scispace - formally typeset
Search or ask a question
Author

Nalini K. Ratha

Bio: Nalini K. Ratha is an academic researcher from IBM. The author has contributed to research in topics: Biometrics & Fingerprint recognition. The author has an hindex of 50, co-authored 216 publications receiving 12290 citations. Previous affiliations of Nalini K. Ratha include Michigan State University & University at Buffalo.


Papers
More filters
Proceedings ArticleDOI
19 Apr 1995
TL;DR: This work combines the advantages of systolic algorithms with the low cost of developing application specific designs using field programmable gate arrays (FPGAs) to build a scalable convolver for use in computer vision systems.
Abstract: Convolution is a fundamental operation in many signal and image processing applications. Since the computation and communication pattern in a convolution operation is regular, a number of special architectures have been designed and implemented for this operator. The Von Neumann architectures cannot meet the real-time requirements of applications that use convolution as an intermediate step. We combine the advantages of systolic algorithms with the low cost of developing application specific designs using field programmable gate arrays (FPGAs) to build a scalable convolver for use in computer vision systems. The performance of the systolic algorithm of (Kung et al., 1981) is compared theoretically and experimentally with many other convolution algorithms reported in the literature. The implementation of a convolution operation on Splash 2, an attached processor based on Xilinx 4010 FPGAs, is reported with impressive performance gains.

91 citations

Proceedings ArticleDOI
17 Oct 2005
TL;DR: This paper presents significant improvements to core and delta point detection algorithm based on complex filtering principles originally proposed by Nilsson et al., (2005) and presents a modified graph based matching algorithm that can run in O(n) time when the reference points are available.
Abstract: A majority of the minutiae based fingerprint verification algorithms rely on explicit or implicit alignment of the minutiae points for matching the two prints. With no prior knowledge about point correspondences, this becomes a combinatorial problem. Global features of the fingerprints such as the core and delta points represent intrinsic points of reference that can be used to align the two prints and reduce the computational complexity of the matcher. However, automatic extraction of singular points is usually error prone and is therefore not used by existing matchers. But, a systematic study of the impact on matching performance when core/delta points are available has not been done to date. In this paper, we explore the effects of the availability of reliable core and delta points on speed and accuracy of a matching algorithm. Towards this end, we present significant improvements to core and delta point detection algorithm based on complex filtering principles originally proposed by Nilsson et al., (2005). We also present a modified graph based matching algorithm that can run in O(n) time when the reference points are available. We analyse the resulting improvement in computational complexity and present experimental evaluation over FVC2002 database. We show that there is upto 43% improvement (70.2 ms to 39.8 ms) in average verification time and almost no loss in accuracy when reliable core and delta points are used.

85 citations

Patent
31 Aug 2001
TL;DR: In this paper, a method of learning a set of partitioned least-sqaures filters that can be derived from a given set of images and ground truth pairs as an offline process is presented.
Abstract: In an automatic fingerprint authentication or identification system, the fingerprint image acquisition is severely effected by the limitations of the acquisition process. The two modes of input, viz. scanning inked fingerprints from paper records or directly from a finger using live-scan fingerprint scanners suffer from the following noise sources in the input in addition to standard noise in the camera. Non-uniform ink application, uneven pressure while rolling on the paper or pressing on the scanner surface and external dirt like oil and climatic variations in the moisture content of skin are some of the main causes for the ridges and valleys not to be imaged clearly. This invention deals with a method of learning a set of partitioned least-sqaures filters that can be derived from a given set of images and ground truth pairs as an offline process. The learned filters are convolved with input fingerprint images to obtain the enhanced image.

78 citations

Patent
16 Nov 2004
TL;DR: In this paper, an apparatus, method, and program storage device for representing biometrics is described, which includes a biometric feature extractor and a transformer, which is used to extract features corresponding to a given biometric depicted in an image.
Abstract: There is provided an apparatus, method, and program storage device for representing biometrics. The apparatus includes a biometric feature extractor and a transformer. The biometric feature extractor is for extracting features corresponding to a biometric depicted in an image, and for defining one or more sets of one or more geometric shapes by one or more of the features. Each of the one or more geometric shapes has one or more geometric features that is invariant with respect to a first set of transforms applied to at least a portion of the image. The transformer is for applying the first set of transforms to the at least a portion of the image to obtain one or more feature representations that include one or more of the one or more geometric features, and for applying a second set of transforms to the one or more feature representations to obtain one or more transformed feature representations.

76 citations

Proceedings ArticleDOI
18 Jun 2018
TL;DR: A novel Disguised Faces in the Wild (DFW) dataset, consisting of over 11,000 images for understanding and pushing the current state-of-the-art for disguised face recognition, along with the phase-I results of the CVPR2018 competition.
Abstract: Existing research in the field of face recognition with variations due to disguises focuses primarily on images captured in controlled settings. Limited research has been performed on images captured in unconstrained environments, primarily due to the lack of corresponding disguised face datasets. In order to overcome this limitation, this work presents a novel Disguised Faces in the Wild (DFW) dataset, consisting of over 11,000 images for understanding and pushing the current state-of-the-art for disguised face recognition. To the best of our knowledge, DFW is a first-of-a-kind dataset containing images pertaining to both obfuscation and impersonation for understanding the effect of disguise variations. A major portion of the dataset has been collected from the Internet, thereby encompassing a wide variety of disguise accessories and variations across other covariates. As part of CVPR2018, a competition and workshop are organized to facilitate research in this direction. This paper presents a description of the dataset, the baseline protocols and performance, along with the phase-I results of the competition.

76 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: An overview of pattern clustering methods from a statistical pattern recognition perspective is presented, with a goal of providing useful advice and references to fundamental concepts accessible to the broad community of clustering practitioners.
Abstract: Clustering is the unsupervised classification of patterns (observations, data items, or feature vectors) into groups (clusters). The clustering problem has been addressed in many contexts and by researchers in many disciplines; this reflects its broad appeal and usefulness as one of the steps in exploratory data analysis. However, clustering is a difficult problem combinatorially, and differences in assumptions and contexts in different communities has made the transfer of useful generic concepts and methodologies slow to occur. This paper presents an overview of pattern clustering methods from a statistical pattern recognition perspective, with a goal of providing useful advice and references to fundamental concepts accessible to the broad community of clustering practitioners. We present a taxonomy of clustering techniques, and identify cross-cutting themes and recent advances. We also describe some important applications of clustering algorithms such as image segmentation, object recognition, and information retrieval.

14,054 citations

Book
10 Mar 2005
TL;DR: This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
Abstract: A major new professional reference work on fingerprint security systems and technology from leading international researchers in the field Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators

3,821 citations

Journal ArticleDOI
TL;DR: A fast fingerprint enhancement algorithm is presented, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency.
Abstract: In order to ensure that the performance of an automatic fingerprint identification/verification system will be robust with respect to the quality of input fingerprint images, it is essential to incorporate a fingerprint enhancement algorithm in the minutiae extraction module. We present a fast fingerprint enhancement algorithm, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency. We have evaluated the performance of the image enhancement algorithm using the goodness index of the extracted minutiae and the accuracy of an online fingerprint verification system. Experimental results show that incorporating the enhancement algorithm improves both the goodness index and the verification accuracy.

2,212 citations

01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

Reference EntryDOI
15 Oct 2004

2,118 citations