Skip to main content

Image Recognition for Security Verification Using Real-Time Joint Transform Correlation with Scanning Technique

  • Conference paper
Computational Intelligence and Security (CIS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3802))

Included in the following conference series:

  • 1185 Accesses

Abstract

We describe a technique for image verification by use of real-time joint transform correlation with scanning technique. The described method is independent of a spatial light modulator (SLM) in the Fourier plane which has limitations for applying to robust systems. The system is a hybrid processing combined of optical and electronic methods. The system also can perform real-time correlation without SLM at Fourier plane. We develop the theory of the technique and evaluate a performance of the method by estimating the correlation between an authentic fingerprint image and the distorted fingerprints image. Also, we present computer simulation result to demonstrate the validity of the idea.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. VanderLugt, A.: Signal detection by complex spatial filter. IEEE Trans. Inf. Theory IT-10, 139–146 (1964)

    Google Scholar 

  2. Weaver, C.S., Goodman, J.W.: A technique for optically convolving two functions. Appl. Opt. 5, 1248–1249 (1966)

    Article  Google Scholar 

  3. Horner, J.: Metrics for assessing pattern-recognition performance. Appl. Opt. 31, 165–166 (1992)

    Article  Google Scholar 

  4. Alkanhal, M., Kumar, B.: Polynomial distance classifier correlation filter for pattern recognition. Appl. Opt. 42, 4688–4708 (2003)

    Article  Google Scholar 

  5. Kumar, B., Mahalanobis, A., Takessian, A.: Optimal tradeoff circular harmonic function correlation filter methods providing controlled in-plane rotation. IEEE Trans. Image Process 9, 1025–1034 (2000)

    Article  Google Scholar 

  6. Yu, F.T., Jutamulia, S., Lin, T., Gregory, D.: Adaptive real-time pattern recognition using a liquid crystal TV based joint transform correlator. Appl. Opt. 26, 1370–1372 (1987)

    Article  Google Scholar 

  7. Lu, G., Zang, Z., Wu, S., Yu, F.T.: Implementation of a non-zero-order joint-transform correlator by use of phase-shifting techniques. Appl. Opt. 38, 470–483 (1995)

    Google Scholar 

  8. Matwyschuk, A., Ambs, P., Christnacher, F.: Targer tracking correlator assisted by a snake-based optical segmentation method. Opt. Commun. 219, 125–137 (2003)

    Article  Google Scholar 

  9. Goodman, J.W.: Introduction to Fourier Optics. McGraw-Hill, New York (1967)

    Google Scholar 

  10. Poon, T.-C.: Scanning holography and two-dimensional image processing by acousto-optic two-pupil synthesis. J. Opt. Soc. Am. A2, 621–627 (1985)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Doh, K.B., Ohn, J., Poon, TC. (2005). Image Recognition for Security Verification Using Real-Time Joint Transform Correlation with Scanning Technique. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_114

Download citation

  • DOI: https://doi.org/10.1007/11596981_114

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30819-5

  • Online ISBN: 978-3-540-31598-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics