SlideShare a Scribd company logo
1 of 37
+
Hand Geometry Recognition
Lecturer by
Mazin
+
Outline
 Definition
 Evolution
 Properties
 Where used
 Applications
 Equipment
 How it works
 Enrollment
 Verification
1. Image Acquisition
2. Filtering
3. Features extracted
 Advantage and Limitations
 Comparison
+
Definition
 Hand geometry-a biometric that identifies users
by the shape of their hands.
 It uses the measurements of the hand in order to
determine if the hand is a match or not.
 Can use finger length, thickness, and curvature.
 Only for the purposes of verification, not
identification.
+
Evolution
 First devices (1960s) were electromechanical. (Miller’s
“Identimation”) measures length of 4 fingers used in nuclear
weapon industry was retired in 1987
 In the mid-1980’s Sidlauskas developed electronic 3D profile
identification apparatus. capacity 20,000 users. processing time
is 1.2 sec. (1994). weight is 4.5 kg (1994). 9-byte
representation
 It is first mentioned in the early 70’s of the 20th century and it is
older than palm print which is part of dactiloscopy. The first
known use was for security checks in Wall Street.
+ 5
Evolution
+
Properties
 Hand geometry is widely used throughout the
world
 It is used for verification, not identification :
Suitable for medium and low security
applications
 The hand geometry system is coupled with ID
scanning to verify who is entering
 Can be employed in those applications which don't
require extreme security but where robustness
and low-cost are primary issues
+
February 13, 2004
7
Where used
 Access Control
 Used to access Health clubs, Day care centers,
Laboratories, Prisons, etc.
 Time & Attendance
 Application ranges from coal mines to clean rooms.
 Personal Identification
 Newark and Toronto airports; Food Services
systems at the University of Georgia
+ 8
Applications
• 70,000 HandReaders are installed throughout the world.
• The 1996 Olympic Games used HandReaders to protect access to
Olympic Village (65,000 people were enrolled; 1 million transactions
were handled over 28 days).
• Since 1991, at San Francisco Airport, HandReaders produced more
than 100 million verifications (180 doors and 18,000 employees).
• In the United Kingdom, Her majesty’s Prisons rely on the
HandReaders for prisoner and visitor tracing.
• Colleges (ex. University of Georgia) use HandReaders for on-
campus meal programs, safeguard access to dormitories and protect
their computer centers.
• Over 20,000 Owens Illinois employees punch in and out each day
using the HandReader.
• Krispy Cream Doughnuts uses HandReaders for tracking
employee hours at over 30 individual stores.
+
Equipment
 Scanner
 Pins
 Screen
 Punch keys (if desired)
 Swipe (if desired)
+
How it works
 In a broad sense, hand geometry readers measure a user's
hand along many dimensions and compare those
measurements to measurements stored in a file.
 This is done by using a series of algorithms to determine the
measurements of the hand.
+
February 11, 2004
11
Enrollment
 During enrollment:
• pins (pegs) help user to position
his/her hand
• user places his/her hand 3-5 times
• scanner averages measurements and
stores in the database
 Quality of enrollment affects FRR
 Template averaging: updating template
after user is verified
+
February 11, 2004
12
Verification
• User types PIN (key pad)
• Places hand on the platen
Scanner
1. takes measurements
2. extracts features
3. compares previous template with
the input template
4. generates a similarity score
+
Hand Geometry Authentication
+
Verification
 Assuming that there is already images of the hand
on file, these are the steps taken in hand geometry
1. Image Acquisition : Hand is placed on plate
with hand in right position between 6 pins
and an image is taken
2. Filtering : A median filter is applied to the image
3. Features extracted: Necessary features for
comparison are extracted
+
Verification
Make Matching:
 Difference between sample and template is
calculated for each feature
 Person with smallest “absolute difference” in
feature is identified
 repeated for all features
 Person with largest number of features is identified
as a match
Then Results are displayed
+
1. Image Acquisition
Image Acquisition
Using Pegs
Pegs Free Hand
geometry
+ 17
1. Image Acquisition
+
1. Image Acquisition
A. Hand geometry sensing device B. Incorrect placement of hand
+
1. Image Acquisition
 Many hand geometry systems have pegs guided hand
placement
 The image of the hand is captured using ordinary digital
