CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT

Similar documents
Advanced Palm Print Recognition Using Curve Let And Recursive Histogram Equalization

Biometric Security System Using Palm print

Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong)

A Comparative Study of Palm Print Recognition Systems

A Survey on Feature Extraction Techniques for Palmprint Identification

Feature-level Fusion for Effective Palmprint Authentication

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

CHAPTER 3 IMAGE ENHANCEMENT IN THE SPATIAL DOMAIN

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Tutorial 5. Jun Xu, Teaching Asistant March 2, COMP4134 Biometrics Authentication

Chapter 3: Intensity Transformations and Spatial Filtering

Digital Image Processing, 2nd ed. Digital Image Processing, 2nd ed. The principal objective of enhancement

Iris Recognition for Eyelash Detection Using Gabor Filter

Integrating Palmprint and Fingerprint for Identity Verification

Keywords Palmprint recognition, patterns, features

Image Enhancement in Spatial Domain. By Dr. Rajeev Srivastava

Vivekananda. Collegee of Engineering & Technology. Question and Answers on 10CS762 /10IS762 UNIT- 5 : IMAGE ENHANCEMENT.

Lecture 6: Edge Detection

Image Enhancement Techniques for Fingerprint Identification

Chapter - 2 : IMAGE ENHANCEMENT

CHAPTER 6 RESULTS AND DISCUSSIONS

Gaussian Mixture Model Coupled with Independent Component Analysis for Palmprint Verification

Fusion of Hand Geometry and Palmprint Biometrics

Outlines. Medical Image Processing Using Transforms. 4. Transform in image space

FILTERBANK-BASED FINGERPRINT MATCHING. Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239)

Critique: Efficient Iris Recognition by Characterizing Key Local Variations

Embedded Palmprint Recognition System on Mobile Devices

PALM PRINT RECOGNITION AND AUTHENTICATION USING DIGITAL IMAGE PROCESSSING TECHNIQUE

Image Enhancement in Spatial Domain (Chapter 3)

Broad field that includes low-level operations as well as complex high-level algorithms

MRT based Fixed Block size Transform Coding

Graph Matching Iris Image Blocks with Local Binary Pattern

CHAPTER 3 PRINCIPAL COMPONENT ANALYSIS AND FISHER LINEAR DISCRIMINANT ANALYSIS

CHAPTER 2 TEXTURE CLASSIFICATION METHODS GRAY LEVEL CO-OCCURRENCE MATRIX AND TEXTURE UNIT

Digital Image Processing. Image Enhancement - Filtering

Graph Geometric Approach and Bow Region Based Finger Knuckle Biometric Identification System

Introduction to Digital Image Processing

Palmprint Based Identification Using Principal Line Approach

An Acceleration Scheme to The Local Directional Pattern

Image Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi

Ulrik Söderström 16 Feb Image Processing. Segmentation

Development of an Automated Fingerprint Verification System

Decision Level Fusion of Face and Palmprint Images for User Identification

Polar Harmonic Transform for Fingerprint Recognition

EEM 463 Introduction to Image Processing. Week 3: Intensity Transformations

Texture. Frequency Descriptors. Frequency Descriptors. Frequency Descriptors. Frequency Descriptors. Frequency Descriptors

Digital Image Processing. Image Enhancement in the Spatial Domain (Chapter 4)

INTENSITY TRANSFORMATION AND SPATIAL FILTERING

wavelet packet transform

EE795: Computer Vision and Intelligent Systems

Digital Image Processing

234 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 14, NO. 2, FEBRUARY 2004

Efficient Nonlinear Image Processing Algorithms

Face Detection and Recognition in an Image Sequence using Eigenedginess

CS334: Digital Imaging and Multimedia Edges and Contours. Ahmed Elgammal Dept. of Computer Science Rutgers University

Finger-Vein Image Enhancement Using a Fuzzy-Based Fusion Method with Gabor and Retinex Filtering

Basic relations between pixels (Chapter 2)

CHAPTER 5 GLOBAL AND LOCAL FEATURES FOR FACE RECOGNITION

Filtering Images. Contents

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image

CORRELATION BASED CAR NUMBER PLATE EXTRACTION SYSTEM

FACE RECOGNITION USING INDEPENDENT COMPONENT

Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms


Palmprint recognition by using enhanced completed local binary pattern (CLBP) for personal recognition

Chapter 4 Face Recognition Using Orthogonal Transforms

Digital Image Fundamentals II

A Wavelet-based Feature Selection Scheme for Palm-print Recognition

Footprint Recognition using Modified Sequential Haar Energy Transform (MSHET)

Color Local Texture Features Based Face Recognition

Peg-Free Hand Geometry Verification System

CS4733 Class Notes, Computer Vision

Lecture 4 Image Enhancement in Spatial Domain

Palmprint Recognition using Novel Fusion Algorithm

PALMPRINT AUTHENTICATION BASED ON GABOR WAVELET USING SLIDING WINDOW APPROACH

Projected Texture for Hand Geometry based Authentication

Palmprint Detection and Verification Using ROI and MLBP Method

SIFT: SCALE INVARIANT FEATURE TRANSFORM SURF: SPEEDED UP ROBUST FEATURES BASHAR ALSADIK EOS DEPT. TOPMAP M13 3D GEOINFORMATION FROM IMAGES 2014

Fingerprint Recognition using Texture Features

COMPUTER AND ROBOT VISION

Improved Palmprint Authentication using Contactless Imaging

Edge and local feature detection - 2. Importance of edge detection in computer vision

MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION

Lecture 7: Most Common Edge Detectors

Local Image preprocessing (cont d)

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation

Intensity Transformations and Spatial Filtering

Artifacts and Textured Region Detection

Motivation. Gray Levels

Tutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication

convolution shift invariant linear system Fourier Transform Aliasing and sampling scale representation edge detection corner detection

Texture Segmentation by Windowed Projection

Fabric Defect Detection Based on Computer Vision

SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS

Feature extraction. Bi-Histogram Binarization Entropy. What is texture Texture primitives. Filter banks 2D Fourier Transform Wavlet maxima points

IT Digital Image ProcessingVII Semester - Question Bank

Texture. Texture is a description of the spatial arrangement of color or intensities in an image or a selected region of an image.

Sampling and Reconstruction

Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav

Transcription:

145 CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT 5.1 INTRODUCTION This chapter discusses the application of enhancement technique in palmprint recognition system. Section 5.2 describes image sharpening methods. Advanced palmprint recognition system is discussed in Section 5.3. A palmprint recognition using Symbolic Aggregate approximation (SAX) features is discussed in Section 5.4. Palmprint recognition using multiple palmprint features with enhanced palmprint image is given in Section 5.5. The performance measures are given in Section 5.6. The results are discussed in Section 5.7.The performance of the proposed enhancement technique is compared with the HE technique. Summary of the chapter is given in Section 5.8. There exist three different categories for palmprint authentication (Zhang,2004), divided on the basis of extracted features; (i) line-based approaches (Han et al 2003, Zhang et al 1999, Han et al 2007 ) (ii) appearance-based approaches (Lu et al 2003) and (iii) texture-based approaches. Line-based methods are based on line matching, line detection, crease detection, morphological operators etc. Morphological operators (Han et al 2003) can be used in the feature extraction process in order to obtain the feature vectors. Datum point invariant and the line feature matching technique

146 (Zhang et al 1999) for the verification process are not appropriate for many on-line security systems, since it is difficult to extract principal lines from a low resolution palmprint image. The required recognition rates and computational efficiency are not fully achieved here. Other issues in the linebased approaches include the existence of similar line features in many palmprints, and the thickness and width of the different lines are not taken into account which is very critical for differentiating palmprints. Appearance-based approaches are based on the analysis of principal component and linear discriminate. The original training palmprints are transformed into small groups of characteristic feature images called eigenpalms (Lu et al 2003) by means of Karhunen Loeve (K L) transform. But the authentication performance of these eigenpalms is reduced when it is applied in real time applications. In texture-based approach, texture features are extracted by means of gabor filter, discrete cosine transform, ordinal filter, laws mask, discrete fourier transform, wavelets and so on. Even though the Gabor filter (Kong et al 2003) gives accurate time-frequency location and robustness against varying image s brightness and contrast, it involves high computational cost and time delay. Difficulty in setting an appropriate filter parameter causes identification performance to depend much on the training set used for parameter selection. Orthogonal line ordinal feature (Sun et al 2005) is currently the best ordinal measure for palmprint representation; still its theoretical foundation has not been well formulated. Wavelet Energy Feature technique s (Wu et al 2002) ability to distinguish palms is very strong because it can reflect the wavelet energy distribution of the principal lines, wrinkles and ridges in different directions at varying wavelet decomposition levels. Disadvantages of this method are its sensitiveness towards noise, the requirement of high resolution images, implementation cost and time

147 complexity. Fourier transform method (Li et al 2002) is used to ignore the abundant textural details of a palm, and the extracted features are highly influenced by the lighting situations. A huge storage of database to store image templates affects the system s simplicity. Personal verification using palmprint and hand geometry biometric (Kumar et al 2003) does verification by integrating hand geometry features. Palmprint and hand geometry features are acquired using a digital camera. These images are aligned and then used to extract palmprint and hand geometry features. These features are then examined for their individual and combined performances. The image acquisition setup used in this work is inherently simple and it does not employ any special illumination, nor does it use any pegs to cause any inconvenience to the users. Hierarchical palmprint identification via multiple feature extraction (You et al 2002) describes a new method to authenticate individuals based on palmprint identifcation and verification. A texture-based dynamic selection scheme is used to facilitate the fast search for the best matching of the sample in the database in a hierarchical fashion. The global texture energy, which is characterized with high convergence of inner-palm similarities and good dispersion of inter-palm discrimination, is used to guide the dynamic selection of a small set of similar candidates from the database at coarse level for further processing. Multiple palmprint features are used by Nanni and Lumini (2009) for accurate palmprint recognition. Combining multiple classifiers by averaging or by multiplying (Tax et al 2000) combines observations from different sources. Palmprint-based recognition system using phase difference information (Badrinath et al 2012) uses histogram equalization for enhancing the contrast of the palmprint image. Most of the works did not give any attempt to incorporate the enhancement techniques in biometric palmprint images to achieve

148 performance improvement. In most of the prior systems, the enhancement stage got little attention. The enhancement of the input image can deeply affect the output of the system. This work incorporates curvelet and RHE techniques for enhancement of the palmprint image. Curvelet is used for removing noise in the palmprint image, and RHE is used for improving the contrast of the palmprint image. Applying curvelet and RHE improves the overall performance of the system. 5.2 IMAGE SHARPENING Image sharpening refers to any enhancement technique that highlights edges and fine details in an image. 5.2.1 Highpass Filter The highpass filter allows high frequency data to pass through, suppressing low frequency data. Highpass filtering is useful for finding edges, for enhancing lines and for sharpening an image. Small window size will enhance small features and details. Large window size will allow large features to pass through, suppressing or eliminating smaller features. In general, image filters operate by performing a mathematical operation on each pixel using the pixels surrounding it to generate the result. For instance, a low pass filter changes the value of each pixel in the image to the average of it and the pixels in its neighborhood. This average replaces the gray level of the selected pixel gray level. The chosen window size determines how big that neighborhood is. For instance, a 3x3 size has eight pixels all round the sample pixel in the center of the window. The windows move through every pixel in the image, performing the same mathematical operation using the surrounding pixels in

149 its neighborhood to determine the target pixel s new value. The mask for the highpass filter is given in Figure 5.1-1 -1-1 -1 9-1 -1-1 -1 Figure 5.1 3x3 mask for highpass filter This filter can be viewed as a kind of slope filter in which it highlights pixels that have values that are different from their neighboring pixels. The greater the difference, the higher or lower (visually brighter or darker) the output value will be. 5.2.2 Unsharp Masking The standard tool used for sharpening in order to make edges clear and distinct is known as UM filter. An UM filter cannot create additional detail, but it helps to emphasize texture and greatly enhance the appearance of detail. It performs sharpening using a procedure that subtracts an unsharp or smoothed version of an image from the original image. The unsharp filtering technique is also used in other areas such as photographic and printing industries. Unsharp masking filter produces an edge image g(x,y) from an input image f(x,y) as given in Equation(5.1) g(x,y) = f(x,y) f smooth (x,y) (5.1) where f smooth (x,y) is a smoothed version of f(x,y). The complete unsharp sharpening operator for the UM filter is shown in Figure 5.2 below.

