Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
1.1 INTRODUCTION
This project deals with the detection of background in images with poor contrast.
Some morphological transformations are used to detect the background in images
characterized by poor lighting. Lately, contrast image enhancement has been carried out by
the application of two operators based on the Weber’s law notion. The first operator employs
information from block analysis, while the second transformation utilizes the opening by
reconstruction, which is employed to define the multi-background notion. The objective of
contrast operators consists in normalizing the grey level of the input image with the purpose
of avoiding abrupt changes in intensity among the different regions. Finally, the performance
of the proposed operators is illustrated through the processing of images with different
backgrounds, the majority of them with poor lighting conditions. The complete image
processing is done using MATLAB simulation model.
The optimization formulation includes a perceptual constraint derived directly
from human supra threshold contrast sensitivity function. The authors apply the proposed
operators to some images with poor lighting with good results. On the other hand a
methodology to enhance contrast based on color statistics from a training set of images which
look visually appealing is presented. Here, the basic idea is to select a set of training images
which look good perceptually, next a Gaussian mixture model for the color distribution in the
face region is built, and for any given input image, a color tone mapping is performed so that
the color statistics in the face region matches the training examples. In this way, even though
the reported algorithms to compensate changes in lighting are varied, some are more adequate
than others. In this work, two methodologies to compute the image background are proposed.
Also, some operators to enhance and normalize the contrast in grey level images with poor
lighting are introduced. Contrast operators are based on the logarithm function in a similar
way to Weber’s law the use of the logarithm function avoids abrupt changes in lighting. Also,
two approximations to compute the background in the processed images are proposed. The
first proposal consists in an analysis by blocks, whereas in the second proposal, the opening
by reconstruction is used given its following properties: a) it passes through regional minima,
and b) it merges components of the image without considerably modifying other structures.
The developments in science and technology have made it possible to use canny in
applications where it is required to establish or confirm the identity of individuals.
The technology is designed to automatically take a picture from the passengers and
match it to the digitized image stored in the canny passports. Recently, US government is
also conducting a Registered Travellers Program which uses a combination of fingerprint and
edge detection recognition technology to speed up the security check process at some
airports. In the field of financial services, canny technology has shown a great potential in
offering more comfort to customers while increasing their security. As an example, banking
services and payments based on canny are going to be much safer, faster and easier than the
existing methods based on credit and debit cards. Proposed forms of payments such as pay
and touch scheme based on fingerprint or smart cards with stored edge detection information
on them are examples of such applications. Although there are still some concerns about
using canny in the mass consumer applications due to information protection issues, it is
believed that the technology will find its way to be widely used in many different
applications. Moreover, access control applications such as database access and computer
login also benefit from the new offered technologies. Compared to passwords, canny
technologies offer more secure and comfortable accessibility and have dealt with problems
such as forgetting or hacking passwords. Overall, the future of canny technology is believed
to be open for more investments based on the new services it has to offer to the society.
Canny such as signatures, photographs, fingerprints, voiceprints, DNA and retinal blood
vessel patterns all have significant drawbacks. Face Recognition: Changes with Age,
Expression, Viewing angle, Illumination. Finger Print Recognition: Fingerprints or
handprints require physical contact, and they also can be counterfeited and marred by
artefacts. Speech Recognition: Electronically recorded voiceprints are susceptible to changes
in a person’s voice, and they can be counterfeited. Signature Recognition: Signatures and
photographs are cheap and easy to obtain and store, they are impossible to identify
automatically with assurance, and are easily forged
1.4 Motivation
The purpose of detecting sharp changes in image brightness is to capture important
events and changes in properties of the world. It can be shown that under rather general
assumptions for an image formation model, discontinuities in image brightness are likely to
correspond to
discontinuities in depth,
discontinuities in surface orientation,
Edge detection is one of the fundamental steps in image processing, image analysis,
image pattern recognition, and computer vision techniques. During recent years, however,
substantial (and successful) research has also been made on computer vision methods that do
not explicitly rely on edge detection as a pre-processing step.
1.5 Objective
The objective of this work is to develop a new edge detection recognition system for
canny recognition. The development tool used will be MATLAB, and emphasis will be only
on the software for performing recognition, and not hardware for capturing a canny image.
To study the existing edge detection recognition system along with their merits and
demerits. To present an improved noise removing approach based on infusion of edge and
region information. To determine the uniqueness of edge detection patterns in terms of
hamming distance distribution by comparing template generated from different eyes. To find
the recognition performance rate and computational complexity.
1.6 ORGANIZATION OF DOCUMENTATION
The rest of the thesis is organized as follows. The basic concept of edge detection
recognition, various elements with a survey of some well known iris recognition methods
represent in Chapter 2
As the first stage, iris segmentation is very important for an iris recognition system.
The proposed segmentation, normalization and infusion of edge and region information is
discussed in Chapter 3.