SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1904
Human Identification from Palm/Dorsal Veins
Using Auto encoders
Shivam Parab1, Zubair Mujawar2, Dipesh Tandel3, VP Patil4
1,2,3B.E. Student, Department of Computer Engineering
4Vice principal, Smt. Indira Gandhi College of Engineering Navi Mumbai, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - While it might not be prehistoric, biometrics
have been around for a long time. But as technological
advancement has taken place in the last century, biometrics
have also been rapidly developed. Biometrics have gone
from rough methods of classification to being
authenticators of identity having a wide range of uses.
Among these biometrics, palm vein authentication has taken
a significant attention because of its uniqueness, stability,
non-intrusiveness and also for it being contactless biometric.
In this paper, we are proposing a palm vein authentication
system using deep learning models of auto encoders. Firstly,
the palm image is captured while using Infrared LEDs to get
proper vein image. The region of interest (ROI) is extracted
from image of palm. After extracting ROI, image is then
processed by various techniques like gray scaling, histogram
equalization, denoising, thresholding etc. The extracted
threshold image is then passed to auto encoder model. The
model then classifies the image to identify the person whose
palm image it is.
Key Words: Authentication, Recognition, Palm vein,
Biometrics, Autoencoders.
1.INTRODUCTION
In recent years, the demand for biometrics has increased.
The recent pandemic of Covid19 has given rise to increase
in demand and research into contactless biometrics. This
has led to evolution of many biometric applications like
access control systems, attendance systems etc.
Palm vein authentication technology is a type of biometric
authentication done using characteristics of palm and
dorsal veins.
While comparing to other biometrics, palm vein
authentication is far more secure. This is due to it having
the best False Acceptance Rate(FAR) and False Rejection
Rate(FRR).
Table 1 shows the comparison between various biometric
authentication systems based on their FAR and FRR.
Authentication
Method
FAR(%) FRR(%)
Face Recognition ~1.3 ~2.6
Voice Pattern ~0.01 ~0.3
Fingerprint ~0.001 ~0.1
Finger Vein ~0.0001 ~0.01
Iris/Retina ~0.0001 ~0.01
Palm/Dorsal Vein ~0.00001 ~0.01
Table 1: Comparison between various biometric
authentication systems based on their FAR and FRR
Compared to conventional biometric authentication
systems like fingerprint, iris, face, palm print
authentication, the characteristics palm vein pattern has
several advantages. First advantage is complexity of vein
makes it so that it forms unique pattern. The vein pattern
between identical twins is even different. Second
advantage is that vein pattern remains unchanged
throughout a person’s lifetime. Third advantage is that it is
difficult to copy since vein pattern is an internal biometric.
This means that it is present inside of palm and needs to
be captured in a special camera. The biggest advantage is
that vein pattern cannot be forged after death since it
disappears when person dies as it relies on continuous
blood flow in palm. Due to these reasons, palm vein
authentication offers a great research potential and wide
application prospects.
There are four stages in a typical palm vein identification
system: capturing an image of the vein, pre-processing,
particularly in ROI location, feature extraction, and
matching (Figure 1). The collection of palm vein images is
carried out using the method of palm vein image capture.
To extract features from the palm vein picture, pre-
processing splits a section of the image. The pre-processed
palm veins are used for feature extraction, which extracts
useful properties from them. Using a matcher, two palm
vein characteristics are compared, and a database is used
to record the results.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1905
Figure 1: Palm Vein Authentication System Process
After summarizing the basic introduction about palm vein
authentication in this section 1, Further section 2
elaborates the hardware setup used in this research,
section 3 explains about data collection and dataset used
in this research, the image processing done is explained in
section 4. Section 5 elaborates on use of deep learning
model of auto encoders for image classification. Lastly
section 6 summarizes the conclusions and results
obtained.
2. HARDWARE DESIGN AND DATA COLLECTION
The hardware architecture used in this project is explained
in this section. Since palm and dorsal veins are internal
biometrics, they can’t have been seen using normal camera.
The palm and dorsal veins can be easily seen under
infrared light with NoIR camera.
Since infrared light gets absorbed by deoxygenated
haemoglobin flowing towards the lungs through the veins.
The NoIR camera captures the image in which the veins are
seen in black faint lines and background is white.
2.1 Hardware Design
In this project we have made a matrix of infrared LEDs for
appropriate hand geometry. Figure 2.a shows the
hardware architecture of project and Figure 2.b shows the
infrared LED matrix used in this project.
Figure 2.a: Hardware Architecture of our Palm Vein
Authentication System
Figure 2.b: Matrix of Infrared LEDs
2.2 Dataset Collection
In this project we prepared our own dataset using the
hardware setup mentioned in section 2.1. The dataset of
600 images was made. We took 20 images (5 of palm and 5
of dorsal of both hands) each of 30 people as shown in
Figure 4. To obtain more accuracy, Data Augmentation
technique was used. The final dataset of 6000 images was
thus prepared. Figure 3 shows GUI used for Image
Acquisition. Figure 4 shows the dataset of 30 people.
Figure 3: GUI for Image Acquisition
Figure 4: Dataset of 30 people.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1906
3. IMAGE PROCESSING
To extract the vein pattern perfectly, we need to do some
image processing on image that we capture. In this section,
the image processing tasks used in this project to extract
vein pattern are explained. Figure 5 shows the GUI used for
Image Processing.
Figure 5: GUI for Image Processing
3.1 ROI Extraction
