SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 121
Human Identification using Major and Minor Finger Knuckle Pattern
Dr.Raja.M1, Senthilprabhu.S2
, Suriya.A3, Aneesha fathima4
1Professor, Computer Science and Engineering, Dhaanish Ahmed Institute of Technology, Tamil Nadu
2Asst.Professor, Computer Science and Engineering, Dhaanish Ahmed Institute of Technology, Tamil Nadu
3Asst.Professor, Computer Science and Engineering, Dhaanish Ahmed Institute of Technology, Tamil Nadu
4Student, Computer Science and Engineering, Dhaanish Ahmed Institute of Technology, Tamil Nadu
--------------------------------------------------------------------------------***--------------------------------------------------------------------------------
Abstract: The biometrics is the challenging task for researcher .Biometrics based authentication is just impossible to help
us if we don't know what are the requirements .Biometrics authentication must provide the security level, unattended
system, Spoofing and Reliability. Among all the modalities FKP broadly explored which has not yet attracted significant
attention of researchers. Finger knuckle is user centric contactless and unrestricted access control. We have proposed a
novel person identification system that uses knuckle print features extracted by using Radon transform. The knuckle print
image has been viewed as a texture image. The local features from the knuckle print represent the texture information
present in the image in better sense .Radon transform computes the line integral along parallel paths in a certain direction.
Keywords: Finger Biometric, Finger Knuckle Methodology, Pattern Recognition, Finger-vein Identification.
1. INTRODUCTION
As with growth of information technology, the need of
the security has became a prime issue in the area of IT.
The security can be managed in number of ways. One
way to improve security is by identifying or verifying the
person with some technique so, the basic idea is the
identity of the person which can be improve the security.
Secure Computing is information security is applied
computing devices such as computers and smartphones.
Most computer security measures involve data
encryption and passwords. The term “Biometrics“ is
derived from the Greek words “bio”(life) and
“metrics”(to measures). Biometric refers to the
automatic identification of a person based on his /her
physiological or behavioral characteristics. Existing
biometric systems involve various technologies such as
face, iris fingerprint and finger vein recognition. Finger
vein recognition is one of the promising approaches for
human identification because of its advantages on living
body identification and high security. However, upon
image capture, finger vein identification can suffer from
performance degradation caused by illumination
variation, finger positional variation shading and
misalignment. In this paper finger knuckle also be used,
exploring the both major and minor finger knuckle
pattern with features extraction, verifying and
identification. Finger knuckle is user-centric, contactless
and unrestricted access control. We have proposed a
novel person identification system that uses knuckle
print features extracted by using Radon transform.
Advantages of finger knuckle print (FKP) include rich in
texture features, easily accessible, contactless image
acquistion invariant to emotions and other behavioral
aspects such as tiredness, stable features and
acceptability in the society.
1.1 SECURE COMPUTING
Secure computing (also known as cyber security or
computer security) is information security is applied to
computing devices such as computers and smartphones,
as well as computer networks such as private and public
networks, including the internet. In the computer
industry, the term security refers to techniques for
ensuring that data stored in a computer cannot be read
or compromised by any individuals without
authorization. Most computer security measures involve
data encryption and passwords. Data encryption is the
translation of data into form that is unintelligible
without a deciphering mechanism. A password is a
secret word or phrase that gives a user access to a
particular program or system.
Computer security is important because without it, your
computer would by vulnerable to viruses, worms, and
other malicious code. Security tool is a rogue
antispyware program that uses fake security alerts and
system scan results to convince computer user believe
that they must purchase the Security Tool program to
remove the found threats. Security Tool, through the use
of trojans and malicious websites, can be installed onto
your computer without notification.
Most of the time, the term “Computer Security” refers to
the security of a computer's insides. The data and
compendious information that most users store on their
hard drives is often far more valuable than are the
machines themselves. Broadly speaking, the importance
of computer security lies in how harmful it can be if that
data is lost. Many computer users don not realize that
simply accessing the web could be making their
computers more vulnerable. The security has to increas-
erapidly because the attackers are daily increasing. The
users are mostly wanted to secure the information on
their computer because:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
• For ensuring that our information remains
confidential and only those who should access that
information.
• Knowing that no one has been able to change our
information, so we can depend on its accuracy.
Making sure that our information is available when we
need it (by making back-up copies and if appropriate
storing the back-up copies off-site).
Secure Computing Corporation (SCC) is a public
company that developed and sold computer security
appliances and hosted services to protect users and data.
McAfee acquired the company in 2008.
Taking charge of computer security usually is as simply
as installing an antivirus program or purchasing basic
computer security software. The importance of
computer security also extents to computer skills. Users
should educate themselves about the risks of the
Internet, particularly with respect to downloads. They
also should take care when sharing personal
information with untrusted websites and should keep
credit card information closely guarded.
The authentication is one the most widely used forms of
security and forms the most basic security mechanism.
Biometric refers to the automatic identification of a
person based on his/her physiological or behavioral
characteristics.
1.2 BIOMETRIC
This method of identification is preferred over
traditional methods involving passwords and PIN
numbers for various reasons: the person to be identified
is required to be physically present at the point-of-
identification; identification is based on biometric
techniques obviates the need to remember a password
or carry a token. This paper attempts to look at the
various advantages offered by this method of user
authentication and also looks at the pits falls
encountered in its implementation, some of which are
specific to biometrics.
Using biometrics for authentication has obvious
conceptual advantages when compared to the traditional
use of passwords or PINs. In theory, biometric data
cannot be guessed, stolen or shared among users,
therefore providing increased security to a system. It
also relieves the user from the burden of having to
remember a password, or worse multiple passwords for
different systems within an organization.
In addition to authentication, biometric applications are
employed in large-scale identification systems, where
they offer two important benefits: fraud detection and
fraud deterrance. For example, one person can claim
multiple identities, using fraudulent documents, to
receive benefits from a public program. Without the use
of biometrics, it would be extremely difficult to discover
that the person has multiple registrations, considering
the large volume of data stored in the system. Biometrics
can therefore contribute to fraud detection. On the other
hand, the presence of such a feature in a system
introduces a physiological effect on people, as it
dissuades individuals from attempting to register more
than once, as they become aware of the fact the their
unique physiological/behavioral characteristics are used
to identify them. For this effect, biometrics provides the
benefit of fraud deterrance.
There are 3 basic function in any biometric system:
1.2.1 ENROLLMENT
A person's reference data is produced in the enrolment
process. The reference data contains the most basic
information about a person's biometric features. In the
case of the ID Module these are the fingerprint features
or reference data that can be produced from this. During
the subsequent identification and verification processes
in the biometric system, this reference data is used for
comparison with the current features. The enrolment
can be performed by loading biodata or by feeding in the
biodata on the module itself.
1.2.2 VERIFICATION
Verification is checking a person against a predefined
identity. This means that the identity of the expected
person must be known before the start of the verification
process. This can be done for example by entering a
person's name or data, via a keyboard, keypad or card.
1.2.3 IDENTIFICATION
Identification means that the biometric system checks
the identity of the finger specific features that a person
enters through comparison with the archived fingerprint
features of multiple people. The identity of the person
being checked is therefore returned as a result of a
successful identification.
2. PROBLEM DEFINITION
Automated identification of humans using their unique
anatomical characteristics has been increasingly
investigated for their applications in human surveillance
and image forensics. Many traits like fingerprint face iris,
palm vein, DNA and many others have been used for
personal identification. One new biometric trait that has
attracted researchers in the recent years is the finger
knuckle print. Accurate identification of finger knuckle
patterns can be beneficial for several applications
involving forensic and covert identification of suspects.
To build a secure and authenticated system for finger
knuckle.
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 122
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
3. NEED OF FINGER KNUCKLE PRINT
There are many different types of Biometrics, these are,
IRIS Identification, Retinal Identification, Face
Recognition, Voice Recognition, Fingerprint,
Hand/Finger Geometry, Signature verification,
Keystroke Dynamics, and other esoteric biometrics.
