SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
92 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
Gabor Filter Ali Abdul Azeez Mohammad baker Computer Science Department Kufa university Najaf/Iraq 
alia.qazzaz@uokufa.edu.iq 
Abstract—Gabor filter is a powerful way to enhance biometric images like fingerprint images in order to extract correct features from these images, Gabor filter used in extracting features directly asin iris images, and sometimes Gabor filter has been used for texture analysis. In fingerprint images The even symmetric Gabor filter is contextual filter or multi-resolution filter will be used to enhance fingerprint imageby filling small gaps (low-pass effect) in the direction of the ridge (black regions) and to increase the discrimination between ridge and valley (black and white regions) in the direction, orthogonal to the ridge, the proposed method in applying Gabor filter on fingerprint images depending on translated fingerprint image into binary image after applying some simple enhancing methods to partially overcome time consuming problem of the Gabor filter. Index Terms—Gabor filter, fingerprint, binary image, biometrics, orientation. 
I. INTRODUCTION 
Every person own ten unique fingerprints. This makes fingerprint matching system one of the most reliablesystems for identifying people, fingerprint image may be shown as a uniform pattern of parallel ridges and valleys run together, ridges are the black regions while valleys are the white regions in fingerprint image as illustrated in figure (1).some permanent (like ridge ending and bifurcate) and semi-permanent features such as scars, cuts are also shown in a fingerprint image. There are many features can be discoveredin fingerprint image which enable fingerprint matching system to make sound judgment about whether any two prints came from same finger or not, these features can be divided into two groups 
 Local features : A local feature consists of several components, each component typically derived from a spatially restricted region of the fingerprint , these features extracted from ridges by analyzing the ridge behavior as individual or the relations between consecutive ridges this group of features involves many features, some of these features are Ridge ending, bifurcation, Dot or island, Hook, Lake, and Bridge, These features also called minutiae and most fingerprint identification systems depend only on only ridge ending and bifurcate in matching process as illustrated in figure(1), these features used in matching any two prints and enable system in making decision if these two prints identical or not. There are about (70 to 150) minutiae in a typical fingerprint image. 
 Global features: these features involved two important features which are core and delta ,core can be defined as the top most point on the inner most ridge while delta point can be defined as the point where three ridge directions meet as illustrated in figure(1), these features also called singular points or singularities. 
Fig. 1 fingerprint image 
To extractglobal features precisely, fingerprint image must be enhanced by using perfect methods of contextual filter or multi-resolution filter, and if the enhancement step uses a single filter convolution for the entire fingerprint image, it creates significant number of false minutiae, a large number of true minutiae are missed and, a significant error in the location (position and orientation) of minutiae may be introduced. 
II. PROPOSED METHOD 
The proposed system consist of the following steps as illustrated in figure (2) 
 Applying median filter. 
 Normalization.
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
93 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
 Calculating pixels orientation by using Sobel image. 
 Dividing image into blocks, and calculating blocks 
orientation. 
 Translatingfingerprint image into binary. 
 CalculatingGabor filter for each pixel. 
Each one of the above steps can be illustrated as follows 
A. Applying median filter 
The fingerprint image divided into (3×3) matrices, each 
matrix translated into a victor with (9) values that arranged in 
any order(ascending or descending)then the center of the 
matrix will be replaced with the middle value of the vector, the 
result of applying this filter can be illustrated in figure (3). 
Fig. 2 block diagram of the proposed system 
B. Normalization process 
Normalization process is used to fixed the intensity values of 
the pixels within a desired or wanted range by applying 
equation (1) 
 
 
 
 
 
 
 
 
 
otherwise 
V 
I i j M 
o 
v 
o 
M 
if I i j M 
V 
I i j M 
o 
v 
o 
M 
N i j 
( ( , ) )2 
( , ) 
( ( , ) )2 
( , )  
Where, M and V are the mean and variance of the fingerprint 
image I (i, j), Mo and Vo are the desired mean and variance 
values. 
The result of applying this process is illustrated in figure (3) 
a .Original image b. applying median filter 
c. normalization result 
Fig. 3 Applying median filter and normalization process 
C. Applying Sobel masks 
Orientation in each pixel can be calculated by using Sobel 
vertical and horizontal masks as illustrated in figure (4) 
Z1 Z2 Z3 
-1 -2 -1 
-1 0 1 
Z4 Z5 Z6 0 0 0 -2 0 2 
Z7 Z8 Z9 1 2 1 -1 0 1 
a- Image b- Vertical mask c- Horizontal mask 
Fig. 4 Sobel masks 
Original image 
Applying Sobel masks to 
calculate orientation for each 
pixel 
Normalization 
Applying median filter 
Dividing fingerprint image into blocks and 
Calculating blocks orientation. 
Constructing and applying Gabor filter for each pixel in 
binary fingerprint image 
Translating to 
binary image
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
94 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
The orientation value in each pixel will be calculated by 
using the following equations 
( , ) ( 2 ) ( 2 ) 7 8 9 1 2 3 y p q  z  z  z  z  z  z (2) 
( , ) ( 2 ) ( 2 ) 3 6 9 1 4 7 x p q  z  z  z  z  z  z (3) 
D. Dividing image into blocks, and calculating blocks 
orientation 
The fingerprint image will be divided into non overlap 
blocks with size of (W×W) , and the orientation of each block 
will be calculated as follows 
( , ) 2 ( , ) ( , ) 
2 
2 
2 
2 
v i j p q p q y 
w 
i 
w 
p i 
w 
j 
w 
q j 
y x      
 
