Professional Documents
Culture Documents
Gabor Filter and Canny Edge Detection For Ear Biometrics Identification
Gabor Filter and Canny Edge Detection For Ear Biometrics Identification
565
Authorized licensed use limited to: Zhejiang University. Downloaded on January 09,2024 at 13:41:09 UTC from IEEE Xplore. Restrictions apply.
In data collection, we are using self-collected data using
3 subjects. These three subjects were aged between 20-30
years old and all subjects were male. We called the ear
image of the 3 subjects class 1, class 2, and class 3. We do
some variations for the image such as rotating the image,
making the image grayscale, and adding some noises.The
total dataset is 195 for training and 39 for testing. For this
dataset, we collected 9 angles of ear image from the left upper
side to the right downside.
C. Feature Extraction
Next, Canny edge detection is applied to each of the
filtered images to identify the edges in the image. Canny edge
Figure 3. Class 1 Images from multiple angles
detection is a multi-stage algorithm that combines noise
reduction, gradient calculation, non-maximum suppression,
and double thresholding to accurately identify edges in an
image.
Once the edges have been identified, they can be used to
extract features from the ear image. These features can then
be compared to a database of ear images to identify the
individual.
566
Authorized licensed use limited to: Zhejiang University. Downloaded on January 09,2024 at 13:41:09 UTC from IEEE Xplore. Restrictions apply.
i). Logistic Regression neighbors). If KNN is being used for regression,
A statistical model known as logistic regression is predict the value of the new point by averaging the
used to categorize data in binary form or to estimate the values of the K nearestneighbors.
likelihood that an event will occur given two possible
outcomes (such as yes/no or 0/1). It operates by calculating KNN can handle both continuous and categorical data and
the likelihood of the event happening using the logistic is straightforward to implement. It can manage missing
function, which converts any real-valued integer to a values and is effective for high-dimensional data. However,
number between 0 and 1. The logistic function is combined particularly for big datasets, computing the distances
with a regression equation that is created by iteratively between each new point and every other point in the training
optimizing the data using the gradient descent set can be computationally expensive. Additionally, the
approach.[22]. Once the model has been trained, it can be choice of K and the distance metric may have an impact on
used to forecast the likelihood that an event will occur for how well KNN performs. [16].
fresh data points by entering the predictor variables into
the logistic regression equation. Following that, the event iv). SVM
is classified as either occurring or not occurring based on a SVMs are supervised learning algorithms that can be
threshold value (for instance, 0.5). Although logistic applied to both classification and regression applications.
regression is easy to use and can handle numerous classes, They function by identifying the hyperplane in a high-
it can be sensitive to the predictors used and may find it dimensional space that best separates several classes. The
difficult to describe relationships with greater complexity. decision boundary is established using the support vectors, the
[14]. points closest to the hyperplane that have the greatest
influence on the hyperplane's position. SVMs can employ a
ii). Decision Tree kernel trick to shift the data into a higher-dimensional space
A graphical representation of a decision-making process where it can be separated, which makes them particularly
that employs a tree-like model of decisions and their effective when the data is not linearly separable. SVMs can
potential repercussions is called a decision tree. It divides effectively handle high-dimensional data and are useful in
the data into sub-groups depending on the values of a feature scenarios with small samples, among other major
or characteristic, starting with the root node, which stands in benefits[17].
for the entire population or sample. Until all of the data is
classified or the subgroups are pure (i.e., include only one IV. RESULT AND DISCUSSION
class), this process is repeated[15]. Decision trees can A. Result
handle both continuous and categorical data, and they are
TABLE I. RESULT OF CLASSIFICATION
easy to grasp and analyze. They can also handle big datasets
and are quick to create. They might perform badly on Model Accuracy Precission Recall F1Score
unobserved data, though, because they are prone to Logistic
overfitting. In a range of disciplines, such as machine Regression 0.691 0.696 0.691 0.685
learning and data mining, decision trees are frequently Decision Tree 0.54 0.547 0.543 0.543
utilized. They are particularly helpful for tackling
classification and regression issues. [23]. KNN 0.691 0.696 0.691 0.685
567
Authorized licensed use limited to: Zhejiang University. Downloaded on January 09,2024 at 13:41:09 UTC from IEEE Xplore. Restrictions apply.
difficult to design an algorithm that can detect ears in all distance classifier[28].
cases. Additionally, ears can be occluded by hair, glasses, Generated
hats, and other objects, making them difficult to detect. Ear database
detection biometrics also will not work when a person Gabor Filter and Canny with
using a Hijab. Edge Detection for multiple Accuracy = 83%
feature extraction, using angles
Logistic Regression or (195
KNN for classification. Images
from 3
Subjects)
V. CONCLUSIONS
In conclusion, the ear biometrics research using the Gabor
filter and Canny edge detection produced a performance that
was on par. The study's findings demonstrated that the
suggested method had reasonably good levels of accuracy,
precision, recall, and F1 score when it came to correctly
identifying people based on their ear features. These
findings are consistent with the idea that ear biometrics can
Figure 7. Ear Detection Challenge: Acquire images from
be a trustworthy and efficient means of identifying a person.
different angles and positions.
It is crucial to remember that the investigation was
Another difficulty for the algorithm to consistently
carried out in a controlled setting with a dataset of ear
recognize ears is the variation in lighting conditions, angle,
pictures collected under particular circumstances. Further
resolution, quality, position, and orientation of the image.
study is required to examine the efficacy of the suggested
We don't test the image variation right now. The small
method in more varied and dynamic circumstances in order
amount of data that is available to train and test the algorithm
to properly assess the potential of ear biometrics for real-
presents another difficulty. This may result in the algorithm
time identification. Real-time identification necessitates
performing poorly and having limited generalizability. The
the quick and precise detection and recognition of ear
existence of noise and picture alterations is another barrier
features in a variety of lighting, posture, and occlusion
that might affect the precision and dependability of ear
settings.
detection.
Despite these difficulties, the findings of this study
C. Comparison with another algorithm
show that ear biometrics has promise as a personal
Only by utilizing a created database can we compare our
identification method. In a variety of applications, such as
algorithm to another algorithm. Our algorithm's results are
security, law enforcement, and personal identification
comparable to those of PCA, discrete wavelet transform, and
systems, the use of ear biometrics has the potential to offer
minimal distance classification. Our methodology uses the
a trustworthy and practical way to identify people. In order
Bayes rule to determine the probability and is comparable to
to properly evaluate the potential and constraints of this
previous methods like Gaussian curvature and PCA. The
strategy, it would be beneficial to investigate the use of ear
algorithm is also competitive with the preprocessing Log
biometrics in real-time detection scenarios in the future.
Gabor filter and the Gaussian filter (unimodal ear) (see
Table II). The Euclidian distance was utilized to calculate REFERENCES
similarities and Multilinear PCA (MPCA) was employed to
extract features. This comparison demonstrates that using [1] Lauren P. Etter, Elizabeth J. Ragan, Rachael Campion, David
our strategy, we can forward to the next research on how to Martinez, and Christopher J, “Ear biometrics for patient
address the various difficulties in ear-detecting biometrics identification in global health: a field study to test the effectiveness
that were previously mentioned. of an image stabilization device in improving identification
accuracy”) BMC Medical Informatics and Decision Making, 2019.
Technique Database Parameters [2] A. Iannarelli, Ear Identification, Forensic Identification Series,
Generated Paramont Publishing Company, 1989.
Gaussian Curtivature + database Recognition rate = 92%
PCA. Euclidian [3] Michelle Alva, AnuradhaSrinivasaraghavan, Kavita Sonawane, “A
(50) Review on Techniques for Ear Biometrics” International
Distamce Classification
Conference on Electronics, Communication and Computing
y [26].
Technologies, 2019.
Generated [4] A. K. Jain, P. Flynn, A. A. Ross. “Handbook of Biometrics”. Springer,
database Accuracy = 82.5% Business Media 2008
Gaussian Filter with (196 (unimodal ear) and 92.3% [5] M. Burge, W. Burger. Biometrics: Personal Identification in
Multilinear PCA images (ear + soft biometrics like Networked Society (Eds: A.K. Jain, R. Bolle, S. Pankanti, 1998,
(MPCA) + Classification from 28 height, gender, etc.) 273- 286.
using Bayesian[27]. subjects) [6] A. S. B. Mahajan and K. J. Karande, "PCA and DWT based
multimodal biometric recognition system," 2015 International
Conference on Pervasive Computing (ICPC), Pune, 2015, pp. 1-4.
Accuracy = 95% (Haar [7] D. R. Kisku, J. K. Sing and P. Gupta, "Multibiometrics Belief
Discrete Wavelet Generated
wavelets) and 92% Fusion" Second International Conference on Machine Vision,
Transform (DWT) + database
(Daubechies wavelets) Dubai, 2009, pp.37-40.
PCA. A minimum
568
Authorized licensed use limited to: Zhejiang University. Downloaded on January 09,2024 at 13:41:09 UTC from IEEE Xplore. Restrictions apply.
[8] M. Chora ́s, “Emerging Methods of Biometrics Human [25] Guo, G., Wang, H., Bell, D., Bi, Y., Greer, K. KNN Model-Based
Identification,” IEEE 2nd International Conference on Innovative Approach in Classification. In: Meersman, R., Tari, Z., Schmidt,
Computing, Information, and Control, 2007. D.C. (eds) On The Move to Meaningful Internet Systems: CoopIS,
[9] R. A. Priyadharshini, S. Arivazhagan dan M. Arun, “A deep learning DOA, and ODBASE. Lecture Notes in Computer Science, vol
approach for person identification using ear biometrics,” Applied 2888. Springer, Berlin, Heidelberg, 2003.
intelligence (Dordrecht, Netherlands), vol. 51, no. 4, p. 2161–2172, [26] Ali, N., Neagu, D. & Trundle, P. Evaluation of k-nearest neighbor
2021. classifier performance for heterogeneous data sets. SN Appl. Sci. 1,
[10] L. P. Etter, E. J. Ragan, R. Campion, D. Martinez dan C. J. Gill, “Ear 1559, 2019.
biometrics for patient identification in global health: a field study to
[27] S. Taertulakarn, C. Pintavirooj, P. Tosranon, and K. Hamamoto,
test the effectiveness of an image stabilization device in improving “The preliminary investigation of ear recognition using hybrid
identification accuracy,” BMC medical informatics and decision technique,” 2016 9th Biomedical Engineering International
making, vol. 19, no. 1, p. 114, 2019. Conference (BMEiCON), 2016.