Hand-based biometrics, such as fingerprint and hand
geometry, is the most prevalent biometric system in the
marketplace.
However, fingerprint suffers from a major drawback,
which is its proneness to anti-security threats, such as
the reproduction of fingerprints left on surfaces to
deceive the system. On the other hand, the hand
geometry features are not descriptive enough for
identification when the number of users grows larger.
Problem related to other identifiers are as human voice
and signature can be copied, duplicates are available so
face recognition will not be foolproof identifier.
Palm print and finger print can be simultaneous
extracted from the palm side which can give better
performance improvement, but size of finger knuckle is
very small as compared to palm print and offers more
attractive alternative as it requires less processing as
compared to palm print. These biometric identifier
systems can cause problem in children and adults.
Many concepts are proposed to explore an alternative
way to utilize the major knuckle print for human
identification. This biometric system implementation is
contactless and peg-free and free from factors like
tiredness etc. which causes problem in other biometric
identifiers. But in some humans the major knuckle
pattern of finger can be occluded by hair and there are
some cases where only the minor knuckle portions are
visible in forensic images. By considering this problem,
now need to utilize the major and minor portions
simultaneously.
4. PROPOSED SYSTEM
We have proposed a novel person identification system
that uses knuckle print features extracted by using
Radon transform. The knuckle print image has been
viewed as a texture image. The local features from the
knuckle print represent the texture information present
in the image in the better sense. Radon transform
computes the line integral along parallel paths in a
certain direction.
The personal identification system using knuckle prints
operates in two modes namely enrolment phase and
identification phase. During the enrolment phase, several
knuckle prints of the persons obtained from the FKP
scanner are passed to the system. The samples captured
by knuckle print scanner are passed through pre-
processing and feature extraction to produce the
templates which are then stored in the database.
In the identification/recognition mode, the query
knuckle print image is passed to the system. These query
knuckle prints are passed through pre-processing and
feature extraction block. The extracted features from the
query knuckle print are then compared with templates
stored in the database in order to find the correct match.
A distance measure is used to find the close match
between the query knuckle print and the template
imprints stored in the database.
4.1 OVERVIEW OF THE PROJECT
Automated biometric identification using finger knuckle
images has increasingly generated interest among
researchers with emerging applications in human
forensics and biometrics. Prior efforts in the biometrics
literature have only investigated the “major” finger
knuckle patterns that are formed on the finger surface
joining proximal phalanx and middle phalanx bones.
The biometrics is the challenging task for researcher.
Biometrics based authentication is just impossible to
help us if we don't know what are the requirements.
Biometrics authentication must provide the security
level, unattended system, Spoofing and Reliability.
Among all the modalities FKP broadly explored which
has not yet attracted significant attention of researchers.
Finger knuckle is user-centric, contactless and
unrestricted access control. We have proposed a novel
person identification system that uses knuckle print
features extracted by using Radon transform. The
knuckle print image has been viewed as a texture image.
The local features from the knuckle print represent the
texture information present in the image in better sense.
Radon transform computes the line integral along
parallel paths in a certain direction.
The possible use of major finger knuckle patterns which
are formed on the finger surface joining distal phalanx
and middle phalanx bones. The major finger knuckle
patterns can either be used as independent biometric
patterns or employed to improve the performance from
the major finger knuckle patterns. A completely
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 123
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
automated approach for the minor finger knuckle
identification is developed with key steps for region of
interest segmentation, image normalization,
enhancement and robust matching to accommodate
image variations.
The personal identification system using knuckle prints
operates in two modes namely enrolment phase and
identification phase. During the enrolment phase, several
knuckle prints of the persons obtained from the FKP
scanner are passed to the system. The samples captured
by knuckle print scanner are passed through pre-
processing and feature extraction to produce the
templates which are then stored in the database. In the
identification/recognition mode, the query knuckle print
image is passed to the system. The query knuckle prints
are passed through pre-processing and feature
extraction block. The extracted features from the query
knuckle print are then compared with templates stored
in the database. A distance measure is used to find the
close match between the query knuckle print and the
template imprints stored in the database.
