-
FPT Approximations for Packing and Covering Problems Parameterized by Elimination Distance and Even Less
Authors:
Tanmay Inamdar,
Lawqueen Kanesh,
Madhumita Kundu,
M. S. Ramanujan,
Saket Saurabh
Abstract:
For numerous graph problems in the realm of parameterized algorithms, using the size of a smallest deletion set (called a modulator) into well-understood graph families as parameterization has led to a long and successful line of research. Recently, however, there has been an extensive study of structural parameters that are potentially much smaller than the modulator size. In particular, recent p…
▽ More
For numerous graph problems in the realm of parameterized algorithms, using the size of a smallest deletion set (called a modulator) into well-understood graph families as parameterization has led to a long and successful line of research. Recently, however, there has been an extensive study of structural parameters that are potentially much smaller than the modulator size. In particular, recent papers [Jansen et al. STOC 2021; Agrawal et al. SODA 2022] have studied parameterization by the size of the modulator to a graph family $\mathcal{H}$ ($\textbf{mod}_{\mathcal{H}}$), elimination distance to $\mathcal{H}$ ($\textbf{ed}_{\mathcal{H}}$), and $\mathcal{H}$-treewidth ($\textbf{tw}_{\mathcal{H}}$). While these new parameters have been successfully exploited to design fast exact algorithms their utility (especially that of latter two) in the context of approximation algorithms is mostly unexplored.
The conceptual contribution of this paper is to present novel algorithmic meta-theorems that expand the impact of these structural parameters to the area of FPT Approximation, mirroring their utility in the design of exact FPT algorithms. Precisely, we show that if a covering or packing problem is definable in Monadic Second Order Logic and has a property called Finite Integer Index, then the existence of an FPT Approximation Scheme (FPT-AS, i.e., ($1\pm ε$)-approximation) parameterized these three parameters is in fact equivalent. As concrete exemplifications of our meta-theorems, we obtain FPT-ASes for well-studied graph problems such as Vertex Cover, Feedback Vertex Set, Cycle Packing and Dominating Set, parameterized by these three parameters.
△ Less
Submitted 5 October, 2023;
originally announced October 2023.
-
Circle Formation by Asynchronous Opaque Fat Robots on an Infinite Grid
Authors:
Pritam Goswami,
Manash Kumar Kundu,
Satakshi Ghosh,
Buddhadeb Sau
Abstract:
This study addresses the problem of "Circle Formation on an Infinite Grid by Fat Robots" ($CF\_FAT\_GRID$). Unlike prior work focused solely on point robots in discrete domain, it introduces fat robots to circle formation on an infinite grid, aligning with practicality as even small robots inherently possess dimensions. The algorithm, named $CIRCLE\_FG$, resolves the $CF\_FAT\_GRID$ problem using…
▽ More
This study addresses the problem of "Circle Formation on an Infinite Grid by Fat Robots" ($CF\_FAT\_GRID$). Unlike prior work focused solely on point robots in discrete domain, it introduces fat robots to circle formation on an infinite grid, aligning with practicality as even small robots inherently possess dimensions. The algorithm, named $CIRCLE\_FG$, resolves the $CF\_FAT\_GRID$ problem using a swarm of fat luminous robots. Operating under an asynchronous scheduler, it achieves this with five distinct colors and by leveraging one-axis agreement among the robots.
△ Less
Submitted 19 August, 2023;
originally announced August 2023.
-
Fixed-Parameter Algorithms for Fair Hitting Set Problems
Authors:
Tanmay Inamdar,
Lawqueen Kanesh,
Madhumita Kundu,
Nidhi Purohit,
Saket Saurabh
Abstract:
Selection of a group of representatives satisfying certain fairness constraints, is a commonly occurring scenario. Motivated by this, we initiate a systematic algorithmic study of a \emph{fair} version of \textsc{Hitting Set}. In the classical \textsc{Hitting Set} problem, the input is a universe $\mathcal{U}$, a family $\mathcal{F}$ of subsets of $\mathcal{U}$, and a non-negative integer $k$. The…
▽ More
Selection of a group of representatives satisfying certain fairness constraints, is a commonly occurring scenario. Motivated by this, we initiate a systematic algorithmic study of a \emph{fair} version of \textsc{Hitting Set}. In the classical \textsc{Hitting Set} problem, the input is a universe $\mathcal{U}$, a family $\mathcal{F}$ of subsets of $\mathcal{U}$, and a non-negative integer $k$. The goal is to determine whether there exists a subset $S \subseteq \mathcal{U}$ of size $k$ that \emph{hits} (i.e., intersects) every set in $\mathcal{F}$. Inspired by several recent works, we formulate a fair version of this problem, as follows. The input additionally contains a family $\mathcal{B}$ of subsets of $\mathcal{U}$, where each subset in $\mathcal{B}$ can be thought of as the group of elements of the same \emph{type}. We want to find a set $S \subseteq \mathcal{U}$ of size $k$ that (i) hits all sets of $\mathcal{F}$, and (ii) does not contain \emph{too many} elements of each type. We call this problem \textsc{Fair Hitting Set}, and chart out its tractability boundary from both classical as well as multivariate perspective. Our results use a multitude of techniques from parameterized complexity including classical to advanced tools, such as, methods of representative sets for matroids, FO model checking, and a generalization of best known kernels for \textsc{Hitting Set}.
△ Less
Submitted 17 July, 2023;
originally announced July 2023.
-
Secrecy Outage Analysis of Energy Harvesting Relay-based Mixed UOWC-RF Network with Multiple Eavesdroppers
Authors:
Moloy Kumar Ghosh,
Milton Kumar Kundu,
Md Ibrahim,
A. S. M. Badrudduza,
Md. Shamim Anower,
Imran Shafique Ansari,
Ali A. Shaikhi,
Mohammed A. Mohandes
Abstract:
This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay node between the underwater source and the destination transforms the optical signal into electrical form and re-transmits it to the destination…
▽ More
This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay node between the underwater source and the destination transforms the optical signal into electrical form and re-transmits it to the destination node with the help of harvested energy by the relay from an integrated power beacon within the system. The source-to-relay link (UOWC) follows a mixture exponential generalized Gamma turbulence with pointing error impairments whereas all the remaining links (RF) undergo $κ-μ$ shadowed fading. With regards to the types of intruders, herein two scenarios are considered, i.e., colluding (\textit{Scenario-I}) and non-colluding (\textit{Scenario-II}) eavesdroppers and the analytical expressions of secure outage probability, probability of strictly positive secrecy capacity, and effective secrecy throughput are derived in closed form for each scenario. Furthermore, the impacts of UOWC and RF channel parameters as well as detection techniques on secrecy capacity are demonstrated, and following this a comparison between the two considered scenarios is demonstrated that reveals the collusion between the eavesdroppers imposes the most harmful threat on secrecy throughput but a better secrecy level can be attained adopting diversity at the destination and power beacon nodes along with heterodyne detection rather than intensity modulation and direct detection technique. Finally, all the derived expressions are corroborated via Monte Carlo simulations.
△ Less
Submitted 20 February, 2023;
originally announced February 2023.
-
IoT Book Bot
Authors:
Souvik Datta,
Mangolik Kundu,
Ratnadeep Das Choudhury,
Sriramalakshmi P,
Sreedevi VT
Abstract:
In order to ease the process of library management many technologies have been adopted but most of them focus on inventory management. There has hardly been any progress of automation in the field of issuing and returning books to the library on time. In colleges and schools, hostellers often forget to timely return the issued books back to the library. To solve the above issue and to ensure timel…
▽ More
In order to ease the process of library management many technologies have been adopted but most of them focus on inventory management. There has hardly been any progress of automation in the field of issuing and returning books to the library on time. In colleges and schools, hostellers often forget to timely return the issued books back to the library. To solve the above issue and to ensure timely submission of the issued books, this work develops a Book-Bot which solves these complexities. The bot can commute from point A to point B, scan and verify QR Codes and Barcodes. The bot will have a certain payload capacity for carrying books. The QR code and Barcode scanning will be enabled by a Pi Camera, OpenCV and Raspberry Pi, thus making the exchange of books safe and secure. The odometry maneuvers of the bot will be controlled manually via a Blynk App. This paper focuses on how human intervention can be reduced and automates the issue part of library management system with the help of a bot.
△ Less
Submitted 4 September, 2022;
originally announced September 2022.
-
Arbitrary pattern formation by opaque fat robots on infinite grid
Authors:
Manash Kumar Kundu,
Pritam Goswami,
Satakshi Ghosh,
Buddhadeb Sau
Abstract:
Arbitrary Pattern formation ($\mathcal{APF}$) by a swarm of mobile robots is a widely studied problem in the literature. Many works regarding $\mathcal{APF}$ have been proposed on plane and infinite grid by point robots. But in practical application, it is impossible to design point robots. In \cite{BoseAKS20}, the robots are assumed opaque fat robots but the environment is plane. To the best of o…
▽ More
Arbitrary Pattern formation ($\mathcal{APF}$) by a swarm of mobile robots is a widely studied problem in the literature. Many works regarding $\mathcal{APF}$ have been proposed on plane and infinite grid by point robots. But in practical application, it is impossible to design point robots. In \cite{BoseAKS20}, the robots are assumed opaque fat robots but the environment is plane. To the best of our knowledge, no work till now ever considered the $\mathcal{APF}$ problem assuming opaque fat robots on infinite grid where movements are restricted. In this paper, we have provided a collisionless distributed algorithm and solved $\mathcal{APF}$ using 9 colors.
