SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303
A Fast and Accurate Palmprint Identification
System based on Consistency Orientation
Pattern
M. Logapreethi1
1
Department of Computer Science & Engineering,
Bannari Amman Institute of Technology,
Anna University,
logapreethi92@gmail.com
N. B. Mahesh Kumar2
2
Department of Computer Science & Engineering,
Bannari Amman Institute of Technology,
Anna University,
mknbmaheshkumar@gmail.com
Abstract — A palmprint identification system is a relatively most promising physiological biometric approach to identify the
person. The numbers of palmprint recognition based biometric system have been successfully applied for real world access to
control applications. A typical palmprint identification system identifies a query palmprint and matching it with the template
stored in the database and comparing the similarity score with a pre-defined threshold. The Consistency Orientation Pattern
(COP) hashing method is implemented in this work to enforce the fast search and to obtain the accurate result. Orientation pattern
(OP) is defined as a collection of orientation features at arbitrary positions. The principal palm line is a kind of evident and stable
features in palmprint images, and the orientation features in this region are expected to be more consistent than others. Using the
orientation and response features extracted by steerable filter and gives an analysis on the consistency of orientation features, and
then introduces a method to construct COP using the consistent features. Those features can be used as the indexes to the target
template. Because the COP is very stable across the samples of the same subject, the COP hashing method can find the target
template quickly. This method can lead to early termination of the searching process.
Index Terms — Consistency, hashing, orientation pattern, principal palm line, searching and steerable filter.
1 INTRODUCTION
Biometrics refers to metrics related to human
characteristics and traits. Biometrics
authentication is used in computer science as a form
of identification and access control. It is also used to
identify individuals in groups. It is wide acceptance
in network society due to its security, reliability and
uniqueness. The great challenge to biometrics is thus
to improve recognition performance in terms of both
accuracy and efficiency and be maximally resistant to
illusory practices. The characteristics of biometrics
are distinguished into two main categories such as
physiological and behavioral. The physical
biometrics is fingerprint, palm print, face, iris etc.
The behavioural biometrics is voice, gesture,
signature etc.
IJTET©2015
A palm is the inner region between wrist and
the fingers. Palmprint recognition, a relatively novel
but promising biometric technology, has received
considerable research interests in the current decade.
Like finger prints, palms of the human needless
comprise unique pattern of elevations and valleys.
Since palm is larger than a finger, palmprint is
predictable to be even faster than finger print. The
forthright biometric system should use a high-
resolution palmprint scanner and it assembles all the
structures of the palm such as hand geometry, ridge
and valley topographies, principal lines, and
wrinkles. The characteristics of palmprint are
uniqueness, reliability, security and performance.
32
A
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303
A coordinate system is set up on basis of the
boundaries of fingers so as to extract a central part of
a palmprint for feature extraction. The palmprint
authentication system can operate in two modes,
enrollment and verification. In the enrollment mode,
a user is to provide several palmprint samples to the
system. The samples are captured by a palmprint
scanner and passes through preprocessing and feature
extraction to produce the templates stored in a given
database. In the verification mode, the user is asked
to provide his/her user ID and his/her palmprint
sample. Normally the regions of the human palm
contain three flexion creases, secondary creases and
ridges. The flexion creases are also called principal
lines and secondary creases are called wrinkles.
Fig.1 Feature of principal palm line
The flexion creases are also called principal lines and
secondary creases are called wrinkles. The figure 1.1
illustrates the features of principle palm lines that
could be used to uniquely identify a person. Six
major types of features can be observed on a palm.
a) Geometry Feature: According to the palm
shape, we can easily get the corresponding
geometry feature such as width, length and
area.
IJTET©2015
b) Principal line feature: The principal lines
in a palmprint are very paramount
physiological characteristic for single out
the individual because they are very staunch
and indisputable. Three persistent lines such
as, the heart line, the head line and the life
line are specified feature in the principal
palm line and which is consistent.
c) Wrinkles: In a palmprint there are many
wrinkles are available bur wrinkles different
from the principal lines. Those principle
lines are fragile and more weaving.
Wrinkles are classified as coarse wrinkles
and fine wrinkles so that it falls on difficulty
to identify the more features in detail can be
acquired.
d) Datum points: Two end points called datum
points are obtained by using the principal
lines. These intersect on both sides of a palm
and provide a stable way to register
palmprint.
e) Delta point feature: The delta point is
defined as the center of a delta like region in
the palmprint.
f) Minutiae: A palmprint is basically
composes of the rides, allowing the minutiae
feature to be used as another significant
measurement.
For the fast identification task, main goal is to
find the target template by matching the query with
the minimum number of candidate templates. So that
the consistent feature of the query can serve as the
indexes to find the target template. Classification
approach, hierarchical approach, coding approach,
hashing and many more techniques has been used for
the searching process. In that hashing is the best
technique to enforce the fast search using the
consistency analysis by constructing the COP.
2. RELATED WORK
Wu et al. [15] has been applied the classification
approach for palmprint identification system, it
divides palmprints into several classes and match the
query only with the templates in its class.
33
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303
The classes used in this method are unbalanced.
However, this strategy speeds up the searching
process but does not obtain the high accuracy.
You et al. [4] was implemented the
hierarchical matching method. This method typically
involves extracting multiple kinds of features and
then searching in a layered fashion. Simpler features
which can be quickly extracted and matched are used
in higher layers to allow a large number of candidates
to be discarded. This approach is also similar to
classification approach. It increases matching speed
at the cost of accuracy.
Kong et al. [2] proposed the Competitive
coding based approach is the most promising ones
because of their small feature size, fast matching
speed, and high accuracy. In the feature extraction
stage, these methods encode the responses of a bank
of filters into bitwise code, and in the matching stage,
the similarity score can be efficiently computed by
Boolean operators. It achieves the accuracy and
speed for small number of input images and datasets,
but it does not applicable to the large-scale database.
Zhou et al. [12] used the gradient-based
approach, the filter-bank based approach which is
more robust against noise, and thus has been widely
employed to extract orientation features for palmprint
recognition. However, when only a small number of
filters are used, the extracted orientation feature
would be coarse.
Hao et al. [16] proposed a beacon guided
fast iris search algorithm. In the pre-processing stage,
they divided the database into a number of beacon
spaces according to a collection of interleaved iris
feature. In the searching stage, they proposed the
multiple collisions principle to greatly shrink the
search range. Evaluations of this method on a large-
scale database (over 632,500 templates) show a
substantial improvement in search speed with a
negligible loss of accuracy.
Yue et al. [6] proposed a fast palmprint
identification strategy based on competitive code and
the cover tree method. Compared with brute force
search, this approach can obtain identical
identification results, and is 33–50% faster.
IJTET©2015
Zuo et al. [13] applied the methods to
overcome the previous disadvantage for the fast
matching speed of coding-based methods, when
applied on a large-scale identification system, it is
often necessary to speed up the searching process.
Although several strategies have been proposed for
fast palmprint identification, these methods, however,
either lead to much accuracy loss or only obtain
limited speed.
Yue et al. [8] improved the method by
optimizing the tree structure. The experimental
results show that the approach can further speed up
the searching process without any accuracy loss, and
the speedup can be further enhanced by including
more templates per subject in the database. While
both methods can reduce the identification time
without accuracy loss, the speedups over brute force
search are somewhat limited. Besides, these methods
are not applicable for the identification systems
where only one template per subject is stored in the
database.
In order to deal with this problem, Zuo et al.
[14] proposed a steerable filter based approach for
accurate orientation feature extraction and a
Generalized Angular Distance (GAD) measure for
effective matching of accurate orientations. The GAD
has the properties of tolerance for small angular
difference and penalty for large angular distance, and
thus is more robust against quantization errors.
Yue et al. [9] proposed a fast palmprint
identification method using orientation pattern (OP)
hashing. They introduced three properties required by
the hash function and demonstrated that their OP
satisfied all of these properties. Experimental results
showed that this method could be more than ten times
faster than brute force search, depending on the
quality of the images in the database, while the
identification accuracy almost remains the same.
The aim of this research work is to design a
fast and accurate palmprint identification system for
large-scale database. To perform the processes have
to extract the feature that could be done through
steerable filter that is based on Orientation Pattern it
gives the better result compare with the previous
work.
34
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303
For searching the template COP hashing
method leads to early termination and achieves the
high accuracy compared with the previous work.
3. SYSTEM DESIGN
A consistent orientation pattern (COP) hashing
method is implemented to enforce the fast and
accurate palmprint identification system. At first have
to preprocess the image and then extract the
orientation features using steerable filter, and then
select more consistent ones based on consistency
analysis. COPs are then constructed based on the
consistent features and are used as the indexes to the
target template. Because of the stability of the COP
across the samples of the same subject, the proposed
COP hashing method can quickly find the target
template, leading to early termination of the
searching process. Fig 1 depicts the system
architecture for proposed system. At first input is
taken from various databases or captured images then
based on the architecture every process has been
performed and finally it identifies the correct
template from the various datasets and leads to the
early termination. The obtained results are fast and
more accurate.
Fig 1: System Architecture
3.1 Image Preprocessing
The datasets has been collected from various
databases [1]. The image preprocessing is the basic
stage to process the input image.
IJTET©2015
When the input palmprint images are captured, some
variations are needed to process the image such as
translation and rotation. At first have to translate the
input RGB palmprint image into gray scale image,
because it contains the low resolution value. On the
same time the artifacts noise also be removed. After
that ROI region of the palmprint image can be
extracted. Then the input image can be enhanced to
view the edges and corners of the palmprint image.
3.2 Feature Extraction Using Steerable Filter
Steerable filter is an orientation-selective convolution
kernel used for image enhancement and feature
extraction that can be expressed via linear
combination of a small set of rotated versions of
itself. As an example, the oriented first derivative of a
2D Gaussian is a steerable filter. The oriented first
order derivative can be obtained by taking the dot
product of a unit vector oriented in a specific
direction with the gradient. The basis filters are the
partial derivatives of a 2D Gaussian. Given the filter
responses of basis filters, the response at arbitrary
orientation can be analytically determined as a
function of orientation. In this work, the optimal
steerable filter used in and it is adopted for feature
extraction. It has eight basis filters, and the
synthesized steerable filter is expressed as
(1)
where h0 is the rotated version of the filter, is the
rotation angle, and q0, q1, . . . , q4 can be determined
by the filter responses of basis filters and the
coefficients of h.
3.3 Consistency Analysis on Orientation Features
The features cannot be simply classified as consistent
and inconsistent ones since feature consistency seems
to be continuously distributed. As for the fast
identification task, goal is to find the target template
by matching the query with the minimum number of
candidate templates.
35
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303
Thus the query’s orientation features which are more
consistent are more appealing, which indicates that
the target template would have a high probability to
have the same features. As a result, the consistent
features of the query can serve as the indexes to the
target, and how to find the relatively consistent
features is the key to the task. Therefore, we need a
single sample based consistency analysis method.
This method is based on two reasonable
assumptions. First, principal palm line is a kind of
evident and stable features in palmprint images, and
the orientation features in this region are expected to
be more consistent than others. Second, since
principal palm line is thick and dark in palmprint
images, the minimum filter responses in this region
are much lower than those in other regions. Thus the
principal line area can be determined by those
orientation features with low responses. One can see
that the features in the regions corresponding to
principal palm lines are relatively consistent. In fact,
the structure of principal palm lines can be easily
observed from this weight map, which validates the
