Peg-Free Hand Geometry Verification System
|
|
- Roland Benson
- 6 years ago
- Views:
Transcription
1 Peg-Free Hand Geometry Verification System Pavan K Rudravaram Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA. {pkr, Abstract. Biometric authentication systems are gaining importance in this recent world prone to security threats in every field. Hand geometry verification systems use geometric measurements of hand for verification of individuals. It is believed that the combination of different features of the hand is unique for a particular person. Different hand geometry authentication systems use reference pegs for capturing the image of the hand. We propose a peg free hand geometry image acquisition and feature based verification system. Significant geometric features of the hand are extracted from the image. The recognition process is involves matching various weighted features with pre-stored templates. We have built our own image acquisition system and carried out experiments with a medium range data set of 250 images. 1 Introduction Biometric authentication systems find application in various secured access control systems, identification in crime investigations and in many more critical applications dealing with national security. Until recently the most widely used authentication systems are the finger print based authentication and verification systems. Other forms of authentication and verification systems include iris, hand-geometry, face, voice, etc. As the necessity for verification is increasing in every field, for some kinds of access control like office entrance, repository entrance where the requirement is verification, invasive biometrics (eg., fingerprints, iris) may not be desirable as they infringe on privacy. So hand geometry is gaining importance for verification while fingerprints and iris are used for identification. The main idea of biometrics is to differentiate various biological and behavioral features that are considered unique to a person. Different biometric techniques are used for identification and verification of the persons. Each of these techniques has their own advantages and disadvantages. For example Finger print and iris verification systems are considered the best biometrics in terms of FAR and FRR but on the other side they are not cost effective for some implementations like simple access controls. While on the other hand, speech recognition based authentication systems prove to be cost effective for simple access control implementations but cannot be used in high security zones. Trade-off between these two is the hand-geometry based authentication system that is cost effective and can be used in low to medium security zone. The major advantage of the hand geometry verification system is ease of image acquisition compared to fingerprint and iris image acquisition. The system just requires properly placed camera that can get the image of the hand. With these advan-
2 tages, combining other forms of biometrics like fingerprint with hand-geometry improves the confidence levels in identification procedures. Human hand can be categorized by the length and width of the fingers, geometrical differences in the shape of the hand, and also using special features like lack of one or more fingers or presence of excess fingers. Traditional pegs based image acquisition systems fix the hand placement on the system using the pegs. They capture the image of the hand along with the pegs and extract the features of the hand from that image. Pegs cause deformation in the hand, which often reduces the accuracy of the features extracted. Also it will be difficult for people with deformed hands (who represent 2% of the total world population) to use the verification system. It also poses problem to verification systems deployed in schools where small children find it difficult to place their hand in between the pegs. In this paper we propose peg-free, orientation-free hand geometry verification system, which is inexpensive to implement yet has good verification capabilities. The main idea behind this system is to extract and compare various features of the hand that form a unique set. While comparison, weights are assigned to various features depending on their uniqueness. The procedure of the verification system involves three basic steps: 1. Image Acquisition 2. Feature Extraction 3. Matching. The various steps and algorithms involved in these three basic steps are discussed in detail in the following sections. 