4.2 FINGER IMAGE ACQUISITION
The backside of finger is to be acquired using web cam or
smartphone or digital camera. An acquisition system has
been developed for the collection of finger -back images.
A very user-friendly imaging system is constructed. This
imaging system uses a web camera focused against a
white background under uniform illumination. The
camera has been set and fixed at a suitable distance from
the imaging surface.
4.3 PRE-PROCESSING FOR FEATURE EXTRACTION
Each of these images requires localization of region of
interest for the feature extraction. The region of interest
is the region having maximum knuckle creases. An ROI
can be cropped from the original image for reliable
feature extraction and matching. This gives segmented
finger knuckle image.
The image is captured; it is pre-processed to obtain only
the area information of the FKP.
The detailed steps for pre-processing process are as
follows first; apply a Gaussian smoothing operation to
the original image. Second, determine the X axis of the
coordinate system fitted from the bottom boundary of
the finger can be easily extracted by a canny edge
detector. Third , determine the Y-axis of the coordinate
system by applying a Canny edge detector on the
cropped sub-image original base on X-axis , then find the
convex direction coding scheme.
4.4 KNUCKLE FEATURE EXTRACTION
The knuckle image mainly consists of curved lines and
creases. Knuckle curved lines and creases are to be
detected. Knuckle features are then extracted. In feature
extraction, first the target vector is created. Target
vector is n x n matrix with are zeros. The purpose of
feature extraction is to extract the significant features of
images.
4.5 IDENTIFICATION
Identification is the final application portion of the
system it is used to identify the name of the user. The
input feature vector is extracted from the user input
image file. The binarized templates generated from
every finger knuckle image is subjected to template
matching to ascertain the similarity between claimed
user identity and the input template(s) stored in the
enrollment database. The degree of the similarity or the
dissimilarity between two templates is determined using
the Hamming distance.
4.6 ARCHITECTURE DIAGRAM
An architectural diagram is a rich and rigorous diagram,
created using available standards, in which the primary
concern is to illustrate a specific set of tradeoffs inherent
in the structure and design of a system or ecosystem.
The architectural of feature image extraction is
described in figure 1.
Fig 1. Architecture Diagram
5. SOFTWARE OVERVIEW
5.1 FRONT END
The front end is an interface between the user and the
back end. The front ends may be distributed amongst
one or more systems. The front is an abstraction,
simplyfying the underlying component by providing a
user-friendly interface. Front end development is the
development of those elements of a website that the
customer sees and interacts with directly.
5.2 MATLAB
MATLAB (matrix laboratory) is a multi-paradigm
numerical computing environment and fourth -
generation programming language. Developed by Math-
works, MATLAB allows matrix manipulations, plotting of
functions and data, implementation of algorithms,
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 124
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
creation of user interfaces, and interfacing with
programs written in other languages, including C, C++,
Java, Fortran and Python.
Although MATLAB is intended primarily for numerical
computing, an optional toolbox uses the MuPAD
symbolic engine, allowing access to symbolic computing
capabilities. An additional package, Simulink, adds
graphical multi-domain simulation and Model-Based
Design for dynamic and embedded systems.
In 2004, MATLAB had around one million users across
industry and academia. MATLAB users come from
various backgrounds of engineering, science, and
economics. MATLAB is widely used in academic and
research institutions as well as industrial enterprises.
6. FUTURE ENHANCEMENT
This paper has successfully investigated the possibility of
employing minor finger knuckle images for the biometric
identification. The coarse-to-fine segmentation strategy
developed in this paper has been quite successful as it
has been able to achieve higher matching accuracy. In
future, both major and minor knuckle images are
retrieved for better performance and security. The new
matching method is created for higher matching
accuracy.