first assumption. It can estimate that most of them
locate in the regions are resemble to principal lines,
which confirm and validates our second assumption.
Thus it can conclude that, it is reasonable to find
consistent features by examining the filter responses
of a single sample.
Besides, the closeness of the orientation to
the quantization border should also be considered in
consistency analysis. When the orientation
corresponding to the minimum response is close to
any quantization border, the feature after quantization
is likely to be inconsistent because of some factors
like the deformation caused by finger movement and
inaccurate pre-processing method.
To deal with this, we propose to consider
two features when orientation is close to any
quantization border. For example, when a query
comes, if its orientation at one sampling point is
between 25 and 35, then the templates whose feature
is either 0 or 1 are regarded as candidates. As a result,
although the feature may be inconsistent, with the
help of consistency analysis, the target template will
be successfully retrieved.
IJTET©2015
3.4 Hashing based Fast Identification
The core of hashing is the design of hash function,
especially when the data contain a certain amount of
noises. Based on the three properties required by a
hash function that is discrimination, consistency, and
randomness, this method develops a fast
identification method using consistent orientation
pattern hashing.
a) COP Construction
Orientation pattern (OP) is defined as a collection of
orientation features at arbitrary positions. If the
features are more consistent ones found by
consistency analysis, and then call it as consistent
orientation pattern (COP). A COP can be determined
by two parameters, the size k and the position P. For
an example take 5 COPs with size k = 10 that can
perform the following operations. After filtering the
palmprint image using steerable filter, then sort the
filter responses in ascending order and select the first
50 features as consistent features, denoted as cf1, . . . ,
cf50. Then divide them into 5 groups {cf1, . . . , cf10}, .
. . , {cf41, . . . , cf50} and construct 5 COPs. Then call
it as sequential COP because the features in the COPs
are organized in a sequential fashion. Although the
sequential COP is discriminative and consistent, it
does not have the randomness property because of
the strong local correlation. As can be observed, in
each COP a large portion of orientation features
located. An inconsistent feature caused by coarse
quantization. That the features in each random COP
are more scattered, and thus the local correlation of
the COP can be greatly reduced. As a result, the
random COP satisfies all the three properties required
by a hash function and is expected to be more
suitable for hashing based fast palmprint
identification.
36
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303
b) COP Hashing
The proposed COP hashing method subsists of two
phases such as preprocessing and searching. In the
pre-processing stage, first index all the templates in
the database according to their orientation features,
and build a hash table to facilitate fast searching. And
also use two additional tables to record the offset and
size of each bin in the hash table. Because there are 6
kinds of orientation features and each template is
composed of 1024 features, the hash table has 1024 x
6 bins in total. If there are N templates in the
database and each template is identified by a 4-byte
integer, then the memory required to store the hash
table is 1024 x 4 x N bytes, and the memory required
by the other two tables is 1024 x 6 x 4 x 2 = 48 K
bytes.
In the searching stage, extract the orientation
features and the filter responses of the query, sort the
filter responses in ascending order, and construct a
number of COPs. According to the position and value
of the first COP, look up in the hash table to find a
collision, and carry out a full match to test whether
the similarity score is higher than the threshold. If
yes, return the ID and stop the identification process.
If not, it should examine the next COP in
the same manner until find a match or have to
considered all the COPs.
4. CONCLUSION
A COP hashing method is implemented for fast
palmprint identification. The method is composed of
four components: orientation feature extraction,
consistency analysis, COP construction, and hashing.
The proposed COP hashing method has been applied
for several palmprint databases. The COP hashing
can obtain comparable accuracy and high speed
compared with brute force search, which verifies the
effectiveness of the proposed method for fast and
accurate palmprint identification.
IJTET©2015
REFERENCES
[1] W. Jia, D. Huang and Zhang. D, ―Palmprint
verification based on robust line orientation code‖, J.
Pattern Recognition, vol. 41, no. 1, pp.1521-1530,
May 2008.
[2] A. Kong and D. Zhang, ―Competitive coding
scheme for palmprint verification‖, Proc. Int’l Conf.
Pattern Recognition, pp. 520–523, 2004.
[3] A. Kong, D. Zhan and M. Kamel, ―Palmprint
identification using feature-level fusion‖, J. Pattern
Recognition, vol. 39. no. 3, pp.478–487, March, 2006.
[4] J. You, W. Kong and D. Zhang, ―Hierarchical
palmprint identification via multiple feature
extraction‖, J. Pattern Recognition, vol. 35, no. 4, pp.
847–859, April, 2002.
[5] F. Yue and W. Zuo, ―Consistency analysis on
orientation feature for fast and accurate Palmprint
Identification‖, J. Information Science, vol. 268, no. 2,
pp. 78-90, August, 2013.
[6] F. Yue, B. Li, M. Yu and J. Wang, ―Fast palmprint
identification using orientation pattern hashing‖, Proc.
Int’l Conf. Hand-based Biometrics, pp. 94–99, 2011.
[7] F. Yue, W. Zuo and D. Zhang, ―Competitive code-
based fast palmprint identification using a set of cover
trees‖, J. Optical Engineering, vol. 48, no. 6, pp. 1–7,
2009.
[8] F. Yue, W. Zuo, D. Zhang and B. Li, ―Fast
palmprint identification with multiple templates per
subject‖, J. Pattern Recognition, vol. 32, no. 8, pp.
1108–1118, June, 2011.
[9] D. Zhang, W. Kong, J. You and M. Wong, ―On-line
palmprint identification‖, IEEE Trans. on Pattern
Analysis and Machine Intellegience, vol. 25, no. 9, pp.
1041–1050, September, 2003.
[10] D. Zhang, W. Zuo and F. Yue, ―A comparative
study of palmprint recognition algorithms‖, ACM
Computer Survey, vol. 44, no. 1, 2012.
[11] L. Zhang and D. Zhang, ―Characterization of
palmprints by wavelet signatures via directional
context modelling‖, IEEE Trans. on System Man
Cybernetics, vol. 34, no .3, pp. 1335–1347, June,
2004.
37
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303
[12] J. Zhou and J. Gu, ―A model-based method for the
computation of fingerprints orientation field‖, IEEE
Trans. on Image Processing, vol. 13, no. 3, pp.821–
835, June, 2004.
[13] W. Zuo, Z. Lin, Z. Guo and D. Zhang, ―The
multiscale competitive code via sparse representation
for palmprint verification‖, Proc. Int’l Conf. Pattern
Recognition, pp. 2265–2272, 2010.
[14] W. Zuo, F. Yue and D. Zhang, ―On accurate
orientation extraction and appropriate distance
measure for low-resolution palmprint recognition‖, J.
Pattern Recognition, vol. 44, no. 4, April, 2011.
[15] X. Wu, D. Zhang, K. Wang and B. Huang,
―Palmprint classification using principal lines‖, J.
Pattern Recognition, vol. 37, no. 10 pp. 1987–1998,
October, 2004.
[16] F.Hao, H. Daugman and P. Zieliski, ―A fast search
algorithm for a large fuzzy database‖, IEEE Trans. on
Information Forensics Security, vol.2, no.2, pp.203–
212, June, 2008.
IJTET©2015
38