2 Previous work Jain[1] developed a prototype for hand geometry based verification system for web security system. They tested on image set consisting of around 360 images and obtained a false acceptance rate (FAR) of 2% and a false rejection rate (FRR) of 15%. Jain and Duta[4] developed a verification system based on alignment of finger contours and measured the mean alignment error between them. They experimented with 353 images from 50 persons and report FAR of 2% and FRR of 3.5%_ Raul Sanchez Reillo[7] implemented hand geometry verification system. They used a database of 200 hand images from 20 people and report 97% success in identification and error rates below 10% in verification. Oden, Ercil and Buke[6] reported a system for identification and verification using implicit polynomials. They combine their method with geometric features and achieve 95% success in identification and 99% success in verification. The training set they used consists of 40 images. 3 Image Acquisition: The image acquisition system that we have designed consists of a camera placed at a certain height from the flat bed on which the user places the hand. The flat bed is a translucent flat base under which light source is placed to avoid shadows caused by
3 lights in the environment and also to clearly distinguish between the hand and the background. The hand is placed in the range of the camera, which takes the image of the hand. We have considered only the top view image of the hand for feature extraction, the reason being, the two dimensional width of the hand varies as the person gains or looses weight, but the finger lengths and widths are characterized by the bone structure that are time-invariant, after your growth period. During the enrollment phase, 3 hand images of the user are collected. Feature vectors are extracted from these three images and stored in separate files for matching. The user is asked to stretch his hand differently each time the image is acquired to avoid differences arising due to stretching of his hand. The camera is plugged onto a computer that gives a visual feedback of the acquisition process. The camera captures 640*480 resolution colored images of the hand. The images acquired by our set-up are shown in figure [2]: Fig[1].Prototype hand geometry scanner. Fig[2] Images of the hand
4 4. Feature Extraction: The hand-geometry verification system uses the features of the hand for authenticating the user. The features of the hand include the width and height of the fingers. The colored image obtained from the scanner is processed before the features are extracted. The colored image is first converted to gray scale image using equation (1) and then converted to binary image based on a binary threshold BT which is the average pixel value of the total image. Gray pixel G = 0.3RED GREEN BLUE. (1) The image thus obtained consists of noise as shown below in figure[3]. Next step involves extraction of single pixel width contour based on binary transition. Using algorithm similar to the chain code contour extraction method [8], the longest contour representing the contour of the hand is extracted. The rest of the contours are eliminated considering them as noise in the image. Fig. [3]. 1. Gray scaled image 2. Binary image 3. Contour (with noise) 4. Contour (noise eliminated). The valley ends in between the fingers and tip ends at the top of the fingers serve as the landmark points for the extraction of features. The lengths and widths of the fingers are calculated using these end points. To obtain these end points, first the curves of the finger ends are extracted. For every point p on the hand contour, the angle made by the lines joining the p and offset points is calculated as shown in figure[4] using the cosine rule given in equation.2.
5 2 2 2 ( b + c a ) Angle θ = ( 2bc) (2) Where a is the distance between the two offset points, b is the distance between the point p and the offset point before p and c is the distance between p and offset point after p. Fig. [4]. Angle calculation for curve points. If θ is less that threshold angle (θ th ) then the point p is considered as curve point cp. Curve points of all the fingers are separated and are used to find the tip and valley ends. The perpendicular bisector of the line joining initial and final curve points (shown in figure [5] ) of a finger is calculated using equation (4) and the minimum perpendicular distance from curve points of that finger to the perpendicular bisector is calculated using equation (5). The points that yield minimum distance to the perpendicular bisector are considered as the tip or the valley ends of the finger depending of the curve points under consideration. Slope M = ( x2 x1) ( y2 y1). (3) ( y1 y2) ( x1 x2) + y 2 + = M x 2. (4) Where (x1,y1) and (x2,y2) are the coordinates of the initial and final curve points. M is the slope between the offset points. Perpendicular distance D from the curve point cp (xc p,y cp )to the perpendicular bisector is given by the equation:
6 y D = cp M x cp ( y1 y2) ( x1 x2) + + M 2 ( 1+ M M ) + 2. (5) Fig. [5]. 1. Initial and final curve points of the fingers 2. Tip and valley ends. Once the tip and valley ends are obtained, various features of the hand are extracted from these points. Figure [6] depicts the 22 features that we have considered for verification. As can be seen from the features the orientation of the hand does not effect the feature extraction. Small anomalies of the hand like bulbs in the hand are eliminated by suitably selecting the θ th and the offset for the angle calculation at the contour point p. Fig. [6]. Features of the hand The basic requirement for feature extraction procedure is that the fingers should be clearly separated from one another. The lengths and widths of the hand are not ef-
7 fected by the orientation of the hand and also the distance between the valley and tip ends as shown in figure[6], does no change with the placement and orientation of the hand. These features are extracted and are stored as feature vector in a file which is used for matching. 5. Verification: Characteristics of various features are taken into consideration for verification. Each feature will be assigned a weight depending on the variance of the feature due to placement of the hand. For example the base width of a finger is assigned lower weight, since the width may change slightly (5%) when the user over-stretches his hand and also the length of the thumb changes when the user relaxes his hand during verification procedure. The heights of four fingers and the distance between the valley ends and tip ends remain constant in all circumstances, so they are assigned higher weights. The verification procedure involves assigning weights to the various features and matching with the three pre-stored user s feature templates. Matching is considered successful if the weighted value is greater than a preset threshold value M th. M th is selected based on optimum FAR-FRR ratio. 6. Conclusion and Future work We have developed a peg-free hand-geometry verification system that is independent of orientation and placement of the hand. The system was experimented with a database consisting of 250 images collected over time from 25 users. 10 sample images from each user were used for verification purpose. Around 300 images were collected, out of which only 250 images were experimented on, and the rest were left out due to improper placements of hand by the user as shown in fig[7]. The verification system extracts the feature vector from the image and stores the template for later verification. Genuine match score is obtained by comparing the two feature vectors of the same hand and imposter match score is obtained by comparing the feature vectors of two different hands.
8 Fig. [7]. Improper placements of the hand The results of the experiment show that hand-geometry based verification system can be used for access control in low-medium security zones and can also be combined with other forms of biometrics like finger print to increase the confidence levels in very high security zones. Our future attempts include the use of curve-fitting techniques to extract the shape of the palm and the segmented fingers and include them to our feature vector and make the hand geometry verification system more robust and error free. We also plan to train the system with real time images of the user s hand to update the template database to avoid errors resulting from feature changes due to aging, for better performance during the long run. 8. References [1] Jain, A.K., Ross, A. and Pankanti, S., A Prototype Hand Geometry-Based Verification System, Proceedings of Second International Conference on Audio- and Video-based Biometric Person Authentication, Washingt on D.C., USA, pp , [2] A.K. Jain, R. Bolle and S. Pankanti (Eds.), Biometrics: Personal Identification in Networked Society", Kluwer Academic Publishers, [3]Yaroslav Bulatov, Sachin Jambawalikar, Piyush Kumar, Surabh Sethia, Hand recognition using geometric classifiers, DIMACS Workshop on Computational Geometry, Rutgers University, Piscataway, NJ, November 14-15, [4]Anil K. Jain and Nicolae Duta. Deformable matching of hand shapes for verification. In Proceedings of International Conference on Image Processing, October [5] L. Wong and P. Shi, "Peg-Free Hand Geometry Recognition Using Hierarchical Geometry and Shape Matching", IAPR Workshop on Machine Vision Applications, Nara, Japan, December, Pp
9 [6] Cenker Oden, Aytul Ercil, Burak Buke, " Combining implicit polynomials and geometric features for hand recognition", Audio- and video-based biometric person authentication (AVBPA), September Pages: [7] R. Sanchez-Reillo, Hand geometry pattern recognition through Gaussian mixture modeling, in 15th International Conference on Pattern Recognition, Vol.2, Sep, Pp [8] V. Govindaraju, Z. Shi and J. Schneider, "Feature Extraction Using a Chaincoded Representation of Fingerprint Images", International conference on Audio- and videobased biometric person authentication (AVBPA), surrey, UK, 2003
DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta
DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:
More informationBiometrics Technology: Hand Geometry
Biometrics Technology: Hand Geometry References: [H1] Gonzeilez, S., Travieso, C.M., Alonso, J.B., and M.A. Ferrer, Automatic biometric identification system by hand geometry, Proceedings of IEEE the 37th
More informationFusion of Hand Geometry and Palmprint Biometrics
(Working Paper, Dec. 2003) Fusion of Hand Geometry and Palmprint Biometrics D.C.M. Wong, C. Poon and H.C. Shen * Department of Computer Science, Hong Kong University of Science and Technology, Clear Water
More informationA New Approach to Hand-Based Authentication
A New Approach to Hand-Based Authentication G. Amayeh, G. Bebis, A. Erol, and M. Nicolescu Computer Vision Laboratory, University of Nevada, Reno ABSTRACT Hand-based authentication is a key biometric technology
More informationBiometric Security System Using Palm print
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationFeature-level Fusion for Effective Palmprint Authentication
Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,
More informationBIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre
More informationPalm Biometrics Recognition and Verification System
Palm Biometrics Recognition and Verification System Jobin J. 1, Jiji Joseph 2, Sandhya Y.A 3, Soni P. Saji 4, Deepa P.L. 5 Department of Electronics and Communication Engineering, Mar Baselios College
More informationHand Geometry Verification based on Chain Code and Dynamic Time Warping
Hand Geometry Verification based on Chain Code and Dynamic Time Warping I Ketut Gede Darma Putra Department of Electrical Engineering Udayana University, Bali, Indonesia Made Ari Sentosa Alumni of Department
More informationReal-Time Model-Based Hand Localization for Unsupervised Palmar Image Acquisition
Real-Time Model-Based Hand Localization for Unsupervised Palmar Image Acquisition Ivan Fratric 1, Slobodan Ribaric 1 1 University of Zagreb, Faculty of Electrical Engineering and Computing, Unska 3, 10000
More informationUsing Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification
Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Abstract Praveer Mansukhani, Sergey Tulyakov, Venu Govindaraju Center for Unified Biometrics and Sensors
More informationPolar Harmonic Transform for Fingerprint Recognition
International Journal Of Engineering Research And Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 11 (November 2017), PP.50-55 Polar Harmonic Transform for Fingerprint
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationHybrid Biometric Person Authentication Using Face and Voice Features
Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person
More informationExploring Similarity Measures for Biometric Databases
Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently
More informationBiometrics Technology: Multi-modal (Part 2)
Biometrics Technology: Multi-modal (Part 2) References: At the Level: [M7] U. Dieckmann, P. Plankensteiner and T. Wagner, "SESAM: A biometric person identification system using sensor fusion ", Pattern
More informationProjected Texture for Hand Geometry based Authentication
Projected Texture for Hand Geometry based Authentication Avinash Sharma Nishant Shobhit Anoop Namboodiri Center for Visual Information Technology International Institute of Information Technology, Hyderabad,
More informationA Component-Based Approach to Hand Verification
A Component-Based Approach to Hand Verification Gholamreza Amayeh and George Bebis and Ali Erol and Mircea Nicolescu Computer Vision Laboratory, University of Nevada, Reno, NV 89557 {amayeh, bebis, aerol,
More informationOnline Signature Verification Technique
Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and
More informationBiometrics offers natural and scientific solution to key aspects of security management
1 Personal Verification from the Geometry of Human Hands Vivek Kanhangad, Ajay Kumar Department of Computing The Hong Kong Polytechnic University Hung Hom, Kowloon, Hong Kong 1. Introduction Biometrics
More informationPersonal Authentication Using Palm Print Features
ACCV2002: The 5th Asian Conference on Computer Vision, 23 25 January 2002, Melbourne, Australia. 1 Personal Authentication Using Palm Print Features Chin-Chuan Han,Hsu-LiangCheng,andKuo-ChinFan Department
More informationImproving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications
Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Lisa Osadciw, Pramod Varshney, and Kalyan Veeramachaneni laosadci,varshney,kveerama@syr.edu
More informationAbstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;
Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationFingerprint Matching using Gabor Filters
Fingerprint Matching using Gabor Filters Muhammad Umer Munir and Dr. Muhammad Younas Javed College of Electrical and Mechanical Engineering, National University of Sciences and Technology Rawalpindi, Pakistan.
More informationA Contactless Palmprint Recognition Algorithm for Mobile Phones
A Contactless Palmprint Recognition Algorithm for Mobile Phones Shoichiro Aoyama, Koichi Ito and Takafumi Aoki Graduate School of Information Sciences, Tohoku University 6 6 05, Aramaki Aza Aoba, Sendai-shi
More informationCONTACT-FREE HAND BIOMETRIC SYSTEM FOR REAL ENVIRONMENTS
CONTACT-FREE HAND BIOMETRIC SYSTEM FOR REAL ENVIRONMENTS Aythami Morales, Miguel A. Ferrer, Francisco Díaz, Jesús B. Alonso, Carlos M. Travieso Technological Centre for Innovation in Communications (CeTIC).
More informationTouchless Fingerprint recognition using MATLAB
International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless
More informationFilterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah
Filterbank-Based Fingerprint Matching Multimedia Systems Project Niveditha Amarnath Samir Shah Presentation overview Introduction Background Algorithm Limitations and Improvements Conclusions and future
More informationKeywords Palmprint recognition, patterns, features
Volume 7, Issue 3, March 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on Palm
More informationFinger Print Enhancement Using Minutiae Based Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More information234 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 2, FEBRUARY 2004
234 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 2, FEBRUARY 2004 On Hierarchical Palmprint Coding With Multiple Features for Personal Identification in Large Databases
More informationPerformance Improvement of Phase-Based Correspondence Matching for Palmprint Recognition
Performance Improvement of Phase-Based Correspondence Matching for Palmprint Recognition Vincent Roux Institut Supérieur d électronique de Paris,, rue Notre Dame des Champs, 76 Paris, France vincent.roux@isep.fr
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationAn Overview of Biometric Image Processing
An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional
More informationFILTERBANK-BASED FINGERPRINT MATCHING. Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239)
FILTERBANK-BASED FINGERPRINT MATCHING Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239) Papers Selected FINGERPRINT MATCHING USING MINUTIAE AND TEXTURE FEATURES By Anil
More informationIndexing Biometric Databases using Pyramid Technique
Indexing Biometric Databases using Pyramid Technique Amit Mhatre, Sharat Chikkerur and Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo, New York, U.S.A http://www.cubs.buffalo.edu
More informationImplementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition
RESEARCH ARTICLE OPEN ACCESS Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition Manisha Sharma *, Deepa Verma** * (Department Of Electronics and Communication
More informationIris Recognition for Eyelash Detection Using Gabor Filter
Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition
More informationPalmprint Recognition Using Transform Domain and Spatial Domain Techniques
Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science
More informationMultimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More informationFingerprint Mosaicking by Rolling with Sliding
Fingerprint Mosaicking by Rolling with Sliding Kyoungtaek Choi, Hunjae Park, Hee-seung Choi and Jaihie Kim Department of Electrical and Electronic Engineering,Yonsei University Biometrics Engineering Research
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationIJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INTELLEGENT APPROACH FOR OFFLINE SIGNATURE VERIFICATION USING CHAINCODE AND ENERGY FEATURE EXTRACTION ON MULTICORE PROCESSOR Raju
More informationA Novel Identification System Using Fusion of Score of Iris as a Biometrics
A Novel Identification System Using Fusion of Score of Iris as a Biometrics Raj Kumar Singh 1, Braj Bihari Soni 2 1 M. Tech Scholar, NIIST, RGTU, raj_orai@rediffmail.com, Bhopal (M.P.) India; 2 Assistant
More informationVerifying Fingerprint Match by Local Correlation Methods
Verifying Fingerprint Match by Local Correlation Methods Jiang Li, Sergey Tulyakov and Venu Govindaraju Abstract Most fingerprint matching algorithms are based on finding correspondences between minutiae
More informationREINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of
More informationLocal Correlation-based Fingerprint Matching
Local Correlation-based Fingerprint Matching Karthik Nandakumar Department of Computer Science and Engineering Michigan State University, MI 48824, U.S.A. nandakum@cse.msu.edu Anil K. Jain Department of
More informationMinutiae Based Fingerprint Authentication System
Minutiae Based Fingerprint Authentication System Laya K Roy Student, Department of Computer Science and Engineering Jyothi Engineering College, Thrissur, India Abstract: Fingerprint is the most promising
More informationA Survey on Security in Palmprint Recognition: A Biometric Trait
A Survey on Security in Palmprint Recognition: A Biometric Trait Dhaneshwar Prasad Dewangan 1, Abhishek Pandey 2 Abstract Biometric based authentication and recognition, the science of using physical or
More informationBiometric quality for error suppression
Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?