150 f(x,y) Smooth - g(x,y) + + + + + f sharp (x,y) Figure 5.2 The UM filtering operator The output of the UM filter is given in Equation (5.2) f sharp (x,y) = f(x,y) + k * g(x,y) (5.2) where k is a scaling constant. Reasonable values for k vary between 0.2 and 0.7, with the larger values providing higher rate of sharpening. 5.3 ADVANCED PALMPRINT RECOGNITION SYSTEM The system has two phases, namely enrollment phase and identification phase. During enrollment phase, the system will store the multiple features in the database. During the identification phase, the features are extracted from the input image using the same algorithm and are compared with the features in the database. This study proposes a highly reliable method called advanced palmprint recognition using curvelet transform and RHE to overcome the drawbacks of the existing palmprint authentication systems and ensures high accuracy and efficiency. The block diagram of the advanced palmprint recognition system is given in Figure 5.3. Various steps involved in the proposed method are palmprint acquisition, enhancement, feature extraction and palmprint matching. The noise in the input image is removed by curvelet transform and then equalized by RHE technique. The features are extracted from the enhanced image. Two sets of features are extracted in this work, (i) SAX features and (ii) multiple palmprint features.

151 Palmprint image Palmprint image Image enhancement Image enhancement Feature extraction Feature extraction Store in Database Palmprint matching Decision Reject Accept Figure 5.3 Block diagram of the advanced palmprint recognition system 5.4 PALMPRINT RECOGNITION USING SAX FEATURES The proposed palmprint recognition system using SAX features is shown in Figure 5.4. It composes input acquisition, enhancement, feature extraction and recognition stages. The input acquisition and enhancement steps are discussed in chapter I, II, and III. This chapter mainly focuses on the feature extraction and recognition steps. The block diagram of palmprint recognition using SAX features is shown in Figure 5.4.

152 Input image Gray scale conversion Curvelet transform RHE Division of image into blocks 2D decomposition into 1D sequence Convert the values into symbols Calculate threshold to determine breakpoints Find mean for each block MINDIST calculation Database Matching Result Accept Reject Figure 5.4 Block diagram of palmprint recognition using SAX features Here, an extension of the SAX is used which represents the 2D data using a 2D matrix of symbols. The method uses the gray scale information of captured images in order to reduce the complexity of execution. 5.4.1 Introduction to SAX The symbolic demonstration of time series is called SAX. It transforms the original time-series data into symbolic strings where Piecewise Aggregate Approximation (PAA)-based algorithm is used that provides simplicity and low computational complexity. Since SAX requires less

153 storage space, it is used for solving many challenges associated with the present data mining tasks. In addition, the symbolic representation allows researchers go further to the available wealth of data structures and string manipulation algorithms in computer science, and also for many applications in bioinformatics and data mining (Wang et al 2004). SAX algorithm transforms a time-series X of length n into the string of arbitrary length w, where w < n, using a table that contains the breakpoints. Each value in the table corresponds to each level in the time series graph which is further represented by symbols in the alphabet array of size >2 which finally forms the string of length w. Dimensionality reduction is based on two parameters named sax length (w) and number of symbols used in the alphabet array. The algorithm consists of two steps. In the first step, it transforms the original time-series into a PAA representation ( C ) and this intermediate representation is further converted into alphabetic string ( Ĉ ) in the second step. Usage of PAA approach in the first step gives the advantage of being simple and efficient in dimensionality reduction and provides lower bounding property. The second step, where the actual conversion of PAA coefficients into alphabets is also computationally efficient, shows the contractive property of symbolic distance. Generating SAX from PAA representation of a time series is implemented in a way which produces symbols that correspond to the varying magnitude of time-series data (Lin et al 2003). Figure 5.5 shows the conversion of times series into SAX representation. Figure 5.5 (a) is the original time series data. Figure 5.5 (b) shows the corresponding PAA representation and Figure 5.5(c) shows the SAX representation.