△ Less
Submitted 3 June, 2022;
originally announced June 2022.
-
Arbitrary pattern formation by asynchronous opaque robots on infinite grid
Authors:
Manash Kumar Kundu,
Pritam Goswami,
Satakshi Ghosh,
Buddhadeb Sau
Abstract:
Arbitrary pattern formation ($\mathcal{APF}$) by mobile robots is studied by many in literature under different conditions and environment. Recently it has been studied on an infinite grid network but with full visibility. In opaque robot model, circle formation on infinite grid has also been studied. In this paper, we are solving $\mathcal{APF}$ on infinite grid with asynchronous opaque robots wi…
▽ More
Arbitrary pattern formation ($\mathcal{APF}$) by mobile robots is studied by many in literature under different conditions and environment. Recently it has been studied on an infinite grid network but with full visibility. In opaque robot model, circle formation on infinite grid has also been studied. In this paper, we are solving $\mathcal{APF}$ on infinite grid with asynchronous opaque robots with lights. The robots do not share any global co-ordinate system. The main challenge in this problem is to elect a leader to agree upon a global co-ordinate where the vision of the robots are obstructed by other robots. Since the robots are on a grid, their movements are also restricted to avoid collisions. In this paper, the aforementioned hardness are overcome to produce an algorithm that solves the problem.
△ Less
Submitted 6 May, 2022;
originally announced May 2022.
-
On the Physical Layer Security Performance over RIS-aided Dual-hop RF-UOWC Mixed Network
Authors:
T. Hossain,
S. Shabab,
A. S. M. Badrudduza,
M. K. Kundu,
I. S. Ansari
Abstract:
Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, the researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimize the propagation environment of electromagnetic…
▽ More
Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, the researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimize the propagation environment of electromagnetic waves to improve both spectrum and energy efficiency of wireless networks. Besides, in underwater communication, underwater optical wireless communication (UOWC) is a better alternative/replacement for conventional acoustic and radio frequency (RF) technologies. Hence, mixed RIS-aided RF-UOWC can be treated as a promising technology for future wireless networks. This work focuses on the secrecy performance of mixed dual-hop RIS-aided RF-UOWC networks under the intercepting effort of a probable eavesdropper. The RF link operates under generalized Gamma fading distribution; likewise, the UOWC link experiences the mixture exponential generalized Gamma distribution. The secrecy analysis subsumes the derivations of closed-form expressions for average secrecy capacity, exact and lower bound of secrecy outage probability, and strictly positive secrecy capacity, all in terms of Meijer G functions. Capitalizing on these derivations, the effects of heterodyne and intensity modulation/direct detection systems, underwater turbulence resulting from air bubble levels, temperature gradients, and salinity gradients, are measured. Unlike conventional models that merely deal with thermally uniform scenarios, this proposed model is likely to be unique in terms of dealing with secrecy analysis of a temperature gradient RIS-aided RF-UOWC network. Lastly, the derivations are validated via Monte-Carlo simulations.
△ Less
Submitted 13 December, 2021;
originally announced December 2021.
-
Opportunistic Relay Selection over Generalized Fading and Inverse Gamma Composite Fading Mixed Multicast Channels: A Secrecy Tradeoff
Authors:
MD. Shakhawat Hossen,
A. S. M. Badrudduza,
S. M. Riazul Islam,
Abu Hanif,
Milton Kumar Kundu,
Kyung-Sup Kwak
Abstract:
The secrecy performance of realistic wireless multicast scenarios can be significantly deteriorated by the simultaneous occurrence of multipath and shadowing. To resolve this security threat, in this work an opportunistic relaying-based dual-hop wireless multicast framework is proposed in which the source dispatches confidential information to a bunch of receivers via intermediate relays under the…
▽ More
The secrecy performance of realistic wireless multicast scenarios can be significantly deteriorated by the simultaneous occurrence of multipath and shadowing. To resolve this security threat, in this work an opportunistic relaying-based dual-hop wireless multicast framework is proposed in which the source dispatches confidential information to a bunch of receivers via intermediate relays under the wiretap** attempts of multiple eavesdroppers. Two scenarios, i.e. non-line of sight (NLOS) and line of sight (LOS) communications along with the multiplicative and LOS shadowing are considered where the first scenario assumes eta-mu and eta-mu/inverse Gamma (IG) composite fading channels and the latter one follows kappa-mu and kappa-mu/IG composite fading channels as the source to relay and relay to receiver's as well as eavesdropper's links, respectively. Secrecy analysis is accomplished by deriving closed-form expressions of three familiar secrecy measures i.e. secure outage probability for multicasting, probability of non-zero secrecy multicast capacity, and ergodic secrecy multicast capacity. We further capitalize on those expressions to observe the effects of all system parameters which are again corroborated via Monte-Carlo simulations. Our observations indicate that a secrecy tradeoff between the number of relays and number of receivers, eavesdroppers, and shadowing parameters can be established to maintain the admissible security level by decreasing the detrimental influences of fading, shadowing, the number of multicast receivers and eavesdroppers.
△ Less
Submitted 8 December, 2021;
originally announced December 2021.
-
On Effective Secrecy Throughput of Underlay Spectrum Sharing $α$-$μ$/ Málaga Hybrid Model under Interference-and-Transmit Power Constraints
Authors:
Md. Ibrahim,
A. S. M. Badrudduza,
Md. Shakhawat Hossen,
M. K. Kundu,
Imran Shafique Ansari
Abstract:
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that includes a primary user, a secondary source, a seconda…
▽ More
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that includes a primary user, a secondary source, a secondary receiver, and an eavesdropper where the secret communication takes place between two legitimate secondary peers over the RF and FSO links simultaneously, and the eavesdropper can overhear the RF link only. In particular, the maximum transmit power limitation at the secondary user as well as the permissible interference power restriction at the primary user are also taken into consideration. All the RF links are modeled with $α$-$μ$ fading whereas the FSO link undergoes Málaga (M) turbulence with link blockage and pointing error impairments. At the receiver, the selection combining diversity technique is utilized to select the signal with the best electrical signal-to-ratio (SNR). Moreover, the closed-form expressions for the secrecy outage probability, probability of strictly positive secrecy capacity, and effective secrecy throughput are derived to analyze the secrecy performance. Besides, the impacts of fading, primary-secondary interference, detection techniques, link blockage probability, atmospheric turbulence, and pointing error are examined. Finally, Monte-Carlo simulations are performed to corroborate the derived expressions.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
On the Intercept Probability and Secure Outage Analysis of Mixed ($α$-$κ$-$μ$)-shadowed and Málaga Turbulent Model
Authors:
N. A. Sarker,
A. S. M. Badrudduza,
S. M. R. Islam,
S. H. Islam,
M. K. Kundu,
I. S. Ansari,
K. -S. Kwak
Abstract:
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay's transmitted optical signal. The RF and FSO links undergo ($α$-$κ$-$μ$)-shadowed fading and unified Málaga turbulence with pointing error. The secrecy…
▽ More
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay's transmitted optical signal. The RF and FSO links undergo ($α$-$κ$-$μ$)-shadowed fading and unified Málaga turbulence with pointing error. The secrecy performance of the mixed system is studied by deriving closed-form analytical expressions of secure outage probability (SOP), strictly positive secrecy capacity (SPSC), and intercept probability (IP). Besides, we also derive the asymptotic SOP, SPSC, and IP upon utilizing the unfolding of Meijer's G function where the electrical SNR of the FSO link tends to infinity. Finally, the Monte-Carlo simulation is performed to corroborate the analytical expressions. Our results illustrate that fading, shadowing, detection techniques (i.e., heterodyne detection (HD) and intensity modulation and direct detection (IM/DD)), atmospheric turbulence, and pointing error significantly affect the secrecy performance. In addition, better performance is obtained exploiting the HD technique at the destination relative to IM/DD technique.
△ Less
Submitted 10 September, 2021;
originally announced September 2021.
-
Secrecy Performance of α-κ-μ Shadowed Fading Channel
Authors:
A. S. M. Badrudduza,
S. H. Islam,
M. K. Kundu,
I. S. Ansari
Abstract:
In this paper, the physical layer security aspects of a wireless framework over α-\k{appa}-μ shadowed (AKMS) fading channel are examined by acquiring closed-form novel expressions of average secrecy capacity, secure outage probability (SOP), and strictly positive secrecy capacity. The lower bound of SOP is derived along with the asymptotic expression of SOP at the high signal-to-noise ratio regime…
▽ More
In this paper, the physical layer security aspects of a wireless framework over α-\k{appa}-μ shadowed (AKMS) fading channel are examined by acquiring closed-form novel expressions of average secrecy capacity, secure outage probability (SOP), and strictly positive secrecy capacity. The lower bound of SOP is derived along with the asymptotic expression of SOP at the high signal-to-noise ratio regime in order to achieve secrecy diversity gain. Capitalizing on these expressions, the consequences due to the simultaneous occurrence of fading and shadowing are quantified. Finally, Monte-Carlo simulations are demonstrated to assess the correctness of the expressions.
△ Less
Submitted 3 September, 2021;
originally announced September 2021.
