CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Vein Patterns as Bio-metric Identifier using Euclidean Distance

by Sunita Aeri, Sukhvinder Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 20
Year of Publication: 2014
Authors: Sunita Aeri, Sukhvinder Kaur
10.5120/15745-4278

Sunita Aeri, Sukhvinder Kaur . Vein Patterns as Bio-metric Identifier using Euclidean Distance. International Journal of Computer Applications. 89, 20 ( March 2014), 6-10. DOI=10.5120/15745-4278

@article{ 10.5120/15745-4278,
author = { Sunita Aeri, Sukhvinder Kaur },
title = { Vein Patterns as Bio-metric Identifier using Euclidean Distance },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 20 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume89/number20/15745-4278/ },
doi = { 10.5120/15745-4278 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:09:44.007761+05:30
%A Sunita Aeri
%A Sukhvinder Kaur
%T Vein Patterns as Bio-metric Identifier using Euclidean Distance
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 20
%P 6-10
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Hand Vein patterns are one of the safest biometric information due to their strong resilience against the impostor attacks. In the presented work, a new approach for biometric authentication using infrared thermal hand vein patterns is proposed. The proposed work presents a Euclidean distance based vein's pattern based biometric authentication that can be used for ascertaining the biometric identity of person under scanner. The vein patterns are grabbed using the infra red (IR) thermal cameras and after applying some image pre-processing operations, a binary image is obtained consisting of veins crossings and intersections. The binary image is thinned using the morphological operations and a single line thinned image pattern is obtained. The thinned image pattern is now examined for intersections extractions and inter-distance between intersections. The inter-distance between intersections of vein patterns are stored in a data base. Further, when a test vein pattern is brought under test, the data base information is compared to that of the test pattern using Euclidean distances. Minimum the Euclidean distance, more is the equivalency of the test pattern to data base pattern

