Conference Paper

A Dynamic Algorithm for Palmprint Recognition

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Most of the existing techniques for palmprint recognition are based on metrics that evaluate the distance between a pair of features. These metrics are typically based on static functions. In this paper we propose a new technique for palmprint recognition based on a dynamical system approach, focusing on preliminary experimental results. The essential idea is that the procedure iteratively eliminates points in both images to be compared which do not have enough close neighboring points in the image itself and in the comparison image. As a result of the iteration, in each image the surviving points are those having enough neighboring points in the comparison image. Our preliminary experimental results show that the proposed dynamic algorithm is competitive and slightly outperforms some state-of-the-art methods by achieving a higher genuine acceptance rate.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... These systems are based on the measurable biological (anatomical and physiological) or behavioral characteristics used for the identification of an individual. Different features are used in biometric systems, such as fingerprints [20], [23], palmprint [4], [7]- [9], [12]- [14], [16], [17], [19], [21], [24], [25], [28]- [32], [35]- [42], [44], [46], [47], [52]- [63], hand geometry [26], [31], [45], [49], iris [1], [10], [51], and face [11], [18], [33], [48], [50]. Unlike conventional methods for personal identification, such as personal identification number, password, and key, these features cannot be duplicated, lost or stolen. ...
... As a main contribution, a new recursive, dynamic algorithm has been applied for the matching of features. A noticeable advantage of such an approach is its robustness with respect to noise: for instance, images corrupted with salt and pepper noise are easily recognized, whereas an image randomly generated is rejected even when compared with itself [44]. The images provided as an input to the dynamic algorithm have undergone an image processing based on two phases: the first involving preprocessing operations to make the system invariant to rotation and translation of the palm with respect to the image and the second consisting of a sequence of robust feature extraction steps that allow to detect the principal lines of the palm without introducing noise. ...
... When authentication is required, the newly acquired retinal image undergoes the same pre-processing steps as in the enrolment phase. The system then proceeds to compare the features extracted from this image with the stored template in the database [7]. Storing these biometric templates without proper security exposes them to a range of threats, making them susceptible to unauthorised access and potential misuse. ...
Article
Full-text available
Securing personal information and data has become an imperative challenge, especially after the introduction of legal frameworks, such as, in Europe, the General Data Protection Regulation (GDPR). Conventional authentication methods, such as PINs and passwords, have demonstrated their vulnerabilities to various cyber threats, making it necessary the study of robust and reliable biometric authentication systems that can accurately verify an user’s identity. The human retina has demonstrated remarkable reliability as a biometric trait mainly because of its unique and stable patterns, even though the adoption of these systems gives rise to significant concerns regarding the confidentiality of biometric data. This study presents a groundbreaking approach to address these concerns by integrating homomorphic encryption into retina-based authentication. The combination of homomorphic encryption and retina biometrics within the proposed framework offers a comprehensive solution that ensures both privacy and security with no loss in accuracy. The proposed approach mitigates the risks associated with possible unauthorised access and security breaches by keeping the data encrypted throughout the entire procedure. Furthermore, it preserves the individual’s privacy by preventing the exposure of sensitive biometric information. We evaluated the proposed system through extensive experiments and simulations, demonstrating its effectiveness in terms of both security and privacy when the system operates in normal (ideal) and abnormal (under attack) conditions. Experimental results indicate that the combined approach offers robust resistance to various attacks, including replay attacks and data exposure, providing a robust and privacy-centric authentication solution.
... Most of the recently published palmprint biometrics work employed hand-crafted features on the basis of local texture descriptors to describe the appearance of a palmprint image and designed some coding schemes to make a meaningful classification [7][8][9]. To suppress the negative impact of motion blur and noise on contactless palmprint recognition, some researchers have considered to adopt blur simulation, de-noising and image enhancement algorithms [10][11][12][13][14]. Despite of satisfactory experimental results, hand-crafted feature extraction algorithms inevitably get into complex pre-processing steps to reinforce the texture patterns. ...
Article
Full-text available
Palmprint biometrics has a broad application prospect owing to non-intrusiveness, ease of image acquisition and stable textural pattern. Hand-crafted approaches are vulnerable to non-ideal palmprint images caused by uneven illumination, motion blur and noise contamination. Many researchers have designed excellent texture descriptors or/and advanced image pre-processing algorithms. Nevertheless, they are highly targeted at some specific data, less adaptable to the emerging data. In this paper, a semi-pretrained contactless palmprint recognition deep network is developed to achieve high accuracy and robustness. Semi-CPRN is composed of underlying network structure from ResNet-152 and the proposed assistant layers dedicated to high-performance palmprint recognition. The well-designed assistant layers enhance convolutional neural network to steadily extract the real palmprint features even from the degraded images without being deceived by the degradation factors. Besides, to better carry out the research on palmprint recognition in the open environment, we established a new contactless database HIT-NIST-V1 under natural scene. The comparative experiments on CASIA, IITD, PolyU3D/2D, Tongji and HIT-NIST-V1 illustrate that Semi-CPRN is comparable and superior to previously published state-of-the-art approaches. Simultaneously, CNN-based palmprint biometrics methods show significant robustness to motion blur, Gaussian noise, and salt and pepper noise.
... One type of security attack is to intercept some important data and make changes to it before sending it on to the intended receiver. 3 In some real scenario, such as latent palmprint matching [29], it is preferable to use a semi-automated approach aimed at providing the top n identities that best match to the given template for further analysis by a human expert. Alternatively, it is possible to consider all the identities whose corresponding match scores exceed the threshold ξ that leads to a challenging task in a quite large database (e.g., FBI's next generation identification (NGI) system, which provides the world's largest repository of biometric and criminal history information [30]). ...
Chapter
Full-text available
With the proliferation of automated systems for reliable and highly secure human authentication and identification, the importance of technological solutions in biometrics is growing along with security awareness. Indeed, conventional authentication methodologies, consisting of knowledge-based systems that make use of something you know (e.g., username and password) and token-based systems that make use of something you have (e.g., identification card), are not able to meet the strict requirements of reliable security applications. Conversely, biometric systems make use of behavioral (extrinsic) and/or physiological (intrinsic) human characteristics, overcoming the security issues affecting the conventional methods for personal authentication. This book chapter provides an overview of the most commonly used biometric traits along with their properties, the various biometric system operating modalities as well as various security aspects related to these systems. In particular, it will be discussed the different stages involved in a biometric recognition process and further discuss various threats that can be exploited to compromise the security of a biometric system. Finally, in order to evaluate the systems’ performance, metrics must be adopted. The most widely used metrics are, therefore, discussed in relation to the provided system accuracy and security, and applicability in real-world deployments.
... The preprocessing elaboration is required to extract the central region of interest from the input image. As outlined in the Figure 1, the major steps involved in the preprocessing of raw images are: 1) noise reduction, 2) local adaptive binarization, 3) hand shape detection, and 4) ROI coordinate construction and extraction [24]. ...
Article
Full-text available
In this paper we apply a novel approach to near-infrared subcutaneous palm vascular pattern authentication. The proposed method relies on a recursive algorithm based on a positive linear dynamical system whose evolution depends on the two matrices representing the vein patterns to be compared. The output of the system reaches a high value when a good matching between the two matrices is observed, otherwise it converges rapidly to zero, even in presence of noise. With respect to another algorithm we recently introduced, this approach achieves not only a better authentication performance but also a drastic reduction in terms of computation time. These improvements are demonstrated by means of extensive experiments conducted on challenging datasets.
Article
Full-text available
Carpooling enables multiple users with similar travel habits to share rides, reducing vehicles on the road, leading to benefits such as lower fuel consumption, reduced traffic congestion, and lower environmental impact. However, carpooling also poses a challenge to the privacy of the users, as they may not want to reveal their location or route information to others. This research study delves into a cutting‐edge approach to address these privacy concerns by leveraging homomorphic encryption (HE) within the realm of carpooling services. The proposed solution makes use of a HE scheme that supports encrypted computation on real numbers, which is suitable for carpooling applications that involve distance and time calculations. The approach enables decision makers to perform efficient and accurate route matching over encrypted data, without disclosing their sensitive information about users, thus preserving the confidentiality of the data. The proposed system is evaluated through extensive experiments and simulations, demonstrating its effectiveness in terms of both security and privacy when the system operates in normal (ideal) and abnormal (under attack) conditions. Experimental results indicate that the proposed solution offers robust resistance to various attacks, including replay attacks and data exposure, providing a robust and privacy‐centric solution for carpooling services.
Article
Full-text available
Advancements in biometrics have attained relatively high recognition rates. However, the need for a biometric system that is reliable, robust, and convenient remains. Systems that use palmprints (PP) for verification have a number of benefits including stable line features, reduced distortion and simple self-positioning. Dorsal hand veins (DHVs) are distinctive for every person, such that even identical twins have different DHVs. DHVs appear to maintain stability over time. In the past, different features algorithms were used to implement palmprint (PP) and dorsal hand vein (DHV) systems. Previous systems relied on handcrafted algorithms. The advancements of deep learning (DL) in the features learned by the convolutional neural network (CNN) has led to its application in PP and DHV recognition systems. In this article, a multimodal biometric system based on PP and DHV using (VGG16, VGG19 and AlexNet) CNN models is proposed. The proposed system is uses two approaches: feature level fusion (FLF) and Score level fusion (SLF). In the first approach, the features from PP and DHV are extracted with CNN models. These extracted features are then fused using serial or parallel fusion and used to train error-correcting output codes (ECOC) with a support vector machine (SVM) for classification. In the second approach, the fusion at score level is done with sum, max, and product methods by applying two strategies: Transfer learning that uses CNN models for features extraction and classification for PP and DHV, then score level fusion. For the second strategy, features are extracted with CNN models for PP and DHV and used to train ECOC with SVM for classification, then score level fusion. The system was tested using two DHV databases and one PP database. The multimodal system is tested two times by repeating PP database for each DHV database. The system achieved very high accuracy rate.
Article
Full-text available
Palmprint is one of the main biometric features that has gained a lot of attention recently due to its commercial applications. Palmprint is more flexible in identifying an individual based on wrinkles, ridges and Principal lines. These features do not change during the lifetime of a person and no two individuals have similar palmprints. Most of the conventional methods use edge detection operators to detect lines in the palm which produce too many trivial lines. In this paper, a novel technique has been proposed to extract principal lines in two phases without using edge detection. The first phase involves some preprocessing operations and the second phase consists of morphological operations and elimination of undesirable components. The experimental results show that the proposed technique is more effective than existing techniques.
Article
Full-text available
Palmprint is one of the main biometric features that has gained a lot of attention recently due to its commercial applications. Palmprint is more flexible in identifying an individual based on wrinkles, ridges and Principal lines. These features do not change during the lifetime of a person and no two individuals have similar palmprints. Most of the conventional methods use edge detection operators to detect lines in the palm which produce too many trivial lines. In this paper, a novel technique has been proposed to extract principal lines in two phases without using edge detection. The first phase involves some preprocessing operations and the second phase consists of morphological operations and elimination of undesirable components. The experimental results show that the proposed technique is more effective than existing techniques.
Article
Full-text available
Palmprint is one of the relatively new physiological biometrics due to its stable and unique characteristics. The rich texture information of palmprint offers one of the powerful means in personal recognition. According to psycho-physiology study, the primary visual cortex in the visual area of human brain is responsible for creating the basis of a three-dimensional map of visual space, and extracting features about the form and orientation of objects. The basic model can be expressed as a linear superposition of basis functions. This idea inspired us to implement two well known linear projection techniques, namely Principle Component Analysis (PCA) and Independent Component Analysis (ICA) to extract the palmprint texture features. Two different frameworks of ICA (1) are adopted to compare with PCA for the recognition performances by using three different classification techniques. Framework I observed images as random variables and the pixels as outcomes while framework II treated pixels as random variables and the images as outcome. We are able to show that ICA framework II yields the best performance for identifying palmprints and it is able to provide both False Acceptance Rate (FAR) and False Rejection Rate (FRR) as low as 1%.
