-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[WIP] add docs for data splitting and evaluation setups
- Loading branch information
1 parent
f2a071c
commit cc641a8
Showing
6 changed files
with
44 additions
and
10 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 1,3 @@ | ||
\begin{abstract} | ||
VeinNet is a Convolutional Neural Network (CNN)–based system for palm vein identification. The approach begins by extracting the palm region of interest (ROI) from a dataset of multispectral hand images, focusing on the vein patterns within this ROI as input to the CNN. Trained on these hand images, VeinNet demonstrates the ability to effectively recognize unique vein patterns in the human palm. The system achieves a xx\% accuracy on the test dataset, showcasing the effectiveness of a CNN-based solution. | ||
VeinNet is a Convolutional Neural Network (CNN)–based system for palm vein identification. The approach begins by extracting the palm region of interest (ROI) from a dataset of multispectral hand images, focusing on the vein patterns within this ROI as input to the CNN. Trained on these hand images, VeinNet demonstrates the ability to effectively recognize unique vein patterns in the human palm. The system is evaluated using three distinct types of evaluations: identification with a closed set, identification with an open set, and verification. The dataset is split differently for each evaluation setup, ensuring that the system is tested under various conditions. The results demonstrate the effectiveness of VeinNet in identifying individuals based on their palm vein patterns, with promising performance metrics across all evaluation setups. | ||
\end{abstract} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Empty file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 1,24 @@ | ||
\section{Experimental} | ||
This section describes the experimental setup introducing the 3 evaluation setups used to assess the performance of the proposed biometric system and the data splitting strategy used for each evaluation setup. | ||
|
||
\subsection{Evaluation Setups} | ||
The evaluation was performed using three distinct types of evaluations: | ||
|
||
\begin{itemize} | ||
\item \textbf{Identification with a Closed Set}: involves including all enrolled patients in the dataset. Each image is classified into one of the known classes (patients) based on its extracted features. The system is trained and tested with the same predefined set of enrolled patients, ensuring no unknown users are present in the dataset. | ||
|
||
\item \textbf{Identification with an Open Set}: excludes a percentage of the enrolled patients from the dataset during training. These excluded patients represent unknown users during the evaluation phase. The model is tested on both known and unknown classes, where the unknown classes are expected to be classified as unknown to simulate open-set identification. | ||
|
||
\item \textbf{Verification}: tests the system's ability to verify the identity of users. Genuine samples consist of images correctly matched to their claimed identities, while imposter samples are created by associating images with incorrect user identities to simulate attempts to mislead the system. | ||
\end{itemize} | ||
|
||
\subsection{Data Splitting} | ||
The dataset used in this study was split differently for the three evaluation setups: | ||
|
||
\textbf{Identification with a Closed Set} includes all patients in the dataset, and their images are divided into training and test sets. The first four images per patient are used for training and the remaining images are used for testing. This setup ensures that all enrolled patients contribute images to the training and testing phases, facilitating evaluation in a controlled, closed-set scenario. | ||
|
||
\textbf{Identification with an Open Set} For open-set identification, 70\% of patients are randomly selected as known, with their images split into training (first four images) and testing (remaining images). The remaining 30\% serve as unknown patients, with their images used solely for testing to assess the system's ability to handle unenrolled users, simulating open-set scenarios. | ||
|
||
\textbf{Verification} includes genuine and imposter samples for evaluation. For each patient, the first four images are used for training, and the remaining images are used for testing. Genuine samples consist of matching the correct image to the claimed identity, while imposter samples are created by pairing images from different patients, simulating attempts to impersonate other users. | ||
|
||
To ensure consistency and reproducibility across all splits, a fixed random seed was used during shuffling. This guarantees that the data partitioning remains consistent across different runs and experimentsss |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,6 1,7 @@ | ||
\section{Methodology} | ||
|
||
\subsection{Data preprocessing} | ||
|
||
\subsection{Data Preprocessing} | ||
|
||
|
||
\subsection{Model Architecture} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 1,9 @@ | ||
\section{Evaluation Metrics} | ||
|
||
\section{Results} | ||
|
||
\subsection{Identification with a Closed Set} | ||
|
||
\subsection{Identification with an Open Set} | ||
|
||
\subsection{Verification} |