After image is captured, we first extract region of interest
(ROI) from it. The ROI for palm veins is whole palm
excluding the fingers, while we are taking the same for
dorsal. Figure 6 shows the ROI Extraction.
Figure 6: ROI Extraction
3.2 Converting ROI to Grayscale
The ROI image that we obtain above, is then converted to
grayscale. The main reason we are gray scaling the image is
that it makes extracting veins easier and also reduces
computational requirements. Figure 7 shows the Grayscale
Image.
Figure 7: Grayscale Image
3.3 Denoising Grayscale Image
We then remove noise from this gray scaled image.
Denoising is done because there may be some distortions
in image which makes it difficult to extract the vein pattern.
Figure 8 shows the Denoised Image.
Figure 8: Denoised Image
3.4 Histogram Equalization
After denoising, we are applying Contrast Limited Adaptive
Histogram Equalization (CLAHE), a histogram equalization
technique to make veins appear more pronounced. CLAHE
is a variant of Adaptive histogram equalization (AHE)
which takes care of over-amplification of the contrast.
CLAHE operates on small regions in the image, called tiles,
rather than the entire image. The neighbouring tiles are
then combined using bilinear interpolation to remove the
artificial boundaries. Figure 9 shows the Contrast Limited
Adaptive Histogram Equalized Image.
Figure 9: Contrast Limited Adaptive Histogram Equalized
Image
3.5 Inverting the Image
We then invert the CLAHE image to get a black and white
image with vein appearing white and rest of background as
black. Colour inversion takes the original colours in an
image, and then applies the colours that are the exact
opposite of those colours. Figure 10 shows the Inverted
Image.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1907
Figure 13: General Pipeline of CAE
Figure 10: Inverted Image
3.6 Skeletonizing Inverted Image
Since inverted image is bit blur, we skeletonize it using
repeated erosion and dilation. Skeletonization reduces the
foreground regions in our binary image to a skeleton
remnant which preserves main content of original image
while discarding most of unneeded original foreground
pixels. Figure 11 shows the Skeletonized Image.
Figure 11: Skeletonized Image
3.7 Thresholding Skeletonized Image
The vein appears faint in skeletonized image, so we apply
thresholding to it. This makes veins appear more
pronounced.
This threshold image is what we are using for our palm
vein authentication system. Figure 12 shows the
Threshold Image.
Figure 12: Threshold Image
4. AUTHENTICATION USING AUTO ENODERS
Our main task in this research project was to correctly
identify a person based on person’s vein pattern. To do this
we need to make a multiclass classification model which
would correctly classify the person based on the vein
pattern.
So we tried to make a multiclass classification model first
using transfer learning. We tried various pretrained
models like VGG16, ResNet50, InceptionResNetV2 etc., But
we found that they weren’t that compatible with our
dataset. The accuracy of these models was coming very low
and they weren’t able to properly classify our dataset. Due
to this, we decided to use Convolution Auto Encoders
(CAEs) for classification.
4.1 Convolution Auto Encoders
Convolution Auto Encoders (CAEs) are unsupervised
dimensionality reduction models composed by convolution
layers capable of creating compressed image
representation. In simple words, CAEs are primarily
utilized for reducing and compressing input dimension
size, removing noise while simultaneously keeping all
useful information and extracting the features.
CAEs are composed of two CNN models, the Encoder and
Decoder. Figure 13 shows the general pipeline of CAE.
The Encoder is mainly used for encoding initial input image
into latent representation which has lower dimension.
Decoder in other case, is responsible for reconstructing the
compressed latent representation creating an output image
which is similar to initial one.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1908
4.2 Proposed Methodology
The figure represents main pipeline of our proposed
convolution auto encoder- convolution neural network
(CAE-CNN) model. In our approach, initially CAE is trained
with our initial training dataset.
When CAE finishes training, the decoder part of CAE is
discarded. The remaining encoder part is used for
compressing the initial image dataset into compressed
image dataset.
Finally, we have connected output of CAE to a fully
connected layer of CNN made up of 128 nodes. This layer is
again fully connected to our output layer which contains
nodes as per our classes used for classification.
The performance of classification model is measured using
accuracy.
4.2 Architecture of our Proposed Model
Our Model is made up of two main parts Encoder and
Decoder.
Encoder has 4 Convolution blocks; each block has a
convolution layer followed by a batch normalization layer.
Max-pooling layer is used after the first and second
convolution blocks.
The first convolution block has 32 filters of size 3 x 3,
followed by a down sampling or max-pooling layer. The
second block has 64 filters of size 3 x 3, followed by
another down sampling layer. The third block of encoder
has 128 filters of size 3 x 3. The fourth block of encoder has
256 filters of size 3 x 3.
Decoder has 3 Convolution blocks; each block has a
convolution layer followed by a batch normalization layer.
Up sampling layer is used after the second and third
convolution blocks.
The first block has 128 filters of size 3 x 3. The second
block has 64 filters of size 3 x 3 followed by another up
sampling layer. The third block has 32 filters of size 3 x 3
followed by another up sampling layer. The final layer of
decoder has 1 filter of size 3 x 3 which reconstructs back
the input having a single channel.
The max-pooling layer down samples the input by two
times each time it is used, while the up sampling layer up
samples the input by two times each time it is used.
After training this model, we use the weights of CAE to
train a model with only the encoder part of model which is
connected with fully connected layers for classification.
Figure 14 shows the architecture of our proposed model.
Figure 14: Architecture of our Proposed Model
