerprints have been the gold standard for personal identification within the forensic community for more than one hundred years. It is still universal in spite of discovery of DNA fingerprint. The science of fingerprint identification has evolved over time from the early use of finger prints to mark business transactions in ancient Babylonia to their use today as core technology in biometric security devices and as scientific evidence in courts of law throughout the world. The science of fingerprints, dactylography or dermatoglyphics, had long been widely accepted, and well acclaimed and reputed as panacea for individualization, particularly in forensic investigations. Human fingerprints are detailed, unique, difficult to alter, and durable over the life of an individual, making them suitable as lifelong markers of human identity. Fingerprints can be readily used by police or other authorities to identify individuals who wish to conceal their identity, or to identify people who are incapacitated or deceased, as in the aftermath of a natural disaster

  8. OPTIMAL EXPERIMENT DESIGN FOR MAGNETIC RESONANCE FINGERPRINTING

    OpenAIRE

    Zhao, Bo; Haldar, Justin P.; Setsompop, Kawin; Wald, Lawrence L.

    2016-01-01

    Magnetic resonance (MR) fingerprinting is an emerging quantitative MR imaging technique that simultaneously acquires multiple tissue parameters in an efficient experiment. In this work, we present an estimation-theoretic framework to evaluate and design MR fingerprinting experiments. More specifically, we derive the Cram��r-Rao bound (CRB), a lower bound on the covariance of any unbiased estimator, to characterize parameter estimation for MR fingerprinting. We then formulate an optimal experi...

  9. Image Processing and Features Extraction of Fingerprint Images ...

    African Journals Online (AJOL)

    To demonstrate the importance of the image processing of fingerprint images prior to image enrolment or comparison, the set of fingerprint images in databases (a) and (b) of the FVC (Fingerprint Verification Competition) 2000 database were analyzed using a features extraction algorithm. This paper presents the results of ...

  10. Advanced digital video surveillance for safeguard and physical protection

    International Nuclear Information System (INIS)

    Kumar, R.

    2002-01-01

    Full text: Video surveillance is a very crucial component in safeguard and physical protection. Digital technology has revolutionized the surveillance scenario and brought in various new capabilities like better image quality, faster search and retrieval of video images, less storage space for recording, efficient transmission and storage of video, better protection of recorded video images, and easy remote accesses to live and recorded video etc. The basic safeguard requirement for verifiably uninterrupted surveillance has remained largely unchanged since its inception. However, changes to the inspection paradigm to admit automated review and remote monitoring have dramatically increased the demands on safeguard surveillance system. Today's safeguard systems can incorporate intelligent motion detection with very low rate of false alarm and less archiving volume, embedded image processing capability for object behavior and event based indexing, object recognition, efficient querying and report generation etc. It also demands cryptographically authenticating, encrypted, and highly compressed video data for efficient, secure, tamper indicating and transmission. In physical protection, intelligent on robust video motion detection, real time moving object detection and tracking from stationary and moving camera platform, multi-camera cooperative tracking, activity detection and recognition, human motion analysis etc. is going to play a key rote in perimeter security. Incorporation of front and video imagery exploitation tools like automatic number plate recognition, vehicle identification and classification, vehicle undercarriage inspection, face recognition, iris recognition and other biometric tools, gesture recognition etc. makes personnel and vehicle access control robust and foolproof. Innovative digital image enhancement techniques coupled with novel sensor design makes low cost, omni-directional vision capable, all weather, day night surveillance a reality

  11. FINGERPRINT MATCHING BASED ON PORE CENTROIDS

    Directory of Open Access Journals (Sweden)

    S. Malathi

    2011-05-01

    Full Text Available In recent years there has been exponential growth in the use of bio- metrics for user authentication applications. Automated Fingerprint Identification systems have become popular tool in many security and law enforcement applications. Most of these systems rely on minutiae (ridge ending and bifurcation features. With the advancement in sensor technology, high resolution fingerprint images (1000 dpi pro- vide micro level of features (pores that have proven to be useful fea- tures for identification. In this paper, we propose a new strategy for fingerprint matching based on pores by reliably extracting the pore features The extraction of pores is done by Marker Controlled Wa- tershed segmentation method and the centroids of each pore are con- sidered as feature vectors for matching of two fingerprint images. Experimental results shows that the proposed method has better per- formance with lower false rates and higher accuracy.

  12. Real-Time Video Stylization Using Object Flows.

    Science.gov (United States)

    Lu, Cewu; Xiao, Yao; Tang, Chi-Keung

    2017-05-05

    We present a real-time video stylization system and demonstrate a variety of painterly styles rendered on real video inputs. The key technical contribution lies on the object flow, which is robust to inaccurate optical flow, unknown object transformation and partial occlusion as well. Since object flows relate regions of the same object across frames, shower-door effect can be effectively reduced where painterly strokes and textures are rendered on video objects. The construction of object flows is performed in real time and automatically after applying metric learning. To reduce temporal flickering, we extend the bilateral filtering into motion bilateral filtering. We propose quantitative metrics to measure the temporal coherence on structures and textures of our stylized videos, and perform extensive experiments to compare our stylized results with baseline systems and prior works specializing in watercolor and abstraction.

  13. Method for modeling post-mortem biometric 3D fingerprints

    Science.gov (United States)

    Rajeev, Srijith; Shreyas, Kamath K. M.; Agaian, Sos S.

    2016-05-01

    Despite the advancements of fingerprint recognition in 2-D and 3-D domain, authenticating deformed/post-mortem fingerprints continue to be an important challenge. Prior cleansing and reconditioning of the deceased finger is required before acquisition of the fingerprint. The victim's finger needs to be precisely and carefully operated by a medium to record the fingerprint impression. This process may damage the structure of the finger, which subsequently leads to higher false rejection rates. This paper proposes a non-invasive method to perform 3-D deformed/post-mortem finger modeling, which produces a 2-D rolled equivalent fingerprint for automated verification. The presented novel modeling method involves masking, filtering, and unrolling. Computer simulations were conducted on finger models with different depth variations obtained from Flashscan3D LLC. Results illustrate that the modeling scheme provides a viable 2-D fingerprint of deformed models for automated verification. The quality and adaptability of the obtained unrolled 2-D fingerprints were analyzed using NIST fingerprint software. Eventually, the presented method could be extended to other biometric traits such as palm, foot, tongue etc. for security and administrative applications.

  14. Robust media processing on programmable power-constrained systems

    Science.gov (United States)

    McVeigh, Jeff

    2005-03-01

    To achieve consumer-level quality, media systems must process continuous streams of audio and video data while maintaining exacting tolerances on sampling rate, jitter, synchronization, and latency. While it is relatively straightforward to design fixed-function hardware implementations to satisfy worst-case conditions, there is a growing trend to utilize programmable multi-tasking solutions for media applications. The flexibility of these systems enables support for multiple current and future media formats, which can reduce design costs and time-to-market. This paper provides practical engineering solutions to achieve robust media processing on such systems, with specific attention given to power-constrained platforms. The techniques covered in this article utilize the fundamental concepts of algorithm and software optimization, software/hardware partitioning, stream buffering, hierarchical prioritization, and system resource and power management. A novel enhancement to dynamically adjust processor voltage and frequency based on buffer fullness to reduce system power consumption is examined in detail. The application of these techniques is provided in a case study of a portable video player implementation based on a general-purpose processor running a non real-time operating system that achieves robust playback of synchronized H.264 video and MP3 audio from local storage and streaming over 802.11.

  15. Fingerprint enhancement using a multispectral sensor

    Science.gov (United States)

    Rowe, Robert K.; Nixon, Kristin A.

    2005-03-01

    The level of performance of a biometric fingerprint sensor is critically dependent on the quality of the fingerprint images. One of the most common types of optical fingerprint sensors relies on the phenomenon of total internal reflectance (TIR) to generate an image. Under ideal conditions, a TIR fingerprint sensor can produce high-contrast fingerprint images with excellent feature definition. However, images produced by the same sensor under conditions that include dry skin, dirt on the skin, and marginal contact between the finger and the sensor, are likely to be severely degraded. This paper discusses the use of multispectral sensing as a means to collect additional images with new information about the fingerprint that can significantly augment the system performance under both normal and adverse sample conditions. In the context of this paper, "multispectral sensing" is used to broadly denote a collection of images taken under different illumination conditions: different polarizations, different illumination/detection configurations, as well as different wavelength illumination. Results from three small studies using an early-stage prototype of the multispectral-TIR (MTIR) sensor are presented along with results from the corresponding TIR data. The first experiment produced data from 9 people, 4 fingers from each person and 3 measurements per finger under "normal" conditions. The second experiment provided results from a study performed to test the relative performance of TIR and MTIR images when taken under extreme dry and dirty conditions. The third experiment examined the case where the area of contact between the finger and sensor is greatly reduced.

  16. Recovery of latent fingerprints and DNA on human skin.

    Science.gov (United States)

    Färber, Doris; Seul, Andrea; Weisser, Hans-Joachim; Bohnert, Michael

    2010-11-01

    The project "Latent Fingerprints and DNA on Human Skin" was the first systematic research in Europe dealing with detection of fingerprints and DNA left by offenders on the skin of corpses. One thousand samples gave results that allow general statements on the materials and methods used. The tests were carried out according to a uniform trial structure. Fingerprints were deposited by natural donors on corpses. The latent fingerprints were treated with magnetic powder or black fingerprint powder. Afterward, they were lifted with silicone casting material (Isomark(®)) or gelatine foil. All lifts were swabbed to recover DNA. It was possible to visualize comparable and identifiable fingerprints on the skin of corpses (16%). In the same categories, magnetic powder (18.4%) yielded better results than black fingerprint powder (13.6%). The number of comparable and identifiable fingerprints decreased on the lifts (12.7%). Isomark(®) (14.9%) was the better lifting material in comparison with gelatine foil (10.1%). In one-third of the samples, DNA could be extracted from the powdered and lifted latents. Black fingerprint powder delivered the better result with a rate of 2.2% for full DNA profiles and profiles useful for exclusion in comparison with 1.8% for the magnetic powder traces. Isomark(®) (3.1%) yielded better results than gelatine foil (0.6%). © 2010 American Academy of Forensic Sciences.

  17. Towards reconstruction of overlapping fingerprints using plasma spectroscopy

    Science.gov (United States)

    Yang, Jun-Ho; Choi, Soo-Jin; Yoh, Jack J.

    2017-08-01

    Chemical analysis is commonly used in the field of forensic science where the precise discrimination of primary evidence is of significant importance. Laser-Induced Breakdown Spectroscopy (LIBS) exceeds other spectroscopic methods in terms of the time required for pre- and post-sample preparation, the insensitivity to sample phase state be it solid, liquid, or gas, and the detection of two-dimensional spectral mapping from real time point measurements. In this research, fingerprint samples on various surface materials are considered in the chemical detection and reconstruction of fingerprints using the two-dimensional LIBS technique. Strong and distinct intensities of specific wavelengths represent visible ink, natural secretion of sweat, and contaminants from the environment, all of which can be present in latent fingerprints. The particular aim of the work presented here is to enhance the precision of the two-dimensional recreation of the fingerprints present on metal, plastic, and artificially prepared soil surface using LIBS with principal component analysis. By applying a distinct wavelength discrimination for two overlapping fingerprint samples, separation into two non-identical chemical fingerprints was successfully performed.

  18. Connectivity-based parcellation reveals distinct cortico-striatal connectivity fingerprints in Autism Spectrum Disorder.

    Science.gov (United States)

    Balsters, Joshua H; Mantini, Dante; Wenderoth, Nicole

    2018-04-15

    Autism Spectrum Disorder (ASD) has been associated with abnormal synaptic development causing a breakdown in functional connectivity. However, when measured at the macro scale using resting state fMRI, these alterations are subtle and often difficult to detect due to the large heterogeneity of the pathology. Recently, we outlined a novel approach for generating robust biomarkers of resting state functional magnetic resonance imaging (RS-fMRI) using connectivity based parcellation of gross morphological structures to improve single-subject reproducibility and generate more robust connectivity fingerprints. Here we apply this novel approach to investigating the organization and connectivity strength of the cortico-striatal system in a large sample of ASD individuals and typically developed (TD) controls (N=130 per group). Our results showed differences in the parcellation of the striatum in ASD. Specifically, the putamen was found to be one single structure in ASD, whereas this was split into anterior and posterior segments in an age, IQ, and head movement matched TD group. An analysis of the connectivity fingerprints revealed that the group differences in clustering were driven by differential connectivity between striatum and the supplementary motor area, posterior cingulate cortex, and posterior insula. Our approach for analysing RS-fMRI in clinical populations has provided clear evidence that cortico-striatal circuits are organized differently in ASD. Based on previous task-based segmentations of the striatum, we believe that the anterior putamen cluster present in TD, but not in ASD, likely contributes to social and language processes. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  19. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  20. Impact of Finger Type in Fingerprint Authentication

    Science.gov (United States)

    Gafurov, Davrondzhon; Bours, Patrick; Yang, Bian; Busch, Christoph

    Nowadays fingerprint verification system is the most widespread and accepted biometric technology that explores various features of the human fingers for this purpose. In general, every normal person has 10 fingers with different size. Although it is claimed that recognition performance with little fingers can be less accurate compared to other finger types, to our best knowledge, this has not been investigated yet. This paper presents our study on the topic of influence of the finger type into fingerprint recognition performance. For analysis we employ two fingerprint verification software packages (one public and one commercial). We conduct test on GUC100 multi sensor fingerprint database which contains fingerprint images of all 10 fingers from 100 subjects. Our analysis indeed confirms that performance with small fingers is less accurate than performance with the others fingers of the hand. It also appears that best performance is being obtained with thumb or index fingers. For example, performance deterioration from the best finger (i.e. index or thumb) to the worst fingers (i.e. small ones) can be in the range of 184%-1352%.

  1. Distributed construction of quantum fingerprints

    OpenAIRE

    Ambainis, Andris; Shi, Yaoyun

    2003-01-01

    Quantum fingerprints are useful quantum encodings introduced by Buhrman, Cleve, Watrous, and de Wolf (Physical Review Letters, Volume 87, Number 16, Article 167902, 2001; quant-ph/0102001) in obtaining an efficient quantum communication protocol. We design a protocol for constructing the fingerprint in a distributed scenario. As an application, this protocol gives rise to a communication protocol more efficient than the best known classical protocol for a communication problem.

  2. Transfer Learning for Video Recognition with Scarce Training Data for Deep Convolutional Neural Network

    OpenAIRE

    Su, Yu-Chuan; Chiu, Tzu-Hsuan; Yeh, Chun-Yen; Huang, Hsin-Fu; Hsu, Winston H.

    2014-01-01

    Unconstrained video recognition and Deep Convolution Network (DCN) are two active topics in computer vision recently. In this work, we apply DCNs as frame-based recognizers for video recognition. Our preliminary studies, however, show that video corpora with complete ground truth are usually not large and diverse enough to learn a robust model. The networks trained directly on the video data set suffer from significant overfitting and have poor recognition rate on the test set. The same lack-...

  3. Secure fingerprint identification based on structural and microangiographic optical coherence tomography.

    Science.gov (United States)

    Liu, Xuan; Zaki, Farzana; Wang, Yahui; Huang, Qiongdan; Mei, Xin; Wang, Jiangjun

    2017-03-10

    Optical coherence tomography (OCT) allows noncontact acquisition of fingerprints and hence is a highly promising technology in the field of biometrics. OCT can be used to acquire both structural and microangiographic images of fingerprints. Microangiographic OCT derives its contrast from the blood flow in the vasculature of viable skin tissue, and microangiographic fingerprint imaging is inherently immune to fake fingerprint attack. Therefore, dual-modality (structural and microangiographic) OCT imaging of fingerprints will enable more secure acquisition of biometric data, which has not been investigated before. Our study on fingerprint identification based on structural and microangiographic OCT imaging is, we believe, highly innovative. In this study, we performed OCT imaging study for fingerprint acquisition, and demonstrated the capability of dual-modality OCT imaging for the identification of fake fingerprints.

  4. Study of noninvasive detection of latent fingerprints using UV laser

    Science.gov (United States)

    Li, Hong-xia; Cao, Jing; Niu, Jie-qing; Huang, Yun-gang; Mao, Lin-jie; Chen, Jing-rong

    2011-06-01

    Latent fingerprints present a considerable challenge in forensics, and noninvasive procedure that captures a digital image of the latent fingerprints is significant in the field of criminal investigation. The capability of photography technologies using 266nm UV Nd:YAG solid state laser as excitation light source to provide detailed images of unprocessed latent fingerprints is demonstrated. Unprocessed latent fingerprints were developed on various non-absorbent and absorbing substrates. According to the special absorption, reflection, scattering and fluorescence characterization of the various residues in fingerprints (fatty acid ester, protein, and carbosylic acid salts etc) to the UV light to weaken or eliminate the background disturbance and increase the brightness contrast of fingerprints with the background, and using 266nm UV laser as excitation light source, fresh and old latent fingerprints on the surface of four types of non-absorbent objects as magazine cover, glass, back of cellphone, wood desktop paintwork and two types of absorbing objects as manila envelope, notebook paper were noninvasive detected and appeared through reflection photography and fluorescence photography technologies, and the results meet the fingerprint identification requirements in forensic science.

  5. Quality assessment of Chrysanthemum indicum Flower by simultaneous quantification of six major ingredients using a single reference standard combined with HPLC fingerprint analysis

    Directory of Open Access Journals (Sweden)

    Jiao He

    2016-04-01

    Full Text Available Chrysanthemum indicum Flower is usually consumed as functional food. This paper described an improved total quality assessment method for Chrysanthemum indicum Flower by simultaneous quantitation using a single standard to determine multi-components method combined with high performance liquid chromatography fingerprint analysis. Six main components of Chrysanthemum indicum Flower including two flavonoids and four phenolic acids were simultaneously quantified using linarin as the internal reference standard. The method was fully validated with respect to linearity, precision, accuracy, robustness and stability. The validated method was successfully applied to the analysis of thirty three batches of Chrysanthemum indicum Flower samples. Under the same chromatographic conditions, fingerprint analysis in combination with Similarity analysis and principal component analysis was performed to identify the samples from different regions. In general, an effective assessment using a single standard to determinate multi-components method combined with fingerprint analysis make the reliable qualitation and quantitation analysis of Chrysanthemum indicum Flower available.

  6. Hydrocarbon emission fingerprints from contemporary vehicle/engine technologies with conventional and new fuels

    Science.gov (United States)

    Montero, Larisse; Duane, Matthew; Manfredi, Urbano; Astorga, Covadonga; Martini, Giorgio; Carriero, Massimo; Krasenbrink, Alois; Larsen, B. R.

    2010-06-01

    The present paper presents results from the analysis of 29 individual C 2-C 9 hydrocarbons (HCs) specified in the European Commission Ozone Directive. The 29 HCs are measured in exhaust from common, contemporary vehicle/engine/fuel technologies for which very little or no data is available in the literature. The obtained HC emission fingerprints are compared with fingerprints deriving from technologies that are being phased out in Europe. Based on the total of 138 emission tests, thirteen type-specific fingerprints are extracted (Mean ± SD percentage contributions from individual HCs to the total mass of the 29 HCs), essential for receptor modelling source apportionment. The different types represent exhaust from Euro3 and Euro4 light-duty (LD) diesel and petrol-vehicles, Euro3 heavy-duty (HD) diesel exhaust, and exhaust from 2-stroke preEuro, Euro1 and Euro2 mopeds. The fuels comprise liquefied petroleum gas, petrol/ethanol blends (0-85% ethanol), and mineral diesel in various blends (0-100%) with fatty acid methyl esters, rapeseed methyl esters palm oil methyl esters, soybean oil methyl or sunflower oil methyl esters. Type-specific tracer compounds (markers) are identified for the various vehicle/engine/fuel technologies. An important finding is an insignificant effect on the HC fingerprints of varying the test driving cycle, indicating that combining HC fingerprints from different emission studies for receptor modelling purposes would be a robust approach. The obtained results are discussed in the context of atmospheric ozone formation and health implications from emissions (mg km -1 for LD and mopeds and mg kW h -1 for HD, all normalised to fuel consumption: mg dm -3 fuel) of the harmful HCs, benzene and 1,3-butadiene. Another important finding is a strong linear correlation of the regulated "total" hydrocarbon emissions (tot-HC) with the ozone formation potential of the 29 HCs (ΣPO 3 = (1.66 ± 0.04) × tot-RH; r2 = 0.93). Tot-HC is routinely monitored in

  7. Sediment tracing by `customised' magnetic fingerprinting: from the sub-catchment to the ocean scale

    Science.gov (United States)

    Maher, B.

    2009-04-01

    Robust identification of catchment suspended sediment sources is a prerequisite both for understanding sediment delivery processes and targeting of effective mitigation measures. Fine sediment delivery can pose management problems, especially with regard to nutrient run-off and siltation of water courses and bodies. Suspended sediment load constitutes the dominant mode of particulate material loss from catchments but its transport is highly episodic. Identification of suspended sediment sources and fluxes is therefore a prerequisite both for understanding of fluvial geomorphic process and systems and for designing strategies to reduce sediment transport, delivery and yields. Here will be discussed sediment ‘fingerprinting', using the magnetic properties of soils and sediments to characterise sediment sources and transport pathways over a very wide variety of spatial scales, from Lake Bassenthwaite in the English Lake District to the Burdekin River in Queensland and even the North Atlantic Ocean during the last glacial maximum. The applicability of magnetic ‘fingerprinting' to such a range of scales and environments has been significantly improved recently through use of new and site-appropriate magnetic measurement techniques, statistical processing and sample treatment options.

  8. Cognitive Fingerprints

    Science.gov (United States)

    2015-03-25

    is another cognitive fingerprint that has been used extensively for authorship . This work has been ex- tended to authentication by relating keyboard...this work is the inference of high-level features such as personality, gender , and dominant hand but those features have not been integrated to date

  9. DNA fingerprinting in botany: past, present, future.

    Science.gov (United States)

    Nybom, Hilde; Weising, Kurt; Rotter, Björn

    2014-01-03

    Almost three decades ago Alec Jeffreys published his seminal Nature papers on the use of minisatellite probes for DNA fingerprinting of humans (Jeffreys and colleagues Nature 1985, 314:67-73 and Nature 1985, 316:76-79). The new technology was soon adopted for many other organisms including plants, and when Hilde Nybom, Kurt Weising and Alec Jeffreys first met at the very First International Conference on DNA Fingerprinting in Berne, Switzerland, in 1990, everybody was enthusiastic about the novel method that allowed us for the first time to discriminate between humans, animals, plants and fungi on the individual level using DNA markers. A newsletter coined "Fingerprint News" was launched, T-shirts were sold, and the proceedings of the Berne conference filled a first book on "DNA fingerprinting: approaches and applications". Four more conferences were about to follow, one on each continent, and Alec Jeffreys of course was invited to all of them. Since these early days, methodologies have undergone a rapid evolution and diversification. A multitude of techniques have been developed, optimized, and eventually abandoned when novel and more efficient and/or more reliable methods appeared. Despite some overlap between the lifetimes of the different technologies, three phases can be defined that coincide with major technological advances. Whereas the first phase of DNA fingerprinting ("the past") was dominated by restriction fragment analysis in conjunction with Southern blot hybridization, the advent of the PCR in the late 1980s gave way to the development of PCR-based single- or multi-locus profiling techniques in the second phase. Given that many routine applications of plant DNA fingerprinting still rely on PCR-based markers, we here refer to these methods as "DNA fingerprinting in the present", and include numerous examples in the present review. The beginning of the third phase actually dates back to 2005, when several novel, highly parallel DNA sequencing

  10. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  11. A novel interaction fingerprint derived from per atom score contributions: exhaustive evaluation of interaction fingerprint performance in docking based virtual screening.

    Science.gov (United States)

    Jasper, Julia B; Humbeck, Lina; Brinkjost, Tobias; Koch, Oliver

    2018-03-16

    Protein ligand interaction fingerprints are a powerful approach for the analysis and assessment of docking poses to improve docking performance in virtual screening. In this study, a novel interaction fingerprint approach (PADIF, protein per atom score contributions derived interaction fingerprint) is presented which was specifically designed for utilising the GOLD scoring functions' atom contributions together with a specific scoring scheme. This allows the incorporation of known protein-ligand complex structures for a target-specific scoring. Unlike many other methods, this approach uses weighting factors reflecting the relative frequency of a specific interaction in the references and penalizes destabilizing interactions. In addition, and for the first time, an exhaustive validation study was performed that assesses the performance of PADIF and two other interaction fingerprints in virtual screening. Here, PADIF shows superior results, and some rules of thumb for a successful use of interaction fingerprints could be identified.

  12. Optimal experiment design for magnetic resonance fingerprinting.

    Science.gov (United States)

    Bo Zhao; Haldar, Justin P; Setsompop, Kawin; Wald, Lawrence L

    2016-08-01

    Magnetic resonance (MR) fingerprinting is an emerging quantitative MR imaging technique that simultaneously acquires multiple tissue parameters in an efficient experiment. In this work, we present an estimation-theoretic framework to evaluate and design MR fingerprinting experiments. More specifically, we derive the Cramér-Rao bound (CRB), a lower bound on the covariance of any unbiased estimator, to characterize parameter estimation for MR fingerprinting. We then formulate an optimal experiment design problem based on the CRB to choose a set of acquisition parameters (e.g., flip angles and/or repetition times) that maximizes the signal-to-noise ratio efficiency of the resulting experiment. The utility of the proposed approach is validated by numerical studies. Representative results demonstrate that the optimized experiments allow for substantial reduction in the length of an MR fingerprinting acquisition, and substantial improvement in parameter estimation performance.

  13. A fingerprint key binding algorithm based on vector quantization and error correction

    Science.gov (United States)

    Li, Liang; Wang, Qian; Lv, Ke; He, Ning

    2012-04-01

    In recent years, researches on seamless combination cryptosystem with biometric technologies, e.g. fingerprint recognition, are conducted by many researchers. In this paper, we propose a binding algorithm of fingerprint template and cryptographic key to protect and access the key by fingerprint verification. In order to avoid the intrinsic fuzziness of variant fingerprints, vector quantization and error correction technique are introduced to transform fingerprint template and then bind with key, after a process of fingerprint registration and extracting global ridge pattern of fingerprint. The key itself is secure because only hash value is stored and it is released only when fingerprint verification succeeds. Experimental results demonstrate the effectiveness of our ideas.

  14. Missing data reconstruction using Gaussian mixture models for fingerprint images

    Science.gov (United States)

    Agaian, Sos S.; Yeole, Rushikesh D.; Rao, Shishir P.; Mulawka, Marzena; Troy, Mike; Reinecke, Gary

    2016-05-01

    Publisher's Note: This paper, originally published on 25 May 2016, was replaced with a revised version on 16 June 2016. If you downloaded the original PDF, but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. One of the most important areas in biometrics is matching partial fingerprints in fingerprint databases. Recently, significant progress has been made in designing fingerprint identification systems for missing fingerprint information. However, a dependable reconstruction of fingerprint images still remains challenging due to the complexity and the ill-posed nature of the problem. In this article, both binary and gray-level images are reconstructed. This paper also presents a new similarity score to evaluate the performance of the reconstructed binary image. The offered fingerprint image identification system can be automated and extended to numerous other security applications such as postmortem fingerprints, forensic science, investigations, artificial intelligence, robotics, all-access control, and financial security, as well as for the verification of firearm purchasers, driver license applicants, etc.

  15. Uniqueness: skews bit occurrence frequencies in randomly generated fingerprint libraries.

    Science.gov (United States)

    Chen, Nelson G

    2016-08-01

    Requiring that randomly generated chemical fingerprint libraries have unique fingerprints such that no two fingerprints are identical causes a systematic skew in bit occurrence frequencies, the proportion at which specified bits are set. Observed frequencies (O) at which each bit is set within the resulting libraries systematically differ from frequencies at which bits are set at fingerprint generation (E). Observed frequencies systematically skew toward 0.5, with the effect being more pronounced as library size approaches the compound space, which is the total number of unique possible fingerprints given the number of bit positions each fingerprint contains. The effect is quantified for varying library sizes as a fraction of the overall compound space, and for changes in the specified frequency E. The cause and implications for this systematic skew are subsequently discussed. When generating random libraries of chemical fingerprints, the imposition of a uniqueness requirement should either be avoided or taken into account.

  16. Fingerprint recognition system by use of graph matching

    Science.gov (United States)

    Shen, Wei; Shen, Jun; Zheng, Huicheng

    2001-09-01

    Fingerprint recognition is an important subject in biometrics to identify or verify persons by physiological characteristics, and has found wide applications in different domains. In the present paper, we present a finger recognition system that combines singular points and structures. The principal steps of processing in our system are: preprocessing and ridge segmentation, singular point extraction and selection, graph representation, and finger recognition by graphs matching. Our fingerprint recognition system is implemented and tested for many fingerprint images and the experimental result are satisfactory. Different techniques are used in our system, such as fast calculation of orientation field, local fuzzy dynamical thresholding, algebraic analysis of connections and fingerprints representation and matching by graphs. Wed find that for fingerprint database that is not very large, the recognition rate is very high even without using a prior coarse category classification. This system works well for both one-to-few and one-to-many problems.

  17. Utilizing AFIS searching tools to reduce errors in fingerprint casework.

    Science.gov (United States)

    Langenburg, Glenn; Hall, Carey; Rosemarie, Quincy

    2015-12-01

    Fifty-six (56) adjudicated, property crime cases involving fingerprint evidence were reviewed using a case-specific AFIS database tool. This tool allowed fingerprint experts to search latent prints in the cases against a database of friction ridge exemplars limited to only the individuals specific to that particular case. We utilized three different methods to encode and search the latent prints: automatic feature extraction, manual encoding performed by a student intern, and manual encoding performed by a fingerprint expert. Performance in the study was strongest when the encoding was conducted by the fingerprint expert. The results of the study showed that while the AFIS tools failed to locate all of the identifications originally reported by the initial fingerprint expert that worked the case, the AFIS tools helped to identify 7 additional latent prints that were not reported by the initial fingerprint expert. We conclude that this technology, when combined with fingerprint expertise, will reduce the number of instances where an erroneous exclusion could occur, increase the efficiency of a fingerprint unit, and be a useful tool for reviewing active or cold cases for missed opportunities to report identifications. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  18. On the introduction of secondary fingerprint classification

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-07-01

    Full Text Available The concept of fingerprint classification is an important one because of the need to, before executing a database search procedure, virtually break the fingerprint template database into smaller, manageable partitions. This is done in order to avoid...

  19. Snake Model Based on Improved Genetic Algorithm in Fingerprint Image Segmentation

    Directory of Open Access Journals (Sweden)

    Mingying Zhang

    2016-12-01

    Full Text Available Automatic fingerprint identification technology is a quite mature research field in biometric identification technology. As the preprocessing step in fingerprint identification, fingerprint segmentation can improve the accuracy of fingerprint feature extraction, and also reduce the time of fingerprint preprocessing, which has a great significance in improving the performance of the whole system. Based on the analysis of the commonly used methods of fingerprint segmentation, the existing segmentation algorithm is improved in this paper. The snake model is used to segment the fingerprint image. Additionally, it is improved by using the global optimization of the improved genetic algorithm. Experimental results show that the algorithm has obvious advantages both in the speed of image segmentation and in the segmentation effect.

  20. Artificial fingerprint recognition by using optical coherence tomography with autocorrelation analysis

    Science.gov (United States)

    Cheng, Yezeng; Larin, Kirill V.

    2006-12-01

    Fingerprint recognition is one of the most widely used methods of biometrics. This method relies on the surface topography of a finger and, thus, is potentially vulnerable for spoofing by artificial dummies with embedded fingerprints. In this study, we applied the optical coherence tomography (OCT) technique to distinguish artificial materials commonly used for spoofing fingerprint scanning systems from the real skin. Several artificial fingerprint dummies made from household cement and liquid silicone rubber were prepared and tested using a commercial fingerprint reader and an OCT system. While the artificial fingerprints easily spoofed the commercial fingerprint reader, OCT images revealed the presence of them at all times. We also demonstrated that an autocorrelation analysis of the OCT images could be potentially used in automatic recognition systems.

  1. A fingerprint classification algorithm based on combination of local and global information

    Science.gov (United States)

    Liu, Chongjin; Fu, Xiang; Bian, Junjie; Feng, Jufu

    2011-12-01

    Fingerprint recognition is one of the most important technologies in biometric identification and has been wildly applied in commercial and forensic areas. Fingerprint classification, as the fundamental procedure in fingerprint recognition, can sharply decrease the quantity for fingerprint matching and improve the efficiency of fingerprint recognition. Most fingerprint classification algorithms are based on the number and position of singular points. Because the singular points detecting method only considers the local information commonly, the classification algorithms are sensitive to noise. In this paper, we propose a novel fingerprint classification algorithm combining the local and global information of fingerprint. Firstly we use local information to detect singular points and measure their quality considering orientation structure and image texture in adjacent areas. Furthermore the global orientation model is adopted to measure the reliability of singular points group. Finally the local quality and global reliability is weighted to classify fingerprint. Experiments demonstrate the accuracy and effectivity of our algorithm especially for the poor quality fingerprint images.

  2. Enhancing Perceived Quality of Compressed Images and Video with Anisotropic Diffusion and Fuzzy Filtering

    DEFF Research Database (Denmark)

    Nadernejad, Ehsan; Korhonen, Jari; Forchhammer, Søren

    2013-01-01

    and subjective results on JPEG compressed images, as well as MJPEG and H.264/AVC compressed video, indicate that the proposed algorithms employing directional and spatial fuzzy filters achieve better artifact reduction than other methods. In particular, robust improvements with H.264/AVC video have been gained...

  3. Study on Accuracy of Judgments by Chinese Fingerprint Examiners

    Directory of Open Access Journals (Sweden)

    Shiquan Liu

    2015-01-01

    Full Text Available The interpretation of fingerprint evidence depends on the judgments of fingerprint examiners. This study assessed the accuracy of different judgments made by fingerprint examiners following the Analysis, Comparison, and Evaluation (ACE process. Each examiner was given five marks for analysis, comparison, and evaluation. We compared the experts′ judgments against the ground truth and used an annotation platform to evaluate how Chinese fingerprint examiners document their comparisons during the identification process. The results showed that different examiners demonstrated different accuracy of judgments and different mechanisms to reach them.

  4. Fingerprint Sensors: Liveness Detection Issue and Hardware based Solutions

    Directory of Open Access Journals (Sweden)

    Shahzad Memon

    2012-01-01

    Full Text Available Securing an automated and unsupervised fingerprint recognition system is one of the most critical and challenging tasks in government and commercial applications. In these systems, the detection of liveness of a finger placed on a fingerprint sensor is a major issue that needs to be addressed in order to ensure the credibility of the system. The main focus of this paper is to review the existing fingerprint sensing technologies in terms of liveness detection and discusses hardware based ‘liveness detection’ techniques reported in the literature for automatic fingerprint biometrics.

  5. Fingerprints as a Proxy for Readership of Sales Flyers

    DEFF Research Database (Denmark)

    Schmidt, Marcus J.; Krause, Niels; Solgaard, Hans Stubbe

    2007-01-01

      Can readership of sales flyers and free newspapers be estimated by revealing fingerprints? In this paper we report the results of an empirical analysis based on 4604 flyer-pages conducted to assess the feasibility of the method. Results are encouraging, and indicate that the method presently may...... serve as a conservative estimate of readership. Advertising management may thus use the fingerprints-approach as an alternative audience measure and thereby assess the convergent validity of the traditional interview method and the fingerprint approach. While the fingerprint method appears valid...

  6. Evaluation of fingerprint deformation using optical coherence tomography

    Science.gov (United States)

    Gutierrez da Costa, Henrique S.; Maxey, Jessica R.; Silva, Luciano; Ellerbee, Audrey K.

    2014-02-01

    Biometric identification systems have important applications to privacy and security. The most widely used of these, print identification, is based on imaging patterns present in the fingers, hands and feet that are formed by the ridges, valleys and pores of the skin. Most modern print sensors acquire images of the finger when pressed against a sensor surface. Unfortunately, this pressure may result in deformations, characterized by changes in the sizes and relative distances of the print patterns, and such changes have been shown to negatively affect the performance of fingerprint identification algorithms. Optical coherence tomography (OCT) is a novel imaging technique that is capable of imaging the subsurface of biological tissue. Hence, OCT may be used to obtain images of subdermal skin structures from which one can extract an internal fingerprint. The internal fingerprint is very similar in structure to the commonly used external fingerprint and is of increasing interest in investigations of identify fraud. We proposed and tested metrics based on measurements calculated from external and internal fingerprints to evaluate the amount of deformation of the skin. Such metrics were used to test hypotheses about the differences of deformation between the internal and external images, variations with the type of finger and location inside the fingerprint.

  7. A network identity authentication system based on Fingerprint identification technology

    Science.gov (United States)

    Xia, Hong-Bin; Xu, Wen-Bo; Liu, Yuan

    2005-10-01

    Fingerprint verification is one of the most reliable personal identification methods. However, most of the automatic fingerprint identification system (AFIS) is not run via Internet/Intranet environment to meet today's increasing Electric commerce requirements. This paper describes the design and implementation of the archetype system of identity authentication based on fingerprint biometrics technology, and the system can run via Internet environment. And in our system the COM and ASP technology are used to integrate Fingerprint technology with Web database technology, The Fingerprint image preprocessing algorithms are programmed into COM, which deployed on the internet information server. The system's design and structure are proposed, and the key points are discussed. The prototype system of identity authentication based on Fingerprint have been successfully tested and evaluated on our university's distant education applications in an internet environment.

  8. Uniform Local Binary Pattern for Fingerprint Liveness Detection in the Gaussian Pyramid

    Directory of Open Access Journals (Sweden)

    Yujia Jiang

    2018-01-01

    Full Text Available Fingerprint recognition schemas are widely used in our daily life, such as Door Security, Identification, and Phone Verification. However, the existing problem is that fingerprint recognition systems are easily tricked by fake fingerprints for collaboration. Therefore, designing a fingerprint liveness detection module in fingerprint recognition systems is necessary. To solve the above problem and discriminate true fingerprint from fake ones, a novel software-based liveness detection approach using uniform local binary pattern (ULBP in spatial pyramid is applied to recognize fingerprint liveness in this paper. Firstly, preprocessing operation for each fingerprint is necessary. Then, to solve image rotation and scale invariance, three-layer spatial pyramids of fingerprints are introduced in this paper. Next, texture information for three layers spatial pyramids is described by using uniform local binary pattern to extract features of given fingerprints. The accuracy of our proposed method has been compared with several state-of-the-art methods in fingerprint liveness detection. Experiments based on standard databases, taken from Liveness Detection Competition 2013 composed of four different fingerprint sensors, have been carried out. Finally, classifier model based on extracted features is trained using SVM classifier. Experimental results present that our proposed method can achieve high recognition accuracy compared with other methods.

  9. For Video Streaming/Delivery: Is HTML5 the Real Fix?

    Directory of Open Access Journals (Sweden)

    John Millard

    2013-10-01

    Full Text Available The general movement towards streaming or playing videos on the web has grown exponentially in the last decade. The combination of new streaming technologies and faster Internet connections continue to provide enhanced and robust user experience for video content. For many organizations, adding videos on their websites has transitioned from a “cool” feature to a mission critical service. Some of the benefits in putting videos online include: to engage and convert visitors, to raise awareness or drive interest, to share inspirational stories or recent unique events, etc. Along with the growth in the use and need for video content on the web; delivering videos online also remains a messy activity for developers and web teams. Examples of existing challenges include creating more accessible videos with captions and delivering content (using adaptive streaming for the diverse range of mobile and tablet devices. In this article, we report on the decision-making and early results in using the Kaltura video platform in two popular library platforms: CONTENTdm and DSpace.

  10. A model for measurement of noise in CCD digital-video cameras

    International Nuclear Information System (INIS)

    Irie, K; Woodhead, I M; McKinnon, A E; Unsworth, K

    2008-01-01

    This study presents a comprehensive measurement of CCD digital-video camera noise. Knowledge of noise detail within images or video streams allows for the development of more sophisticated algorithms for separating true image content from the noise generated in an image sensor. The robustness and performance of an image-processing algorithm is fundamentally limited by sensor noise. The individual noise sources present in CCD sensors are well understood, but there has been little literature on the development of a complete noise model for CCD digital-video cameras, incorporating the effects of quantization and demosaicing

  11. Chemical Fingerprinting of Materials Developed Due To Environmental Issues

    Science.gov (United States)

    Smith, Doris A.; McCool, A. (Technical Monitor)

    2000-01-01

    This paper presents viewgraphs on chemical fingerprinting of materials developed due to environmental issues. Some of the topics include: 1) Aerospace Materials; 2) Building Blocks of Capabilities; 3) Spectroscopic Techniques; 4) Chromatographic Techniques; 5) Factors that Determine Fingerprinting Approach; and 6) Fingerprinting: Combination of instrumental analysis methods that diagnostically characterize a material.

  12. Tracking and recognition face in videos with incremental local sparse representation model

    Science.gov (United States)

    Wang, Chao; Wang, Yunhong; Zhang, Zhaoxiang

    2013-10-01

    This paper addresses the problem of tracking and recognizing faces via incremental local sparse representation. First a robust face tracking algorithm is proposed via employing local sparse appearance and covariance pooling method. In the following face recognition stage, with the employment of a novel template update strategy, which combines incremental subspace learning, our recognition algorithm adapts the template to appearance changes and reduces the influence of occlusion and illumination variation. This leads to a robust video-based face tracking and recognition with desirable performance. In the experiments, we test the quality of face recognition in real-world noisy videos on YouTube database, which includes 47 celebrities. Our proposed method produces a high face recognition rate at 95% of all videos. The proposed face tracking and recognition algorithms are also tested on a set of noisy videos under heavy occlusion and illumination variation. The tracking results on challenging benchmark videos demonstrate that the proposed tracking algorithm performs favorably against several state-of-the-art methods. In the case of the challenging dataset in which faces undergo occlusion and illumination variation, and tracking and recognition experiments under significant pose variation on the University of California, San Diego (Honda/UCSD) database, our proposed method also consistently demonstrates a high recognition rate.

  13. [Studies on fingerprinting of Flos Buddleja by RP-HPLC].

    Science.gov (United States)

    Han, Peng; Cui, Ya-jun; Guo, Hong-zhu; Guo, De-an

    2004-10-01

    To establish fingerprinting of Flos Buddleja by using RP-HPLC for the quality control. The HPLC condition was as follows: Inertsil ODS-3 C18 analytical column (4.6 mm x 250 mm, 5 microm), gredient eluation with MeCN (0.1% TFA)-H2O (0.1%TFA), flow rate 1.0 mL x min(-1), detection wavelength 254 nm. 10 commercial samples were analyzed to establish a fingerprinting. Among the obtained fingerprinting, most of the detected peaks were separated effectively. The accuracy, repeatability and stability of this method were satisfied. The RSDs of relative retention time and area of aimed peaks which existed in all samples wereless than 5%. Theresults were in accordance with the request of fingerprinting. The established fingerprinting can be used for the quality control of Flos Buddleja.

  14. Fingerprint matching on smart card: A review

    CSIR Research Space (South Africa)

    Baruni, Kedimotse P

    2016-12-01

    Full Text Available Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location where...

  15. Laser mass spectrometry for DNA fingerprinting for forensic applications

    Energy Technology Data Exchange (ETDEWEB)

    Chen, C.H.; Tang, K.; Taranenko, N.I.; Allman, S.L.; Chang, L.Y.

    1994-12-31

    The application of DNA fingerprinting has become very broad in forensic analysis, patient identification, diagnostic medicine, and wildlife poaching, since every individual`s DNA structure is identical within all tissues of their body. DNA fingerprinting was initiated by the use of restriction fragment length polymorphisms (RFLP). In 1987, Nakamura et al. found that a variable number of tandem repeats (VNTR) often occurred in the alleles. The probability of different individuals having the same number of tandem repeats in several different alleles is very low. Thus, the identification of VNTR from genomic DNA became a very reliable method for identification of individuals. DNA fingerprinting is a reliable tool for forensic analysis. In DNA fingerprinting, knowledge of the sequence of tandem repeats and restriction endonuclease sites can provide the basis for identification. The major steps for conventional DNA fingerprinting include (1) specimen processing (2) amplification of selected DNA segments by PCR, and (3) gel electrophoresis to do the final DNA analysis. In this work we propose to use laser desorption mass spectrometry for fast DNA fingerprinting. The process and advantages are discussed.

  16. FPRandom: Randomizing core browser objects to break advanced device fingerprinting techniques

    OpenAIRE

    Laperdrix , Pierre; Baudry , Benoit; Mishra , Vikas

    2017-01-01

    International audience; The rich programming interfaces (APIs) provided by web browsers can be diverted to collect a browser fingerprint. A small number of queries on these interfaces are sufficient to build a fingerprint that is statistically unique and very stable over time. Consequently, the fingerprint can be used to track users. Our work aims at mitigating the risk of browser fingerprinting for users privacy by 'breaking' the stability of a fingerprint over time. We add randomness in the...

  17. Straightforward fabrication of black nano silica dusting powder for latent fingerprint imaging

    Science.gov (United States)

    Komalasari, Isna; Krismastuti, Fransiska Sri Herwahyu; Elishian, Christine; Handayani, Eka Mardika; Nugraha, Willy Cahya; Ketrin, Rosi

    2017-11-01

    Imaging of latent fingerprint pattern (aka fingermark) is one of the most important and accurate detection methods in forensic investigation because of the characteristic of individual fingerprint. This detection technique relies on the mechanical adherence of fingerprint powder to the moisture and oily component of the skin left on the surface. The particle size of fingerprint powder is one of the critical parameter to obtain excellent fingerprint image. This study develops a simple, cheap and straightforward method to fabricate Nano size black dusting fingerprint powder based on Nano silica and applies the powder to visualize latent fingerprint. The nanostructured silica was prepared from tetraethoxysilane (TEOS) and then modified with Nano carbon, methylene blue and sodium acetate to color the powder. Finally, as a proof-of-principle, the ability of this black Nano silica dusting powder to image latent fingerprint is successfully demonstrated and the results show that this fingerprint powder provides clearer fingerprint pattern compared to the commercial one highlighting the potential application of the nanostructured silica in forensic science.

  18. An Investigation on the Problem of Thinning in Fingerprint Processing

    Directory of Open Access Journals (Sweden)

    I. O. Omeiza

    2012-06-01

    Full Text Available A high-integrity thinning procedure for binarised fingerprints is proposed in this paper. Several authors and software developers have approached the thinning problems in fingerprint-processing differently. Their approach produced in most cases, fingerprint skeletons with low reliability and thus require additional minutiae-pruning stage to discard the erroneous minutiae in the obtained skeletons. The work involves a careful blending of some already existing algorithms to achieve optimal performance in thinning binarised fingerprint images. The algorithms considered are as follows. The "Zhang and Suen" parallel algorithm for thinning digital patterns, the improved parallel thinning algorithm by Holt and company and template-based thinning algorithm by Stentiford and Mortimer. The idea of combining these stand-alone algorithms to improve the quality of obtained objects skeleton in general image processing was first suggested in a text by Parker in 1998. However, his work does not specifically address the fingerprint problem. This work has examined and proves the plausibility of this thinning approach in the particular case of fingerprint application domain. The thinning procedure obtained satisfactory skeletons for fingerprint applications.

  19. Making DNA Fingerprints.

    Science.gov (United States)

    Nunley, Kathie F.

    1996-01-01

    Presents an activity to simulate electrophoresis using everyday items. Uses adding machine paper to construct a set of DNA fingerprints that can be used to solve crime cases designed by students in any biology class. (JRH)

  20. Fingerprint enhancement revisited and the effects of blood enhancement chemicals on subsequent profiler Plus fluorescent short tandem repeat DNA analysis of fresh and aged bloody fingerprints.

    Science.gov (United States)

    Frégeau, C J; Germain, O; Fourney, R M

    2000-03-01

    FGA, D8S1179, D21S11, D18S51, D5S818, D13S317, D7S820) or of the gender determination marker Amelogenin. The intensity of the fluorescent signals was very similar and the allele size measurements remained constant and identical to those of untreated bloody fingerprints. No additional background fluorescence was noted. Continuous exposure (for 54 days) to two of the seven enhancement chemicals selected (i.e., Crowle's Double Stain and Hungarian Red) slightly reduced the amplification efficiency of the longer STR loci in profiles of fresh and 7 to 14-day-old bloodprints. This suggests that long-term exposure to these chemicals possibly affects the integrity of the DNA molecules. This study indicates that significant evidence can be obtained from fresh or aged bloody fingerprints applied to a variety of absorbent and nonabsorbent surfaces which are exposed to different enhancement chemicals for short or long periods of time. It also reaffirms that PCR STR DNA typing procedures are robust and provide excellent results when used in concert with fluorescence-based detection assays after fingerprint identification has taken place.

  1. Vitality detection in personal authentication systems using fingerprints

    OpenAIRE

    Coli, Pietro

    2008-01-01

    Fingerprints are considered as the sign of each human being, and this has contributed the development of biometric applications based on such features. Since 2002, an important vulnerability has been shown: it is possible to deceive fingerprint scanners through artificial replicas of fingertips. In order to address this shortcoming it is need to recognize a spoofing attempt with artificial fingers looking for some “life signs” each time an user submit a fingerprint (vitality detection problem...

  2. Re-verification of a Lip Synchronization Protocol using Robust Reachability

    Directory of Open Access Journals (Sweden)

    Piotr Kordy

    2010-03-01

    Full Text Available The timed automata formalism is an important model for specifying and analysing real-time systems. Robustness is the correctness of the model in the presence of small drifts on clocks or imprecision in testing guards. A symbolic algorithm for the analysis of the robustness of timed automata has been implemented. In this paper, we re-analyse an industrial case lip synchronization protocol using the new robust reachability algorithm. This lip synchronization protocol is an interesting case because timing aspects are crucial for the correctness of the protocol. Several versions of the model are considered: with an ideal video stream, with anchored jitter, and with non-anchored jitter.

  3. Speed Biases With Real-Life Video Clips

    Directory of Open Access Journals (Sweden)

    Federica Rossi

    2018-03-01

    Full Text Available We live almost literally immersed in an artificial visual world, especially motion pictures. In this exploratory study, we asked whether the best speed for reproducing a video is its original, shooting speed. By using adjustment and double staircase methods, we examined speed biases in viewing real-life video clips in three experiments, and assessed their robustness by manipulating visual and auditory factors. With the tested stimuli (short clips of human motion, mixed human-physical motion, physical motion and ego-motion, speed underestimation was the rule rather than the exception, although it depended largely on clip content, ranging on average from 2% (ego-motion to 32% (physical motion. Manipulating display size or adding arbitrary soundtracks did not modify these speed biases. Estimated speed was not correlated with estimated duration of these same video clips. These results indicate that the sense of speed for real-life video clips can be systematically biased, independently of the impression of elapsed time. Measuring subjective visual tempo may integrate traditional methods that assess time perception: speed biases may be exploited to develop a simple, objective test of reality flow, to be used for example in clinical and developmental contexts. From the perspective of video media, measuring speed biases may help to optimize video reproduction speed and validate “natural” video compression techniques based on sub-threshold temporal squeezing.

  4. The thermodynamics of latent fingerprint corrosion of metal elements and alloys.

    Science.gov (United States)

    Bond, John W

    2008-11-01

    Redox reactions taking place between the surface of a metal and fingerprint residue have been expressed thermodynamically in terms of both the Nernst equation for reduction potential and the complexation constant for the formation of complex metal halide ions in aqueous solution. These expressions are used to explain experimental results for the corrosion of 10 different metal elements by fingerprint residue in air at room temperature. Corrosion of noble metals, such as silver and gold, supports the proposition that the degree of metal corrosion is enhanced by the presence of chloride ions in eccrine sweat. Extending the experiments to include 10 metal alloys enabled the construction of a fingerprint corrosion series for 20 different metals. Fingerprint corrosion on metals alloyed with > approximately 40% copper was found to display third level fingerprint detail. A comparison of both conventional ink on paper and digital (Livescan) fingerprinting techniques with fingerprints deposited on 9 Karat gold alloy has shown that gold alloy depositions are least susceptible to third level detail obliteration by poor fingerprint capturing techniques.

  5. Screen Fingerprints as a Novel Modality for Active Authentication

    Science.gov (United States)

    2014-03-01

    Screen fingerprint is the new cyber biometric modality that we have proposed to measure and analyze active authentication. The screen finger ...as a new biometric modality for active authentication. Such a fingerprint is acquired by taking a screen recording of the computer being used and...extracting discriminative visual feature from the recording. 15. SUBJECT TERMS Active authentication, screen fingerprints, biometrics 16. SECURITY

  6. A Multimodal Technique for an Embedded Fingerprint Recognizer in Mobile Payment Systems

    Directory of Open Access Journals (Sweden)

    V. Conti

    2009-01-01

    Full Text Available The development and the diffusion of distributed systems, directly connected to recent communication technologies, move people towards the era of mobile and ubiquitous systems. Distributed systems make merchant-customer relationships closer and more flexible, using reliable e-commerce technologies. These systems and environments need many distributed access points, for the creation and management of secure identities and for the secure recognition of users. Traditionally, these access points can be made possible by a software system with a main central server. This work proposes the study and implementation of a multimodal technique, based on biometric information, for identity management and personal ubiquitous authentication. The multimodal technique uses both fingerprint micro features (minutiae and fingerprint macro features (singularity points for robust user authentication. To strengthen the security level of electronic payment systems, an embedded hardware prototype has been also created: acting as self-contained sensors, it performs the entire authentication process on the same device, so that all critical information (e.g. biometric data, account transactions and cryptographic keys, are managed and stored inside the sensor, without any data transmission. The sensor has been prototyped using the Celoxica RC203E board, achieving fast execution time, low working frequency, and good recognition performance.

  7. A DNA fingerprinting procedure for ultra high-throughput genetic analysis of insects.

    Science.gov (United States)

    Schlipalius, D I; Waldron, J; Carroll, B J; Collins, P J; Ebert, P R

    2001-12-01

    Existing procedures for the generation of polymorphic DNA markers are not optimal for insect studies in which the organisms are often tiny and background molecular information is often non-existent. We have used a new high throughput DNA marker generation protocol called randomly amplified DNA fingerprints (RAF) to analyse the genetic variability in three separate strains of the stored grain pest, Rhyzopertha dominica. This protocol is quick, robust and reliable even though it requires minimal sample preparation, minute amounts of DNA and no prior molecular analysis of the organism. Arbitrarily selected oligonucleotide primers routinely produced approximately 50 scoreable polymorphic DNA markers, between individuals of three independent field isolates of R. dominica. Multivariate cluster analysis using forty-nine arbitrarily selected polymorphisms generated from a single primer reliably separated individuals into three clades corresponding to their geographical origin. The resulting clades were quite distinct, with an average genetic difference of 37.5 +/- 6.0% between clades and of 21.0 +/- 7.1% between individuals within clades. As a prelude to future gene mapping efforts, we have also assessed the performance of RAF under conditions commonly used in gene mapping. In this analysis, fingerprints from pooled DNA samples accurately and reproducibly reflected RAF profiles obtained from individual DNA samples that had been combined to create the bulked samples.

  8. Fingerprinting Mobile Devices Using Personalized Configurations

    Directory of Open Access Journals (Sweden)

    Kurtz Andreas

    2016-01-01

    Full Text Available Recently, Apple removed access to various device hardware identifiers that were frequently misused by iOS third-party apps to track users. We are, therefore, now studying the extent to which users of smartphones can still be uniquely identified simply through their personalized device configurations. Using Apple’s iOS as an example, we show how a device fingerprint can be computed using 29 different configuration features. These features can be queried from arbitrary thirdparty apps via the official SDK. Experimental evaluations based on almost 13,000 fingerprints from approximately 8,000 different real-world devices show that (1 all fingerprints are unique and distinguishable; and (2 utilizing a supervised learning approach allows returning users or their devices to be recognized with a total accuracy of 97% over time

  9. Application results for an augmented video tracker

    Science.gov (United States)

    Pierce, Bill

    1991-08-01

    The Relay Mirror Experiment (RME) is a research program to determine the pointing accuracy and stability levels achieved when a laser beam is reflected by the RME satellite from one ground station to another. This paper reports the results of using a video tracker augmented with a quad cell signal to improve the RME ground station tracking system performance. The video tracker controls a mirror to acquire the RME satellite, and provides a robust low bandwidth tracking loop to remove line of sight (LOS) jitter. The high-passed, high-gain quad cell signal is added to the low bandwidth, low-gain video tracker signal to increase the effective tracking loop bandwidth, and significantly improves LOS disturbance rejection. The quad cell augmented video tracking system is analyzed, and the math model for the tracker is developed. A MATLAB model is then developed from this, and performance as a function of bandwidth and disturbances is given. Improvements in performance due to the addition of the video tracker and the augmentation with the quad cell are provided. Actual satellite test results are then presented and compared with the simulated results.

  10. Error Resilience in Current Distributed Video Coding Architectures

    Directory of Open Access Journals (Sweden)

    Tonoli Claudia

    2009-01-01

    Full Text Available In distributed video coding the signal prediction is shifted at the decoder side, giving therefore most of the computational complexity burden at the receiver. Moreover, since no prediction loop exists before transmission, an intrinsic robustness to transmission errors has been claimed. This work evaluates and compares the error resilience performance of two distributed video coding architectures. In particular, we have considered a video codec based on the Stanford architecture (DISCOVER codec and a video codec based on the PRISM architecture. Specifically, an accurate temporal and rate/distortion based evaluation of the effects of the transmission errors for both the considered DVC architectures has been performed and discussed. These approaches have been also compared with H.264/AVC, in both cases of no error protection, and simple FEC error protection. Our evaluations have highlighted in all cases a strong dependence of the behavior of the various codecs to the content of the considered video sequence. In particular, PRISM seems to be particularly well suited for low-motion sequences, whereas DISCOVER provides better performance in the other cases.

  11. An investigation on the problem of thinning in fingerprint processing ...

    African Journals Online (AJOL)

    A high-integrity thinning procedure for binarised fingerprints is proposed in this paper. Several authors and software developers have approached the thinning problems in fingerprint-processing differently. Their approach produced in most cases, fingerprint skeletons with low reli abi lity and thus require additional ...

  12. Towards a complete rule-based classification approach for flat fingerprints

    CSIR Research Space (South Africa)

    Webb, L

    2014-12-01

    Full Text Available fingerprints. This work implements an algorithm which includes new rules to account for more instances of flat fingerprints with missing singular points, specifically when the delta of a Right Loop or Left Loop fingerprint is not captured, when one of the loops...

  13. Extracting subsurface fingerprints using optical coherence tomography

    CSIR Research Space (South Africa)

    Akhoury, SS

    2015-02-01

    Full Text Available Subsurface Fingerprints using Optical Coherence Tomography Sharat Saurabh Akhoury, Luke Nicholas Darlow Modelling and Digital Science, Council for Scientific and Industrial Research, Pretoria, South Africa Abstract Physiologists have found... approach to extract the subsurface fingerprint representation using a high-resolution imaging technology known as Optical Coherence Tomography (OCT). ...

  14. Detection and analysis of diamond fingerprinting feature and its application

    Energy Technology Data Exchange (ETDEWEB)

    Li Xin; Huang Guoliang; Li Qiang; Chen Shengyi, E-mail: tshgl@tsinghua.edu.cn [Department of Biomedical Engineering, the School of Medicine, Tsinghua University, Beijing, 100084 (China)

    2011-01-01

    Before becoming a jewelry diamonds need to be carved artistically with some special geometric features as the structure of the polyhedron. There are subtle differences in the structure of this polyhedron in each diamond. With the spatial frequency spectrum analysis of diamond surface structure, we can obtain the diamond fingerprint information which represents the 'Diamond ID' and has good specificity. Based on the optical Fourier Transform spatial spectrum analysis, the fingerprinting identification of surface structure of diamond in spatial frequency domain was studied in this paper. We constructed both the completely coherent diamond fingerprinting detection system illuminated by laser and the partially coherent diamond fingerprinting detection system illuminated by led, and analyzed the effect of the coherence of light source to the diamond fingerprinting feature. We studied rotation invariance and translation invariance of the diamond fingerprinting and verified the feasibility of real-time and accurate identification of diamond fingerprint. With the profit of this work, we can provide customs, jewelers and consumers with a real-time and reliable diamonds identification instrument, which will curb diamond smuggling, theft and other crimes, and ensure the healthy development of the diamond industry.

  15. Quality and matching performance analysis of three-dimensional unraveled fingerprints

    Science.gov (United States)

    Wang, Yongchang; Hao, Qi; Fatehpuria, Abhishika; Hassebrook, Laurence G.; Lau, Daniel L.

    2010-07-01

    The use of fingerprints as a biometric is both the oldest mode of computer-aided personal identification and the most-relied-on technology in use today. However, current acquisition methods have some challenging and peculiar difficulties. For higher performance fingerprint data acquisition and verification, a novel noncontact 3-D fingerprint scanner is investigated, where both the detailed 3-D and albedo information of the finger is obtained. The obtained high-resolution 3-D prints are further converted into 3-D unraveled prints, to be compatible with traditional 2-D automatic fingerprint identification systems. As a result, many limitations imposed on conventional fingerprint capture and processing can be reduced by the unobtrusiveness of this approach and the extra depth information acquired. To compare the quality and matching performances of 3-D unraveled with traditional 2-D plain fingerprints, we collect both 3-D prints and their 2-D plain counterparts. The print quality and matching performances are evaluated and analyzed by using National Institute of Standard Technology fingerprint software. Experimental results show that the 3-D unraveled print outperforms the 2-D print in both quality and matching performances.

  16. 3D fingerprint imaging system based on full-field fringe projection profilometry

    Science.gov (United States)

    Huang, Shujun; Zhang, Zonghua; Zhao, Yan; Dai, Jie; Chen, Chao; Xu, Yongjia; Zhang, E.; Xie, Lili

    2014-01-01

    As an unique, unchangeable and easily acquired biometrics, fingerprint has been widely studied in academics and applied in many fields over the years. The traditional fingerprint recognition methods are based on the obtained 2D feature of fingerprint. However, fingerprint is a 3D biological characteristic. The mapping from 3D to 2D loses 1D information and causes nonlinear distortion of the captured fingerprint. Therefore, it is becoming more and more important to obtain 3D fingerprint information for recognition. In this paper, a novel 3D fingerprint imaging system is presented based on fringe projection technique to obtain 3D features and the corresponding color texture information. A series of color sinusoidal fringe patterns with optimum three-fringe numbers are projected onto a finger surface. From another viewpoint, the fringe patterns are deformed by the finger surface and captured by a CCD camera. 3D shape data of the finger can be obtained from the captured fringe pattern images. This paper studies the prototype of the 3D fingerprint imaging system, including principle of 3D fingerprint acquisition, hardware design of the 3D imaging system, 3D calibration of the system, and software development. Some experiments are carried out by acquiring several 3D fingerprint data. The experimental results demonstrate the feasibility of the proposed 3D fingerprint imaging system.

  17. Generation of DNA profiles from fingerprints developed with columnar thin film technique.

    Science.gov (United States)

    Plazibat, Stephanie L; Roy, Reena; Swiontek, Stephen E; Lakhtakia, Akhlesh

    2015-12-01

    Partial-bloody fingerprints and partial fingerprints with saliva are often encountered at crime scenes, potentially enabling the combination of fingerprint and DNA analyses for absolute identification, provided that the development technique for fingerprint analysis does not inhibit DNA analysis. 36 partial-bloody fingerprints and 30 fingerprints wetted with saliva, all deposited on brass, were first developed using the columnar-thin-film (CTF) technique and then subjected to short tandem repeat (STR) DNA analysis. Equal numbers of samples were subjected to the same DNA analysis without development. Tris (8-hydroxyquinolinato) aluminum, or Alq3, was evaporated to deposit CTFs for development of the prints. DNA was extracted from all 132 samples, quantified, and amplified with AmpFlSTR(®) Identifiler Plus Amplification Kit. Additionally, DNA analyses were conducted on four blood smears on un-fingerprinted brass that had been subjected to CTF deposition and four blood smears on un-fingerprinted brass that had not been subjected to CTF deposition. Complete and concordant autosomal STR profiles of the same quality were obtained from both undeveloped and CTF-developed fingerprints, indicating that CTF development of fingerprints preserves DNA and does not inhibit subsequent DNA analysis. Even when there were no fingerprints, CTF deposition did not lead to inhibition of DNA analysis. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  18. On Realistically Attacking Tor with Website Fingerprinting

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2016-10-01

    Full Text Available Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory tests we collect the training data set together with the testing data set, so the training data set is fresh, but an attacker may not be able to maintain a fresh data set. Second, laboratory packet sequences correspond to a single page each, but for realistic packet sequences the split between pages is not obvious. Third, packet sequences may include background noise from other types of web traffic. These differences adversely affect website fingerprinting under realistic conditions. In this paper, we tackle these three problems to bridge the gap between laboratory and realistic conditions for website fingerprinting. We show that we can maintain a fresh training set with minimal resources. We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page each. We describe several new algorithms for tackling background noise. With our techniques, we are able to build the first website fingerprinting system that can operate directly on packet sequences collected in the wild.

  19. An Innovative SIFT-Based Method for Rigid Video Object Recognition

    Directory of Open Access Journals (Sweden)

    Jie Yu

    2014-01-01

    Full Text Available This paper presents an innovative SIFT-based method for rigid video object recognition (hereafter called RVO-SIFT. Just like what happens in the vision system of human being, this method makes the object recognition and feature updating process organically unify together, using both trajectory and feature matching, and thereby it can learn new features not only in the training stage but also in the recognition stage, which can improve greatly the completeness of the video object’s features automatically and, in turn, increases the ratio of correct recognition drastically. The experimental results on real video sequences demonstrate its surprising robustness and efficiency.

  20. Research of Video Steganalysis Algorithm Based on H265 Protocol

    Directory of Open Access Journals (Sweden)

    Wu Kaicheng

    2015-01-01

    This paper researches LSB matching VSA based on H265 protocol with the research background of 26 original Video sequences, it firstly extracts classification features out from training samples as input of SVM, and trains in SVM to obtain high-quality category classification model, and then tests whether there is suspicious information in the video sample. The experimental results show that VSA algorithm based on LSB matching can be more practical to obtain all frame embedded secret information and carrier and video of local frame embedded. In addition, VSA adopts the method of frame by frame with a strong robustness in resisting attack in the corresponding time domain.

  1. Efficient internal and surface fingerprint extraction and blending using optical coherence tomography.

    Science.gov (United States)

    Darlow, Luke Nicholas; Connan, James

    2015-11-01

    Optical coherence tomography provides a 3D representation of fingertip skin where surface and internal fingerprints are found. These fingerprints are topographically identical. However, the surface skin is prone to damage, distortion, and spoofing; and the internal fingerprint is difficult to access and extract. This research presents a novel scaling-resolution approach to fingerprint zone detection and extraction. Furthermore, a local-quality-based blending procedure is also proposed. The accuracy of the zone-detection algorithm is comparable to an earlier work, yielding a mean-squared error of 25.9 and structural similarity of 95.8% (compared to a ground-truth estimate). Blending the surface and internal fingerprints improved the National Institute of Science and Technology's Fingerprint Image Quality scores and the average maximum match scores (when matched against conventional surface counterparts). The fingerprint blending procedure was able to combine high-quality regions from both fingerprints, thus mitigating surface wrinkles and anomalous poor-quality regions. Furthermore, spoof detection via a surface-to-internal fingerprint comparison was proposed and tested.

  2. DNA Fingerprinting in a Forensic Teaching Experiment

    Science.gov (United States)

    Wagoner, Stacy A.; Carlson, Kimberly A.

    2008-01-01

    This article presents an experiment designed to provide students, in a classroom laboratory setting, a hands-on demonstration of the steps used in DNA forensic analysis by performing DNA extraction, DNA fingerprinting, and statistical analysis of the data. This experiment demonstrates how DNA fingerprinting is performed and how long it takes. It…

  3. 8 CFR 236.5 - Fingerprints and photographs.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Fingerprints and photographs. 236.5 Section... to Order of Removal § 236.5 Fingerprints and photographs. Every alien 14 years of age or older... photographs shall be made available to Federal, State, and local law enforcement agencies upon request to the...

  4. The Ins and Outs of DNA Fingerprinting the Infectious Fungi

    Science.gov (United States)

    Soll, David R.

    2000-01-01

    DNA fingerprinting methods have evolved as major tools in fungal epidemiology. However, no single method has emerged as the method of choice, and some methods perform better than others at different levels of resolution. In this review, requirements for an effective DNA fingerprinting method are proposed and procedures are described for testing the efficacy of a method. In light of the proposed requirements, the most common methods now being used to DNA fingerprint the infectious fungi are described and assessed. These methods include restriction fragment length polymorphisms (RFLP), RFLP with hybridization probes, randomly amplified polymorphic DNA and other PCR-based methods, electrophoretic karyotyping, and sequencing-based methods. Procedures for computing similarity coefficients, generating phylogenetic trees, and testing the stability of clusters are then described. To facilitate the analysis of DNA fingerprinting data, computer-assisted methods are described. Finally, the problems inherent in the collection of test and control isolates are considered, and DNA fingerprinting studies of strain maintenance during persistent or recurrent infections, microevolution in infecting strains, and the origin of nosocomial infections are assessed in light of the preceding discussion of the ins and outs of DNA fingerprinting. The intent of this review is to generate an awareness of the need to verify the efficacy of each DNA fingerprinting method for the level of genetic relatedness necessary to answer the epidemiological question posed, to use quantitative methods to analyze DNA fingerprint data, to use computer-assisted DNA fingerprint analysis systems to analyze data, and to file data in a form that can be used in the future for retrospective and comparative studies. PMID:10756003

  5. Joint Rendering and Segmentation of Free-Viewpoint Video

    Directory of Open Access Journals (Sweden)

    Ishii Masato

    2010-01-01

    Full Text Available Abstract This paper presents a method that jointly performs synthesis and object segmentation of free-viewpoint video using multiview video as the input. This method is designed to achieve robust segmentation from online video input without per-frame user interaction and precomputations. This method shares a calculation process between the synthesis and segmentation steps; the matching costs calculated through the synthesis step are adaptively fused with other cues depending on the reliability in the segmentation step. Since the segmentation is performed for arbitrary viewpoints directly, the extracted object can be superimposed onto another 3D scene with geometric consistency. We can observe that the object and new background move naturally along with the viewpoint change as if they existed together in the same space. In the experiments, our method can process online video input captured by a 25-camera array and show the result image at 4.55 fps.

  6. Video-based measurements for wireless capsule endoscope tracking

    International Nuclear Information System (INIS)

    Spyrou, Evaggelos; Iakovidis, Dimitris K

    2014-01-01

    The wireless capsule endoscope is a swallowable medical device equipped with a miniature camera enabling the visual examination of the gastrointestinal (GI) tract. It wirelessly transmits thousands of images to an external video recording system, while its location and orientation are being tracked approximately by external sensor arrays. In this paper we investigate a video-based approach to tracking the capsule endoscope without requiring any external equipment. The proposed method involves extraction of speeded up robust features from video frames, registration of consecutive frames based on the random sample consensus algorithm, and estimation of the displacement and rotation of interest points within these frames. The results obtained by the application of this method on wireless capsule endoscopy videos indicate its effectiveness and improved performance over the state of the art. The findings of this research pave the way for a cost-effective localization and travel distance measurement of capsule endoscopes in the GI tract, which could contribute in the planning of more accurate surgical interventions. (paper)

  7. Video-based measurements for wireless capsule endoscope tracking

    Science.gov (United States)

    Spyrou, Evaggelos; Iakovidis, Dimitris K.

    2014-01-01

    The wireless capsule endoscope is a swallowable medical device equipped with a miniature camera enabling the visual examination of the gastrointestinal (GI) tract. It wirelessly transmits thousands of images to an external video recording system, while its location and orientation are being tracked approximately by external sensor arrays. In this paper we investigate a video-based approach to tracking the capsule endoscope without requiring any external equipment. The proposed method involves extraction of speeded up robust features from video frames, registration of consecutive frames based on the random sample consensus algorithm, and estimation of the displacement and rotation of interest points within these frames. The results obtained by the application of this method on wireless capsule endoscopy videos indicate its effectiveness and improved performance over the state of the art. The findings of this research pave the way for a cost-effective localization and travel distance measurement of capsule endoscopes in the GI tract, which could contribute in the planning of more accurate surgical interventions.

  8. Partial Device Fingerprints

    NARCIS (Netherlands)

    Ciere, M.; Hernandez Ganan, C.; van Eeten, M.J.G.

    2017-01-01

    In computing, remote devices may be identified by means of device fingerprinting, which works by collecting a myriad of clientside attributes such as the device’s browser and operating system version, installed plugins, screen resolution, hardware artifacts, Wi-Fi settings, and anything else

  9. Diversity of DNA fingerprints in Cryptococcus neoformans.

    Science.gov (United States)

    Varma, A; Swinne, D; Staib, F; Bennett, J E; Kwon-Chung, K J

    1995-07-01

    DNA fingerprint patterns of 156 Cryptococcus neoformans isolates (26 AIDS patients, 46 non-AIDS patients, and 40 environmental sources) from both varieties (126 C. neoformans var. neoformans and 30 C. neoformans var. gattii isolates) and from seven countries were analyzed by using the DNA probe UT-4p. Nine and twelve distinct DNA fingerprint patterns were observed for isolates of the C. neoformans var. neoformans and var. gattii, respectively. No pattern was unique to AIDS patients, non-AIDS patients, or the environment. Pattern II was observed more often in non-AIDS patients (8 of 23) than in AIDS patients (0 of 25). Pattern V was the most prevalent pattern (42 of 82) in clinical and environmental isolates. Isolates from three AIDS patients in Burundi and Zaire exhibited patterns identical to each other but different from those of isolates collected from their houses (i.e., dust of floors, walls, etc.) or a nearby pigeon coop. DNA fingerprint stability was determined for 53 isolates from nine non-AIDS patients at different time intervals during 5 to 128 weeks of antifungal therapy. For eight patients, the fingerprint pattern was stable while the ninth may have had a mixed infection. Pattern II was observed in 4 of 9 patients, which is similar to 4 of 14 in other non-AIDS patients as reported here. In spite of the extensive pattern heterogeneity among 15 C. neoformans var. gattii isolates in Australia, the patterns observed in seven California isolates were quite different from those in Australia. Among isolates of C. neoformans var. gattii, one fingerprint pattern (designated b) was observed in several countries of the Far East. The fingerprint patterns of two of three environmental isolates from Eucalyptus camaldulensis trees in Australia were identical to those of 2 of the 12 clinical isolates from the country.

  10. A Robust Vision-based Runway Detection and Tracking Algorithm for Automatic UAV Landing

    KAUST Repository

    Abu Jbara, Khaled F.

    2015-05-01

    This work presents a novel real-time algorithm for runway detection and tracking applied to the automatic takeoff and landing of Unmanned Aerial Vehicles (UAVs). The algorithm is based on a combination of segmentation based region competition and the minimization of a specific energy function to detect and identify the runway edges from streaming video data. The resulting video-based runway position estimates are updated using a Kalman Filter, which can integrate other sensory information such as position and attitude angle estimates to allow a more robust tracking of the runway under turbulence. We illustrate the performance of the proposed lane detection and tracking scheme on various experimental UAV flights conducted by the Saudi Aerospace Research Center. Results show an accurate tracking of the runway edges during the landing phase under various lighting conditions. Also, it suggests that such positional estimates would greatly improve the positional accuracy of the UAV during takeoff and landing phases. The robustness of the proposed algorithm is further validated using Hardware in the Loop simulations with diverse takeoff and landing videos generated using a commercial flight simulator.

  11. Parts-based detection of AK-47s for forensic video analysis

    OpenAIRE

    Jones, Justin

    2010-01-01

    Approved for public release; distribution is unlimited Law enforcement, military personnel, and forensic analysts are increasingly reliant on imaging ystems to perform in a hostile environment and require a robust method to efficiently locate bjects of interest in videos and still images. Current approaches require a full-time operator to monitor a surveillance video or to sift a hard drive for suspicious content. In this thesis, we demonstrate the effectiveness of automated analysis tools...

  12. Studies on Chromatographic Fingerprint and Fingerprinting Profile-Efficacy Relationship of Polygoni Perfoliati Herba

    Directory of Open Access Journals (Sweden)

    Li Tian

    2013-01-01

    Full Text Available Polygoni Perfoliati Herba is widely used in China with antibacterium, anti-inflammatory, expectorant, antitumor, and antivirus activities. To reveal the mechanisms of the activities of Polygoni Perfoliati Herba, the relationship between the fingerprinting profile and its bioactivities was investigated. In the present study, high-performance liquid chromatographic (HPLC fingerprinting method was developed. The established method was applied to analyze 51 batches of Polygoni Perfoliati Herba samples collected from different locations or in different harvesting times in China. Chemometrics, including similarity analysis, hierarchical clustering analysis, and principal component analysis, were used to express their similarities. It was found that similarity values of the samples were in the range of 0.432–0.998. The results of analgesic tests indicated that Polygoni Perfoliati Herba could significantly inhibit pain induced by hot plate and acetic acid in mice. The results of anti-inflammatory tests showed that Polygoni Perfoliati Herba had good anti-inflammatory effects (P < 0.01 in two models including dimethyl benzene-induced ear edema and acetic acid-induced peritoneal permeability in mice. Combining the results from chromatographic fingerprints with those from bioactivities, we found that seven peaks from Polygoni Perfoliati Herba were mainly responsible for analgesic and anti-inflammatory activities.

  13. Use of flow injection mass spectrometric fingerprinting and chemometrics for differentiation of three black cohosh species

    International Nuclear Information System (INIS)

    Huang, Huilian; Sun, Jianghao; McCoy, Joe-Ann; Zhong, Haiyan; Fletcher, Edward J.; Harnly, James; Chen, Pei

    2015-01-01

    Flow injection mass spectrometry (FIMS) was used to provide chemical fingerprints of black cohosh (Actaea racemosa L.) in a manner of minutes by omitting the separation step. This method has proven to be a powerful tool for botanical authentication and in this study it was used to distinguish between three Actaea species prior to a more detailed chemical analysis using ultra high-performance liquid chromatography high-resolution mass spectrometry (UHPLC–HRMS). Black cohosh has become increasingly popular as a dietary supplement in the United States for the treatment of symptoms related to menopause. However, it has been known to be adulterated with the Asian Actaea dahurica (Turcz. ex Fisch. & C.A.Mey.) Franch. species (syn. Cimicifuga dahurica (Turcz.) Maxim). Existing methods for identification of black cohosh and differentiation of Actaea species are usually lengthy, laborious, and lack robustness, often based on the comparison of a few pre-selected components. Chemical fingerprints were obtained for 77 black cohosh samples and their related species using FIMS in the negative ion mode. The analysis time for each sample was less than 2 min. All data were processed using principal component analysis (PCA). FIMS fingerprints could readily differentiate all three species. Representative samples from each of the three species were further examined using UHPLC–MS to provide detailed profiles of the chemical differences between the three species and were compared to the PCA loadings. This study demonstrates a simple, fast, and easy analytical method that can be used to differentiate A. racemosa, Actaea podocarpa, and A. dahurica. - Highlights: • Flow injection mass spectrometry (FIMS) was used to provide chemical fingerprints of black cohosh (Actaea racemosa L.) in a manner of minutes by omitting the separation step. • FIMS can discriminate between A. dahurica, A. podocarpa, and A. racemosa. • FIMS is a valuable screening tool for authentication of botanicals

  14. Use of flow injection mass spectrometric fingerprinting and chemometrics for differentiation of three black cohosh species

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Huilian [Food Composition and Methods Development Laboratory, Beltsville Human Nutrition Research Center, Agricultural Research Service, U.S. Department of Agriculture, Beltsville, MD (United States); Key Laboratory of Modern Preparation of TCM, Jiangxi University of Traditional Chinese Medicine, Ministry of Education, Nanchang, Jiangxi Province (China); Sun, Jianghao [Food Composition and Methods Development Laboratory, Beltsville Human Nutrition Research Center, Agricultural Research Service, U.S. Department of Agriculture, Beltsville, MD (United States); McCoy, Joe-Ann [The North Carolina Arboretum Germplasm Repository, UNC Affiliate Campus, Asheville, NC (United States); Zhong, Haiyan [College of Food Science and Engineering, Central South University of Forestry and Technology, Changsha, Hunan Province (China); Fletcher, Edward J. [Strategic Sourcing, Inc., Banner Elk, NC 28604 (United States); Harnly, James, E-mail: harnly.james@ars.usda.gov [Food Composition and Methods Development Laboratory, Beltsville Human Nutrition Research Center, Agricultural Research Service, U.S. Department of Agriculture, Beltsville, MD (United States); Chen, Pei, E-mail: pei.chen@ars.usda.gov [Food Composition and Methods Development Laboratory, Beltsville Human Nutrition Research Center, Agricultural Research Service, U.S. Department of Agriculture, Beltsville, MD (United States)

    2015-03-01

    Flow injection mass spectrometry (FIMS) was used to provide chemical fingerprints of black cohosh (Actaea racemosa L.) in a manner of minutes by omitting the separation step. This method has proven to be a powerful tool for botanical authentication and in this study it was used to distinguish between three Actaea species prior to a more detailed chemical analysis using ultra high-performance liquid chromatography high-resolution mass spectrometry (UHPLC–HRMS). Black cohosh has become increasingly popular as a dietary supplement in the United States for the treatment of symptoms related to menopause. However, it has been known to be adulterated with the Asian Actaea dahurica (Turcz. ex Fisch. & C.A.Mey.) Franch. species (syn. Cimicifuga dahurica (Turcz.) Maxim). Existing methods for identification of black cohosh and differentiation of Actaea species are usually lengthy, laborious, and lack robustness, often based on the comparison of a few pre-selected components. Chemical fingerprints were obtained for 77 black cohosh samples and their related species using FIMS in the negative ion mode. The analysis time for each sample was less than 2 min. All data were processed using principal component analysis (PCA). FIMS fingerprints could readily differentiate all three species. Representative samples from each of the three species were further examined using UHPLC–MS to provide detailed profiles of the chemical differences between the three species and were compared to the PCA loadings. This study demonstrates a simple, fast, and easy analytical method that can be used to differentiate A. racemosa, Actaea podocarpa, and A. dahurica. - Highlights: • Flow injection mass spectrometry (FIMS) was used to provide chemical fingerprints of black cohosh (Actaea racemosa L.) in a manner of minutes by omitting the separation step. • FIMS can discriminate between A. dahurica, A. podocarpa, and A. racemosa. • FIMS is a valuable screening tool for authentication of botanicals.

  15. Teaching DNA Fingerprinting using a Hands-on Simulation.

    Science.gov (United States)

    Schug, Thatcher

    1998-01-01

    Presents an inexpensive hands-on lesson in DNA fingerprinting that can be completed in a single class period. Involves students in solving a murder in which a drop of blood is fingerprinted and matched with the blood of the murderer. (DDR)

  16. Performance Evaluation and Parameter Optimization of SoftCast Wireless Video Broadcast

    Directory of Open Access Journals (Sweden)

    Dongxue Yang

    2015-08-01

    Full Text Available Wireless video broadcast plays an imp ortant role in multimedia communication with the emergence of mobile video applications. However, conventional video broadcast designs suffer from a cliff effect due to separated source and channel encoding. The newly prop osed SoftCast scheme employs a cross-layer design, whose reconstructed video quality is prop ortional to the channel condition. In this pap er, we provide the p erformance evaluation and the parameter optimization of the SoftCast system. Optimization principles on parameter selection are suggested to obtain a b etter video quality, o ccupy less bandwidth and/or utilize lower complexity. In addition, we compare SoftCast with H.264 in the LTE EPA scenario. The simulation results show that SoftCast provides a b etter p erformance in the scalability to channel conditions and the robustness to packet losses.