Article
Full-text available
This paper describes a computational approach to edge detection. The success of the approach depends on the definition of a comprehensive set of goals for the computation of edge points. These goals must be precise enough to delimit the desired behavior of the detector while making minimal assumptions about the form of the solution. We define detection and localization criteria for a class of edges, and present mathematical forms for these criteria as functionals on the operator impulse response. A third criterion is then added to ensure that the detector has only one response to a single edge. We use the criteria in numerical optimization to derive detectors for several common image features, including step edges. On specializing the analysis to step edges, we find that there is a natural uncertainty principle between detection and localization performance, which are the two main goals. With this principle we derive a single operator shape which is optimal at any scale. The optimal detector has a simple approximate implementation in which edges are marked at maxima in gradient magnitude of a Gaussian-smoothed image. We extend this simple detector using operators of several widths to cope with different signal-to-noise ratios in the image. We present a general method, called feature synthesis, for the fine-to-coarse integration of information from operators at different scales. Finally we show that step edge detector performance improves considerably as the operator point spread function is extended along the edge.
Article
Full-text available
The evidential value of palmprints in forensic applications is clear as about 30 percent of the latents recovered from crime scenes are from palms. While biometric systems for palmprint-based personal authentication in access control type of applications have been developed, they mostly deal with low-resolution (about 100 ppi) palmprints and only perform full-to-full palmprint matching. We propose a latent-to-full palmprint matching system that is needed in forensic applications. Our system deals with palmprints captured at 500 ppi (the current standard in forensic applications) or higher resolution and uses minutiae as features to be compatible with the methodology used by latent experts. Latent palmprint matching is a challenging problem because latent prints lifted at crime scenes are of poor image quality, cover only a small area of the palm, and have a complex background. Other difficulties include a large number of minutiae in full prints (about 10 times as many as fingerprints), and the presence of many creases in latents and full prints. A robust algorithm to reliably estimate the local ridge direction and frequency in palmprints is developed. This facilitates the extraction of ridge and minutiae features even in poor quality palmprints. A fixed-length minutia descriptor, MinutiaCode, is utilized to capture distinctive information around each minutia and an alignment-based minutiae matching algorithm is used to match two palmprints. Two sets of partial palmprints (150 live-scan partial palmprints and 100 latent palmprints) are matched to a background database of 10,200 full palmprints to test the proposed system. Despite the inherent difficulty of latent-to-full palmprint matching, rank-1 recognition rates of 78.7 and 69 percent, respectively, were achieved in searching live-scan partial palmprints and latent palmprints against the background database.
Article
Full-text available
With identity fraud in our society reaching unprecedented proportions and with an increasing emphasis on the emerging automatic personal identification applications, biometrics-based verification, especially fingerprint-based identification, is receiving a lot of attention. There are two major shortcomings of the traditional approaches to fingerprint representation. For a considerable fraction of population, the representations based on explicit detection of complete ridge structures in the fingerprint are difficult to extract automatically. The widely used minutiae-based representation does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Further, minutiae-based matching has difficulty in quickly matching two fingerprint images containing a different number of unregistered minutiae points. The proposed filter-based algorithm uses a bank of Gabor filters to capture both local and global details in a fingerprint as a compact fixed length FingerCode. The fingerprint matching is based on the Euclidean distance between the two corresponding FingerCodes and hence is extremely fast. We are able to achieve a verification accuracy which is only marginally inferior to the best results of minutiae-based algorithms published in the open literature. Our system performs better than a state-of-the-art minutiae-based system when the performance requirement of the application system does not demand a very low false acceptance rate. Finally, we show that the matching performance can be improved by combining the decisions of the matchers based on complementary (minutiae-based and filter-based) fingerprint information.
