Edge Detection and Contour Based Ear Recognition Scheme

Edge Detection and Contour Based Ear Recognition Scheme

Deven Trivedi (G. H. Patel College of Engineering and Technology, Anand, India), Rohit Thanki (C. U. Shah University, Wadhwan, India) and Surekha Borra (K. S. Institute of Technology, Bengaluru, India)
Copyright: © 2019 |Pages: 19
DOI: 10.4018/JITR.2019070105

Abstract

In recent days, with the advancements in computer vision technology pattern recognition for biometric data has been the focus of many researchers. The human ear can be used to assist in the recognition of an individual. In this article, a new scheme for ear recognition is presented, based on edge features such as the helix shape and contours between the edge pixels. First, an ear image is detected from the acquired image using a snake model-based image segmentation technique, and then histogram equalization is applied to form an enhanced ear image. After that, an Infinite Symmetric Exponential Filter (ISEF) edge is applied to the image, the contouring of edges is calculated, and then the contour values of pixels are extracted as ear features. Finally, the ear matching is performed between query ear features and enrolled ear features. Based on the matching score, the decision about individual authentication is performed. The experimental results showed that this proposed scheme performs better than existing schemes in the literature.
Article Preview
Top

1. Introduction

Nowadays, an individual is recognized based on his/her biometric characteristics in many places like offices, institute, airports, etc. These biometric characteristics are divided into two types: physical and behavioral (Jain and Kumar, 2012; Jain and Nandakumar, 2012). The examples of physical characteristics of an individual are fingerprint, face, iris, palm print and ear. The examples of behavioral characteristics of an individual are speech, signature, and gait. The systems based on biometrics recognize an individual automatically using various computer vision and pattern recognition algorithms (Jain and Kumar, 2012; Jain and Nandakumar, 2012). The biometric systems are used mainly for two operations: verification and authentication. In these operations, the query biometric image is compared and matched with its closest image in the database. While the query image is compared with all the database images in case of authentication, it is compared with its enrolled image in case of verification.

There are many recognition schemes described by researchers in last two decades. Jain and his research team suggested recognition schemes for physical characteristics such as ear, gait, etc. (Jain and Kumar, 2012; Abaza et al., 2013). Usage of the ear image for recognition of an individual has many advantages: (a) Ear shape does not change during human life. (b) The ear is easy to be acquired from distance (Abaza et al., 2013). On the other hand, usage of the ear images as biometric is challenging due to the levels of illumination during image acquisition, and also due to the occlusions in the acquired images which includes hair at head portion, hair on the ear, neck portion, headscarf worn by Muslim women, turban worn by Panjabi man etc.

Researchers have provided various ear databases, and presented different approaches for ear image detection, and recognition. The authors (Abaza et al., 2013; Pflug and Busch, 2012) gave a description on different ear databases such as West Virginia University (WVU), University of Science and Technology Beijing (USTB), University of California Riverside (UCR), University of Notre Dame (UND), XM2VTS, UMIST, NIST Mugshot Identification, and FERET. The authors listed out different recognition schemes based on intensity, force field, 2D curve geometry, Fourier descriptor, wavelet transformation, Gabor filters, Scale-Invariant Feature Transform (SIFT) and 3D features. The details of various ear databases are given below:

Complete Article List

Search this Journal:
Reset
Open Access Articles
Volume 13: 4 Issues (2020): 1 Released, 3 Forthcoming
Volume 12: 4 Issues (2019)
Volume 11: 4 Issues (2018)
Volume 10: 4 Issues (2017)
Volume 9: 4 Issues (2016)
Volume 8: 4 Issues (2015)
Volume 7: 4 Issues (2014)
Volume 6: 4 Issues (2013)
Volume 5: 4 Issues (2012)
Volume 4: 4 Issues (2011)
Volume 3: 4 Issues (2010)
Volume 2: 4 Issues (2009)
Volume 1: 4 Issues (2008)
View Complete Journal Contents Listing