  
 
  
(4) 
( , ) ( , ) ( , ) 2 
2 
2 
2 
2 
2 v i j p q p q y 
w 
i 
w 
p i 
w 
j 
w 
q j 
x x     
 
  
 
  
(5) 
( , ) 
( , ) 
tan 
2 
1 
( , ) 1 
v i j 
v i j 
i j 
x 
 y   (6) 
Where θ is The block orientation and (w =17) 
E. Translating fingerprint image into binary image 
The fingerprint image will be converted into a binary 
representation as shown in figure (5) by dividing the image 
into (W×W) non overlap blocks and calculating the mean for 
each block by using equation (7) 
 
 
 
 
  
 
1 
0 
1 
0 
( , ) 
1 w 
i 
w 
j 
image i j 
w w 
bloack mean (7) 
Binary image (i, j) =255 
if enhanced image pixel (i, j) ≥ block mean 
Binary image (i, j) =0 
if enhanced image pixel (i, j) < block mean 
a-original image b- enhanced image 
c- binary image 
Fig. 5 Binary image 
F. Calculating Gabor filter for each pixel 
The fingerprint image will be divided into (W × W) overlap 
blocks and these blocks will be filtered with Gabor filter. An 
even symmetric Gabor filter has the following general form in 
the spatial domain 
cos(2 fx ) 
2 
1 
( , , , ) 2 1 
2 
1 
2 
2 
1  
 
 
 
 
 
 
   
 
  
 
 
 
 
 
x y 
x y 
G x y f Exp 
  
 (8) 
cos sin 1 X  x  y (9) 
sin cos 1 Y  x  y (10) 
Where, (ƒ) is the frequency of the sinusoidal plane wave 
along the direction (θ) from the x-axis, and (δx, δy) are the 
space constants of the Gaussian envelope along x and y axes, 
respectively. In our proposed method we used ƒ =0.1, 
δx=4,and δy=4, The result of applying Gabor filter is illustrate 
in figure (6). 
a- Original image b- Image after apply Gabor filter 
Fig. 6 Applying Gabor filter
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
95 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
III. RESULTS 
After applying the proposed method on fingerprint images the results of three examples will be illustrated Example 1:- 
a-original image b-enhanced image 
c-binary image d-Gabor image 
Fig. 7 results (1) 
Example 2:- 
a-original image b-enhanced image 
c-binary image d-Gabor image 
Fig. 8 results (2) 
Example 3:- 
a-original image b-enhanced image 
c-binary image d-Gabor image 
Fig. 9 results (3) 
IV. CONCLUSION 
 Applying Gabor filter on binary image simplified calculation and makes perfect enhanced results. 
 Multi resolution filters are time consuming compared with simple filters.
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
96 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
 Good enhancement methods make fingerprint system more reliable. 
REFERENCES 
1- [Iwasokun 2012] Iwasokun Gabriel Babatunde, AkinyokunOluwole Charles, Alese Boniface Kayode, and OlabodeOlatubosun "Fingerprint Image Enhancement: Segmentation to Thinning",(IJACSA) International Journal of Advanced Computer Science and Applications, 2012. 
2- [Kumud 2011] KumudArora, and Dr.PoonamGarg "A Quantitative Survey of various Fingerprint Enhancement techniques", International Journal of Computer Applications, 2011. 
3- [Liu 2008] Liu Wei "Fingerprint Classification Using Singularities Detection", international journal of mathematics and computers in simulation, 2008. 
4- [Peihao 2007] Peihao Huang, Chia-Yung Chang, Chaur-Chin Chen "Implementation of an Automatic Fingerprint Identification System", IEEE, 2007. 
5- [Salil 2002] Salil Prabhakar, Anil K. Jain, and Sharath Pankanti "Learning fingerprint minutiae location and type", Watson Research Center, Yorktown Heights, NY 10598, USA, 2002. 
6- [William 2001] William K. Pratt "digital image processing ", Los Altos, California, USA, 2001.