5. EXPERIMENTAL RESULTS
Using the model proposed above, we obtained very high
accuracy with very little loss. Figure 15 shows the graph of
train loss vs validation loss.
Figure 15: Graph of train loss vs validation loss
Out of 28 test images, the model correctly classified 24
images. Figure 16 shows the Correctly Classified Images.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1909
Figure 16: Correctly Classified Images
To check if the model was working perfectly, we tested it
using another test image. As we can see in figure a, it was
able to perfectly predict the name of person whose image it
was. Figure 17 shows the GUI showing Correct
Classification of Test Image.
Figure 17: GUI showing Correct Classification of Test
Image.
Using this we got an overall accuracy of 86 %. Figure 18
shows accuracy for seven individual Classes and overall
accuracy of model.
Figure 18: Accuracy for seven individual Classes and
Overall accuracy of model.
6. CONCLUSIONS
In this paper, we proposed and suggested use of
convolution auto encoder- convolution neural network
(CAE-CNN) model for palm vein authentication. This model
can be used to extract features from vein pattern and then
correctly classify it to know the person whose vein pattern
it is.
Palm Vein Technology is highly secure because it uses
information contained within the body and is also highly
accurate because the pattern of veins in the palm is
complex and unique to each individual. Moreover, its
contactless feature gives it a hygienic advantage over other
biometric authentication technologies. This technology can
be adopted to various fields to make better and accurate
access control systems, information systems, etc.
7. FUTURE WORK
In future we aim to investigate better feature extraction
techniques and combine them with our proposed model. In
addition, we aim to make our proposed model more
accurate and efficient. For further improvement of the
system, our future work will focus on extracting the more
features from the palm vein for recognition purpose like
delta points, ridges, etc.
REFERENCES
[1] W. Kang and Q. Wu, "Contactless Palm Vein Recognition
Using a Mutual Foreground-Based Local Binary Pattern," in
IEEE Transactions on Information Forensics and Security,
vol. 9, no. 11, pp. 1974-1985, Nov. 2014, doi:
10.1109/TIFS.2014.2361020.
[2] A Kumar, M. Hanmandlu and H. M. Gupta, "Online biometric
authentication using hand vein patterns," 2009 IEEE
Symposium on Computational Intelligence for Security and
Défense Applications, 2009, pp. 1-7, doi:
10.1109/CISDA.2009.5356554.
[3] A Kumar, M. Hanmandlu, V. K. Madasu and B. C. Lovell,
"Biometric Authentication Based on Infrared Thermal Hand
Vein Patterns," 2009 Digital Image Computing: Techniques
and Applications, 2009, pp. 331-338, doi:
10.1109/DICTA.2009.63.
[4] Shi Zhao, Yi-Ding Wang and Yun-Hong Wang, "Biometric
identification Based on Low Quality Hand Vein Pattern
images", International Conf. on Machine Learning &
Cybernetics, vol. 2, pp. 1172-1177, 12–15 July 2008.
[5] A.K. Jain, S. Prabhakar, and S. Pankanti, “On-Line
Fingerprint Verification”, IEEE Trans. Pattern Analysis and
Machine Intelligence, Vol. 19, pp-302-314, Apr 2000
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1910
[6] A.K. Jain, A. Ross and S. Prabhakar, “An Introduction to
Biometric Recognition”, IEEE Trans. on Circuits and System
for Video Technology, Special Issue on Image and Video-
Based Biometrics, Vol. 14, No. 1, pp. 4-20, January 2004.
[7] S. Zhao, Y-D. Wang and Y-H. Wang, “Biometric
identification Based on Low Quality Hand Vein Pattern
images”, International Conf. on Machine Learning &
Cybernetics, 12-15 July 2008, Vol. 2, pp. 1172 – 1177.
[8] L. Wang, G. Leedham, and S.Y. Cho, "Infrared imaging of
hand vein patterns for biometric purposes", IET ompt. Vis.,
Vol.1, pp. 113-122, 2007.
[9] L. Wang and G. Leedham, “A Thermal Hand Vein Pattern
Verification System”, Lecture Notes in Computer Science,
Vol. 3687, pp. 58-65 October 2005.
[10] C. Y. Suen and T. Y. Zhang, “A Fast Parallel Algorithm for
Thinning Digital Patterns”, Communications of the ACM 27
(3), March 1984.
[11] A. Kumar, M. Hanmandlu and H. M. Gupta, “Online
Biometric Authentication Using Hand Vein Patterns”, IEEE
Symposium: Computational Intelligence for Security and
Defence Applications, Ottawa, Canada, 8-10 July 2009.
[12] David Zhang, Wai-Kin Kong, Jane You, and Michael Wong,
“Online Palmprint Identification”, IEEE Trans. Pattern
Analysis & Machine Intelligence, Vol. 25, No.9, pp. 1041 –
1050, September 2003.
[13] M. Hanmandlu, Amioy Kumar, Vamsi K. Madasu, and
Prasad Yarlagadda, “Fusion of Hand Based Biometrics using
Particle Swarm optimization”, Proc. of the Fifth Int. Conf. on
Information Technology: New Generations, pp.-783-788,
USA, 2008.
[14] Y. Bulatov, S. Jambawalikar, P. Kumar, and S. Sethia, "Hand
recognition using geometric classifiers," ICBA04 Hong
Kong, pp. 753-759, 2013.
[15] A. Bahareh and S. Hamed, "Personal Authentication Using
Hand Geometry," presented at the Computational
Intelligence and Software Engineering, 2009. CiSE 2009.
International Conference, Wuhan, 2009.
[16] M. Ahmed and K. E. Md, "Biometric Authentication from
Low Resolution Hand images Using Radon Transform," in
Computers and Information Technology, 2009. ICCIT '09.
12th International Conference, Dhaka, 21-23 Dec. 2009, pp.
587 - 592.
[17] H. Imtiaz, S. Aich, and S. A. Fattah, "A Novel Preprocessing
Technique or DCT Domain Palmprint Recognition,"
International Journal of Scientific & Technology Research,
vol. 01, pp. 31-35, 2012.
[18] D.-S. Huang, W. Jia, and D. Zhang, "Palm print verification
based on principal lines," Pattern Recognition, pp. 1316-
1328, 2008.
[19] A. K. Jain and N. Duta, "Deformable matching of hand
shapes for user verification," in Proceedings of
International Conference on Image Processing, Kobe,
October 1999, pp. 857-861.
[20] A. Kumar and D. Zhang, "Integrating shape and texture for
hand verification," International Journal of Image and
Graphics, vol. 06, pp. 101-113, 2004.
BIOGRAPHIES
ZUBAIR HAMID MUJAWAR
BE Computer Engineering, SIGCE
DIPESH TANDEL
BE Computer Engineering, SIGCE
SHIVAM PARAB
BE Computer Engineering, SIGCE
DR. V. P. PATIL
Vice Principal & HoD of EXTC,
SIGCE
B.E., M.E., P.hD. in EXTC