camera taken in 8-bit grayscale, size 640x480 pixels.
 Length of the fingers, their width, thickness, curvature and
relative location of all mentioned features are different among
all people
 scanners usually use ordinary CCD camera, sometimes with
infrared light and reflectors that are being used for image
capturing
 document scanners are also commonly used for capturing
hand image
+
1. Image Acquisition
 place it on a semitransparent base to achieve better contrast
 document scanners use its technology only and the process is
something slower than one with the digital camera
 It is not interested in fingerprints, palm life lines or other ridges,
colors or even some scars on the hand surface
 The Lateral view of the Hand can also be captured by the
mirror placed in the side to measure heights.
 Dimensions: 8-1/2 inches square by 10 inches in height.
 During sampling process scanner prompts a person to put his
hand on the board, several times
 The hand injury can potentially have great impact on the
recognition system
+
Problems with Using Pegs
Deformation of the Shape of the Hand by the Pegs.
Different Placements of the Same Hand
+
Problems with Using Pegs
+
2. Filtering
A. Binarize the Image.
B. Resizing n Rotation . Deviation of the hand are
corrected
C. Edge Detection Algorithm eg.Sobel Function
+
2. Filtering
(a) Input Image (b)Gray-Scale (c) Before filtering (d)After filtering
+
3. Features extracted
+ 3. Features extracted
+
3. Features extracted
 Features which authors defined in their works and shown in
the Figure are following:
1. Thumb length
2. Index finger length
3. Middle finger length
4. Ring finger length
5. Pinkie length
6. Thumb width
7. Index finger width
8. Middle finger width
9. Ring finger width
10. Pinkie width
11. Thumb circle radius
12. Index circle radius lower
13. Index circle radius upper
14. Middle circle radius lower
+
3. Features extracted
15. Middle circle radius upper
16. Ring circle radius lower
17. Ring circle radius upper
18. Pinkie circle radius lower
19. Pinkie circle radius upper
20. Thumb perimeter
21. Index finger perimeter
22. Middle finger perimeter
23. Ring finger perimeter
24. Pinkie perimeter
25. Thumb area
26. Index finger area
27. Middle finger area
28. Ring finger area
29. Pinkie area
30. Largest inscribed circle radius
+
Commercial (Schlage)
+
Commercial (Schlage)
 One of the leading commercial companies in this field is Schlage.
In their devices a CCD digital camera is used for acquiring a hand
image. This image has size of 32000 pixels
 The device is connected with the computer through application
which enables to see live image of the top side of the hand as well
as side view of the hand
 big rings, bandages or gloves can have great impact on the image
so it could lead to false rejection of the hand.
 The system makes 90 measurements which are stored in the 9B
size template
 The acquisition procedure takes 30 seconds to complete and
during that period user has to place its hand on the device four
times
+
Performance Evaluation
FAR and FRR stands for false acceptance
rate and false rejection rate, respectively.
The FAR and FRR are defined as below:
Equal error rate (EER) where FAR = FRR.
+
A Typical System (example)
The experimental studies on a sample of 800
images (100 people, 8 images for each one)
The main characteristics of HaSIS are as
follows:
 FAR = 0.57 %
 FRR = 0.68 %
 verification time = 0.5 sec.
 enrollment time = 1.5 sec.
+
February 11, 2004
33
Advantage
 Almost all of the working population has hand
 Fast capture/processing: It use low-computational cost
algorithms, which leads to fast results.
 Medium cost as it need a platform and a medium
resolution CCD camera
 Very easy and attractive to users: leading to nearly null
user rejection
+
February 11, 2004
34
Advantage
 Less invasion of privacy and templates cannot be “reverse
engineered” to identify users
 Simple method of sensing
 Computations are easy wherefore system is easy to build
 Easy to integrate with other biometrics as fingerprint
 Storage efficient (9-25 bytes)
+
Limitations
 Large size of hand geometry devices
 Can only be used for verification
 Many hands are very similar in shape and size,
system may confuse someone else’s hand for
yours
 Would have to be combined with another system
in order for complete identification
 Training required
 Some people do not have hands or measurable
fingers for various reasons
+ Comparison between biometrics
+
Thank you

