Thursday, October 1, 2009

Finger Image in Unique ID Project - how the accuracy and search will be achieved

JPEG Image




BMP Image



Referring to the post in the following link http://www.hindu.com/2009/09/27/stories/2009092755850900.htm

That contains following lines:

“If any agency wants to confirm the identify of a person, it would have to just take the fingerprint of the person on a cell phone and send it across to a central database and receive authentication within seconds.”

UID project is one of the biggest IT projects of the world. There are many identified and unidentified risk areas. Image work associated with the Finger image detection which will identify the uniqueness of any individual in biometric identification needs deep attention.

Till date there is no image search engine around the whole world. Few of the dedicated research labs are working towards the same. We are very optimistically talking about capturing the image from an ordinary low-end handset, may be a high-end handset where the high-level mega pixel camera is used.

To my knowledge in every handset/camera the image generated is captured in the proprietary raw format and rendered into a common format e.g. JPG which is very widely used.

Of all the available images formats– JPG – the most common standard format is a COMPRESSED format. (Data is lost in this format) For biometric identification we need accuracy that means we need raw data format e.g. BMP format (Lossless data format) format or PNG format for storing the image in the central repository. Most of the scientific work involves TIFF image format.

SVG is a new image format, it is scalable but to my limited knowledge - how many handsets would convert the image in this format is the key.

Now if we take JPEG format, an average image takes say 5 KB of space. 60 million images mean 60 million*5 KB of database space in the central repository.

Besides security, identification, authorization, authentication, database design, backup, application failover mitigation, 24 *7 availability, adaptability – in case of power failure, natural disaster, adaptation, failover and security issues under low network bandwidth, flexibility to scale up or scale down the whole software architecture, finger image scanning in few seconds over the provided network bandwidth is the key to the success of this project.

Saturday, September 19, 2009

1 - Capture arms & ammunition – straight from CCTV...


There has been software development for face recognition, face detection, smile detection, moods detection since past few years.

It is possible to capture an image where a person is having arms, guns, knife …and pass an alert like fire alarm to the authorities.

http://www.facebook.com/note.php?note_id=99948840323 Posted on the Facebook
Thursday, December 4, 2008 at 10:34am

2 – CCTV is already there and capturing the images......

1- There are cameras and CCTV already installed at most organizations and institutes

2- Images are getting captured already (yes frame rate is low , quality of image is not up to the mark, network bandwidth fluctuates....)

3- JUST ADD - a simple software routine to -

use that image to recognize arm or ammunition against a central repository
OR
scan the image itself to identify - the sharp object

We are not assuming things. We have dealt in Mobile video streaming without RTSP - to find out a way to stream the video to low end phones which are million in numbers. It's not easy to capture 24 -30 frames per second of a standard video and stream without RTSP ( real time streaming protocol) and send to mobile and play the video on low end handset. We worked on it for whole one yr.

http://www.facebook.com/note.php?note_id=100240475323
Posted on Facebook - Friday, December 5, 2008 at 9:26am

Thursday, July 23, 2009

A Secret Bunker aka Followermonitor born again just one hour back

Self proclaimed "A Secret Bunker" aka Followermonitor on twitter has got 0 monkey butlers now. His followers list has got down from 15000+ to 800+ and he has started sending un-following tweets once again.

Tuesday, July 21, 2009

Twitter attacked by Monkey butlers

Twitter attacked by Monkey butlers - 1 to 19 in number who are very much active now. If you have lesser followers it's OK, but if you have large no of followers , they leave you. How intelligent a twitter person can be? They don't even check the profile of the person who have sent the tweet which is shown below.

Monday, July 20, 2009

A Secret Bunker & Monkey Butler/s

A secret bunker, follower monitor, monkey butler...
A simple word of mouth twitter trick or terror....

We created @AAshmam twitter account to provide the technical tweets regularly. To our surprise yesterday there was a sudden fall of 10% users, 500 in numbers. It went down from 5300+ to 4880 check statistics

The Culprit was a simple word of mouth tweet by a ten days old followermonitor check statistics and confirmation tweet by four day old monkeybutler16



There are many a Monkey Butlers but only Monkeybutler 16 is active one.


Good link to read:

10 Stunning (And Useful) Stats About Twitter