154 (a) (b) (c) Figure 5.5 Times series to SAX representation (a) Time series (b) PAA representation (c) SAX representation 5.4.2 2D SAX Representation for the Proposed System The size of the gray scale image matrix Q, is m x n. It is then divided into equal size blocks of size w 1 x w 2 and the mean value of the data inside each block is calculated to form the dimensionality reduced representation. The newly formed mean value matrix is named as Q of size w 1 x w 2. The (i th, j th ) element of Q or the mean value of each block in Q can be calculated by using the Equation (5.3) Q(i, j) 1 w w 1 2 x m i w1 m i 1 w1 1 y n j w 2 n j 1 w 2 1 Q x, y (5.3) Breakpoints have to be applied to convert Q into a symbol matrix S or the 2D SAX representation. For this, a threshold value is used so that breakpoints can be calculated easily. Threshold value is calculated using the Equation (5.4)

155 T max min SAX level (5.4) where max is the maximum value in the Q matrix, min is the minimum value in the Q matrix, and SAX level is equal to number of symbols to be used. For example, if four SAX level are chosen, five breakpoints have to be calculated. The breakpoints are min, min+t, min+2t, min+3t and max. Then, one symbol is used to represent the values between min and min+t, and another symbol is used for the values between min+t and min+2t and so on. In this manner, the symbol matrix S, the 2D SAX representation can be obtained. Then, this two dimensional data is decomposed into one dimensional (1D) sequences using a progressive scan (Chen et al 2010). These 2D SAX representations as strings are stored in the database as palmprint template. 5.4.3 Palmprint Matching The MINDIST between two corresponding strings is measured and this is adopted as the similarity measurement of the corresponding two palmprints. Given two SAX strings Qˆ qˆ 11,qˆ 12,... qˆ w 1 w and Ĉ ĉ 2 11,ĉ12,... ĉw 1 w, 2 their MINDIST can be calculated using the Equation (5.5) where dist() can be implemented using lookup table as given in Figure 5.1. If the MINDIST is smaller, then the two palmprints are more similar. w w mn 1 2 MINDIST( Qˆ,Ĉ) dist(qˆ,ĉ ) 2 (5.5) w w i 1 j 1 ij ij 1 2 where m x n is the size of the image and w 1 x w 2 is the SAX length.

156 Table 5.1 Lookup table for calculating dist() function with four SAX level a b c d a 0 0 0.67 1.34 b 0 0 0 0.67 c 0.67 0 0 0 d 1.34 0.67 0 0 234 subjects from IIT Database are used for recognition. Four samples are taken for each subject. The features of the palmprint image to be recognized are checked with the features of the palmprint images stored in the system s database. If a match is found, then the person is authenticated, otherwise the person is unauthenticated. Verification is done with HE,curvelet,RHE and curvelet & RHE methods. It is proceeded with two phases in which in the first phase, 117 random palmprint images from the IIT database that are also contained in the system s database were tested. In the second phase, 117 palmprint images were taken for testing from the IIT database that is not in the system s database. Figure 5.6 Sample palmprints Few samples of palmprints are shown in Figure 5. 6, in which palmprints in the same column are from the same palm, and the palmprints in

