Edge Detection and Contour Based Ear Recognition Scheme

Edge Detection and Contour Based Ear Recognition Scheme

Deven Trivedi, Rohit Thanki, Surekha Borra
Copyright: © 2019 |Volume: 12 |Issue: 3 |Pages: 19
ISSN: 1938-7857|EISSN: 1938-7865|EISBN13: 9781522564768|DOI: 10.4018/JITR.2019070105
Cite Article Cite Article

MLA

Trivedi, Deven, et al. "Edge Detection and Contour Based Ear Recognition Scheme." JITR vol.12, no.3 2019: pp.74-92. http://doi.org/10.4018/JITR.2019070105

APA

Trivedi, D., Thanki, R., & Borra, S. (2019). Edge Detection and Contour Based Ear Recognition Scheme. Journal of Information Technology Research (JITR), 12(3), 74-92. http://doi.org/10.4018/JITR.2019070105

Chicago

Trivedi, Deven, Rohit Thanki, and Surekha Borra. "Edge Detection and Contour Based Ear Recognition Scheme," Journal of Information Technology Research (JITR) 12, no.3: 74-92. http://doi.org/10.4018/JITR.2019070105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In recent days, with the advancements in computer vision technology pattern recognition for biometric data has been the focus of many researchers. The human ear can be used to assist in the recognition of an individual. In this article, a new scheme for ear recognition is presented, based on edge features such as the helix shape and contours between the edge pixels. First, an ear image is detected from the acquired image using a snake model-based image segmentation technique, and then histogram equalization is applied to form an enhanced ear image. After that, an Infinite Symmetric Exponential Filter (ISEF) edge is applied to the image, the contouring of edges is calculated, and then the contour values of pixels are extracted as ear features. Finally, the ear matching is performed between query ear features and enrolled ear features. Based on the matching score, the decision about individual authentication is performed. The experimental results showed that this proposed scheme performs better than existing schemes in the literature.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.