Más contenido relacionado

La actualidad más candente

Image compression standards
Image compression standardsImage compression standards
Image compression standardskirupasuchi1996
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and SegmentationA B Shinde
 
Predictive coding
Predictive codingPredictive coding
Predictive codingp_ayal
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation pptGichelle Amon
 
Fundamental steps in image processing
Fundamental steps in image processingFundamental steps in image processing
Fundamental steps in image processingPremaPRC211300301103
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentationasodariyabhavesh
 
Spatial Filters (Digital Image Processing)
Spatial Filters (Digital Image Processing)Spatial Filters (Digital Image Processing)
Spatial Filters (Digital Image Processing)Kalyan Acharjya
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extractionRushin Shah
 
Image compression
Image compressionImage compression
Image compressionAle Johnsan
 
Color Image Processing: Basics
Color Image Processing: BasicsColor Image Processing: Basics
Color Image Processing: BasicsA B Shinde
 
Digital Image Processing: Digital Image Fundamentals
Digital Image Processing: Digital Image FundamentalsDigital Image Processing: Digital Image Fundamentals
Digital Image Processing: Digital Image FundamentalsMostafa G. M. Mostafa
 
Point processing
Point processingPoint processing
Point processingpanupriyaa7
 
Gabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementGabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementAnkit Nayan
 
Image Representation & Descriptors
Image Representation & DescriptorsImage Representation & Descriptors
Image Representation & DescriptorsPundrikPatel
 

La actualidad más candente (20)

Image compression standards
Image compression standardsImage compression standards
Image compression standards
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
 
Predictive coding
Predictive codingPredictive coding
Predictive coding
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
Fundamental steps in image processing
Fundamental steps in image processingFundamental steps in image processing
Fundamental steps in image processing
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentation
 
Spatial Filters (Digital Image Processing)
Spatial Filters (Digital Image Processing)Spatial Filters (Digital Image Processing)
Spatial Filters (Digital Image Processing)
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extraction
 
Image compression
Image compressionImage compression
Image compression
 
Hog
HogHog
Hog
 
face recognition
face recognitionface recognition
face recognition
 
Color Image Processing: Basics
Color Image Processing: BasicsColor Image Processing: Basics
Color Image Processing: Basics
 
Digital Image Processing: Digital Image Fundamentals
Digital Image Processing: Digital Image FundamentalsDigital Image Processing: Digital Image Fundamentals
Digital Image Processing: Digital Image Fundamentals
 
Point processing
Point processingPoint processing
Point processing
 
Gabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementGabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image Enhancement
 
Watershed
WatershedWatershed
Watershed
 
Unit ii
Unit iiUnit ii
Unit ii
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Image Representation & Descriptors
Image Representation & DescriptorsImage Representation & Descriptors
Image Representation & Descriptors
 

Similar a Gabor Filter

Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques CSCJournals
 
An approach to improving edge
An approach to improving edgeAn approach to improving edge
An approach to improving edgeijma
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filtereSAT Publishing House
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
 
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...IOSR Journals
 
EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEIAEME Publication
 
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESDIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESAM Publications
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...CSCJournals
 
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...IJMER
 
An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...Kunal Kishor Nirala
 
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...IOSR Journals
 
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...ZaidHussein6
 
Dense Visual Odometry Using Genetic Algorithm
Dense Visual Odometry Using Genetic AlgorithmDense Visual Odometry Using Genetic Algorithm
Dense Visual Odometry Using Genetic AlgorithmSlimane Djema
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALsipij
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentCSCJournals
 

Similar a Gabor Filter (20)

Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques
 
An approach to improving edge
An approach to improving edgeAn approach to improving edge
An approach to improving edge
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
 
EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGE
 
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESDIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
 
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
 
An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...
 
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
 
B018110915
B018110915B018110915
B018110915
 
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
 
Dense Visual Odometry Using Genetic Algorithm
Dense Visual Odometry Using Genetic AlgorithmDense Visual Odometry Using Genetic Algorithm
Dense Visual Odometry Using Genetic Algorithm
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
 
F045033337
F045033337F045033337
F045033337
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
E017443136
E017443136E017443136
E017443136
 
I04302068075
I04302068075I04302068075
I04302068075
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
 

Más de International Journal of Computer and Communication System Engineering

Más de International Journal of Computer and Communication System Engineering (20)

Cloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care SystemsCloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care Systems
 
Efficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdmaEfficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdma
 
A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
 
Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...
 