7. CONCLUSION
The possibility of employing minor finger knuckle
images for the biometric identification. The coarse-to-
fine segmentation strategy developed in this paper has
been quite successful as it has been able to achieve
higher matching accuracy. The use of only major knuckle
patterns, small number of subjects, and lack of
systematic evaluation in various age groups reflects
narrow focus on this topic in this paper. Availablility of
such images acquired after an interval of years in public
domain will serve as useful evidence to favourly argue
on suspects/offenders for forensic The finger dorsal
images employed this paper were acquired in single
session and therefore conclusions on the accuracy points
towards the uniqueness of major/minor finger knuckle
patterns in the given database rather than on the
stability of such patterns with time.
And law-enforcement applications.
ACKNOWLEDGEMENT
The authors are grateful to reviewers for thorough
reports with comments and corrections that have helped
to improve this article. I would like to thanks to Prof.
Anbarasan who guided and supported me for this work.
REFERENCES
1. Aoyama. S, Ito .K, and Aoki .T (2011), “Finger-knuckle-
print recognition using BLPOC-based local block
matching,” in Proc. ACPR, pp. 625–529.
2. Deepak Gautam, Usha Mittal (2014), “An Efficient and
Improved Technique For Human Identification Using
Finger Vein” International Journal of Latest Scientific
Research and Technology 1(2), pp. 72-77 ISSN: 2348-
9464.
3. Kam Yuen, Ajay Kumar, “Contactless Finger Knuckle
Identification Using Smartphone‟s” Department of
Computing, The Hong Kong Polytechnic University.
4. Lin Zhang, Lei Zhang, And David Zhang, “Finger-
Knuckle-Print Verification Based On Band-Limited
Phase-Only Correlation” Biometrics Research Center,
Department of Computing, The Hong Kong Polytechnic
University.
5. Mathivanan B, Palanisamy V and Selvarajan S (2012),
“A Hybrid Model For Human Recognition System Using
Hand Dorsum Geometry And Finger-Knuckle-Print”
Journal of Computer Science, 8 (11), 1814-1821, ISSN
1549-3636.
6. Shubhangi Neware1, Dr. Kamal Mehta, Dr. A.S.
Zadgaonkar (2012), “Finger Knuckle Surface Biometrics”
International Journal of Emerging Technology and
Advanced Engineering Website, ISSN 2250-2459, ISO
9001:2008 Certified Journal, Volume 2, Issue.
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 125

More Related Content

What's hot

Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Harikrishna Patel
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...IJCSIS Research Publications
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image ProcessingIRJET Journal
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESijsptm
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoTIRJET Journal
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesIAEME Publication
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric SolutionTanvir Ahmed
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login SessionIRJET Journal
 

What's hot (19)

Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Iciea08
Iciea08Iciea08
Iciea08
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
C6524029320
C6524029320C6524029320
C6524029320
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phones
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric Solution
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 

Similar to IRJET - Human Identification using Major and Minor Finger Knuckle Pattern

IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IRJET Journal
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESIRJET Journal
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docxWaseelsultan
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBahaa Abdulhadi
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfBahaa Abdulhadi
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdftonkung6
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachJigisha Aryya
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSIJNSA Journal
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper ExampleKayla Perry
 

Similar to IRJET - Human Identification using Major and Minor Finger Knuckle Pattern (20)

IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Biometrics
BiometricsBiometrics
Biometrics
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
I017335457
I017335457I017335457
I017335457
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 

IRJET - Human Identification using Major and Minor Finger Knuckle Pattern

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 121 Human Identification using Major and Minor Finger Knuckle Pattern Dr.Raja.M1, Senthilprabhu.S2 , Suriya.A3, Aneesha fathima4 1Professor, Computer Science and Engineering, Dhaanish Ahmed Institute of Technology, Tamil Nadu 2Asst.Professor, Computer Science and Engineering, Dhaanish Ahmed Institute of Technology, Tamil Nadu 3Asst.Professor, Computer Science and Engineering, Dhaanish Ahmed Institute of Technology, Tamil Nadu 4Student, Computer Science and Engineering, Dhaanish Ahmed Institute of Technology, Tamil Nadu --------------------------------------------------------------------------------***-------------------------------------------------------------------------------- Abstract: The biometrics is the challenging task for researcher .Biometrics based authentication is just impossible to help us if we don't know what are the requirements .Biometrics authentication must provide the security level, unattended system, Spoofing and Reliability. Among all the modalities FKP broadly explored which has not yet attracted significant attention of researchers. Finger knuckle is user centric contactless and unrestricted access control. We have proposed a novel person identification system that uses knuckle print features extracted by using Radon transform. The knuckle print image has been viewed as a texture image. The local features from the knuckle print represent the texture information present in the image in better sense .Radon transform computes the line integral along parallel paths in a certain direction. Keywords: Finger Biometric, Finger Knuckle Methodology, Pattern Recognition, Finger-vein Identification. 