SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
92 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
Gabor Filter Ali Abdul Azeez Mohammad baker Computer Science Department Kufa university Najaf/Iraq 
alia.qazzaz@uokufa.edu.iq 
Abstract—Gabor filter is a powerful way to enhance biometric images like fingerprint images in order to extract correct features from these images, Gabor filter used in extracting features directly asin iris images, and sometimes Gabor filter has been used for texture analysis. In fingerprint images The even symmetric Gabor filter is contextual filter or multi-resolution filter will be used to enhance fingerprint imageby filling small gaps (low-pass effect) in the direction of the ridge (black regions) and to increase the discrimination between ridge and valley (black and white regions) in the direction, orthogonal to the ridge, the proposed method in applying Gabor filter on fingerprint images depending on translated fingerprint image into binary image after applying some simple enhancing methods to partially overcome time consuming problem of the Gabor filter. Index Terms—Gabor filter, fingerprint, binary image, biometrics, orientation. 
I. INTRODUCTION 
Every person own ten unique fingerprints. This makes fingerprint matching system one of the most reliablesystems for identifying people, fingerprint image may be shown as a uniform pattern of parallel ridges and valleys run together, ridges are the black regions while valleys are the white regions in fingerprint image as illustrated in figure (1).some permanent (like ridge ending and bifurcate) and semi-permanent features such as scars, cuts are also shown in a fingerprint image. There are many features can be discoveredin fingerprint image which enable fingerprint matching system to make sound judgment about whether any two prints came from same finger or not, these features can be divided into two groups 
 Local features : A local feature consists of several components, each component typically derived from a spatially restricted region of the fingerprint , these features extracted from ridges by analyzing the ridge behavior as individual or the relations between consecutive ridges this group of features involves many features, some of these features are Ridge ending, bifurcation, Dot or island, Hook, Lake, and Bridge, These features also called minutiae and most fingerprint identification systems depend only on only ridge ending and bifurcate in matching process as illustrated in figure(1), these features used in matching any two prints and enable system in making decision if these two prints identical or not. There are about (70 to 150) minutiae in a typical fingerprint image. 
 Global features: these features involved two important features which are core and delta ,core can be defined as the top most point on the inner most ridge while delta point can be defined as the point where three ridge directions meet as illustrated in figure(1), these features also called singular points or singularities. 
Fig. 1 fingerprint image 
To extractglobal features precisely, fingerprint image must be enhanced by using perfect methods of contextual filter or multi-resolution filter, and if the enhancement step uses a single filter convolution for the entire fingerprint image, it creates significant number of false minutiae, a large number of true minutiae are missed and, a significant error in the location (position and orientation) of minutiae may be introduced. 
II. PROPOSED METHOD 
The proposed system consist of the following steps as illustrated in figure (2) 
 Applying median filter. 
 Normalization.
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
93 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
 Calculating pixels orientation by using Sobel image. 
 Dividing image into blocks, and calculating blocks 
orientation. 
 Translatingfingerprint image into binary. 
 CalculatingGabor filter for each pixel. 
Each one of the above steps can be illustrated as follows 
A. Applying median filter 
The fingerprint image divided into (3×3) matrices, each 
matrix translated into a victor with (9) values that arranged in 
any order(ascending or descending)then the center of the 
matrix will be replaced with the middle value of the vector, the 
result of applying this filter can be illustrated in figure (3). 
Fig. 2 block diagram of the proposed system 
B. Normalization process 
Normalization process is used to fixed the intensity values of 
the pixels within a desired or wanted range by applying 
equation (1) 
 
 
 
 
 
 
 