-
Opportunistic Relay in Multicast Channels with Generalized Shadowed Fading Effects: A Physical Layer Security Perspective
Authors:
S. M. S. Shahriyer,
A. S. M. Badrudduza,
S. Shabab,
M. K. Kundu,
H. Yu
Abstract:
Through ordinary transmissions over wireless multicast networks are greatly hampered due to the simultaneous presence of fading and shadowing of wireless channels, secure transmissions can be enhanced by properly exploiting random attributes of the propagation medium. This study focuses on the utilization of those attributes to enhance the physical layer security (PLS) performance of a dual-hop wi…
▽ More
Through ordinary transmissions over wireless multicast networks are greatly hampered due to the simultaneous presence of fading and shadowing of wireless channels, secure transmissions can be enhanced by properly exploiting random attributes of the propagation medium. This study focuses on the utilization of those attributes to enhance the physical layer security (PLS) performance of a dual-hop wireless multicast network over kappa-mu shadow-fading channel under the wiretap** attempts of multiple eavesdroppers. In order to improve the secrecy level, the best relay selection strategy among multiple relays is employed. Performance analysis is carried out based on the mathematical modeling in terms of analytical expressions of non-zero secrecy capacity probability, secure outage probability, and ergodic secrecy capacity over multicast relay networks. Capitalizing on those expressions, the effects of system parameters, i.e., fading, shadowing, the number of antennas, destination receivers, eavesdroppers, and relays, on the secrecy performance are investigated. Numerical results show that the detrimental impacts caused by fading and shadowing can be remarkably mitigated using the well-known opportunistic relaying technique. Moreover, the proposed model unifies secrecy analysis of several classical models, thereby exhibiting enormous versatility than the existing works.
△ Less
Submitted 14 November, 2021; v1 submitted 16 June, 2021;
originally announced June 2021.
-
Effects of Eavesdropper on the Performance of Mixed η-μ and DGG Cooperative Relaying System
Authors:
Noor Ahmed Sarker,
A. S. M. Badrudduza,
Milton Kumar Kundu,
Imran Shafique Ansari
Abstract:
Free-space optical (FSO) channel offers line-of-sight wireless communication with high data rates and high secrecy utilizing unlicensed optical spectrum and also paves the way to the solution of the last-mile access problem. Since atmospheric turbulence is a hindrance to an enhanced secrecy performance, the mixed radio frequency (RF)-FSO system is gaining enormous research interest in recent days.…
▽ More
Free-space optical (FSO) channel offers line-of-sight wireless communication with high data rates and high secrecy utilizing unlicensed optical spectrum and also paves the way to the solution of the last-mile access problem. Since atmospheric turbulence is a hindrance to an enhanced secrecy performance, the mixed radio frequency (RF)-FSO system is gaining enormous research interest in recent days. But conventional FSO models except for the double generalized Gamma (DGG) model can not demonstrate secrecy performance for all ranges of turbulence severity. This reason has led us to propose a dual-hop eta-mu and unified DGG mixed RF-FSO network while considering eavesdrop** at both RF and FSO hops. The security of these proposed scenarios is investigated in terms of two metrics, i.e., strictly positive secrecy capacity and secure outage probability. Exploiting these expressions, we further investigate how the secrecy performance is affected by various system parameters, i.e., fading, turbulence, and pointing errors. A demonstration is made between heterodyne detection (HD) and intensity modulation and direct detection (IM/DD) techniques while exhibiting superior secrecy performance for HD technique over IM/DD technique. Finally, all analytical results are corroborated via Monte-Carlo simulations.
△ Less
Submitted 13 June, 2021;
originally announced June 2021.
-
On Secrecy Performance of Mixed α-η-μ and Malaga RF-FSO Variable Gain Relaying Channel
Authors:
Nandita Swanan Mandira,
Milton Kumar Kundu,
Sheikh Habibul Islam,
A. S. M. Badrudduza,
Imran Shafique Ansari
Abstract:
With the completion of standardization of fifth-generation (5G) networks, the researchers have begun visioning sixth-generation (6G) networks that are predicted to be human-centric. Hence, similar to 5G networks, besides high data rate, providing secrecy and privacy will be the center of attention by the wireless research community. To support the visions beyond 5G (B5G) and 6G, in this paper we p…
▽ More
With the completion of standardization of fifth-generation (5G) networks, the researchers have begun visioning sixth-generation (6G) networks that are predicted to be human-centric. Hence, similar to 5G networks, besides high data rate, providing secrecy and privacy will be the center of attention by the wireless research community. To support the visions beyond 5G (B5G) and 6G, in this paper we propose a secure radio frequency (RF)-free-space optical (FSO) mixed framework under the attempt of wiretap** by an eavesdropper at the RF hop. We assume the RF links undergo alpha-eta-mu fading whereas the FSO link exhibits a unified Malaga turbulence model with pointing error. The secrecy performance is evaluated by deducing expressions for three secrecy metrics i.e. average secrecy capacity, secure outage probability, and probability of non-zero secrecy capacity in terms of univariate and bivariate Meijer's G and Fox's H functions. We further capitalize on these expressions to demonstrate the impacts of fading, atmospheric turbulence, and pointing errors and show a comparison between two detection techniques (i.e. heterodyne detection (HD) and intensity modulation with direct detection (IM/DD)) that clearly reveals better secrecy can be achieved with HD technique relative to the IM/DD method. The inclusion of generalized fading models at the RF and FSO hops offers unification of several classical scenarios as special cases thereby exhibiting a more generic nature relative to the existing literature. Finally, all the analytical results are corroborated via Monte-Carlo simulations.
△ Less
Submitted 25 May, 2021;
originally announced May 2021.
-
Security Analysis in Multicasting over Shadowed Rician and α-μ Fading Channels: A Dual-hop Hybrid Satellite Terrestrial Relaying Network
Authors:
Abida Sultana Sumona,
Milton Kumar Kundu,
A. S. M. Badrudduza
Abstract:
In this era of 5G technology, the ever-increasing demands for high data rates lead researchers to develop hybrid satellite-terrestrial (HST) networks as a substitution to the conventional cellular terrestrial systems. Since an HST network suffers from a masking effect which can be mitigated by adopting the terrestrial relaying strategy, in this work, we focus on wireless multicasting through an HS…
▽ More
In this era of 5G technology, the ever-increasing demands for high data rates lead researchers to develop hybrid satellite-terrestrial (HST) networks as a substitution to the conventional cellular terrestrial systems. Since an HST network suffers from a masking effect which can be mitigated by adopting the terrestrial relaying strategy, in this work, we focus on wireless multicasting through an HST relaying net-work (HSTRN) in which a satellite sends messages to multiple terrestrial nodes via multiple relays under the wiretap** efforts of multiple eavesdroppers. Our concern is to protect the multicast messages from being eavesdropped taking advantage of the well-known opportunistic relaying technique. We consider the satellite links follow Shadowed Rician fading whereas the terrestrial links undergo alpha-mu fading. The secrecy performance of the proposed HSTRN model is accomplished by deriving expressions for the probability of nonzero secrecy multicast capacity, ergodic secrecy multicast capacity, and secure outage probability for multicasting in closed-form. Capitalizing on the derived expressions, we analyze how a perfect secrecy level can be preserved in spite of harsh channel conditions and also present a secrecy trade-off in terms of the number of relays, multicast users, and multiple eavesdroppers. Finally, the numerical analyses are corroborated via Monte-Carlo simulations.
△ Less
Submitted 3 July, 2021; v1 submitted 25 May, 2021;
originally announced May 2021.
-
Enhancing Security of TAS/MRC Based Mixed RF-UOWC System with Induced Underwater Turbulence Effect
Authors:
Md. Ibrahim,
A. S. M. Badrudduza,
Md. Shakhawat Hossen,
Milton Kumar Kundu,
Imran Shafique Ansari
Abstract:
Post commercial deployment of fifth-generation (5G) technologies, the consideration of sixth-generation (6G) networks is drawing remarkable attention from research communities. Researchers suggest that similar to 5G, 6G technology must be human-centric where high secrecy together with high data rate will be the key features. These challenges can be easily overcome utilizing PHY security techniques…
▽ More
Post commercial deployment of fifth-generation (5G) technologies, the consideration of sixth-generation (6G) networks is drawing remarkable attention from research communities. Researchers suggest that similar to 5G, 6G technology must be human-centric where high secrecy together with high data rate will be the key features. These challenges can be easily overcome utilizing PHY security techniques over high-frequency free-space or underwater optical wireless communication (UOWC) technologies. But in long-distance communication, turbulence components drastically affect the optical signals, leading to the invention of the combination of radio-frequency (RF) links with optical links. This work deals with the secrecy performance analysis of a mixed RF-UOWC system where an eavesdropper tries to intercept RF communications. RF and optical links undergo $η-μ$ and mixture exponential generalized Gamma distributions, respectively. To keep pace with the high data rate of optical technologies, we exploit the antenna selection scheme at the source and maximal ratio combining diversity at the relay and eavesdropper, while the eavesdropper is unaware of the antenna selection scheme. We derive closed-form expressions of average secrecy capacity, secrecy outage probability, and strictly positive secrecy capacity to demonstrate the impacts of the system parameters on the secrecy behavior. Finally, the expressions are corroborated via Monte-Carlo simulations.
△ Less
Submitted 21 November, 2021; v1 submitted 19 May, 2021;
originally announced May 2021.