More Related Content

What's hot

Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition Systemchristywong1234
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System123456chan
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentationAlexandru Dorobantu
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint TechnologyJoy Dutta
 
Presentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemPresentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemShakti Patil
 
Ear recognition system
Ear recognition systemEar recognition system
Ear recognition systemPiyush Mittal
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature RecognizationFaimin Khan
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication systemMazin Alwaaly
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification Being Topper
 

What's hot (20)

Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Presentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemPresentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification System
 
Ear recognition system
Ear recognition systemEar recognition system
Ear recognition system
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 

Similar to Pattern recognition Hand Geometry

Controlling Mouse Movements Using hand Gesture And X box 360
Controlling Mouse Movements Using hand Gesture And X box 360Controlling Mouse Movements Using hand Gesture And X box 360
Controlling Mouse Movements Using hand Gesture And X box 360IRJET Journal
 
Design and Implementation of Optical Palm Scanner
Design and Implementation of Optical Palm ScannerDesign and Implementation of Optical Palm Scanner
Design and Implementation of Optical Palm Scannerdbpublications
 
Computer vision for interactive computer graphics
Computer vision for interactive computer graphicsComputer vision for interactive computer graphics
Computer vision for interactive computer graphicsShah Alam Sabuj
 
Medical Handsfree System - Project Paper
Medical Handsfree System - Project PaperMedical Handsfree System - Project Paper
Medical Handsfree System - Project PaperGuy Peleg
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric systemBhavi Bhatia
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 
Accessing Operating System using Finger Gesture
Accessing Operating System using Finger GestureAccessing Operating System using Finger Gesture
Accessing Operating System using Finger GestureIRJET Journal
 
TOUCHLESS ECOSYSTEM USING HAND GESTURES
TOUCHLESS ECOSYSTEM USING HAND GESTURESTOUCHLESS ECOSYSTEM USING HAND GESTURES
TOUCHLESS ECOSYSTEM USING HAND GESTURESIRJET Journal
 
Sign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesSign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesIRJET Journal
 
Real time human-computer interaction
Real time human-computer interactionReal time human-computer interaction
Real time human-computer interactionijfcstjournal
 
IRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture RecognitionIRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture RecognitionIRJET Journal
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithmijcisjournal
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 

Similar to Pattern recognition Hand Geometry (20)

H03201039049
H03201039049H03201039049
H03201039049
 
Controlling Mouse Movements Using hand Gesture And X box 360
Controlling Mouse Movements Using hand Gesture And X box 360Controlling Mouse Movements Using hand Gesture And X box 360
Controlling Mouse Movements Using hand Gesture And X box 360
 
Seminar
SeminarSeminar
Seminar
 
Design and Implementation of Optical Palm Scanner
Design and Implementation of Optical Palm ScannerDesign and Implementation of Optical Palm Scanner
Design and Implementation of Optical Palm Scanner
 
Computer vision for interactive computer graphics
Computer vision for interactive computer graphicsComputer vision for interactive computer graphics
Computer vision for interactive computer graphics
 
Medical Handsfree System - Project Paper
Medical Handsfree System - Project PaperMedical Handsfree System - Project Paper
Medical Handsfree System - Project Paper
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Accessing Operating System using Finger Gesture
Accessing Operating System using Finger GestureAccessing Operating System using Finger Gesture
Accessing Operating System using Finger Gesture
 
TOUCHLESS ECOSYSTEM USING HAND GESTURES
TOUCHLESS ECOSYSTEM USING HAND GESTURESTOUCHLESS ECOSYSTEM USING HAND GESTURES
TOUCHLESS ECOSYSTEM USING HAND GESTURES
 