 
 
otherwise 
V 
I i j M 
o 
v 
o 
M 
if I i j M 
V 
I i j M 
o 
v 
o 
M 
N i j 
( ( , ) )2 
( , ) 
( ( , ) )2 
( , )  
Where, M and V are the mean and variance of the fingerprint 
image I (i, j), Mo and Vo are the desired mean and variance 
values. 
The result of applying this process is illustrated in figure (3) 
a .Original image b. applying median filter 
c. normalization result 
Fig. 3 Applying median filter and normalization process 
C. Applying Sobel masks 
Orientation in each pixel can be calculated by using Sobel 
vertical and horizontal masks as illustrated in figure (4) 
Z1 Z2 Z3 
-1 -2 -1 
-1 0 1 
Z4 Z5 Z6 0 0 0 -2 0 2 
Z7 Z8 Z9 1 2 1 -1 0 1 
a- Image b- Vertical mask c- Horizontal mask 
Fig. 4 Sobel masks 
Original image 
Applying Sobel masks to 
calculate orientation for each 
pixel 
Normalization 
Applying median filter 
Dividing fingerprint image into blocks and 
Calculating blocks orientation. 
Constructing and applying Gabor filter for each pixel in 
binary fingerprint image 
Translating to 
binary image
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
94 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
The orientation value in each pixel will be calculated by 
using the following equations 
( , ) ( 2 ) ( 2 ) 7 8 9 1 2 3 y p q  z  z  z  z  z  z (2) 
( , ) ( 2 ) ( 2 ) 3 6 9 1 4 7 x p q  z  z  z  z  z  z (3) 
D. Dividing image into blocks, and calculating blocks 
orientation 
The fingerprint image will be divided into non overlap 
blocks with size of (W×W) , and the orientation of each block 
will be calculated as follows 
( , ) 2 ( , ) ( , ) 
2 
2 
2 
2 
v i j p q p q y 
w 
i 
w 
p i 
w 
j 
w 
q j 
y x      
 
  
 
  
(4) 
( , ) ( , ) ( , ) 2 
2 
2 
2 
2 
2 v i j p q p q y 
w 
i 
w 
p i 
w 
j 
w 
q j 
x x     
 
  
 
  
(5) 
( , ) 
( , ) 
tan 
2 
1 
( , ) 1 
v i j 
v i j 
i j 
x 
 y   (6) 
Where θ is The block orientation and (w =17) 
E. Translating fingerprint image into binary image 
The fingerprint image will be converted into a binary 
representation as shown in figure (5) by dividing the image 
into (W×W) non overlap blocks and calculating the mean for 
each block by using equation (7) 
 
 
 
 
  
 
1 
0 
1 
0 
( , ) 
1 w 
i 
w 
j 
image i j 
w w 
bloack mean (7) 
Binary image (i, j) =255 
if enhanced image pixel (i, j) ≥ block mean 
Binary image (i, j) =0 
if enhanced image pixel (i, j) < block mean 
a-original image b- enhanced image 
c- binary image 
Fig. 5 Binary image 
F. Calculating Gabor filter for each pixel 
The fingerprint image will be divided into (W × W) overlap 
blocks and these blocks will be filtered with Gabor filter. An 
even symmetric Gabor filter has the following general form in 
the spatial domain 
cos(2 fx ) 
2 
1 
( , , , ) 2 1 
2 
1 
2 
2 
1  
 
 
 
 
 
 
   
 
  
 
 
 
 