References
  1. Ishani Sarkar, Farkhod Alisherov, Tai-hoon Kim, and Debnath Bhattacharyya, "Palm Vein Authentication System: A Review", International Journal of Control and Automation Vol. 3, No. 1, March,
  2. Vanathi G, Nigarihaa R, Uma Maheswari G & Sujitha R, "Real Time Recognition System Using Finger-Vein", International Journal of Advanced Electrical and Electronics Engineering (IJAEEE), 2278-8948, Volume-2, Issue-2, 2013
  3. The International Journal of Advanced Electrical and Electronics Engineering (IJAEEE), Vanathi G, Nigarihaa R, Uma Maheswari G & Sujitha R Electronics and Communication Engineering, Avinashilingam University Coimbatore, India E-mail:ganesh. vanathi@gmail. com, nigarihaa22@gmail. com,umaguruswamy24@gmail. com, sujitharjrm@gmail. com
  4. Anika Pug1, Daniel Hartung2 and Christoph Busch1;2anika. pflug@cased. dedaniel. hartung@hig. nochristoph. busch@hig. no1 University of Applied Sciences Darmstadt - CASED, Haardtring 100,64295 Darmstadt, Germanyhttp://www. h-da. de2 Norwegian Information Security Laboratory (NISlab)H_gskolen i Gj_vik, Teknologivn. 22,2815 Gj_vik, Norwayhttp://www. hig. no
  5. Journal of Computational Information Systems 8: 4 (2012) 1545–1552Available at http://www. Jofcis. comJing LIU 1;2;_ Dingyu XUE2, Jianjiang CUI 2, Xu JIA 21College of Information and Engineering, Shenyang University of Chemical Technology, Shenyang110142, China2School of Information Science and Engineering, Northeastern University, Shenyang 110004, China
  6. Researchers P. Ghosh, R. Dutta Department of Computer Science and Engineering Department of Electronics and Communication Engineering Surendra Institute of Engg. & Management, WBUT, Siliguri, India Email- papri. mss@gmail. com, ritam_siliguri@yahoo. com 1 | © I J A I T I 2 0 1 2 VOLUME 1 NUMBER 2 (Mar/Apr 2012)
  7. 6. 978-1-4673-1228-8/12/$31. 00 ©2012 IEEEHengyi Zhang, Chaoying Tang, Adams Wai-Kin Kong and Noah CraftSchool of Computer Engineering, Nanyang Technological University, Block N4, Nanyang Avenue, Singapore 639798Los Angeles Biomedical Research Institute at Harbor-UCLA Medical Center, 1124 West Carson St, Torrance, CA 90502
  8. INFO Computer Engineering ISSN: 2249-3980 & E-ISSN: 2249-3999, Volume 2, Issue 1, 2012, pp. -19-21. Available online at http://www. bioinfo. in/contents. php?id=322PAL M. M. 1 AND JASUTKAR R. W. 2 1M. Tech (ESC), I. T DEPT. (S. D. C. E ), MS, India. 2M. Tech (VLSI), G. H. Raisoni College of Engineering, MS, India. *Corresponding Author: Email- Madhuridec9@gmail. com, rwjasutkar@gmail. com Brindha, J Biomet Biostat 2012, 3:4 V Evelyn Brindha* Department of Computer Science and Engineerin
  9. ISSN 2321-9017 Volume 1, No. 1, June – July 2013 International Journal of Bio-Medical Informatics and e-Health Available Online at http://warse. org/pdfs/ijbmieh02112013. pdfMona A. Ahmed1, Hala M. Ebied2,El-Sayed M. El-Horbaty3, Abdel-Badeeh M. Salem41, 3, 4Computer Science Department2Scientific Computing DepartmentFaculty of Computer and Information SciencesAin Shams University, Cairo, Egypt eng. monaa_cs@hotmail. com, halam@cis. asu. edu. eg,shorbaty@cis. asu. edu. eg, absalem@cis. asu. e
  10. Randa Boukhris Trabelsi et. al / International Journal of Engineering and Technology (IJET). Randa Boukhris Trabelsi#1, Alima Damak Masmoudi#2, and Dorra Sellami Masmoudi#3 #Computer Imaging and Electronics Systems group (CIELS) from Control and Energy ManagementLaboratory(CEM-Lab), Sfax Engineering School, Tunisia, BP W, 3038 Sfax, Tunisia, Phone: (216-74)274. 088, Fax. (216-74)275. 595. 1 trabelsiboukhrisranda@live. fr 2damak_alima@yahoo. fr 3dorra. masmoudi@enis. rnu. tn
  11. Proceedings of the 4th National Conference; INDIACom-2010 Computing For Nation Development, February 25 – 26, 2010 Bharati Vidyapeeth's Institute of Computer Applications and Management, New Delhi Arunkumar. V, Malathy. C Computer science Department, SRM UNIVERSITY, SRM Nagar, Kattankulathur-603203, Kancheepuram District, TamilNadu, India arunkumr1990@gmail. com, malathy_c@yahoo. com
  12. IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 4, No S. F. Bahgat College of computers and IT Taif University Taif, KSA S. Ghoniemy College of computers and IT TaifUniversity Taif, KSA M. Alotaibi College of computers and IT Taif University Taif, KSA
  13. International Journal of Computer Applications (0975 – 8887) Volume 51– No. 5, August 2012 T. Sheeba, Muscat College, P. O. Box:2910, P. C:112, Ruwi, Sultanate of Oman M. Justin Bernard, W. J. Towell Engineering, P. O. BOX:1040, P. C:112, Ruwi, Sultanate of Oman
  14. Sensors 2012, 12, 1738-1757; doi: 10. 3390/s120201738sensorsISSN 1424-8220www. mdpi. com/journal/sensors, Gongping Yang, Xiaoming Xi and Yilong Yin *School of Computer Science and Technology, Shandong University, Jinan 250101, China;E-Mails: gpyang@sdu. edu. cn (G. Y. ); fyzq10@126. com (X. X. )
Index Terms

Computer Science
Information Sciences

Keywords

Region of Interest Vein Bio-metrics Segmentation Thresholding Imposter Attacks Image Thinning