-
Exploring Knowledge Distillation of a Deep Neural Network for Multi-Script identification
Authors:
Shuvayan Ghosh Dastidar,
Kalpita Dutta,
Nibaran Das,
Mahantapas Kundu,
Mita Nasipuri
Abstract:
Multi-lingual script identification is a difficult task consisting of different language with complex backgrounds in scene text images. According to the current research scenario, deep neural networks are employed as teacher models to train a smaller student network by utilizing the teacher model's predictions. This process is known as dark knowledge transfer. It has been quite successful in many…
▽ More
Multi-lingual script identification is a difficult task consisting of different language with complex backgrounds in scene text images. According to the current research scenario, deep neural networks are employed as teacher models to train a smaller student network by utilizing the teacher model's predictions. This process is known as dark knowledge transfer. It has been quite successful in many domains where the final result obtained is unachievable through directly training the student network with a simple architecture. In this paper, we explore dark knowledge transfer approach using long short-term memory(LSTM) and CNN based assistant model and various deep neural networks as the teacher model, with a simple CNN based student network, in this domain of multi-script identification from natural scene text images. We explore the performance of different teacher models and their ability to transfer knowledge to a student network. Although the small student network's limited size, our approach obtains satisfactory results on a well-known script identification dataset CVSI-2015.
△ Less
Submitted 20 February, 2021;
originally announced February 2021.
-
Parameterized Complexity of Maximum Edge Colorable Subgraph
Authors:
Akanksha Agrawal,
Madhumita Kundu,
Abhishek Sahu,
Saket Saurabh,
Prafullkumar Tale
Abstract:
A graph $H$ is {\em $p$-edge colorable} if there is a coloring $ψ: E(H) \rightarrow \{1,2,\dots,p\}$, such that for distinct $uv, vw \in E(H)$, we have $ψ(uv) \neq ψ(vw)$. The {\sc Maximum Edge-Colorable Subgraph} problem takes as input a graph $G$ and integers $l$ and $p$, and the objective is to find a subgraph $H$ of $G$ and a $p$-edge-coloring of $H$, such that $|E(H)| \geq l$. We study the ab…
▽ More
A graph $H$ is {\em $p$-edge colorable} if there is a coloring $ψ: E(H) \rightarrow \{1,2,\dots,p\}$, such that for distinct $uv, vw \in E(H)$, we have $ψ(uv) \neq ψ(vw)$. The {\sc Maximum Edge-Colorable Subgraph} problem takes as input a graph $G$ and integers $l$ and $p$, and the objective is to find a subgraph $H$ of $G$ and a $p$-edge-coloring of $H$, such that $|E(H)| \geq l$. We study the above problem from the viewpoint of Parameterized Complexity. We obtain \FPT\ algorithms when parameterized by: $(1)$ the vertex cover number of $G$, by using {\sc Integer Linear Programming}, and $(2)$ $l$, a randomized algorithm via a reduction to \textsc{Rainbow Matching}, and a deterministic algorithm by using color coding, and divide and color. With respect to the parameters $p+k$, where $k$ is one of the following: $(1)$ the solution size, $l$, $(2)$ the vertex cover number of $G$, and $(3)$ $l - {\mm}(G)$, where ${\mm}(G)$ is the size of a maximum matching in $G$; we show that the (decision version of the) problem admits a kernel with $\mathcal{O}(k \cdot p)$ vertices. Furthermore, we show that there is no kernel of size $\mathcal{O}(k^{1-ε} \cdot f(p))$, for any $ε> 0$ and computable function $f$, unless $\NP \subseteq \CONPpoly$.
△ Less
Submitted 18 August, 2020;
originally announced August 2020.
-
Distributed Localization of Wireless Sensor Network Using Communication Wheel
Authors:
Kaustav Bose,
Manash Kumar Kundu,
Ranendu Adhikary,
Buddhadeb Sau
Abstract:
We study the network localization problem, i.e., the problem of determining node positions of a wireless sensor network modeled as a unit disk graph. In an arbitrarily deployed network, positions of all nodes of the network may not be uniquely determined. It is known that even if the network corresponds to a unique solution, no polynomial-time algorithm can solve this problem in the worst case, un…
▽ More
We study the network localization problem, i.e., the problem of determining node positions of a wireless sensor network modeled as a unit disk graph. In an arbitrarily deployed network, positions of all nodes of the network may not be uniquely determined. It is known that even if the network corresponds to a unique solution, no polynomial-time algorithm can solve this problem in the worst case, unless RP = NP. So we are interested in algorithms that efficiently localize the network partially. A widely used technique that can efficiently localize a uniquely localizable portion of the network is trilateration: starting from three anchors (nodes with known positions), nodes having at least three localized neighbors are sequentially localized. However, the performance of trilateration can substantially differ for different choices of the initial three anchors. In this paper, we propose a distributed localization scheme with a theoretical characterization of nodes that are guaranteed to be localized. In particular, our proposed distributed algorithm starts localization from a strongly interior node and provided that the subgraph induced by the strongly interior nodes is connected, it localizes all nodes of the network except some boundary nodes and isolated weakly interior nodes.
△ Less
Submitted 3 August, 2020;
originally announced August 2020.
-
A Skip-connected Multi-column Network for Isolated Handwritten Bangla Character and Digit recognition
Authors:
Animesh Singh,
Ritesh Sarkhel,
Nibaran Das,
Mahantapas Kundu,
Mita Nasipuri
Abstract:
Finding local invariant patterns in handwrit-ten characters and/or digits for optical character recognition is a difficult task. Variations in writing styles from one person to another make this task challenging. We have proposed a non-explicit feature extraction method using a multi-scale multi-column skip convolutional neural network in this work. Local and global features extracted from differe…
▽ More
Finding local invariant patterns in handwrit-ten characters and/or digits for optical character recognition is a difficult task. Variations in writing styles from one person to another make this task challenging. We have proposed a non-explicit feature extraction method using a multi-scale multi-column skip convolutional neural network in this work. Local and global features extracted from different layers of the proposed architecture are combined to derive the final feature descriptor encoding a character or digit image. Our method is evaluated on four publicly available datasets of isolated handwritten Bangla characters and digits. Exhaustive comparative analysis against contemporary methods establishes the efficacy of our proposed approach.
△ Less
Submitted 27 April, 2020;
originally announced April 2020.
-
Uplink and Downlink Performance Bounds for Full Duplex Cellular Networks
Authors:
Askar Mandali Kundu,
Rudrashish Pal,
Mayank Kumar,
Sreejith T V
Abstract:
With Full Duplex (FD), wireless terminal is capable of transmitting and receiving data simultaneously in the same frequency resources, however, it introduces self interference and co-channel interference. Even though various signal processing techniques are emerged to cancel the self interference, the bottleneck for FD performance in cellular systems is the co-channel interference from the other u…
▽ More
With Full Duplex (FD), wireless terminal is capable of transmitting and receiving data simultaneously in the same frequency resources, however, it introduces self interference and co-channel interference. Even though various signal processing techniques are emerged to cancel the self interference, the bottleneck for FD performance in cellular systems is the co-channel interference from the other uplink and downlink signals. In this work we have studied both the uplink and downlink performances of a FD cellular network, where users employ fractional power control in uplink. We use Matern Cluster Process to model the network, which provides a tractable and realistic model to characterize the user-base station distances which are needed for uplink power control. Based on the obtained coverage probabilities, rates and their robust approximations, we show that while FD improves downlink performance, it severely hurts the uplink performance. Also, we provide a trade-off between uplink and downlink performances. Our study suggests dense deployment of low power base stations can improve the performance of FD system.
△ Less
Submitted 31 January, 2023; v1 submitted 4 April, 2020;
originally announced April 2020.
-
A Genetic Algorithm based Kernel-size Selection Approach for a Multi-column Convolutional Neural Network
Authors:
Animesh Singh,
Sandip Saha,
Ritesh Sarkhel,
Mahantapas Kundu,
Mita Nasipuri,
Nibaran Das
Abstract:
Deep neural network-based architectures give promising results in various domains including pattern recognition. Finding the optimal combination of the hyper-parameters of such a large-sized architecture is tedious and requires a large number of laboratory experiments. But, identifying the optimal combination of a hyper-parameter or appropriate kernel size for a given architecture of deep learning…
▽ More
Deep neural network-based architectures give promising results in various domains including pattern recognition. Finding the optimal combination of the hyper-parameters of such a large-sized architecture is tedious and requires a large number of laboratory experiments. But, identifying the optimal combination of a hyper-parameter or appropriate kernel size for a given architecture of deep learning is always a challenging and tedious task. Here, we introduced a genetic algorithm-based technique to reduce the efforts of finding the optimal combination of a hyper-parameter (kernel size) of a convolutional neural network-based architecture. The method is evaluated on three popular datasets of different handwritten Bangla characters and digits. The implementation of the proposed methodology can be found in the following link: https://github.com/DeepQn/GA-Based-Kernel-Size.
△ Less
Submitted 16 March, 2020; v1 submitted 28 December, 2019;
originally announced December 2019.
-
Arbitrary Pattern Formation by Opaque Fat Robots with Lights
Authors:
Kaustav Bose,
Ranendu Adhikary,
Manash Kumar Kundu,
Buddhadeb Sau
Abstract:
Arbitrary Pattern Formation is a widely studied problem in autonomous robot systems. The problem asks to design a distributed algorithm that moves a team of autonomous, anonymous and identical mobile robots to form any arbitrary pattern given as input. The majority of the existing literature investigates this problem for robots with unobstructed visibility. In a few recent works, the problem has b…
▽ More
Arbitrary Pattern Formation is a widely studied problem in autonomous robot systems. The problem asks to design a distributed algorithm that moves a team of autonomous, anonymous and identical mobile robots to form any arbitrary pattern given as input. The majority of the existing literature investigates this problem for robots with unobstructed visibility. In a few recent works, the problem has been studied in the obstructed visibility model, where the view of a robot can be obstructed by the presence of other robots. However, in these works, the robots have been modelled as dimensionless points in the plane. In this paper, we have considered the problem in the more realistic setting where the robots have a physical extent. In particular, the robots are modelled as opaque disks. Furthermore, the robots operate under a fully asynchronous scheduler. They do not have access to any global coordinate system, but agree on the direction and orientation of one coordinate axis. Each robot is equipped with an externally visible light which can assume a constant number of predefined colors. In this setting, we have given a complete characterization of initial configurations from where any arbitrary pattern can be formed by a deterministic distributed algorithm.