Contenu connexe

Tendances

Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...ijsrd.com
 
National Flags Recognition Based on Principal Component Analysis
National Flags Recognition Based on Principal Component AnalysisNational Flags Recognition Based on Principal Component Analysis
National Flags Recognition Based on Principal Component Analysisijtsrd
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformCSCJournals
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...IRJET Journal
 
Survey on content based image retrieval techniques
Survey on content based image retrieval techniquesSurvey on content based image retrieval techniques
Survey on content based image retrieval techniqueseSAT Publishing House
 
Palm print recognition based on harmony search algorithm
Palm print recognition based on harmony search algorithm  Palm print recognition based on harmony search algorithm
Palm print recognition based on harmony search algorithm IJECEIAES
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Extraction of spots in dna microarrays using genetic algorithm
Extraction of spots in dna microarrays using genetic algorithmExtraction of spots in dna microarrays using genetic algorithm
Extraction of spots in dna microarrays using genetic algorithmsipij
 
22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)IAESIJEECS
 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...sipij
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEditor IJMTER
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONNEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONijsc
 
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...CSCJournals
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 

Tendances (17)

Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...
 
National Flags Recognition Based on Principal Component Analysis
National Flags Recognition Based on Principal Component AnalysisNational Flags Recognition Based on Principal Component Analysis
National Flags Recognition Based on Principal Component Analysis
 
Efficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet TransformEfficient Small Template Iris Recognition System Using Wavelet Transform
Efficient Small Template Iris Recognition System Using Wavelet Transform
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
 
Survey on content based image retrieval techniques
Survey on content based image retrieval techniquesSurvey on content based image retrieval techniques
Survey on content based image retrieval techniques
 
Palm print recognition based on harmony search algorithm
Palm print recognition based on harmony search algorithm  Palm print recognition based on harmony search algorithm
Palm print recognition based on harmony search algorithm
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Extraction of spots in dna microarrays using genetic algorithm
Extraction of spots in dna microarrays using genetic algorithmExtraction of spots in dna microarrays using genetic algorithm
Extraction of spots in dna microarrays using genetic algorithm
 
22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)
 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
 
G0333946
G0333946G0333946
G0333946
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONNEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
 
A05610109
A05610109A05610109
A05610109
 
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 

En vedette

Photovoltaic Management System in Residential Areas Using Power Line Communic...
Photovoltaic Management System in Residential Areas Using Power Line Communic...Photovoltaic Management System in Residential Areas Using Power Line Communic...
Photovoltaic Management System in Residential Areas Using Power Line Communic...IJTET Journal
 
Intelligent Workload Management in Virtualized Cloud Environment
Intelligent Workload Management in Virtualized Cloud EnvironmentIntelligent Workload Management in Virtualized Cloud Environment
Intelligent Workload Management in Virtualized Cloud EnvironmentIJTET Journal
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsIJTET Journal
 
Design of Isotropic Planar Antenna for Radio Frequency Identification
Design of Isotropic Planar Antenna for Radio Frequency IdentificationDesign of Isotropic Planar Antenna for Radio Frequency Identification
Design of Isotropic Planar Antenna for Radio Frequency IdentificationIJTET Journal
 
Summarization Techniques in Association Rule Data Mining For Risk Assessment ...
Summarization Techniques in Association Rule Data Mining For Risk Assessment ...Summarization Techniques in Association Rule Data Mining For Risk Assessment ...
Summarization Techniques in Association Rule Data Mining For Risk Assessment ...IJTET Journal
 
Robust Human Emotion Analysis Using LBP, GLCM and PNN Classifier
Robust Human Emotion Analysis Using LBP, GLCM and PNN ClassifierRobust Human Emotion Analysis Using LBP, GLCM and PNN Classifier
Robust Human Emotion Analysis Using LBP, GLCM and PNN ClassifierIJTET Journal
 
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...IJTET Journal
 
Internet Path Selection on Video QoE Analysis and Improvements
Internet Path Selection on Video QoE Analysis and ImprovementsInternet Path Selection on Video QoE Analysis and Improvements
Internet Path Selection on Video QoE Analysis and ImprovementsIJTET Journal
 
Dual Steganography for Hiding Video in Video
Dual Steganography for Hiding Video in VideoDual Steganography for Hiding Video in Video
Dual Steganography for Hiding Video in VideoIJTET Journal
 
Dimensionality Reduction Techniques for Document Clustering- A Survey
Dimensionality Reduction Techniques for Document Clustering- A SurveyDimensionality Reduction Techniques for Document Clustering- A Survey
Dimensionality Reduction Techniques for Document Clustering- A SurveyIJTET Journal
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
 
Text Categorization Using Improved K Nearest Neighbor Algorithm
Text Categorization Using Improved K Nearest Neighbor AlgorithmText Categorization Using Improved K Nearest Neighbor Algorithm
Text Categorization Using Improved K Nearest Neighbor AlgorithmIJTET Journal
 
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...IJTET Journal
 
Speech Analysis and synthesis using Vocoder
Speech Analysis and synthesis using VocoderSpeech Analysis and synthesis using Vocoder
Speech Analysis and synthesis using VocoderIJTET Journal
 
Fuzzy Logic Controller for Four Quadrant Operation of Three Phase BLDC Motor
Fuzzy Logic Controller for Four Quadrant Operation of Three Phase BLDC MotorFuzzy Logic Controller for Four Quadrant Operation of Three Phase BLDC Motor
Fuzzy Logic Controller for Four Quadrant Operation of Three Phase BLDC MotorIJTET Journal
 
Detection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNDetection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNIJTET Journal
 
An efficient concurrent access on cloud database using secureDBAAS
An efficient concurrent access on cloud database using secureDBAASAn efficient concurrent access on cloud database using secureDBAAS
An efficient concurrent access on cloud database using secureDBAASIJTET Journal
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesIJTET Journal
 

En vedette (19)

Photovoltaic Management System in Residential Areas Using Power Line Communic...
Photovoltaic Management System in Residential Areas Using Power Line Communic...Photovoltaic Management System in Residential Areas Using Power Line Communic...
Photovoltaic Management System in Residential Areas Using Power Line Communic...
 