Real Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android PhonesReal Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android Phones
 
An Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge LibraryAn Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge Library
 
Compact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch AntennaCompact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch Antenna
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
 
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
 
An Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori AlgorithmAn Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori Algorithm
 
Cloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in BusinessCloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in Business
 
Mobile Effects on Human Body
Mobile Effects on Human BodyMobile Effects on Human Body
Mobile Effects on Human Body
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGESCLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
 
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
 
Feasibility Study on e-Voting System
Feasibility Study on e-Voting SystemFeasibility Study on e-Voting System
Feasibility Study on e-Voting System
 
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
 
Rp 3010 5814
Rp 3010 5814Rp 3010 5814
Rp 3010 5814
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Gabor Filter

  • 1. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 92 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com Gabor Filter Ali Abdul Azeez Mohammad baker Computer Science Department Kufa university Najaf/Iraq alia.qazzaz@uokufa.edu.iq Abstract—Gabor filter is a powerful way to enhance biometric images like fingerprint images in order to extract correct features from these images, Gabor filter used in extracting features directly asin iris images, and sometimes Gabor filter has been used for texture analysis. In fingerprint images The even symmetric Gabor filter is contextual filter or multi-resolution filter will be used to enhance fingerprint imageby filling small gaps (low-pass effect) in the direction of the ridge (black regions) and to increase the discrimination between ridge and valley (black and white regions) in the direction, orthogonal to the ridge, the proposed method in applying Gabor filter on fingerprint images depending on translated fingerprint image into binary image after applying some simple enhancing methods to partially overcome time consuming problem of the Gabor filter. Index Terms—Gabor filter, fingerprint, binary image, biometrics, orientation. I. INTRODUCTION Every person own ten unique fingerprints. This makes fingerprint matching system one of the most reliablesystems for identifying people, fingerprint image may be shown as a uniform pattern of parallel ridges and valleys run together, ridges are the black regions while valleys are the white regions in fingerprint image as illustrated in figure (1).some permanent (like ridge ending and bifurcate) and semi-permanent features such as scars, cuts are also shown in a fingerprint image. There are many features can be discoveredin fingerprint image which enable fingerprint matching system to make sound judgment about whether any two prints came from same finger or not, these features can be divided into two groups  Local features : A local feature consists of several components, each component typically derived from a spatially restricted region of the fingerprint , these features extracted from ridges by analyzing the ridge behavior as individual or the relations between consecutive ridges this group of features involves many features, some of these features are Ridge ending, bifurcation, Dot or island, Hook, Lake, and Bridge, These features also called minutiae and most fingerprint identification systems depend only on only ridge ending and bifurcate in matching process as illustrated in figure(1), these features used in matching any two prints and enable system in making decision if these two prints identical or not. There are about (70 to 150) minutiae in a typical fingerprint image.  Global features: these features involved two important features which are core and delta ,core can be defined as the top most point on the inner most ridge while delta point can be defined as the point where three ridge directions meet as illustrated in figure(1), these features also called singular points or singularities. Fig. 1 fingerprint image To extractglobal features precisely, fingerprint image must be enhanced by using perfect methods of contextual filter or multi-resolution filter, and if the enhancement step uses a single filter convolution for the entire fingerprint image, it creates significant number of false minutiae, a large number of true minutiae are missed and, a significant error in the location (position and orientation) of minutiae may be introduced. II. PROPOSED METHOD The proposed system consist of the following steps as illustrated in figure (2)  Applying median filter.  Normalization.