Sign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesSign Language Identification based on Hand Gestures
Sign Language Identification based on Hand Gestures
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
Real time human-computer interaction
Real time human-computer interactionReal time human-computer interaction
Real time human-computer interaction
 
IRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture RecognitionIRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture Recognition
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 

More from Mazin Alwaaly

Pattern recognition voice biometrics
Pattern recognition voice biometricsPattern recognition voice biometrics
Pattern recognition voice biometricsMazin Alwaaly
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signatureMazin Alwaaly
 
Pattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earPattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earMazin Alwaaly
 
Pattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionPattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionMazin Alwaaly
 
Pattern recognition forensic dental identification
Pattern recognition forensic dental identificationPattern recognition forensic dental identification
Pattern recognition forensic dental identificationMazin Alwaaly
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprintsMazin Alwaaly
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometricMazin Alwaaly
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMazin Alwaaly
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
 
Multimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMultimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMazin Alwaaly
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithmsMazin Alwaaly
 
Multimedia lossless compression algorithms
Multimedia lossless compression algorithmsMultimedia lossless compression algorithms
Multimedia lossless compression algorithmsMazin Alwaaly
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniquesMazin Alwaaly
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standardsMazin Alwaaly
 
Multimedia fundamental concepts in video
Multimedia fundamental concepts in videoMultimedia fundamental concepts in video
Multimedia fundamental concepts in videoMazin Alwaaly
 
Multimedia color in image and video
Multimedia color in image and videoMultimedia color in image and video
Multimedia color in image and videoMazin Alwaaly
 
Multimedia graphics and image data representation
Multimedia graphics and image data representationMultimedia graphics and image data representation
Multimedia graphics and image data representationMazin Alwaaly
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 

More from Mazin Alwaaly (20)

Pattern recognition voice biometrics
Pattern recognition voice biometricsPattern recognition voice biometrics
Pattern recognition voice biometrics
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
Pattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earPattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and ear
 
Pattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionPattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognition
 
Pattern recognition forensic dental identification
Pattern recognition forensic dental identificationPattern recognition forensic dental identification
Pattern recognition forensic dental identification
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprints
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometric
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networks
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Multimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMultimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital libraries
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithms
 
Multimedia lossless compression algorithms
Multimedia lossless compression algorithmsMultimedia lossless compression algorithms
Multimedia lossless compression algorithms
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniques
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standards
 
Multimedia fundamental concepts in video
Multimedia fundamental concepts in videoMultimedia fundamental concepts in video
Multimedia fundamental concepts in video
 
Multimedia color in image and video
Multimedia color in image and videoMultimedia color in image and video
Multimedia color in image and video
 
Multimedia graphics and image data representation
Multimedia graphics and image data representationMultimedia graphics and image data representation
Multimedia graphics and image data representation
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 

Recently uploaded

insect anatomy and insect body wall and their physiology
insect anatomy and insect body wall and their  physiologyinsect anatomy and insect body wall and their  physiology
insect anatomy and insect body wall and their physiologyDrAnita Sharma
 
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRCall Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRlizamodels9
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxFarihaAbdulRasheed
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫qfactory1
 
Temporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of MasticationTemporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of Masticationvidulajaib
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxNandakishor Bhaurao Deshmukh
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsssuserddc89b
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett SquareIsiahStephanRadaza
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptArshadWarsi13
 
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 

Recently uploaded (20)

insect anatomy and insect body wall and their physiology
insect anatomy and insect body wall and their  physiologyinsect anatomy and insect body wall and their  physiology
insect anatomy and insect body wall and their physiology
 
Volatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -IVolatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -I
 
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRCall Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort ServiceHot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
 
Temporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of MasticationTemporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of Mastication
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physics
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett Square
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.ppt
 