  17. Incremental principal component pursuit for video background modeling

    Science.gov (United States)

    Rodriquez-Valderrama, Paul A.; Wohlberg, Brendt

    2017-03-14

    An incremental Principal Component Pursuit (PCP) algorithm for video background modeling that is able to process one frame at a time while adapting to changes in background, with a computational complexity that allows for real-time processing, having a low memory footprint and is robust to translational and rotational jitter.

  18. Emotion Index of Cover Song Music Video Clips based on Facial Expression Recognition

    DEFF Research Database (Denmark)

    Kavallakis, George; Vidakis, Nikolaos; Triantafyllidis, Georgios

    2017-01-01

    This paper presents a scheme of creating an emotion index of cover song music video clips by recognizing and classifying facial expressions of the artist in the video. More specifically, it fuses effective and robust algorithms which are employed for expression recognition, along with the use...... of a neural network system using the features extracted by the SIFT algorithm. Also we support the need of this fusion of different expression recognition algorithms, because of the way that emotions are linked to facial expressions in music video clips....

  19. DNA fingerprinting of the NCI-60 cell line panel.

    Science.gov (United States)

    Lorenzi, Philip L; Reinhold, William C; Varma, Sudhir; Hutchinson, Amy A; Pommier, Yves; Chanock, Stephen J; Weinstein, John N

    2009-04-01

    The National Cancer Institute's NCI-60 cell line panel, the most extensively characterized set of cells in existence and a public resource, is frequently used as a screening tool for drug discovery. Because many laboratories around the world rely on data from the NCI-60 cells, confirmation of their genetic identities represents an essential step in validating results from them. Given the consequences of cell line contamination or misidentification, quality control measures should routinely include DNA fingerprinting. We have, therefore, used standard DNA microsatellite short tandem repeats to profile the NCI-60, and the resulting DNA fingerprints are provided here as a reference. Consistent with previous reports, the fingerprints suggest that several NCI-60 lines have common origins: the melanoma lines MDA-MB-435, MDA-N, and M14; the central nervous system lines U251 and SNB-19; the ovarian lines OVCAR-8 and OVCAR-8/ADR (also called NCI/ADR); and the prostate lines DU-145, DU-145 (ATCC), and RC0.1. Those lines also show that the ability to connect two fingerprints to the same origin is not affected by stable transfection or by the development of multidrug resistance. As expected, DNA fingerprints were not able to distinguish different tissues-of-origin. The fingerprints serve principally as a barcodes.

  20. An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique

    OpenAIRE

    Ramakrishnan, Josphineleela; Ramakrishnan, M.

    2012-01-01

    Biometric time and attendance system is one of the most successful applications of biometric technology. One of the main advantage of a biometric time and attendance system is it avoids "buddy-punching". Buddy punching was a major loophole which will be exploiting in the traditional time attendance systems. Fingerprint recognition is an established field today, but still identifying individual from a set of enrolled fingerprints is a time taking process. Most fingerprint-based biometric syste...

  1. Friction ridge skin - Automated Fingerprint Identification System (AFIS)

    NARCIS (Netherlands)

    Meuwly, Didier

    2013-01-01

    This contribution describes the development and the forensic use of automated fingerprint identification systems (AFISs). AFISs were initially developed in order to overcome the limitations of the paper-based fingerprint collections, by digitizing the ten-print cards in computerized databases and to

  2. Rotation-invariant fingerprint matching using radon and DCT

    Indian Academy of Sciences (India)

    Sangita Bharkad

    2017-11-20

    Nov 20, 2017 ... [6] Bazen A and Gerez S 2003 Fingerprint matching by thin- plate spline modeling of elastic deformations. Pattern. Recogn. 36(8): 1859–1867. [7] Jain A, Hong L and Bolle R 1997 On-line fingerprint veri- fication. IEEE Trans.

  3. The Development Of Mathematical Model For Automated Fingerprint Identification Systems Analysis

    International Nuclear Information System (INIS)

    Ardisasmita, M. Syamsa

    2001-01-01

    Fingerprint has a strong oriented and periodic structure composed of dark lines of raised skin (ridges) and clear lines of lowered skin (furrows)that twist to form a distinct pattern. Although the manner in which the ridges flow is distinctive, other characteristics of the fingerprint called m inutiae a re what are most unique to the individual. These features are particular patterns consisting of terminations or bifurcations of the ridges. To assert if two fingerprints are from the same finger or not, experts detect those minutiae. AFIS (Automated Fingerprint Identification Systems) extract and compare these features for determining a match. The classic methods of fingerprints recognition are not suitable for direct implementation in form of computer algorithms. The creation of a finger's model was however the necessity of development of new, better algorithms of analysis. This paper presents a new numerical methods of fingerprints' simulation based on mathematical model of arrangement of dermatoglyphics and creation of minutiae. This paper describes also the design and implementation of an automated fingerprint identification systems which operates in two stages: minutiae extraction and minutiae matching

  4. Practical Fingerprinting Localization for Indoor Positioning System by Using Beacons

    Directory of Open Access Journals (Sweden)

    Santosh Subedi

    2017-01-01

    Full Text Available Recent developments in the fields of smartphones and wireless communication technologies such as beacons, Wi-Fi, and ultra-wideband have made it possible to realize indoor positioning system (IPS with a few meters of accuracy. In this paper, an improvement over traditional fingerprinting localization is proposed by combining it with weighted centroid localization (WCL. The proposed localization method reduces the total number of fingerprint reference points over the localization space, thus minimizing both the time required for reading radio frequency signals and the number of reference points needed during the fingerprinting learning process, which eventually makes the process less time-consuming. The proposed positioning has two major steps of operation. In the first step, we have realized fingerprinting that utilizes lightly populated reference points (RPs and WCL individually. Using the location estimated at the first step, WCL is run again for the final location estimation. The proposed localization technique reduces the number of required fingerprint RPs by more than 40% compared to normal fingerprinting localization method with a similar localization estimation error.

  5. Performance characterization of structured light-based fingerprint scanner

    Science.gov (United States)

    Hassebrook, Laurence G.; Wang, Minghao; Daley, Raymond C.

    2013-05-01

    Our group believes that the evolution of fingerprint capture technology is in transition to include 3-D non-contact fingerprint capture. More specifically we believe that systems based on structured light illumination provide the highest level of depth measurement accuracy. However, for these new technologies to be fully accepted by the biometric community, they must be compliant with federal standards of performance. At present these standards do not exist for this new biometric technology. We propose and define a set of test procedures to be used to verify compliance with the Federal Bureau of Investigation's image quality specification for Personal Identity Verification single fingerprint capture devices. The proposed test procedures include: geometric accuracy, lateral resolution based on intensity or depth, gray level uniformity and flattened fingerprint image quality. Several 2-D contact analogies, performance tradeoffs and optimization dilemmas are evaluated and proposed solutions are presented.

  6. An Aerial Video Stabilization Method Based on SURF Feature

    Directory of Open Access Journals (Sweden)

    Wu Hao

    2016-01-01

    Full Text Available The video captured by Micro Aerial Vehicle is often degraded due to unexpected random trembling and jitter caused by wind and the shake of the aerial platform. An approach for stabilizing the aerial video based on SURF feature and Kalman filter is proposed. SURF feature points are extracted in each frame, and the feature points between adjacent frames are matched using Fast Library for Approximate Nearest Neighbors search method. Then Random Sampling Consensus matching algorithm and Least Squares Method are used to remove mismatching points pairs, and estimate the transformation between the adjacent images. Finally, Kalman filter is applied to smooth the motion parameters and separate Intentional Motion from Unwanted Motion to stabilize the aerial video. Experiments results show that the approach can stabilize aerial video efficiently with high accuracy, and it is robust to the translation, rotation and zooming motion of camera.

  7. A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

    Directory of Open Access Journals (Sweden)

    Yijun Yang

    2015-01-01

    Full Text Available A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users’ fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

  8. Development of quality control system for fingerprint comparison processes

    Directory of Open Access Journals (Sweden)

    Shiquan Liu

    2017-01-01

    Full Text Available Fingerprint evidence played an important role in investigation, prosecution, and trial process due to the belief of its uniqueness and unchanged characteristics. However, in recent years, the science behind the process of fingerprint comparisons has been questioned. Main research questions have been focusing on the opaqueness within the comparison processes, subjective judgments, lack of universal standards, no error rate expression on final conclusions, and poor scientific fundamental research data. Facing the above-mentioned questions, this paper aims to suggest a quality control system (QCS for fingerprint comparison processes. This QCS is based on the use of software (PiAnoS and its technological features, being able to provide a data management model to increase the transparency and quality of fingerprint comparison processes.

  9. Network-based Fingerprint Authentication System Using a Mobile Device

    OpenAIRE

    Zhang, Qihu

    2016-01-01

    Abstract— Fingerprint-based user authentication is highly effective in networked services such as electronic payment, but conventional authentication solutions have problems in cost, usability and security. To resolve these problems, we propose a touch-less fingerprint authentication solution, in which a mobile device's built-in camera is used to capture fingerprint image, and then it is sent to the server to determine the identity of the user. We designed and implemented a prototype as an a...

  10. Camera Control and Geo-Registration for Video Sensor Networks

    Science.gov (United States)

    Davis, James W.

    With the use of large video networks, there is a need to coordinate and interpret the video imagery for decision support systems with the goal of reducing the cognitive and perceptual overload of human operators. We present computer vision strategies that enable efficient control and management of cameras to effectively monitor wide-coverage areas, and examine the framework within an actual multi-camera outdoor urban video surveillance network. First, we construct a robust and precise camera control model for commercial pan-tilt-zoom (PTZ) video cameras. In addition to providing a complete functional control mapping for PTZ repositioning, the model can be used to generate wide-view spherical panoramic viewspaces for the cameras. Using the individual camera control models, we next individually map the spherical panoramic viewspace of each camera to a large aerial orthophotograph of the scene. The result provides a unified geo-referenced map representation to permit automatic (and manual) video control and exploitation of cameras in a coordinated manner. The combined framework provides new capabilities for video sensor networks that are of significance and benefit to the broad surveillance/security community.

  11. Features for detecting smoke in laparoscopic videos

    Directory of Open Access Journals (Sweden)

    Jalal Nour Aldeen

    2017-09-01

    Full Text Available Video-based smoke detection in laparoscopic surgery has different potential applications, such as the automatic addressing of surgical events associated with the electrocauterization task and the development of automatic smoke removal. In the literature, video-based smoke detection has been studied widely for fire surveillance systems. Nevertheless, the proposed methods are insufficient for smoke detection in laparoscopic videos because they often depend on assumptions which rarely hold in laparoscopic surgery such as static camera. In this paper, ten visual features based on motion, texture and colour of smoke are proposed and evaluated for smoke detection in laparoscopic videos. These features are RGB channels, energy-based feature, texture features based on gray level co-occurrence matrix (GLCM, HSV colour space feature, features based on the detection of moving regions using optical flow and the smoke colour in HSV colour space. These features were tested on four laparoscopic cholecystectomy videos. Experimental observations show that each feature can provide valuable information in performing the smoke detection task. However, each feature has weaknesses to detect the presence of smoke in some cases. By combining all proposed features smoke with high and even low density can be identified robustly and the classification accuracy increases significantly.

  12. ULTRAVIOLET RAMAN SPECTRAL SIGNATURE ACQUISITION: UV RAMAN SPECTRAL FINGERPRINTS.

    Energy Technology Data Exchange (ETDEWEB)

    SEDLACEK,III, A.J.FINFROCK,C.

    2002-09-01

    As a member of the science-support part of the ITT-lead LISA development program, BNL is tasked with the acquisition of UV Raman spectral fingerprints and associated scattering cross-sections for those chemicals-of-interest to the program's sponsor. In support of this role, the present report contains the first installment of UV Raman spectral fingerprint data on the initial subset of chemicals. Because of the unique nature associated with the acquisition of spectral fingerprints for use in spectral pattern matching algorithms (i.e., CLS, PLS, ANN) great care has been undertaken to maximize the signal-to-noise and to minimize unnecessary spectral subtractions, in an effort to provide the highest quality spectral fingerprints. This report is divided into 4 sections. The first is an Experimental section that outlines how the Raman spectra are performed. This is then followed by a section on Sample Handling. Following this, the spectral fingerprints are presented in the Results section where the data reduction process is outlined. Finally, a Photographs section is included.

  13. Common and Innovative Visuals: A sparsity modeling framework for video.

    Science.gov (United States)

    Abdolhosseini Moghadam, Abdolreza; Kumar, Mrityunjay; Radha, Hayder

    2014-05-02

    Efficient video representation models are critical for many video analysis and processing tasks. In this paper, we present a framework based on the concept of finding the sparsest solution to model video frames. To model the spatio-temporal information, frames from one scene are decomposed into two components: (i) a common frame, which describes the visual information common to all the frames in the scene/segment, and (ii) a set of innovative frames, which depicts the dynamic behaviour of the scene. The proposed approach exploits and builds on recent results in the field of compressed sensing to jointly estimate the common frame and the innovative frames for each video segment. We refer to the proposed modeling framework by CIV (Common and Innovative Visuals). We show how the proposed model can be utilized to find scene change boundaries and extend CIV to videos from multiple scenes. Furthermore, the proposed model is robust to noise and can be used for various video processing applications without relying on motion estimation and detection or image segmentation. Results for object tracking, video editing (object removal, inpainting) and scene change detection are presented to demonstrate the efficiency and the performance of the proposed model.

  14. Automated processing of massive audio/video content using FFmpeg

    Directory of Open Access Journals (Sweden)

    Kia Siang Hock

    2014-01-01

    Full Text Available Audio and video content forms an integral, important and expanding part of the digital collections in libraries and archives world-wide. While these memory institutions are familiar and well-versed in the management of more conventional materials such as books, periodicals, ephemera and images, the handling of audio (e.g., oral history recordings and video content (e.g., audio-visual recordings, broadcast content requires additional toolkits. In particular, a robust and comprehensive tool that provides a programmable interface is indispensable when dealing with tens of thousands of hours of audio and video content. FFmpeg is comprehensive and well-established open source software that is capable of the full-range of audio/video processing tasks (such as encode, decode, transcode, mux, demux, stream and filter. It is also capable of handling a wide-range of audio and video formats, a unique challenge in memory institutions. It comes with a command line interface, as well as a set of developer libraries that can be incorporated into applications.

  15. A Karnaugh-Map based fingerprint minutiae extraction method

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Singla

    2010-07-01

    Full Text Available Fingerprint is one of the most promising method among all the biometric techniques and has been used for thepersonal authentication for a long time because of its wide acceptance and reliability. Features (Minutiae are extracted fromthe fingerprint in question and are compared with the features already stored in the database for authentication. Crossingnumber (CN is the most commonly used minutiae extraction method for fingerprints. In this paper, a new Karnaugh-Mapbased fingerprint minutiae extraction method has been proposed and discussed. In the proposed algorithm the 8 neighborsof a pixel in a 33 window are arranged as 8 bits of a byte and corresponding hexadecimal (hex value is calculated. Thesehex values are simplified using standard Karnaugh-Map (K-map technique to obtain the minimized logical expression.Experiments conducted on the FVC2002/Db1_a database reveals that the developed method is better than the crossingnumber (CN method.

  16. Chemical characterization of fingerprints from adults and children

    Energy Technology Data Exchange (ETDEWEB)

    Buchanan, M.V.; Asano, K. [Oak Ridge National Lab., TN (United States); Bohanon, A. [Knoxville Police Dept., TN (United States)

    1996-12-31

    Observation that children`s fingerprints disappear from surfaces more quickly than adults`, initiated a study to characterize the chemical components in fingerprints. Samples were obtained from about 50 individuals ranging in age from 3 to 64 by extracting chemicals from the fingertips using rubbing alcohol. Using combined gas chromatography/mass spectrometry, a wide range of compounds were identified. Samples from children contained higher levels of relatively volatile free fatty acids, while those from adults had higher levels of less volatile long chain esters of fatty acids. These esters are thought to originate from sebaceous glands located on the face and levels of these compounds increase substantially after puberty. Also, other compounds were observed that could be used to develop improved methods for fingerprint detection at a crime scene. Further, observation of specific compounds raises the possibility of being able to identify personal traits (gender, habits, diseases, etc. ) via analysis of components in fingerprints and/or skin.

  17. High Resolution Ultrasonic Method for 3D Fingerprint Representation in Biometrics

    Science.gov (United States)

    Maev, R. Gr.; Bakulin, E. Y.; Maeva, E. Y.; Severin, F. M.

    Biometrics is an important field which studies different possible ways of personal identification. Among a number of existing biometric techniques fingerprint recognition stands alone - because very large database of fingerprints has already been acquired. Also, fingerprints are an important evidence that can be collected at a crime scene. Therefore, of all automated biometric techniques, especially in the field of law enforcement, fingerprint identification seems to be the most promising. Ultrasonic method of fingerprint imaging was originally introduced over a decade as the mapping of the reflection coefficient at the interface between the finger and a covering plate and has shown very good reliability and free from imperfections of previous two methods. This work introduces a newer development of the ultrasonic fingerprint imaging, focusing on the imaging of the internal structures of fingerprints (including sweat pores) with raw acoustic resolution of about 500 dpi (0.05 mm) using a scanning acoustic microscope to obtain images and acoustic data in the form of 3D data array. C-scans from different depths inside the fingerprint area of fingers of several volunteers were obtained and showed good contrast of ridges-and-valleys patterns and practically exact correspondence to the standard ink-and-paper prints of the same areas. Important feature reveled on the acoustic images was the clear appearance of the sweat pores, which could provide additional means of identification.

  18. Defense of fake fingerprint attacks using a swept source laser optical coherence tomography setup

    Science.gov (United States)

    Meissner, Sven; Breithaupt, Ralph; Koch, Edmund

    2013-03-01

    The most established technique for the identification at biometric access control systems is the human fingerprint. While every human fingerprint is unique, fingerprints can be faked very easily by using thin layer fakes. Because commercial fingerprint scanners use only a two-dimensional image acquisition of the finger surface, they can only hardly differentiate between real fingerprints and fingerprint fakes applied on thin layer materials. A Swept Source OCT system with an A-line rate of 20 kHz and a lateral and axial resolution of approximately 13 μm, a centre wavelength of 1320 nm and a band width of 120 nm (FWHM) was used to acquire fingerprints and finger tips with overlying fakes. Three-dimensional volume stacks with dimensions of 4.5 mm x 4 mm x 2 mm were acquired. The layering arrangement of the imaged finger tips and faked finger tips was analyzed and subsequently classified into real and faked fingerprints. Additionally, sweat gland ducts were detected and consulted for the classification. The manual classification between real fingerprints and faked fingerprints results in almost 100 % correctness. The outer as well as the internal fingerprint can be recognized in all real human fingers, whereby this was not possible in the image stacks of the faked fingerprints. Furthermore, in all image stacks of real human fingers the sweat gland ducts were detected. The number of sweat gland ducts differs between the test persons. The typical helix shape of the ducts was observed. In contrast, in images of faked fingerprints we observe abnormal layer arrangements and no sweat gland ducts connecting the papillae of the outer fingerprint and the internal fingerprint. We demonstrated that OCT is a very useful tool to enhance the performance of biometric control systems concerning attacks by thin layer fingerprint fakes.

  19. Non-destructive forensic latent fingerprint acquisition with chromatic white light sensors

    Science.gov (United States)

    Leich, Marcus; Kiltz, Stefan; Dittmann, Jana; Vielhauer, Claus

    2011-02-01

    Non-destructive latent fingerprint acquisition is an emerging field of research, which, unlike traditional methods, makes latent fingerprints available for additional verification or further analysis like tests for substance abuse or age estimation. In this paper a series of tests is performed to investigate the overall suitability of a high resolution off-the-shelf chromatic white light sensor for the contact-less and non-destructive latent fingerprint acquisition. Our paper focuses on scanning previously determined regions with exemplary acquisition parameter settings. 3D height field and reflection data of five different latent fingerprints on six different types of surfaces (HDD platter, brushed metal, painted car body (metallic and non-metallic finish), blued metal, veneered plywood) are experimentally studied. Pre-processing is performed by removing low-frequency gradients. The quality of the results is assessed subjectively; no automated feature extraction is performed. Additionally, the degradation of the fingerprint during the acquisition period is observed. While the quality of the acquired data is highly dependent on surface structure, the sensor is capable of detecting the fingerprint on all sample surfaces. On blued metal the residual material is detected; however, the ridge line structure dissolves within minutes after fingerprint placement.

  20. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Directory of Open Access Journals (Sweden)

    Jin-Won Park

    2009-01-01

    Full Text Available As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  1. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Science.gov (United States)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  2. Human matching performance of genuine crime scene latent fingerprints.

    Science.gov (United States)

    Thompson, Matthew B; Tangen, Jason M; McCarthy, Duncan J

    2014-02-01

    There has been very little research into the nature and development of fingerprint matching expertise. Here we present the results of an experiment testing the claimed matching expertise of fingerprint examiners. Expert (n = 37), intermediate trainee (n = 8), new trainee (n = 9), and novice (n = 37) participants performed a fingerprint discrimination task involving genuine crime scene latent fingerprints, their matches, and highly similar distractors, in a signal detection paradigm. Results show that qualified, court-practicing fingerprint experts were exceedingly accurate compared with novices. Experts showed a conservative response bias, tending to err on the side of caution by making more errors of the sort that could allow a guilty person to escape detection than errors of the sort that could falsely incriminate an innocent person. The superior performance of experts was not simply a function of their ability to match prints, per se, but a result of their ability to identify the highly similar, but nonmatching fingerprints as such. Comparing these results with previous experiments, experts were even more conservative in their decision making when dealing with these genuine crime scene prints than when dealing with simulated crime scene prints, and this conservatism made them relatively less accurate overall. Intermediate trainees-despite their lack of qualification and average 3.5 years experience-performed about as accurately as qualified experts who had an average 17.5 years experience. New trainees-despite their 5-week, full-time training course or their 6 months experience-were not any better than novices at discriminating matching and similar nonmatching prints, they were just more conservative. Further research is required to determine the precise nature of fingerprint matching expertise and the factors that influence performance. The findings of this representative, lab-based experiment may have implications for the way fingerprint examiners testify in

  3. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  4. Comparing Categorical and Probabilistic Fingerprint Evidence.

    Science.gov (United States)

    Garrett, Brandon; Mitchell, Gregory; Scurich, Nicholas

    2018-04-23

    Fingerprint examiners traditionally express conclusions in categorical terms, opining that impressions do or do not originate from the same source. Recently, probabilistic conclusions have been proposed, with examiners estimating the probability of a match between recovered and known prints. This study presented a nationally representative sample of jury-eligible adults with a hypothetical robbery case in which an examiner opined on the likelihood that a defendant's fingerprints matched latent fingerprints in categorical or probabilistic terms. We studied model language developed by the U.S. Defense Forensic Science Center to summarize results of statistical analysis of the similarity between prints. Participant ratings of the likelihood the defendant left prints at the crime scene and committed the crime were similar when exposed to categorical and strong probabilistic match evidence. Participants reduced these likelihoods when exposed to the weaker probabilistic evidence, but did not otherwise discriminate among the prints assigned different match probabilities. © 2018 American Academy of Forensic Sciences.

  5. Optical Methods in Fingerprint Imaging for Medical and Personality Applications.

    Science.gov (United States)

    Wang, Chia-Nan; Wang, Jing-Wein; Lin, Ming-Hsun; Chang, Yao-Lang; Kuo, Chia-Ming

    2017-10-23

    Over the years, analysis and induction of personality traits has been a topic for individual subjective conjecture or speculation, rather than a focus of inductive scientific analysis. This study proposes a novel framework for analysis and induction of personality traits. First, 14 personality constructs based on the "Big Five" personality factors were developed. Next, a new fingerprint image algorithm was used for classification, and the fingerprints were classified into eight types. The relationship between personality traits and fingerprint type was derived from the results of the questionnaire survey. After comparison of pre-test and post-test results, this study determined the induction ability of personality traits from fingerprint type. Experimental results showed that the left/right thumbprint type of a majority of subjects was left loop/right loop and that the personalities of individuals with this fingerprint type were moderate with no significant differences in the 14 personality constructs.

  6. Enhancement of plant metabolite fingerprinting by machine learning.

    Science.gov (United States)

    Scott, Ian M; Vermeer, Cornelia P; Liakata, Maria; Corol, Delia I; Ward, Jane L; Lin, Wanchang; Johnson, Helen E; Whitehead, Lynne; Kular, Baldeep; Baker, John M; Walsh, Sean; Dave, Anuja; Larson, Tony R; Graham, Ian A; Wang, Trevor L; King, Ross D; Draper, John; Beale, Michael H

    2010-08-01

    Metabolite fingerprinting of Arabidopsis (Arabidopsis thaliana) mutants with known or predicted metabolic lesions was performed by (1)H-nuclear magnetic resonance, Fourier transform infrared, and flow injection electrospray-mass spectrometry. Fingerprinting enabled processing of five times more plants than conventional chromatographic profiling and was competitive for discriminating mutants, other than those affected in only low-abundance metabolites. Despite their rapidity and complexity, fingerprints yielded metabolomic insights (e.g. that effects of single lesions were usually not confined to individual pathways). Among fingerprint techniques, (1)H-nuclear magnetic resonance discriminated the most mutant phenotypes from the wild type and Fourier transform infrared discriminated the fewest. To maximize information from fingerprints, data analysis was crucial. One-third of distinctive phenotypes might have been overlooked had data models been confined to principal component analysis score plots. Among several methods tested, machine learning (ML) algorithms, namely support vector machine or random forest (RF) classifiers, were unsurpassed for phenotype discrimination. Support vector machines were often the best performing classifiers, but RFs yielded some particularly informative measures. First, RFs estimated margins between mutant phenotypes, whose relations could then be visualized by Sammon mapping or hierarchical clustering. Second, RFs provided importance scores for the features within fingerprints that discriminated mutants. These scores correlated with analysis of variance F values (as did Kruskal-Wallis tests, true- and false-positive measures, mutual information, and the Relief feature selection algorithm). ML classifiers, as models trained on one data set to predict another, were ideal for focused metabolomic queries, such as the distinctiveness and consistency of mutant phenotypes. Accessible software for use of ML in plant physiology is highlighted.

  7. Multiple chromatographic fingerprinting and its application to the quality control of herbal medicines

    International Nuclear Information System (INIS)

    Fan Xiaohui; Cheng Yiyu; Ye Zhengliang; Lin Ruichao; Qian Zhongzhi

    2006-01-01

    Recently, chromatographic fingerprinting has become one of the most powerful approaches to quality control of herbal medicines. However, the performance of reported chromatographic fingerprinting constructed by single chromatogram sometimes turns out to be inadequate for complex herbal medicines, such as multi-herb botanical drug products. In this study, multiple chromatographic fingerprinting, which consists of more than one chromatographic fingerprint and represents the whole characteristics of chemical constitutions of the complex medicine, is proposed as a potential strategy in this complicated case. As a typical example, a binary chromatographic fingerprinting of 'Danshen Dropping Pill' (DSDP), the best-sold traditional Chinese medicine in China, was developed. First, two HPLC fingerprints that, respectively, represent chemical characteristics of depsides and saponins of DSDP were developed, which were used to construct binary chromatographic fingerprints of DSDP. Moreover, the authentication and validation of the binary fingerprints were performed. Then, a data-level information fusion method was employed to capture the chemical information encoded in two chromatographic fingerprints. Based on the fusion results, the lot-to-lot consistency and frauds can be determined either using similarity measure or by chemometrics approach. The application of binary chromatographic fingerprinting to consistency assessment and frauds detection of DSDP clearly demonstrated that the proposed method was a powerful approach to quality control of complex herbal medicines

  8. Diversity of DNA fingerprints of Mycobacterium tuberculosis isolates in the United States.

    Science.gov (United States)

    Yang, Z; Barnes, P F; Chaves, F; Eisenach, K D; Weis, S E; Bates, J H; Cave, M D

    1998-04-01

    To investigate the diversity of IS6110 fingerprints of Mycobacterium tuberculosis isolates in the United States and to determine if matching IS6110 fingerprints represent recent interstate tuberculosis transmission, we performed restriction fragment length polymorphism analysis of M. tuberculosis isolates from 1,326 patients in three geographically separated states. Seven hundred ninety-five different IS6110 fingerprint patterns were generated, and pattern diversity was similar in each state. Ninety-six percent of the fingerprint patterns were observed in only one state, demonstrating that most IS6110 fingerprint patterns are confined to a single geographic location. Of the IS6110 fingerprint patterns that were shared by isolates from more than one state, most isolates with 1 to 5 IS6110 copies were separable by pTBN12 fingerprinting whereas those with > 15 copies were not. One high-copy-number M. tuberculosis strain had identical IS6110 and pTBN12 fingerprints and included 57 isolates from three states. Epidemiological data demonstrated significant recent transmission of tuberculosis within each city but not among the states. This suggests that identical fingerprints of isolates from geographically separate locations most likely reflect interstate tuberculosis transmission in the past, with subsequent intrastate spread of disease. Further evaluation of M. tuberculosis strains that cause outbreaks in different geographic locations will provide insight into the epidemiological and bacteriological factors that facilitate the spread of tuberculosis.

  9. Realization on the interactive remote video conference system based on multi-Agent

    Directory of Open Access Journals (Sweden)

    Zheng Yan

    2016-01-01

    Full Text Available To make people at different places participate in the same conference, speak and discuss freely, the interactive remote video conferencing system is designed and realized based on multi-Agent collaboration. FEC (forward error correction and tree P2P technology are firstly used to build a live conference structure to transfer audio and video data; then the branch conference port can participate to speak and discuss through the application of becoming a interactive focus; the introduction of multi-Agent collaboration technology improve the system robustness. The experiments showed that, under normal network conditions, the system can support 350 branch conference node simultaneously to make live broadcasting. The audio and video quality is smooth. It can carry out large-scale remote video conference.

  10. Fast Fingerprint Database Maintenance for Indoor Positioning Based on UGV SLAM

    Directory of Open Access Journals (Sweden)

    Jian Tang

    2015-03-01

    Full Text Available Indoor positioning technology has become more and more important in the last two decades. Utilizing Received Signal Strength Indicator (RSSI fingerprints of Signals of OPportunity (SOP is a promising alternative navigation solution. However, as the RSSIs vary during operation due to their physical nature and are easily affected by the environmental change, one challenge of the indoor fingerprinting method is maintaining the RSSI fingerprint database in a timely and effective manner. In this paper, a solution for rapidly updating the fingerprint database is presented, based on a self-developed Unmanned Ground Vehicles (UGV platform NAVIS. Several SOP sensors were installed on NAVIS for collecting indoor fingerprint information, including a digital compass collecting magnetic field intensity, a light sensor collecting light intensity, and a smartphone which collects the access point number and RSSIs of the pre-installed WiFi network. The NAVIS platform generates a map of the indoor environment and collects the SOPs during processing of the mapping, and then the SOP fingerprint database is interpolated and updated in real time. Field tests were carried out to evaluate the effectiveness and efficiency of the proposed method. The results showed that the fingerprint databases can be quickly created and updated with a higher sampling frequency (5Hz and denser reference points compared with traditional methods, and the indoor map can be generated without prior information. Moreover, environmental changes could also be detected quickly for fingerprint indoor positioning.

  11. Optical Methods in Fingerprint Imaging for Medical and Personality Applications

    Directory of Open Access Journals (Sweden)

    Chia-Nan Wang

    2017-10-01

    Full Text Available Over the years, analysis and induction of personality traits has been a topic for individual subjective conjecture or speculation, rather than a focus of inductive scientific analysis. This study proposes a novel framework for analysis and induction of personality traits. First, 14 personality constructs based on the “Big Five” personality factors were developed. Next, a new fingerprint image algorithm was used for classification, and the fingerprints were classified into eight types. The relationship between personality traits and fingerprint type was derived from the results of the questionnaire survey. After comparison of pre-test and post-test results, this study determined the induction ability of personality traits from fingerprint type. Experimental results showed that the left/right thumbprint type of a majority of subjects was left loop/right loop and that the personalities of individuals with this fingerprint type were moderate with no significant differences in the 14 personality constructs.

  12. [HPLC characteristic fingerprints of sedi linearis herba and sedi herba].

    Science.gov (United States)

    Lu, Lan-Qing; Mei, Qing; Wan, Ding-Rong; Yang, Xin-Zhou; Qiao, Shu; Zhao, Yu-Dan

    2014-04-01

    To study HPLC characteristic fingerprint of Sedum lineare from different harvest periods, and to compare with its related species Sedum sarmentosum. The HPLC fingerprints of Sedum lineare from different collecting periods were established and compared with Sedum sarmentosum by the same detection method. Hyperin, isoquercitrin and astragaloside were identified from the HPLC fingerprint of Sedum lineare. The fingerprint of Sedum lineare growing in the same area but different environment were basically identical; while there were remarkable differences of Sedum lineare growing in the same place but from different harvest periods, with the area of most common peaks changing from little to great, and slightly different peak number. The HPLC fingerprint of the two Sedum species had four common peaks, but could be distinguished from each other. The optimal harvest period of these two species should be full-bloom stage. The established method can provide reference for identification and quality analysis of Sedum lineare.

  13. Identification and Quality Assessment of Chrysanthemum Buds by CE Fingerprinting

    Directory of Open Access Journals (Sweden)

    Xiaoping Xing

    2015-01-01

    Full Text Available A simple and efficient fingerprinting method for chrysanthemum buds was developed with the aim of establishing a quality control protocol based on biochemical makeup. Chrysanthemum bud samples were successively extracted by water and alcohol. The fingerprints of the chrysanthemum buds samples were obtained using capillary electrophoresis and electrochemical detection (CE-ED employing copper and carbon working electrodes to capture all of the chemical information. 10 batches of chrysanthemum buds were collected from different regions and various factories to establish the baseline fingerprint. The experimental data of 10 batches electropherogram buds by CE were analyzed by correlation coefficient and the included angle cosine methods. A standard chrysanthemum bud fingerprint including 24 common peaks was established, 12 from each electrode, which was successfully applied to identify and distinguish between chrysanthemum buds from 2 other chrysanthemum species. These results demonstrate that fingerprint analysis can be used as an important criterion for chrysanthemum buds quality control.

  14. Optical Methods in Fingerprint Imaging for Medical and Personality Applications

    Science.gov (United States)

    Wang, Jing-Wein; Lin, Ming-Hsun; Chang, Yao-Lang; Kuo, Chia-Ming

    2017-01-01

    Over the years, analysis and induction of personality traits has been a topic for individual subjective conjecture or speculation, rather than a focus of inductive scientific analysis. This study proposes a novel framework for analysis and induction of personality traits. First, 14 personality constructs based on the “Big Five” personality factors were developed. Next, a new fingerprint image algorithm was used for classification, and the fingerprints were classified into eight types. The relationship between personality traits and fingerprint type was derived from the results of the questionnaire survey. After comparison of pre-test and post-test results, this study determined the induction ability of personality traits from fingerprint type. Experimental results showed that the left/right thumbprint type of a majority of subjects was left loop/right loop and that the personalities of individuals with this fingerprint type were moderate with no significant differences in the 14 personality constructs. PMID:29065556

  15. A tree based method for the rapid screening of chemical fingerprints

    DEFF Research Database (Denmark)

    Kristensen, Thomas Greve; Nielsen, Jesper; Pedersen, Christian Nørgaard Storm

    2009-01-01

    The fingerprint of a molecule is a bitstring based on its structure, constructed such that structurally similar molecules will have similar fingerprints. Molecular fingerprints can be used in an initial phase for identifying novel drug candidates by screening large databases for molecules......: the kD grid and the Multibit tree. The kD grid is based on splitting the fingerprints into k shorter bitstrings and utilising these to compute bounds on the similarity of the complete bitstrings. The Multibit tree uses hierarchical clustering and similarity within each cluster to compute similar bounds...

  16. Oriented diffusion filtering for enhancing low-quality fingerprint images

    KAUST Repository

    Gottschlich, C.; Schönlieb, C.-B.

    2012-01-01

    To enhance low-quality fingerprint images, we present a novel method that first estimates the local orientation of the fingerprint ridge and valley flow and next performs oriented diffusion filtering, followed by a locally adaptive contrast enhancement step. By applying the authors' new approach to low-quality images of the FVC2004 fingerprint databases, the authors are able to show its competitiveness with other state-of-the-art enhancement methods for fingerprints like curved Gabor filtering. A major advantage of oriented diffusion filtering over those is its computational efficiency. Combining oriented diffusion filtering with curved Gabor filters led to additional improvements and, to the best of the authors' knowledge, the lowest equal error rates achieved so far using MINDTCT and BOZORTH3 on the FVC2004 databases. The recognition performance and the computational efficiency of the method suggest to include oriented diffusion filtering as a standard image enhancement add-on module for real-time fingerprint recognition systems. In order to facilitate the reproduction of these results, an implementation of the oriented diffusion filtering for Matlab and GNU Octave is made available for download. © 2012 The Institution of Engineering and Technology.

  17. Oriented diffusion filtering for enhancing low-quality fingerprint images

    KAUST Repository

    Gottschlich, C.

    2012-01-01

    To enhance low-quality fingerprint images, we present a novel method that first estimates the local orientation of the fingerprint ridge and valley flow and next performs oriented diffusion filtering, followed by a locally adaptive contrast enhancement step. By applying the authors\\' new approach to low-quality images of the FVC2004 fingerprint databases, the authors are able to show its competitiveness with other state-of-the-art enhancement methods for fingerprints like curved Gabor filtering. A major advantage of oriented diffusion filtering over those is its computational efficiency. Combining oriented diffusion filtering with curved Gabor filters led to additional improvements and, to the best of the authors\\' knowledge, the lowest equal error rates achieved so far using MINDTCT and BOZORTH3 on the FVC2004 databases. The recognition performance and the computational efficiency of the method suggest to include oriented diffusion filtering as a standard image enhancement add-on module for real-time fingerprint recognition systems. In order to facilitate the reproduction of these results, an implementation of the oriented diffusion filtering for Matlab and GNU Octave is made available for download. © 2012 The Institution of Engineering and Technology.

  18. Aspects of physicochemical methods for the detection of latent fingerprints

    International Nuclear Information System (INIS)

    Knowles, A.M.

    1978-01-01

    This paper reviews physicochemical methods of detecting latent finger-prints on a wide range of materials commonly found at the scene of a crime, with particular emphasis placed on the newer autoradiographic techniques. This is set against a description of studies on the fundamental nature of the latent fingerprint and its host substrate, with a brief review of the history of reagents used in latent fingerprint examination. (author)

  19. Multiple chromatographic fingerprinting and its application to the quality control of herbal medicines

    Energy Technology Data Exchange (ETDEWEB)

    Fan Xiaohui [Pharmaceutical Informatics Institute, College of Pharmaceutical Sciences, Zhejiang University, Hangzhou 310027 (China); Cheng Yiyu [Pharmaceutical Informatics Institute, College of Pharmaceutical Sciences, Zhejiang University, Hangzhou 310027 (China)]. E-mail: chengyy@zju.edu.cn; Ye Zhengliang [Pharmaceutical Informatics Institute, College of Pharmaceutical Sciences, Zhejiang University, Hangzhou 310027 (China); Lin Ruichao [National Institute for the Control of Pharmaceutical and Biological Products, Beijing 100050 (China); Qian Zhongzhi [Committee of Chinese Pharmacopoeia, Beijing 100061 (China)

    2006-01-12

    Recently, chromatographic fingerprinting has become one of the most powerful approaches to quality control of herbal medicines. However, the performance of reported chromatographic fingerprinting constructed by single chromatogram sometimes turns out to be inadequate for complex herbal medicines, such as multi-herb botanical drug products. In this study, multiple chromatographic fingerprinting, which consists of more than one chromatographic fingerprint and represents the whole characteristics of chemical constitutions of the complex medicine, is proposed as a potential strategy in this complicated case. As a typical example, a binary chromatographic fingerprinting of 'Danshen Dropping Pill' (DSDP), the best-sold traditional Chinese medicine in China, was developed. First, two HPLC fingerprints that, respectively, represent chemical characteristics of depsides and saponins of DSDP were developed, which were used to construct binary chromatographic fingerprints of DSDP. Moreover, the authentication and validation of the binary fingerprints were performed. Then, a data-level information fusion method was employed to capture the chemical information encoded in two chromatographic fingerprints. Based on the fusion results, the lot-to-lot consistency and frauds can be determined either using similarity measure or by chemometrics approach. The application of binary chromatographic fingerprinting to consistency assessment and frauds detection of DSDP clearly demonstrated that the proposed method was a powerful approach to quality control of complex herbal medicines.

  20. Scorebox extraction from mobile sports videos using Support Vector Machines

    Science.gov (United States)

    Kim, Wonjun; Park, Jimin; Kim, Changick

    2008-08-01

    Scorebox plays an important role in understanding contents of sports videos. However, the tiny scorebox may give the small-display-viewers uncomfortable experience in grasping the game situation. In this paper, we propose a novel framework to extract the scorebox from sports video frames. We first extract candidates by using accumulated intensity and edge information after short learning period. Since there are various types of scoreboxes inserted in sports videos, multiple attributes need to be used for efficient extraction. Based on those attributes, the optimal information gain is computed and top three ranked attributes in terms of information gain are selected as a three-dimensional feature vector for Support Vector Machines (SVM) to distinguish the scorebox from other candidates, such as logos and advertisement boards. The proposed method is tested on various videos of sports games and experimental results show the efficiency and robustness of our proposed method.

