Object Segmentation Using Colour for Security Applications on Mobile Devices

نویسندگان

  • Maurice Danaher
  • Lennon Hopkins
چکیده

This paper presents research-in-progress on a colour based method of object segmentation for use in biometric security methods on mobile devices. The limited processing capability of mobile devices has restricted the computational complexity of security algorithms that can be used. The purpose of our system is to use a colour based method to reduce the amount of information that must be processed by biometric algorithms. This is accomplished by creating a mug shot of a target individual from an image with an unknown background and unknown target/camera positions. Specific security algorithms can then be applied to the generated mug shot. An overall reduction in data processing will allow more efficient biometric security measures to be implemented.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Graph-based representations and techniques for image processing and image analysis

In this paper we will discuss the use of some graph-based representations and techniques for image processing and analysis. Instead of making an extensive review of the graph techniques in this field, we will explain how we are using these techniques in an active vision system for an autonomous mobile robot developed in the Institut de Robòtica i Informàtica Industrial within the project “Activ...

متن کامل

Segmentation Assisted Object Distinction for Direct Volume Rendering

Ray Casting is a direct volume rendering technique for visualizing 3D arrays of sampled data. It has vital applications in medical and biological imaging. Nevertheless, it is inherently open to cluttered classification results. It suffers from overlapping transfer function values and lacks a sufficiently powerful voxel parsing mechanism for object distinction. In this work, we are proposing an ...

متن کامل

Analyse Power Consumption by Mobile Applications Using Fuzzy Clustering Approach

With the advancements in mobile technology and its utilization in every facet of life, mobile popularity has enhanced exponentially. The biggest constraint in the utility of mobile devices is that they are powered with batteries. Optimizing mobile’s size and weight is always the choice of designer, which led limited size and capacity of battery used in mobile phone. In this paper analysis of th...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

Colour Reproduction on Tablet Devices Authors

With the advent of Internet and mobile devices client services and other print production are migrating more and more to online platforms. In a recent technology changeover it has become obvious that there is a growing number of printers and customers who are interested in the print service providers to expand their business to online and mobile platforms. With this technological transition the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002