Article
Full-text available
A work in defining and implementing a biometric system based on hand geometry identification is presented here. Hand features are extracted from a color photograph taken when the user has placed his hand on a platform designed for such a task. Different pattern recognition techniques have been tested to be used in classification and/or verification from Euclidean distance to neural networks. Experimental results, up to a 97 percent rate of success in classification, will show the possibility of using this system in medium/high security environments with full acceptance from all users.
Article
Full-text available
In order to ensure that the performance of an automatic fingerprint identification/verification system will be robust with respect to the quality of input fingerprint images, it is essential to incorporate a fingerprint enhancement algorithm in the minutiae extraction module. We present a fast fingerprint enhancement algorithm, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency. We have evaluated the performance of the image enhancement algorithm using the goodness index of the extracted minutiae and the accuracy of an online fingerprint verification system. Experimental results show that incorporating the enhancement algorithm improves both the goodness index and the verification accuracy
Article
The second edition of this monograph describes the set-theoretic approach for the control and analysis of dynamic systems, both from a theoretical and practical standpoint. This approach is linked to fundamental control problems, such as Lyapunov stability analysis and stabilization, optimal control, control under constraints, persistent disturbance rejection, and uncertain systems analysis and synthesis. Completely self-contained, this book provides a solid foundation of mathematical techniques and applications, extensive references to the relevant literature, and numerous avenues for further theoretical study. All the material from the first edition has been updated to reflect the most recent developments in the field, and a new chapter on switching systems has been added. Each chapter contains examples, case studies, and exercises to allow for a better understanding of theoretical concepts by practical application. The mathematical language is kept to the minimum level necessary for the adequate formulation and statement of the main concepts, yet allowing for a detailed exposition of the numerical algorithms for the solution of the proposed problems. Set-Theoretic Methods in Control will appeal to both researchers and practitioners in control engineering and applied mathematics. It is also well-suited as a textbook for graduate students in these areas. Praise for the First Edition "This is an excellent book, full of new ideas and collecting a lot of diverse material related to set-theoretic methods. It can be recommended to a wide control community audience." - B. T. Polyak, Mathematical Reviews "This book is an outstanding monograph of a recent research trend in control. It reflects the vast experience of the authors as well as their noticeable contributions to the development of this field...[It] is highly recommended to PhD students and researchers working in control engineering or applied mathematics. The material can also be used for graduate courses in these areas." - Octavian Pastravanu, Zentralblatt MATH
Article
Palmprint recognition has attracted various researchers in recent years due to its richness in amount of features. In feature extraction, the single feature has become bottleneck in producing high performance. To solve this we propose an intramodal feature fusion for palmprint authentication. The proposed system extracts multiple features like Texture (Gabor), and Line features from the preprocessed palmprint images. The feature vectors obtained from different approaches are incompatible and also the features from same image may be redundant. Therefore, we propose a Particle Swarm Optimization (PSO) based technique to perform feature fusion on extracted features. Being an iterative technique that randomly optimizes the fused feature space, it overcomes the problems of feature fusion. Finally the feature vector is further reduced using Principal Component Analysis (PCA) and matched with stored template using NN classifier. The proposed approach is validated for their efficiency on PolyU palmprint database of 200 users. The experimental results illustrates that the feature level fusion improves the recognition accuracy significantly.
Article
Three-dimensional (3-D) palm print has proved to be a significant biometrics for personal authentication. Three-dimensional palm prints are harder to counterfeit than 2-D palm prints and more robust to variations in illumination and serious scrabbling on the palm surface. Previous work on 3-D palm-print recognition has concentrated on local features such as texture and lines. In this paper, we propose three novel global features of 3-D palm prints which describe shape information and can be used for coarse matching and indexing to improve the efficiency of palm-print recognition, particularly in very large databases. The three proposed shape features are maximum depth of palm center, horizontal cross-sectional area of different levels, and radial line length from the centroid to the boundary of 3-D palm-print horizontal cross section of different levels. We treat these features as a column vector and use orthogonal linear discriminant analysis to reduce their dimensionality. We then adopt two schemes: 1) coarse-level matching and 2) ranking support vector machine to improve the efficiency of palm-print recognition. We conducted a series of 3-D palm-print recognition experiments using an established 3-D palm-print database, and the results demonstrate that the proposed method can greatly reduce penetration rates.
