CFP last date
20 May 2024
Reseach Article

User Verification by Hierarchical Palmprint Matching

Published on April 2014 by S.yagasudha, L.latha, S.thangasamy
Machine Learning: Challenges and Opportunities Ahead
Foundation of Computer Science USA
MLCONF - Number 1
April 2014
Authors: S.yagasudha, L.latha, S.thangasamy
6caa9f62-73c7-444f-b02f-ab97e7472367

S.yagasudha, L.latha, S.thangasamy . User Verification by Hierarchical Palmprint Matching. Machine Learning: Challenges and Opportunities Ahead. MLCONF, 1 (April 2014), 23-26.

@article{
author = { S.yagasudha, L.latha, S.thangasamy },
title = { User Verification by Hierarchical Palmprint Matching },
journal = { Machine Learning: Challenges and Opportunities Ahead },
issue_date = { April 2014 },
volume = { MLCONF },
number = { 1 },
month = { April },
year = { 2014 },
issn = 0975-8887,
pages = { 23-26 },
numpages = 4,
url = { /proceedings/mlconf/number1/16135-1013/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Machine Learning: Challenges and Opportunities Ahead
%A S.yagasudha
%A L.latha
%A S.thangasamy
%T User Verification by Hierarchical Palmprint Matching
%J Machine Learning: Challenges and Opportunities Ahead
%@ 0975-8887
%V MLCONF
%N 1
%P 23-26
%D 2014
%I International Journal of Computer Applications
Abstract

Biometric verification system has high efficiency, high recognition rate and comfortable to user's operating characteristics. Palmprint authentication system is considered to be the most reliable biometric recognition technique due to its merits such as low-cost, user-friendliness, high speed and accuracy. Real time images are captured using a scanner at a resolution of 550 x 460. Each of these gray-scale images are aligned and then used to extract palmprint features. These features are then used for authenticating users. This paper presents a hierarchical palmprint matching system that is used to reduce the computation cost by segmenting the image and matching it with the database, thereby false palmprints are rejected in the subsequent changes by comparing just a portion of the whole palmprint.

References
  1. A. K. Jain and J. Feng, "Latent Palmprint Matching," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 31, no. 6, pp. 1032-1047, June 2009.
  2. A. Kong and D. Zhang, "Competitive Coding Scheme for Palmprint Verification,"Proc. 17th Int'l Conference . Pattern Recognition, vol. 1, 2004.
  3. D. Huang, W. Jia, and D. Zhang, "Palmprint Verification Based on Principal Lines," Pattern Recognition, vol. 41, no. 4, pp. 1316-1328, 2008.
  4. David Zhang, Lei Zhang, "Wangmeng Zuo Palmprint verification using binary orientation co-occurrence vector," Pattern Recognition Letters 30(2009),1219–1227.
  5. D. Zhang,W. K. Kong,J. You, and M. Wong, "Online Palmprint Identification," IEEE Trans. Pattern Analysis and Machine Intelligence,Vol. 25,no. 9,pp. 417-432,2002.
  6. Jifeng Dai "Robust and Efficient Ridge-Based Palmprint Matching" IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 34, No. 8, August 2012.
  7. Jifeng Dai and Jie Zhou, "Multifeature-Based High Resolution Palmprint Recognition" IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 33, No. 5, May 2011. [8J. You, W. Li. and D. Zhang, "Hierarchical Palmprint Identification via Multiple Feature Extraction," Pattern Recognition,vol. 35,no. 4,pp. 847- 859,2002.
  8. W. Jia,D. Huang, and D. Zhang, "Palmprint Verification Based on Robust Line Orientation Code," Pattern Recognition,vol. 41,no. 5,pp 1521-1530,2008.
  9. W. Kong, D. Zhang, and W. Li, "Palmprint Feature Extraction Using 2-D Gabor Filters," Pattern Recognition, vol. 36, no. 10, pp2339-2347, 2003.
  10. W. Li, D. Zhang, and Z. Xu, "Palmprint Identification by Fourier Transform," Int'l J. Pattern Recognition and Artificial Intelligence, vol. 16, no. 4, pp. 417-432, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Palmprint Authentication Segmentation Binarization Hierarchical Palmprint Matching.