1. INTRODUCTION As with growth of information technology, the need of the security has became a prime issue in the area of IT. The security can be managed in number of ways. One way to improve security is by identifying or verifying the person with some technique so, the basic idea is the identity of the person which can be improve the security. Secure Computing is information security is applied computing devices such as computers and smartphones. Most computer security measures involve data encryption and passwords. The term “Biometrics“ is derived from the Greek words “bio”(life) and “metrics”(to measures). Biometric refers to the automatic identification of a person based on his /her physiological or behavioral characteristics. Existing biometric systems involve various technologies such as face, iris fingerprint and finger vein recognition. Finger vein recognition is one of the promising approaches for human identification because of its advantages on living body identification and high security. However, upon image capture, finger vein identification can suffer from performance degradation caused by illumination variation, finger positional variation shading and misalignment. In this paper finger knuckle also be used, exploring the both major and minor finger knuckle pattern with features extraction, verifying and identification. Finger knuckle is user-centric, contactless and unrestricted access control. We have proposed a novel person identification system that uses knuckle print features extracted by using Radon transform. Advantages of finger knuckle print (FKP) include rich in texture features, easily accessible, contactless image acquistion invariant to emotions and other behavioral aspects such as tiredness, stable features and acceptability in the society. 1.1 SECURE COMPUTING Secure computing (also known as cyber security or computer security) is information security is applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the internet. In the computer industry, the term security refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Most computer security measures involve data encryption and passwords. Data encryption is the translation of data into form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or system. Computer security is important because without it, your computer would by vulnerable to viruses, worms, and other malicious code. Security tool is a rogue antispyware program that uses fake security alerts and system scan results to convince computer user believe that they must purchase the Security Tool program to remove the found threats. Security Tool, through the use of trojans and malicious websites, can be installed onto your computer without notification. Most of the time, the term “Computer Security” refers to the security of a computer's insides. The data and compendious information that most users store on their hard drives is often far more valuable than are the machines themselves. Broadly speaking, the importance of computer security lies in how harmful it can be if that data is lost. Many computer users don not realize that simply accessing the web could be making their computers more vulnerable. The security has to increas- erapidly because the attackers are daily increasing. The users are mostly wanted to secure the information on their computer because:
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 • For ensuring that our information remains confidential and only those who should access that information. • Knowing that no one has been able to change our information, so we can depend on its accuracy. Making sure that our information is available when we need it (by making back-up copies and if appropriate storing the back-up copies off-site). Secure Computing Corporation (SCC) is a public company that developed and sold computer security appliances and hosted services to protect users and data. McAfee acquired the company in 2008. Taking charge of computer security usually is as simply as installing an antivirus program or purchasing basic computer security software. The importance of computer security also extents to computer skills. Users should educate themselves about the risks of the Internet, particularly with respect to downloads. They also should take care when sharing personal information with untrusted websites and should keep credit card information closely guarded. The authentication is one the most widely used forms of security and forms the most basic security mechanism. Biometric refers to the automatic identification of a person based on his/her physiological or behavioral characteristics. 