Intelligent Workload Management in Virtualized Cloud Environment
Intelligent Workload Management in Virtualized Cloud EnvironmentIntelligent Workload Management in Virtualized Cloud Environment
Intelligent Workload Management in Virtualized Cloud Environment
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETs
 
Design of Isotropic Planar Antenna for Radio Frequency Identification
Design of Isotropic Planar Antenna for Radio Frequency IdentificationDesign of Isotropic Planar Antenna for Radio Frequency Identification
Design of Isotropic Planar Antenna for Radio Frequency Identification
 
Summarization Techniques in Association Rule Data Mining For Risk Assessment ...
Summarization Techniques in Association Rule Data Mining For Risk Assessment ...Summarization Techniques in Association Rule Data Mining For Risk Assessment ...
Summarization Techniques in Association Rule Data Mining For Risk Assessment ...
 
Robust Human Emotion Analysis Using LBP, GLCM and PNN Classifier
Robust Human Emotion Analysis Using LBP, GLCM and PNN ClassifierRobust Human Emotion Analysis Using LBP, GLCM and PNN Classifier
Robust Human Emotion Analysis Using LBP, GLCM and PNN Classifier
 
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
 
Internet Path Selection on Video QoE Analysis and Improvements
Internet Path Selection on Video QoE Analysis and ImprovementsInternet Path Selection on Video QoE Analysis and Improvements
Internet Path Selection on Video QoE Analysis and Improvements
 
Dual Steganography for Hiding Video in Video
Dual Steganography for Hiding Video in VideoDual Steganography for Hiding Video in Video
Dual Steganography for Hiding Video in Video
 
ICICCE0293
ICICCE0293ICICCE0293
ICICCE0293
 
Dimensionality Reduction Techniques for Document Clustering- A Survey
Dimensionality Reduction Techniques for Document Clustering- A SurveyDimensionality Reduction Techniques for Document Clustering- A Survey
Dimensionality Reduction Techniques for Document Clustering- A Survey
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
Text Categorization Using Improved K Nearest Neighbor Algorithm
Text Categorization Using Improved K Nearest Neighbor AlgorithmText Categorization Using Improved K Nearest Neighbor Algorithm
Text Categorization Using Improved K Nearest Neighbor Algorithm
 
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...
A Novel Resource Allocation Method For Multicasting Network Using Call Admiss...
 
Speech Analysis and synthesis using Vocoder
Speech Analysis and synthesis using VocoderSpeech Analysis and synthesis using Vocoder
Speech Analysis and synthesis using Vocoder
 
Fuzzy Logic Controller for Four Quadrant Operation of Three Phase BLDC Motor
Fuzzy Logic Controller for Four Quadrant Operation of Three Phase BLDC MotorFuzzy Logic Controller for Four Quadrant Operation of Three Phase BLDC Motor
Fuzzy Logic Controller for Four Quadrant Operation of Three Phase BLDC Motor
 
Detection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSNDetection of Distributed Clone Attacks for Safety Transactions in WSN
Detection of Distributed Clone Attacks for Safety Transactions in WSN
 
An efficient concurrent access on cloud database using secureDBAAS
An efficient concurrent access on cloud database using secureDBAASAn efficient concurrent access on cloud database using secureDBAAS
An efficient concurrent access on cloud database using secureDBAAS
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
 

Similaire à A Fast and Accurate Palmprint Identification System based on Consistency Orientation Pattern

Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionprjpublications
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prj_publication
 
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...ijcsa
 
Palmprint and Handgeometry Recognition using FAST features and Region properties
Palmprint and Handgeometry Recognition using FAST features and Region propertiesPalmprint and Handgeometry Recognition using FAST features and Region properties
Palmprint and Handgeometry Recognition using FAST features and Region propertiesEditor IJCATR
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...INFOGAIN PUBLICATION
 
Feature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A SurveyFeature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A SurveyAIRCC Publishing Corporation
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
 
Off-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative SurveyOff-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative Surveyidescitation
 
Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)IRJET Journal
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
Palmprint Identification Based on Principle Line Using Machine Learning Tech...
Palmprint Identification Based on Principle Line Using Machine  Learning Tech...Palmprint Identification Based on Principle Line Using Machine  Learning Tech...
Palmprint Identification Based on Principle Line Using Machine Learning Tech...IJMER
 
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET Journal
 
Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...ijfcstjournal
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
 
Shape based plagiarism detection for flowchart figures in texts
Shape based plagiarism detection for flowchart figures in textsShape based plagiarism detection for flowchart figures in texts
Shape based plagiarism detection for flowchart figures in textsijcsit
 
Shape-Based Plagiarism Detection for Flowchart Figures in Texts
Shape-Based Plagiarism Detection for Flowchart Figures in TextsShape-Based Plagiarism Detection for Flowchart Figures in Texts
Shape-Based Plagiarism Detection for Flowchart Figures in TextsSENOSY ARRISH
 
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...theijes
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 

Similaire à A Fast and Accurate Palmprint Identification System based on Consistency Orientation Pattern (20)

Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
 
Palmprint and Handgeometry Recognition using FAST features and Region properties
Palmprint and Handgeometry Recognition using FAST features and Region propertiesPalmprint and Handgeometry Recognition using FAST features and Region properties
Palmprint and Handgeometry Recognition using FAST features and Region properties
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
 
Feature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A SurveyFeature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A Survey
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
 
Off-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative SurveyOff-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative Survey
 
Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
Palmprint Identification Based on Principle Line Using Machine Learning Tech...
Palmprint Identification Based on Principle Line Using Machine  Learning Tech...Palmprint Identification Based on Principle Line Using Machine  Learning Tech...
Palmprint Identification Based on Principle Line Using Machine Learning Tech...
 