  1. A Large-Scale Study of Fingerprint Matching Systems for Sensor Interoperability Problem

    Directory of Open Access Journals (Sweden)

    Helala AlShehri

    2018-03-01

    Full Text Available The fingerprint is a commonly used biometric modality that is widely employed for authentication by law enforcement agencies and commercial applications. The designs of existing fingerprint matching methods are based on the hypothesis that the same sensor is used to capture fingerprints during enrollment and verification. Advances in fingerprint sensor technology have raised the question about the usability of current methods when different sensors are employed for enrollment and verification; this is a fingerprint sensor interoperability problem. To provide insight into this problem and assess the status of state-of-the-art matching methods to tackle this problem, we first analyze the characteristics of fingerprints captured with different sensors, which makes cross-sensor matching a challenging problem. We demonstrate the importance of fingerprint enhancement methods for cross-sensor matching. Finally, we conduct a comparative study of state-of-the-art fingerprint recognition methods and provide insight into their abilities to address this problem. We performed experiments using a public database (FingerPass that contains nine datasets captured with different sensors. We analyzed the effects of different sensors and found that cross-sensor matching performance deteriorates when different sensors are used for enrollment and verification. In view of our analysis, we propose future research directions for this problem.

  2. A Large-Scale Study of Fingerprint Matching Systems for Sensor Interoperability Problem.

    Science.gov (United States)

    AlShehri, Helala; Hussain, Muhammad; AboAlSamh, Hatim; AlZuair, Mansour

    2018-03-28

    The fingerprint is a commonly used biometric modality that is widely employed for authentication by law enforcement agencies and commercial applications. The designs of existing fingerprint matching methods are based on the hypothesis that the same sensor is used to capture fingerprints during enrollment and verification. Advances in fingerprint sensor technology have raised the question about the usability of current methods when different sensors are employed for enrollment and verification; this is a fingerprint sensor interoperability problem. To provide insight into this problem and assess the status of state-of-the-art matching methods to tackle this problem, we first analyze the characteristics of fingerprints captured with different sensors, which makes cross-sensor matching a challenging problem. We demonstrate the importance of fingerprint enhancement methods for cross-sensor matching. Finally, we conduct a comparative study of state-of-the-art fingerprint recognition methods and provide insight into their abilities to address this problem. We performed experiments using a public database (FingerPass) that contains nine datasets captured with different sensors. We analyzed the effects of different sensors and found that cross-sensor matching performance deteriorates when different sensors are used for enrollment and verification. In view of our analysis, we propose future research directions for this problem.

  3. Analysis of cellular and extracellular DNA in fingerprints

    Energy Technology Data Exchange (ETDEWEB)

    Button, Julie M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-09-09

    It has been previously shown that DNA can be recovered from latent fingerprints left on various surfaces [R. A. H. van Oorschot and M. K. Jones, Nature 387, 767 (1997)]. However, the source of the DNA, extracellular versus cellular origin, is difficult to determine. If the DNA is cellular, it is believed to belong to skin cells while extracellular DNA is believed to originate from body fluids such as sweat [D. J. Daly et. al, Forensic Sci. Int. Genet. 6, 41-46 (2012); V. V. Vlassov et. al, BioEssays 29, 654-667 (2007)]. The origin of the DNA in fingerprints has implications for processing and interpretation of forensic evidence. The determination of the origin of DNA in fingerprints is further complicated by the fact that the DNA in fingerprints tends to be at a very low quantity [R. A. H. van Oorschot and M. K. Jones, Nature 387, 767 (1997)]. This study examined fingerprints from five volunteers left on sterilized glass slides and plastic pens. Three fingerprints were left on each glass slide (thumb, index, and middle fingers) while the pens were held as if one was writing with them. The DNA was collected from the objects using the wet swabbing technique (TE buffer). Following collection, the cellular and extracellular components of each sample were separated using centrifugation and an acoustofluidics system. Centrifugation is still the primary separation technique utilized in forensics laboratories, while acoustic focusing uses sound waves to focus large particles (cells) into low pressure nodes, separating them from the rest of the sample matrix. After separation, all samples were quantified using real-time quantitative PCR (qPCR). The overall trend is that there is more DNA in the extracellular fractions than cellular fractions for both centrifugation and acoustofluidic processing. Additionally, more DNA was generally collected from the pen samples than the samples left on glass slides.

  4. Fast probabilistic file fingerprinting for big data.

    Science.gov (United States)

    Tretyakov, Konstantin; Laur, Sven; Smant, Geert; Vilo, Jaak; Prins, Pjotr

    2013-01-01

    Biological data acquisition is raising new challenges, both in data analysis and handling. Not only is it proving hard to analyze the data at the rate it is generated today, but simply reading and transferring data files can be prohibitively slow due to their size. This primarily concerns logistics within and between data centers, but is also important for workstation users in the analysis phase. Common usage patterns, such as comparing and transferring files, are proving computationally expensive and are tying down shared resources. We present an efficient method for calculating file uniqueness for large scientific data files, that takes less computational effort than existing techniques. This method, called Probabilistic Fast File Fingerprinting (PFFF), exploits the variation present in biological data and computes file fingerprints by sampling randomly from the file instead of reading it in full. Consequently, it has a flat performance characteristic, correlated with data variation rather than file size. We demonstrate that probabilistic fingerprinting can be as reliable as existing hashing techniques, with provably negligible risk of collisions. We measure the performance of the algorithm on a number of data storage and access technologies, identifying its strengths as well as limitations. Probabilistic fingerprinting may significantly reduce the use of computational resources when comparing very large files. Utilisation of probabilistic fingerprinting techniques can increase the speed of common file-related workflows, both in the data center and for workbench analysis. The implementation of the algorithm is available as an open-source tool named pfff, as a command-line tool as well as a C library. The tool can be downloaded from http://biit.cs.ut.ee/pfff.

  5. [HPTLC fingerprint analysis of andrographolides from Andrographis paniculata].

    Science.gov (United States)

    Shao, Yan-Hua; Wang, Jian-Gang; Lai, Xiao-Ping; Wu, Xiang-Wei; Ding, Ping

    2014-02-01

    To establish the high-performance thin layer chromatography (HPTLC) fingerprint of andrographolides from Andrographis paniculata, and to valuate the fingerprint similarity of samples from different habitats, markets, used parts and so on. Chromatographic conditions were as follows: stationary phase: precoated HPTLC GF254 silica-gel plate (20 cm x 10 cm); developing solvent system: chloroform-toluene-methanol (80:10:15); Relative humidity: 42%; Color development reagent: 5% H2SO4 ethanolic solution, heating at 105 degrees C and observing the fluorescent chromatogram in a UV cabinet at 366 nm. The common patterns of HPTLC fingerprint were obtained through CHROMAP 1.5 solution software. The HPTLC fingerprint of andrographolides was consisted of 9 characteristic peaks (fluorescent bands) including andrographolide, neoandrographolide and dehydroandrographolide which were chemical reference substances. The investigation and analysis of 51 batches of Andrographis paniculata showed that there were remarkable differences among different samples, so was the content of andrographolide and total lactones. This method is simple and rapid, which can serve as an effective identification and quality assessment method for Andrographis paniculata.

  6. Partial Fingerprint Image Enhancement using Region Division Technique and Morphological Transform

    International Nuclear Information System (INIS)

    Ahmad, A.; Arshad, I.; Raja, G.

    2015-01-01

    Fingerprints are the most renowned biometric trait for identification and verification. The quality of fingerprint image plays a vital role in feature extraction and matching. Existing algorithms work well for good quality fingerprint images and fail for partial fingerprint images as they are obtained from excessively dry fingers or affected by disease resulting in broken ridges. We propose an algorithm to enhance partial fingerprint images using morphological operatins with region division technique. The proposed method divides low quality image into six regions from top to bottom. Morphological operations choose an appropriate Structuring Element (SE) that joins broken ridges and thus enhance the image for further processing. The proposed method uses SE line with suitable angle theta and radius r in each region based on the orientation of the ridges. The algorithm is applied to 14 low quality fingerprint images from FVC-2002 database. Experimental results show that percentage accuracy has been improved using the proposed algorithm. The manual markup has been reduced and accuracy of 76.16% with Equal Error Rate (EER) of 3.16% is achieved. (author)

  7. Dynamic Textures Modeling via Joint Video Dictionary Learning.

    Science.gov (United States)

    Wei, Xian; Li, Yuanxiang; Shen, Hao; Chen, Fang; Kleinsteuber, Martin; Wang, Zhongfeng

    2017-04-06

    Video representation is an important and challenging task in the computer vision community. In this paper, we consider the problem of modeling and classifying video sequences of dynamic scenes which could be modeled in a dynamic textures (DT) framework. At first, we assume that image frames of a moving scene can be modeled as a Markov random process. We propose a sparse coding framework, named joint video dictionary learning (JVDL), to model a video adaptively. By treating the sparse coefficients of image frames over a learned dictionary as the underlying "states", we learn an efficient and robust linear transition matrix between two adjacent frames of sparse events in time series. Hence, a dynamic scene sequence is represented by an appropriate transition matrix associated with a dictionary. In order to ensure the stability of JVDL, we impose several constraints on such transition matrix and dictionary. The developed framework is able to capture the dynamics of a moving scene by exploring both sparse properties and the temporal correlations of consecutive video frames. Moreover, such learned JVDL parameters can be used for various DT applications, such as DT synthesis and recognition. Experimental results demonstrate the strong competitiveness of the proposed JVDL approach in comparison with state-of-the-art video representation methods. Especially, it performs significantly better in dealing with DT synthesis and recognition on heavily corrupted data.

  8. Frequent video game players resist perceptual interference.

    Directory of Open Access Journals (Sweden)

    Aaron V Berard

    Full Text Available Playing certain types of video games for a long time can improve a wide range of mental processes, from visual acuity to cognitive control. Frequent gamers have also displayed generalized improvements in perceptual learning. In the Texture Discrimination Task (TDT, a widely used perceptual learning paradigm, participants report the orientation of a target embedded in a field of lines and demonstrate robust over-night improvement. However, changing the orientation of the background lines midway through TDT training interferes with overnight improvements in overall performance on TDT. Interestingly, prior research has suggested that this effect will not occur if a one-hour break is allowed in between the changes. These results have suggested that after training is over, it may take some time for learning to become stabilized and resilient against interference. Here, we tested whether frequent gamers have faster stabilization of perceptual learning compared to non-gamers and examined the effect of daily video game playing on interference of training of TDT with one background orientation on perceptual learning of TDT with a different background orientation. As a result, we found that non-gamers showed overnight performance improvement only on one background orientation, replicating previous results with the interference in TDT. In contrast, frequent gamers demonstrated overnight improvements in performance with both background orientations, suggesting that they are better able to overcome interference in perceptual learning. This resistance to interference suggests that video game playing not only enhances the amplitude and speed of perceptual learning but also leads to faster and/or more robust stabilization of perceptual learning.

  9. Frequent video game players resist perceptual interference.

    Science.gov (United States)

    Berard, Aaron V; Cain, Matthew S; Watanabe, Takeo; Sasaki, Yuka

    2015-01-01

    Playing certain types of video games for a long time can improve a wide range of mental processes, from visual acuity to cognitive control. Frequent gamers have also displayed generalized improvements in perceptual learning. In the Texture Discrimination Task (TDT), a widely used perceptual learning paradigm, participants report the orientation of a target embedded in a field of lines and demonstrate robust over-night improvement. However, changing the orientation of the background lines midway through TDT training interferes with overnight improvements in overall performance on TDT. Interestingly, prior research has suggested that this effect will not occur if a one-hour break is allowed in between the changes. These results have suggested that after training is over, it may take some time for learning to become stabilized and resilient against interference. Here, we tested whether frequent gamers have faster stabilization of perceptual learning compared to non-gamers and examined the effect of daily video game playing on interference of training of TDT with one background orientation on perceptual learning of TDT with a different background orientation. As a result, we found that non-gamers showed overnight performance improvement only on one background orientation, replicating previous results with the interference in TDT. In contrast, frequent gamers demonstrated overnight improvements in performance with both background orientations, suggesting that they are better able to overcome interference in perceptual learning. This resistance to interference suggests that video game playing not only enhances the amplitude and speed of perceptual learning but also leads to faster and/or more robust stabilization of perceptual learning.

  10. Video Multiple Watermarking Technique Based on Image Interlacing Using DWT

    Directory of Open Access Journals (Sweden)

    Mohamed M. Ibrahim

    2014-01-01

    Full Text Available Digital watermarking is one of the important techniques to secure digital media files in the domains of data authentication and copyright protection. In the nonblind watermarking systems, the need of the original host file in the watermark recovery operation makes an overhead over the system resources, doubles memory capacity, and doubles communications bandwidth. In this paper, a robust video multiple watermarking technique is proposed to solve this problem. This technique is based on image interlacing. In this technique, three-level discrete wavelet transform (DWT is used as a watermark embedding/extracting domain, Arnold transform is used as a watermark encryption/decryption method, and different types of media (gray image, color image, and video are used as watermarks. The robustness of this technique is tested by applying different types of attacks such as: geometric, noising, format-compression, and image-processing attacks. The simulation results show the effectiveness and good performance of the proposed technique in saving system resources, memory capacity, and communications bandwidth.

  11. Video multiple watermarking technique based on image interlacing using DWT.

    Science.gov (United States)

    Ibrahim, Mohamed M; Abdel Kader, Neamat S; Zorkany, M

    2014-01-01

    Digital watermarking is one of the important techniques to secure digital media files in the domains of data authentication and copyright protection. In the nonblind watermarking systems, the need of the original host file in the watermark recovery operation makes an overhead over the system resources, doubles memory capacity, and doubles communications bandwidth. In this paper, a robust video multiple watermarking technique is proposed to solve this problem. This technique is based on image interlacing. In this technique, three-level discrete wavelet transform (DWT) is used as a watermark embedding/extracting domain, Arnold transform is used as a watermark encryption/decryption method, and different types of media (gray image, color image, and video) are used as watermarks. The robustness of this technique is tested by applying different types of attacks such as: geometric, noising, format-compression, and image-processing attacks. The simulation results show the effectiveness and good performance of the proposed technique in saving system resources, memory capacity, and communications bandwidth.

  12. A robust human face detection algorithm

    Science.gov (United States)

    Raviteja, Thaluru; Karanam, Srikrishna; Yeduguru, Dinesh Reddy V.

    2012-01-01

    Human face detection plays a vital role in many applications like video surveillance, managing a face image database, human computer interface among others. This paper proposes a robust algorithm for face detection in still color images that works well even in a crowded environment. The algorithm uses conjunction of skin color histogram, morphological processing and geometrical analysis for detecting human faces. To reinforce the accuracy of face detection, we further identify mouth and eye regions to establish the presence/absence of face in a particular region of interest.

  13. Novel fingerprint re-alignment solution that uses the TFCP as a reference

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-08-01

    Full Text Available , independent, and efficient for all types of fingerprints. It, in particular, is useful when dealing with the type of fingerprints that belong to the Plain Arch (PA) fingerprint class. The credibility of this proposed solution is interrogated through its...

  14. Laser speckle decorrelation for fingerprint acquisition

    International Nuclear Information System (INIS)

    Schirripa Spagnolo, Giuseppe; Cozzella, Lorenzo

    2012-01-01

    Biometry is gaining popularity as a physical security approach in situations where a high level of security is necessary. Currently, biometric solutions are embedded in a very large and heterogeneous group of applications. One of the most sensible is for airport security access to boarding gates. More airports are introducing biometric solutions based on face, fingerprint or iris recognition for passenger identification. In particular, fingerprints are the most widely used biometric, and they are mandatorily included in electronic identification documents. One important issue, which is difficult to address in traditional fingerprint acquisition systems, is preventing contact between subsequent users; sebum, which can be a potential vector for contagious diseases. Currently, non-contact devices are used to overcome this problem. In this paper, a new contact device based on laser speckle decorrelation is presented. Our system has the advantage of being compact and low-cost compared with an actual contactless system, allowing enhancement of the sebum pattern imaging contrast in a simple and low-cost way. Furthermore, it avoids the spreading of contagious diseases. (paper)

  15. Efficient and Secure Fingerprint Verification for Embedded Devices

    Directory of Open Access Journals (Sweden)

    Sakiyama Kazuo

    2006-01-01

    Full Text Available This paper describes a secure and memory-efficient embedded fingerprint verification system. It shows how a fingerprint verification module originally developed to run on a workstation can be transformed and optimized in a systematic way to run real-time on an embedded device with limited memory and computation power. A complete fingerprint recognition module is a complex application that requires in the order of 1000 M unoptimized floating-point instruction cycles. The goal is to run both the minutiae extraction and the matching engines on a small embedded processor, in our case a 50 MHz LEON-2 softcore. It does require optimization and acceleration techniques at each design step. In order to speed up the fingerprint signal processing phase, we propose acceleration techniques at the algorithm level, at the software level to reduce the execution cycle number, and at the hardware level to distribute the system work load. Thirdly, a memory trace map-based memory reduction strategy is used for lowering the system memory requirement. Lastly, at the hardware level, it requires the development of specialized coprocessors. As results of these optimizations, we achieve a 65% reduction on the execution time and a 67% reduction on the memory storage requirement for the minutiae extraction process, compared against the reference implementation. The complete operation, that is, fingerprint capture, feature extraction, and matching, can be done in real-time of less than 4 seconds

  16. Piezoelectric micromachined ultrasonic transducers for fingerprint sensing

    Science.gov (United States)

    Lu, Yipeng

    Fingerprint identification is the most prevalent biometric technology due to its uniqueness, universality and convenience. Over the past two decades, a variety of physical mechanisms have been exploited to capture an electronic image of a human fingerprint. Among these, capacitive fingerprint sensors are the ones most widely used in consumer electronics because they are fabricated using conventional complementary metal oxide semiconductor (CMOS) integrated circuit technology. However, capacitive fingerprint sensors are extremely sensitive to finger contamination and moisture. This thesis will introduce an ultrasonic fingerprint sensor using a PMUT array, which offers a potential solution to this problem. In addition, it has the potential to increase security, as it allows images to be collected at various depths beneath the epidermis, providing images of the sub-surface dermis layer and blood vessels. Firstly, PMUT sensitivity is maximized by optimizing the layer stack and electrode design, and the coupling coefficient is doubled via series transduction. Moreover, a broadband PMUT with 97% fractional bandwidth is achieved by utilizing a thinner structure excited at two adjacent mechanical vibration modes with overlapping bandwidth. In addition, we proposed waveguide PMUTs, which function to direct acoustic waves, confine acoustic energy, and provide mechanical protection for the PMUT array. Furthermore, PMUT arrays were fabricated with different processes to form the membrane, including front-side etching with a patterned sacrificial layer, front-side etching with additional anchor, cavity SOI wafers and eutectic bonding. Additionally, eutectic bonding allows the PMUT to be integrated with CMOS circuits. PMUTs were characterized in the mechanical, electrical and acoustic domains. Using transmit beamforming, a narrow acoustic beam was achieved, and high-resolution (sub-100 microm) and short-range (~1 mm) pulse-echo ultrasonic imaging was demonstrated using a steel

  17. Video redaction: a survey and comparison of enabling technologies

    Science.gov (United States)

    Sah, Shagan; Shringi, Ameya; Ptucha, Raymond; Burry, Aaron; Loce, Robert

    2017-09-01

    With the prevalence of video recordings from smart phones, dash cams, body cams, and conventional surveillance cameras, privacy protection has become a major concern, especially in light of legislation such as the Freedom of Information Act. Video redaction is used to obfuscate sensitive and personally identifiable information. Today's typical workflow involves simple detection, tracking, and manual intervention. Automated methods rely on accurate detection mechanisms being paired with robust tracking methods across the video sequence to ensure the redaction of all sensitive information while minimizing spurious obfuscations. Recent studies have explored the use of convolution neural networks and recurrent neural networks for object detection and tracking. The present paper reviews the redaction problem and compares a few state-of-the-art detection, tracking, and obfuscation methods as they relate to redaction. The comparison introduces an evaluation metric that is specific to video redaction performance. The metric can be evaluated in a manner that allows balancing the penalty for false negatives and false positives according to the needs of particular application, thereby assisting in the selection of component methods and their associated hyperparameters such that the redacted video has fewer frames that require manual review.

  18. Ridge Width Correlations between Inked Prints and Powdered Latent Fingerprints.

    Science.gov (United States)

    De Alcaraz-Fossoul, Josep; Barrot-Feixat, Carme; Zapico, Sara C; Mancenido, Michelle; Broatch, Jennifer; Roberts, Katherine A; Carreras-Marin, Clara; Tasker, Jack

    2017-10-03

    A methodology to estimate the time of latent fingerprint deposition would be of great value to law enforcement and courts. It has been observed that ridge topography changes as latent prints age, including the widths of ridges that could be measured as a function of time. Crime suspects are commonly identified using fingerprint databases that contain reference inked tenprints (flat and rolled impressions). These can be of interest in aging studies as they provide baseline information relating to the original (nonaged) ridges' widths. In practice, the age of latent fingerprints could be estimated following a comparison process between the evidentiary aged print and the corresponding reference inked print. The present article explores possible correlations between inked and fresh latent fingerprints deposited on different substrates and visualized with TiO 2 . The results indicate that the ridge width of flat inked prints is most similar to fresh latent fingerprints , and these should be used as the comparison standard for future aging studies. © 2017 American Academy of Forensic Sciences.

  19. Multifragment alleles in DNA fingerprints of the parrot, Amazona ventralis

    Science.gov (United States)

    Brock, M.K.; White, B.N.

    1991-01-01

    Human DNA probes that identify variable numbers of tandem repeat loci are being used to generate DNA fingerprints in many animal and plant species. In most species the majority of the sc rable autoradiographic bands of the DNA fingerprint represent alleles from numerous unlinked loci. This study was initiated to use DNA fingerprints to determine the amount of band-sharing among captive Hispaniolan parrots (Amazona ventralis) with known genetic relationships. This would form the data base to examine DNA fingerprints of the closely related and endangered Puerto Rican parrot (A. vittata) and to estimate the degree of inbreeding in the relic population. We found by segregation analysis of the bands scored in the DNA fingerprints of the Hispaniolan parrots that there may be as few as two to five loci identified by the human 33.15 probe. Furthermore, at one locus we identified seven alleles, one of which is represented by as many as 19 cosegregating bands. It is unknown how common multiband alleles might be in natural populations, and their existence will cause problems in the assessment of relatedness by band-sharing analysis. We believe, therefore, that a pedigree analysis should be included in all DNA fingerprinting studies, where possible, in order to estimate the number of loci identified by a minisatellite DNA probe and to examine the nature of their alleles.

  20. Comparison of Powder Dusting and Cyanoacrylate Fuming Techniques in Retrieving Latent Fingerprint Exposed to Environment Conditions

    International Nuclear Information System (INIS)

    Mayalvanan, Y.; Sri Pawita Albakri Amir Hamzah; Chuan, L.L.; Muhamad Hilmi Baba; Amidon Anan

    2014-01-01

    Latent fingerprints are one of the best evidence to prove the presence of an individuals presence at the crime scene. There are many techniques available for a successful fingerprint lifting. Two of the most common ones are fingerprint powder dusting and cyanoacrylate fuming. This research aims to compare both techniques and determine which has a higher success rate in retrieving fingerprints exposed to local environmental conditions for three days. Fingerprint samples were collected from 18 subjects on glass, perspex and aluminium slides. These samples were then exposed to local environmental conditions for three days. The fingerprints were then developed using the aforementioned techniques. Based on the results, it can be safely said that, fuming results in clearer fingerprints and more minutiae can be found from the retrieved fingerprints even with exposure to less than optimum local conditions. This proves that fuming is a better fingerprint lifting method to resolve latent fingerprint compared to powder dusting. Surface on which the fingerprint is retrieved from influences the quality of clarity of a latent fingerprint. (author)

  1. Quality improvement of fingerprints of decayed corpses by local thanatopractical processing (Thanatoprint

    Directory of Open Access Journals (Sweden)

    Gahr, Britta

    2013-11-01

    Full Text Available Thanatopractical processing allows morphological reconstruction of even advanced decayed bodies. By extracting fluids from the body’s tissue antemortem tenseness and volume can be restored. If bodies are partly subject to thanatopractical processing in the hand region (“Thanatoprint”, fingerprints of high quality can be gathered even in cases of advanced decay. Without this treatment fingerprinting can be extremely difficult, if not impossible. Thanatopractical processing could be applied successfully in cases of partial to subtotal detachment of the epidermis as well. In an interdisciplinary study 400 fingerprints of bodies in various states of decay were examined after application of Thanatoprint. In 76.75% fingerprints were applicable for data entry into AFIS (Automated Fingerprint Identification System; another 11.00% of the fingerprints could be used for the process of non-elimination. Further advantages of the method are low invasivity while maintaining the integrity of the corpse, less time- and material requirement as well as its long-lasting effect.

  2. QIM blind video watermarking scheme based on Wavelet transform and principal component analysis

    Directory of Open Access Journals (Sweden)

    Nisreen I. Yassin

    2014-12-01

    Full Text Available In this paper, a blind scheme for digital video watermarking is proposed. The security of the scheme is established by using one secret key in the retrieval of the watermark. Discrete Wavelet Transform (DWT is applied on each video frame decomposing it into a number of sub-bands. Maximum entropy blocks are selected and transformed using Principal Component Analysis (PCA. Quantization Index Modulation (QIM is used to quantize the maximum coefficient of the PCA blocks of each sub-band. Then, the watermark is embedded into the selected suitable quantizer values. The proposed scheme is tested using a number of video sequences. Experimental results show high imperceptibility. The computed average PSNR exceeds 45 dB. Finally, the scheme is applied on two medical videos. The proposed scheme shows high robustness against several attacks such as JPEG coding, Gaussian noise addition, histogram equalization, gamma correction, and contrast adjustment in both cases of regular videos and medical videos.

  3. A preliminary study of DTI Fingerprinting on stroke analysis.

    Science.gov (United States)

    Ma, Heather T; Ye, Chenfei; Wu, Jun; Yang, Pengfei; Chen, Xuhui; Yang, Zhengyi; Ma, Jingbo

    2014-01-01

    DTI (Diffusion Tensor Imaging) is a well-known MRI (Magnetic Resonance Imaging) technique which provides useful structural information about human brain. However, the quantitative measurement to physiological variation of subtypes of ischemic stroke is not available. An automatically quantitative method for DTI analysis will enhance the DTI application in clinics. In this study, we proposed a DTI Fingerprinting technology to quantitatively analyze white matter tissue, which was applied in stroke classification. The TBSS (Tract Based Spatial Statistics) method was employed to generate mask automatically. To evaluate the clustering performance of the automatic method, lesion ROI (Region of Interest) is manually drawn on the DWI images as a reference. The results from the DTI Fingerprinting were compared with those obtained from the reference ROIs. It indicates that the DTI Fingerprinting could identify different states of ischemic stroke and has promising potential to provide a more comprehensive measure of the DTI data. Further development should be carried out to improve DTI Fingerprinting technology in clinics.

  4. Transparent Fingerprint Sensor System for Large Flat Panel Display.

    Science.gov (United States)

    Seo, Wonkuk; Pi, Jae-Eun; Cho, Sung Haeung; Kang, Seung-Youl; Ahn, Seong-Deok; Hwang, Chi-Sun; Jeon, Ho-Sik; Kim, Jong-Uk; Lee, Myunghee

    2018-01-19

    In this paper, we introduce a transparent fingerprint sensing system using a thin film transistor (TFT) sensor panel, based on a self-capacitive sensing scheme. An armorphousindium gallium zinc oxide (a-IGZO) TFT sensor array and associated custom Read-Out IC (ROIC) are implemented for the system. The sensor panel has a 200 × 200 pixel array and each pixel size is as small as 50 μm × 50 μm. The ROIC uses only eight analog front-end (AFE) amplifier stages along with a successive approximation analog-to-digital converter (SAR ADC). To get the fingerprint image data from the sensor array, the ROIC senses a capacitance, which is formed by a cover glass material between a human finger and an electrode of each pixel of the sensor array. Three methods are reviewed for estimating the self-capacitance. The measurement result demonstrates that the transparent fingerprint sensor system has an ability to differentiate a human finger's ridges and valleys through the fingerprint sensor array.

  5. Examination of Zinc Oxide Nanoparticles as a Fluorescent Fingerprint Detection Powder

    International Nuclear Information System (INIS)

    Tun Tun Lin

    2010-12-01

    Detection of latent fingerprint was performed using zinc oxide nanoparticles which were produced by simple and efficient method in aqueous media from zinc nitrate. Synthesized ZnO nanoparticles were characterized by XRD, SEM and AFM for ZnO purification and particle size examination. In this paper an effort has been made to compare the results of using ZnO nanoparticles and conventional fingerprint powders such as ZnO bulk powder, CaO, TiO2, printer toner powder and graphite. Fingerprints on different materials were also examined by the use of ZnO and Graphite powder, which is currently used in the Central Intelligence Department of Myanmar Police Force.From this research, it was observed that zinc oxide nanoparticles powder produced a much clearer picture of the fingerprints, compared to conventional powders and it has very good quality at sticking to the fingerprint residue but not to the background surface.

  6. dna and seed proteins fingerprinting of egyptian crop plants

    African Journals Online (AJOL)

    Dr. Haddad

    2012-11-01

    Nov 1, 2012 ... combinations were used for fingerprinting six cultivars which belongs to barley, rice and wheat cultivars leading to the production of numerous AFLP bands, 300 of them were polymorphic. Thirty SSR markers were obtained from fingerprinting eight cultivars belonging to the five studied species using 11.

  7. DNA fingerprinting in botany: past, present, future

    OpenAIRE

    Nybom, Hilde; Weising, Kurt; Rotter, Björn

    2014-01-01

    Almost three decades ago Alec Jeffreys published his seminal Nature papers on the use of minisatellite probes for DNA fingerprinting of humans (Jeffreys and colleagues Nature 1985, 314:67–73 and Nature 1985, 316:76–79). The new technology was soon adopted for many other organisms including plants, and when Hilde Nybom, Kurt Weising and Alec Jeffreys first met at the very First International Conference on DNA Fingerprinting in Berne, Switzerland, in 1990, everybody was enthusiastic about the n...

  8. Accessible biometrics: A frustrated total internal reflection approach to imaging fingerprints.

    Science.gov (United States)

    Smith, Nathan D; Sharp, James S

    2017-05-01

    Fingerprints are widely used as a means of identifying persons of interest because of the highly individual nature of the spatial distribution and types of features (or minuta) found on the surface of a finger. This individuality has led to their wide application in the comparison of fingerprints found at crime scenes with those taken from known offenders and suspects in custody. However, despite recent advances in machine vision technology and image processing techniques, fingerprint evidence is still widely being collected using outdated practices involving ink and paper - a process that can be both time consuming and expensive. Reduction of forensic service budgets increasingly requires that evidence be gathered and processed more rapidly and efficiently. However, many of the existing digital fingerprint acquisition devices have proven too expensive to roll out on a large scale. As a result new, low-cost imaging technologies are required to increase the quality and throughput of the processing of fingerprint evidence. Here we describe an inexpensive approach to digital fingerprint acquisition that is based upon frustrated total internal reflection imaging. The quality and resolution of the images produced are shown to be as good as those currently acquired using ink and paper based methods. The same imaging technique is also shown to be capable of imaging powdered fingerprints that have been lifted from a crime scene using adhesive tape or gel lifters. Copyright © 2017 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.

  9. Solving the Mystery of Fading Fingerprints with London Dispersion Forces.

    Science.gov (United States)

    Kimbrough, Doris R.; DeLorenzo, Ronald

    1998-01-01

    Focuses on the kidnapping of a child whose fingerprints were not found inside the crime vehicle. Discusses the investigation that followed and led to knowledge of the differences between the fingerprints of children and adults. (DDR)

  10. FPGA-Based Real-Time Motion Detection for Automated Video Surveillance Systems

    Directory of Open Access Journals (Sweden)

    Sanjay Singh

    2016-03-01

    Full Text Available Design of automated video surveillance systems is one of the exigent missions in computer vision community because of their ability to automatically select frames of interest in incoming video streams based on motion detection. This research paper focuses on the real-time hardware implementation of a motion detection algorithm for such vision based automated surveillance systems. A dedicated VLSI architecture has been proposed and designed for clustering-based motion detection scheme. The working prototype of a complete standalone automated video surveillance system, including input camera interface, designed motion detection VLSI architecture, and output display interface, with real-time relevant motion detection capabilities, has been implemented on Xilinx ML510 (Virtex-5 FX130T FPGA platform. The prototyped system robustly detects the relevant motion in real-time in live PAL (720 × 576 resolution video streams directly coming from the camera.

  11. Functional connectome fingerprinting: identifying individuals using patterns of brain connectivity.

    Science.gov (United States)

    Finn, Emily S; Shen, Xilin; Scheinost, Dustin; Rosenberg, Monica D; Huang, Jessica; Chun, Marvin M; Papademetris, Xenophon; Constable, R Todd

    2015-11-01

    Functional magnetic resonance imaging (fMRI) studies typically collapse data from many subjects, but brain functional organization varies between individuals. Here we establish that this individual variability is both robust and reliable, using data from the Human Connectome Project to demonstrate that functional connectivity profiles act as a 'fingerprint' that can accurately identify subjects from a large group. Identification was successful across scan sessions and even between task and rest conditions, indicating that an individual's connectivity profile is intrinsic, and can be used to distinguish that individual regardless of how the brain is engaged during imaging. Characteristic connectivity patterns were distributed throughout the brain, but the frontoparietal network emerged as most distinctive. Furthermore, we show that connectivity profiles predict levels of fluid intelligence: the same networks that were most discriminating of individuals were also most predictive of cognitive behavior. Results indicate the potential to draw inferences about single subjects on the basis of functional connectivity fMRI.

  12. Spectrum-effect relationship between HPLC fingerprints and hypolipidemic effect of Curcuma aromatica.

    Science.gov (United States)

    Liu, Meiqiong; Wu, Youjiao; Huang, Shushi; Liu, Huagang; Feng, Jie

    2018-02-23

    Curcuma aromatica is used as a traditional Chinese medicine, and it is mainly distributed in Guangxi, China. In this study, 10 batches of C. aromatica were collected from different origins in Guangxi. The fingerprints were established by HPLC technique to investigate the quality stability of C. aromatica. The spectrum-effect relationship between HPLC fingerprints and hypolipidemic effect of C. aromatica was assessed by similarity analysis, gray relational analysis and multiple linear regression analysis. From the results, the similarity values between each batch of C. aromatica and reference fingerprint were >0.880, indicating the good quality stability of the 10 batches of C. aromatica. Twenty common peaks were selected as the fingerprints to evaluate the quality and hypolipidemic effect of C. aromatica. The results of spectrum-effect relationship showed that peaks 10, 18, 13, 15 and 17 in the fingerprints were closely related to hypolipidemic effect. This study successfully established the spectrum-effect relationship between HPLC fingerprints and hypolipidemic effect of C. aromatica, which provided methods for quality control and more effectively studies on bioactive compounds of C. aromatica. It could also provide a new simple and effective method for utilizing the fingerprints to optimize the Chinese prescription and develop traditional Chinese medicine. Copyright © 2018 John Wiley & Sons, Ltd.

  13. A Modified Electrostatic Adsorption Apparatus for Latent Fingerprint Development on Unfired Cartridge Cases.

    Science.gov (United States)

    Xu, Jingyang; Zhang, Ziyuan; Zheng, Xiaochun; Bond, John W

    2017-05-01

    Visualization of latent fingerprints on metallic surfaces by the method of applying electrostatic charging and adsorption is considered as a promising chemical-free method, which has the merit of nondestruction, and is considered to be effective for some difficult situations such as aged fingerprint deposits or those exposed to environmental extremes. In fact, a portable electrostatic generator can be easily accessible in a local forensic technology laboratory, which is already widely used in the visualization of footwear impressions. In this study, a modified version of this electrostatic apparatus is proposed for latent fingerprint development and has shown great potential in visualizing fingerprints on metallic surfaces such as cartridge cases. Results indicate that this experimental arrangement can successfully develop aged latent fingerprints on metal surfaces, and we demonstrate its effectiveness compared with existing conventional fingerprint recovery methods. © 2016 American Academy of Forensic Sciences.

  14. Self-Organizing Maps for Fingerprint Image Quality Assessment

    DEFF Research Database (Denmark)

    Olsen, Martin Aastrup; Tabassi, Elham; Makarov, Anton

    2013-01-01

    Fingerprint quality assessment is a crucial task which needs to be conducted accurately in various phases in the biometric enrolment and recognition processes. Neglecting quality measurement will adversely impact accuracy and efficiency of biometric recognition systems (e.g. verification and iden......Fingerprint quality assessment is a crucial task which needs to be conducted accurately in various phases in the biometric enrolment and recognition processes. Neglecting quality measurement will adversely impact accuracy and efficiency of biometric recognition systems (e.g. verification...... machine learning techniques. We train a self-organizing map (SOM) to cluster blocks of fingerprint images based on their spatial information content. The output of the SOM is a high-level representation of the finger image, which forms the input to a Random Forest trained to learn the relationship between...

  15. Detecting anthropogenic climate change with an optimal fingerprint method

    International Nuclear Information System (INIS)

    Hegerl, G.C.; Storch, H. von; Hasselmann, K.; Santer, B.D.; Jones, P.D.

    1994-01-01

    We propose a general fingerprint strategy to detect anthropogenic climate change and present application to near surface temperature trends. An expected time-space-variable pattern of anthropogenic climate change (the 'signal') is identified through application of an appropriate optimally matched space-time filter (the 'fingerprint') to the observations. The signal and the fingerprint are represented in a space with sufficient observed and simulated data. The signal pattern is derived from a model-generated prediction of anthropogenic climate change. Application of the fingerprint filter to the data yields a scalar detection variable. The statistically optimal fingerprint is obtained by weighting the model-predicted pattern towards low-noise directions. A combination of model output and observations is used to estimate the noise characteristics of the detection variable, arising from the natural variability of climate in the absence of external forcing. We test then the null hypothesis that the observed climate change is part of natural climate variability. We conclude that a statistically significant externally induced warming has been observed, with the caveat of a possibly inadequate estimate of the internal climate variability. In order to attribute this warming uniquely to anthropogenic greenhouse gas forcing, more information on the climate's response to other forcing mechanisms (e.g. changes in solar radiation, volcanic or anthropogenic aerosols) and their interaction is needed. (orig./KW)

  16. Establishment and application of milk fingerprint by gel filtration chromatography.

    Science.gov (United States)

    Gao, P; Li, J; Li, Z; Hao, J; Zan, L

    2016-12-01

    Raw milk adulteration frequently occurs in undeveloped countries. It not only reduces the nutritional value of milk, but it is also harmful to consumers. In this paper, we focused on investigating an efficient method for the quality control of raw milk protein. A gel filtration chromatography (GFC) fingerprint method combined with chemometrics was developed for fingerprint analysis of raw milk. To optimize the GFC conditions, milk fat was removed by centrifugation, and GFC analysis was performed on a Superdex 75 10/300GL column (Just Scientific, Shanghai, China) with 0.2 M NaH 2 PO 4 -Na 2 HPO 4 buffer (pH 7.0) as the mobile phase. The flow rate was 0.5mL/min, and the detection wavelength was set at 280 nm. Ten batches of 120 raw milk samples were analyzed to establish the GFC fingerprint under optimal conditions. Six major peaks common to the chromatogram of each raw milk sample were selected for fingerprint analysis, and the characteristic peaks were used to establish a standard chromatographic fingerprint. Principal component analysis was then applied to classify GFC information of adulterated milk and raw milk, allowing adulterated samples to be effectively screened out from the raw milk in principal component analysis scores plot. The fingerprint method demonstrates promising features in detecting milk protein adulteration. Copyright © 2016 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  17. Polarization-based and specular-reflection-based noncontact latent fingerprint imaging and lifting

    Science.gov (United States)

    Lin, Shih-Schön; Yemelyanov, Konstantin M.; Pugh, Edward N., Jr.; Engheta, Nader

    2006-09-01

    In forensic science the finger marks left unintentionally by people at a crime scene are referred to as latent fingerprints. Most existing techniques to detect and lift latent fingerprints require application of a certain material directly onto the exhibit. The chemical and physical processing applied to the fingerprint potentially degrades or prevents further forensic testing on the same evidence sample. Many existing methods also have deleterious side effects. We introduce a method to detect and extract latent fingerprint images without applying any powder or chemicals on the object. Our method is based on the optical phenomena of polarization and specular reflection together with the physiology of fingerprint formation. The recovered image quality is comparable to existing methods. In some cases, such as the sticky side of tape, our method shows unique advantages.

  18. Ubiquity of Wi-Fi: Crowdsensing Properties for Urban Fingerprint Positioning

    Directory of Open Access Journals (Sweden)

    LECA, C. L.

    2017-11-01

    Full Text Available Positioning systems based on location fingerprinting have become an area of intense research, mainly with the aim of providing indoor localization. Many challenges arise when trying to deploy location fingerprinting to an outdoor environment. The main problem is achieving coverage of large outdoor spaces, which needs an intensive data gathering effort. This paper proposes the use of mobile crowdsensing in order to build a fingerprint database consisting of Wi-Fi networks received signal strength measurements. Mobile crowdsensing is represented by the usage of smart-phones equipped with GPS and Wi-Fi sensors for the collection of fingerprints. The primary objective of this work is to prove the feasibility of urban positioning using Wi-Fi crowdsensed data by showing that Wi-Fi networks are ubiquitous in urban areas. We then examine the gathered data and report our findings on challenges in building and maintaining a large-scale fingerprint database, the influence of the data collection method on the Wi-Fi data and the influence of fading on measurements. As Wi-Fi access-points are shown to exhibit mobility, we also propose and analyze methods for detecting and classification of mobile and static access-points.