More informationInternational Journal of Emerging Technology & Research
International Journal of Emerging Technology & Research Volume 1, Issue 5, July-Aug, 2014 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 Biometric Based Attendance Management System Using Wi-Fi
More informationPalm geometry biometrics: A score-based fusion approach
Palm geometry biometrics: A score-based fusion approach Nicolas Tsapatsoulis and Constantinos Pattichis Abstract In this paper we present an identification and authentication system based on hand geometry.
More informationMULTI-FINGER PENETRATION RATE AND ROC VARIABILITY FOR AUTOMATIC FINGERPRINT IDENTIFICATION SYSTEMS
MULTI-FINGER PENETRATION RATE AND ROC VARIABILITY FOR AUTOMATIC FINGERPRINT IDENTIFICATION SYSTEMS I. Introduction James L. Wayman, Director U.S. National Biometric Test Center College of Engineering San
More informationGraph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System
_ Graph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System K.Ramaraj 1, T.Ummal Sariba Begum 2 Research scholar, Assistant Professor in Computer Science, Thanthai Hans
More informationIRIS Recognition System Based On DCT - Matrix Coefficient Lokesh Sharma 1
Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationUjma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved
Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system
More informationA Framework for Efficient Fingerprint Identification using a Minutiae Tree
A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a
More informationThe Design of Fingerprint Biometric Authentication on Smart Card for
The Design of Fingerprint Biometric Authentication on Smart Card for PULAPOT Main Entrance System Computer Science Department, Faculty of Technology Science and Defence Universiti Pertahanan Nasional Malaysia
More informationIris Recognition: The Safest Biometrics
265 Iris Recognition: The Safest Biometrics Sachin Gupta [1], Dr. Chander Kant [2] [1] M.Tech. Student, Department of Computer Science and Applications K.U., Kurukshetra, Haryana, INDIA [2] Assistant Professor,
More information中国科技论文在线.