 
x y 
x y 
G x y f Exp 
  
 (8) 
cos sin 1 X  x  y (9) 
sin cos 1 Y  x  y (10) 
Where, (ƒ) is the frequency of the sinusoidal plane wave 
along the direction (θ) from the x-axis, and (δx, δy) are the 
space constants of the Gaussian envelope along x and y axes, 
respectively. In our proposed method we used ƒ =0.1, 
δx=4,and δy=4, The result of applying Gabor filter is illustrate 
in figure (6). 
a- Original image b- Image after apply Gabor filter 
Fig. 6 Applying Gabor filter
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
95 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
III. RESULTS 
After applying the proposed method on fingerprint images the results of three examples will be illustrated Example 1:- 
a-original image b-enhanced image 
c-binary image d-Gabor image 
Fig. 7 results (1) 
Example 2:- 
a-original image b-enhanced image 
c-binary image d-Gabor image 
Fig. 8 results (2) 
Example 3:- 
a-original image b-enhanced image 
c-binary image d-Gabor image 
Fig. 9 results (3) 
IV. CONCLUSION 
 Applying Gabor filter on binary image simplified calculation and makes perfect enhanced results. 
 Multi resolution filters are time consuming compared with simple filters.
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
96 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
 Good enhancement methods make fingerprint system more reliable. 
REFERENCES 
1- [Iwasokun 2012] Iwasokun Gabriel Babatunde, AkinyokunOluwole Charles, Alese Boniface Kayode, and OlabodeOlatubosun "Fingerprint Image Enhancement: Segmentation to Thinning",(IJACSA) International Journal of Advanced Computer Science and Applications, 2012. 
2- [Kumud 2011] KumudArora, and Dr.PoonamGarg "A Quantitative Survey of various Fingerprint Enhancement techniques", International Journal of Computer Applications, 2011. 
3- [Liu 2008] Liu Wei "Fingerprint Classification Using Singularities Detection", international journal of mathematics and computers in simulation, 2008. 
4- [Peihao 2007] Peihao Huang, Chia-Yung Chang, Chaur-Chin Chen "Implementation of an Automatic Fingerprint Identification System", IEEE, 2007. 
5- [Salil 2002] Salil Prabhakar, Anil K. Jain, and Sharath Pankanti "Learning fingerprint minutiae location and type", Watson Research Center, Yorktown Heights, NY 10598, USA, 2002. 
6- [William 2001] William K. Pratt "digital image processing ", Los Altos, California, USA, 2001.

Contenu connexe

Tendances

Wavelet based image compression technique
Wavelet based image compression techniqueWavelet based image compression technique
Wavelet based image compression techniquePriyanka Pachori
 
Image Filtering in the Frequency Domain
Image Filtering in the Frequency DomainImage Filtering in the Frequency Domain
Image Filtering in the Frequency DomainAmnaakhaan
 
Image Acquisition and Representation
Image Acquisition and RepresentationImage Acquisition and Representation
Image Acquisition and RepresentationAmnaakhaan
 
Lecture 16 KL Transform in Image Processing
Lecture 16 KL Transform in Image ProcessingLecture 16 KL Transform in Image Processing
Lecture 16 KL Transform in Image ProcessingVARUN KUMAR
 
digital image processing
digital image processingdigital image processing
digital image processingAbinaya B
 
Thresholding.ppt
Thresholding.pptThresholding.ppt
Thresholding.pptshankar64
 
Edge Detection using Hough Transform
Edge Detection using Hough TransformEdge Detection using Hough Transform
Edge Detection using Hough TransformMrunal Selokar
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation pptGichelle Amon
 
Image Enhancement - Point Processing
Image Enhancement - Point ProcessingImage Enhancement - Point Processing
Image Enhancement - Point ProcessingGayathri31093
 
Application of edge detection
Application of edge detectionApplication of edge detection
Application of edge detectionNaresh Biloniya
 
DIGITAL IMAGE PROCESSING - LECTURE NOTES
DIGITAL IMAGE PROCESSING - LECTURE NOTESDIGITAL IMAGE PROCESSING - LECTURE NOTES
DIGITAL IMAGE PROCESSING - LECTURE NOTESEzhilya venkat
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image CompressionMathankumar S
 
Image Smoothing using Frequency Domain Filters
Image Smoothing using Frequency Domain FiltersImage Smoothing using Frequency Domain Filters
Image Smoothing using Frequency Domain FiltersSuhaila Afzana
 
Image restoration and degradation model
Image restoration and degradation modelImage restoration and degradation model
Image restoration and degradation modelAnupriyaDurai
 

Tendances (20)

Wavelet based image compression technique
Wavelet based image compression techniqueWavelet based image compression technique
Wavelet based image compression technique
 
Image Filtering in the Frequency Domain
Image Filtering in the Frequency DomainImage Filtering in the Frequency Domain
Image Filtering in the Frequency Domain
 
Image transforms
Image transformsImage transforms
Image transforms
 
Image Acquisition and Representation
Image Acquisition and RepresentationImage Acquisition and Representation
Image Acquisition and Representation
 
Hit and-miss transform
Hit and-miss transformHit and-miss transform
Hit and-miss transform
 
