Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Secured User Authentication using Encrypted Palmprint

IJCA Proceedings on International Conference on Innovations in Computing Techniques (ICICT 2015)
© 2015 by IJCA Journal
ICICT 2015 - Number 3
Year of Publication: 2015
T. P. Kamatchi
K. Gokila Meena

T P Kamatchi and Gokila K Meena. Article: Secured User Authentication using Encrypted Palmprint. IJCA Proceedings on International Conference on Innovations in Computing Techniques (ICICT 2015) ICICT 2015(3):25-29, July 2015. Full text available. BibTeX

	author = {T. P. Kamatchi and K. Gokila Meena},
	title = {Article: Secured User Authentication using Encrypted Palmprint},
	journal = {IJCA Proceedings on International Conference on Innovations in Computing Techniques (ICICT 2015)},
	year = {2015},
	volume = {ICICT 2015},
	number = {3},
	pages = {25-29},
	month = {July},
	note = {Full text available}


Securing personal privacy and deterring identity theft are national priorities. Biometrics, an emerging set of technologies, provides an effective solution. Foremost examples of are biometric technologies that identify and authenticate faces, hands, palmprints, fingers, signatures, irises, voices, and fingerprints. The biometric data whenever transmitted across the network can be stolen and misused, which provides a fear over the personal privacy. In order to provide personal privacy over palmprints we propose an idea using encryption scheme over the image. In this paper, the palmprint images are obtained from the user, then encrypted and stored in the database server thereby the personal privacy of palmprints can be provided.


  • A. Gyaourova and A. Ross, A Novel coding scheme for indexing fingerprint patterns" Proceedings of S+SSPR Workshop, December 2008
  • J. Dai, J. Feng, J. Zhou, "Robust and Efficient Ridge-Based Palmprint Matching," IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol. 34, No. 8, pp. 0162-8828, August 2012
  • Jiaa, Huanga and Zhang, "Palmprint Verification based on robust line orientation code" Science Direct, May 2008
  • D. Huang, W. Jia, and D. Zhang, "Novel algorithm for the automatic classification of low-resolution palmprints", IJARCSSE, January 2014
  • D. Zhang, W. K. Kong, J. You, M. Wong, "Online Palmprint Identification," IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol. 25, No. 9, pp. 0162-8828,September 2003
  • J . You, W. Kong, D. Zhang, and K. Cheung, "On hierarchical palmprint coding with multiple features for personal identification in large databases," IEEE Trans. Circuits Syst. Video Technol. , vol. 14, no. 2,pp. 234–243, February 2009
  • W. Li, J. You, and D. Zhang, "An effective indexing and searching scheme for an image database" , IJDL, 1997
  • S. M. Prasad, V. K. Govindan , P. S. Sathidevi, "Palmprint Authentication Using Fusion of Wavelet Based Representations," IEEE, pp. 978-1-4244-5612-3, 2009
  • Cappelli, Ferrara, Maio, "High resolution Palmprint Recognition System", IEEE, June 2012
  • ShikhaWadha and Monika Malhotra, "Enhancing security in palmprint recognition systems using Encryption algorithms" International Journal of Engineering and Computer Science, June 2014
  • David Zhang, Guangminglu, Lei Zhang and Nan Luo, "Palmprint Recognition using 3D Information", IEEE, August 2009
  • Wei Li Zhang, D. ; Zhang, D. ; Guangming Lu ; Jingqi Yan "Efficient joint 2D and 3D palmprint matching with alignment refinement", IEEE, June 2010
  • Naidu Swathi, Chemudu Satish, Vaddi Seshu Satyanarayana, Pillem Ramesh, Hanumakumar, NareshBhuma, CH. Himabin du, "New palm print authentication system by Using wavelet based method" , AIRCCSE, March 2011
  • Nageshkumar, Mahesh. PK and M. N. ShanmukhaSwamy, "An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image", IEEE, June 2009