△ Less
Submitted 7 October, 2019;
originally announced October 2019.
-
Positional Encoding by Robots with Non-Rigid Movements
Authors:
Kaustav Bose,
Ranendu Adhikary,
Manash Kumar Kundu,
Buddhadeb Sau
Abstract:
Consider a set of autonomous computational entities, called \emph{robots}, operating inside a polygonal enclosure (possibly with holes), that have to perform some collaborative tasks. The boundary of the polygon obstructs both visibility and mobility of a robot. Since the polygon is initially unknown to the robots, the natural approach is to first explore and construct a map of the polygon. For th…
▽ More
Consider a set of autonomous computational entities, called \emph{robots}, operating inside a polygonal enclosure (possibly with holes), that have to perform some collaborative tasks. The boundary of the polygon obstructs both visibility and mobility of a robot. Since the polygon is initially unknown to the robots, the natural approach is to first explore and construct a map of the polygon. For this, the robots need an unlimited amount of persistent memory to store the snapshots taken from different points inside the polygon. However, it has been shown by Di Luna et al. [DISC 2017] that map construction can be done even by oblivious robots by employing a positional encoding strategy where a robot carefully positions itself inside the polygon to encode information in the binary representation of its distance from the closest polygon vertex. Of course, to execute this strategy, it is crucial for the robots to make accurate movements. In this paper, we address the question whether this technique can be implemented even when the movements of the robots are unpredictable in the sense that the robot can be stopped by the adversary during its movement before reaching its destination. However, there exists a constant $δ> 0$, unknown to the robot, such that the robot can always reach its destination if it has to move by no more than $δ$ amount. This model is known in literature as \emph{non-rigid} movement. We give a partial answer to the question in the affirmative by presenting a map construction algorithm for robots with non-rigid movement, but having $O(1)$ bits of persistent memory and ability to make circular moves.
△ Less
Submitted 23 May, 2019;
originally announced May 2019.
-
Arbitrary Pattern Formation by Asynchronous Opaque Robots with Lights
Authors:
Kaustav Bose,
Manash Kumar Kundu,
Ranendu Adhikary,
Buddhadeb Sau
Abstract:
The Arbitrary Pattern Formation problem asks for a distributed algorithm that moves a set of autonomous mobile robots to form any arbitrary pattern given as input. The robots are assumed to be autonomous, anonymous and identical. They operate in Look-Compute-Move cycles under an asynchronous scheduler. The robots do not have access to any global coordinate system. The movement of the robots is ass…
▽ More
The Arbitrary Pattern Formation problem asks for a distributed algorithm that moves a set of autonomous mobile robots to form any arbitrary pattern given as input. The robots are assumed to be autonomous, anonymous and identical. They operate in Look-Compute-Move cycles under an asynchronous scheduler. The robots do not have access to any global coordinate system. The movement of the robots is assumed to be rigid, which means that each robot is able to reach its desired destination without interruption. The existing literature that investigates this problem, considers robots with unobstructed visibility. This work considers the problem in the more realistic obstructed visibility model, where the view of a robot can be obstructed by the presence of other robots. The robots are assumed to be punctiform and equipped with visible lights that can assume a constant number of predefined colors. We have studied the problem in two settings based on the level of consistency among the local coordinate systems of the robots: two axis agreement (they agree on the direction and orientation of both coordinate axes) and one axis agreement (they agree on the direction and orientation of only one coordinate axis). In both settings, we have provided a full characterization of initial configurations from where any arbitrary pattern can be formed.
△ Less
Submitted 7 October, 2020; v1 submitted 13 February, 2019;
originally announced February 2019.
-
Arbitrary Pattern Formation on Infinite Grid by Asynchronous Oblivious Robots
Authors:
Kaustav Bose,
Ranendu Adhikary,
Manash Kumar Kundu,
Buddhadeb Sau
Abstract:
The Arbitrary Pattern Formation problem asks to design a distributed algorithm that allows a set of autonomous mobile robots to form any specific but arbitrary geometric pattern given as input. The problem has been extensively studied in literature in continuous domains. This paper investigates a discrete version of the problem where the robots are operating on a two dimensional infinite grid. The…
▽ More
The Arbitrary Pattern Formation problem asks to design a distributed algorithm that allows a set of autonomous mobile robots to form any specific but arbitrary geometric pattern given as input. The problem has been extensively studied in literature in continuous domains. This paper investigates a discrete version of the problem where the robots are operating on a two dimensional infinite grid. The robots are assumed to be autonomous, identical, anonymous and oblivious. They operate in Look-Compute-Move cycles under a fully asynchronous scheduler. The robots do not agree on any common global coordinate system or chirality. We have shown that a set of robots can form any arbitrary pattern, if their starting configuration is asymmetric.
△ Less
Submitted 2 November, 2018;
originally announced November 2018.
-
Handwritten Isolated Bangla Compound Character Recognition: a new benchmark using a novel deep learning approach
Authors:
Saikat Roy,
Nibaran Das,
Mahantapas Kundu,
Mita Nasipuri
Abstract:
In this work, a novel deep learning technique for the recognition of handwritten Bangla isolated compound character is presented and a new benchmark of recognition accuracy on the CMATERdb 3.1.3.3 dataset is reported. Greedy layer wise training of Deep Neural Network has helped to make significant strides in various pattern recognition problems. We employ layerwise training to Deep Convolutional N…
▽ More
In this work, a novel deep learning technique for the recognition of handwritten Bangla isolated compound character is presented and a new benchmark of recognition accuracy on the CMATERdb 3.1.3.3 dataset is reported. Greedy layer wise training of Deep Neural Network has helped to make significant strides in various pattern recognition problems. We employ layerwise training to Deep Convolutional Neural Networks (DCNN) in a supervised fashion and augment the training process with the RMSProp algorithm to achieve faster convergence. We compare results with those obtained from standard shallow learning methods with predefined features, as well as standard DCNNs. Supervised layerwise trained DCNNs are found to outperform standard shallow learning models such as Support Vector Machines as well as regular DCNNs of similar architecture by achieving error rate of 9.67% thereby setting a new benchmark on the CMATERdb 3.1.3.3 with recognition accuracy of 90.33%, representing an improvement of nearly 10%.
△ Less
Submitted 2 February, 2018;
originally announced February 2018.
-
Tracking Direction of Human Movement - An Efficient Implementation using Skeleton
Authors:
Merina Kundu,
Dhriti Sengupta,
Jayati Ghosh Dastidar
Abstract:
Sometimes a simple and fast algorithm is required to detect human presence and movement with a low error rate in a controlled environment for security purposes. Here a light weight algorithm has been presented that generates alert on detection of human presence and its movement towards a certain direction. The algorithm uses fixed angle CCTV camera images taken over time and relies upon skeleton t…
▽ More
Sometimes a simple and fast algorithm is required to detect human presence and movement with a low error rate in a controlled environment for security purposes. Here a light weight algorithm has been presented that generates alert on detection of human presence and its movement towards a certain direction. The algorithm uses fixed angle CCTV camera images taken over time and relies upon skeleton transformation of successive images and calculation of difference in their coordinates.
△ Less
Submitted 29 June, 2015;
originally announced June 2015.
-
Human Shape Variation - An Efficient Implementation using Skeleton
Authors:
Dhriti Sengupta,
Merina Kundu,
Jayati Ghosh Dastidar
Abstract:
It is at times important to detect human presence automatically in secure environments. This needs a shape recognition algorithm that is robust, fast and has low error rates. The algorithm needs to process camera images quickly to detect any human in the range of vision, and generate alerts, especially if the object under scrutiny is moving in certain directions. We present here a simple, efficien…
▽ More
It is at times important to detect human presence automatically in secure environments. This needs a shape recognition algorithm that is robust, fast and has low error rates. The algorithm needs to process camera images quickly to detect any human in the range of vision, and generate alerts, especially if the object under scrutiny is moving in certain directions. We present here a simple, efficient and fast algorithm using skeletons of the images, and simple features like posture and length of the object.
△ Less
Submitted 29 June, 2015;
originally announced June 2015.
-
An Improved Feature Descriptor for Recognition of Handwritten Bangla Alphabet
Authors:
Nibaran Das,
Subhadip Basu,
Ram Sarkar,
Mahantapas Kundu,
Mita Nasipuri,
Dipak kumar Basu
Abstract:
Appropriate feature set for representation of pattern classes is one of the most important aspects of handwritten character recognition. The effectiveness of features depends on the discriminating power of the features chosen to represent patterns of different classes. However, discriminatory features are not easily measurable. Investigative experimentation is necessary for identifying discriminat…
▽ More
Appropriate feature set for representation of pattern classes is one of the most important aspects of handwritten character recognition. The effectiveness of features depends on the discriminating power of the features chosen to represent patterns of different classes. However, discriminatory features are not easily measurable. Investigative experimentation is necessary for identifying discriminatory features. In the present work we have identified a new variation of feature set which significantly outperforms on handwritten Bangla alphabet from the previously used feature set. 132 number of features in all viz. modified shadow features, octant and centroid features, distance based features, quad tree based longest run features are used here. Using this feature set the recognition performance increases sharply from the 75.05% observed in our previous work [7], to 85.40% on 50 character classes with MLP based classifier on the same dataset.