157 the first and second rows are from session one and session two respectively. Figure 5. 7 shows the output of the palmprint enhancement and feature extraction process where block size (w1 w2) is set as 8 8 and the SAX level as 4. The SAX string is used as palmprint templates for experiment-matching process. Figure 5.8 shows the four samples of a palmprint from an individual and their corresponding SAX representation. (a) (b) (c) (d) ddbbdddccccbbbbbddbbcddbbcbbccccddbcddcccccbccccdcbbc ccbbbcbcbcccbbbbbbbbbbbbbbccbbcccabbbbbbbbbdbccccbbb bbbbabbcbccdbccbbbaaabacbcdcbccccbaaaaacccdbcccccbbaab cbcdcbcccdcbbbbbcccdbdddccbbbbbccdddbddcbccbabbcccdcc dcbcccabcccbccbcdbccbbaaccccccbcbccccbaacccc (e) Figure 5.7 Palmprint enhancement and feature extraction. (a) The input image. (b) image after applying curvelet (c) RHE equalized image (d) SAX representation (e) SAX string (a) (b) (c) (d) (e) (f) (g) (h) Figure 5.8 (a),(b),(c) and(d) palmprints from the same palm, (e),(f),(g) and (h) corresponding SAX representation

158 5.5 PALMPRINT RECOGNITION USING MULTIPLE PALMPRINT FEATURES This system uses a combination of four major representations of the palmprint. i.e Discrete Cosine Transform (DCT), Local Binary Pattern (LBP), GB (Gabor features) and line features. The sum rule is used for fusing multiple features of the palmprint. Decision will be taken based on the distance between the input image features and features of the images in the database. Here, the first stage of the system is to perform the enhancement of the palmprint image. Curvelet, RHE and highpass filter are used for enhancement of the palmprint image. The second stage of the system is feature extraction. The system extracts multiple features from palmprint image. The output of the feature extraction process is the feature vector with variance. These feature vectors can be used for the unique representation of a palmprint image. Figure 5.9 shows the block diagram of feature extraction process. Enhanced image Feature extraction GB LBP DCT Line features Store the feature vectors Figure 5.9 Block diagram of feature extraction stage

159 5.5.1 Extraction of Gabor Features Gabor filter is a linear filter used for edge detection. Frequency and orientation representations of Gabor filters are similar to those of the human visual system, and they have been found to be particularly appropriate for texture representation and discrimination. In the spatial domain, a 2D Gabor filter is a Gaussian kernel function modulated by a sinusoidal plane wave. The Gabor filters are self-similar. Figure 5.10 shows the Gabor Filters used for feature extraction. By using Gabor filter, system extracts texture features which can be employed for palmprint verification. Palmprint image is filtered with a bank of 36 Gabor filters to generate 36 filtered images. Here, the orientation is varied from 0 to 2 with 10 degree increments. Kong et al (2003) described that filters with frequency 0.0916 and standard deviation 5.6179 achieved high recognition rate. Hence, the frequency is chosen as 0.0916 and sigma is chosen as 5.6179. Each of the filtered images are overlaid one over the other so that line features in all directions get enhanced. The components of palmprint crease and lines in different directions are captured by each of these filters. The extracted prominent texture features can be used for unique representation of a palmprint image. Figure 5.11 shows the extracted Gabor feature by superimposing all the Gabor-filtered images. Figure 5.10 Gabor filters

160 Figure 5.11 Gabor features Figure 5.12 Gabor feature vector Gabor feature vector template is created using the technique of dimensionality reduction. The dimension of the image gets reduced in such a way that nine pixels (one pixel surrounded by eight pixels) get reduced to a single pixel and its value will be the average of the surrounding pixel. This is the simple technique which uses the mean of the block for dimensionality reduction. The technique of dimensionality reduction helps us to rectify the rotational invariance of the input palmprint images and reduces the complexity. Thus the system can accurately identify the input palmprint image. Gabor feature vector after dimension reduction is given Figure 5.12. 5.5.2 Extraction of DCT Features A DCT expresses a sequence of finitely many data points in terms of a sum of cosine functions oscillating at different frequencies. DCT is a separable linear transformation. The two-dimensional DCT is equivalent to a one-dimensional DCT in single dimension followed by a one-dimensional DCT in the other dimension. The salient information of the DCT exists in the coefficients with low frequencies. Because of this property of the DCT, most