May 2005, Vol.20, No.3, pp.4 48 J. Comput. Sci. & Technol. Wavelet Energy Feature Extraction and Matching for Palmprint Recognition Xiang-Qian Wu, Kuan-Quan Wang, and David Zhang 2 School of Computer Science
More informationA Biometric Verification System Based on the Fusion of Palmprint and Face Features
A Biometric Verification System Based on the Fusion of Palmprint and Face Features Slobodan Ribaric, Ivan Fratric and Kristina Kis Faculty of Electrical Engineering and Computing, University of Zagreb,
More informationAnalysis of a Hand Geometry-Based Verification System
Analysis of a Hand Geometry-Based Verification System Ayeni,J.K*, Sadiq,K.A** and Adedoyin Adeyinka*** *(Department of Computer Science, Kwara State Polytechnic, Ilorin ** (Department of Computer Science,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Increasing The Accuracy Of An Existing Fingerprint Recognition
More informationPOLYBIO Multibiometrics Database: Contents, description and interfacing platform
POLYBIO Multibiometrics Database: Contents, description and interfacing platform Anixi Antonakoudi 1, Anastasis Kounoudes 2 and Zenonas Theodosiou 3 1 Philips College, 4-6 Lamias str. 2001, P.O. Box 28008,
More informationSignature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations
Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**
More informationBIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal
BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION
More informationRotation Invariant Finger Vein Recognition *
Rotation Invariant Finger Vein Recognition * Shaohua Pang, Yilong Yin **, Gongping Yang, and Yanan Li School of Computer Science and Technology, Shandong University, Jinan, China pangshaohua11271987@126.com,
More informationFingerprint Verification applying Invariant Moments
Fingerprint Verification applying Invariant Moments J. Leon, G Sanchez, G. Aguilar. L. Toscano. H. Perez, J. M. Ramirez National Polytechnic Institute SEPI ESIME CULHUACAN Mexico City, Mexico National
More informationA Method for the Identification of Inaccuracies in Pupil Segmentation
A Method for the Identification of Inaccuracies in Pupil Segmentation Hugo Proença and Luís A. Alexandre Dep. Informatics, IT - Networks and Multimedia Group Universidade da Beira Interior, Covilhã, Portugal
More informationEnhanced Iris Recognition System an Integrated Approach to Person Identification
Enhanced Iris Recognition an Integrated Approach to Person Identification Gaganpreet Kaur Research Scholar, GNDEC, Ludhiana. Akshay Girdhar Associate Professor, GNDEC. Ludhiana. Manvjeet Kaur Lecturer,
More informationCHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT
145 CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT 5.1 INTRODUCTION This chapter discusses the application of enhancement technique in palmprint recognition system. Section 5.2 describes image sharpening
More informationGraph Matching Iris Image Blocks with Local Binary Pattern
Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 7, July ISSN
International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-213 268 A Comparative study of Palmprint Feature Extraction Mrs. Kasturika B. Ray Dean (Academics) Eklavya College of
More informationFingerprint Image Enhancement Algorithm and Performance Evaluation
Fingerprint Image Enhancement Algorithm and Performance Evaluation Naja M I, Rajesh R M Tech Student, College of Engineering, Perumon, Perinad, Kerala, India Project Manager, NEST GROUP, Techno Park, TVM,
More informationFINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION
International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 3, Issue 1, Mar 2013, 155-162 TJPRC Pvt. Ltd. FINGERPRINT RECOGNITION
More informationAn Approach to Demonstrate the Fallacies of Current Fingerprint Technology
An Approach to Demonstrate the Fallacies of Current Fingerprint Technology Pinaki Satpathy 1, Banibrata Bag 1, Akinchan Das 1, Raj Kumar Maity 1, Moumita Jana 1 Assistant Professor in Electronics & Comm.