More Related Content

Similar to Human Identification from Palm/Dorsal Veins Using Auto encoders

Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition SystemIRJET Journal
 
IRJET - Finger Vein Extraction and Authentication System for ATM
IRJET -  	  Finger Vein Extraction and Authentication System for ATMIRJET -  	  Finger Vein Extraction and Authentication System for ATM
IRJET - Finger Vein Extraction and Authentication System for ATMIRJET Journal
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET Journal
 
Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...IRJET Journal
 
IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...
IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...
IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...IRJET Journal
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...CSCJournals
 
IRJET- Reversible Data Hiding in Video Frames based on Matched Neighbour ...
IRJET-  	  Reversible Data Hiding in Video Frames based on Matched Neighbour ...IRJET-  	  Reversible Data Hiding in Video Frames based on Matched Neighbour ...
IRJET- Reversible Data Hiding in Video Frames based on Matched Neighbour ...IRJET Journal
 
Ladies Compartment Intruder Alert
Ladies Compartment Intruder AlertLadies Compartment Intruder Alert
Ladies Compartment Intruder AlertIRJET Journal
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET Journal
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET Journal
 
IRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET Journal
 
Techniques of Brain Cancer Detection from MRI using Machine Learning
Techniques of Brain Cancer Detection from MRI using Machine LearningTechniques of Brain Cancer Detection from MRI using Machine Learning
Techniques of Brain Cancer Detection from MRI using Machine LearningIRJET Journal
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 
IRJET - Plant Disease Detection using ML and UAV
IRJET - Plant Disease Detection using ML and UAVIRJET - Plant Disease Detection using ML and UAV
IRJET - Plant Disease Detection using ML and UAVIRJET Journal
 
IRJET- Glaucoma Detection using Convolutional Neural Network
IRJET- Glaucoma Detection using Convolutional Neural NetworkIRJET- Glaucoma Detection using Convolutional Neural Network
IRJET- Glaucoma Detection using Convolutional Neural NetworkIRJET Journal
 
IRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET Journal
 
IRJET- Survey on Image Denoising Algorithms
IRJET- Survey on Image Denoising AlgorithmsIRJET- Survey on Image Denoising Algorithms
IRJET- Survey on Image Denoising AlgorithmsIRJET Journal
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET Journal
 
IRJET- Augmented Reality in Surgical Procedures
IRJET- Augmented Reality in Surgical ProceduresIRJET- Augmented Reality in Surgical Procedures
IRJET- Augmented Reality in Surgical ProceduresIRJET Journal
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
 

Similar to Human Identification from Palm/Dorsal Veins Using Auto encoders (20)

Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 
IRJET - Finger Vein Extraction and Authentication System for ATM
IRJET -  	  Finger Vein Extraction and Authentication System for ATMIRJET -  	  Finger Vein Extraction and Authentication System for ATM
IRJET - Finger Vein Extraction and Authentication System for ATM
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...
 
IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...
IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...
IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
 
IRJET- Reversible Data Hiding in Video Frames based on Matched Neighbour ...
IRJET-  	  Reversible Data Hiding in Video Frames based on Matched Neighbour ...IRJET-  	  Reversible Data Hiding in Video Frames based on Matched Neighbour ...
IRJET- Reversible Data Hiding in Video Frames based on Matched Neighbour ...
 
Ladies Compartment Intruder Alert
Ladies Compartment Intruder AlertLadies Compartment Intruder Alert
Ladies Compartment Intruder Alert
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...
 
IRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different Classifier
 
Techniques of Brain Cancer Detection from MRI using Machine Learning
Techniques of Brain Cancer Detection from MRI using Machine LearningTechniques of Brain Cancer Detection from MRI using Machine Learning
Techniques of Brain Cancer Detection from MRI using Machine Learning
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
IRJET - Plant Disease Detection using ML and UAV
IRJET - Plant Disease Detection using ML and UAVIRJET - Plant Disease Detection using ML and UAV
IRJET - Plant Disease Detection using ML and UAV
 
IRJET- Glaucoma Detection using Convolutional Neural Network
IRJET- Glaucoma Detection using Convolutional Neural NetworkIRJET- Glaucoma Detection using Convolutional Neural Network
IRJET- Glaucoma Detection using Convolutional Neural Network
 
IRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET- Note to Coin Converter
IRJET- Note to Coin Converter
 
IRJET- Survey on Image Denoising Algorithms
IRJET- Survey on Image Denoising AlgorithmsIRJET- Survey on Image Denoising Algorithms
IRJET- Survey on Image Denoising Algorithms
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
 
IRJET- Augmented Reality in Surgical Procedures
IRJET- Augmented Reality in Surgical ProceduresIRJET- Augmented Reality in Surgical Procedures
IRJET- Augmented Reality in Surgical Procedures
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 