  19. Accommodating error analysis in comparison and clustering of molecular fingerprints.

    Science.gov (United States)

    Salamon, H; Segal, M R; Ponce de Leon, A; Small, P M

    1998-01-01

    Molecular epidemiologic studies of infectious diseases rely on pathogen genotype comparisons, which usually yield patterns comprising sets of DNA fragments (DNA fingerprints). We use a highly developed genotyping system, IS6110-based restriction fragment length polymorphism analysis of Mycobacterium tuberculosis, to develop a computational method that automates comparison of large numbers of fingerprints. Because error in fragment length measurements is proportional to fragment length and is positively correlated for fragments within a lane, an align-and-count method that compensates for relative scaling of lanes reliably counts matching fragments between lanes. Results of a two-step method we developed to cluster identical fingerprints agree closely with 5 years of computer-assisted visual matching among 1,335 M. tuberculosis fingerprints. Fully documented and validated methods of automated comparison and clustering will greatly expand the scope of molecular epidemiology.

  20. Real-time CT-video registration for continuous endoscopic guidance

    Science.gov (United States)

    Merritt, Scott A.; Rai, Lav; Higgins, William E.

    2006-03-01

    Previous research has shown that CT-image-based guidance could be useful for the bronchoscopic assessment of lung cancer. This research drew upon the registration of bronchoscopic video images to CT-based endoluminal renderings of the airway tree. The proposed methods either were restricted to discrete single-frame registration, which took several seconds to complete, or required non-real-time buffering and processing of video sequences. We have devised a fast 2D/3D image registration method that performs single-frame CT-Video registration in under 1/15th of a second. This allows the method to be used for real-time registration at full video frame rates without significantly altering the physician's behavior. The method achieves its speed through a gradient-based optimization method that allows most of the computation to be performed off-line. During live registration, the optimization iteratively steps toward the locally optimal viewpoint at which a CT-based endoluminal view is most similar to a current bronchoscopic video frame. After an initial registration to begin the process (generally done in the trachea for bronchoscopy), subsequent registrations are performed in real-time on each incoming video frame. As each new bronchoscopic video frame becomes available, the current optimization is initialized using the previous frame's optimization result, allowing continuous guidance to proceed without manual re-initialization. Tests were performed using both synthetic and pre-recorded bronchoscopic video. The results show that the method is robust to initialization errors, that registration accuracy is high, and that continuous registration can proceed on real-time video at >15 frames per sec. with minimal user-intervention.

  1. Recognition of Activities of Daily Living Based on Environmental Analyses Using Audio Fingerprinting Techniques: A Systematic Review

    Directory of Open Access Journals (Sweden)

    Ivan Miguel Pires

    2018-01-01

    Full Text Available An increase in the accuracy of identification of Activities of Daily Living (ADL is very important for different goals of Enhanced Living Environments and for Ambient Assisted Living (AAL tasks. This increase may be achieved through identification of the surrounding environment. Although this is usually used to identify the location, ADL recognition can be improved with the identification of the sound in that particular environment. This paper reviews audio fingerprinting techniques that can be used with the acoustic data acquired from mobile devices. A comprehensive literature search was conducted in order to identify relevant English language works aimed at the identification of the environment of ADLs using data acquired with mobile devices, published between 2002 and 2017. In total, 40 studies were analyzed and selected from 115 citations. The results highlight several audio fingerprinting techniques, including Modified discrete cosine transform (MDCT, Mel-frequency cepstrum coefficients (MFCC, Principal Component Analysis (PCA, Fast Fourier Transform (FFT, Gaussian mixture models (GMM, likelihood estimation, logarithmic moduled complex lapped transform (LMCLT, support vector machine (SVM, constant Q transform (CQT, symmetric pairwise boosting (SPB, Philips robust hash (PRH, linear discriminant analysis (LDA and discrete cosine transform (DCT.

  2. Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun; Munk, Carsten Valdemar

    2008-01-01

    records fingerprints as signal-strength ratios between pairs of base stations instead of absolute signal-strength values. The proposed solution has been evaluated by extending two well-known location fingerprinting techniques to hyperbolic location fingerprinting. The extended techniques have been tested...

  3. Fingerprint Recognition using Fuzzy Logic with Triangular Pattern Template

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar

    2006-01-01

    A fingerprint is a pattern of ridges and valleys that exist on the surface of the finger. The uniqueness of a fingerprint is typically determined by the overall pattern of ridges and valleys as well as the local ridge structures e.g., a ridge bifurcation or a ridge ending, which are called minutiae...

  4. Zone-based RSS Reporting for Location Fingerprinting

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun; Treu, Georg; Linnhoff–Popien, Claudia

    2007-01-01

    In typical location fingerprinting systems a tracked terminal reports sampled Received Signal Strength (RSS) values to a location server, which estimates its position based on a database of pre-recorded RSS fingerprints. So far, poll-based and periodic RSS reporting has been proposed. However......, for supporting proactive Location-based Services (LBSs), triggered by pre-defined spatial events, the periodic protocol is inefficient. Hence, this paper introduces zone-based RSS reporting: the location server translates geographical zones defined by the LBS into RSS-based representations, which are dynamically...

  5. Extracting valley-ridge lines from point-cloud-based 3D fingerprint models.

    Science.gov (United States)

    Pang, Xufang; Song, Zhan; Xie, Wuyuan

    2013-01-01

    3D fingerprinting is an emerging technology with the distinct advantage of touchless operation. More important, 3D fingerprint models contain more biometric information than traditional 2D fingerprint images. However, current approaches to fingerprint feature detection usually must transform the 3D models to a 2D space through unwrapping or other methods, which might introduce distortions. A new approach directly extracts valley-ridge features from point-cloud-based 3D fingerprint models. It first applies the moving least-squares method to fit a local paraboloid surface and represent the local point cloud area. It then computes the local surface's curvatures and curvature tensors to facilitate detection of the potential valley and ridge points. The approach projects those points to the most likely valley-ridge lines, using statistical means such as covariance analysis and cross correlation. To finally extract the valley-ridge lines, it grows the polylines that approximate the projected feature points and removes the perturbations between the sampled points. Experiments with different 3D fingerprint models demonstrate this approach's feasibility and performance.

  6. Error and Congestion Resilient Video Streaming over Broadband Wireless

    Directory of Open Access Journals (Sweden)

    Laith Al-Jobouri

    2015-04-01

    Full Text Available In this paper, error resilience is achieved by adaptive, application-layer rateless channel coding, which is used to protect H.264/Advanced Video Coding (AVC codec data-partitioned videos. A packetization strategy is an effective tool to control error rates and, in the paper, source-coded data partitioning serves to allocate smaller packets to more important compressed video data. The scheme for doing this is applied to real-time streaming across a broadband wireless link. The advantages of rateless code rate adaptivity are then demonstrated in the paper. Because the data partitions of a video slice are each assigned to different network packets, in congestion-prone wireless networks the increased number of packets per slice and their size disparity may increase the packet loss rate from buffer overflows. As a form of congestion resilience, this paper recommends packet-size dependent scheduling as a relatively simple way of alleviating the buffer-overflow problem arising from data-partitioned packets. The paper also contributes an analysis of data partitioning and packet sizes as a prelude to considering scheduling regimes. The combination of adaptive channel coding and prioritized packetization for error resilience with packet-size dependent packet scheduling results in a robust streaming scheme specialized for broadband wireless and real-time streaming applications such as video conferencing, video telephony, and telemedicine.

  7. Distributed video data fusion and mining

    Science.gov (United States)

    Chang, Edward Y.; Wang, Yuan-Fang; Rodoplu, Volkan

    2004-09-01

    This paper presents an event sensing paradigm for intelligent event-analysis in a wireless, ad hoc, multi-camera, video surveillance system. In particilar, we present statistical methods that we have developed to support three aspects of event sensing: 1) energy-efficient, resource-conserving, and robust sensor data fusion and analysis, 2) intelligent event modeling and recognition, and 3) rapid deployment, dynamic configuration, and continuous operation of the camera networks. We outline our preliminary results, and discuss future directions that research might take.

  8. Mid-infrared supercontinuum generation in the fingerprint region

    DEFF Research Database (Denmark)

    Møller, Uffe Visbech; Petersen, Christian Rosenberg; Kubat, Irnis

    The mid-infrared spectral region is of great technical and scientific interest because most molecules display fundamental vibrational absorptions in this region, leaving distinctive spectral fingerprints. Here, we demonstrate experimentally that launching intense ultra-short pulses with a central...... the potential of fibres to emit across the mid-infrared molecular fingerprint region, which is of key importance for applications such as early cancer diagnostics, gas sensing and food quality control....

  9. Graphene Nanopres for DNA Fingerprinting

    Science.gov (United States)

    Ahmed, Towfiq; Balatsky, Alexander V.; Haraldsen, J. T.; Schuller, Ivan K.; di Ventra, M.; Wikfeldt, K. T.

    2013-03-01

    The recent progress in nanopore experiments with transverse current is important for the development of fast, accurate and cheap finger-printing techniques for single nucleotide. Despite its enormous potential for the next generation DNA sequencing technology, the presence of large noise in the temporal spectrum of transverse current remains a big challenge for getting highly accurate interpretation of data. In this paper we present our abinitio calculations, and propose graphene based device for DNA fingerprinting. We calculate transmission current through graphene for each DNA base (A,C,G,T). As shown in our work, a proper time-series analysis of a signal provides a higher quality information in identifying single bio-molecule is translocating through the nanopores. This work is supported by LANL, Nordita, US DOE, AFOSR, and NIH.

  10. Fissile fingerprints

    International Nuclear Information System (INIS)

    Edwards, R.

    1995-01-01

    This article looks at recent research which may allow police and customs officers to detect smuggled weapons-grade plutonium and uranium. Contrary to popular opinion, nuclear materials do not have a nuclear ''fingerprint'' but enough information can be gleaned from sources to confirm what has been learnt from other data. Indeed, two leading nuclear laboratories can look at the same analytical results and draw different conclusions. The case of a lead cylinder seized from a German garage is examined to illustrate the confusion. (UK)

  11. Performance analysis of a hybrid fingerprint extracted from optical coherence tomography fingertip scans

    CSIR Research Space (South Africa)

    Darlow, Luke N

    2016-06-01

    Full Text Available The Hybrid fingerprint is a local-quality-specific blend of the surface and internal fingerprints, extracted from optical coherence tomography scans. Owing to its origin, and the manner in which it is obtained, the Hybrid fingerprint is a high...

  12. Investigation of gamma-ray fingerprint identifying mechanism for the types of radiation sources

    CERN Document Server

    Liu Su Ping; Gu Dang Chang; Gong-Jian; Hao Fan Hua; Hu Guang Chun

    2002-01-01

    Radiation fingerprints sometimes can be used to label and identify the radiation resources. For instance, in a future nuclear reduction treaty that requires verification of irreversible dismantling of reduced nuclear warheads, the radiation fingerprints of nuclear warheads are expected to play a key role in labelling and identifying the reduced warheads. It would promote the development of nuclear warheads deep-cuts verification technologies if authors start right now some investigations on the issues related to the radiation fingerprints. The author dedicated to the investigation of gamma-ray fingerprint identifying mechanism for the types of radiation resources. The purpose of the identifying mechanism investigation is to find a credible way to tell whether any two gamma-ray spectral fingerprints that are under comparison are radiated from the same resource. The authors created the spectrum pattern comparison (SPC) to study the comparability of the two radiation fingerprints. Guided by the principle of SPC,...

  13. The FBI wavelet/scalar quantization standard for gray-scale fingerprint image compression

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, J.N.; Brislawn, C.M. [Los Alamos National Lab., NM (United States); Hopper, T. [Federal Bureau of Investigation, Washington, DC (United States)

    1993-05-01

    The FBI has recently adopted a standard for the compression of digitized 8-bit gray-scale fingerprint images. The standard is based on scalar quantization of a 64-subband discrete wavelet transform decomposition of the images, followed by Huffman coding. Novel features of the algorithm include the use of symmetric boundary conditions for transforming finite-length signals and a subband decomposition tailored for fingerprint images scanned at 500 dpi. The standard is intended for use in conjunction with ANSI/NBS-CLS 1-1993, American National Standard Data Format for the Interchange of Fingerprint Information, and the FBI`s Integrated Automated Fingerprint Identification System.

  14. Transparent Fingerprint Sensor System for Large Flat Panel Display

    Directory of Open Access Journals (Sweden)

    Wonkuk Seo

    2018-01-01

    Full Text Available In this paper, we introduce a transparent fingerprint sensing system using a thin film transistor (TFT sensor panel, based on a self-capacitive sensing scheme. An armorphousindium gallium zinc oxide (a-IGZO TFT sensor array and associated custom Read-Out IC (ROIC are implemented for the system. The sensor panel has a 200 × 200 pixel array and each pixel size is as small as 50 μm × 50 μm. The ROIC uses only eight analog front-end (AFE amplifier stages along with a successive approximation analog-to-digital converter (SAR ADC. To get the fingerprint image data from the sensor array, the ROIC senses a capacitance, which is formed by a cover glass material between a human finger and an electrode of each pixel of the sensor array. Three methods are reviewed for estimating the self-capacitance. The measurement result demonstrates that the transparent fingerprint sensor system has an ability to differentiate a human finger’s ridges and valleys through the fingerprint sensor array.

  15. Finger-vein and fingerprint recognition based on a feature-level fusion method

    Science.gov (United States)

    Yang, Jinfeng; Hong, Bofeng

    2013-07-01

    Multimodal biometrics based on the finger identification is a hot topic in recent years. In this paper, a novel fingerprint-vein based biometric method is proposed to improve the reliability and accuracy of the finger recognition system. First, the second order steerable filters are used here to enhance and extract the minutiae features of the fingerprint (FP) and finger-vein (FV). Second, the texture features of fingerprint and finger-vein are extracted by a bank of Gabor filter. Third, a new triangle-region fusion method is proposed to integrate all the fingerprint and finger-vein features in feature-level. Thus, the fusion features contain both the finger texture-information and the minutiae triangular geometry structure. Finally, experimental results performed on the self-constructed finger-vein and fingerprint databases are shown that the proposed method is reliable and precise in personal identification.

  16. A novel hand-type detection technique with fingerprint sensor

    Science.gov (United States)

    Abe, Narishige; Shinzaki, Takashi

    2013-05-01

    In large-scale biometric authentication systems such as the US-Visit (USA), a 10-fingerprints scanner which simultaneously captures four fingerprints is used. In traditional systems, specific hand-types (left or right) are indicated, but it is difficult to detect hand-type due to the hand rotation and the opening and closing of fingers. In this paper, we evaluated features that were extracted from hand images (which were captured by a general optical scanner) that are considered to be effective for detecting hand-type. Furthermore, we extended the knowledge to real fingerprint images, and evaluated the accuracy with which it detects hand-type. We obtained an accuracy of about 80% with only three fingers (index, middle, ring finger).

  17. Visualization of latent fingerprints beneath opaque electrical tapes by optical coherence tomography

    Science.gov (United States)

    Liu, Kangkang; Zhang, Ning; Meng, Li; Li, Zhigang; Xu, Xiaojing

    2018-03-01

    Electrical tape is found as one type of important trace evidence in crime scene. For example, it is very frequently used to insulate wires in explosive devices in many criminal cases. The fingerprints of the suspects were often left on the adhesive side of the tapes, which can provide very useful clues for the investigation and make it possible for individual identification. The most commonly used method to detect and visualize those latent fingerprints is to peel off each layer of the tapes first and then adopt the chemical methods to develop the fingerprints on the tapes. However, the peeling-off and chemical development process would degrade and contaminate the fingerprints and thus adversely affect the accuracy of identification. Optical coherence tomography (OCT) is a novel forensic imaging modality based on lowcoherence interferometry, which has the advantages of non-destruction, micrometer-level high resolution and crosssectional imaging. In this study, a fiber-based spectral-domain OCT (SD-OCT) system with {6μm resolution was employed to obtain the image of fingerprint sandwiched between two opaque electrical tapes without any pre-processing procedure like peeling-off. Three-dimensional (3D) OCT reconstruction was performed and the subsurface image was produced to visualize the latent fingerprints. The results demonstrate that OCT is a promising tool for recovering the latent fingerprints hidden beneath opaque electrical tape non-destructively and rapidly.

  18. DNA fingerprinting in forensics: past, present, future.

    Science.gov (United States)

    Roewer, Lutz

    2013-11-18

    DNA fingerprinting, one of the great discoveries of the late 20th century, has revolutionized forensic investigations. This review briefly recapitulates 30 years of progress in forensic DNA analysis which helps to convict criminals, exonerate the wrongly accused, and identify victims of crime, disasters, and war. Current standard methods based on short tandem repeats (STRs) as well as lineage markers (Y chromosome, mitochondrial DNA) are covered and applications are illustrated by casework examples. Benefits and risks of expanding forensic DNA databases are discussed and we ask what the future holds for forensic DNA fingerprinting.

  19. DNA fingerprinting, DNA barcoding, and next generation sequencing technology in plants.

    Science.gov (United States)

    Sucher, Nikolaus J; Hennell, James R; Carles, Maria C

    2012-01-01

    DNA fingerprinting of plants has become an invaluable tool in forensic, scientific, and industrial laboratories all over the world. PCR has become part of virtually every variation of the plethora of approaches used for DNA fingerprinting today. DNA sequencing is increasingly used either in combination with or as a replacement for traditional DNA fingerprinting techniques. A prime example is the use of short, standardized regions of the genome as taxon barcodes for biological identification of plants. Rapid advances in "next generation sequencing" (NGS) technology are driving down the cost of sequencing and bringing large-scale sequencing projects into the reach of individual investigators. We present an overview of recent publications that demonstrate the use of "NGS" technology for DNA fingerprinting and DNA barcoding applications.

  20. RF-Based Location Using Interpolation Functions to Reduce Fingerprint Mapping

    Science.gov (United States)

    Ezpeleta, Santiago; Claver, José M.; Pérez-Solano, Juan J.; Martí, José V.

    2015-01-01

    Indoor RF-based localization using fingerprint mapping requires an initial training step, which represents a time consuming process. This location methodology needs a database conformed with RSSI (Radio Signal Strength Indicator) measures from the communication transceivers taken at specific locations within the localization area. But, the real world localization environment is dynamic and it is necessary to rebuild the fingerprint database when some environmental changes are made. This paper explores the use of different interpolation functions to complete the fingerprint mapping needed to achieve the sought accuracy, thereby reducing the effort in the training step. Also, different distributions of test maps and reference points have been evaluated, showing the validity of this proposal and necessary trade-offs. Results reported show that the same or similar localization accuracy can be achieved even when only 50% of the initial fingerprint reference points are taken. PMID:26516862

  1. DNA Fingerprinting Using PCR: A Practical Forensic Science Activity

    Science.gov (United States)

    Choi, Hyun-Jung; Ahn, Jung Hoon; Ko, Minsu

    2008-01-01

    This paper describes a forensic science simulation programme applicable for use in colleges. Students were asked to find a putative suspect by DNA fingerprinting using a simple protocol developed in this study. DNA samples were obtained from a hair root and a drop of blood, common sources of DNA in forensic science. The DNA fingerprinting protocol…

  2. Modelling Energy Consumption in Embedded Systems with VDM-RT

    DEFF Research Database (Denmark)

    Esparza Isasa, Jose Antonio; Jørgensen, Peter Würtz Vinther; Nielsen, Claus Ballegård

    2014-01-01

    Indoor positioning systems are increasingly being deployed to enable indoor navigation and other indoor location-based services. Systems based on Wi-Fi and video cameras rely on different technologies and techniques and have so far been developed independently by different research communities; we...... show that integrating information provided by a video system into a Wi-Fi based system increases its maintainability and avoid drops in accuracy over time. Specifically, we consider a Wi-Fi system that uses fingerprints measurements collected in the space for positioning. We improve the system's room......-level accuracy by means of automatic, video-driven collection of fingerprints. Our method is able to relate a Wi-Fi user to unidentified movements detected by cameras by exploiting the existing Wi-Fi system, thus generating fingerprints automatically. This use of video for fingerprint collection reduces the need...

  3. THE INVESTIGATION OF THE RELATIONSHIP BETWEEN FINGERPRINT PATTERNS AND CRIME TYPES

    OpenAIRE

    DELİCE, Murat; DUMAN, Ali; ÖZEL, Şaban Ali

    2014-01-01

    The exclusivity of prints at the tip of each individuals fingers is known for thousands of years and these prints are used for security purposes for a long time. Recent developments have pointed out that fingerprint patterns are related to gender, heredity, diseases, blood types and even character. However, the relationship between fingerprint patterns and crime types has not been explored. In order to meet this need, this research study examines the fingerprint patterns of suspects who are i...

  4. Application of DNA fingerprints for cell-line individualization.

    OpenAIRE

    Gilbert, D A; Reid, Y A; Gail, M H; Pee, D; White, C; Hay, R J; O'Brien, S J

    1990-01-01

    DNA fingerprints of 46 human cell lines were derived using minisatellite probes for hypervariable genetic loci. The incidence of 121 HaeIII DNA fragments among 33 cell lines derived from unrelated individuals was used to estimate allelic and genotypic frequencies for each fragment and for composite individual DNA fingerprints. We present a quantitative estimate of the extent of genetic difference between individuals, an estimate based on the percentage of restriction fragments at which they d...

  5. A new method of artificial latent fingerprint creation using artificial sweat and inkjet printer.

    Science.gov (United States)

    Hong, Sungwook; Hong, Ingi; Han, Aleum; Seo, Jin Yi; Namgung, Juyoung

    2015-12-01

    In order to study fingerprinting in the field of forensic science, it is very important to have two or more latent fingerprints with identical chemical composition and intensity. However, it is impossible to obtain identical fingerprints, in reality, because fingerprinting comes out slightly differently every time. A previous research study had proposed an artificial fingerprint creation method in which inkjet ink was replaced with amino acids and sodium chloride solution: the components of human sweat. But, this method had some drawbacks: divalent cations were not added while formulating the artificial sweat solution, and diluted solutions were used for creating weakly deposited latent fingerprint. In this study, a method was developed for overcoming the drawbacks of the methods used in the previous study. Several divalent cations were added in this study because the amino acid-ninhydrin (or some of its analogues) complex is known to react with divalent cations to produce a photoluminescent product; and, similarly, the amino acid-1,2-indanedione complex is known to be catalyzed by a small amount of zinc ions to produce a highly photoluminescent product. Also, in this study, a new technique was developed which enables to adjust the intensity when printing the latent fingerprint patterns. In this method, image processing software is used to control the intensity of the master fingerprint patterns, which adjusts the printing intensity of the latent fingerprints. This new method opened the way to produce a more realistic artificial fingerprint in various strengths with one artificial sweat working solution. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  6. Real-time UAV trajectory generation using feature points matching between video image sequences

    Science.gov (United States)

    Byun, Younggi; Song, Jeongheon; Han, Dongyeob

    2017-09-01

    Unmanned aerial vehicles (UAVs), equipped with navigation systems and video capability, are currently being deployed for intelligence, reconnaissance and surveillance mission. In this paper, we present a systematic approach for the generation of UAV trajectory using a video image matching system based on SURF (Speeded up Robust Feature) and Preemptive RANSAC (Random Sample Consensus). Video image matching to find matching points is one of the most important steps for the accurate generation of UAV trajectory (sequence of poses in 3D space). We used the SURF algorithm to find the matching points between video image sequences, and removed mismatching by using the Preemptive RANSAC which divides all matching points to outliers and inliers. The inliers are only used to determine the epipolar geometry for estimating the relative pose (rotation and translation) between image sequences. Experimental results from simulated video image sequences showed that our approach has a good potential to be applied to the automatic geo-localization of the UAVs system

  7. Fingerprint Image Enhancement Based on Second Directional Derivative of the Digital Image

    Directory of Open Access Journals (Sweden)

    Onnia Vesa

    2002-01-01

    Full Text Available This paper presents a novel approach of fingerprint image enhancement that relies on detecting the fingerprint ridges as image regions where the second directional derivative of the digital image is positive. A facet model is used in order to approximate the derivatives at each image pixel based on the intensity values of pixels located in a certain neighborhood. We note that the size of this neighborhood has a critical role in achieving accurate enhancement results. Using neighborhoods of various sizes, the proposed algorithm determines several candidate binary representations of the input fingerprint pattern. Subsequently, an output binary ridge-map image is created by selecting image zones, from the available binary image candidates, according to a MAP selection rule. Two public domain collections of fingerprint images are used in order to objectively assess the performance of the proposed fingerprint image enhancement approach.

  8. Robust Visual Tracking Using the Bidirectional Scale Estimation

    Directory of Open Access Journals (Sweden)

    An Zhiyong

    2017-01-01

    Full Text Available Object tracking with robust scale estimation is a challenging task in computer vision. This paper presents a novel tracking algorithm that learns the translation and scale filters with a complementary scheme. The translation filter is constructed using the ridge regression and multidimensional features. A robust scale filter is constructed by the bidirectional scale estimation, including the forward scale and backward scale. Firstly, we learn the scale filter using the forward tracking information. Then the forward scale and backward scale can be estimated using the respective scale filter. Secondly, a conservative strategy is adopted to compromise the forward and backward scales. Finally, the scale filter is updated based on the final scale estimation. It is effective to update scale filter since the stable scale estimation can improve the performance of scale filter. To reveal the effectiveness of our tracker, experiments are performed on 32 sequences with significant scale variation and on the benchmark dataset with 50 challenging videos. Our results show that the proposed tracker outperforms several state-of-the-art trackers in terms of robustness and accuracy.

  9. The FBI wavelet/scalar quantization standard for gray-scale fingerprint image compression

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, J.N.; Brislawn, C.M. (Los Alamos National Lab., NM (United States)); Hopper, T. (Federal Bureau of Investigation, Washington, DC (United States))

    1993-01-01

    The FBI has recently adopted a standard for the compression of digitized 8-bit gray-scale fingerprint images. The standard is based on scalar quantization of a 64-subband discrete wavelet transform decomposition of the images, followed by Huffman coding. Novel features of the algorithm include the use of symmetric boundary conditions for transforming finite-length signals and a subband decomposition tailored for fingerprint images scanned at 500 dpi. The standard is intended for use in conjunction with ANSI/NBS-CLS 1-1993, American National Standard Data Format for the Interchange of Fingerprint Information, and the FBI's Integrated Automated Fingerprint Identification System.

  10. [Baking method of Platycladi Cacumen Carbonisatum based on similarity of UPLC fingerprints].

    Science.gov (United States)

    Shan, Mingqiu; Chen, Chao; Yao, Xiaodong; Ding, Anwei

    2010-09-01

    To establish a baking method of Platycladi Cacumen Carbonisatum for providing a new idea to Carbonic Herbs' research. Samples were prepared in an oven for different time at different temperatures separately. Then the fingerprints of the samples were determined by UPLC. According to the standard fingerprint, the similarities of the samples' fingerprints were compared. The similarities of 3 samples, which were baked at 230 degrees C for 20 min, 30 min and at 240 degrees C for 20 min, were above 0.96. According to the similarities of the fingerprints and in view of the appearances, Platycladi Cacumen Carbonizing should be baked at 230 degrees C for 20 min.

  11. Fingerprint matching algorithm for poor quality images

    Directory of Open Access Journals (Sweden)

    Vedpal Singh

    2015-04-01

    Full Text Available The main aim of this study is to establish an efficient platform for fingerprint matching for low-quality images. Generally, fingerprint matching approaches use the minutiae points for authentication. However, it is not such a reliable authentication method for low-quality images. To overcome this problem, the current study proposes a fingerprint matching methodology based on normalised cross-correlation, which would improve the performance and reduce the miscalculations during authentication. It would decrease the computational complexities. The error rate of the proposed method is 5.4%, which is less than the two-dimensional (2D dynamic programming (DP error rate of 5.6%, while Lee's method produces 5.9% and the combined method has 6.1% error rate. Genuine accept rate at 1% false accept rate is 89.3% but at 0.1% value it is 96.7%, which is higher. The outcome of this study suggests that the proposed methodology has a low error rate with minimum computational effort as compared with existing methods such as Lee's method and 2D DP and the combined method.

  12. Fingerprint Matching by Thin-plate Spline Modelling of Elastic Deformations

    NARCIS (Netherlands)

    Bazen, A.M.; Gerez, Sabih H.

    2003-01-01

    This paper presents a novel minutiae matching method that describes elastic distortions in fingerprints by means of a thin-plate spline model, which is estimated using a local and a global matching stage. After registration of the fingerprints according to the estimated model, the number of matching

  13. AIR-MRF: Accelerated iterative reconstruction for magnetic resonance fingerprinting.

    Science.gov (United States)

    Cline, Christopher C; Chen, Xiao; Mailhe, Boris; Wang, Qiu; Pfeuffer, Josef; Nittka, Mathias; Griswold, Mark A; Speier, Peter; Nadar, Mariappan S

    2017-09-01

    Existing approaches for reconstruction of multiparametric maps with magnetic resonance fingerprinting (MRF) are currently limited by their estimation accuracy and reconstruction time. We aimed to address these issues with a novel combination of iterative reconstruction, fingerprint compression, additional regularization, and accelerated dictionary search methods. The pipeline described here, accelerated iterative reconstruction for magnetic resonance fingerprinting (AIR-MRF), was evaluated with simulations as well as phantom and in vivo scans. We found that the AIR-MRF pipeline provided reduced parameter estimation errors compared to non-iterative and other iterative methods, particularly at shorter sequence lengths. Accelerated dictionary search methods incorporated into the iterative pipeline reduced the reconstruction time at little cost of quality. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Stereoselective virtual screening of the ZINC database using atom pair 3D-fingerprints.

    Science.gov (United States)

    Awale, Mahendra; Jin, Xian; Reymond, Jean-Louis

    2015-01-01

    Tools to explore large compound databases in search for analogs of query molecules provide a strategically important support in drug discovery to help identify available analogs of any given reference or hit compound by ligand based virtual screening (LBVS). We recently showed that large databases can be formatted for very fast searching with various 2D-fingerprints using the city-block distance as similarity measure, in particular a 2D-atom pair fingerprint (APfp) and the related category extended atom pair fingerprint (Xfp) which efficiently encode molecular shape and pharmacophores, but do not perceive stereochemistry. Here we investigated related 3D-atom pair fingerprints to enable rapid stereoselective searches in the ZINC database (23.2 million 3D structures). Molecular fingerprints counting atom pairs at increasing through-space distance intervals were designed using either all atoms (16-bit 3DAPfp) or different atom categories (80-bit 3DXfp). These 3D-fingerprints retrieved molecular shape and pharmacophore analogs (defined by OpenEye ROCS scoring functions) of 110,000 compounds from the Cambridge Structural Database with equal or better accuracy than the 2D-fingerprints APfp and Xfp, and showed comparable performance in recovering actives from decoys in the DUD database. LBVS by 3DXfp or 3DAPfp similarity was stereoselective and gave very different analogs when starting from different diastereomers of the same chiral drug. Results were also different from LBVS with the parent 2D-fingerprints Xfp or APfp. 3D- and 2D-fingerprints also gave very different results in LBVS of folded molecules where through-space distances between atom pairs are much shorter than topological distances. 3DAPfp and 3DXfp are suitable for stereoselective searches for shape and pharmacophore analogs of query molecules in large databases. Web-browsers for searching ZINC by 3DAPfp and 3DXfp similarity are accessible at www.gdb.unibe.ch and should provide useful assistance to drug

  15. ROBUST MOTION SEGMENTATION FOR HIGH DEFINITION VIDEO SEQUENCES USING A FAST MULTI-RESOLUTION MOTION ESTIMATION BASED ON SPATIO-TEMPORAL TUBES

    OpenAIRE

    Brouard , Olivier; Delannay , Fabrice; Ricordel , Vincent; Barba , Dominique

    2007-01-01

    4 pages; International audience; Motion segmentation methods are effective for tracking video objects. However, objects segmentation methods based on motion need to know the global motion of the video in order to back-compensate it before computing the segmentation. In this paper, we propose a method which estimates the global motion of a High Definition (HD) video shot and then segments it using the remaining motion information. First, we develop a fast method for multi-resolution motion est...

  16. Automated UAV-based mapping for airborne reconnaissance and video exploitation

    Science.gov (United States)

    Se, Stephen; Firoozfam, Pezhman; Goldstein, Norman; Wu, Linda; Dutkiewicz, Melanie; Pace, Paul; Naud, J. L. Pierre

    2009-05-01

    Airborne surveillance and reconnaissance are essential for successful military missions. Such capabilities are critical for force protection, situational awareness, mission planning, damage assessment and others. UAVs gather huge amount of video data but it is extremely labour-intensive for operators to analyse hours and hours of received data. At MDA, we have developed a suite of tools towards automated video exploitation including calibration, visualization, change detection and 3D reconstruction. The on-going work is to improve the robustness of these tools and automate the process as much as possible. Our calibration tool extracts and matches tie-points in the video frames incrementally to recover the camera calibration and poses, which are then refined by bundle adjustment. Our visualization tool stabilizes the video, expands its field-of-view and creates a geo-referenced mosaic from the video frames. It is important to identify anomalies in a scene, which may include detecting any improvised explosive devices (IED). However, it is tedious and difficult to compare video clips to look for differences manually. Our change detection tool allows the user to load two video clips taken from two passes at different times and flags any changes between them. 3D models are useful for situational awareness, as it is easier to understand the scene by visualizing it in 3D. Our 3D reconstruction tool creates calibrated photo-realistic 3D models from video clips taken from different viewpoints, using both semi-automated and automated approaches. The resulting 3D models also allow distance measurements and line-of- sight analysis.

  17. Binary similarity measures for fingerprint analysis of qualitative metabolomic profiles.

    Science.gov (United States)

    Rácz, Anita; Andrić, Filip; Bajusz, Dávid; Héberger, Károly

    2018-01-01

    Contemporary metabolomic fingerprinting is based on multiple spectrometric and chromatographic signals, used either alone or combined with structural and chemical information of metabolic markers at the qualitative and semiquantitative level. However, signal shifting, convolution, and matrix effects may compromise metabolomic patterns. Recent increase in the use of qualitative metabolomic data, described by the presence (1) or absence (0) of particular metabolites, demonstrates great potential in the field of metabolomic profiling and fingerprint analysis. The aim of this study is a comprehensive evaluation of binary similarity measures for the elucidation of patterns among samples of different botanical origin and various metabolomic profiles. Nine qualitative metabolomic data sets covering a wide range of natural products and metabolomic profiles were applied to assess 44 binary similarity measures for the fingerprinting of plant extracts and natural products. The measures were analyzed by the novel sum of ranking differences method (SRD), searching for the most promising candidates. Baroni-Urbani-Buser (BUB) and Hawkins-Dotson (HD) similarity coefficients were selected as the best measures by SRD and analysis of variance (ANOVA), while Dice (Di1), Yule, Russel-Rao, and Consonni-Todeschini 3 ranked the worst. ANOVA revealed that concordantly and intermediately symmetric similarity coefficients are better candidates for metabolomic fingerprinting than the asymmetric and correlation based ones. The fingerprint analysis based on the BUB and HD coefficients and qualitative metabolomic data performed equally well as the quantitative metabolomic profile analysis. Fingerprint analysis based on the qualitative metabolomic profiles and binary similarity measures proved to be a reliable way in finding the same/similar patterns in metabolomic data as that extracted from quantitative data.

  18. Fingerprint-based structure retrieval using electron density.

    Science.gov (United States)

    Yin, Shuangye; Dokholyan, Nikolay V

    2011-03-01

    We present a computational approach that can quickly search a large protein structural database to identify structures that fit a given electron density, such as determined by cryo-electron microscopy. We use geometric invariants (fingerprints) constructed using 3D Zernike moments to describe the electron density, and reduce the problem of fitting of the structure to the electron density to simple fingerprint comparison. Using this approach, we are able to screen the entire Protein Data Bank and identify structures that fit two experimental electron densities determined by cryo-electron microscopy. Copyright © 2010 Wiley-Liss, Inc.

  19. Fingerprint extraction from interference destruction terahertz spectrum.

    Science.gov (United States)

    Xiong, Wei; Shen, Jingling

    2010-10-11

    In this paper, periodic peaks in a terahertz absorption spectrum are confirmed to be induced from interference effects. Theoretically, we explained the periodic peaks and calculated the locations of them. Accordingly, a technique was suggested, with which the interference peaks in a terahertz spectrum can be eliminated and therefore a real terahertz absorption spectrum can be obtained. Experimentally, a sample, Methamphetamine, was investigated and its terahertz fingerprint was successfully extracted from its interference destruction spectrum. This technique is useful in getting samples' terahertz fingerprint spectra, and furthermore provides a fast nondestructive testing method using a large size terahertz beam to identify materials.

  20. VME Switch for CERN's PS Analog Video System

    CERN Document Server

    Acebes, I; Heinze, W; Lewis, J; Serrano, J

    2003-01-01

    Analog video signal switching is used in CERN's Proton Synchrotron (PS) complex to route the video signals coming from Beam Diagnostics systems to the Meyrin Control Room (MCR). Traditionally, this has been done with custom electromechanical relay-based cards controlled serially via CAMAC crates. In order to improve the robustness and maintainability of the system, while keeping it analog to preserve the low latency, a VME card based on Analog Devices' AD8116 analog matrix chip has been developed. Video signals go into the front panel and exit the switch through the P2 connector of the VME backplane. The module is a 16 input, 32 output matrix. Larger matrices can be built using more modules and bussing their outputs together, thanks to the high impedance feature of the AD8116. Another VME module takes the selected signals from the P2 connector and performs automatic gain to send them at nominal output level through its front panel. This paper discusses both designs and presents experimental test results.

  1. Extended image differencing for change detection in UAV video mosaics

    Science.gov (United States)

    Saur, Günter; Krüger, Wolfgang; Schumann, Arne

    2014-03-01

    Change detection is one of the most important tasks when using unmanned aerial vehicles (UAV) for video reconnaissance and surveillance. We address changes of short time scale, i.e. the observations are taken in time distances from several minutes up to a few hours. Each observation is a short video sequence acquired by the UAV in near-nadir view and the relevant changes are, e.g., recently parked or moved vehicles. In this paper we extend our previous approach of image differencing for single video frames to video mosaics. A precise image-to-image registration combined with a robust matching approach is needed to stitch the video frames to a mosaic. Additionally, this matching algorithm is applied to mosaic pairs in order to align them to a common geometry. The resulting registered video mosaic pairs are the input of the change detection procedure based on extended image differencing. A change mask is generated by an adaptive threshold applied to a linear combination of difference images of intensity and gradient magnitude. The change detection algorithm has to distinguish between relevant and non-relevant changes. Examples for non-relevant changes are stereo disparity at 3D structures of the scene, changed size of shadows, and compression or transmission artifacts. The special effects of video mosaicking such as geometric distortions and artifacts at moving objects have to be considered, too. In our experiments we analyze the influence of these effects on the change detection results by considering several scenes. The results show that for video mosaics this task is more difficult than for single video frames. Therefore, we extended the image registration by estimating an elastic transformation using a thin plate spline approach. The results for mosaics are comparable to that of single video frames and are useful for interactive image exploitation due to a larger scene coverage.

  2. Algorithm comparison for schedule optimization in MR fingerprinting.

    Science.gov (United States)

    Cohen, Ouri; Rosen, Matthew S

    2017-09-01

    In MR Fingerprinting, the flip angles and repetition times are chosen according to a pseudorandom schedule. In previous work, we have shown that maximizing the discrimination between different tissue types by optimizing the acquisition schedule allows reductions in the number of measurements required. The ideal optimization algorithm for this application remains unknown, however. In this work we examine several different optimization algorithms to determine the one best suited for optimizing MR Fingerprinting acquisition schedules. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Chemical Fingerprint Analysis and Quantitative Analysis of Rosa rugosa by UPLC-DAD

    Directory of Open Access Journals (Sweden)

    Sanawar Mansur

    2016-12-01

    Full Text Available A method based on ultra performance liquid chromatography with a diode array detector (UPLC-DAD was developed for quantitative analysis of five active compounds and chemical fingerprint analysis of Rosa rugosa. Ten batches of R. rugosa collected from different plantations in the Xinjiang region of China were used to establish the fingerprint. The feasibility and advantages of the used UPLC fingerprint were verified for its similarity evaluation by systematically comparing chromatograms with professional analytical software recommended by State Food and Drug Administration (SFDA of China. In quantitative analysis, the five compounds showed good regression (R2 = 0.9995 within the test ranges, and the recovery of the method was in the range of 94.2%–103.8%. The similarities of liquid chromatography fingerprints of 10 batches of R. rugosa were more than 0.981. The developed UPLC fingerprint method is simple, reliable, and validated for the quality control and identification of R. rugosa. Additionally, simultaneous quantification of five major bioactive ingredients in the R. rugosa samples was conducted to interpret the consistency of the quality test. The results indicated that the UPLC fingerprint, as a characteristic distinguishing method combining similarity evaluation and quantification analysis, can be successfully used to assess the quality and to identify the authenticity of R. rugosa.

  4. Recovery of DNA from latent fingerprint tape lifts archived against matte acetate.

    Science.gov (United States)

    Steadman, Shelly A; Hoofer, Steven R; Geering, Sarah C; King, Stephanie; Bennett, Marc A

    2015-05-01

    This study was driven by court order to examine methods to remove, extract, and STR-type potential DNA entrapped between latent fingerprint lifting tape and matte acetate that was collected from a 1977 crime scene. Results indicate that recovery of appreciable quantities of DNA is more challenging once adhesive is attached to matte acetate cards and even more difficult when fixed following black powder enhancement. STR amplification of extracts from entrapped fingermarks collected following the dusting/lifting procedure did not produce robust profiles, and extraneous peaks not expressed by print donors were detected for some samples. A hearing was set to argue whether there was DNA remaining to be tested, and if so, whether that DNA could be exculpatory in this postconviction matter. The studies herein provided the basis for the court's decision to not require the testing. © 2015 American Academy of Forensic Sciences.