  • 2. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 93 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com  Calculating pixels orientation by using Sobel image.  Dividing image into blocks, and calculating blocks orientation.  Translatingfingerprint image into binary.  CalculatingGabor filter for each pixel. Each one of the above steps can be illustrated as follows A. Applying median filter The fingerprint image divided into (3×3) matrices, each matrix translated into a victor with (9) values that arranged in any order(ascending or descending)then the center of the matrix will be replaced with the middle value of the vector, the result of applying this filter can be illustrated in figure (3). Fig. 2 block diagram of the proposed system B. Normalization process Normalization process is used to fixed the intensity values of the pixels within a desired or wanted range by applying equation (1)          otherwise V I i j M o v o M if I i j M V I i j M o v o M N i j ( ( , ) )2 ( , ) ( ( , ) )2 ( , )  Where, M and V are the mean and variance of the fingerprint image I (i, j), Mo and Vo are the desired mean and variance values. The result of applying this process is illustrated in figure (3) a .Original image b. applying median filter c. normalization result Fig. 3 Applying median filter and normalization process C. Applying Sobel masks Orientation in each pixel can be calculated by using Sobel vertical and horizontal masks as illustrated in figure (4) Z1 Z2 Z3 -1 -2 -1 -1 0 1 Z4 Z5 Z6 0 0 0 -2 0 2 Z7 Z8 Z9 1 2 1 -1 0 1 a- Image b- Vertical mask c- Horizontal mask Fig. 4 Sobel masks Original image Applying Sobel masks to calculate orientation for each pixel Normalization Applying median filter Dividing fingerprint image into blocks and Calculating blocks orientation. Constructing and applying Gabor filter for each pixel in binary fingerprint image Translating to binary image
  • 3. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 94 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com The orientation value in each pixel will be calculated by using the following equations ( , ) ( 2 ) ( 2 ) 7 8 9 1 2 3 y p q  z  z  z  z  z  z (2) ( , ) ( 2 ) ( 2 ) 3 6 9 1 4 7 x p q  z  z  z  z  z  z (3) D. Dividing image into blocks, and calculating blocks orientation The fingerprint image will be divided into non overlap blocks with size of (W×W) , and the orientation of each block will be calculated as follows ( , ) 2 ( , ) ( , ) 2 2 2 2 v i j p q p q y w i w p i w j w q j y x            (4) ( , ) ( , ) ( , ) 2 2 2 2 2 2 v i j p q p q y w i w p i w j w q j x x           (5) ( , ) ( , ) tan 2 1 ( , ) 1 v i j v i j i j x  y   (6) Where θ is The block orientation and (w =17) E. Translating fingerprint image into binary image The fingerprint image will be converted into a binary representation as shown in figure (5) by dividing the image into (W×W) non overlap blocks and calculating the mean for each block by using equation (7)        1 0 1 0 ( , ) 1 w i w j image i j w w bloack mean (7) Binary image (i, j) =255 if enhanced image pixel (i, j) ≥ block mean Binary image (i, j) =0 if enhanced image pixel (i, j) < block mean a-original image b- enhanced image c- binary image Fig. 5 Binary image F. Calculating Gabor filter for each pixel The fingerprint image will be divided into (W × W) overlap blocks and these blocks will be filtered with Gabor filter. An even symmetric Gabor filter has the following general form in the spatial domain cos(2 fx ) 2 1 ( , , , ) 2 1 2 1 2 2 1                   x y x y G x y f Exp    (8) cos sin 1 X  x  y (9) sin cos 1 Y  x  y (10) Where, (ƒ) is the frequency of the sinusoidal plane wave along the direction (θ) from the x-axis, and (δx, δy) are the space constants of the Gaussian envelope along x and y axes, respectively. In our proposed method we used ƒ =0.1, δx=4,and δy=4, The result of applying Gabor filter is illustrate in figure (6). a- Original image b- Image after apply Gabor filter Fig. 6 Applying Gabor filter
  • 4. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 95 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com III. RESULTS After applying the proposed method on fingerprint images the results of three examples will be illustrated Example 1:- a-original image b-enhanced image c-binary image d-Gabor image Fig. 7 results (1) Example 2:- a-original image b-enhanced image c-binary image d-Gabor image Fig. 8 results (2) Example 3:- a-original image b-enhanced image c-binary image d-Gabor image Fig. 9 results (3) IV. CONCLUSION  Applying Gabor filter on binary image simplified calculation and makes perfect enhanced results.  Multi resolution filters are time consuming compared with simple filters.
  • 5. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 96 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com  Good enhancement methods make fingerprint system more reliable. REFERENCES 1- [Iwasokun 2012] Iwasokun Gabriel Babatunde, AkinyokunOluwole Charles, Alese Boniface Kayode, and OlabodeOlatubosun "Fingerprint Image Enhancement: Segmentation to Thinning",(IJACSA) International Journal of Advanced Computer Science and Applications, 2012. 2- [Kumud 2011] KumudArora, and Dr.PoonamGarg "A Quantitative Survey of various Fingerprint Enhancement techniques", International Journal of Computer Applications, 2011. 3- [Liu 2008] Liu Wei "Fingerprint Classification Using Singularities Detection", international journal of mathematics and computers in simulation, 2008. 4- [Peihao 2007] Peihao Huang, Chia-Yung Chang, Chaur-Chin Chen "Implementation of an Automatic Fingerprint Identification System", IEEE, 2007. 5- [Salil 2002] Salil Prabhakar, Anil K. Jain, and Sharath Pankanti "Learning fingerprint minutiae location and type", Watson Research Center, Yorktown Heights, NY 10598, USA, 2002. 6- [William 2001] William K. Pratt "digital image processing ", Los Altos, California, USA, 2001.