Human Identification from Palm/Dorsal Veins Using Auto encoders

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1904 Human Identification from Palm/Dorsal Veins Using Auto encoders Shivam Parab1, Zubair Mujawar2, Dipesh Tandel3, VP Patil4 1,2,3B.E. Student, Department of Computer Engineering 4Vice principal, Smt. Indira Gandhi College of Engineering Navi Mumbai, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - While it might not be prehistoric, biometrics have been around for a long time. But as technological advancement has taken place in the last century, biometrics have also been rapidly developed. Biometrics have gone from rough methods of classification to being authenticators of identity having a wide range of uses. Among these biometrics, palm vein authentication has taken a significant attention because of its uniqueness, stability, non-intrusiveness and also for it being contactless biometric. In this paper, we are proposing a palm vein authentication system using deep learning models of auto encoders. Firstly, the palm image is captured while using Infrared LEDs to get proper vein image. The region of interest (ROI) is extracted from image of palm. After extracting ROI, image is then processed by various techniques like gray scaling, histogram equalization, denoising, thresholding etc. The extracted threshold image is then passed to auto encoder model. The model then classifies the image to identify the person whose palm image it is. Key Words: Authentication, Recognition, Palm vein, Biometrics, Autoencoders. 1.INTRODUCTION In recent years, the demand for biometrics has increased. The recent pandemic of Covid19 has given rise to increase in demand and research into contactless biometrics. This has led to evolution of many biometric applications like access control systems, attendance systems etc. Palm vein authentication technology is a type of biometric authentication done using characteristics of palm and dorsal veins. While comparing to other biometrics, palm vein authentication is far more secure. This is due to it having the best False Acceptance Rate(FAR) and False Rejection Rate(FRR). Table 1 shows the comparison between various biometric authentication systems based on their FAR and FRR. Authentication Method FAR(%) FRR(%) Face Recognition ~1.3 ~2.6 Voice Pattern ~0.01 ~0.3 Fingerprint ~0.001 ~0.1 Finger Vein ~0.0001 ~0.01 Iris/Retina ~0.0001 ~0.01 Palm/Dorsal Vein ~0.00001 ~0.01 Table 1: Comparison between various biometric authentication systems based on their FAR and FRR Compared to conventional biometric authentication systems like fingerprint, iris, face, palm print authentication, the characteristics palm vein pattern has several advantages. First advantage is complexity of vein makes it so that it forms unique pattern. The vein pattern between identical twins is even different. Second advantage is that vein pattern remains unchanged throughout a person’s lifetime. Third advantage is that it is difficult to copy since vein pattern is an internal biometric. This means that it is present inside of palm and needs to be captured in a special camera. The biggest advantage is that vein pattern cannot be forged after death since it disappears when person dies as it relies on continuous blood flow in palm. Due to these reasons, palm vein authentication offers a great research potential and wide application prospects. There are four stages in a typical palm vein identification system: capturing an image of the vein, pre-processing, particularly in ROI location, feature extraction, and matching (Figure 1). The collection of palm vein images is carried out using the method of palm vein image capture. To extract features from the palm vein picture, pre- processing splits a section of the image. The pre-processed palm veins are used for feature extraction, which extracts useful properties from them. Using a matcher, two palm vein characteristics are compared, and a database is used to record the results.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1905 Figure 1: Palm Vein Authentication System Process After summarizing the basic introduction about palm vein authentication in this section 1, Further section 2 elaborates the hardware setup used in this research, section 3 explains about data collection and dataset used in this research, the image processing done is explained in section 4. Section 5 elaborates on use of deep learning model of auto encoders for image classification. Lastly section 6 summarizes the conclusions and results obtained. 2. HARDWARE DESIGN AND DATA COLLECTION The hardware architecture used in this project is explained in this section. Since palm and dorsal veins are internal biometrics, they can’t have been seen using normal camera. The palm and dorsal veins can be easily seen under infrared light with NoIR camera. Since infrared light gets absorbed by deoxygenated haemoglobin flowing towards the lungs through the veins. The NoIR camera captures the image in which the veins are seen in black faint lines and background is white. 2.1 Hardware Design In this project we have made a matrix of infrared LEDs for appropriate hand geometry. Figure 2.a shows the hardware architecture of project and Figure 2.b shows the infrared LED matrix used in this project. Figure 2.a: Hardware Architecture of our Palm Vein Authentication System Figure 2.b: Matrix of Infrared LEDs 2.2 Dataset Collection In this project we prepared our own dataset using the hardware setup mentioned in section 2.1. The dataset of 600 images was made. We took 20 images (5 of palm and 5 of dorsal of both hands) each of 30 people as shown in Figure 4. To obtain more accuracy, Data Augmentation technique was used. The final dataset of 6000 images was thus prepared. Figure 3 shows GUI used for Image Acquisition. Figure 4 shows the dataset of 30 people. Figure 3: GUI for Image Acquisition Figure 4: Dataset of 30 people.