Standard methods for inexpensive pollen loads authentication by means of computer vision and machine learning

11/13/2015
by   Manuel Chica, et al.
0

We present a complete methodology for authenticating local bee pollen against fraudulent samples using image processing and machine learning techniques. The proposed standard methods do not need expensive equipment such as advanced microscopes and can be used for a preliminary fast rejection of unknown pollen types. The system is able to rapidly reject the non-local pollen samples with inexpensive hardware and without the need to send the product to the laboratory. Methods are based on the color properties of bee pollen loads images and the use of one-class classifiers which are appropriate to reject unknown pollen samples when there is limited data about them. The validation of the method is carried out by authenticating Spanish bee pollen types. Experimentation shows that the proposed methods can obtain an overall authentication accuracy of 94 the software in some practical cases by showing the developed application prototype.

READ FULL TEXT

page 1

page 7

page 13

page 14

page 17

page 18

page 19

research
06/30/2021

Adversarial Machine Learning for Cybersecurity and Computer Vision: Current Developments and Challenges

We provide a comprehensive overview of adversarial machine learning focu...
research
07/27/2019

An Enhanced Machine Learning Based Biometric Authentication System Using RR-Interval Framed Electrocardiograms

The disadvantages of traditional authentication systems include the risk...
research
10/29/2021

Classification of jujube fruit based on several pricing factors using machine learning methods

Jujube is a fruit mainly cultivated in India, China and Iran and has man...
research
11/27/2021

Label Assistant: A Workflow for Assisted Data Annotation in Image Segmentation Tasks

Recent research in the field of computer vision strongly focuses on deep...
research
01/02/2014

Machine Assisted Authentication of Paper Currency: an Experiment on Indian Banknotes

Automatic authentication of paper money has been targeted. Indian bank n...
research
03/04/2023

Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave Transmission and Machine Learning

The proliferation of sensitive information being stored online highlight...
research
01/12/2022

Preventing Manifold Intrusion with Locality: Local Mixup

Mixup is a data-dependent regularization technique that consists in line...

Please sign up or login with your details

Forgot password? Click here to reset