Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Cititul in palma …

21st Century Style
Palmprint Recognition
Alexandru Dorobantu
Architecture of a Palm

Middle finger crease
Middle finger crease

Little finger crease

Five finger crease or
proximal tr...
Palmprint Research
High Resolution

Low Resolution
Cost
Speed
Accuracy
Security
User
Acceptance

Design of a
Biometric System
Palmprint recognition system
1. Palmprint Scanner
2. Preprocessing
3. Feature Extraction
4. Database
5. Matched Results
Palmprint Scanner

 CCD-based

 Digital Cameras
 Digital Scanners
 Video Cameras
Verification Algorithms

Line-based approaches

Subspace-based approach
Statistical approaches
Fusion
Fingerprint
Palm vein
Finger surface
Face
Iris
Head Shape
Wu’s Palm Classification
Palmprint Distribution
5.65 0.36

1.23 2.83
11.81

Cat 1
Cat 2

Cat 3
Cat 4
Cat 5
78.12

Cat 6
Security and Privacy
Security Steps
Verification
Security Threats
Replay attacks
Database attacks

Brute fore attacks

Fus...
Palmprint recognition presentation
Upcoming SlideShare
Loading in …5
×

Palmprint recognition presentation

1,946 views

Published on

Presentation done for school about Palprint recognition systems

Published in: Technology, Art & Photos
  • Be the first to comment

  • Be the first to like this

Palmprint recognition presentation

  1. 1. Cititul in palma … 21st Century Style
  2. 2. Palmprint Recognition Alexandru Dorobantu
  3. 3. Architecture of a Palm Middle finger crease Middle finger crease Little finger crease Five finger crease or proximal traverse Three finger crease or distral traverse Thumb crease
  4. 4. Palmprint Research High Resolution Low Resolution
  5. 5. Cost Speed Accuracy Security User Acceptance Design of a Biometric System
  6. 6. Palmprint recognition system 1. Palmprint Scanner 2. Preprocessing 3. Feature Extraction 4. Database 5. Matched Results
  7. 7. Palmprint Scanner  CCD-based  Digital Cameras  Digital Scanners  Video Cameras
  8. 8. Verification Algorithms Line-based approaches Subspace-based approach Statistical approaches
  9. 9. Fusion Fingerprint Palm vein Finger surface Face Iris Head Shape
  10. 10. Wu’s Palm Classification Palmprint Distribution 5.65 0.36 1.23 2.83 11.81 Cat 1 Cat 2 Cat 3 Cat 4 Cat 5 78.12 Cat 6
  11. 11. Security and Privacy Security Steps Verification Security Threats Replay attacks Database attacks Brute fore attacks Fusion Identification

×