2017 International Conference on Inventive Communication and Computational Technologies (ICICCT) 2017
DOI: 10.1109/icicct.2017.7975188
|View full text |Cite
|
Sign up to set email alerts
|

An efficient ear recognition system using DWT & BLPOC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…• Muthukumar et al [19] proposed an ear recognition algorithm that employs a band-limited phase-only correlation (BLPOC) based local block matching technique for improved efficiency. The discrete wavelet transform (DWT) is used to extract the phase information over the frequency domain of the ear image, decomposing it into a set of basis functions.…”
Section: Handcrafted Featuresmentioning
confidence: 99%
“…• Muthukumar et al [19] proposed an ear recognition algorithm that employs a band-limited phase-only correlation (BLPOC) based local block matching technique for improved efficiency. The discrete wavelet transform (DWT) is used to extract the phase information over the frequency domain of the ear image, decomposing it into a set of basis functions.…”
Section: Handcrafted Featuresmentioning
confidence: 99%
“…Arunachalam et al introduced an ear recognition system using band limited phase only correlation (BLPOC) algorithm for feature extraction. The proposed BLPOC algorithm deals with a local image distortion in local block matching.…”
Section: Emerging Biometric Technologiesmentioning
confidence: 99%
“…1 shows some well-known biometrics traits used for person authentication. Researchers have reported various approaches based on physiological characteristics such as face [12,23]; fingerprint [14,40]; iris [25,27]; palmprint [18,24]; knuckle print [15,16,43]; ear [3,9]; and behavioral characteristics such as voice [28]; gait [26] and signature [35] for authentication. However, there is still scope of improving the overall performance of the aforementioned authentication methods.…”
Section: Introductionmentioning
confidence: 99%