  5. Challenges and Specifications for Robust Face and Gait Recognition Systems for Surveillance Application

    Directory of Open Access Journals (Sweden)

    BUCIU Ioan

    2014-05-01

    Full Text Available Automated person recognition (APR based on biometric signals addresses the process of automatically recognize a person according to his physiological traits (face, voice, iris, fingerprint, ear shape, body odor, electroencephalogram – EEG, electrocardiogram, or hand geometry, or behavioural patterns (gait, signature, hand-grip, lip movement. The paper aims at briefly presenting the current challenges for two specific non-cooperative biometric approaches, namely face and gait biometrics as well as approaches that consider combination of the two in the attempt of a more robust system for accurate APR, in the context of surveillance application. Open problems from both sides are also pointed out.

  6. Sources of variability in fatty acid (FA) biomarkers in the application of compound-specific stable isotopes (CSSIs) to soil and sediment fingerprinting and tracing: A review

    Energy Technology Data Exchange (ETDEWEB)

    Reiffarth, D.G., E-mail: Dominic.Reiffarth@unbc.ca [Natural Resources and Environmental Studies Program, University of Northern British Columbia, 3333 University Way, Prince George, BC V2N 4Z9 (Canada); Petticrew, E.L., E-mail: Ellen.Petticrew@unbc.ca [Geography Program and Quesnel River Research Centre, University of Northern British Columbia, 3333 University Way, Prince George, BC V2N 4Z9 (Canada); Owens, P.N., E-mail: Philip.Owens@unbc.ca [Environmental Science Program and Quesnel River Research Centre, University of Northern British Columbia, 3333 University Way, Prince George, BC, V2N 4Z9 (Canada); Lobb, D.A., E-mail: David.Lobb@umanitoba.ca [Watershed Systems Research Program, University of Manitoba, 13 Freedman Crescent, Winnipeg, MB R3T 2N2 (Canada)

    2016-09-15

    Determining soil redistribution and sediment budgets in watersheds is often challenging. One of the methods for making such determinations employs soil and sediment fingerprinting techniques, using sediment properties such as geochemistry, fallout radionuclides, and mineral magnetism. These methods greatly improve the estimation of erosion and deposition within a watershed, but are limited when determining land use-based soil and sediment movement. Recently, compound-specific stable isotopes (CSSIs), which employ fatty acids naturally occurring in the vegetative cover of soils, offer the possibility of refining fingerprinting techniques based on land use, complementing other methods that are currently in use. The CSSI method has been met with some success; however, challenges still remain with respect to scale and resolution due to a potentially large degree of biological, environmental and analytical uncertainty. By better understanding the source of tracers used in CSSI work and the inherent biochemical variability in those tracers, improvement in sample design and tracer selection is possible. Furthermore, an understanding of environmental and analytical factors affecting the CSSI signal will lead to refinement of the approach and the ability to generate more robust data. This review focuses on sources of biological, environmental and analytical variability in applying CSSI to soil and sediment fingerprinting, and presents recommendations based on past work and current research in this area for improving the CSSI technique. A recommendation, based on current information available in the literature, is to use very-long chain saturated fatty acids and to avoid the use of the ubiquitous saturated fatty acids, C{sub 16} and C{sub 18}. - Highlights: • Compound-specific stable isotopes (CSSIs) of carbon may be used as soil tracers. • The variables affecting CSSI data are: biological, environmental and analytical. • Understanding sources of variability will lead

  7. Sources of variability in fatty acid (FA) biomarkers in the application of compound-specific stable isotopes (CSSIs) to soil and sediment fingerprinting and tracing: A review

    International Nuclear Information System (INIS)

    Reiffarth, D.G.; Petticrew, E.L.; Owens, P.N.; Lobb, D.A.

    2016-01-01

    Determining soil redistribution and sediment budgets in watersheds is often challenging. One of the methods for making such determinations employs soil and sediment fingerprinting techniques, using sediment properties such as geochemistry, fallout radionuclides, and mineral magnetism. These methods greatly improve the estimation of erosion and deposition within a watershed, but are limited when determining land use-based soil and sediment movement. Recently, compound-specific stable isotopes (CSSIs), which employ fatty acids naturally occurring in the vegetative cover of soils, offer the possibility of refining fingerprinting techniques based on land use, complementing other methods that are currently in use. The CSSI method has been met with some success; however, challenges still remain with respect to scale and resolution due to a potentially large degree of biological, environmental and analytical uncertainty. By better understanding the source of tracers used in CSSI work and the inherent biochemical variability in those tracers, improvement in sample design and tracer selection is possible. Furthermore, an understanding of environmental and analytical factors affecting the CSSI signal will lead to refinement of the approach and the ability to generate more robust data. This review focuses on sources of biological, environmental and analytical variability in applying CSSI to soil and sediment fingerprinting, and presents recommendations based on past work and current research in this area for improving the CSSI technique. A recommendation, based on current information available in the literature, is to use very-long chain saturated fatty acids and to avoid the use of the ubiquitous saturated fatty acids, C 16 and C 18 . - Highlights: • Compound-specific stable isotopes (CSSIs) of carbon may be used as soil tracers. • The variables affecting CSSI data are: biological, environmental and analytical. • Understanding sources of variability will lead to more

  8. Beware of the possibility of fingerprinting techniques transferring DNA.

    Science.gov (United States)

    van Oorschot, Roland A H; Treadwell, Sally; Beaurepaire, James; Holding, Nicole L; Mitchell, Robert J

    2005-11-01

    Fingerprinting brushes have the potential to collect and transfer DNA during powdering. Squirrel-hair fingerprint brushes exposed to specific sets of saliva stains and brushes used in routine casework were tested for their ability to collect and transfer DNA containing material using standard DNA extraction procedures and AmpFlSTR Profiler Plus amplification and typing procedures. The tests found that the risk of transferring DNA during powdering and having a detrimental impact on the analysis increases if the examiner powders over either biological stains (such as blood or saliva) or very fresh prints and uses more sensitive PCR amplification and typing procedures. We advocate caution when powdering prints from which DNA may also be collected and provide options for consideration to limit the risk of transferred DNA contamination while fingerprinting.

  9. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  10. Wavelet/scalar quantization compression standard for fingerprint images

    Energy Technology Data Exchange (ETDEWEB)

    Brislawn, C.M.

    1996-06-12

    US Federal Bureau of Investigation (FBI) has recently formulated a national standard for digitization and compression of gray-scale fingerprint images. Fingerprints are scanned at a spatial resolution of 500 dots per inch, with 8 bits of gray-scale resolution. The compression algorithm for the resulting digital images is based on adaptive uniform scalar quantization of a discrete wavelet transform subband decomposition (wavelet/scalar quantization method). The FBI standard produces archival-quality images at compression ratios of around 15 to 1 and will allow the current database of paper fingerprint cards to be replaced by digital imagery. The compression standard specifies a class of potential encoders and a universal decoder with sufficient generality to reconstruct compressed images produced by any compliant encoder, allowing flexibility for future improvements in encoder technology. A compliance testing program is also being implemented to ensure high standards of image quality and interchangeability of data between different implementations.

  11. Complexity and distortion analysis on methods for unrolling 3D to 2D fingerprints

    CSIR Research Space (South Africa)

    Mlambo, CS

    2015-11-01

    Full Text Available and studies involve the application of three-dimensional (3D) fingerprint systems, where the details of the finger are captured using 3D technologies and the captured 3D fingerprints are converted into two-dimensional (2D) fingerprints. This paper presents a...

  12. Analysis of fingerprint samples, testing various conditions, for forensic DNA identification.

    Science.gov (United States)

    Ostojic, Lana; Wurmbach, Elisa

    2017-01-01

    Fingerprints can be of tremendous value for forensic biology, since they can be collected from a wide variety of evident types, such as handles of weapons, tools collected in criminal cases, and objects with no apparent staining. DNA obtained from fingerprints varies greatly in quality and quantity, which ultimately affects the quality of the resulting STR profiles. Additional difficulties can arise when fingerprint samples show mixed STR profiles due to the handling of multiple persons. After applying a tested protocol for sample collection (swabbing with 5% Triton X-100), DNA extraction (using an enzyme that works at elevated temperatures), and PCR amplification (AmpFlSTR® Identifiler® using 31cycles) extensive analysis was performed to better understand the challenges inherent to fingerprint samples, with the ultimate goal of developing valuable profiles (≥50% complete). The impact of time on deposited fingerprints was investigated, revealing that while the quality of profiles deteriorated, full STR profiles could still be obtained from samples after 40days of storage at room temperature. By comparing the STR profiles from fingerprints of the dominant versus the non-dominant hand, we found a slightly better quality from the non-dominant hand, which was not always significant. Substrates seem to have greater effects on fingerprints. Tests on glass, plastic, paper and metal (US Quarter dollar, made of Cu and Ni), common substrates in offices and homes, showed best results for glass, followed by plastic and paper, while almost no profiles were obtained from a Quarter dollar. Important for forensic casework, we also assessed three-person mixtures of touched fingerprint samples. Unlike routinely used approaches for sampling evidence, the surface of an object (bottle) was sectioned into six equal parts and separate samples were taken from each section. The samples were processed separately for DNA extraction and STR amplification. The results included a few single

  13. Shot Boundary Detection in Soccer Video using Twin-comparison Algorithm and Dominant Color Region

    Directory of Open Access Journals (Sweden)

    Matko Šarić

    2008-06-01

    Full Text Available The first step in generic video processing is temporal segmentation, i.e. shot boundary detection. Camera shot transitions can be either abrupt (e.g. cuts or gradual (e.g. fades, dissolves, wipes. Sports video is one of the most challenging domains for robust shot boundary detection. We proposed a shot boundary detection algorithm for soccer video based on the twin-comparison method and the absolute difference between frames in their ratios of dominant colored pixels to total number of pixels. With this approach the detection of gradual transitions is improved by decreasing the number of false positives caused by some camera operations. We also compared performances of our algorithm and the standard twin-comparison method.

  14. Sr-Nd-Hf Isotopic Analysis of <10 mg Dust Samples: Implications for Ice Core Dust Source Fingerprinting

    DEFF Research Database (Denmark)

    Ujvari, Gabor; Wegner, Wencke; Klötzli, Urs

    2018-01-01

    Combined Sr‐Nd‐Hf isotopic data of two reference materials (AGV‐1/BCR2) and 50, 10, and 5 mg aliquots of carbonate‐free fine grain (isotopic...... compositions (ICs) demonstrate that robust isotopic ratios can be obtained from 5 to 10 mg size rock samples using the ion exchange/mass spectrometry techniques applied. While 87Sr/86Sr ratios of dust aluminosilicate fractions are affected by even small changes in pretreatments, Nd isotopic ratios are found...... to be insensitive to acid leaching, grain‐size or weathering effects. However, the Nd isotopic tracer is sometimes inconclusive in dust source fingerprinting (BEI and NUS both close to ɛNd(0) –10). Hafnium isotopic values (

  15. A BAC clone fingerprinting approach to the detection of human genome rearrangements

    Science.gov (United States)

    Krzywinski, Martin; Bosdet, Ian; Mathewson, Carrie; Wye, Natasja; Brebner, Jay; Chiu, Readman; Corbett, Richard; Field, Matthew; Lee, Darlene; Pugh, Trevor; Volik, Stas; Siddiqui, Asim; Jones, Steven; Schein, Jacquie; Collins, Collin; Marra, Marco

    2007-01-01

    We present a method, called fingerprint profiling (FPP), that uses restriction digest fingerprints of bacterial artificial chromosome clones to detect and classify rearrangements in the human genome. The approach uses alignment of experimental fingerprint patterns to in silico digests of the sequence assembly and is capable of detecting micro-deletions (1-5 kb) and balanced rearrangements. Our method has compelling potential for use as a whole-genome method for the identification and characterization of human genome rearrangements. PMID:17953769

  16. [Identification of a repetitive sequence element for DNA fingerprinting in Phytophthora sojae].

    Science.gov (United States)

    Yin, Lihua; Wang, Qinhu; Ning, Feng; Zhu, Xiaoying; Zuo, Yuhu; Shan, Weixing

    2010-04-01

    Establishment of DNA fingerprinting in Phytophthora sojae and an analysis of genetic relationship of Heilongjiang and Xinjiang populations. Bioinformatics tools were used to search repetitive sequences in P. sojae and Southern blot analysis was employed for DNA fingerprinting analysis of P. sojae populations from Heilongjiang and Xinjiang using the identified repetitive sequence. A moderately repetitive sequence was identified and designated as PS1227. Southern blot analysis indicated 34 distinct bands ranging in size from 1.5 kb-23 kb, of which 21 were polymorphic among 49 isolates examined. Analysis of single-zoospore progenies showed that the PS1227 fingerprint pattern was mitotically stable. DNA fingerprinting showed that the P. sojae isolates HP4002, SY6 and GJ0105 of Heilongjiang are genetically identical to DW303, 71228 and 71222 of Xinjiang, respectively. A moderately repetitive sequence designated PS1227 which will be useful for epidemiology and population biology studies of P. sojae was obtained, and a PS1227-based DNA fingerprinting analysis provided molecular evidence that P. sojae in Xinjiang was likely introduced from Heilongjiang.

  17. Cloning and Characterization of a Complex DNA Fingerprinting Probe for Candida parapsilosis

    Science.gov (United States)

    Enger, Lee; Joly, Sophie; Pujol, Claude; Simonson, Patricia; Pfaller, Michael; Soll, David R.

    2001-01-01

    Candida parapsilosis accounts for a significant number of nosocomial fungemias, but in fact, no effective and verified genetic fingerprinting method has emerged for assessing the relatedness of independent isolates for epidemiological studies. A complex 15-kb DNA fingerprinting probe, Cp3-13, was therefore isolated from a library of C. parapsilosis genomic DNA fragments. The efficacy of Cp3-13 for DNA fingerprinting was verified by a comparison of its clustering capacity with those of randomly amplified polymorphic DNA analysis and internally transcribed spacer region sequencing, by testing species specificity, and by assessing its capacity to identify microevolutionary changes both in vitro and in vivo. Southern blot hybridization of EcoRI/SalI-digested DNA with Cp3-13 provides a fingerprinting system that (i) identifies the same strain in independent isolates, (ii) discriminates between unrelated isolates, (iii) separates independent isolates into valid groups in a dendrogram, (iv) identifies microevolution in infecting populations, and (v) is amenable to automatic computer-assisted DNA fingerprint analysis. This probe is now available for epidemiological studies. PMID:11158125

  18. Examination of Speed Contribution of Parallelization for Several Fingerprint Pre-Processing Algorithms

    Directory of Open Access Journals (Sweden)

    GORGUNOGLU, S.

    2014-05-01

    Full Text Available In analysis of minutiae based fingerprint systems, fingerprints needs to be pre-processed. The pre-processing is carried out to enhance the quality of the fingerprint and to obtain more accurate minutiae points. Reducing the pre-processing time is important for identification and verification in real time systems and especially for databases holding large fingerprints information. Parallel processing and parallel CPU computing can be considered as distribution of processes over multi core processor. This is done by using parallel programming techniques. Reducing the execution time is the main objective in parallel processing. In this study, pre-processing of minutiae based fingerprint system is implemented by parallel processing on multi core computers using OpenMP and on graphics processor using CUDA to improve execution time. The execution times and speedup ratios are compared with the one that of single core processor. The results show that by using parallel processing, execution time is substantially improved. The improvement ratios obtained for different pre-processing algorithms allowed us to make suggestions on the more suitable approaches for parallelization.

  19. Fingerprint image enhancement by differential hysteresis processing.

    Science.gov (United States)

    Blotta, Eduardo; Moler, Emilce

    2004-05-10

    A new method to enhance defective fingerprints images through image digital processing tools is presented in this work. When the fingerprints have been taken without any care, blurred and in some cases mostly illegible, as in the case presented here, their classification and comparison becomes nearly impossible. A combination of spatial domain filters, including a technique called differential hysteresis processing (DHP), is applied to improve these kind of images. This set of filtering methods proved to be satisfactory in a wide range of cases by uncovering hidden details that helped to identify persons. Dactyloscopy experts from Policia Federal Argentina and the EAAF have validated these results.

  20. VideoSET: Video Summary Evaluation through Text

    OpenAIRE

    Yeung, Serena; Fathi, Alireza; Fei-Fei, Li

    2014-01-01

    In this paper we present VideoSET, a method for Video Summary Evaluation through Text that can evaluate how well a video summary is able to retain the semantic information contained in its original video. We observe that semantics is most easily expressed in words, and develop a text-based approach for the evaluation. Given a video summary, a text representation of the video summary is first generated, and an NLP-based metric is then used to measure its semantic distance to ground-truth text ...

  1. Adaptive Noise Model for Transform Domain Wyner-Ziv Video using Clustering of DCT Blocks

    DEFF Research Database (Denmark)

    Luong, Huynh Van; Huang, Xin; Forchhammer, Søren

    2011-01-01

    The noise model is one of the most important aspects influencing the coding performance of Distributed Video Coding. This paper proposes a novel noise model for Transform Domain Wyner-Ziv (TDWZ) video coding by using clustering of DCT blocks. The clustering algorithm takes advantage of the residual...... modelling. Furthermore, the proposed cluster level noise model is adaptively combined with a coefficient level noise model in this paper to robustly improve coding performance of TDWZ video codec up to 1.24 dB (by Bjøntegaard metric) compared to the DISCOVER TDWZ video codec....... information of all frequency bands, iteratively classifies blocks into different categories and estimates the noise parameter in each category. The experimental results show that the coding performance of the proposed cluster level noise model is competitive with state-ofthe- art coefficient level noise...

  2. Development and assessment of microarray-based DNA fingerprinting in Eucalyptus grandis.

    Science.gov (United States)

    Lezar, Sabine; Myburg, A A; Berger, D K; Wingfield, M J; Wingfield, B D

    2004-11-01

    Development of improved Eucalyptus genotypes involves the routine identification of breeding stock and superior clones. Currently, microsatellites and random amplified polymorphic DNA markers are the most widely used DNA-based techniques for fingerprinting of these trees. While these techniques have provided rapid and powerful fingerprinting assays, they are constrained by their reliance on gel or capillary electrophoresis, and therefore, relatively low throughput of fragment analysis. In contrast, recently developed microarray technology holds the promise of parallel analysis of thousands of markers in plant genomes. The aim of this study was to develop a DNA fingerprinting chip for Eucalyptus grandis and to investigate its usefulness for fingerprinting of eucalypt trees. A prototype chip was prepared using a partial genomic library from total genomic DNA of 23 E. grandis trees, of which 22 were full siblings. A total of 384 cloned genomic fragments were individually amplified and arrayed onto glass slides. DNA fingerprints were obtained for 17 individuals by hybridizing labeled genome representations of the individual trees to the 384-element chip. Polymorphic DNA fragments were identified by evaluating the binary distribution of their background-corrected signal intensities across full-sib individuals. Among 384 DNA fragments on the chip, 104 (27%) were found to be polymorphic. Hybridization of these polymorphic fragments was highly repeatable (R2>0.91) within the E. grandis individuals, and they allowed us to identify all 17 full-sib individuals. Our results suggest that DNA microarrays can be used to effectively fingerprint large numbers of closely related Eucalyptus trees.

  3. Carotenoids Database: structures, chemical fingerprints and distribution among organisms.

    Science.gov (United States)

    Yabuzaki, Junko

    2017-01-01

    To promote understanding of how organisms are related via carotenoids, either evolutionarily or symbiotically, or in food chains through natural histories, we built the Carotenoids Database. This provides chemical information on 1117 natural carotenoids with 683 source organisms. For extracting organisms closely related through the biosynthesis of carotenoids, we offer a new similarity search system 'Search similar carotenoids' using our original chemical fingerprint 'Carotenoid DB Chemical Fingerprints'. These Carotenoid DB Chemical Fingerprints describe the chemical substructure and the modification details based upon International Union of Pure and Applied Chemistry (IUPAC) semi-systematic names of the carotenoids. The fingerprints also allow (i) easier prediction of six biological functions of carotenoids: provitamin A, membrane stabilizers, odorous substances, allelochemicals, antiproliferative activity and reverse MDR activity against cancer cells, (ii) easier classification of carotenoid structures, (iii) partial and exact structure searching and (iv) easier extraction of structural isomers and stereoisomers. We believe this to be the first attempt to establish fingerprints using the IUPAC semi-systematic names. For extracting close profiled organisms, we provide a new tool 'Search similar profiled organisms'. Our current statistics show some insights into natural history: carotenoids seem to have been spread largely by bacteria, as they produce C30, C40, C45 and C50 carotenoids, with the widest range of end groups, and they share a small portion of C40 carotenoids with eukaryotes. Archaea share an even smaller portion with eukaryotes. Eukaryotes then have evolved a considerable variety of C40 carotenoids. Considering carotenoids, eukaryotes seem more closely related to bacteria than to archaea aside from 16S rRNA lineage analysis. : http://carotenoiddb.jp. © The Author(s) 2017. Published by Oxford University Press.

  4. A simple low cost latent fingerprint sensor based on deflectometry and WFT analysis

    Science.gov (United States)

    Dhanotia, Jitendra; Chatterjee, Amit; Bhatia, Vimal; Prakash, Shashi

    2018-02-01

    In criminal investigations, latent fingerprints are one of the most significant forms of evidence and most commonly used forensic investigation tool worldwide. The existing non-contact latent fingerprint detection systems are bulky, expensive and require environment which is shock and vibration resistant, thereby limiting their usability outside the laboratory. In this article, a compact, full field, low cost technique for profiling of fingerprints using deflectometry is proposed. Using inexpensive mobile phone screen based structured illumination, and windowed Fourier transform (WFT) based phase retrieval mechanism, the 2D and 3D phase plots reconstruct the profile information of the fingerprint. The phase information is also used to confirm a match between two fingerprints in real time. Since the proposed technique is non-interferometric, the measurements are least affected by environmental perturbations. Using the proposed technique, a portable sensor capable of field deployment has been realized.

  5. Image-based fingerprint verification system using LabVIEW

    Directory of Open Access Journals (Sweden)

    Sunil K. Singla

    2008-09-01

    Full Text Available Biometric-based identification/verification systems provide a solution to the security concerns in the modern world where machine is replacing human in every aspect of life. Fingerprints, because of their uniqueness, are the most widely used and highly accepted biometrics. Fingerprint biometric systems are either minutiae-based or pattern learning (image based. The minutiae-based algorithm depends upon the local discontinuities in the ridge flow pattern and are used when template size is important while image-based matching algorithm uses both the micro and macro feature of a fingerprint and is used if fast response is required. In the present paper an image-based fingerprint verification system is discussed. The proposed method uses a learning phase, which is not present in conventional image-based systems. The learning phase uses pseudo random sub-sampling, which reduces the number of comparisons needed in the matching stage. This system has been developed using LabVIEW (Laboratory Virtual Instrument Engineering Workbench toolbox version 6i. The availability of datalog files in LabVIEW makes it one of the most promising candidates for its usage as a database. Datalog files can access and manipulate data and complex data structures quickly and easily. It makes writing and reading much faster. After extensive experimentation involving a large number of samples and different learning sizes, high accuracy with learning image size of 100 100 and a threshold value of 700 (1000 being the perfect match has been achieved.

  6. Generating One Biometric Feature from Another: Faces from Fingerprints

    Directory of Open Access Journals (Sweden)

    Seref Sagiroglu

    2010-04-01

    Full Text Available This study presents a new approach based on artificial neural networks for generating one biometric feature (faces from another (only fingerprints. An automatic and intelligent system was designed and developed to analyze the relationships among fingerprints and faces and also to model and to improve the existence of the relationships. The new proposed system is the first study that generates all parts of the face including eyebrows, eyes, nose, mouth, ears and face border from only fingerprints. It is also unique and different from similar studies recently presented in the literature with some superior features. The parameter settings of the system were achieved with the help of Taguchi experimental design technique. The performance and accuracy of the system have been evaluated with 10-fold cross validation technique using qualitative evaluation metrics in addition to the expanded quantitative evaluation metrics. Consequently, the results were presented on the basis of the combination of these objective and subjective metrics for illustrating the qualitative properties of the proposed methods as well as a quantitative evaluation of their performances. Experimental results have shown that one biometric feature can be determined from another. These results have once more indicated that there is a strong relationship between fingerprints and faces.

  7. Laser mass spectrometry for DNA fingerprinting for forensic applications

    Science.gov (United States)

    Chen, C. H. Winston; Tang, Kai; Taranenko, N. I.; Allman, S. L.; Ch'ang, L. Y.

    1994-10-01

    The application of DNA fingerprinting has become very broad in forensic analysis, patient identification, diagnostic medicine, and wildlife poaching, since every individual's DNA structure is identical within all tissues oftheir body. DNA fingerprinting was initiated by the use of restriction fragment length polymorphisms (RFLP). In 1987, Nakamura et aL2 found that a variable number of tandem repeats (VNTR) often occurred in the alleles. The probability of different individuals having the same number of tandem repeats in several different alleles is very low. Thus, the identification of VNTR from genomic DNA became a very reliable method for identification of individuals. Take the Huntington gene as an example, there are CAG trinucleotide repeats. For normal people, the number of CAG repeats is usually between 10 and 40. Since people have chromosomes in pairs, the possibility oftwo individuals having the same VNTR in the Huntington gene is less than one percent, ifwe assume equal distribution for various repeats. When several allels containing VNTR are analyzed for the number of repeats, the possibility of two individuals being exactly identical becomes very unlikely. Thus, DNA fingerprinting is a reliable tool for forensic analysis. In DNA fingerprinting, knowledge of the sequence of tandem repeats and restriction endornuclease sites can provide the basis for identification.

  8. Generating One Biometric Feature from Another: Faces from Fingerprints

    Science.gov (United States)

    Ozkaya, Necla; Sagiroglu, Seref

    2010-01-01

    This study presents a new approach based on artificial neural networks for generating one biometric feature (faces) from another (only fingerprints). An automatic and intelligent system was designed and developed to analyze the relationships among fingerprints and faces and also to model and to improve the existence of the relationships. The new proposed system is the first study that generates all parts of the face including eyebrows, eyes, nose, mouth, ears and face border from only fingerprints. It is also unique and different from similar studies recently presented in the literature with some superior features. The parameter settings of the system were achieved with the help of Taguchi experimental design technique. The performance and accuracy of the system have been evaluated with 10-fold cross validation technique using qualitative evaluation metrics in addition to the expanded quantitative evaluation metrics. Consequently, the results were presented on the basis of the combination of these objective and subjective metrics for illustrating the qualitative properties of the proposed methods as well as a quantitative evaluation of their performances. Experimental results have shown that one biometric feature can be determined from another. These results have once more indicated that there is a strong relationship between fingerprints and faces. PMID:22399877

  9. Fingerprint pattern classification approach based on the coordinate geometry of singularities

    CSIR Research Space (South Africa)

    Msiza, IS

    2009-10-01

    Full Text Available of fingerprint matching, it serves to reduce the duration of the query. The fingerprint classes discussed in this document are the Central Twins (CT), Tented Arch (TA), Left Loop (LL), Right Loop (RL) and the Plain Arch (PA). The classification rules employed...

  10. Sex differences in fingerprint ridge density in a Turkish young adult population: a sample of Baskent University.

    Science.gov (United States)

    Oktem, Hale; Kurkcuoglu, Ayla; Pelin, Ismail Can; Yazici, Ayse Canan; Aktaş, Gulnihal; Altunay, Fikret

    2015-05-01

    Fingerprints are considered to be one of the most reliable methods of identification. Identification of an individual plays a vital part of any medico-legal investigations. Dermatoglyphics is a branch of science that studies epidermal ridges and ridge patterns. Epidermal ridges are polygenic characteristics that form intrauterine 10-18 weeks and considered fully developed by the sixth month of fetal growth. Fingerprints are permanent morphological characteristics and criminal detection based on fingerprints is based on the principle that no two people can have identical fingerprints. Sex determination from fingerprints has been examined in different population. In this study we aimed to study fingerprint ridge density in Turkish population sample of Baskent University students. Fingerprints were obtained from 118 women, 88 men a total of 206 students aged between 17 and 28 years old by means of simple inking method. Fingerprints from all right and left hands fingers were collected in three different area of each. The ridges on fingerprints were counted diagonally on squares measuring 5 mm × 5 mm on radial, ulnar and inferior areas. The fingerprint ridge density in radial, ulnar and inferior areas and between sexes was compared statistically Mann Whitney U test and Friedman test. The ridge density was significantly greater in women in every region studied and in all fingers when compared to men. The fingerprint ridge density in the ulnar and radial areas of the fingerprints was significantly greater than the lower area. Fingerprint ridge density can be used by medico-legal examination for sex identification. Copyright © 2015 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  11. A robust probabilistic collaborative representation based classification for multimodal biometrics

    Science.gov (United States)

    Zhang, Jing; Liu, Huanxi; Ding, Derui; Xiao, Jianli

    2018-04-01

    Most of the traditional biometric recognition systems perform recognition with a single biometric indicator. These systems have suffered noisy data, interclass variations, unacceptable error rates, forged identity, and so on. Due to these inherent problems, it is not valid that many researchers attempt to enhance the performance of unimodal biometric systems with single features. Thus, multimodal biometrics is investigated to reduce some of these defects. This paper proposes a new multimodal biometric recognition approach by fused faces and fingerprints. For more recognizable features, the proposed method extracts block local binary pattern features for all modalities, and then combines them into a single framework. For better classification, it employs the robust probabilistic collaborative representation based classifier to recognize individuals. Experimental results indicate that the proposed method has improved the recognition accuracy compared to the unimodal biometrics.

  12. DWI-based neural fingerprinting technology: a preliminary study on stroke analysis.

    Science.gov (United States)

    Ye, Chenfei; Ma, Heather Ting; Wu, Jun; Yang, Pengfei; Chen, Xuhui; Yang, Zhengyi; Ma, Jingbo

    2014-01-01

    Stroke is a common neural disorder in neurology clinics. Magnetic resonance imaging (MRI) has become an important tool to assess the neural physiological changes under stroke, such as diffusion weighted imaging (DWI) and diffusion tensor imaging (DTI). Quantitative analysis of MRI images would help medical doctors to localize the stroke area in the diagnosis in terms of structural information and physiological characterization. However, current quantitative approaches can only provide localization of the disorder rather than measure physiological variation of subtypes of ischemic stroke. In the current study, we hypothesize that each kind of neural disorder would have its unique physiological characteristics, which could be reflected by DWI images on different gradients. Based on this hypothesis, a DWI-based neural fingerprinting technology was proposed to classify subtypes of ischemic stroke. The neural fingerprint was constructed by the signal intensity of the region of interest (ROI) on the DWI images under different gradients. The fingerprint derived from the manually drawn ROI could classify the subtypes with accuracy 100%. However, the classification accuracy was worse when using semiautomatic and automatic method in ROI segmentation. The preliminary results showed promising potential of DWI-based neural fingerprinting technology in stroke subtype classification. Further studies will be carried out for enhancing the fingerprinting accuracy and its application in other clinical practices.

  13. Motif-role-fingerprints: the building-blocks of motifs, clustering-coefficients and transitivities in directed networks.

    Directory of Open Access Journals (Sweden)

    Mark D McDonnell

    Full Text Available Complex networks are frequently characterized by metrics for which particular subgraphs are counted. One statistic from this category, which we refer to as motif-role fingerprints, differs from global subgraph counts in that the number of subgraphs in which each node participates is counted. As with global subgraph counts, it can be important to distinguish between motif-role fingerprints that are 'structural' (induced subgraphs and 'functional' (partial subgraphs. Here we show mathematically that a vector of all functional motif-role fingerprints can readily be obtained from an arbitrary directed adjacency matrix, and then converted to structural motif-role fingerprints by multiplying that vector by a specific invertible conversion matrix. This result demonstrates that a unique structural motif-role fingerprint exists for any given functional motif-role fingerprint. We demonstrate a similar result for the cases of functional and structural motif-fingerprints without node roles, and global subgraph counts that form the basis of standard motif analysis. We also explicitly highlight that motif-role fingerprints are elemental to several popular metrics for quantifying the subgraph structure of directed complex networks, including motif distributions, directed clustering coefficient, and transitivity. The relationships between each of these metrics and motif-role fingerprints also suggest new subtypes of directed clustering coefficients and transitivities. Our results have potential utility in analyzing directed synaptic networks constructed from neuronal connectome data, such as in terms of centrality. Other potential applications include anomaly detection in networks, identification of similar networks and identification of similar nodes within networks. Matlab code for calculating all stated metrics following calculation of functional motif-role fingerprints is provided as S1 Matlab File.

  14. Traceability and Quality Control in Traditional Chinese Medicine: From Chemical Fingerprint to Two-Dimensional Barcode

    Directory of Open Access Journals (Sweden)

    Yong Cai

    2015-01-01

    Full Text Available Chemical fingerprinting is currently a widely used tool that enables rapid and accurate quality evaluation of Traditional Chinese Medicine (TCM. However, chemical fingerprints are not amenable to information storage, recognition, and retrieval, which limit their use in Chinese medicine traceability. In this study, samples of three kinds of Chinese medicines were randomly selected and chemical fingerprints were then constructed by using high performance liquid chromatography. Based on chemical data, the process of converting the TCM chemical fingerprint into two-dimensional code is presented; preprocess and filtering algorithm are also proposed aiming at standardizing the large amount of original raw data. In order to know which type of two-dimensional code (2D is suitable for storing data of chemical fingerprints, current popular types of 2D codes are analyzed and compared. Results show that QR Code is suitable for recording the TCM chemical fingerprint. The fingerprint information of TCM can be converted into data format that can be stored as 2D code for traceability and quality control.

  15. Robust, Efficient Depth Reconstruction With Hierarchical Confidence-Based Matching.

    Science.gov (United States)

    Sun, Li; Chen, Ke; Song, Mingli; Tao, Dacheng; Chen, Gang; Chen, Chun

    2017-07-01

    In recent years, taking photos and capturing videos with mobile devices have become increasingly popular. Emerging applications based on the depth reconstruction technique have been developed, such as Google lens blur. However, depth reconstruction is difficult due to occlusions, non-diffuse surfaces, repetitive patterns, and textureless surfaces, and it has become more difficult due to the unstable image quality and uncontrolled scene condition in the mobile setting. In this paper, we present a novel hierarchical framework with multi-view confidence-based matching for robust, efficient depth reconstruction in uncontrolled scenes. Particularly, the proposed framework combines local cost aggregation with global cost optimization in a complementary manner that increases efficiency and accuracy. A depth map is efficiently obtained in a coarse-to-fine manner by using an image pyramid. Moreover, confidence maps are computed to robustly fuse multi-view matching cues, and to constrain the stereo matching on a finer scale. The proposed framework has been evaluated with challenging indoor and outdoor scenes, and has achieved robust and efficient depth reconstruction.

  16. Soil-gas diffusivity fingerprints of the dual porosity system in fractured limestone

    DEFF Research Database (Denmark)

    Claes, Niels; Chamindu, D.T.K.K.; Jensen, Jacob Birk

    2010-01-01

    processes are mostly limited to hydrogeological (water and solute) transport studies with very poor attention to the gaseous phase transport studies (Kristensen et al. 2010). This study characterizes fractured limestone soils for gas diffusion based on three different gas diffusivity fingerprints. The first...... fingerprint is a two-parameter exponential model, which mainly describes the gas diffusivity in the limestone matrix while taking both fracture connectivity and matrix pore connectivity into account. With the second fingerprint, we make a close observation of the tortuous matrix pore network by means...... of a modified Buckingham (1904) pore connectivity factor (X*). The third fingerprint of the fracture network involves the average angle of diffusion α (Moldrup et al. 2010), a parameter which characterizes the average angle at which the fractures are penetrating the sample....

  17. [Study on the fingerprint of Morus alba from different habitats by HPLC].

    Science.gov (United States)

    Chen, Cheng; Li, Hong-Bo; Wang, Liu-Ping; Li, Yun-Rong; Xin, Ning

    2012-12-01

    To establish HPLC fingerprint of Morus alba from different habitats by HPLC and provide basis for its quality control. HPLC analysis was performed on an Agilent XDB C18 Column (4.6 mm x 250 mm, 5 microm), gradient eluted composed of acetonitrile and 0.3% phosphate acid. The column temperature was set at 35 degrees C and the flow rate was 0.5 mL/min. The detective wavelength was 290 nm. The HPLC fingerprint for 10 batches of Morus alba was studied on their similarity. There were twelve common peaks in the fingerprint. The similarity of 7 batches was above 0.9 and the other batches had low similarity. The HPLC fingerprint can be used for quality control of Morus alba with high characteristics and specificity.

  18. Chemical Visualization of Sweat Pores in Fingerprints Using GO-Enhanced TOF-SIMS.

    Science.gov (United States)

    Cai, Lesi; Xia, Meng-Chan; Wang, Zhaoying; Zhao, Ya-Bin; Li, Zhanping; Zhang, Sichun; Zhang, Xinrong

    2017-08-15

    Time-of-flight secondary ion mass spectrometry (TOF-SIMS) has been used in imaging of small molecules (SIMS was used to detect and image relatively high mass molecules such as poison, alkaloids (>600 Da) and controlled drugs, and antibiotics (>700 Da) in fingerprints. Detail features of fingerprints such as the number and distribution of sweat pores in a ridge and even the delicate morphology of one pore were clearly revealed in SIMS images of relatively high mass molecules. The detail features combining with identified chemical composition were sufficient to establish a human identity and link the suspect to a crime scene. The wide detectable mass range and high spatial resolution make GO-enhanced TOF-SIMS a promising tool in accurate and fast analysis of fingerprints, especially in fragmental fingerprint analysis.

  19. Similarity analyses of chromatographic herbal fingerprints: A review

    International Nuclear Information System (INIS)

    Goodarzi, Mohammad; Russell, Paul J.; Vander Heyden, Yvan

    2013-01-01

    Graphical abstract: -- Highlights: •Similarity analyses of herbal fingerprints are reviewed. •Different (dis)similarity approaches are discussed. •(Dis)similarity-metrics and exploratory-analysis approaches are illustrated. •Correlation and distance-based measures are overviewed. •Similarity analyses illustrated by several case studies. -- Abstract: Herbal medicines are becoming again more popular in the developed countries because being “natural” and people thus often assume that they are inherently safe. Herbs have also been used worldwide for many centuries in the traditional medicines. The concern of their safety and efficacy has grown since increasing western interest. Herbal materials and their extracts are very complex, often including hundreds of compounds. A thorough understanding of their chemical composition is essential for conducting a safety risk assessment. However, herbal material can show considerable variability. The chemical constituents and their amounts in a herb can be different, due to growing conditions, such as climate and soil, the drying process, the harvest season, etc. Among the analytical methods, chromatographic fingerprinting has been recommended as a potential and reliable methodology for the identification and quality control of herbal medicines. Identification is needed to avoid fraud and adulteration. Currently, analyzing chromatographic herbal fingerprint data sets has become one of the most applied tools in quality assessment of herbal materials. Mostly, the entire chromatographic profiles are used to identify or to evaluate the quality of the herbs investigated. Occasionally only a limited number of compounds are considered. One approach to the safety risk assessment is to determine whether the herbal material is substantially equivalent to that which is either readily consumed in the diet, has a history of application or has earlier been commercialized i.e. to what is considered as reference material. In order

  20. Similarity analyses of chromatographic herbal fingerprints: A review

    Energy Technology Data Exchange (ETDEWEB)

    Goodarzi, Mohammad [Department of Analytical Chemistry and Pharmaceutical Technology, Center for Pharmaceutical Research, Vrije Universiteit Brussel, Laarbeeklaan 103, B-1090 Brussels (Belgium); Russell, Paul J. [Safety and Environmental Assurance Centre, Unilever, Colworth Science Park, Sharnbrook, Bedfordshire MK44 1LQ (United Kingdom); Vander Heyden, Yvan, E-mail: yvanvdh@vub.ac.be [Department of Analytical Chemistry and Pharmaceutical Technology, Center for Pharmaceutical Research, Vrije Universiteit Brussel, Laarbeeklaan 103, B-1090 Brussels (Belgium)

    2013-12-04

    Graphical abstract: -- Highlights: •Similarity analyses of herbal fingerprints are reviewed. •Different (dis)similarity approaches are discussed. •(Dis)similarity-metrics and exploratory-analysis approaches are illustrated. •Correlation and distance-based measures are overviewed. •Similarity analyses illustrated by several case studies. -- Abstract: Herbal medicines are becoming again more popular in the developed countries because being “natural” and people thus often assume that they are inherently safe. Herbs have also been used worldwide for many centuries in the traditional medicines. The concern of their safety and efficacy has grown since increasing western interest. Herbal materials and their extracts are very complex, often including hundreds of compounds. A thorough understanding of their chemical composition is essential for conducting a safety risk assessment. However, herbal material can show considerable variability. The chemical constituents and their amounts in a herb can be different, due to growing conditions, such as climate and soil, the drying process, the harvest season, etc. Among the analytical methods, chromatographic fingerprinting has been recommended as a potential and reliable methodology for the identification and quality control of herbal medicines. Identification is needed to avoid fraud and adulteration. Currently, analyzing chromatographic herbal fingerprint data sets has become one of the most applied tools in quality assessment of herbal materials. Mostly, the entire chromatographic profiles are used to identify or to evaluate the quality of the herbs investigated. Occasionally only a limited number of compounds are considered. One approach to the safety risk assessment is to determine whether the herbal material is substantially equivalent to that which is either readily consumed in the diet, has a history of application or has earlier been commercialized i.e. to what is considered as reference material. In order

  1. Converting Panax ginseng DNA and chemical fingerprints into two-dimensional barcode.

    Science.gov (United States)

    Cai, Yong; Li, Peng; Li, Xi-Wen; Zhao, Jing; Chen, Hai; Yang, Qing; Hu, Hao

    2017-07-01

    In this study, we investigated how to convert the Panax ginseng DNA sequence code and chemical fingerprints into a two-dimensional code. In order to improve the compression efficiency, GATC2Bytes and digital merger compression algorithms are proposed. HPLC chemical fingerprint data of 10 groups of P. ginseng from Northeast China and the internal transcribed spacer 2 (ITS2) sequence code as the DNA sequence code were ready for conversion. In order to convert such data into a two-dimensional code, the following six steps were performed: First, the chemical fingerprint characteristic data sets were obtained through the inflection filtering algorithm. Second, precompression processing of such data sets is undertaken. Third, precompression processing was undertaken with the P. ginseng DNA (ITS2) sequence codes. Fourth, the precompressed chemical fingerprint data and the DNA (ITS2) sequence code were combined in accordance with the set data format. Such combined data can be compressed by Zlib, an open source data compression algorithm. Finally, the compressed data generated a two-dimensional code called a quick response code (QR code). Through the abovementioned converting process, it can be found that the number of bytes needed for storing P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can be greatly reduced. After GTCA2Bytes algorithm processing, the ITS2 compression rate reaches 75% and the chemical fingerprint compression rate exceeds 99.65% via filtration and digital merger compression algorithm processing. Therefore, the overall compression ratio even exceeds 99.36%. The capacity of the formed QR code is around 0.5k, which can easily and successfully be read and identified by any smartphone. P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can form a QR code after data processing, and therefore the QR code can be a perfect carrier of the authenticity and quality of P. ginseng information. This study provides a theoretical

  2. [An analysis of the DNA fingerprinting of intestinal flora in inflammatory bowel disease].