Book
This self-contained monograph describes basic set-theoretic methods for control and provides a discussion of their links to fundamental problems in Lyapunov stability analysis and stabilization, optimal control, control under constraints, persistent disturbance rejection, and uncertain systems analysis and synthesis. New computer technology has catalyzed a resurgence of research in this area, particularly in the development of set-theoretic techniques, many of which are computationally demanding. The work presents several established and potentially new applications, along with numerical examples and case studies. A key theme of the presentation is the trade-off between exact (but computationally intensive) and approximate (but conservative) solutions to problems. Mathematical language is kept to the minimum necessary for the adequate formulation and statement of main concepts. Numerical algorithms for the solution of the proposed problems are described in detail. Set-Theoretic Methods in Control is accessible to readers familiar with the basics of systems and control theory; prerequisites such as convexity theory are included. The text provides a solid foundation of mathematical techniques and applications and also features avenues for further theoretical study. Aimed primarily at graduate students and researchers in applied mathematics and engineering, the book will also appeal to practitioners since it contains extensive references to the literature and supplies many recipes for solving significant control problems.
Conference Paper
An enhancement to the CSMA p-persistent protocol family is proposed, based on a fully decentralized control that adjusts the message transmission rate of each node to the estimated density of surrounding transmitting nodes. The system does not require enumeration of nodes nor control messages, the only input to the control coming from the physical medium occupation. Stability conditions are given in both cases of fixed and switching topologies. We show that good channel exploitation levels can be assured as well by suitably tuning the control parameters.
Article
Recently, biometric palmprint has received wide attention from researchers. It is well-known for several advantages such as stable line features, low-resolution imaging, low-cost capturing device, and user-friendly. In this paper, an automated scanner-based palmprint recognition system is proposed. The system automatically captures and aligns the palmprint images for further processing. Several linear subspace projection techniques have been tested and compared. In specific, we focus on principal component analysis (PCA), fisher discriminant analysis (FDA) and independent component analysis (ICA). In order to analyze the palmprint images in multi-resolution-multi-frequency representation, wavelet transformation is also adopted. The images are decomposed into different frequency subbands and the best performing subband is selected for further processing. Experimental result shows that application of FDA on wavelet subband is able to yield both FAR and FRR as low as 1.356 and 1.492% using our palmprint database.
Article
Biometric computing offers an effective approach to identify personal identity by using individual's unique, reliable and stable physical or behavioral characteristics. This paper describes a new method to authenticate individuals based on palmprint identification and verification. Firstly, a comparative study of palmprint feature extraction is presented. The concepts of texture feature and interesting points are introduced to define palmprint features. A texture-based dynamic selection scheme is proposed to facilitate the fast search for the best matching of the sample in the database in a hierarchical fashion. The global texture energy, which is characterized with high convergence of inner-palm similarities and good dispersion of inter-palm discrimination, is used to guide the dynamic selection of a small set of similar candidates from the database at coarse level for further processing. An interesting point based image matching is performed on the selected similar patterns at fine level for the final confirmation. The experimental results demonstrate the effectiveness and accuracy of the proposed method.
Article
Biometric identification is an emerging technology that can solve security problems in our networked society. A few years ago, a new branch of biometric technology, palmprint authentication, was proposed (Pattern Recognition 32(4) (1999) 691) whereby lines and points are extracted from palms for personal identification. In this paper, we consider the palmprint as a piece of texture and apply texture-based feature extraction techniques to palmprint authentication. A 2-D Gabor filter is used to obtain texture information and two palmprint images are compared in terms of their hamming distance. The experimental results illustrate the effectiveness of our method.