△ Less
Submitted 22 January, 2015;
originally announced January 2015.
-
A GA Based approach for selection of local features for recognition of handwritten Bangla numerals
Authors:
Nibaran Das,
Subhadip Basu,
Punam Kumar Saha,
Ram Sarkar,
Mahantapas Kundu,
Mita Nasipuri
Abstract:
Soft computing approaches are mainly designed to address the real world ill-defined, imprecisely formulated problems, combining different kind of novel models of computation, such as neural networks, genetic algorithms (GAs. Handwritten digit recognition is a typical example of one such problem. In the current work we have developed a two-pass approach where the first pass classifier performs a co…
▽ More
Soft computing approaches are mainly designed to address the real world ill-defined, imprecisely formulated problems, combining different kind of novel models of computation, such as neural networks, genetic algorithms (GAs. Handwritten digit recognition is a typical example of one such problem. In the current work we have developed a two-pass approach where the first pass classifier performs a coarse classification, based on some global features of the input pattern by restricting the possibility of classification decisions within a group of classes, smaller than the number of classes considered initially. In the second pass, the group specific classifiers concentrate on the features extracted from the selected local regions, and refine the earlier decision by combining the local and the global features for selecting the true class of the input pattern from the group of candidate classes selected in the first pass. To optimize the selection of local regions a GA based approach has been developed here. The maximum recognition performance on Bangla digit samples as achieved on the test set, during the first pass of the two pass approach is 93.35%. After combining the results of the two stage classifiers, an overall success rate of 95.25% is achieved.
△ Less
Submitted 22 January, 2015;
originally announced January 2015.
-
Design of a novel convex hull based feature set for recognition of isolated handwritten Roman numerals
Authors:
Nibaran Das,
Sandip Pramanik,
Subhadip Basu,
Punam Kumar Saha,
Ram Sarkar,
Mahantapas Kundu
Abstract:
In this paper, convex hull based features are used for recognition of isolated Roman numerals using a Multi Layer Perceptron (MLP) based classifier. Experiments of convex hull based features for handwritten character recognition are few in numbers. Convex hull of a pattern and the centroid of the convex hull both are affine invariant attributes. In this work, 25 features are extracted based on dif…
▽ More
In this paper, convex hull based features are used for recognition of isolated Roman numerals using a Multi Layer Perceptron (MLP) based classifier. Experiments of convex hull based features for handwritten character recognition are few in numbers. Convex hull of a pattern and the centroid of the convex hull both are affine invariant attributes. In this work, 25 features are extracted based on different bays attributes of the convex hull of the digit patterns. Then these patterns are divided into four sub-images with respect to the centroid of the convex hull boundary. From each such sub-image 25 bays features are also calculated. In all 125 convex hull based features are extracted for each numeric digit patterns under the current experiment. The performance of the designed feature set is tested on the standard MNIST data set, consisting of 60000 training and 10000 test images of handwritten Roman using an MLP based classifier a maximum success rate of 97.44% is achieved on the test data.
△ Less
Submitted 22 January, 2015;
originally announced January 2015.
-
A two-pass fuzzy-geno approach to pattern classification
Authors:
Subhadip Basu,
Mahantapas Kundu,
Mita Nasipuri,
Dipak Kumar Basu
Abstract:
The work presents an extension of the fuzzy approach to 2-D shape recognition [1] through refinement of initial or coarse classification decisions under a two pass approach. In this approach, an unknown pattern is classified by refining possible classification decisions obtained through coarse classification of the same. To build a fuzzy model of a pattern class horizontal and vertical fuzzy parti…
▽ More
The work presents an extension of the fuzzy approach to 2-D shape recognition [1] through refinement of initial or coarse classification decisions under a two pass approach. In this approach, an unknown pattern is classified by refining possible classification decisions obtained through coarse classification of the same. To build a fuzzy model of a pattern class horizontal and vertical fuzzy partitions on the sample images of the class are optimized using genetic algorithm. To make coarse classification decisions about an unknown pattern, the fuzzy representation of the pattern is compared with models of all pattern classes through a specially designed similarity measure. Coarse classification decisions are refined in the second pass to obtain the final classification decision of the unknown pattern. To do so, optimized horizontal and vertical fuzzy partitions are again created on certain regions of the image frame, specific to each group of similar type of pattern classes. It is observed through experiments that the technique improves the overall recognition rate from 86.2%, in the first pass, to 90.4% after the second pass, with 500 training samples of handwritten digits.
△ Less
Submitted 15 October, 2014;
originally announced October 2014.
-
Recognition of Handwritten Bangla Basic Characters and Digits using Convex Hull based Feature Set
Authors:
Nibaran Das,
Sandip Pramanik,
Subhadip Basu,
Punam Kumar Saha,
Ram Sarkar,
Mahantapas Kundu,
Mita Nasipuri
Abstract:
In dealing with the problem of recognition of handwritten character patterns of varying shapes and sizes, selection of a proper feature set is important to achieve high recognition performance. The current research aims to evaluate the performance of the convex hull based feature set, i.e. 125 features in all computed over different bays attributes of the convex hull of a pattern, for effective re…
▽ More
In dealing with the problem of recognition of handwritten character patterns of varying shapes and sizes, selection of a proper feature set is important to achieve high recognition performance. The current research aims to evaluate the performance of the convex hull based feature set, i.e. 125 features in all computed over different bays attributes of the convex hull of a pattern, for effective recognition of isolated handwritten Bangla basic characters and digits. On experimentation with a database of 10000 samples, the maximum recognition rate of 76.86% is observed for handwritten Bangla characters. For Bangla numerals the maximum success rate of 99.45%. is achieved on a database of 12000 sample. The current work validates the usefulness of a new kind of feature set for recognition of handwritten Bangla basic characters and numerals.
△ Less
Submitted 2 October, 2014;
originally announced October 2014.
-
Human Face Recognition using Gabor based Kernel Entropy Component Analysis
Authors:
Arindam Kar,
Debotosh Bhattacharjee,
Dipak Kumar Basu,
Mita Nasipuri,
Mahantapas Kundu
Abstract:
In this paper, we present a novel Gabor wavelet based Kernel Entropy Component Analysis (KECA) method by integrating the Gabor wavelet transformation (GWT) of facial images with the KECA method for enhanced face recognition performance. Firstly, from the Gabor wavelet transformed images the most important discriminative desirable facial features characterized by spatial frequency, spatial locality…
▽ More
In this paper, we present a novel Gabor wavelet based Kernel Entropy Component Analysis (KECA) method by integrating the Gabor wavelet transformation (GWT) of facial images with the KECA method for enhanced face recognition performance. Firstly, from the Gabor wavelet transformed images the most important discriminative desirable facial features characterized by spatial frequency, spatial locality and orientation selectivity to cope with the variations due to illumination and facial expression changes were derived. After that KECA, relating to the Renyi entropy is extended to include cosine kernel function. The KECA with the cosine kernels is then applied on the extracted most important discriminating feature vectors of facial images to obtain only those real kernel ECA eigenvectors that are associated with eigenvalues having positive entropy contribution. Finally, these real KECA features are used for image classification using the L1, L2 distance measures; the Mahalanobis distance measure and the cosine similarity measure. The feasibility of the Gabor based KECA method with the cosine kernel has been successfully tested on both frontal and pose-angled face recognition, using datasets from the ORL, FRAV2D and the FERET database.
△ Less
Submitted 5 December, 2013;
originally announced December 2013.
-
High Performance Human Face Recognition using Gabor based Pseudo Hidden Markov Model
Authors:
Arindam Kar,
Debotosh Bhattacharjee,
Dipak Kumar Basu,
Mita Nasipuri,
Mahantapas Kundu
Abstract:
This paper introduces a novel methodology that combines the multi-resolution feature of the Gabor wavelet transformation (GWT) with the local interactions of the facial structures expressed through the Pseudo Hidden Markov model (PHMM). Unlike the traditional zigzag scanning method for feature extraction a continuous scanning method from top-left corner to right then top-down and right to left and…
▽ More
This paper introduces a novel methodology that combines the multi-resolution feature of the Gabor wavelet transformation (GWT) with the local interactions of the facial structures expressed through the Pseudo Hidden Markov model (PHMM). Unlike the traditional zigzag scanning method for feature extraction a continuous scanning method from top-left corner to right then top-down and right to left and so on until right-bottom of the image i.e. a spiral scanning technique has been proposed for better feature selection. Unlike traditional HMMs, the proposed PHMM does not perform the state conditional independence of the visible observation sequence assumption. This is achieved via the concept of local structures introduced by the PHMM used to extract facial bands and automatically select the most informative features of a face image. Thus, the long-range dependency problem inherent to traditional HMMs has been drastically reduced. Again with the use of most informative pixels rather than the whole image makes the proposed method reasonably faster for face recognition. This method has been successfully tested on frontal face images from the ORL, FRAV2D and FERET face databases where the images vary in pose, illumination, expression, and scale. The FERET data set contains 2200 frontal face images of 200 subjects, while the FRAV2D data set consists of 1100 images of 100 subjects and the full ORL database is considered. The results reported in this application are far better than the recent and most referred systems.
△ Less
Submitted 5 December, 2013;
originally announced December 2013.