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
 
Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
 
Shape based plagiarism detection for flowchart figures in texts
Shape based plagiarism detection for flowchart figures in textsShape based plagiarism detection for flowchart figures in texts
Shape based plagiarism detection for flowchart figures in texts
 
Shape-Based Plagiarism Detection for Flowchart Figures in Texts
Shape-Based Plagiarism Detection for Flowchart Figures in TextsShape-Based Plagiarism Detection for Flowchart Figures in Texts
Shape-Based Plagiarism Detection for Flowchart Figures in Texts
 
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approach
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 

Plus de IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityIJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesIJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterIJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
 

Plus de IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 

Dernier

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Dernier (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

A Fast and Accurate Palmprint Identification System based on Consistency Orientation Pattern

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303 A Fast and Accurate Palmprint Identification System based on Consistency Orientation Pattern M. Logapreethi1 1 Department of Computer Science & Engineering, Bannari Amman Institute of Technology, Anna University, logapreethi92@gmail.com N. B. Mahesh Kumar2 2 Department of Computer Science & Engineering, Bannari Amman Institute of Technology, Anna University, mknbmaheshkumar@gmail.com Abstract — A palmprint identification system is a relatively most promising physiological biometric approach to identify the person. The numbers of palmprint recognition based biometric system have been successfully applied for real world access to control applications. A typical palmprint identification system identifies a query palmprint and matching it with the template stored in the database and comparing the similarity score with a pre-defined threshold. The Consistency Orientation Pattern (COP) hashing method is implemented in this work to enforce the fast search and to obtain the accurate result. Orientation pattern (OP) is defined as a collection of orientation features at arbitrary positions. The principal palm line is a kind of evident and stable features in palmprint images, and the orientation features in this region are expected to be more consistent than others. Using the orientation and response features extracted by steerable filter and gives an analysis on the consistency of orientation features, and then introduces a method to construct COP using the consistent features. Those features can be used as the indexes to the target template. Because the COP is very stable across the samples of the same subject, the COP hashing method can find the target template quickly. This method can lead to early termination of the searching process. Index Terms — Consistency, hashing, orientation pattern, principal palm line, searching and steerable filter. 1 INTRODUCTION Biometrics refers to metrics related to human characteristics and traits. Biometrics authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups. It is wide acceptance in network society due to its security, reliability and uniqueness. The great challenge to biometrics is thus to improve recognition performance in terms of both accuracy and efficiency and be maximally resistant to illusory practices. The characteristics of biometrics are distinguished into two main categories such as physiological and behavioral. The physical biometrics is fingerprint, palm print, face, iris etc. The behavioural biometrics is voice, gesture, signature etc. IJTET©2015 A palm is the inner region between wrist and the fingers. Palmprint recognition, a relatively novel but promising biometric technology, has received considerable research interests in the current decade. Like finger prints, palms of the human needless comprise unique pattern of elevations and valleys. Since palm is larger than a finger, palmprint is predictable to be even faster than finger print. The forthright biometric system should use a high- resolution palmprint scanner and it assembles all the structures of the palm such as hand geometry, ridge and valley topographies, principal lines, and wrinkles. The characteristics of palmprint are uniqueness, reliability, security and performance. 32 A
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303 A coordinate system is set up on basis of the boundaries of fingers so as to extract a central part of a palmprint for feature extraction. The palmprint authentication system can operate in two modes, enrollment and verification. In the enrollment mode, a user is to provide several palmprint samples to the system. The samples are captured by a palmprint scanner and passes through preprocessing and feature extraction to produce the templates stored in a given database. In the verification mode, the user is asked to provide his/her user ID and his/her palmprint sample. Normally the regions of the human palm contain three flexion creases, secondary creases and ridges. The flexion creases are also called principal lines and secondary creases are called wrinkles. Fig.1 Feature of principal palm line The flexion creases are also called principal lines and secondary creases are called wrinkles. The figure 1.1 illustrates the features of principle palm lines that could be used to uniquely identify a person. Six major types of features can be observed on a palm. a) Geometry Feature: According to the palm shape, we can easily get the corresponding geometry feature such as width, length and area. IJTET©2015 b) Principal line feature: The principal lines in a palmprint are very paramount physiological characteristic for single out the individual because they are very staunch and indisputable. Three persistent lines such as, the heart line, the head line and the life line are specified feature in the principal palm line and which is consistent. c) Wrinkles: In a palmprint there are many wrinkles are available bur wrinkles different from the principal lines. Those principle lines are fragile and more weaving. Wrinkles are classified as coarse wrinkles and fine wrinkles so that it falls on difficulty to identify the more features in detail can be acquired. d) Datum points: Two end points called datum points are obtained by using the principal lines. These intersect on both sides of a palm and provide a stable way to register palmprint. e) Delta point feature: The delta point is defined as the center of a delta like region in the palmprint. f) Minutiae: A palmprint is basically composes of the rides, allowing the minutiae feature to be used as another significant measurement. For the fast identification task, main goal is to find the target template by matching the query with the minimum number of candidate templates. So that the consistent feature of the query can serve as the indexes to find the target template. Classification approach, hierarchical approach, coding approach, hashing and many more techniques has been used for the searching process. In that hashing is the best technique to enforce the fast search using the consistency analysis by constructing the COP. 2. RELATED WORK Wu et al. [15] has been applied the classification approach for palmprint identification system, it divides palmprints into several classes and match the query only with the templates in its class. 33