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1906 3. IMAGE PROCESSING To extract the vein pattern perfectly, we need to do some image processing on image that we capture. In this section, the image processing tasks used in this project to extract vein pattern are explained. Figure 5 shows the GUI used for Image Processing. Figure 5: GUI for Image Processing 3.1 ROI Extraction After image is captured, we first extract region of interest (ROI) from it. The ROI for palm veins is whole palm excluding the fingers, while we are taking the same for dorsal. Figure 6 shows the ROI Extraction. Figure 6: ROI Extraction 3.2 Converting ROI to Grayscale The ROI image that we obtain above, is then converted to grayscale. The main reason we are gray scaling the image is that it makes extracting veins easier and also reduces computational requirements. Figure 7 shows the Grayscale Image. Figure 7: Grayscale Image 3.3 Denoising Grayscale Image We then remove noise from this gray scaled image. Denoising is done because there may be some distortions in image which makes it difficult to extract the vein pattern. Figure 8 shows the Denoised Image. Figure 8: Denoised Image 3.4 Histogram Equalization After denoising, we are applying Contrast Limited Adaptive Histogram Equalization (CLAHE), a histogram equalization technique to make veins appear more pronounced. CLAHE is a variant of Adaptive histogram equalization (AHE) which takes care of over-amplification of the contrast. CLAHE operates on small regions in the image, called tiles, rather than the entire image. The neighbouring tiles are then combined using bilinear interpolation to remove the artificial boundaries. Figure 9 shows the Contrast Limited Adaptive Histogram Equalized Image. Figure 9: Contrast Limited Adaptive Histogram Equalized Image 3.5 Inverting the Image We then invert the CLAHE image to get a black and white image with vein appearing white and rest of background as black. Colour inversion takes the original colours in an image, and then applies the colours that are the exact opposite of those colours. Figure 10 shows the Inverted Image.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1907 Figure 13: General Pipeline of CAE Figure 10: Inverted Image 3.6 Skeletonizing Inverted Image Since inverted image is bit blur, we skeletonize it using repeated erosion and dilation. Skeletonization reduces the foreground regions in our binary image to a skeleton remnant which preserves main content of original image while discarding most of unneeded original foreground pixels. Figure 11 shows the Skeletonized Image. Figure 11: Skeletonized Image 3.7 Thresholding Skeletonized Image The vein appears faint in skeletonized image, so we apply thresholding to it. This makes veins appear more pronounced. This threshold image is what we are using for our palm vein authentication system. Figure 12 shows the Threshold Image. Figure 12: Threshold Image 4. AUTHENTICATION USING AUTO ENODERS Our main task in this research project was to correctly identify a person based on person’s vein pattern. To do this we need to make a multiclass classification model which would correctly classify the person based on the vein pattern. So we tried to make a multiclass classification model first using transfer learning. We tried various pretrained models like VGG16, ResNet50, InceptionResNetV2 etc., But we found that they weren’t that compatible with our dataset. The accuracy of these models was coming very low and they weren’t able to properly classify our dataset. Due to this, we decided to use Convolution Auto Encoders (CAEs) for classification. 4.1 Convolution Auto Encoders Convolution Auto Encoders (CAEs) are unsupervised dimensionality reduction models composed by convolution layers capable of creating compressed image representation. In simple words, CAEs are primarily utilized for reducing and compressing input dimension size, removing noise while simultaneously keeping all useful information and extracting the features. CAEs are composed of two CNN models, the Encoder and Decoder. Figure 13 shows the general pipeline of CAE. The Encoder is mainly used for encoding initial input image into latent representation which has lower dimension. Decoder in other case, is responsible for reconstructing the compressed latent representation creating an output image which is similar to initial one.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1908 4.2 Proposed Methodology The figure represents main pipeline of our proposed convolution auto encoder- convolution neural network (CAE-CNN) model. In our approach, initially CAE is trained with our initial training dataset. When CAE finishes training, the decoder part of CAE is discarded. The remaining encoder part is used for compressing the initial image dataset into compressed image dataset. Finally, we have connected output of CAE to a fully connected layer of CNN made up of 128 nodes. This layer is again fully connected to our output layer which contains nodes as per our classes used for classification. The performance of classification model is measured using accuracy. 4.2 Architecture of our Proposed Model Our Model is made up of two main parts Encoder and Decoder. Encoder has 4 Convolution blocks; each block has a convolution layer followed by a batch normalization layer. Max-pooling layer is used after the first and second convolution blocks. The first convolution block has 32 filters of size 3 x 3, followed by a down sampling or max-pooling layer. The second block has 64 filters of size 3 x 3, followed by another down sampling layer. The third block of encoder has 128 filters of size 3 x 3. The fourth block of encoder has 256 filters of size 3 x 3. Decoder has 3 Convolution blocks; each block has a convolution layer followed by a batch normalization layer. Up sampling layer is used after the second and third convolution blocks. The first block has 128 filters of size 3 x 3. The second block has 64 filters of size 3 x 3 followed by another up sampling layer. The third block has 32 filters of size 3 x 3 followed by another up sampling layer. The final layer of decoder has 1 filter of size 3 x 3 which reconstructs back the input having a single channel. The max-pooling layer down samples the input by two times each time it is used, while the up sampling layer up samples the input by two times each time it is used. After training this model, we use the weights of CAE to train a model with only the encoder part of model which is connected with fully connected layers for classification. Figure 14 shows the architecture of our proposed model. Figure 14: Architecture of our Proposed Model 5. EXPERIMENTAL RESULTS Using the model proposed above, we obtained very high accuracy with very little loss. Figure 15 shows the graph of train loss vs validation loss. Figure 15: Graph of train loss vs validation loss Out of 28 test images, the model correctly classified 24 images. Figure 16 shows the Correctly Classified Images.