    Science.gov (United States)

    Li, Run-mei; Han, Ying; Wang, Ji-heng; Wang, Zhi-hong

    2007-02-01

    DNA fingerprinting for inflammatory bowel disease (IBD) patients and healthy subjects was carried out to compare the difference of intestinal flora between the two groups. DNA fingerprinting for IBD patients and healthy persons was set up with enterobacterial repetitive intergenic consensus (ERIC-PCR) technology and the difference of intestinal flora between the two groups compared. DNA fingerprinting of the IBD patients and healthy subjects was identified and a significant difference was noticed between them. There were lots of bands in the DNA fingerprinting of the healthy subjects but few in that of the IBD patients. Strikingly, same distribution of the principal band of DNA fingerprinting was noticed in IBD patients. The variety of intestinal flora in healthy subjects is more apparent than that in IBD patients. An unique principal band might be the sequence of the presence of specific etiopathogenetic bacterium, or it might be the combined sequence of mixed bacterial flora.

  3. In Silico Genomic Fingerprints of the Bacillus anthracis Group Obtained by Virtual Hybridization

    Directory of Open Access Journals (Sweden)

    Hueman Jaimes-Díaz

    2015-02-01

    Full Text Available In this study we evaluate the capacity of Virtual Hybridization to identify between highly related bacterial strains. Eight genomic fingerprints were obtained by virtual hybridization for the Bacillus anthracis genome set, and a set of 15,264 13-nucleotide short probes designed to produce genomic fingerprints unique for each organism. The data obtained from each genomic fingerprint were used to obtain hybridization patterns simulating a DNA microarray. Two virtual hybridization methods were used: the Direct and the Extended method to identify the number of potential hybridization sites and thus determine the minimum sensitivity value to discriminate between genomes with 99.9% similarity. Genomic fingerprints were compared using both methods and phylogenomic trees were constructed to verify that the minimum detection value is 0.000017. Results obtained from the genomic fingerprints suggest that the distribution in the trees is correct, as compared to other taxonomic methods. Specific virtual hybridization sites for each of the genomes studied were also identified.

  4. High perfomance liquid chromatography fingerprint analysis for quality control of brotowali (Tinospora crispa)

    Science.gov (United States)

    Syarifah, V. B.; Rafi, M.; Wahyuni, W. T.

    2017-05-01

    Brotowali (Tinospora crispa) is widely used in Indonesia as ingredient of herbal medicine formulation. To ensure the quality, safety, and efficacy of herbal medicine products, its chemical constituents should be continuously evaluated. High performance liquid chromatography (HPLC) fingerprint is one of powerful technique for this quality control process. In this study, HPLC fingerprint analysis method was developed for quality control of brotowali. HPLC analysis was performed in C18 column and detection was performed using photodiode array detector. The optimum mobile phase for brotowali fingerprint was acetonitrile (ACN) and 0.1% formic acid in gradient elution mode at a flow rate of 1 mL/min. The number of peaks detected in HPLC fingerprint of brotowali was 32 peaks and 23 peaks for stems and leaves, respectively. Berberine as marker compound was detected at retention time of 20.525 minutes. Evaluation of analytical performance including precision, reproducibility, and stability prove that this HPLC fingerprint analysis was reliable and could be applied for quality control of brotowali.

  5. Combining Biometric Fractal Pattern and Particle Swarm Optimization-Based Classifier for Fingerprint Recognition

    Directory of Open Access Journals (Sweden)

    Chia-Hung Lin

    2010-01-01

    Full Text Available This paper proposes combining the biometric fractal pattern and particle swarm optimization (PSO-based classifier for fingerprint recognition. Fingerprints have arch, loop, whorl, and accidental morphologies, and embed singular points, resulting in the establishment of fingerprint individuality. An automatic fingerprint identification system consists of two stages: digital image processing (DIP and pattern recognition. DIP is used to convert to binary images, refine out noise, and locate the reference point. For binary images, Katz's algorithm is employed to estimate the fractal dimension (FD from a two-dimensional (2D image. Biometric features are extracted as fractal patterns using different FDs. Probabilistic neural network (PNN as a classifier performs to compare the fractal patterns among the small-scale database. A PSO algorithm is used to tune the optimal parameters and heighten the accuracy. For 30 subjects in the laboratory, the proposed classifier demonstrates greater efficiency and higher accuracy in fingerprint recognition.

  6. Biometric Fingerprint System to Enable Rapid and Accurate Identification of Beneficiaries

    OpenAIRE

    Storisteanu, Daniel Matthew L; Norman, Toby L; Grigore, Alexandra; Norman, Tristram L

    2015-01-01

    Inability to uniquely identify clients impedes access to services and contributes to inefficiencies. Using a pocket-sized fingerprint scanner that wirelessly syncs with a health worker's smartphone, the SimPrints biometric system can link individuals' fingerprints to their health records. A pilot in Bangladesh will assess its potential.

  7. Chaos based video encryption using maps and Ikeda time delay system

    Science.gov (United States)

    Valli, D.; Ganesan, K.

    2017-12-01

    Chaos based cryptosystems are an efficient method to deal with improved speed and highly secured multimedia encryption because of its elegant features, such as randomness, mixing, ergodicity, sensitivity to initial conditions and control parameters. In this paper, two chaos based cryptosystems are proposed: one is the higher-dimensional 12D chaotic map and the other is based on the Ikeda delay differential equation (DDE) suitable for designing a real-time secure symmetric video encryption scheme. These encryption schemes employ a substitution box (S-box) to diffuse the relationship between pixels of plain video and cipher video along with the diffusion of current input pixel with the previous cipher pixel, called cipher block chaining (CBC). The proposed method enhances the robustness against statistical, differential and chosen/known plain text attacks. Detailed analysis is carried out in this paper to demonstrate the security and uniqueness of the proposed scheme.

  8. Perancangan Aplikasi Presensi Dosen Realtime Dengan Metode Rapid Application Development (RAD Menggunakan Fingerprint Berbasis Web

    Directory of Open Access Journals (Sweden)

    Darma Setiawan Putra

    2018-05-01

    Full Text Available The fingerprint is one of the biometric methods which is can be used in the education field. Attendance monitoring system using fingerprint will make the leaders easily to monitor the attendance of the lecturer and to make decisions. The fingerprint attendance is used to easy students detecting quickly and accurately the lecturer in the classroom. This system aims to provide the lecturer status information, entry or exit for teaching when every lecturer performs a fingerprint scanning. This study uses rapid application development (RAD method to develop attendance system and involves the lecturer who have a teaching schedule in the current semester. To test the system, the lecturer was required to record the fingerprint in fingerprint machine. The result shows that the application of lecturer attendance in real time web-based can be a system provides the lecturers attendance information effectively and efficiently.

  9. Fingerprint detection on counterfeit US dollar banknotes: the importance of preliminary paper examination.

    Science.gov (United States)

    Azoury, Myriam; Cohen, Drorit; Himberg, Kimmo; Qvintus-Leino, Pia; Saari, Terhi; Almog, Joseph

    2004-09-01

    Two seizures of counterfeit 100 US dollar bills related to the same indicative number were submitted for processing of latent fingerprints. On one group of notes, identifiable fingerprints could be detected by the routine application of amino acid reagents. In the second case, this technique gave no results, even on deliberately deposited prints. Fingerprints could be revealed, however, by cyanoacrylate fuming followed by magnetic powder. Comprehensive paper analysis showed that banknotes from both seizures differed remarkably by chemical composition as well as paper macroscopic properties. The difference in surface free energy (related to surface tension) of the banknotes in the two groups seemed to be the major factor responsible for the great variance in fingerprint detectability.

  10. Molecular Fingerprinting Approach in Plant Species Evaluation for a Nuclear Power Programme

    International Nuclear Information System (INIS)

    Azhar Mohamed

    2011-01-01

    Deoxyribonucleic acid (DNA) as a tool for marker technology is found to be remarkable, advanced and exciting in recent years. DNA markers are valuable tools and important in various plant breeding analyses for identification, gene mapping, marker systems and mutagenesis response. As gene expression is related to concurrent cellular activities and is mobilised in the adaptation of plants to adverse environmental conditions, changes at the DNA levels can be detected simultaneously. The changes also reflect response onto plant traits in which selection for better quality plant materials can be made and/or used as bio-indicator response in tracking any environmental change. The objective of the present study is to show Inter Simple Sequence Repeat (ISSR) markers as an important technique in differentiating plant DNA genomic in various species for the evaluation of their diversity and radiation effects in population. The technique has been found to be rapid, simple, reliable and robust in generating molecular fingerprinting database in bio surveillance for a nuclear power programme. (author)

  11. Provenancing Flower Bulbs by Analytical Fingerprinting: Convallaria Majalis

    Directory of Open Access Journals (Sweden)

    Saskia M. van Ruth

    2015-01-01

    Full Text Available The origin of agricultural products is gaining in appreciation while often hard to determine for various reasons. Geographical origin may be resolved using a combination of chemical and physical analytical technologies. In the present case of Lily of the Valley (Convallaria majalis rhizomes, we investigated an exploratory set of material from The Netherlands, three other European (EU countries and China. We show that the geographical origin is correlated to patterns of stable isotope ratios (isotope fingerprints and volatile organic carbon (VOC compounds (chemical fingerprints. These fingerprints allowed clear distinction using exploratory and supervised statistics. Isotope ratio mass spectrometry of 12C/13C, 14N/15N and 16O/18O isotopes separated materials from Europe and China successfully. The VOC patterns measured by Proton Transfer Reaction Mass Spectrometry (PTR-MS allowed distinction of three groups: material from The Netherlands, the other EU countries and China. This knowledge is expected to help developing a systematic and efficient analytical tool for authenticating the origin of flower bulbs.

  12. Violent Interaction Detection in Video Based on Deep Learning

    Science.gov (United States)

    Zhou, Peipei; Ding, Qinghai; Luo, Haibo; Hou, Xinglin

    2017-06-01

    Violent interaction detection is of vital importance in some video surveillance scenarios like railway stations, prisons or psychiatric centres. Existing vision-based methods are mainly based on hand-crafted features such as statistic features between motion regions, leading to a poor adaptability to another dataset. En lightened by the development of convolutional networks on common activity recognition, we construct a FightNet to represent the complicated visual violence interaction. In this paper, a new input modality, image acceleration field is proposed to better extract the motion attributes. Firstly, each video is framed as RGB images. Secondly, optical flow field is computed using the consecutive frames and acceleration field is obtained according to the optical flow field. Thirdly, the FightNet is trained with three kinds of input modalities, i.e., RGB images for spatial networks, optical flow images and acceleration images for temporal networks. By fusing results from different inputs, we conclude whether a video tells a violent event or not. To provide researchers a common ground for comparison, we have collected a violent interaction dataset (VID), containing 2314 videos with 1077 fight ones and 1237 no-fight ones. By comparison with other algorithms, experimental results demonstrate that the proposed model for violent interaction detection shows higher accuracy and better robustness.

  13. The ASDEX upgrade digital video processing system for real-time machine protection

    Energy Technology Data Exchange (ETDEWEB)

    Drube, Reinhard, E-mail: reinhard.drube@ipp.mpg.de [Max-Planck-Institut für Plasmaphysik, EURATOM Association, Boltzmannstr. 2, 85748 Garching (Germany); Neu, Gregor [Max-Planck-Institut für Plasmaphysik, EURATOM Association, Boltzmannstr. 2, 85748 Garching (Germany); Cole, Richard H.; Lüddecke, Klaus [Unlimited Computer Systems GmbH, Seeshaupterstr. 15, 82393 Iffeldorf (Germany); Lunt, Tilmann; Herrmann, Albrecht [Max-Planck-Institut für Plasmaphysik, EURATOM Association, Boltzmannstr. 2, 85748 Garching (Germany)

    2013-11-15

    Highlights: • We present the Real-Time Video diagnostic system of ASDEX Upgrade. • We show the implemented image processing algorithms for machine protection. • The way to achieve a robust operating multi-threading Real-Time system is described. -- Abstract: This paper describes the design, implementation, and operation of the Video Real-Time (VRT) diagnostic system of the ASDEX Upgrade plasma experiment and its integration with the ASDEX Upgrade Discharge Control System (DCS). Hot spots produced by heating systems erroneously or accidentally hitting the vessel walls, or from objects in the vessel reaching into the plasma outer border, show up as bright areas in the videos during and after the reaction. A system to prevent damage to the machine by allowing for intervention in a running discharge of the experiment was proposed and implemented. The VRT was implemented on a multi-core real-time Linux system. Up to 16 analog video channels (color and b/w) are acquired and multiple regions of interest (ROI) are processed on each video frame. Detected critical states can be used to initiate appropriate reactions – e.g. gracefully terminate the discharge. The system has been in routine operation since 2007.

  14. Video-based Chinese Input System via Fingertip Tracking

    Directory of Open Access Journals (Sweden)

    Chih-Chang Yu

    2012-10-01

    Full Text Available In this paper, we propose a system to detect and track fingertips online and recognize Mandarin Phonetic Symbol (MPS for user-friendly Chinese input purposes. Using fingertips and cameras to replace pens and touch panels as input devices could reduce the cost and improve the ease-of-use and comfort of computer-human interface. In the proposed framework, particle filters with enhanced appearance models are applied for robust fingertip tracking. Afterwards, MPS combination recognition is performed on the tracked fingertip trajectories using Hidden Markov Models. In the proposed system, the fingertips of the users could be robustly tracked. Also, the challenges of entering, leaving and virtual strokes caused by video-based fingertip input can be overcome. Experimental results have shown the feasibility and effectiveness of the proposed work.

  15. Cluster analysis of Helicobacter pylori genomic DNA fingerprints suggests gastroduodenal disease-specific associations.

    Science.gov (United States)

    Go, M F; Chan, K Y; Versalovic, J; Koeuth, T; Graham, D Y; Lupski, J R

    1995-07-01

    Helicobacter pylori infection is now accepted as the most common cause of chronic active gastritis and peptic ulcer disease. The etiologies of many infectious diseases have been attributed to specific or clonal strains of bacterial pathogens. Polymerase chain reaction (PCR) amplification of DNA between repetitive DNA sequences, REP elements (REP-PCR), has been utilized to generate DNA fingerprints to examine similarity among strains within a bacterial species. Genomic DNA from H. pylori isolates obtained from 70 individuals (39 duodenal ulcers and 31 simple gastritis) was PCR-amplified using consensus probes to repetitive DNA elements. The H. pylori DNA fingerprints were analyzed for similarity and correlated with disease presentation using the NTSYS-pc computer program. Each H. pylori strain had a distinct DNA fingerprint except for two pairs. Single-colony DNA fingerprints of H. pylori from the same patient were identical, suggesting that each patient harbors a single strain. Computer-assisted cluster analysis of the REP-PCR DNA fingerprints showed two large clusters of isolates, one associated with simple gastritis and the other with duodenal ulcer disease. Cluster analysis of REP-PCR DNA fingerprints of H. pylori strains suggests that duodenal ulcer isolates, as a group, are more similar to one another and different from gastritis isolates. These results suggest that disease-specific strains may exist.

  16. Robust Floor Determination Algorithm for Indoor Wireless Localization Systems under Reference Node Failure

    Directory of Open Access Journals (Sweden)

    Kriangkrai Maneerat

    2016-01-01

    Full Text Available One of the challenging problems for indoor wireless multifloor positioning systems is the presence of reference node (RN failures, which cause the values of received signal strength (RSS to be missed during the online positioning phase of the location fingerprinting technique. This leads to performance degradation in terms of floor accuracy, which in turn affects other localization procedures. This paper presents a robust floor determination algorithm called Robust Mean of Sum-RSS (RMoS, which can accurately determine the floor on which mobile objects are located and can work under either the fault-free scenario or the RN-failure scenarios. The proposed fault tolerance floor algorithm is based on the mean of the summation of the strongest RSSs obtained from the IEEE 802.15.4 Wireless Sensor Networks (WSNs during the online phase. The performance of the proposed algorithm is compared with those of different floor determination algorithms in literature. The experimental results show that the proposed robust floor determination algorithm outperformed the other floor algorithms and can achieve the highest percentage of floor determination accuracy in all scenarios tested. Specifically, the proposed algorithm can achieve greater than 95% correct floor determination under the scenario in which 40% of RNs failed.

  17. DNA fingerprinting of Chinese melon provides evidentiary support of seed quality appraisal.

    Science.gov (United States)

    Gao, Peng; Ma, Hongyan; Luan, Feishi; Song, Haibin

    2012-01-01

    Melon, Cucumis melo L. is an important vegetable crop worldwide. At present, there are phenomena of homonyms and synonyms present in the melon seed markets of China, which could cause variety authenticity issues influencing the process of melon breeding, production, marketing and other aspects. Molecular markers, especially microsatellites or simple sequence repeats (SSRs) are playing increasingly important roles for cultivar identification. The aim of this study was to construct a DNA fingerprinting database of major melon cultivars, which could provide a possibility for the establishment of a technical standard system for purity and authenticity identification of melon seeds. In this study, to develop the core set SSR markers, 470 polymorphic SSRs were selected as the candidate markers from 1219 SSRs using 20 representative melon varieties (lines). Eighteen SSR markers, evenly distributed across the genome and with the highest contents of polymorphism information (PIC) were identified as the core marker set for melon DNA fingerprinting analysis. Fingerprint codes for 471 melon varieties (lines) were established. There were 51 materials which were classified into17 groups based on sharing the same fingerprint code, while field traits survey results showed that these plants in the same group were synonyms because of the same or similar field characters. Furthermore, DNA fingerprinting quick response (QR) codes of 471 melon varieties (lines) were constructed. Due to its fast readability and large storage capacity, QR coding melon DNA fingerprinting is in favor of read convenience and commercial applications.

  18. DNA Fingerprinting of Chinese Melon Provides Evidentiary Support of Seed Quality Appraisal

    Science.gov (United States)

    Gao, Peng; Ma, Hongyan; Luan, Feishi; Song, Haibin

    2012-01-01

    Melon, Cucumis melo L. is an important vegetable crop worldwide. At present, there are phenomena of homonyms and synonyms present in the melon seed markets of China, which could cause variety authenticity issues influencing the process of melon breeding, production, marketing and other aspects. Molecular markers, especially microsatellites or simple sequence repeats (SSRs) are playing increasingly important roles for cultivar identification. The aim of this study was to construct a DNA fingerprinting database of major melon cultivars, which could provide a possibility for the establishment of a technical standard system for purity and authenticity identification of melon seeds. In this study, to develop the core set SSR markers, 470 polymorphic SSRs were selected as the candidate markers from 1219 SSRs using 20 representative melon varieties (lines). Eighteen SSR markers, evenly distributed across the genome and with the highest contents of polymorphism information (PIC) were identified as the core marker set for melon DNA fingerprinting analysis. Fingerprint codes for 471 melon varieties (lines) were established. There were 51 materials which were classified into17 groups based on sharing the same fingerprint code, while field traits survey results showed that these plants in the same group were synonyms because of the same or similar field characters. Furthermore, DNA fingerprinting quick response (QR) codes of 471 melon varieties (lines) were constructed. Due to its fast readability and large storage capacity, QR coding melon DNA fingerprinting is in favor of read convenience and commercial applications. PMID:23285039

  19. DNA fingerprinting of Chinese melon provides evidentiary support of seed quality appraisal.

    Directory of Open Access Journals (Sweden)

    Peng Gao

    Full Text Available Melon, Cucumis melo L. is an important vegetable crop worldwide. At present, there are phenomena of homonyms and synonyms present in the melon seed markets of China, which could cause variety authenticity issues influencing the process of melon breeding, production, marketing and other aspects. Molecular markers, especially microsatellites or simple sequence repeats (SSRs are playing increasingly important roles for cultivar identification. The aim of this study was to construct a DNA fingerprinting database of major melon cultivars, which could provide a possibility for the establishment of a technical standard system for purity and authenticity identification of melon seeds. In this study, to develop the core set SSR markers, 470 polymorphic SSRs were selected as the candidate markers from 1219 SSRs using 20 representative melon varieties (lines. Eighteen SSR markers, evenly distributed across the genome and with the highest contents of polymorphism information (PIC were identified as the core marker set for melon DNA fingerprinting analysis. Fingerprint codes for 471 melon varieties (lines were established. There were 51 materials which were classified into17 groups based on sharing the same fingerprint code, while field traits survey results showed that these plants in the same group were synonyms because of the same or similar field characters. Furthermore, DNA fingerprinting quick response (QR codes of 471 melon varieties (lines were constructed. Due to its fast readability and large storage capacity, QR coding melon DNA fingerprinting is in favor of read convenience and commercial applications.

  20. Structural Fingerprints of Transcription Factor Binding Site Regions

    Directory of Open Access Journals (Sweden)

    Peter Willett

    2009-03-01

    Full Text Available Fourier transforms are a powerful tool in the prediction of DNA sequence properties, such as the presence/absence of codons. We have previously compiled a database of the structural properties of all 32,896 unique DNA octamers. In this work we apply Fourier techniques to the analysis of the structural properties of human chromosomes 21 and 22 and also to three sets of transcription factor binding sites within these chromosomes. We find that, for a given structural property, the structural property power spectra of chromosomes 21 and 22 are strikingly similar. We find common peaks in their power spectra for both Sp1 and p53 transcription factor binding sites. We use the power spectra as a structural fingerprint and perform similarity searching in order to find transcription factor binding site regions. This approach provides a new strategy for searching the genome data for information. Although it is difficult to understand the relationship between specific functional properties and the set of structural parameters in our database, our structural fingerprints nevertheless provide a useful tool for searching for function information in sequence data. The power spectrum fingerprints provide a simple, fast method for comparing a set of functional sequences, in this case transcription factor binding site regions, with the sequences of whole chromosomes. On its own, the power spectrum fingerprint does not find all transcription factor binding sites in a chromosome, but the results presented here show that in combination with other approaches, this technique will improve the chances of identifying functional sequences hidden in genomic data.

  1. Chromatographic fingerprinting: An innovative approach for food 'identitation' and food authentication - A tutorial.

    Science.gov (United States)

    Cuadros-Rodríguez, Luis; Ruiz-Samblás, Cristina; Valverde-Som, Lucia; Pérez-Castaño, Estefanía; González-Casado, Antonio

    2016-02-25

    Fingerprinting methods describe a variety of analytical methods that provide analytical signals related to the composition of foodstuffs in a non-selective way such as by collecting a spectrum or a chromatogram. Mathematical processing of the information in such fingerprints may allow the characterisation and/or authentication of foodstuffs. In this context, the particular meaning of 'fingerprinting', in conjunction with 'profiling', is different from the original meanings used in metabolomics. This fact has produced some confusion with the use of these terms in analytical papers. Researchers coming from the metabolomic field could use 'profiling' or 'fingerprinting' on a different way to researchers who are devoted to food science. The arrival of an eclectic discipline, named 'foodomics' has not been enough to allay this terminological problem, since the authors keep on using the terms with both meanings. Thus, a first goal of this tutorial is to clarify the difference between both terms. In addition, the chemical approaches for food authentication, i.e., chemical markers, component profiling and instrumental fingerprinting, have been described. A new term, designated as 'food identitation', has been introduced in order to complete the life cycle of the chemical-based food authentication process. Chromatographic fingerprinting has been explained in detail and some strategies which could be applied has been clarified and discussed. Particularly, the strategies for chromatographic signals acquisition and chromatographic data handling are unified in a single framework. Finally, an overview about the applications of chromatographic (GC and LC) fingerprints in food authentication using different chemometric techniques has been included. Copyright © 2016 Elsevier B.V. All rights reserved.

  2. Quantifying the provenance of aeolian sediments using multiple composite fingerprints

    Science.gov (United States)

    Liu, Benli; Niu, Qinghe; Qu, Jianjun; Zu, Ruiping

    2016-09-01

    We introduce a new fingerprinting method that uses multiple composite fingerprints for studies of aeolian sediment provenance. We used this method to quantify the provenance of sediments on both sides of the Qinghai-Tibetan Railway (QTR) in the Cuona Lake section of the Tibetan Plateau (TP), in an environment characterized by aeolian and fluvial interactions. The method involves repeatedly solving a linear mixing model based on mass conservation; the model is not limited to spatial scale or transport types and uses all the tracer groups that passed the range check, Kruskal-Wallis H-test, and a strict analytical solution screening. The proportional estimates that result from using different composite fingerprints are highly variable; however, the average of these fingerprints has a greater accuracy and certainty than any single fingerprint. The results show that sand from the lake beach, hilly surface, and gullies contribute, respectively, 48%, 31% and 21% to the western railway sediments and 43%, 33% and 24% to the eastern railway sediments. The difference between contributions from various sources on either side of the railway, which may increase in the future, was clearly related to variations in local transport characteristics, a conclusion that is supported by grain size analysis. The construction of the QTR changed the local cycling of materials, and the difference in provenance between the sediments that are separated by the railway reflects the changed sedimentary conditions on either side of the railway. The effectiveness of this method suggests that it will be useful in other studies of aeolian sediments.

  3. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Science.gov (United States)

    Sequeira, Ana F.; Cardoso, Jaime S.

    2015-01-01

    Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system. PMID:26102491

  4. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Directory of Open Access Journals (Sweden)

    Ana F. Sequeira

    2015-06-01

    Full Text Available Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

  5. Pedestrian detection in video surveillance using fully convolutional YOLO neural network

    Science.gov (United States)

    Molchanov, V. V.; Vishnyakov, B. V.; Vizilter, Y. V.; Vishnyakova, O. V.; Knyaz, V. A.

    2017-06-01

    More than 80% of video surveillance systems are used for monitoring people. Old human detection algorithms, based on background and foreground modelling, could not even deal with a group of people, to say nothing of a crowd. Recent robust and highly effective pedestrian detection algorithms are a new milestone of video surveillance systems. Based on modern approaches in deep learning, these algorithms produce very discriminative features that can be used for getting robust inference in real visual scenes. They deal with such tasks as distinguishing different persons in a group, overcome problem with sufficient enclosures of human bodies by the foreground, detect various poses of people. In our work we use a new approach which enables to combine detection and classification tasks into one challenge using convolution neural networks. As a start point we choose YOLO CNN, whose authors propose a very efficient way of combining mentioned above tasks by learning a single neural network. This approach showed competitive results with state-of-the-art models such as FAST R-CNN, significantly overcoming them in speed, which allows us to apply it in real time video surveillance and other video monitoring systems. Despite all advantages it suffers from some known drawbacks, related to the fully-connected layers that obstruct applying the CNN to images with different resolution. Also it limits the ability to distinguish small close human figures in groups which is crucial for our tasks since we work with rather low quality images which often include dense small groups of people. In this work we gradually change network architecture to overcome mentioned above problems, train it on a complex pedestrian dataset and finally get the CNN detecting small pedestrians in real scenes.

  6. DWI-Based Neural Fingerprinting Technology: A Preliminary Study on Stroke Analysis

    Directory of Open Access Journals (Sweden)

    Chenfei Ye

    2014-01-01

    Full Text Available Stroke is a common neural disorder in neurology clinics. Magnetic resonance imaging (MRI has become an important tool to assess the neural physiological changes under stroke, such as diffusion weighted imaging (DWI and diffusion tensor imaging (DTI. Quantitative analysis of MRI images would help medical doctors to localize the stroke area in the diagnosis in terms of structural information and physiological characterization. However, current quantitative approaches can only provide localization of the disorder rather than measure physiological variation of subtypes of ischemic stroke. In the current study, we hypothesize that each kind of neural disorder would have its unique physiological characteristics, which could be reflected by DWI images on different gradients. Based on this hypothesis, a DWI-based neural fingerprinting technology was proposed to classify subtypes of ischemic stroke. The neural fingerprint was constructed by the signal intensity of the region of interest (ROI on the DWI images under different gradients. The fingerprint derived from the manually drawn ROI could classify the subtypes with accuracy 100%. However, the classification accuracy was worse when using semiautomatic and automatic method in ROI segmentation. The preliminary results showed promising potential of DWI-based neural fingerprinting technology in stroke subtype classification. Further studies will be carried out for enhancing the fingerprinting accuracy and its application in other clinical practices.

  7. Accommodating error analysis in comparison and clustering of molecular fingerprints.

    OpenAIRE

    Salamon, H.; Segal, M. R.; Ponce de Leon, A.; Small, P. M.

    1998-01-01

    Molecular epidemiologic studies of infectious diseases rely on pathogen genotype comparisons, which usually yield patterns comprising sets of DNA fragments (DNA fingerprints). We use a highly developed genotyping system, IS6110-based restriction fragment length polymorphism analysis of Mycobacterium tuberculosis, to develop a computational method that automates comparison of large numbers of fingerprints. Because error in fragment length measurements is proportional to fragment length and is ...

  8. A New Technique in saving Fingerprint with low volume by using Chaos Game and Fractal Theory

    Directory of Open Access Journals (Sweden)

    Maryam Ashourzadeh

    2010-12-01

    Full Text Available Fingerprint is one of the simplest and most reliable biometric features of human for identification. In this study by using fractal theory and by the assistance of Chaos Game a new fractal is made from fingerprint. While making the new fractal by using Chaos Game mechanism some parameters, which can be used in identification process, can be deciphered. For this purpose, a fractal is made for each fingerprint, we save 10 parameters for every fingerprint, which have necessary information for identity, as said before. So we save 10 decimal parameters with 0.02 accuracy instead of saving the picture of a fingerprint or some parts of it. Now we improve the great volume of fingerprint pictures by using this model which employs fractal for knowing the personality

  9. Sub-component modeling for face image reconstruction in video communications

    Science.gov (United States)

    Shiell, Derek J.; Xiao, Jing; Katsaggelos, Aggelos K.

    2008-08-01

    Emerging communications trends point to streaming video as a new form of content delivery. These systems are implemented over wired systems, such as cable or ethernet, and wireless networks, cell phones, and portable game systems. These communications systems require sophisticated methods of compression and error-resilience encoding to enable communications across band-limited and noisy delivery channels. Additionally, the transmitted video data must be of high enough quality to ensure a satisfactory end-user experience. Traditionally, video compression makes use of temporal and spatial coherence to reduce the information required to represent an image. In many communications systems, the communications channel is characterized by a probabilistic model which describes the capacity or fidelity of the channel. The implication is that information is lost or distorted in the channel, and requires concealment on the receiving end. We demonstrate a generative model based transmission scheme to compress human face images in video, which has the advantages of a potentially higher compression ratio, while maintaining robustness to errors and data corruption. This is accomplished by training an offline face model and using the model to reconstruct face images on the receiving end. We propose a sub-component AAM modeling the appearance of sub-facial components individually, and show face reconstruction results under different types of video degradation using a weighted and non-weighted version of the sub-component AAM.

  10. LED intense headband light source for fingerprint analysis

    Science.gov (United States)

    Villa-Aleman, Eliel

    2005-03-08

    A portable, lightweight and high-intensity light source for detecting and analyzing fingerprints during field investigation. On-site field analysis requires long hours of mobile analysis. In one embodiment, the present invention comprises a plurality of light emitting diodes; a power source; and a personal attachment means; wherein the light emitting diodes are powered by the power source, and wherein the power source and the light emitting diodes are attached to the personal attachment means to produce a personal light source for on-site analysis of latent fingerprints. The present invention is available for other applications as well.

  11. Innovative hyperchaotic encryption algorithm for compressed video

    Science.gov (United States)

    Yuan, Chun; Zhong, Yuzhuo; Yang, Shiqiang

    2002-12-01

    It is accepted that stream cryptosystem can achieve good real-time performance and flexibility which implements encryption by selecting few parts of the block data and header information of the compressed video stream. Chaotic random number generator, for example Logistics Map, is a comparatively promising substitute, but it is easily attacked by nonlinear dynamic forecasting and geometric information extracting. In this paper, we present a hyperchaotic cryptography scheme to encrypt the compressed video, which integrates Logistics Map with Z(232 - 1) field linear congruential algorithm to strengthen the security of the mono-chaotic cryptography, meanwhile, the real-time performance and flexibility of the chaotic sequence cryptography are maintained. It also integrates with the dissymmetrical public-key cryptography and implements encryption and identity authentification on control parameters at initialization phase. In accord with the importance of data in compressed video stream, encryption is performed in layered scheme. In the innovative hyperchaotic cryptography, the value and the updating frequency of control parameters can be changed online to satisfy the requirement of the network quality, processor capability and security requirement. The innovative hyperchaotic cryprography proves robust security by cryptoanalysis, shows good real-time performance and flexible implement capability through the arithmetic evaluating and test.

  12. Fingerprint segmentation: an investigation of various techniques and a parameter study of a variance-based method

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-09-01

    Full Text Available Fingerprint image segmentation plays an important role in any fingerprint image analysis implementation and it should, ideally, be executed during the initial stages of a fingerprint manipulation process. After careful consideration of various...

  13. Evaluation of a single-pixel one-transistor active pixel sensor for fingerprint imaging

    Science.gov (United States)

    Xu, Man; Ou, Hai; Chen, Jun; Wang, Kai

    2015-08-01

    Since it first appeared in iPhone 5S in 2013, fingerprint identification (ID) has rapidly gained popularity among consumers. Current fingerprint-enabled smartphones unanimously consists of a discrete sensor to perform fingerprint ID. This architecture not only incurs higher material and manufacturing cost, but also provides only static identification and limited authentication. Hence as the demand for a thinner, lighter, and more secure handset grows, we propose a novel pixel architecture that is a photosensitive device embedded in a display pixel and detects the reflected light from the finger touch for high resolution, high fidelity and dynamic biometrics. To this purpose, an amorphous silicon (a-Si:H) dual-gate photo TFT working in both fingerprint-imaging mode and display-driving mode will be developed.

  14. Detection of visible and latent fingerprints using micro-X-ray fluorescence elemental imaging.

    Science.gov (United States)

    Worley, Christopher G; Wiltshire, Sara S; Miller, Thomasin C; Havrilla, George J; Majidi, Vahid

    2006-01-01

    Using micro-X-ray fluorescence (MXRF), a novel means of detecting fingerprints was examined in which the prints were imaged based on their elemental composition. MXRF is a nondestructive technique. Although this method requires a priori knowledge about the approximate location of a print, it offers a new and complementary means for detecting fingerprints that are also left pristine for further analysis (including potential DNA extraction) or archiving purposes. Sebaceous fingerprints and those made after perspiring were detected based on elements such as potassium and chlorine present in the print residue. Unique prints were also detected including those containing lotion, saliva, banana, or sunscreen. This proof-of-concept study demonstrates the potential for visualizing fingerprints by MXRF on surfaces that can be problematic using current methods.

  15. Computationally Efficient Robust Color Image Watermarking Using Fast Walsh Hadamard Transform

    Directory of Open Access Journals (Sweden)

    Suja Kalarikkal Pullayikodi

    2017-10-01

    Full Text Available Watermark is the copy deterrence mechanism used in the multimedia signal that is to be protected from hacking and piracy such a way that it can later be extracted from the watermarked signal by the decoder. Watermarking can be used in various applications such as authentication, video indexing, copyright protection and access control. In this paper a new CDMA (Code Division Multiple Access based robust watermarking algorithm using customized 8 × 8 Walsh Hadamard Transform, is proposed for the color images and detailed performance and robustness analysis have been performed. The paper studies in detail the effect of spreading code length, number of spreading codes and type of spreading codes on the performance of the watermarking system. Compared to the existing techniques the proposed scheme is computationally more efficient and consumes much less time for execution. Furthermore, the proposed scheme is robust and survives most of the common signal processing and geometric attacks.

  16. EKF-GPR-Based Fingerprint Renovation for Subset-Based Indoor Localization with Adjusted Cosine Similarity.

    Science.gov (United States)

    Yang, Junhua; Li, Yong; Cheng, Wei; Liu, Yang; Liu, Chenxi

    2018-01-22

    Received Signal Strength Indicator (RSSI) localization using fingerprint has become a prevailing approach for indoor localization. However, the fingerprint-collecting work is repetitive and time-consuming. After the original fingerprint radio map is built, it is laborious to upgrade the radio map. In this paper, we describe a Fingerprint Renovation System (FRS) based on crowdsourcing, which avoids the use of manual labour to obtain the up-to-date fingerprint status. Extended Kalman Filter (EKF) and Gaussian Process Regression (GPR) in FRS are combined to calculate the current state based on the original fingerprinting radio map. In this system, a method of subset acquisition also makes an immediate impression to reduce the huge computation caused by too many reference points (RPs). Meanwhile, adjusted cosine similarity (ACS) is employed in the online phase to solve the issue of outliers produced by cosine similarity. Both experiments and analytical simulation in a real Wireless Fidelity (Wi-Fi) environment indicate the usefulness of our system to significant performance improvements. The results show that FRS improves the accuracy by 19.6% in the surveyed area compared to the radio map un-renovated. Moreover, the proposed subset algorithm can bring less computation.

  17. EKF–GPR-Based Fingerprint Renovation for Subset-Based Indoor Localization with Adjusted Cosine Similarity

    Science.gov (United States)

    Yang, Junhua; Li, Yong; Cheng, Wei; Liu, Yang; Liu, Chenxi

    2018-01-01

    Received Signal Strength Indicator (RSSI) localization using fingerprint has become a prevailing approach for indoor localization. However, the fingerprint-collecting work is repetitive and time-consuming. After the original fingerprint radio map is built, it is laborious to upgrade the radio map. In this paper, we describe a Fingerprint Renovation System (FRS) based on crowdsourcing, which avoids the use of manual labour to obtain the up-to-date fingerprint status. Extended Kalman Filter (EKF) and Gaussian Process Regression (GPR) in FRS are combined to calculate the current state based on the original fingerprinting radio map. In this system, a method of subset acquisition also makes an immediate impression to reduce the huge computation caused by too many reference points (RPs). Meanwhile, adjusted cosine similarity (ACS) is employed in the online phase to solve the issue of outliers produced by cosine similarity. Both experiments and analytical simulation in a real Wireless Fidelity (Wi-Fi) environment indicate the usefulness of our system to significant performance improvements. The results show that FRS improves the accuracy by 19.6% in the surveyed area compared to the radio map un-renovated. Moreover, the proposed subset algorithm can bring less computation. PMID:29361805

  18. [Comparison of Bacteria ERIC-PCR Fingerprints of Index Fingers and Contactants].

    Science.gov (United States)

    Liu, Y T; Sun, D M; Shi, S P; Yang, X

    2018-02-01

    To explore the bacteria relevance between index fingers and contactant' surfaces (mobile phone touch screen and desktop of personal office table). Bacteria were collected from the index fingers, mobile phone touch screen and desktop of personal office table of 10 volunteers. Enterobacterial repetitive intergenic consensus (ERIC)-PCR fingerprint was established by PCR amplification technique of metagenome. There were 7 volunteers' ERIC-PCR fingerprints of index fingers matched that took from the mobile phone touch screens, and different from each other. There were 3 volunteers' ERIC-PCR fingerprints of index fingers matched that took from desk top of personal office table, and other 7 volunteers' ERIC-PCR fingerprints did not match perfectly with that took from desk top of personal office table, but had at least one similar band for both. The bacteria on index finger shows individual specificity, which on mobile phone touching screen and personal desktop may be a new biological sample of forensic identification. Copyright© by the Editorial Department of Journal of Forensic Medicine.

  19. Characterization of Actinomyces with genomic DNA fingerprints and rRNA gene probes.

    Science.gov (United States)

    Bowden, G; Johnson, J; Schachtele, C

    1993-08-01

    Cellular DNA from 25 Actinomyces naeslundii and Actinomyces viscosus strains belonging to the 7 taxonomic clusters of Fillery et al. (1978) and several unclustered strains was obtained by enzymatic and N-lauroylsarcosine/guanidine isothiocyanate treatment of whole cells, followed by extraction of the nucleic acid. The DNA samples were digested with restriction endonucleases BamHI or PvuII, and agarose gel electrophoresis was used to obtain DNA fingerprints. The DNA fragments were subjected to Southern blot hybridization with a digoxigenin-labeled cDNA probe transcribed from Escherichia coli 16S and 23S rRNA. The patterns of bands from genomic (DNA fingerprints) and rDNA fingerprints (ribotypes) were used for comparison between the taxonomic cluster strains and strains within clusters. Representative strains from each taxonomic cluster provided different BamHI DNA fingerprints and ribotype patterns with 3 to 9 distinct bands. Some strains within a cluster showed identical ribotype patterns with both endonucleases (A. naeslundii B120 and A. naeslundii B102 from cluster 3), while others showed the same pattern with BamHI but a different pattern with PvuII (A. naeslundii ATCC 12104 and 398A from cluster 5). A viscosus ATCC 15987 (cluster 7) and its parent strain T6 yielded identical fingerprint and ribotype patterns. The genomic diversity revealed by DNA fingerprinting and ribotyping demonstrates that these techniques, which do not require phenotypic expression, are suited for study of the oral ecology of the Actinomyces, and for epidemiological tracking of specific Actinomyces strains associated with caries lesions and sites of periodontal destruction.