Lecture 16 KL Transform in Image Processing
Lecture 16 KL Transform in Image ProcessingLecture 16 KL Transform in Image Processing
Lecture 16 KL Transform in Image Processing
 
digital image processing
digital image processingdigital image processing
digital image processing
 
Image segmentation
Image segmentation Image segmentation
Image segmentation
 
Thresholding.ppt
Thresholding.pptThresholding.ppt
Thresholding.ppt
 
Edge Detection using Hough Transform
Edge Detection using Hough TransformEdge Detection using Hough Transform
Edge Detection using Hough Transform
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
 
Data Redundacy
Data RedundacyData Redundacy
Data Redundacy
 
Image Enhancement - Point Processing
Image Enhancement - Point ProcessingImage Enhancement - Point Processing
Image Enhancement - Point Processing
 
Application of edge detection
Application of edge detectionApplication of edge detection
Application of edge detection
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 
DIGITAL IMAGE PROCESSING - LECTURE NOTES
DIGITAL IMAGE PROCESSING - LECTURE NOTESDIGITAL IMAGE PROCESSING - LECTURE NOTES
DIGITAL IMAGE PROCESSING - LECTURE NOTES
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image Compression
 
Image Smoothing using Frequency Domain Filters
Image Smoothing using Frequency Domain FiltersImage Smoothing using Frequency Domain Filters
Image Smoothing using Frequency Domain Filters
 
Image restoration and degradation model
Image restoration and degradation modelImage restoration and degradation model
Image restoration and degradation model
 

Similaire à Gabor Filter

Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques CSCJournals
 
An approach to improving edge
An approach to improving edgeAn approach to improving edge
An approach to improving edgeijma
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filtereSAT Publishing House
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
 
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...IOSR Journals
 
EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEIAEME Publication
 
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESDIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESAM Publications
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...CSCJournals
 
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...IJMER
 
An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...Kunal Kishor Nirala
 
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...IOSR Journals
 
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...ZaidHussein6
 
Dense Visual Odometry Using Genetic Algorithm
Dense Visual Odometry Using Genetic AlgorithmDense Visual Odometry Using Genetic Algorithm
Dense Visual Odometry Using Genetic AlgorithmSlimane Djema
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALsipij
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentCSCJournals
 

Similaire à Gabor Filter (20)

Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques
 
An approach to improving edge
An approach to improving edgeAn approach to improving edge
An approach to improving edge
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
 
EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGE
 
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESDIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
 
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
 
An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...
 
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
 
B018110915
B018110915B018110915
B018110915
 
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
 
Dense Visual Odometry Using Genetic Algorithm
Dense Visual Odometry Using Genetic AlgorithmDense Visual Odometry Using Genetic Algorithm
Dense Visual Odometry Using Genetic Algorithm
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
 
F045033337
F045033337F045033337
F045033337
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
E017443136
E017443136E017443136
E017443136
 
I04302068075
I04302068075I04302068075
I04302068075
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
 

Plus de International Journal of Computer and Communication System Engineering

Plus de International Journal of Computer and Communication System Engineering (20)

Cloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care SystemsCloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care Systems
 
Efficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdmaEfficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdma
 
A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
 
Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...
 
Real Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android PhonesReal Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android Phones
 
An Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge LibraryAn Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge Library
 
Compact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch AntennaCompact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch Antenna
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
 
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
 
An Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori AlgorithmAn Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori Algorithm
 
Cloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in BusinessCloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in Business
 
Mobile Effects on Human Body
Mobile Effects on Human BodyMobile Effects on Human Body
Mobile Effects on Human Body
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGESCLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
 
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
 
Feasibility Study on e-Voting System
Feasibility Study on e-Voting SystemFeasibility Study on e-Voting System
Feasibility Study on e-Voting System
 
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
 
Rp 3010 5814
Rp 3010 5814Rp 3010 5814
Rp 3010 5814
 

Dernier

Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 

Dernier (20)

Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 

Gabor Filter

  • 1. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 92 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com Gabor Filter Ali Abdul Azeez Mohammad baker Computer Science Department Kufa university Najaf/Iraq alia.qazzaz@uokufa.edu.iq Abstract—Gabor filter is a powerful way to enhance biometric images like fingerprint images in order to extract correct features from these images, Gabor filter used in extracting features directly asin iris images, and sometimes Gabor filter has been used for texture analysis. In fingerprint images The even symmetric Gabor filter is contextual filter or multi-resolution filter will be used to enhance fingerprint imageby filling small gaps (low-pass effect) in the direction of the ridge (black regions) and to increase the discrimination between ridge and valley (black and white regions) in the direction, orthogonal to the ridge, the proposed method in applying Gabor filter on fingerprint images depending on translated fingerprint image into binary image after applying some simple enhancing methods to partially overcome time consuming problem of the Gabor filter. Index Terms—Gabor filter, fingerprint, binary image, biometrics, orientation. I. INTRODUCTION Every person own ten unique fingerprints. This makes fingerprint matching system one of the most reliablesystems for identifying people, fingerprint image may be shown as a uniform pattern of parallel ridges and valleys run together, ridges are the black regions while valleys are the white regions in fingerprint image as illustrated in figure (1).some permanent (like ridge ending and bifurcate) and semi-permanent features such as scars, cuts are also shown in a fingerprint image. There are many features can be discoveredin fingerprint image which enable fingerprint matching system to make sound judgment about whether any two prints came from same finger or not, these features can be divided into two groups  Local features : A local feature consists of several components, each component typically derived from a spatially restricted region of the fingerprint , these features extracted from ridges by analyzing the ridge behavior as individual or the relations between consecutive ridges this group of features involves many features, some of these features are Ridge ending, bifurcation, Dot or island, Hook, Lake, and Bridge, These features also called minutiae and most fingerprint identification systems depend only on only ridge ending and bifurcate in matching process as illustrated in figure(1), these features used in matching any two prints and enable system in making decision if these two prints identical or not. There are about (70 to 150) minutiae in a typical fingerprint image.  Global features: these features involved two important features which are core and delta ,core can be defined as the top most point on the inner most ridge while delta point can be defined as the point where three ridge directions meet as illustrated in figure(1), these features also called singular points or singularities. Fig. 1 fingerprint image To extractglobal features precisely, fingerprint image must be enhanced by using perfect methods of contextual filter or multi-resolution filter, and if the enhancement step uses a single filter convolution for the entire fingerprint image, it creates significant number of false minutiae, a large number of true minutiae are missed and, a significant error in the location (position and orientation) of minutiae may be introduced. II. PROPOSED METHOD The proposed system consist of the following steps as illustrated in figure (2)  Applying median filter.  Normalization.
  • 2. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 93 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com  Calculating pixels orientation by using Sobel image.  Dividing image into blocks, and calculating blocks orientation.  Translatingfingerprint image into binary.  CalculatingGabor filter for each pixel. Each one of the above steps can be illustrated as follows A. Applying median filter The fingerprint image divided into (3×3) matrices, each matrix translated into a victor with (9) values that arranged in any order(ascending or descending)then the center of the matrix will be replaced with the middle value of the vector, the result of applying this filter can be illustrated in figure (3). Fig. 2 block diagram of the proposed system B. Normalization process Normalization process is used to fixed the intensity values of the pixels within a desired or wanted range by applying equation (1)          otherwise V I i j M o v o M if I i j M V I i j M o v o M N i j ( ( , ) )2 ( , ) ( ( , ) )2 ( , )  Where, M and V are the mean and variance of the fingerprint image I (i, j), Mo and Vo are the desired mean and variance values. The result of applying this process is illustrated in figure (3) a .Original image b. applying median filter c. normalization result Fig. 3 Applying median filter and normalization process C. Applying Sobel masks Orientation in each pixel can be calculated by using Sobel vertical and horizontal masks as illustrated in figure (4) Z1 Z2 Z3 -1 -2 -1 -1 0 1 Z4 Z5 Z6 0 0 0 -2 0 2 Z7 Z8 Z9 1 2 1 -1 0 1 a- Image b- Vertical mask c- Horizontal mask Fig. 4 Sobel masks Original image Applying Sobel masks to calculate orientation for each pixel Normalization Applying median filter Dividing fingerprint image into blocks and Calculating blocks orientation. Constructing and applying Gabor filter for each pixel in binary fingerprint image Translating to binary image
  • 3. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 94 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com The orientation value in each pixel will be calculated by using the following equations ( , ) ( 2 ) ( 2 ) 7 8 9 1 2 3 y p q  z  z  z  z  z  z (2) ( , ) ( 2 ) ( 2 ) 3 6 9 1 4 7 x p q  z  z  z  z  z  z (3) D. Dividing image into blocks, and calculating blocks orientation The fingerprint image will be divided into non overlap blocks with size of (W×W) , and the orientation of each block will be calculated as follows ( , ) 2 ( , ) ( , ) 2 2 2 2 v i j p q p q y w i w p i w j w q j y x            (4) ( , ) ( , ) ( , ) 2 2 2 2 2 2 v i j p q p q y w i w p i w j w q j x x           (5) ( , ) ( , ) tan 2 1 ( , ) 1 v i j v i j i j x  y   (6) Where θ is The block orientation and (w =17) E. Translating fingerprint image into binary image The fingerprint image will be converted into a binary representation as shown in figure (5) by dividing the image into (W×W) non overlap blocks and calculating the mean for each block by using equation (7)        1 0 1 0 ( , ) 1 w i w j image i j w w bloack mean (7) Binary image (i, j) =255 if enhanced image pixel (i, j) ≥ block mean Binary image (i, j) =0 if enhanced image pixel (i, j) < block mean a-original image b- enhanced image c- binary image Fig. 5 Binary image F. Calculating Gabor filter for each pixel The fingerprint image will be divided into (W × W) overlap blocks and these blocks will be filtered with Gabor filter. An even symmetric Gabor filter has the following general form in the spatial domain cos(2 fx ) 2 1 ( , , , ) 2 1 2 1 2 2 1                   x y x y G x y f Exp    (8) cos sin 1 X  x  y (9) sin cos 1 Y  x  y (10) Where, (ƒ) is the frequency of the sinusoidal plane wave along the direction (θ) from the x-axis, and (δx, δy) are the space constants of the Gaussian envelope along x and y axes, respectively. In our proposed method we used ƒ =0.1, δx=4,and δy=4, The result of applying Gabor filter is illustrate in figure (6). a- Original image b- Image after apply Gabor filter Fig. 6 Applying Gabor filter
  • 4. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 95 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com III. RESULTS After applying the proposed method on fingerprint images the results of three examples will be illustrated Example 1:- a-original image b-enhanced image c-binary image d-Gabor image Fig. 7 results (1) Example 2:- a-original image b-enhanced image c-binary image d-Gabor image Fig. 8 results (2) Example 3:- a-original image b-enhanced image c-binary image d-Gabor image Fig. 9 results (3) IV. CONCLUSION  Applying Gabor filter on binary image simplified calculation and makes perfect enhanced results.  Multi resolution filters are time consuming compared with simple filters.
  • 5. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 96 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com  Good enhancement methods make fingerprint system more reliable. REFERENCES 1- [Iwasokun 2012] Iwasokun Gabriel Babatunde, AkinyokunOluwole Charles, Alese Boniface Kayode, and OlabodeOlatubosun "Fingerprint Image Enhancement: Segmentation to Thinning",(IJACSA) International Journal of Advanced Computer Science and Applications, 2012. 2- [Kumud 2011] KumudArora, and Dr.PoonamGarg "A Quantitative Survey of various Fingerprint Enhancement techniques", International Journal of Computer Applications, 2011. 3- [Liu 2008] Liu Wei "Fingerprint Classification Using Singularities Detection", international journal of mathematics and computers in simulation, 2008. 4- [Peihao 2007] Peihao Huang, Chia-Yung Chang, Chaur-Chin Chen "Implementation of an Automatic Fingerprint Identification System", IEEE, 2007. 5- [Salil 2002] Salil Prabhakar, Anil K. Jain, and Sharath Pankanti "Learning fingerprint minutiae location and type", Watson Research Center, Yorktown Heights, NY 10598, USA, 2002. 6- [William 2001] William K. Pratt "digital image processing ", Los Altos, California, USA, 2001.