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 

Pattern recognition Hand Geometry

  • 2. + Outline  Definition  Evolution  Properties  Where used  Applications  Equipment  How it works  Enrollment  Verification 1. Image Acquisition 2. Filtering 3. Features extracted  Advantage and Limitations  Comparison
  • 3. + Definition  Hand geometry-a biometric that identifies users by the shape of their hands.  It uses the measurements of the hand in order to determine if the hand is a match or not.  Can use finger length, thickness, and curvature.  Only for the purposes of verification, not identification.
  • 4. + Evolution  First devices (1960s) were electromechanical. (Miller’s “Identimation”) measures length of 4 fingers used in nuclear weapon industry was retired in 1987  In the mid-1980’s Sidlauskas developed electronic 3D profile identification apparatus. capacity 20,000 users. processing time is 1.2 sec. (1994). weight is 4.5 kg (1994). 9-byte representation  It is first mentioned in the early 70’s of the 20th century and it is older than palm print which is part of dactiloscopy. The first known use was for security checks in Wall Street.
  • 6. + Properties  Hand geometry is widely used throughout the world  It is used for verification, not identification : Suitable for medium and low security applications  The hand geometry system is coupled with ID scanning to verify who is entering  Can be employed in those applications which don't require extreme security but where robustness and low-cost are primary issues
  • 7. + February 13, 2004 7 Where used  Access Control  Used to access Health clubs, Day care centers, Laboratories, Prisons, etc.  Time & Attendance  Application ranges from coal mines to clean rooms.  Personal Identification  Newark and Toronto airports; Food Services systems at the University of Georgia
  • 8. + 8 Applications • 70,000 HandReaders are installed throughout the world. • The 1996 Olympic Games used HandReaders to protect access to Olympic Village (65,000 people were enrolled; 1 million transactions were handled over 28 days). • Since 1991, at San Francisco Airport, HandReaders produced more than 100 million verifications (180 doors and 18,000 employees). • In the United Kingdom, Her majesty’s Prisons rely on the HandReaders for prisoner and visitor tracing. • Colleges (ex. University of Georgia) use HandReaders for on- campus meal programs, safeguard access to dormitories and protect their computer centers. • Over 20,000 Owens Illinois employees punch in and out each day using the HandReader. • Krispy Cream Doughnuts uses HandReaders for tracking employee hours at over 30 individual stores.
  • 9. + Equipment  Scanner  Pins  Screen  Punch keys (if desired)  Swipe (if desired)
  • 10. + How it works  In a broad sense, hand geometry readers measure a user's hand along many dimensions and compare those measurements to measurements stored in a file.  This is done by using a series of algorithms to determine the measurements of the hand.
  • 11. + February 11, 2004 11 Enrollment  During enrollment: • pins (pegs) help user to position his/her hand • user places his/her hand 3-5 times • scanner averages measurements and stores in the database  Quality of enrollment affects FRR  Template averaging: updating template after user is verified
  • 12. + February 11, 2004 12 Verification • User types PIN (key pad) • Places hand on the platen Scanner 1. takes measurements 2. extracts features 3. compares previous template with the input template 4. generates a similarity score
  • 14. + Verification  Assuming that there is already images of the hand on file, these are the steps taken in hand geometry 1. Image Acquisition : Hand is placed on plate with hand in right position between 6 pins and an image is taken 2. Filtering : A median filter is applied to the image 3. Features extracted: Necessary features for comparison are extracted
  • 15. + Verification Make Matching:  Difference between sample and template is calculated for each feature  Person with smallest “absolute difference” in feature is identified  repeated for all features  Person with largest number of features is identified as a match Then Results are displayed
  • 16. + 1. Image Acquisition Image Acquisition Using Pegs Pegs Free Hand geometry
  • 17. + 17 1. Image Acquisition
  • 18. + 1. Image Acquisition A. Hand geometry sensing device B. Incorrect placement of hand
