Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Comprehensive Study of Palmprint based Authentication

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 37 - Number 2
Year of Publication: 2012
Authors:
Madasu Hanmandlu
Neha Mittal
Ankit Gureja
Ritu Vijay
10.5120/4580-6499

Madasu Hanmandlu, Neha Mittal, Ankit Gureja and Ritu Vijay. Article: A Comprehensive Study of Palmprint based Authentication. International Journal of Computer Applications 37(2):17-24, January 2012. Full text available. BibTeX

@article{key:article,
	author = {Madasu Hanmandlu and Neha Mittal and Ankit Gureja and Ritu Vijay},
	title = {Article: A Comprehensive Study of Palmprint based Authentication},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {37},
	number = {2},
	pages = {17-24},
	month = {January},
	note = {Full text available}
}

Abstract

This paper presents some new features for the palmprint based authentication. The Region of interest (ROI) is extracted from the palmprint image by finding a tangent to the curves between fingers. The perpendicular bisector of this tangent and the tangent itself help demarcate the rectangular area that forms the ROI of the palmprint. Four approaches are presented for the feature extraction. In the first approach the ROI is divided into a suitable number of non-overlapping windows from which fuzzy features are extracted. In the second approach multi-scale wavelet decomposition is applied on the ROI and the detail images are combined to yield a composite image which is partitioned into non-overlapping windows and energy features are extracted. In the third approach sigmoid features are extracted from the ROI and in the fourth approach feature extraction is done using Local Binary Pattern (LBP) based on the directional gradient response. These four sets of features are used for the authentication of users from two databases using Euclidean Distance, Chi square measure and Support Vector Machines as classifiers.

References

  • Ying-Han Pang, Andrew TeohBeng Jin, David Ngo Chek Ling, "Palmprint based Cancelable Biometric Authentication System", Int. J. of Signal Processing, Vol.1, No.2, pp.93-99, 2004.
  • N. Duta, A.K. Jain, and K.V. Mardia, “Matching of Palmprint,” Pattern Recognition Letters, Vol.23, No. 4, pp. 477–485, 2001.
  • Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling, Fu San Hiew, "Palmprint Verification with Moments", WSCE, 2004.
  • Lei Zhang, Zhenhua Guo, Zhou Wang, David Zhang, "Palmprint Verification Using Complex Wavelet Transform", IEEE Intl. Conf. on Image Processing, San Antonio, TX, Sept.16-19,2007.
  • Li Fang, Maylor K.H. Leung , Tejas Shikhare, Victor Chan, Kean FattChoon, “Palmprint Classification”, IEEE Int. Conf. on Systems, Manand Cybernetics, Vol. 4, 8-11 October 2006, pp.2965-2969.
  • David Zhang, Wai-Kin Kong, Jane You, and Michael Wong, “Online Palmprint Identification”, IEEE Trans. Pattern Analysis &Machine Intelligence, Vol. 25, No. 9, pp. 1041 – 1050,September 2003.
  • M. Hanmandlu, H.M. Gupta, Neha Mittal, and S. Vasikarla, "An Authentication System Based on Palmprint", in Proc. ITNG, IEEE Computer Society, 2009, pp.399-404.
  • Madasu Hanmandlu, Ritu Vijay, Neha Mittal, “A Study of Some New Features for Palmprint Authentication”, Proceedings of The World Congress on Engineering, WCE-2011, 6-8 July, 2011, London, U.K., pp 1623-1628.
  • E. Boonchien, W. Boonchieng, and R. Kanjanavani, “Edge-Detection and Segmentation Methods for Two-Dimensional Echocardiograms”, Proc. Int'l Conf. Computers in Cardiology, pp. 541-544, September 2004.
  • T. Ojala, M. Pietikainen, and T. Maenpaa, “Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns”, IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 24, pp. 469-481, July 2002.
  • Michael Goh Kah Ong, Connie Tee and Andrew TeohBeng Jin, “Touch-less Palm-print Biometric System”, in Proc.VISIAPP’08, 2008, pp. 423-430.
  • V.N. Vapnik, Statistical Learning Theory. New York: Wiley-Interscience, 1998.
  • B. Scholkopf, C.J.C. Burges, and A.J. Smola, Advances in kemel Methods-Support Vector Learning. Cambridge, MA: MIT Press, 1998.
  • H. Li, Y. Liang, and Q. Xu, “Support Vector Machines and its Applications in Chemistry”, Chemometrics and Intelligent Laboratory Systems, vol. 95, pp. 188-198, Feb. 2009.
  • Chih-Chung Chang and Chih-Jen Lin, LIBSVM: a library for support vector machines, 2001. http://www.csie.ntu.edu.tw/~cjlin/libsvm
  • H. K. Polytechnic University, “Palmprint database”, Biometric Research Center Website. 2005. http://www4.comp.polyu.edu.hk/~biometrics/
  • A. Kong and D. Zhang, “Competitive coding scheme for palmprint verification,” in Proc. Int. Conf. Pattern Recog., 2004, pp. 520–523, Cambride, UK.
  • Xiang-Qian Wu, Kuan-Quan Wang, David Zhang, ”Wavelet Based Palmprint Recognition”, First international conference on Machine learning and Cybernetics, Beijing, pp-1253-1257, 4-5 Nov 2002.
  • Xian-Qian Wu, Kuan-Quan Wang, David Zhang, “Wavelet based Palmprint Recognition”, Proceedings of the first international conference on machine learning and cybernetics, Beijing, 4-5 November 2002.