161 DCT components are typically very small in magnitude. Discarding the small coefficients from the DCT representation, only a small error is resulted. Figure 5.13 (a) is a sample image and the enhanced image is given in Figure 5.13(b). Figure 5.13 (c) shows the DCT features. DCT coefficients with higher variance are retained, and remaining small coefficients which introduce a small error in the reconstructed image from the DCT representations are discarded. For dimensionality reduction, the first N co-efficients are retained. (a) (b) (c) Figure 5.13 (a) Original image (b) Enhanced image (c) DCT features 5.5.3 Extraction of LBP Features LBP is a simple yet very efficient texture operator which labels the pixels of an image by thresholding the neighborhood of each pixel and considers the result as a binary number. Due to its discriminative power and computational simplicity, LBP texture operator has become a popular approach in various applications. The most important property of the LBP operator in real-world applications is its robustness to monotonic gray-scale changes. Another important property is its computational simplicity, which makes it possible to analyze images in challenging real-time settings. Figure 5.14 shows LBP feature and its histogram.

162 (a) (b) Figure 5.14(a) LBP features (b) LBP histogram 5.5.4 Extraction of Lines and Ridges The lines and ridges are unique for each palmprint image. The palmprint image will contain mainly three principal lines, namely heart line, head line and life line. In addition to that it has wrinkles and ridges. The principal lines will be more prominent in palmprint images. The enhanced image is sharpened to highlight the line features. Palmprint image is sharpened using unsharp masking. By creating the binary image from the sharpened image, the lines and ridges are extracted. Figure 5.15 shows the extracted line features. Dimensionality reduction is done as in Section 5.5.1 Figure 5.15 Line features 5.5.5 Creating Template from Feature Vectors The proposed system extracts four types of feature vectors. They are Gabor feature vector, DCT feature vector, LBP feature vector and line feature vector. The system stores these four templates in the database. The sum rule is applied on the feature vectors before the distance calculation takes

163 place. The feature vector of the input palmprint image is verified against feature vector of the palmprint image in the database. If X x 1, x2,... xn is one feature vector and Y y, y2,... yn 1 is another feature vector, then fusion of these vectors Z using sum rule is represented as in Equation (5.6) Z x1 y1, x2 y2,... xn y n (5.6) 5.5.6 Palmprint Matching This system uses Euclidian distance for distance vector calculation for palmprint matching. The distance calculation is one of the important things in authentication. Distance between two palmprint images shows the similarity of those two palmprint images. The palmprint images from the same person with negligible transposition will be of minimal distance mean, while the distance between two palmprint images from two different people will be high. Euclidean distance is used for distance calculation. Euclidean distance between vector X and Y is calculated as in Equation (5.7) n 2 d X,Y) x i y i (5.7) i 1 Experimental results show that the extracted features from the enhanced image is more accurate than that of the direct input image. Here, the proposed system shows the effect of the enhancement stage to obtain more recognition rate.

164 5.6 PERFORMANCE MEASURES The performance of a palmprint authentication system can be measured by three metrics, namely FAR, FRR and TSR. False Acceptance (FA) is the number of times the system accepts an unauthorized user (imposter) and FAR is the ratio of number of false acceptances to the total number of imposter accesses. FAR is measured as in Equation (5.8) Number of false acceptances FAR 100 % (5.8) Total number of imposter accesses False Rejection (FR) is the number of times the system rejects an authorized user (genuine) and FRR is the ratio of number of false rejections to the total number of genuine accesses. FRR is measured using Equation (5.9) Number of false rejections FRR 100 % (5.9) Total number of genuine accesses TSR (Connie et al 2005) represents the recognition rate of the system and it is measured using Equation (5.10) FA FR TSR 1 100 % (5.10) Total number of accesses 5.7 RESULTS AND DISCUSSION 5.7.1 Performance of Palmprint Recognition Using SAX Features The comparison of FAR of the RHE & curvelet method with other methods is given in Figure 5.16. RHE& curvelet method has the lowest FAR.