-
Face Recognition using Hough Peaks extracted from the significant blocks of the Gradient Image
Authors:
Arindam Kar,
Debotosh Bhattacharjee,
Dipak Kumar Basu,
Mita Nasipuri,
Mahantapas Kundu
Abstract:
This paper proposes a new technique for automatic face recognition using integrated peaks of the Hough transformed significant blocks of the binary gradient image. In this approach firstly the gradient of an image is calculated and a threshold is set to obtain a binary gradient image, which is less sensitive to noise and illumination changes. Secondly, significant blocks are extracted from the abs…
▽ More
This paper proposes a new technique for automatic face recognition using integrated peaks of the Hough transformed significant blocks of the binary gradient image. In this approach firstly the gradient of an image is calculated and a threshold is set to obtain a binary gradient image, which is less sensitive to noise and illumination changes. Secondly, significant blocks are extracted from the absolute gradient image, to extract pertinent information with the idea of dimension reduction. Finally the best fitted Hough peaks are extracted from the Hough transformed significant blocks for efficient face recognition. Then these Hough peaks are concatenated together, which are used as feature in classification process. The efficiency of the proposed method is demonstrated by the experiment on 1100 images from the FRAV2D face database, 2200 images from the FERET database, where the images vary in pose, expression, illumination and scale and 400 images from the ORL face database, where the images slightly vary in pose. Our method has shown 93.3%, 88.5% and 99% recognition accuracy for the FRAV2D, FERET and the ORL database respectively.
△ Less
Submitted 5 December, 2013;
originally announced December 2013.
-
A Face Recognition approach based on entropy estimate of the nonlinear DCT features in the Logarithm Domain together with Kernel Entropy Component Analysis
Authors:
Arindam Kar,
Debotosh Bhattacharjee,
Dipak Kumar Basu,
Mita Nasipuri,
Mahantapas Kundu
Abstract:
This paper exploits the feature extraction capabilities of the discrete cosine transform (DCT) together with an illumination normalization approach in the logarithm domain that increase its robustness to variations in facial geometry and illumination. Secondly in the same domain the entropy measures are applied on the DCT coefficients so that maximum entropy preserving pixels can be extracted as t…
▽ More
This paper exploits the feature extraction capabilities of the discrete cosine transform (DCT) together with an illumination normalization approach in the logarithm domain that increase its robustness to variations in facial geometry and illumination. Secondly in the same domain the entropy measures are applied on the DCT coefficients so that maximum entropy preserving pixels can be extracted as the feature vector. Thus the informative features of a face can be extracted in a low dimensional space. Finally, the kernel entropy component analysis (KECA) with an extension of arc cosine kernels is applied on the extracted DCT coefficients that contribute most to the entropy estimate to obtain only those real kernel ECA eigenvectors that are associated with eigenvalues having high positive entropy contribution. The resulting system was successfully tested on real image sequences and is robust to significant partial occlusion and illumination changes, validated with the experiments on the FERET, AR, FRAV2D and ORL face databases. Experimental comparison is demonstrated to prove the superiority of the proposed approach in respect to recognition accuracy. Using specificity and sensitivity we find that the best is achieved when Renyi entropy is applied on the DCT coefficients. Extensive experimental comparison is demonstrated to prove the superiority of the proposed approach in respect to recognition accuracy. Moreover, the proposed approach is very simple, computationally fast and can be implemented in any real-time face recognition system.
△ Less
Submitted 5 December, 2013;
originally announced December 2013.
-
A Gabor block based Kernel Discriminative Common Vector (KDCV) approach using cosine kernels for Human Face Recognition
Authors:
Arindam Kar,
Debotosh Bhattacharjee,
Dipak Kumar Basu,
Mita Nasipuri,
Mahantapas Kundu
Abstract:
In this paper a nonlinear Gabor Wavelet Transform (GWT) discriminant feature extraction approach for enhanced face recognition is proposed. Firstly, the low-energized blocks from Gabor wavelet transformed images are extracted. Secondly, the nonlinear discriminating features are analyzed and extracted from the selected low-energized blocks by the generalized Kernel Discriminative Common Vector (KDC…
▽ More
In this paper a nonlinear Gabor Wavelet Transform (GWT) discriminant feature extraction approach for enhanced face recognition is proposed. Firstly, the low-energized blocks from Gabor wavelet transformed images are extracted. Secondly, the nonlinear discriminating features are analyzed and extracted from the selected low-energized blocks by the generalized Kernel Discriminative Common Vector (KDCV) method. The KDCV method is extended to include cosine kernel function in the discriminating method. The KDCV with the cosine kernels is then applied on the extracted low energized discriminating feature vectors to obtain the real component of a complex quantity for face recognition. In order to derive positive kernel discriminative vectors; we apply only those kernel discriminative eigenvectors that are associated with non-zero eigenvalues. The feasibility of the low energized Gabor block based generalized KDCV method with cosine kernel function models has been successfully tested for image classification using the L1, L2 distance measures; and the cosine similarity measure on both frontal and pose-angled face recognition. Experimental results on the FRAV2D and the FERET database demonstrate the effectiveness of this new approach.
△ Less
Submitted 5 December, 2013;
originally announced December 2013.
-
An adaptive block based integrated LDP,GLCM,and Morphological features for Face Recognition
Authors:
Arindam Kar,
Debotosh Bhattacharjee,
Dipak Kumar Basu,
Mita Nasipuri,
Mahantapas Kundu
Abstract:
This paper proposes a technique for automatic face recognition using integrated multiple feature sets extracted from the significant blocks of a gradient image. We discuss about the use of novel morphological, local directional pattern (LDP) and gray-level co-occurrence matrix GLCM based feature extraction technique to recognize human faces. Firstly, the new morphological features i.e., features b…
▽ More
This paper proposes a technique for automatic face recognition using integrated multiple feature sets extracted from the significant blocks of a gradient image. We discuss about the use of novel morphological, local directional pattern (LDP) and gray-level co-occurrence matrix GLCM based feature extraction technique to recognize human faces. Firstly, the new morphological features i.e., features based on number of runs of pixels in four directions (N,NE,E,NW) are extracted, together with the GLCM based statistical features and LDP features that are less sensitive to the noise and non-monotonic illumination changes, are extracted from the significant blocks of the gradient image. Then these features are concatenated together. We integrate the above mentioned methods to take full advantage of the three approaches. Extraction of the significant blocks from the absolute gradient image and hence from the original image to extract pertinent information with the idea of dimension reduction forms the basis of the work. The efficiency of our method is demonstrated by the experiment on 1100 images from the FRAV2D face database, 2200 images from the FERET database, where the images vary in pose, expression, illumination and scale and 400 images from the ORL face database, where the images slightly vary in pose. Our method has shown 90.3%, 93% and 98.75% recognition accuracy for the FRAV2D, FERET and the ORL database respectively.
△ Less
Submitted 5 December, 2013;
originally announced December 2013.
-
Handwritten Bangla Alphabet Recognition using an MLP Based Classifier
Authors:
Subhadip Basu,
Nibaran Das,
Ram Sarkar,
Mahantapas Kundu,
Mita Nasipuri,
Dipak Kumar Basu
Abstract:
The work presented here involves the design of a Multi Layer Perceptron (MLP) based classifier for recognition of handwritten Bangla alphabet using a 76 element feature set Bangla is the second most popular script and language in the Indian subcontinent and the fifth most popular language in the world. The feature set developed for representing handwritten characters of Bangla alphabet includes 24…
▽ More
The work presented here involves the design of a Multi Layer Perceptron (MLP) based classifier for recognition of handwritten Bangla alphabet using a 76 element feature set Bangla is the second most popular script and language in the Indian subcontinent and the fifth most popular language in the world. The feature set developed for representing handwritten characters of Bangla alphabet includes 24 shadow features, 16 centroid features and 36 longest-run features. Recognition performances of the MLP designed to work with this feature set are experimentally observed as 86.46% and 75.05% on the samples of the training and the test sets respectively. The work has useful application in the development of a complete OCR system for handwritten Bangla text.
△ Less
Submitted 5 March, 2012;
originally announced March 2012.
-
An MLP based Approach for Recognition of Handwritten `Bangla' Numerals
Authors:
Subhadip Basu,
Nibaran Das,
Ram Sarkar,
Mahantapas Kundu,
Mita Nasipuri,
Dipak Kumar Basu
Abstract:
The work presented here involves the design of a Multi Layer Perceptron (MLP) based pattern classifier for recognition of handwritten Bangla digits using a 76 element feature vector. Bangla is the second most popular script and language in the Indian subcontinent and the fifth most popular language in the world. The feature set developed for representing handwritten Bangla numerals here includes 2…
▽ More
The work presented here involves the design of a Multi Layer Perceptron (MLP) based pattern classifier for recognition of handwritten Bangla digits using a 76 element feature vector. Bangla is the second most popular script and language in the Indian subcontinent and the fifth most popular language in the world. The feature set developed for representing handwritten Bangla numerals here includes 24 shadow features, 16 centroid features and 36 longest-run features. On experimentation with a database of 6000 samples, the technique yields an average recognition rate of 96.67% evaluated after three-fold cross validation of results. It is useful for applications related to OCR of handwritten Bangla Digit and can also be extended to include OCR of handwritten characters of Bangla alphabet.
△ Less
Submitted 5 March, 2012;
originally announced March 2012.