1.2 BIOMETRIC This method of identification is preferred over traditional methods involving passwords and PIN numbers for various reasons: the person to be identified is required to be physically present at the point-of- identification; identification is based on biometric techniques obviates the need to remember a password or carry a token. This paper attempts to look at the various advantages offered by this method of user authentication and also looks at the pits falls encountered in its implementation, some of which are specific to biometrics. Using biometrics for authentication has obvious conceptual advantages when compared to the traditional use of passwords or PINs. In theory, biometric data cannot be guessed, stolen or shared among users, therefore providing increased security to a system. It also relieves the user from the burden of having to remember a password, or worse multiple passwords for different systems within an organization. In addition to authentication, biometric applications are employed in large-scale identification systems, where they offer two important benefits: fraud detection and fraud deterrance. For example, one person can claim multiple identities, using fraudulent documents, to receive benefits from a public program. Without the use of biometrics, it would be extremely difficult to discover that the person has multiple registrations, considering the large volume of data stored in the system. Biometrics can therefore contribute to fraud detection. On the other hand, the presence of such a feature in a system introduces a physiological effect on people, as it dissuades individuals from attempting to register more than once, as they become aware of the fact the their unique physiological/behavioral characteristics are used to identify them. For this effect, biometrics provides the benefit of fraud deterrance. There are 3 basic function in any biometric system: 1.2.1 ENROLLMENT A person's reference data is produced in the enrolment process. The reference data contains the most basic information about a person's biometric features. In the case of the ID Module these are the fingerprint features or reference data that can be produced from this. During the subsequent identification and verification processes in the biometric system, this reference data is used for comparison with the current features. The enrolment can be performed by loading biodata or by feeding in the biodata on the module itself. 1.2.2 VERIFICATION Verification is checking a person against a predefined identity. This means that the identity of the expected person must be known before the start of the verification process. This can be done for example by entering a person's name or data, via a keyboard, keypad or card. 1.2.3 IDENTIFICATION Identification means that the biometric system checks the identity of the finger specific features that a person enters through comparison with the archived fingerprint features of multiple people. The identity of the person being checked is therefore returned as a result of a successful identification. 2. PROBLEM DEFINITION Automated identification of humans using their unique anatomical characteristics has been increasingly investigated for their applications in human surveillance and image forensics. Many traits like fingerprint face iris, palm vein, DNA and many others have been used for personal identification. One new biometric trait that has attracted researchers in the recent years is the finger knuckle print. Accurate identification of finger knuckle patterns can be beneficial for several applications involving forensic and covert identification of suspects. To build a secure and authenticated system for finger knuckle. © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 122
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 3. NEED OF FINGER KNUCKLE PRINT There are many different types of Biometrics, these are, IRIS Identification, Retinal Identification, Face Recognition, Voice Recognition, Fingerprint, Hand/Finger Geometry, Signature verification, Keystroke Dynamics, and other esoteric biometrics. Hand-based biometrics, such as fingerprint and hand geometry, is the most prevalent biometric system in the marketplace. However, fingerprint suffers from a major drawback, which is its proneness to anti-security threats, such as the reproduction of fingerprints left on surfaces to deceive the system. On the other hand, the hand geometry features are not descriptive enough for identification when the number of users grows larger. Problem related to other identifiers are as human voice and signature can be copied, duplicates are available so face recognition will not be foolproof identifier. Palm print and finger print can be simultaneous extracted from the palm side which can give better performance improvement, but size of finger knuckle is very small as compared to palm print and offers more attractive alternative as it requires less processing as compared to palm print. These biometric identifier systems can cause problem in children and adults. Many concepts are proposed to explore an alternative way to utilize the major knuckle print for human identification. This biometric system implementation is contactless and peg-free and free from factors like tiredness etc. which causes problem in other biometric identifiers. But in some humans the major knuckle pattern of finger can be occluded by hair and there are some cases where only the minor knuckle portions are visible in forensic images. By considering this problem, now need to utilize the major and minor portions simultaneously. 