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1909 Figure 16: Correctly Classified Images To check if the model was working perfectly, we tested it using another test image. As we can see in figure a, it was able to perfectly predict the name of person whose image it was. Figure 17 shows the GUI showing Correct Classification of Test Image. Figure 17: GUI showing Correct Classification of Test Image. Using this we got an overall accuracy of 86 %. Figure 18 shows accuracy for seven individual Classes and overall accuracy of model. Figure 18: Accuracy for seven individual Classes and Overall accuracy of model. 6. CONCLUSIONS In this paper, we proposed and suggested use of convolution auto encoder- convolution neural network (CAE-CNN) model for palm vein authentication. This model can be used to extract features from vein pattern and then correctly classify it to know the person whose vein pattern it is. Palm Vein Technology is highly secure because it uses information contained within the body and is also highly accurate because the pattern of veins in the palm is complex and unique to each individual. Moreover, its contactless feature gives it a hygienic advantage over other biometric authentication technologies. This technology can be adopted to various fields to make better and accurate access control systems, information systems, etc. 7. FUTURE WORK In future we aim to investigate better feature extraction techniques and combine them with our proposed model. In addition, we aim to make our proposed model more accurate and efficient. For further improvement of the system, our future work will focus on extracting the more features from the palm vein for recognition purpose like delta points, ridges, etc. REFERENCES [1] W. Kang and Q. Wu, "Contactless Palm Vein Recognition Using a Mutual Foreground-Based Local Binary Pattern," in IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1974-1985, Nov. 2014, doi: 10.1109/TIFS.2014.2361020. [2] A Kumar, M. Hanmandlu and H. M. Gupta, "Online biometric authentication using hand vein patterns," 2009 IEEE Symposium on Computational Intelligence for Security and Défense Applications, 2009, pp. 1-7, doi: 10.1109/CISDA.2009.5356554. [3] A Kumar, M. Hanmandlu, V. K. Madasu and B. C. Lovell, "Biometric Authentication Based on Infrared Thermal Hand Vein Patterns," 2009 Digital Image Computing: Techniques and Applications, 2009, pp. 331-338, doi: 10.1109/DICTA.2009.63. [4] Shi Zhao, Yi-Ding Wang and Yun-Hong Wang, "Biometric identification Based on Low Quality Hand Vein Pattern images", International Conf. on Machine Learning & Cybernetics, vol. 2, pp. 1172-1177, 12–15 July 2008. [5] A.K. Jain, S. Prabhakar, and S. Pankanti, “On-Line Fingerprint Verification”, IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. 19, pp-302-314, Apr 2000
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1910 [6] A.K. Jain, A. Ross and S. Prabhakar, “An Introduction to Biometric Recognition”, IEEE Trans. on Circuits and System for Video Technology, Special Issue on Image and Video- Based Biometrics, Vol. 14, No. 1, pp. 4-20, January 2004. [7] S. Zhao, Y-D. Wang and Y-H. Wang, “Biometric identification Based on Low Quality Hand Vein Pattern images”, International Conf. on Machine Learning & Cybernetics, 12-15 July 2008, Vol. 2, pp. 1172 – 1177. [8] L. Wang, G. Leedham, and S.Y. Cho, "Infrared imaging of hand vein patterns for biometric purposes", IET ompt. Vis., Vol.1, pp. 113-122, 2007. [9] L. Wang and G. Leedham, “A Thermal Hand Vein Pattern Verification System”, Lecture Notes in Computer Science, Vol. 3687, pp. 58-65 October 2005. [10] C. Y. Suen and T. Y. Zhang, “A Fast Parallel Algorithm for Thinning Digital Patterns”, Communications of the ACM 27 (3), March 1984. [11] A. Kumar, M. Hanmandlu and H. M. Gupta, “Online Biometric Authentication Using Hand Vein Patterns”, IEEE Symposium: Computational Intelligence for Security and Defence Applications, Ottawa, Canada, 8-10 July 2009. [12] David Zhang, Wai-Kin Kong, Jane You, and Michael Wong, “Online Palmprint Identification”, IEEE Trans. Pattern Analysis & Machine Intelligence, Vol. 25, No.9, pp. 1041 – 1050, September 2003. [13] M. Hanmandlu, Amioy Kumar, Vamsi K. Madasu, and Prasad Yarlagadda, “Fusion of Hand Based Biometrics using Particle Swarm optimization”, Proc. of the Fifth Int. Conf. on Information Technology: New Generations, pp.-783-788, USA, 2008. [14] Y. Bulatov, S. Jambawalikar, P. Kumar, and S. Sethia, "Hand recognition using geometric classifiers," ICBA04 Hong Kong, pp. 753-759, 2013. [15] A. Bahareh and S. Hamed, "Personal Authentication Using Hand Geometry," presented at the Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference, Wuhan, 2009. [16] M. Ahmed and K. E. Md, "Biometric Authentication from Low Resolution Hand images Using Radon Transform," in Computers and Information Technology, 2009. ICCIT '09. 12th International Conference, Dhaka, 21-23 Dec. 2009, pp. 587 - 592. [17] H. Imtiaz, S. Aich, and S. A. Fattah, "A Novel Preprocessing Technique or DCT Domain Palmprint Recognition," International Journal of Scientific & Technology Research, vol. 01, pp. 31-35, 2012. [18] D.-S. Huang, W. Jia, and D. Zhang, "Palm print verification based on principal lines," Pattern Recognition, pp. 1316- 1328, 2008. [19] A. K. Jain and N. Duta, "Deformable matching of hand shapes for user verification," in Proceedings of International Conference on Image Processing, Kobe, October 1999, pp. 857-861. [20] A. Kumar and D. Zhang, "Integrating shape and texture for hand verification," International Journal of Image and Graphics, vol. 06, pp. 101-113, 2004. BIOGRAPHIES ZUBAIR HAMID MUJAWAR BE Computer Engineering, SIGCE DIPESH TANDEL BE Computer Engineering, SIGCE SHIVAM PARAB BE Computer Engineering, SIGCE DR. V. P. PATIL Vice Principal & HoD of EXTC, SIGCE B.E., M.E., P.hD. in EXTC