-
Segmentation of Offline Handwritten Bengali Script
Authors:
Subhadip Basu,
Chitrita Chaudhuri,
Mahantapas Kundu,
Mita Nasipuri,
Dipak K. Basu
Abstract:
Character segmentation has long been one of the most critical areas of optical character recognition process. Through this operation, an image of a sequence of characters, which may be connected in some cases, is decomposed into sub-images of individual alphabetic symbols. In this paper, segmentation of cursive handwritten script of world's fourth popular language, Bengali, is considered. Unlike E…
▽ More
Character segmentation has long been one of the most critical areas of optical character recognition process. Through this operation, an image of a sequence of characters, which may be connected in some cases, is decomposed into sub-images of individual alphabetic symbols. In this paper, segmentation of cursive handwritten script of world's fourth popular language, Bengali, is considered. Unlike English script, Bengali handwritten characters and its components often encircle the main character, making the conventional segmentation methodologies inapplicable. Experimental results, using the proposed segmentation technique, on sample cursive handwritten data containing 218 ideal segmentation points show a success rate of 97.7%. Further feature-analysis on these segments may lead to actual recognition of handwritten cursive Bengali script.
△ Less
Submitted 14 February, 2012;
originally announced February 2012.
-
High Performance Human Face Recognition using Independent High Intensity Gabor Wavelet Responses: A Statistical Approach
Authors:
Arindam Kar,
Debotosh Bhattacharjee,
Dipak Kumar Basu,
Mita Nasipuri,
Mahantapas Kundu
Abstract:
In this paper, we present a technique by which high-intensity feature vectors extracted from the Gabor wavelet transformation of frontal face images, is combined together with Independent Component Analysis (ICA) for enhanced face recognition. Firstly, the high-intensity feature vectors are automatically extracted using the local characteristics of each individual face from the Gabor transformed i…
▽ More
In this paper, we present a technique by which high-intensity feature vectors extracted from the Gabor wavelet transformation of frontal face images, is combined together with Independent Component Analysis (ICA) for enhanced face recognition. Firstly, the high-intensity feature vectors are automatically extracted using the local characteristics of each individual face from the Gabor transformed images. Then ICA is applied on these locally extracted high-intensity feature vectors of the facial images to obtain the independent high intensity feature (IHIF) vectors. These IHIF forms the basis of the work. Finally, the image classification is done using these IHIF vectors, which are considered as representatives of the images. The importance behind implementing ICA along with the high-intensity features of Gabor wavelet transformation is twofold. On the one hand, selecting peaks of the Gabor transformed face images exhibit strong characteristics of spatial locality, scale, and orientation selectivity. Thus these images produce salient local features that are most suitable for face recognition. On the other hand, as the ICA employs locally salient features from the high informative facial parts, it reduces redundancy and represents independent features explicitly. These independent features are most useful for subsequent facial discrimination and associative recall. The efficiency of IHIF method is demonstrated by the experiment on frontal facial images dataset, selected from the FERET, FRAV2D, and the ORL database.
△ Less
Submitted 17 June, 2011;
originally announced June 2011.
-
Human Face Recognition using Line Features
Authors:
Mrinal Kanti Bhowmik,
Debotosh Bhattacharjee,
Mita Nasipuri,
Dipak Kumar Basu,
Mahantapas Kundu
Abstract:
In this work we investigate a novel approach to handle the challenges of face recognition, which includes rotation, scale, occlusion, illumination etc. Here, we have used thermal face images as those are capable to minimize the affect of illumination changes and occlusion due to moustache, beards, adornments etc. The proposed approach registers the training and testing thermal face images in polar…
▽ More
In this work we investigate a novel approach to handle the challenges of face recognition, which includes rotation, scale, occlusion, illumination etc. Here, we have used thermal face images as those are capable to minimize the affect of illumination changes and occlusion due to moustache, beards, adornments etc. The proposed approach registers the training and testing thermal face images in polar coordinate, which is capable to handle complicacies introduced by scaling and rotation. Line features are extracted from thermal polar images and feature vectors are constructed using these line. Feature vectors thus obtained passes through principal component analysis (PCA) for the dimensionality reduction of feature vectors. Finally, the images projected into eigenspace are classified using a multi-layer perceptron. In the experiments we have used Object Tracking and Classification Beyond Visible Spectrum (OTCBVS) database. Experimental results show that the proposed approach significantly improves the verification and identification performance and the success rate is 99.25%.
△ Less
Submitted 5 July, 2010;
originally announced July 2010.
-
Classification of Log-Polar-Visual Eigenfaces using Multilayer Perceptron
Authors:
Mrinal Kanti Bhowmik,
Debotosh Bhattacharjee,
Mita Nasipuri,
Mahantapas Kundu,
Dipak Kumar Basu
Abstract:
In this paper we present a simple novel approach to tackle the challenges of scaling and rotation of face images in face recognition. The proposed approach registers the training and testing visual face images by log-polar transformation, which is capable to handle complicacies introduced by scaling and rotation. Log-polar images are projected into eigenspace and finally classified using an improv…
▽ More
In this paper we present a simple novel approach to tackle the challenges of scaling and rotation of face images in face recognition. The proposed approach registers the training and testing visual face images by log-polar transformation, which is capable to handle complicacies introduced by scaling and rotation. Log-polar images are projected into eigenspace and finally classified using an improved multi-layer perceptron. In the experiments we have used ORL face database and Object Tracking and Classification Beyond Visible Spectrum (OTCBVS) database for visual face images. Experimental results show that the proposed approach significantly improves the recognition performances from visual to log-polar-visual face images. In case of ORL face database, recognition rate for visual face images is 89.5% and that is increased to 97.5% for log-polar-visual face images whereas for OTCBVS face database recognition rate for visual images is 87.84% and 96.36% for log-polar-visual face images.
△ Less
Submitted 5 July, 2010;
originally announced July 2010.
-
Classification of fused face images using multilayer perceptron neural network
Authors:
Debotosh Bhattacharjee,
Mrinal Kanti Bhowmik,
Mita Nasipuri,
Dipak Kumar Basu,
Mahantapas Kundu
Abstract:
This paper presents a concept of image pixel fusion of visual and thermal faces, which can significantly improve the overall performance of a face recognition system. Several factors affect face recognition performance including pose variations, facial expression changes, occlusions, and most importantly illumination changes. So, image pixel fusion of thermal and visual images is a solution to ove…
▽ More
This paper presents a concept of image pixel fusion of visual and thermal faces, which can significantly improve the overall performance of a face recognition system. Several factors affect face recognition performance including pose variations, facial expression changes, occlusions, and most importantly illumination changes. So, image pixel fusion of thermal and visual images is a solution to overcome the drawbacks present in the individual thermal and visual face images. Fused images are projected into eigenspace and finally classified using a multi-layer perceptron. In the experiments we have used Object Tracking and Classification Beyond Visible Spectrum (OTCBVS) database benchmark thermal and visual face images. Experimental results show that the proposed approach significantly improves the verification and identification performance and the success rate is 95.07%. The main objective of employing fusion is to produce a fused image that provides the most detailed and reliable information. Fusion of multiple images together produces a more efficient representation of the image.
△ Less
Submitted 5 July, 2010;
originally announced July 2010.
-
Classification of Fused Images using Radial Basis Function Neural Network for Human Face Recognition
Authors:
M. K. Bhowmik,
Debotosh Bhattacharjee,
M. Nasipuri,
D. K. Basu,
M. Kundu
Abstract:
Here an efficient fusion technique for automatic face recognition has been presented. Fusion of visual and thermal images has been done to take the advantages of thermal images as well as visual images. By employing fusion a new image can be obtained, which provides the most detailed, reliable, and discriminating information. In this method fused images are generated using visual and thermal face…
▽ More
Here an efficient fusion technique for automatic face recognition has been presented. Fusion of visual and thermal images has been done to take the advantages of thermal images as well as visual images. By employing fusion a new image can be obtained, which provides the most detailed, reliable, and discriminating information. In this method fused images are generated using visual and thermal face images in the first step. In the second step, fused images are projected into eigenspace and finally classified using a radial basis function neural network. In the experiments Object Tracking and Classification Beyond Visible Spectrum (OTCBVS) database benchmark for thermal and visual face images have been used. Experimental results show that the proposed approach performs well in recognizing unknown individuals with a maximum success rate of 96%.
△ Less
Submitted 5 July, 2010;
originally announced July 2010.
-
Image Pixel Fusion for Human Face Recognition
Authors:
Mrinal Kanti Bhowmik,
Debotosh Bhattacharjee,
Mita Nasipuri,
Dipak Kumar Basu,
Mahantapas Kundu
Abstract:
In this paper we present a technique for fusion of optical and thermal face images based on image pixel fusion approach. Out of several factors, which affect face recognition performance in case of visual images, illumination changes are a significant factor that needs to be addressed. Thermal images are better in handling illumination conditions but not very consistent in capturing texture detail…
▽ More
In this paper we present a technique for fusion of optical and thermal face images based on image pixel fusion approach. Out of several factors, which affect face recognition performance in case of visual images, illumination changes are a significant factor that needs to be addressed. Thermal images are better in handling illumination conditions but not very consistent in capturing texture details of the faces. Other factors like sunglasses, beard, moustache etc also play active role in adding complicacies to the recognition process. Fusion of thermal and visual images is a solution to overcome the drawbacks present in the individual thermal and visual face images. Here fused images are projected into an eigenspace and the projected images are classified using a radial basis function (RBF) neural network and also by a multi-layer perceptron (MLP). In the experiments Object Tracking and Classification Beyond Visible Spectrum (OTCBVS) database benchmark for thermal and visual face images have been used. Comparison of experimental results show that the proposed approach performs significantly well in recognizing face images with a success rate of 96% and 95.07% for RBF Neural Network and MLP respectively.
△ Less
Submitted 5 July, 2010;
originally announced July 2010.