  20. Investigation of gamma-ray fingerprint identifying mechanism for the types of radiation sources

    International Nuclear Information System (INIS)

    Liu Suping; Wu Huailong; Gu Dangchang; Gong Jian; Hao Fanhua; Hu Guangchun

    2002-01-01

    Radiation fingerprints sometimes can be used to label and identify the radiation resources. For instance, in a future nuclear reduction treaty that requires verification of irreversible dismantling of reduced nuclear warheads, the radiation fingerprints of nuclear warheads are expected to play a key role in labelling and identifying the reduced warheads. It would promote the development of nuclear warheads deep-cuts verification technologies if authors start right now some investigations on the issues related to the radiation fingerprints. The author dedicated to the investigation of gamma-ray fingerprint identifying mechanism for the types of radiation resources. The purpose of the identifying mechanism investigation is to find a credible way to tell whether any two gamma-ray spectral fingerprints that are under comparison are radiated from the same resource. The authors created the spectrum pattern comparison (SPC) to study the comparability of the two radiation fingerprints. Guided by the principle of SPC, the authors programmed a software dedicated to identify the types of radiation resources. The efficiency of the software was tested by a series of experiments with some laboratory gamma-ray resources. The experiments were designed to look into the relations between comparability and radioactive statistics, and the relations between comparability and some measurement conditions such as real time, resource activity and background etc. Two main results can be drawn from the investigation: 1) it is quite feasible to use the concept of spectral comparability to answer the question whether any two gamma-ray fingerprints are identity or not; 2) the identifying mechanism can only identify the types of radiation resources, and cannot identify the individuals with the same type and small differences

  1. Robust vehicle detection in different weather conditions: Using MIPM.

    Science.gov (United States)

    Yaghoobi Ershadi, Nastaran; Menéndez, José Manuel; Jiménez, David

    2018-01-01

    Intelligent Transportation Systems (ITS) allow us to have high quality traffic information to reduce the risk of potentially critical situations. Conventional image-based traffic detection methods have difficulties acquiring good images due to perspective and background noise, poor lighting and weather conditions. In this paper, we propose a new method to accurately segment and track vehicles. After removing perspective using Modified Inverse Perspective Mapping (MIPM), Hough transform is applied to extract road lines and lanes. Then, Gaussian Mixture Models (GMM) are used to segment moving objects and to tackle car shadow effects, we apply a chromacity-based strategy. Finally, performance is evaluated through three different video benchmarks: own recorded videos in Madrid and Tehran (with different weather conditions at urban and interurban areas); and two well-known public datasets (KITTI and DETRAC). Our results indicate that the proposed algorithms are robust, and more accurate compared to others, especially when facing occlusions, lighting variations and weather conditions.

  2. Pseudo Identities Based on Fingerprint Characteristics

    NARCIS (Netherlands)

    Delvaux, Nicolas; Chabanne, Herve; Bringer, Julien; Kindarji, Bruno; Lindeberg, Patrik; Midgren, Johannes; Breebaart, Jeroen; Akkermans, Ton; van der Veen, M.; Veldhuis, Raymond N.J.; Kindt, Els; Simoens, Koen; Busch, Christoph; Bours, Patrick; Gafurov, Davrondzhon; Yang, Bian; Stern, Julien; Rust, Carsten; Cucinelli, Bruno; Skepastianos, Dimitrios

    2008-01-01

    This paper presents the integrated project TURBINE which is funded under the EU 7th research framework programme. This research is a multi-disciplinary effort on privacy enhancing technology, combining innovative developments in cryptography and fingerprint recognition. The objective of this project

  3. Indoor Location Fingerprinting with Heterogeneous Clients

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2011-01-01

    Heterogeneous wireless clients measure signal strength differently. This is a fundamental problem for indoor location fingerprinting, and it has a high impact on the positioning accuracy. Mapping-based solutions have been presented that require manual and error-prone calibration for each new clie...

  4. DIFFERENTIATION OF Curcuma longa, Curcuma xanthorrhiza and Zingiber cassumunar BY THIN LAYER CHROMATOGRAPHY FINGERPRINT ANALYSIS

    Directory of Open Access Journals (Sweden)

    Mohamad Rafi

    2011-07-01

    Full Text Available Turmeric (Curcuma longa, java turmeric (Curcuma xanthorrhiza and cassumunar ginger (Zingiber cassumunar are widely used in traditional Indonesian medicine. These three herbs have relatively similar rhizomes colour so it is difficult to be differentiated especially if they are in powder form. A rapid and reliable method, thin layer chromatography (TLC fingerprint, has been developed in order to identify, authenticate and differentiate these three herbs through fingerprint profile of chemical compounds. TLC fingerprints of the three herbs were obtained by visualization of separate zones with visible and UV (254 and 366 nm light. The TLC fingerprint pattern is different each other and showed a specific marker zones respectively. Therefore, TLC fingerprint can be utilized for identification, authentication and differentiation method in quality control of the three herbs tested.

  5. Robust and Accurate Algorithm for Wearable Stereoscopic Augmented Reality with Three Indistinguishable Markers

    Directory of Open Access Journals (Sweden)

    Fabrizio Cutolo

    2016-09-01

    Full Text Available In the context of surgical navigation systems based on augmented reality (AR, the key challenge is to ensure the highest degree of realism in merging computer-generated elements with live views of the surgical scene. This paper presents an algorithm suited for wearable stereoscopic augmented reality video see-through systems for use in a clinical scenario. A video-based tracking solution is proposed that relies on stereo localization of three monochromatic markers rigidly constrained to the scene. A PnP-based optimization step is introduced to refine separately the pose of the two cameras. Video-based tracking methods using monochromatic markers are robust to non-controllable and/or inconsistent lighting conditions. The two-stage camera pose estimation algorithm provides sub-pixel registration accuracy. From a technological and an ergonomic standpoint, the proposed approach represents an effective solution to the implementation of wearable AR-based surgical navigation systems wherever rigid anatomies are involved.

  6. Flow cytometric fingerprinting for microbial strain discrimination and physiological characterization.

    Science.gov (United States)

    Buysschaert, Benjamin; Kerckhof, Frederiek-Maarten; Vandamme, Peter; De Baets, Bernard; Boon, Nico

    2018-02-01

    The analysis of microbial populations is fundamental, not only for developing a deeper understanding of microbial communities but also for their engineering in biotechnological applications. Many methods have been developed to study their characteristics and over the last few decades, molecular analysis tools, such as DNA sequencing, have been used with considerable success to identify the composition of microbial populations. Recently, flow cytometric fingerprinting is emerging as a promising and powerful method to analyze bacterial populations. So far, these methods have primarily been used to observe shifts in the composition of microbial communities of natural samples. In this article, we apply a flow cytometric fingerprinting method to discriminate among 29 Lactobacillus strains. Our results indicate that it is possible to discriminate among 27 Lactobacillus strains by staining with SYBR green I and that the discriminatory power can be increased by combined SYBR green I and propidium iodide staining. Furthermore, we illustrate the impact of physiological changes on the fingerprinting method by demonstrating how flow cytometric fingerprinting is able to discriminate the different growth phases of a microbial culture. The sensitivity of the method is assessed by its ability to detect changes in the relative abundance of a mix of polystyrene beads down to 1.2%. When a mix of bacteria was used, the sensitivity was as between 1.2% and 5%. The presented data demonstrate that flow cytometric fingerprinting is a sensitive and reproducible technique with the potential to be applied as a method for the dereplication of bacterial isolates. © 2017 International Society for Advancement of Cytometry. © 2017 International Society for Advancement of Cytometry.

  7. No-Reference Video Quality Assessment Based on Statistical Analysis in 3D-DCT Domain.

    Science.gov (United States)

    Li, Xuelong; Guo, Qun; Lu, Xiaoqiang

    2016-05-13

    It is an important task to design models for universal no-reference video quality assessment (NR-VQA) in multiple video processing and computer vision applications. However, most existing NR-VQA metrics are designed for specific distortion types which are not often aware in practical applications. A further deficiency is that the spatial and temporal information of videos is hardly considered simultaneously. In this paper, we propose a new NR-VQA metric based on the spatiotemporal natural video statistics (NVS) in 3D discrete cosine transform (3D-DCT) domain. In the proposed method, a set of features are firstly extracted based on the statistical analysis of 3D-DCT coefficients to characterize the spatiotemporal statistics of videos in different views. These features are used to predict the perceived video quality via the efficient linear support vector regression (SVR) model afterwards. The contributions of this paper are: 1) we explore the spatiotemporal statistics of videos in 3DDCT domain which has the inherent spatiotemporal encoding advantage over other widely used 2D transformations; 2) we extract a small set of simple but effective statistical features for video visual quality prediction; 3) the proposed method is universal for multiple types of distortions and robust to different databases. The proposed method is tested on four widely used video databases. Extensive experimental results demonstrate that the proposed method is competitive with the state-of-art NR-VQA metrics and the top-performing FR-VQA and RR-VQA metrics.

  8. Content-based video retrieval by example video clip

    Science.gov (United States)

    Dimitrova, Nevenka; Abdel-Mottaleb, Mohamed

    1997-01-01

    This paper presents a novel approach for video retrieval from a large archive of MPEG or Motion JPEG compressed video clips. We introduce a retrieval algorithm that takes a video clip as a query and searches the database for clips with similar contents. Video clips are characterized by a sequence of representative frame signatures, which are constructed from DC coefficients and motion information (`DC+M' signatures). The similarity between two video clips is determined by using their respective signatures. This method facilitates retrieval of clips for the purpose of video editing, broadcast news retrieval, or copyright violation detection.

  9. Dense Trajectories and DHOG for Classification of Viewpoints from Echocardiogram Videos

    Directory of Open Access Journals (Sweden)

    Liqin Huang

    2016-01-01

    Full Text Available In echo-cardiac clinical computer-aided diagnosis, an important step is to automatically classify echocardiography videos from different angles and different regions. We propose a kind of echocardiography video classification algorithm based on the dense trajectory and difference histograms of oriented gradients (DHOG. First, we use the dense grid method to describe feature characteristics in each frame of echocardiography sequence and then track these feature points by applying the dense optical flow. In order to overcome the influence of the rapid and irregular movement of echocardiography videos and get more robust tracking results, we also design a trajectory description algorithm which uses the derivative of the optical flow to obtain the motion trajectory information and associates the different characteristics (e.g., the trajectory shape, DHOG, HOF, and MBH with embedded structural information of the spatiotemporal pyramid. To avoid “dimension disaster,” we apply Fisher’s vector to reduce the dimension of feature description followed by the SVM linear classifier to improve the final classification result. The average accuracy of echocardiography video classification is 77.12% for all eight viewpoints and 100% for three primary viewpoints.

  10. DNA Electronic Fingerprints by Local Spectroscopy on Graphene

    Science.gov (United States)

    Balatsky, Alexander

    2013-03-01

    Working and scalable alternatives to the conventional chemical methods of DNA sequencing that are based on electronic/ionic signatures would revolutionize the field of sequencing. The approach of a single molecule imaging and spectroscopy with unprecedented resolution, achieved by Scanning Tunneling Spectroscopy (STS) and nanopore electronics could enable this revolution. We use the data from our group and others in applying this local scanning tunneling microscopy and illustrate possibilities of electronic sequencing of freeze dried deposits on graphene. We will present two types of calculated fingerprints: first in Local Density of States (LDOS) of DNA nucleotide bases (A,C,G,T) deposited on graphene. Significant base-dependent features in the LDOS in an energy range within few eV of the Fermi level were found in our calculations. These features can serve as electronic fingerprints for the identification of individual bases in STS. In the second approach we present calculated base dependent electronic transverse conductance as DNA translocates through the graphene nanopore. Thus we argue that the fingerprints of DNA-graphene hybrid structures may provide an alternative route to DNA sequencing using STS. Work supported by US DOE, NORDITA.

  11. A Method for Counting Moving People in Video Surveillance Videos

    Directory of Open Access Journals (Sweden)

    Mario Vento

    2010-01-01

    Full Text Available People counting is an important problem in video surveillance applications. This problem has been faced either by trying to detect people in the scene and then counting them or by establishing a mapping between some scene feature and the number of people (avoiding the complex detection problem. This paper presents a novel method, following this second approach, that is based on the use of SURF features and of an ϵ-SVR regressor provide an estimate of this count. The algorithm takes specifically into account problems due to partial occlusions and to perspective. In the experimental evaluation, the proposed method has been compared with the algorithm by Albiol et al., winner of the PETS 2009 contest on people counting, using the same PETS 2009 database. The provided results confirm that the proposed method yields an improved accuracy, while retaining the robustness of Albiol's algorithm.

  12. A Method for Counting Moving People in Video Surveillance Videos

    Directory of Open Access Journals (Sweden)

    Conte Donatello

    2010-01-01

    Full Text Available People counting is an important problem in video surveillance applications. This problem has been faced either by trying to detect people in the scene and then counting them or by establishing a mapping between some scene feature and the number of people (avoiding the complex detection problem. This paper presents a novel method, following this second approach, that is based on the use of SURF features and of an -SVR regressor provide an estimate of this count. The algorithm takes specifically into account problems due to partial occlusions and to perspective. In the experimental evaluation, the proposed method has been compared with the algorithm by Albiol et al., winner of the PETS 2009 contest on people counting, using the same PETS 2009 database. The provided results confirm that the proposed method yields an improved accuracy, while retaining the robustness of Albiol's algorithm.

  13. A Method for Counting Moving People in Video Surveillance Videos

    Science.gov (United States)

    Conte, Donatello; Foggia, Pasquale; Percannella, Gennaro; Tufano, Francesco; Vento, Mario

    2010-12-01

    People counting is an important problem in video surveillance applications. This problem has been faced either by trying to detect people in the scene and then counting them or by establishing a mapping between some scene feature and the number of people (avoiding the complex detection problem). This paper presents a novel method, following this second approach, that is based on the use of SURF features and of an [InlineEquation not available: see fulltext.]-SVR regressor provide an estimate of this count. The algorithm takes specifically into account problems due to partial occlusions and to perspective. In the experimental evaluation, the proposed method has been compared with the algorithm by Albiol et al., winner of the PETS 2009 contest on people counting, using the same PETS 2009 database. The provided results confirm that the proposed method yields an improved accuracy, while retaining the robustness of Albiol's algorithm.

  14. Two-Level Evaluation on Sensor Interoperability of Features in Fingerprint Image Segmentation

    Directory of Open Access Journals (Sweden)

    Ya-Shuo Li

    2012-03-01

    Full Text Available Features used in fingerprint segmentation significantly affect the segmentation performance. Various features exhibit different discriminating abilities on fingerprint images derived from different sensors. One feature which has better discriminating ability on images derived from a certain sensor may not adapt to segment images derived from other sensors. This degrades the segmentation performance. This paper empirically analyzes the sensor interoperability problem of segmentation feature, which refers to the feature’s ability to adapt to the raw fingerprints captured by different sensors. To address this issue, this paper presents a two-level feature evaluation method, including the first level feature evaluation based on segmentation error rate and the second level feature evaluation based on decision tree. The proposed method is performed on a number of fingerprint databases which are obtained from various sensors. Experimental results show that the proposed method can effectively evaluate the sensor interoperability of features, and the features with good evaluation results acquire better segmentation accuracies of images originating from different sensors.

  15. Touch DNA collection versus firearm fingerprinting: comparing evidence production and identification outcomes.

    Science.gov (United States)

    Nunn, Samuel

    2013-05-01

    A project by a metropolitan police agency in 2008-2009 had police use touch DNA kits to collect cell samples from seized firearms. To assess outcomes, results of touch DNA swabbing of firearms were compared to fingerprinting firearm evidence. The rationale was that fingerprinting, as the older technology, was the baseline against which to compare touch DNA. But little is known about ways to measure touch DNA productivity compared to fingerprinting. To examine differences between the two requires comparable measurements. Two measures were used: quantity of probative or investigative evidence produced and identification outcomes. When applied to firearms seized within an Indianapolis, IN police district, touch DNA produced a larger volume of evidence than fingerprinting, but identification outcomes for the two methods were equal. Because touch DNA was deployed by police patrol officers, there are implications for firearm forensics and the choice of forensic approaches used by police. © 2013 American Academy of Forensic Sciences.

  16. Immersive video

    Science.gov (United States)

    Moezzi, Saied; Katkere, Arun L.; Jain, Ramesh C.

    1996-03-01

    Interactive video and television viewers should have the power to control their viewing position. To make this a reality, we introduce the concept of Immersive Video, which employs computer vision and computer graphics technologies to provide remote users a sense of complete immersion when viewing an event. Immersive Video uses multiple videos of an event, captured from different perspectives, to generate a full 3D digital video of that event. That is accomplished by assimilating important information from each video stream into a comprehensive, dynamic, 3D model of the environment. Using this 3D digital video, interactive viewers can then move around the remote environment and observe the events taking place from any desired perspective. Our Immersive Video System currently provides interactive viewing and `walkthrus' of staged karate demonstrations, basketball games, dance performances, and typical campus scenes. In its full realization, Immersive Video will be a paradigm shift in visual communication which will revolutionize television and video media, and become an integral part of future telepresence and virtual reality systems.

  17. Correlates and consequences of exposure to video game violence: hostile personality, empathy, and aggressive behavior.

    Science.gov (United States)

    Bartholow, Bruce D; Sestir, Marc A; Davis, Edward B

    2005-11-01

    Research has shown that exposure to violent video games causes increases in aggression, but the mechanisms of this effect have remained elusive. Also, potential differences in short-term and long-term exposure are not well understood. An initial correlational study shows that video game violence exposure (VVE) is positively correlated with self-reports of aggressive behavior and that this relation is robust to controlling for multiple aspects of personality. A lab experiment showed that individuals low in VVE behave more aggressively after playing a violent video game than after a nonviolent game but that those high in VVE display relatively high levels of aggression regardless of game content. Mediational analyses show that trait hostility, empathy, and hostile perceptions partially account for the VVE effect on aggression. These findings suggest that repeated exposure to video game violence increases aggressive behavior in part via changes in cognitive and personality factors associated with desensitization.

  18. Franck-Condon fingerprinting of vibration-tunneling spectra.

    Science.gov (United States)

    Berrios, Eduardo; Sundaradevan, Praveen; Gruebele, Martin

    2013-08-15

    We introduce Franck-Condon fingerprinting as a method for assigning complex vibration-tunneling spectra. The B̃ state of thiophosgene (SCCl2) serves as our prototype. Despite several attempts, assignment of its excitation spectrum has proved difficult because of near-degenerate vibrational frequencies, Fermi resonance between the C-Cl stretching mode and the Cl-C-Cl bending mode, and large tunneling splittings due to the out-of-plane umbrella mode. Hence, the spectrum has never been fitted to an effective Hamiltonian. Our assignment approach replaces precise frequency information with intensity information, eliminating the need for double resonance spectroscopy or combination differences, neither of which have yielded a full assignment thus far. The dispersed fluorescence spectrum of each unknown vibration-tunneling state images its character onto known vibrational progressions in the ground state. By using this Franck-Condon fingerprint, we were able to determine the predominant character of several vibration-tunneling states and assign them; in other cases, the fingerprinting revealed that the states are strongly mixed and cannot be characterized with a simple normal mode assignment. The assigned transitions from vibration-tunneling wave functions that were not too strongly mixed could be fitted within measurement uncertainty by an effective vibration-tunneling Hamiltonian. A fit of all observed vibration-tunneling states will require a full resonance-tunneling Hamiltonian.

  19. Protein identification by peptide mass fingerprinting

    DEFF Research Database (Denmark)

    Hjernø, Karin

    2007-01-01

      Peptide mass fingerprinting is an effective way of identifying, e.g., gel-separated proteins, by matching experimentally obtained peptide mass data against large databases. However, several factors are known to influence the quality of the resulting matches, such as proteins contaminating the s...

  20. A Taxonomy for Radio Location Fingerprinting

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2007-01-01

    Location Fingerprinting (LF) is a promising location technique for many awareness applications in pervasive computing. However, as research on LF systems goes beyond basic methods there is an increasing need for better comparison of proposed LF systems. Developers of LF systems are also lacking...

  1. Improving Accuracy and Simplifying Training in Fingerprinting-Based Indoor Location Algorithms at Room Level

    Directory of Open Access Journals (Sweden)

    Mario Muñoz-Organero

    2016-01-01

    Full Text Available Fingerprinting-based algorithms are popular in indoor location systems based on mobile devices. Comparing the RSSI (Received Signal Strength Indicator from different radio wave transmitters, such as Wi-Fi access points, with prerecorded fingerprints from located points (using different artificial intelligence algorithms, fingerprinting-based systems can locate unknown points with a few meters resolution. However, training the system with already located fingerprints tends to be an expensive task both in time and in resources, especially if large areas are to be considered. Moreover, the decision algorithms tend to be of high memory and CPU consuming in such cases and so does the required time for obtaining the estimated location for a new fingerprint. In this paper, we study, propose, and validate a way to select the locations for the training fingerprints which reduces the amount of required points while improving the accuracy of the algorithms when locating points at room level resolution. We present a comparison of different artificial intelligence decision algorithms and select those with better results. We do a comparison with other systems in the literature and draw conclusions about the improvements obtained in our proposal. Moreover, some techniques such as filtering nonstable access points for improving accuracy are introduced, studied, and validated.

  2. Video demystified

    CERN Document Server

    Jack, Keith

    2004-01-01

    This international bestseller and essential reference is the "bible" for digital video engineers and programmers worldwide. This is by far the most informative analog and digital video reference available, includes the hottest new trends and cutting-edge developments in the field. Video Demystified, Fourth Edition is a "one stop" reference guide for the various digital video technologies. The fourth edition is completely updated with all new chapters on MPEG-4, H.264, SDTV/HDTV, ATSC/DVB, and Streaming Video (Video over DSL, Ethernet, etc.), as well as discussions of the latest standards throughout. The accompanying CD-ROM is updated to include a unique set of video test files in the newest formats. *This essential reference is the "bible" for digital video engineers and programmers worldwide *Contains all new chapters on MPEG-4, H.264, SDTV/HDTV, ATSC/DVB, and Streaming Video *Completely revised with all the latest and most up-to-date industry standards.

  3. DNA Profiles from Fingerprint Lifts-Enhancing the Evidential Value of Fingermarks Through Successful DNA Typing.

    Science.gov (United States)

    Subhani, Zuhaib; Daniel, Barbara; Frascione, Nunzianda

    2018-05-25

    This study evaluated the compatibility of the most common enhancement methods and lifting techniques with DNA profiling. Emphasis is placed on modern lifting techniques (i.e., gelatin lifters and Isomark™) and historical fingerprint lifts for which limited research has been previously conducted. A total of 180 fingerprints were deposited on a glass surface, enhanced, lifted, and processed for DNA typing. DNA could be extracted and profiled for all the powders and lifts tested and from both groomed fingerprints and natural prints with no significant difference in the percentage of profile recovered. DNA profiles could also be obtained from historical fingerprint lifts (79.2% of 72 lifts) with one or more alleles detected. These results demonstrate the compatibility between different powder/lift combinations and DNA profiling therefore augmenting the evidential value of fingerprints in forensic casework. © 2018 American Academy of Forensic Sciences.

  4. The art of assessing quality for images and video

    International Nuclear Information System (INIS)

    Deriche, M.

    2011-01-01

    The early years of this century have witnessed a tremendous growth in the use of digital multimedia data for di?erent communication applications. Researchers from around the world are spending substantial research efforts in developing techniques for improving the appearance of images/video. However, as we know, preserving high quality is a challenging task. Images are subject to distortions during acquisition, compression, transmission, analysis, and reconstruction. For this reason, the research area focusing on image and video quality assessment has attracted a lot of attention in recent years. In particular, compression applications and other multimedia applications need powerful techniques for evaluating quality objectively without human interference. This tutorial will cover the di?erent faces of image quality assessment. We will motivate the need for robust image quality assessment techniques, then discuss the main algorithms found in the literature with a critical perspective. We will present the di?erent metrics used for full reference, reduced reference and no reference applications. We will then discuss the difference between image and video quality assessment. In all of the above, we will take a critical approach to explain which metric can be used for which application. Finally we will discuss the different approaches to analyze the performance of image/video quality metrics, and end the tutorial with some perspectives on newly introduced metrics and their potential applications.

  5. Fingerprints as an Alternative Method to Determine ABO and Rh Blood Groups.

    Science.gov (United States)

    Chaudhary, Sonam; Deuja, Sajana; Alam, Munna; Karmacharya, Poonam; Mondal, Monami

    2017-01-01

    Blood grouping is conventionally done with invasive method by taking blood samples. The objective of this study is to determine blood group with uninvasive procedure by taking fingerprints of the participants and know the associations between their fingerprints and blood groups. Seven hundred participants of both genders with no any age limitation from Manipal Teaching Hospital and Manipal College of Medical Sciences were randomly selected. The blood grouping was done by cross reacting blood sample with the antibodies. The fingerprints were taken with the help of stamp pad imprinting the finger ridges over A4 size white papers. The loop, whorl and arch patterns were studied. O+ve blood group 224 (32%) was most prevalent among 700 participants. The loop pattern was highly distributed 3708 (53%) in all blood groups except in A-ve blood group with highest distribution of whorl 20 (40%). The mean comparisons of specific fingerprint in total and also in individual fingers with different ABO and ABO-Rh blood groups showed no any statistical association with P>0.05. However, the loop distribution in individual finger was highest in right middle finger (M) of B-ve blood group 5 (10%). The whorl distribution in individual finger was highest in right index (I), left thumb (T) and left ring (R) fingers of AB+ve blood group 20 (5.5% each). Similarly, the arch distribution was highest in right index fingers of A-ve blood group 3 (6%). The mean comparison of different fingerprints with ABO and Rh blood groups showed no significant statistical association concluding fingerprints cannot be used for blood grouping.

  6. Inexpensive remote video surveillance system with microcomputer and solar cells

    International Nuclear Information System (INIS)

    Guevara Betancourt, Edder

    2013-01-01

    A low-cost prototype is developed with a RPI plate for remote video surveillance. Additionally, the theoretical basis to provide energy independence have developed through solar cells and a battery bank. Some existing commercial monitoring systems are studied and analyzed, components such as: cameras, communication devices (WiFi and 3G), free software packages for video surveillance, control mechanisms and theory remote photovoltaic systems. A number of steps are developed to implement the module and install, configure and test each of the elements of hardware and software that make up the module, exploring the feasibility of providing intelligence to the system using the software chosen. Events that have been generated by motion detection have been simple, intuitive way to view, archive and extract. The implementation of the module by a microcomputer video surveillance and motion detection software (Zoneminder) has been an option for a lot of potential; as the platform for monitoring and recording data has provided all the tools to make a robust and secure surveillance. (author) [es

  7. Video pedagogy

    OpenAIRE

    Länsitie, Janne; Stevenson, Blair; Männistö, Riku; Karjalainen, Tommi; Karjalainen, Asko

    2016-01-01

    The short film is an introduction to the concept of video pedagogy. The five categories of video pedagogy further elaborate how videos can be used as a part of instruction and learning process. Most pedagogical videos represent more than one category. A video itself doesn’t necessarily define the category – the ways in which the video is used as a part of pedagogical script are more defining factors. What five categories did you find? Did you agree with the categories, or are more...

  8. Fingerprint Identification Using SIFT-Based Minutia Descriptors and Improved All Descriptor-Pair Matching

    Directory of Open Access Journals (Sweden)

    Jiuqiang Han

    2013-03-01

    Full Text Available The performance of conventional minutiae-based fingerprint authentication algorithms degrades significantly when dealing with low quality fingerprints with lots of cuts or scratches. A similar degradation of the minutiae-based algorithms is observed when small overlapping areas appear because of the quite narrow width of the sensors. Based on the detection of minutiae, Scale Invariant Feature Transformation (SIFT descriptors are employed to fulfill verification tasks in the above difficult scenarios. However, the original SIFT algorithm is not suitable for fingerprint because of: (1 the similar patterns of parallel ridges; and (2 high computational resource consumption. To enhance the efficiency and effectiveness of the algorithm for fingerprint verification, we propose a SIFT-based Minutia Descriptor (SMD to improve the SIFT algorithm through image processing, descriptor extraction and matcher. A two-step fast matcher, named improved All Descriptor-Pair Matching (iADM, is also proposed to implement the 1:N verifications in real-time. Fingerprint Identification using SMD and iADM (FISiA achieved a significant improvement with respect to accuracy in representative databases compared with the conventional minutiae-based method. The speed of FISiA also can meet real-time requirements.

  9. Geochemical wolframite fingerprinting - the likelihood ratio approach for laser ablation ICP-MS data.

    Science.gov (United States)

    Martyna, Agnieszka; Gäbler, Hans-Eike; Bahr, Andreas; Zadora, Grzegorz

    2018-05-01

    Wolframite has been specified as a 'conflict mineral' by a U.S. Government Act, which obliges companies that use these minerals to report their origin. Minerals originating from conflict regions in the Democratic Republic of the Congo shall be excluded from the market as their illegal mining, trading, and taxation are supposed to fuel ongoing violent conflicts. The German Federal Institute for Geosciences and Natural Resources (BGR) developed a geochemical fingerprinting method for wolframite based on laser ablation inductively coupled plasma-mass spectrometry. Concentrations of 46 elements in about 5300 wolframite grains from 64 mines were determined. The issue of verifying the declared origins of the wolframite samples may be framed as a forensic problem by considering two contrasting hypotheses: the examined sample and a sample collected from the declared mine originate from the same mine (H 1 ), and the two samples come from different mines (H 2 ). The solution is found using the likelihood ratio (LR) theory. On account of the multidimensionality, the lack of normal distribution of data within each sample, and the huge within-sample dispersion in relation to the dispersion between samples, the classic LR models had to be modified. Robust principal component analysis and linear discriminant analysis were used to characterize samples. The similarity of two samples was expressed by Kolmogorov-Smirnov distances, which were interpreted in view of H 1 and H 2 hypotheses within the LR framework. The performance of the models, controlled by the levels of incorrect responses and the empirical cross entropy, demonstrated that the proposed LR models are successful in verifying the authenticity of the wolframite samples. Graphical abstract Geochemical wolframite fingerprinting.

  10. Chemical fingerprinting of hydrocarbon-contamination in soil

    DEFF Research Database (Denmark)

    Boll, Esther Sørensen; Nejrup, Jens; Jensen, Julie K.

    2015-01-01

    Chemical fingerprinting analyses of 29 hydrocarbon-contaminated soils were performed to assess the soil quality and determine the main contaminant sources. The results were compared to an assessment based on concentrations of the 16 priority polycyclic aromatic hydrocarbons pointed out by the U...... and in assessing weathering trends of hydrocarbon contamination in the soils. Multivariate data analysis of sum-normalized concentrations could as a stand-alone tool distinguish between hydrocarbon sources of petrogenic and pyrogenic origin, differentiate within petrogenic sources, and detect weathering trends....... Diagnostic ratios of PACs were not successful for source identification of the heavily weathered hydrocarbon sources in the soils. The fingerprinting of contaminated soils revealed an underestimation of PACs in petrogenic contaminated soils when the assessment was based solely on EPAPAH16. As alkyl...

  11. Forensic use of fingermarks and fingerprints

    NARCIS (Netherlands)

    Meuwly, Didier; Li, Stan Z.; Jain, Anil K.

    2014-01-01

    The aim of this entry is to describe and explain the main forensic uses of fingermarks and fingerprints. It defines the concepts and provides the nomenclature related to forensic dactyloscopy. It describes the structure of the papillary ridges, the organization of the information in three levels,

  12. Geochemical fingerprints and pebbles zircon geochronology

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 125; Issue 7. Geochemical fingerprints and pebbles zircon geochronology: Implications for the provenance and tectonic setting of Lower Cretaceous sediments in the Zhucheng Basin (Jiaodong peninsula, North China). Jin-Long Ni Jun-Lai Liu Xiao-Ling Tang ...

  13. The spectroscopic detection of drugs of abuse in fingerprints after development with powders and recovery with adhesive lifters

    Science.gov (United States)

    West, Matthew J.; Went, Michael J.

    2009-01-01

    The application of powders to fingerprints has long been established as an effective and reliable method for developing latent fingerprints. Fingerprints developed in situ at a crime scene routinely undergo lifting with specialist tapes and are then stored in evidence bags to allow secure transit and also to preserve the chain of evidence. In a previous study we have shown that exogenous material within a fingerprint can be detected using Raman spectroscopy following development with powders and lifting with adhesive tapes. Other reports have detailed the use of Raman spectroscopy to the detection of drugs of abuse in latent fingerprints including cyanoacrylate-fumed fingerprints. This study involves the application of Raman spectroscopy for the analysis of drugs of abuse in latent fingerprints for fingerprints that had been treated with powders and also subsequently lifted with adhesive tapes. Samples of seized ecstasy, cocaine, ketamine and amphetamine were supplied by East Sussex Police and by the TICTAC unit at St. Georges Hospital Tooting. Contaminated fingerprints were deposited on clean glass slides. The application of aluminium or iron based powders to contaminated fingerprints did not interfere with the Raman spectra obtained for the contaminants. Contaminated fingerprints developed with powders and then lifted with lifting tapes were also examined. The combination of these two techniques did not interfere with the successful analysis. The lifting process was repeated using hinge lifters. As the hinge lifters exhibited strong Raman bands the spectroscopic analysis was more complex and an increase in the number of exposures to the detector allowed for improved clarification. Spectral subtraction was performed to remove peaks due to the hinge lifters using OMNIC software. Raman spectra of developed and lifted fingerprints recorded through evidence bags were obtained and it was found that the detection process was not compromised. Although the application of

  14. Contrast enhancement of fingerprint images using intuitionistic type II fuzzy set

    Directory of Open Access Journals (Sweden)

    Devarasan Ezhilmaran

    2015-04-01

    Full Text Available A novel contrast image enhancement of fingerprint images using intuitionistic type II fuzzy set theory is recommended in this work. The method of Hamacher T co-norm(S norm which generates a new membership function with the help of upper and lower membership function of type II fuzzy set. The finger print identification is one of the very few techniques employed in forensic science to aid criminal investigations in daily life, providing access control in financial security;-, visa related services, as well as others. Mostly fingerprint images are poorly illuminated and hardly visible, so it is necessary to enhance the input images. The enhancement is useful for authentication and matching. The fingerprint enhancement is vital for identifying and authenticating people by matching their fingerprints with the stored one in the database. The proposed enhancement of the intuitionistic type II fuzzy set theory results showed that it is more effective, especially, very useful for forensic science operations. The experimental results were compared with non-fuzzy, fuzzy, intuitionistic fuzzy and type II fuzzy methods in which the proposed method offered better results with good quality, less noise and low blur features.

  15. Microbial DNA fingerprinting of human fingerprints: dynamic colonization of fingertip microflora challenges human host inferences for forensic purposes

    NARCIS (Netherlands)

    S. Tims (Sebastian); W.J.B. van Wamel (Willem); H.P. Endtz (Hubert); A.F. van Belkum (Alex); M.H. Kayser (Manfred)

    2009-01-01

    textabstractHuman fingertip microflora is transferred to touched objects and may provide forensically relevant information on individual hosts, such as on geographic origins, if endogenous microbial skin species/strains would be retrievable from physical fingerprints and would carry geographically

  16. Typing DNA profiles from previously enhanced fingerprints using direct PCR.

    Science.gov (United States)

    Templeton, Jennifer E L; Taylor, Duncan; Handt, Oliva; Linacre, Adrian

    2017-07-01

    Fingermarks are a source of human identification both through the ridge patterns and DNA profiling. Typing nuclear STR DNA markers from previously enhanced fingermarks provides an alternative method of utilising the limited fingermark deposit that can be left behind during a criminal act. Dusting with fingerprint powders is a standard method used in classical fingermark enhancement and can affect DNA data. The ability to generate informative DNA profiles from powdered fingerprints using direct PCR swabs was investigated. Direct PCR was used as the opportunity to generate usable DNA profiles after performing any of the standard DNA extraction processes is minimal. Omitting the extraction step will, for many samples, be the key to success if there is limited sample DNA. DNA profiles were generated by direct PCR from 160 fingermarks after treatment with one of the following dactyloscopic fingerprint powders: white hadonite; silver aluminium; HiFi Volcano silk black; or black magnetic fingerprint powder. This was achieved by a combination of an optimised double-swabbing technique and swab media, omission of the extraction step to minimise loss of critical low-template DNA, and additional AmpliTaq Gold ® DNA polymerase to boost the PCR. Ninety eight out of 160 samples (61%) were considered 'up-loadable' to the Australian National Criminal Investigation DNA Database (NCIDD). The method described required a minimum of working steps, equipment and reagents, and was completed within 4h. Direct PCR allows the generation of DNA profiles from enhanced prints without the need to increase PCR cycle numbers beyond manufacturer's recommendations. Particular emphasis was placed on preventing contamination by applying strict protocols and avoiding the use of previously used fingerprint brushes. Based on this extensive survey, the data provided indicate minimal effects of any of these four powders on the chance of obtaining DNA profiles from enhanced fingermarks. Copyright © 2017

  17. An overview of DNA fingerprinting with 32P nucleotides

    International Nuclear Information System (INIS)

    Pappas, G.G.

    1992-01-01

    The DNA probes radiolabeled with 32 P, a primary tool employed by researchers in the life sciences for > 20 yr, are used by private companies, state-run laboratories, and the FBI to generate autoradiographs displaying the unique banding patterns that constitute the DNA fingerprint. The ability to identify an individual or animal from a biological sample has profound implications. Unidentified bodies, unrecognizable remains, and missing children can be tested and the DNA fingerprint compared to those of family members for positive identification. Paternity can be established before a child's birth. Immigration disputes can easily be resolved. Other uses include pedigree determination and testing for cell-line cross-contamination. Using a DNA fingerprint to determine the guilt or innocence of an individual allegedly involved in a violent crime is very controversial and has great legal and moral implications for society. Forensic laboratories have been challenged to ensure a level of quality control and quality assurance consistent with the weight given to these tests when used as evidence in a court of law

  18. Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures

    Directory of Open Access Journals (Sweden)

    Das Anupam

    2018-01-01

    Full Text Available The ability to track users’ activities across different websites and visits is a key tool in advertising and surveillance. The HTML5 DeviceMotion interface creates a new opportunity for such tracking via fingerprinting of smartphone motion sensors. We study the feasibility of carrying out such fingerprinting under real-world constraints and on a large scale. In particular, we collect measurements from several hundred users under realistic scenarios and show that the state-of-the-art techniques provide very low accuracy in these settings. We then improve fingerprinting accuracy by changing the classifier as well as incorporating auxiliary information. We also show how to perform fingerprinting in an open-world scenario where one must distinguish between known and previously unseen users.

  19. Microorganism Identification Based On MALDI-TOF-MS Fingerprints

    Science.gov (United States)

    Elssner, Thomas; Kostrzewa, Markus; Maier, Thomas; Kruppa, Gary

    Advances in MALDI-TOF mass spectrometry have enabled the ­development of a rapid, accurate and specific method for the identification of bacteria directly from colonies picked from culture plates, which we have named the MALDI Biotyper. The picked colonies are placed on a target plate, a drop of matrix solution is added, and a pattern of protein molecular weights and intensities, "the protein fingerprint" of the bacteria, is produced by the MALDI-TOF mass spectrometer. The obtained protein mass fingerprint representing a molecular signature of the microorganism is then matched against a database containing a library of previously measured protein mass fingerprints, and scores for the match to every library entry are produced. An ID is obtained if a score is returned over a pre-set threshold. The sensitivity of the techniques is such that only approximately 104 bacterial cells are needed, meaning that an overnight culture is sufficient, and the results are obtained in minutes after culture. The improvement in time to result over biochemical methods, and the capability to perform a non-targeted identification of bacteria and spores, potentially makes this method suitable for use in the detect-to-treat timeframe in a bioterrorism event. In the case of white-powder samples, the infectious spore is present in sufficient quantity in the powder so that the MALDI Biotyper result can be obtained directly from the white powder, without the need for culture. While spores produce very different patterns from the vegetative colonies of the corresponding bacteria, this problem is overcome by simply including protein fingerprints of the spores in the library. Results on spores can be returned within minutes, making the method suitable for use in the "detect-to-protect" timeframe.

  20. Similarity analyses of chromatographic herbal fingerprints: a review.

    Science.gov (United States)

    Goodarzi, Mohammad; Russell, Paul J; Vander Heyden, Yvan

    2013-12-04

    Herbal medicines are becoming again more popular in the developed countries because being "natural" and people thus often assume that they are inherently safe. Herbs have also been used worldwide for many centuries in the traditional medicines. The concern of their safety and efficacy has grown since increasing western interest. Herbal materials and their extracts are very complex, often including hundreds of compounds. A thorough understanding of their chemical composition is essential for conducting a safety risk assessment. However, herbal material can show considerable variability. The chemical constituents and their amounts in a herb can be different, due to growing conditions, such as climate and soil, the drying process, the harvest season, etc. Among the analytical methods, chromatographic fingerprinting has been recommended as a potential and reliable methodology for the identification and quality control of herbal medicines. Identification is needed to avoid fraud and adulteration. Currently, analyzing chromatographic herbal fingerprint data sets has become one of the most applied tools in quality assessment of herbal materials. Mostly, the entire chromatographic profiles are used to identify or to evaluate the quality of the herbs investigated. Occasionally only a limited number of compounds are considered. One approach to the safety risk assessment is to determine whether the herbal material is substantially equivalent to that which is either readily consumed in the diet, has a history of application or has earlier been commercialized i.e. to what is considered as reference material. In order to help determining substantial equivalence using fingerprint approaches, a quantitative measurement of similarity is required. In this paper, different (dis)similarity approaches, such as (dis)similarity metrics or exploratory analysis approaches applied on herbal medicinal fingerprints, are discussed and illustrated with several case studies. Copyright © 2013