  • 19. + 1. Image Acquisition  Many hand geometry systems have pegs guided hand placement  The image of the hand is captured using ordinary digital camera taken in 8-bit grayscale, size 640x480 pixels.  Length of the fingers, their width, thickness, curvature and relative location of all mentioned features are different among all people  scanners usually use ordinary CCD camera, sometimes with infrared light and reflectors that are being used for image capturing  document scanners are also commonly used for capturing hand image
  • 20. + 1. Image Acquisition  place it on a semitransparent base to achieve better contrast  document scanners use its technology only and the process is something slower than one with the digital camera  It is not interested in fingerprints, palm life lines or other ridges, colors or even some scars on the hand surface  The Lateral view of the Hand can also be captured by the mirror placed in the side to measure heights.  Dimensions: 8-1/2 inches square by 10 inches in height.  During sampling process scanner prompts a person to put his hand on the board, several times  The hand injury can potentially have great impact on the recognition system
  • 21. + Problems with Using Pegs Deformation of the Shape of the Hand by the Pegs. Different Placements of the Same Hand
  • 23. + 2. Filtering A. Binarize the Image. B. Resizing n Rotation . Deviation of the hand are corrected C. Edge Detection Algorithm eg.Sobel Function
  • 24. + 2. Filtering (a) Input Image (b)Gray-Scale (c) Before filtering (d)After filtering
  • 26. + 3. Features extracted
  • 27. + 3. Features extracted  Features which authors defined in their works and shown in the Figure are following: 1. Thumb length 2. Index finger length 3. Middle finger length 4. Ring finger length 5. Pinkie length 6. Thumb width 7. Index finger width 8. Middle finger width 9. Ring finger width 10. Pinkie width 11. Thumb circle radius 12. Index circle radius lower 13. Index circle radius upper 14. Middle circle radius lower
  • 28. + 3. Features extracted 15. Middle circle radius upper 16. Ring circle radius lower 17. Ring circle radius upper 18. Pinkie circle radius lower 19. Pinkie circle radius upper 20. Thumb perimeter 21. Index finger perimeter 22. Middle finger perimeter 23. Ring finger perimeter 24. Pinkie perimeter 25. Thumb area 26. Index finger area 27. Middle finger area 28. Ring finger area 29. Pinkie area 30. Largest inscribed circle radius
  • 30. + Commercial (Schlage)  One of the leading commercial companies in this field is Schlage. In their devices a CCD digital camera is used for acquiring a hand image. This image has size of 32000 pixels  The device is connected with the computer through application which enables to see live image of the top side of the hand as well as side view of the hand  big rings, bandages or gloves can have great impact on the image so it could lead to false rejection of the hand.  The system makes 90 measurements which are stored in the 9B size template  The acquisition procedure takes 30 seconds to complete and during that period user has to place its hand on the device four times
  • 31. + Performance Evaluation FAR and FRR stands for false acceptance rate and false rejection rate, respectively. The FAR and FRR are defined as below: Equal error rate (EER) where FAR = FRR.
  • 32. + A Typical System (example) The experimental studies on a sample of 800 images (100 people, 8 images for each one) The main characteristics of HaSIS are as follows:  FAR = 0.57 %  FRR = 0.68 %  verification time = 0.5 sec.  enrollment time = 1.5 sec.
  • 33. + February 11, 2004 33 Advantage  Almost all of the working population has hand  Fast capture/processing: It use low-computational cost algorithms, which leads to fast results.  Medium cost as it need a platform and a medium resolution CCD camera  Very easy and attractive to users: leading to nearly null user rejection
  • 34. + February 11, 2004 34 Advantage  Less invasion of privacy and templates cannot be “reverse engineered” to identify users  Simple method of sensing  Computations are easy wherefore system is easy to build  Easy to integrate with other biometrics as fingerprint  Storage efficient (9-25 bytes)
  • 35. + Limitations  Large size of hand geometry devices  Can only be used for verification  Many hands are very similar in shape and size, system may confuse someone else’s hand for yours  Would have to be combined with another system in order for complete identification  Training required  Some people do not have hands or measurable fingers for various reasons
  • 36. + Comparison between biometrics