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303 The classes used in this method are unbalanced. However, this strategy speeds up the searching process but does not obtain the high accuracy. You et al. [4] was implemented the hierarchical matching method. This method typically involves extracting multiple kinds of features and then searching in a layered fashion. Simpler features which can be quickly extracted and matched are used in higher layers to allow a large number of candidates to be discarded. This approach is also similar to classification approach. It increases matching speed at the cost of accuracy. Kong et al. [2] proposed the Competitive coding based approach is the most promising ones because of their small feature size, fast matching speed, and high accuracy. In the feature extraction stage, these methods encode the responses of a bank of filters into bitwise code, and in the matching stage, the similarity score can be efficiently computed by Boolean operators. It achieves the accuracy and speed for small number of input images and datasets, but it does not applicable to the large-scale database. Zhou et al. [12] used the gradient-based approach, the filter-bank based approach which is more robust against noise, and thus has been widely employed to extract orientation features for palmprint recognition. However, when only a small number of filters are used, the extracted orientation feature would be coarse. Hao et al. [16] proposed a beacon guided fast iris search algorithm. In the pre-processing stage, they divided the database into a number of beacon spaces according to a collection of interleaved iris feature. In the searching stage, they proposed the multiple collisions principle to greatly shrink the search range. Evaluations of this method on a large- scale database (over 632,500 templates) show a substantial improvement in search speed with a negligible loss of accuracy. Yue et al. [6] proposed a fast palmprint identification strategy based on competitive code and the cover tree method. Compared with brute force search, this approach can obtain identical identification results, and is 33–50% faster. IJTET©2015 Zuo et al. [13] applied the methods to overcome the previous disadvantage for the fast matching speed of coding-based methods, when applied on a large-scale identification system, it is often necessary to speed up the searching process. Although several strategies have been proposed for fast palmprint identification, these methods, however, either lead to much accuracy loss or only obtain limited speed. Yue et al. [8] improved the method by optimizing the tree structure. The experimental results show that the approach can further speed up the searching process without any accuracy loss, and the speedup can be further enhanced by including more templates per subject in the database. While both methods can reduce the identification time without accuracy loss, the speedups over brute force search are somewhat limited. Besides, these methods are not applicable for the identification systems where only one template per subject is stored in the database. In order to deal with this problem, Zuo et al. [14] proposed a steerable filter based approach for accurate orientation feature extraction and a Generalized Angular Distance (GAD) measure for effective matching of accurate orientations. The GAD has the properties of tolerance for small angular difference and penalty for large angular distance, and thus is more robust against quantization errors. Yue et al. [9] proposed a fast palmprint identification method using orientation pattern (OP) hashing. They introduced three properties required by the hash function and demonstrated that their OP satisfied all of these properties. Experimental results showed that this method could be more than ten times faster than brute force search, depending on the quality of the images in the database, while the identification accuracy almost remains the same. The aim of this research work is to design a fast and accurate palmprint identification system for large-scale database. To perform the processes have to extract the feature that could be done through steerable filter that is based on Orientation Pattern it gives the better result compare with the previous work. 34
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303 For searching the template COP hashing method leads to early termination and achieves the high accuracy compared with the previous work. 3. SYSTEM DESIGN A consistent orientation pattern (COP) hashing method is implemented to enforce the fast and accurate palmprint identification system. At first have to preprocess the image and then extract the orientation features using steerable filter, and then select more consistent ones based on consistency analysis. COPs are then constructed based on the consistent features and are used as the indexes to the target template. Because of the stability of the COP across the samples of the same subject, the proposed COP hashing method can quickly find the target template, leading to early termination of the searching process. Fig 1 depicts the system architecture for proposed system. At first input is taken from various databases or captured images then based on the architecture every process has been performed and finally it identifies the correct template from the various datasets and leads to the early termination. The obtained results are fast and more accurate. Fig 1: System Architecture 3.1 Image Preprocessing The datasets has been collected from various databases [1]. The image preprocessing is the basic stage to process the input image. IJTET©2015 When the input palmprint images are captured, some variations are needed to process the image such as translation and rotation. At first have to translate the input RGB palmprint image into gray scale image, because it contains the low resolution value. On the same time the artifacts noise also be removed. After that ROI region of the palmprint image can be extracted. Then the input image can be enhanced to view the edges and corners of the palmprint image. 3.2 Feature Extraction Using Steerable Filter Steerable filter is an orientation-selective convolution kernel used for image enhancement and feature extraction that can be expressed via linear combination of a small set of rotated versions of itself. As an example, the oriented first derivative of a 2D Gaussian is a steerable filter. The oriented first order derivative can be obtained by taking the dot product of a unit vector oriented in a specific direction with the gradient. The basis filters are the partial derivatives of a 2D Gaussian. Given the filter responses of basis filters, the response at arbitrary orientation can be analytically determined as a function of orientation. In this work, the optimal steerable filter used in and it is adopted for feature extraction. It has eight basis filters, and the synthesized steerable filter is expressed as (1) where h0 is the rotated version of the filter, is the rotation angle, and q0, q1, . . . , q4 can be determined by the filter responses of basis filters and the coefficients of h. 3.3 Consistency Analysis on Orientation Features The features cannot be simply classified as consistent and inconsistent ones since feature consistency seems to be continuously distributed. As for the fast identification task, goal is to find the target template by matching the query with the minimum number of candidate templates. 35