[11] Sobieranski, A.C., Linhares, R.T.F., Comunello, E., von [28] S. Mishra, S. Kulkarni, and B. Marakarkandy, “A neoteric
Wangenheim, approach for ear biometrics using multi linear PCA” International
A. A Fast Gabor Filter Approach for Multi-Channel Texture Conference & Workshop on Electronics & Telecommunication
Feature Discrimination. In: Bayro-Corrochano, E., Hancock, E. Engineering, 2016.
(eds) Progressin Pattern Recognition, Image Analysis, Computer
Vision, and Applications, 2014. Lecture Notes in Computer [29] A. S. B. Mahajan and K. J. Karande, "PCA and DWT based
Science, vol 8827. Springer. multimodal biometric recognition system," 2015 International
Conference on Pervasive Computing (ICPC), Pune, 2015, pp. 1-4.
[12] Sapkale, S.S., Patil, M.P.. Texture-Based Material Classification
Using Gabor Filter. In: Santosh, K.C., Gawali, B. (eds) Recent
Trends in Image Processing and Pattern Recognition, 2020.
Communications in Computer and Information Science, vol 1380.
Springer, Singapore.
[13] Ma, X., Li, B., Zhang, Y., Yan, M. The Canny Edge Detection and
Its Improvement. In: Lei, J., Wang, F.L., Deng, H., Miao, D. (eds)
Artificial Intelligence and Computational Intelligence. Lecture
Notes in Computer Science (), vol 7530. Springer, Berlin, Heid
[14] Pattern Classification”, (2nd Edition) R. Duda, P. Hart and D.
Stock,Publisher: Willey-Interscience, 2001.
[15] Kleinbaum, D.G., Klein, M. Introduction to Logistic Regression.
In: Logistic Regression. Statistics for Biology and Health.
Springer, New York, NY, 2010
[16] Rokach, L., Maimon, O. Decision Trees. In: Maimon, O., Rokach,
L. (eds) Data Mining and Knowledge Discovery Handbook.
Springer, Boston, MA, 2005
[17] Mucherino, A., Papajorgji, P.J., Pardalos, P.M. k-Nearest
Neighbor Classification. In: Data Mining in Agriculture. Springer
Optimization and Its Applications, vol 34. Springer, New York,
NY, 2019.
[18] Introduction. In: Support Vector Machines. Information Science
and Statistics. Springer, New York, NY, 2008.
[19] Fogel, I., Sagi, D. Gabor filters as texture discriminator. Biol.
Cybern. 61, 103–113, 1989.
[20] Alemán-Flores, M., Alemán-Flores, P., Álvarez-León, L., Esteban-
Sánchez, M.B., Fuentes-Pavón, R., Santana-Montesdeoca, J.M.
Texture-Based Filtering and Front-Propagation Techniques for the
Segmentation of Ultrasound Images. In: Moreno Díaz, R., Pichler,
F., Quesada Arencibia, A. (eds) Computer Aided Systems Theory
– EUROCAST 2007. EUROCAST 2007. Lecture Notes in
Computer Science, vol 4739. Springer, Berlin, Heidelberg, 2007.
[21] Abhishek, S.N., Vasudevan, S.K., Sundaram, R.M.D. An
Enhanced and Efficient Algorithm for Faster, Better, and Accurate
Edge Detection. In: Subramanian, S., Nadarajan, R., Rao, S., Sheen,
S. (eds)Digital Connectivity – Social Impact. Communications in
Computer and Information Science, vol 679. Springer, Singapore,
2016.
[22] Li, J., Ding, S. A Research on Improved Canny Edge Detection
Algorithm. In: Zhang, J. (eds) Applied Informatics and
Communication. Communications in Computer and Information
Science, vol 228. Springer, Berlin, Heidelberg, 2011.
[23] Kleinbaum, D.G., Klein, M. Important Special Cases of the
Logistic Model. In: Logistic Regression. Statistics for Biology and
Health. Springer, New York, NY, 2010.
[24] Dobra, A. Decision Tree Classification. In: LIU, L., ÖZSU, M.T.
(eds) Encyclopedia of Database Systems. Springer, Boston, MA,
2009.
569
Authorized licensed use limited to: Zhejiang University. Downloaded on January 09,2024 at 13:41:09 UTC from IEEE Xplore. Restrictions apply.