Low-Complexity Analysis of Repetitive Regularities for Biometric Applications

نویسندگان

  • Lei Wang
  • Niral Patel
چکیده

Presented in this paper is a joint algorithm optimization and architecture design framework for analysis of repetitive regularities. Two closely coupled algorithm optimization techniques, referred to as the prime subspace periodicity transform (PSPT) and circular periodicity transform (CPT), are developed that significantly reduce computational complexity while enable the extraction of a wide spectrum of periodic features. The proposed PSPTCPT algorithms lead to a parallel and resource-sharing VLSI architecture. While most of the current systems rely on software solutions to performance feature extraction, the performance benefits rendered by the proposed framework show advantages in dealing with data-intensive computation for emerging applications in biometrics and bioinformatics. The explosive growth in database complexity combined with demand for fast analysis make the proposed framework a promising solution. Experimental results on an iris identification system demonstrate up to 99.2% accuracy and 24.6%− 41.9% reduction in computational complexity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysing Syntactic Regularities in Ontologies

Syntactic regularities are repetitive structures of axioms in the asserted form of an ontology. The Regularity Inspector for Ontologies (RIO) is a framework for detecting such regularities in ontologies using cluster analysis. Detection of syntactic regularities can be used to identify parts of an ontology that have a similar syntactic structure, and could therefore provide an intuition of thei...

متن کامل

A Nonlinear Grayscale Morphological and Unsupervised method for Human Facial Synthesis Based on an Example Image

Human facial generation of example image is used as a requirement for biometric applications for the purpose of identifying individuals. In this paper, face generation consists of three main steps. In the first step, detection of significant lines and edges of the example image are carried out using nonlinear grayscale morphology. Then, hair areas are identified from the face of sample. The fin...

متن کامل

An Optimized Iris Recognition System for Multi-level Security Applications

This paper proposes an optimized iris recognition system which is suitable for client applications with several security levels. The innovations are the low dimensionality of the iris feature space and the hierarchical classification-based identification method; in this approach the biometric samples are processed in 3 stages to provide identification final decisions. The proposed design soluti...

متن کامل

Finger Nail Plate: A New Biometric Identifier

The key objective of this paper is to investigate a new biometric identifier for forensic and civilian applications. We propose a novel biometric authentication system based on low resolution finger nail plate images. Despite the uniqueness and high stability of the nail plate, its usage as a biometric identifier has not been extensively investigated for personal authentication. This paper impl...

متن کامل

Algorithms for Computing the λ-regularities in Strings

We introduce the notion of λ-regularities in strings that consist of λ-covers and λ-seeds, and study three λ-regularities problems— the λ-cover problem, the general λ-cover problem and the λ-seed problem in this paper. λ-regularities can be viewed as generalized string regularities in the sense that a set of λ repetitive strings rather than a single repeated string are considered. We first pres...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCP

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2007