  • 5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303 Thus the query’s orientation features which are more consistent are more appealing, which indicates that the target template would have a high probability to have the same features. As a result, the consistent features of the query can serve as the indexes to the target, and how to find the relatively consistent features is the key to the task. Therefore, we need a single sample based consistency analysis method. This method is based on two reasonable assumptions. First, principal palm line is a kind of evident and stable features in palmprint images, and the orientation features in this region are expected to be more consistent than others. Second, since principal palm line is thick and dark in palmprint images, the minimum filter responses in this region are much lower than those in other regions. Thus the principal line area can be determined by those orientation features with low responses. One can see that the features in the regions corresponding to principal palm lines are relatively consistent. In fact, the structure of principal palm lines can be easily observed from this weight map, which validates the first assumption. It can estimate that most of them locate in the regions are resemble to principal lines, which confirm and validates our second assumption. Thus it can conclude that, it is reasonable to find consistent features by examining the filter responses of a single sample. Besides, the closeness of the orientation to the quantization border should also be considered in consistency analysis. When the orientation corresponding to the minimum response is close to any quantization border, the feature after quantization is likely to be inconsistent because of some factors like the deformation caused by finger movement and inaccurate pre-processing method. To deal with this, we propose to consider two features when orientation is close to any quantization border. For example, when a query comes, if its orientation at one sampling point is between 25 and 35, then the templates whose feature is either 0 or 1 are regarded as candidates. As a result, although the feature may be inconsistent, with the help of consistency analysis, the target template will be successfully retrieved. IJTET©2015 3.4 Hashing based Fast Identification The core of hashing is the design of hash function, especially when the data contain a certain amount of noises. Based on the three properties required by a hash function that is discrimination, consistency, and randomness, this method develops a fast identification method using consistent orientation pattern hashing. a) COP Construction Orientation pattern (OP) is defined as a collection of orientation features at arbitrary positions. If the features are more consistent ones found by consistency analysis, and then call it as consistent orientation pattern (COP). A COP can be determined by two parameters, the size k and the position P. For an example take 5 COPs with size k = 10 that can perform the following operations. After filtering the palmprint image using steerable filter, then sort the filter responses in ascending order and select the first 50 features as consistent features, denoted as cf1, . . . , cf50. Then divide them into 5 groups {cf1, . . . , cf10}, . . . , {cf41, . . . , cf50} and construct 5 COPs. Then call it as sequential COP because the features in the COPs are organized in a sequential fashion. Although the sequential COP is discriminative and consistent, it does not have the randomness property because of the strong local correlation. As can be observed, in each COP a large portion of orientation features located. An inconsistent feature caused by coarse quantization. That the features in each random COP are more scattered, and thus the local correlation of the COP can be greatly reduced. As a result, the random COP satisfies all the three properties required by a hash function and is expected to be more suitable for hashing based fast palmprint identification. 36
  • 6. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303 b) COP Hashing The proposed COP hashing method subsists of two phases such as preprocessing and searching. In the pre-processing stage, first index all the templates in the database according to their orientation features, and build a hash table to facilitate fast searching. And also use two additional tables to record the offset and size of each bin in the hash table. Because there are 6 kinds of orientation features and each template is composed of 1024 features, the hash table has 1024 x 6 bins in total. If there are N templates in the database and each template is identified by a 4-byte integer, then the memory required to store the hash table is 1024 x 4 x N bytes, and the memory required by the other two tables is 1024 x 6 x 4 x 2 = 48 K bytes. In the searching stage, extract the orientation features and the filter responses of the query, sort the filter responses in ascending order, and construct a number of COPs. According to the position and value of the first COP, look up in the hash table to find a collision, and carry out a full match to test whether the similarity score is higher than the threshold. If yes, return the ID and stop the identification process. If not, it should examine the next COP in the same manner until find a match or have to considered all the COPs. 4. CONCLUSION A COP hashing method is implemented for fast palmprint identification. The method is composed of four components: orientation feature extraction, consistency analysis, COP construction, and hashing. The proposed COP hashing method has been applied for several palmprint databases. The COP hashing can obtain comparable accuracy and high speed compared with brute force search, which verifies the effectiveness of the proposed method for fast and accurate palmprint identification. IJTET©2015 REFERENCES [1] W. Jia, D. Huang and Zhang. D, ―Palmprint verification based on robust line orientation code‖, J. Pattern Recognition, vol. 41, no. 1, pp.1521-1530, May 2008. [2] A. Kong and D. Zhang, ―Competitive coding scheme for palmprint verification‖, Proc. Int’l Conf. Pattern Recognition, pp. 520–523, 2004. [3] A. Kong, D. Zhan and M. Kamel, ―Palmprint identification using feature-level fusion‖, J. Pattern Recognition, vol. 39. no. 3, pp.478–487, March, 2006. [4] J. You, W. Kong and D. Zhang, ―Hierarchical palmprint identification via multiple feature extraction‖, J. Pattern Recognition, vol. 35, no. 4, pp. 847–859, April, 2002. [5] F. Yue and W. Zuo, ―Consistency analysis on orientation feature for fast and accurate Palmprint Identification‖, J. Information Science, vol. 268, no. 2, pp. 78-90, August, 2013. [6] F. Yue, B. Li, M. Yu and J. Wang, ―Fast palmprint identification using orientation pattern hashing‖, Proc. Int’l Conf. Hand-based Biometrics, pp. 94–99, 2011. [7] F. Yue, W. Zuo and D. Zhang, ―Competitive code- based fast palmprint identification using a set of cover trees‖, J. Optical Engineering, vol. 48, no. 6, pp. 1–7, 2009. [8] F. Yue, W. Zuo, D. Zhang and B. Li, ―Fast palmprint identification with multiple templates per subject‖, J. Pattern Recognition, vol. 32, no. 8, pp. 1108–1118, June, 2011. [9] D. Zhang, W. Kong, J. You and M. Wong, ―On-line palmprint identification‖, IEEE Trans. on Pattern Analysis and Machine Intellegience, vol. 25, no. 9, pp. 1041–1050, September, 2003. [10] D. Zhang, W. Zuo and F. Yue, ―A comparative study of palmprint recognition algorithms‖, ACM Computer Survey, vol. 44, no. 1, 2012. [11] L. Zhang and D. Zhang, ―Characterization of palmprints by wavelet signatures via directional context modelling‖, IEEE Trans. on System Man Cybernetics, vol. 34, no .3, pp. 1335–1347, June, 2004. 37
  • 7. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 3 ISSUE 1 –JANUARY 2015 - ISSN: 2349 - 9303 [12] J. Zhou and J. Gu, ―A model-based method for the computation of fingerprints orientation field‖, IEEE Trans. on Image Processing, vol. 13, no. 3, pp.821– 835, June, 2004. [13] W. Zuo, Z. Lin, Z. Guo and D. Zhang, ―The multiscale competitive code via sparse representation for palmprint verification‖, Proc. Int’l Conf. Pattern Recognition, pp. 2265–2272, 2010. [14] W. Zuo, F. Yue and D. Zhang, ―On accurate orientation extraction and appropriate distance measure for low-resolution palmprint recognition‖, J. Pattern Recognition, vol. 44, no. 4, April, 2011. [15] X. Wu, D. Zhang, K. Wang and B. Huang, ―Palmprint classification using principal lines‖, J. Pattern Recognition, vol. 37, no. 10 pp. 1987–1998, October, 2004. [16] F.Hao, H. Daugman and P. Zieliski, ―A fast search algorithm for a large fuzzy database‖, IEEE Trans. on Information Forensics Security, vol.2, no.2, pp.203– 212, June, 2008. IJTET©2015 38