Conference Paper
A new approach for the personal identification using hand images is presented. This paper attempts to improve the performance of palmprint-based verification system by integrating hand geometry features. Unlike other bimodal biometric systems, the users does not have to undergo the inconvenience of passing through two sensors since the palmprint and hand geometry features can be are acquired from the same image, using a digital camera, at the same time. Each of these gray level images are aligned and then used to extract palmprint and hand geometry features. These features are then examined for their individual and combined performance. The image acquisition setup used in this work was inherently simple and it does not employ any special illumination nor does it use any pegs to cause any inconvenience to the users. Our experimental results on the image dataset from 100 users confirm the utility of hand geometry features with those from palmprints and achieve promising results with a simple image acquisition setup.
Article
Palmprint recognition has been investigated over 10 years. During this period, many different problems related to palmprint recognition have been addressed. This paper provides an overview of current palmprint research, describing in particular capture devices, preprocessing, verification algorithms, palmprint-related fusion, algorithms especially designed for real-time palmprint identification in large databases and measures for protecting palmprint systems and users’ privacy. Finally, some suggestion is offered.
Article
As the first attempt of automatic personal identification by palmprint, in this paper, two novel characteristics, datum point invariance and line feature matching, are presented in palmprint verification. The datum points of palmprint, which have the remarkable advantage of invariable location, are defined and their determination using the directional projection algorithm is developed. Then, line feature extraction and line matching are proposed to detect whether a couple of palmprints are from the same palm. Various palmprint images have been tested to illustrate the effectiveness of the palmprint verification with both characteristics.
Article
Biometrics-based personal identification is regarded as an effective method for automatically recognizing, with a high confidence, a person's identity. This paper presents a new biometric approach to online personal identification using palmprint technology. In contrast to the existing methods, our online palmprint identification system employs low-resolution palmprint images to achieve effective personal identification. The system consists of two parts: a novel device for online palmprint image acquisition and an efficient algorithm for fast palmprint recognition. A robust image coordinate system is defined to facilitate image alignment for feature extraction. In addition, a 2D Gabor phase encoding scheme is proposed for palmprint feature extraction and representation. The experimental results demonstrate the feasibility of the proposed system. Author name used in this publication: Wai-Kin Kong
Conference Paper
Recently, biometrics-based personal identification is regarded as an effective method of person's identity with recognition automation and high performance. In this paper, the palmprint recognition method based on Hu invariant moment is proposed. And the low-resolution(75dpi) palmprint image(135×135 Pixel) is used for the small scale database of the effectual palmprint recognition system. The proposed system is consists of two parts: firstly, the palmprint fixed equipment for the acquisition of the correctly palmprint image and secondly, the algorithm of the efficient processing for the palmprint recognition. And the palmprint identification step is limited 3 times. As a results, when the coefficient is 0.001 then FAR and GAR are 0.038% and 98.1% each other. The authors confirmed that FAR is improved 0.002% and GAR is 0.1% each other compared with online palmprint identification algorithm.
Article
The palm print is a new and emerging biometric feature for personal recognition. The stable line features or "palm lines", which are comprised of principal lines and wrinkles, can be used to clearly describe a palm print and can be extracted in low-resolution images. This paper presents a novel approach to palm line extraction and matching for use in personal authentication. To extract palm lines, a set of directional line detectors is devised, and then these detectors are used to extract these lines in different directions. To avoid losing the details of the palm line structure, these irregular lines are represented using their chain code. To match palm lines, a matching score is defined between two palm prints according to the points of their palm lines. The experimental results show that the proposed approach can effectively discriminate between palm prints even when the palm prints are dirty. The storage and speed of the proposed approach can satisfy the requirements of a real-time biometric system
Palmprint recognition: a dynamical system approach
  • D Palma
  • P L Montessoro
  • G Giordano
  • F Blanchini
D. Palma, P.L. Montessoro, G. Giordano and F. Blanchini, Palmprint recognition: a dynamical system approach, in preparation.
Controlbased p-persistent adaptive communication protocol
  • F Blanchini
  • D De Caneva
  • P L Montessoro
  • D Pierattoni
F. Blanchini, D. de Caneva, P.L. Montessoro, and D. Pierattoni, Controlbased p-persistent adaptive communication protocol, ACM Transactions on Autonomous and Adaptive Systems, vol. 7, no. 2, pp. 29:1-29:18, 2012.