Professional Documents
Culture Documents
Gabor Filter
Gabor Filter
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
Gabor Filter
Ali Abdul Azeez Mohammad baker
Computer Science Department
Kufa university
Najaf/Iraq
alia.qazzaz@uokufa.edu.iq
I.
INTRODUCTION
Fig. 1
fingerprint image
Normalization.
92 | P a g e
www.ijccse.com
ISSN: 2312-7694
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
M
o
N ( i , j )
M o
vo ( I ( i , j ) M ) 2
V
vo ( I ( i , j ) M ) 2
V
if
I (i , j ) M
otherwise
Normalization
Translating to
a .Original image
binary image
Fig. 3
Z2
Z3
-1
-2
-1
-1
Z4
Z5
Z6
-2
Z7
Z8
Z9
-1
B. Normalization process
Normalization process is used to fixed the intensity values of
the pixels within a desired or wanted range by applying
equation (1)
a- Image
b- Vertical mask
c- Horizontal mask
Fig. 4
Sobel masks
93 | P a g e
www.ijccse.com
ISSN: 2312-7694
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
The orientation value in each pixel will be calculated by
using the following equations
y( p, q) ( z7 2 z8 z9 ) ( z1 2 z 2 z3 ) (2)
x( p, q) ( z3 2 z6 z9 ) ( z1 2 z4 z7 ) (3)
D. Dividing image into blocks, and calculating blocks
orientation
The fingerprint image will be divided into non overlap
blocks with size of (WW) , and the orientation of each block
will be calculated as follows
i
w
2
v y (i, j )
p i
v x (i, j )
w
2
w
2
2 x ( p, q) y ( p, q) (4)
w
w
q j
2
2
w
2
p i
(i, j )
2
x
c- binary image
Fig. 5
Binary image
( p, q) 2y ( p, q) (5)
w
w
q j
2
2
v y (i, j )
1
tan 1
(6)
2
v x (i, j )
y 2
1 x
2 x y
bloack mean
w1 w1
1
image(i, j) (7)
w w i 0 j 0
a- Original image
Fig. 6
a-original image
b- enhanced image
94 | P a g e
www.ijccse.com
ISSN: 2312-7694
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
III. RESULTS
After applying the proposed method on fingerprint images
the results of three examples will be illustrated
Example 1:-
c-binary image
d-Gabor image
Fig. 8
results (2)
Fig. 9
results (3)
Example 3:-
a-original image
c-binary image
b-enhanced image
a-original image
b-enhanced image
c-binary image
d-Gabor image
d-Gabor image
Fig. 7
results (1)
Example 2:-
IV. CONCLUSION
a-original image
b-enhanced image
95 | P a g e
www.ijccse.com
ISSN: 2312-7694
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
96 | P a g e
www.ijccse.com