More informationAn Improved Iris Segmentation Technique Using Circular Hough Transform
An Improved Iris Segmentation Technique Using Circular Hough Transform Kennedy Okokpujie (&), Etinosa Noma-Osaghae, Samuel John, and Akachukwu Ajulibe Department of Electrical and Information Engineering,
More informationOnline and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison
Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Biagio Freni, Gian Luca Marcialis, and Fabio Roli University of Cagliari Department of Electrical and Electronic
More informationBiometrics: The Password You ll Never Forget
1 Biometrics: The Password You ll Never Forget R.D. McDowall, McDowall Consulting, Bromley, Kent, UK. In the last Pharmaceutical File (1) we discussed electronic signatures and logical security within
More informationCall for participation. FVC2004: Fingerprint Verification Competition 2004
Call for participation FVC2004: Fingerprint Verification Competition 2004 WEB SITE: http://bias.csr.unibo.it/fvc2004/ The Biometric System Lab (University of Bologna), the Pattern Recognition and Image
More informationRobust Biometrics Based on Palmprint
Robust Biometrics Based on Palmprint Lalit V. Jadhav 1, Prakash V. Baviskar 2 11 North Maharashtra University, Department Of E & TC, SSVP s College of Engineering, Dhule, Maharashtra, INDIA. 2] North Maharashtra
More informationRobust and Accurate Detection of Object Orientation and ID without Color Segmentation
0 Robust and Accurate Detection of Object Orientation and ID without Color Segmentation Hironobu Fujiyoshi, Tomoyuki Nagahashi and Shoichi Shimizu Chubu University Japan Open Access Database www.i-techonline.com
More informationCombined Fingerprint Minutiae Template Generation
Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of
More informationBiometrics- Fingerprint Recognition
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 11 (2014), pp. 1097-1102 International Research Publications House http://www. irphouse.com Biometrics- Fingerprint
More informationUser Identification by Hierarchical Fingerprint and Palmprint Matching
User Identification by Hierarchical Fingerprint and Palmprint Matching Annapoorani D #1, Caroline Viola Stella Mary M *2 # PG Scholar, Department of Information Technology, * Prof. and HOD, Department
More informationFingerprint Deformation Models Using Minutiae Locations and Orientations
Fingerprint Deformation Models Using Minutiae Locations and Orientations Yi Chen, Sarat Dass, Arun Ross, and Anil Jain Department of Computer Science and Engineering Michigan State University East Lansing,
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India
More informationIRIS SEGMENTATION OF NON-IDEAL IMAGES
IRIS SEGMENTATION OF NON-IDEAL IMAGES William S. Weld St. Lawrence University Computer Science Department Canton, NY 13617 Xiaojun Qi, Ph.D Utah State University Computer Science Department Logan, UT 84322
More informationPersonal authentication using hand images q
Pattern Recognition Letters 27 (2006) 1478 1486 www.elsevier.com/locate/patrec Personal authentication using hand images q Ajay Kumar a,b, *, David C.M. Wong b, Helen C. Shen b, Anil K. Jain c a Department
More informationFingerprint Recognition System for Low Quality Images
Fingerprint Recognition System for Low Quality Images Zin Mar Win and Myint Myint Sein University of Computer Studies, Yangon, Myanmar zmwucsy@gmail.com Department of Research and Development University
More informationInternational Journal of Advance Engineering and Research Development. Iris Recognition and Automated Eye Tracking
International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 Special Issue SIEICON-2017,April -2017 e-issn : 2348-4470 p-issn : 2348-6406 Iris
More informationUse of Extreme Value Statistics in Modeling Biometric Systems
Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision
More informationThe need for secure biometric devices has been increasing over the past
Kurt Alfred Kluever Intelligent Security Systems - 4005-759 2007.05.18 Biometric Feature Extraction Techniques The need for secure biometric devices has been increasing over the past decade. One of the
More informationNOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015
Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET
More informationBIOMETRIC TECHNOLOGY: A REVIEW
International Journal of Computer Science and Communication Vol. 2, No. 2, July-December 2011, pp. 287-291 BIOMETRIC TECHNOLOGY: A REVIEW Mohmad Kashif Qureshi Research Scholar, Department of Computer
More informationA Study on Similarity Computations in Template Matching Technique for Identity Verification
A Study on Similarity Computations in Template Matching Technique for Identity Verification Lam, S. K., Yeong, C. Y., Yew, C. T., Chai, W. S., Suandi, S. A. Intelligent Biometric Group, School of Electrical
More informationPCA AND CENSUS TRANSFORM BASED FINGERPRINT RECOGNITION WITH HIGH ACCEPTANCE RATIO
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationBiometric Cryptosystems: for User Authentication
Biometric Cryptosystems: for User Authentication Shobha. D Assistant Professor, Department of Studies in Computer Science, Pooja Bhagavat Memorial Mahajana Post Graduate Centre, K.R.S. Road, Metagalli,
More information