165 9 8 7 6 5 4 3 2 1 0 8.547 6.8376 3.4188 1.7094 HE RHE Curvelet RHE and Curvelet Figure 5.16 Comparison of FAR of RHE & curvelet method with HE, RHE and curvelet The comparison of FRR of the RHE & curvelet method with other methods is given in Figure 5.17. RHE& curvelet method has the least FRR. The comparison of TSR of the RHE & curvelet method with other methods is given in Figure 5.18. RHE& curvelet method has the highest TSR. Here, the proposed technique provides TSR of 98.29%. 12 10 8 6 10.2564 7.6923 5.9829 4 2 0 1.7094 HE RHE Curvelet RHE and Curvelet Figure 5.17 Comparison of FRR of RHE & curvelet method with HE, RHE and curvelet

166 100 98 96 94 92 90 88 86 90.5982 92.735 95.2991 98.2905 HE RHE Curvelet RHE and Curvelet Figure 5.18 Comparison of TSR of RHE & curvelet method with HE, RHE and curvelet The optimum result is obtained when both curvelet and RHE are used. The FAR, FRR and TSR values are measured as 1.7094%, 1.7094%, 98.2905%. Michael et al (2008) used contrast adjustment and smoothing as enhancement technique in contactless palmprint and recognition system. They obtained a recognition rate of 98.10 % without image enhancement and recognition rate of 98.68% with image enhancement. An improvement of 0.58 % is obtained using enhancement. The proposed system provides an improvement of 8% than the HE method using RHE and curvelet. 5.7.2 Performance of Palmprint Recognition Using Multiple Palmprint Features In this work, the performance of the system is analyzed by using the FAR, FRR and TSR. For the best performance of the system, the metric FAR and FRR should be minimum and TSR should be maximum. The experimental results show that the performance of the system increased, while the system incorporates enhancement before feature extraction. This system improves the performance of the system by

167 enhancement and the effective utilization of multiple features palmprint image. 9 8 7 6 5 4 3 2 1 0 7.6923 5.1282 2.5641 0.8547 HE RHE Curvelet RHE and Curvelet Figure 5.19 Comparison of FAR of RHE & curvelet method with HE, RHE and curvelet with multiple palmprint features The comparison of FAR of the RHE & curvelet method with other methods is given in Figure 5.19. RHE& curvelet method has the lowest FAR. FAR value is 0.8547. The comparison of FRR of the RHE & curvelet method with other methods is given in Figure 5.20. RHE& curvelet method has the least FRR. The FRR value is 0.8547. 10 9 8 7 6 5 4 3 2 1 0 9.4017 6.837 5.1282 0.8547 HE RHE Curvelet RHE and Curvelet Figure 5.20 Comparison of FRR of RHE & curvelet method with HE, RHE and curvelet with multiple palmprint features

168 100 98 96 94 92 90 88 86 91.4529 94.017 96.1538 99.1452 HE RHE Curvelet RHE and Curvelet Figure 5.21 Comparison of TSR of RHE & curvelet method with HE, RHE and curvelet with multiple palmprint features The comparison of TSR of the RHE & curvelet method with other methods is given in Figure 5.21. RHE& curvelet method has the highest TSR. The TSR of the proposed method is 99.1452. The optimum result is obtained when both curvelet and RHE are used. Michael et al (2010) used homomorphic filtering technique as enhancement technique in touchless palmprint and knuckle print recognition system. Here, without image enhancement 96.52 % of Genuine Acceptance Rate (GAR) and with image enhancement 98.02% of GAR is obtained. An improvement of 1.5 % is obtained using enhancement. The proposed system provides an improvement of 8% than the HE method using RHE & curvelet. 5.8 SUMMARY To improve the accuracy of palmprint authentication system, curvelet and RHE are applied prior to the 2D SAX conversion. As these procedures remove the noise and enhance the contrast, the proposed system ensures high performance with competitive accuracy. Since it is a texturebased approach, the computational complexity of the feature extraction

169 process is much lower and thus can be efficiently implemented for even slow mobile embedded platforms. Also, the proposed approach does not rely on any parameter training process. A palmprint authentication system using multiple palmprint features with enhancement is proposed in this work. It uses four different features from the palmprint image, namely GB, DCT, LBP and line feature. RHE and curvelet are used for enhancement. The experimental results demonstrated that the RHE & curvelet method achieves optimum performance comparison with the other ones.