4. PROPOSED SYSTEM We have proposed a novel person identification system that uses knuckle print features extracted by using Radon transform. The knuckle print image has been viewed as a texture image. The local features from the knuckle print represent the texture information present in the image in the better sense. Radon transform computes the line integral along parallel paths in a certain direction. The personal identification system using knuckle prints operates in two modes namely enrolment phase and identification phase. During the enrolment phase, several knuckle prints of the persons obtained from the FKP scanner are passed to the system. The samples captured by knuckle print scanner are passed through pre- processing and feature extraction to produce the templates which are then stored in the database. In the identification/recognition mode, the query knuckle print image is passed to the system. These query knuckle prints are passed through pre-processing and feature extraction block. The extracted features from the query knuckle print are then compared with templates stored in the database in order to find the correct match. A distance measure is used to find the close match between the query knuckle print and the template imprints stored in the database. 4.1 OVERVIEW OF THE PROJECT Automated biometric identification using finger knuckle images has increasingly generated interest among researchers with emerging applications in human forensics and biometrics. Prior efforts in the biometrics literature have only investigated the “major” finger knuckle patterns that are formed on the finger surface joining proximal phalanx and middle phalanx bones. The biometrics is the challenging task for researcher. Biometrics based authentication is just impossible to help us if we don't know what are the requirements. Biometrics authentication must provide the security level, unattended system, Spoofing and Reliability. Among all the modalities FKP broadly explored which has not yet attracted significant attention of researchers. Finger knuckle is user-centric, contactless and unrestricted access control. We have proposed a novel person identification system that uses knuckle print features extracted by using Radon transform. The knuckle print image has been viewed as a texture image. The local features from the knuckle print represent the texture information present in the image in better sense. Radon transform computes the line integral along parallel paths in a certain direction. The possible use of major finger knuckle patterns which are formed on the finger surface joining distal phalanx and middle phalanx bones. The major finger knuckle patterns can either be used as independent biometric patterns or employed to improve the performance from the major finger knuckle patterns. A completely © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 123
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 automated approach for the minor finger knuckle identification is developed with key steps for region of interest segmentation, image normalization, enhancement and robust matching to accommodate image variations. The personal identification system using knuckle prints operates in two modes namely enrolment phase and identification phase. During the enrolment phase, several knuckle prints of the persons obtained from the FKP scanner are passed to the system. The samples captured by knuckle print scanner are passed through pre- processing and feature extraction to produce the templates which are then stored in the database. In the identification/recognition mode, the query knuckle print image is passed to the system. The query knuckle prints are passed through pre-processing and feature extraction block. The extracted features from the query knuckle print are then compared with templates stored in the database. A distance measure is used to find the close match between the query knuckle print and the template imprints stored in the database. 4.2 FINGER IMAGE ACQUISITION The backside of finger is to be acquired using web cam or smartphone or digital camera. An acquisition system has been developed for the collection of finger -back images. A very user-friendly imaging system is constructed. This imaging system uses a web camera focused against a white background under uniform illumination. The camera has been set and fixed at a suitable distance from the imaging surface. 4.3 PRE-PROCESSING FOR FEATURE EXTRACTION Each of these images requires localization of region of interest for the feature extraction. The region of interest is the region having maximum knuckle creases. An ROI can be cropped from the original image for reliable feature extraction and matching. This gives segmented finger knuckle image. The image is captured; it is pre-processed to obtain only the area information of the FKP. The detailed steps for pre-processing process are as follows first; apply a Gaussian smoothing operation to the original image. Second, determine the X axis of the coordinate system fitted from the bottom boundary of the finger can be easily extracted by a canny edge detector. Third , determine the Y-axis of the coordinate system by applying a Canny edge detector on the cropped sub-image original base on X-axis , then find the convex direction coding scheme. 4.4 KNUCKLE FEATURE EXTRACTION The knuckle image mainly consists of curved lines and creases. Knuckle curved lines and creases are to be detected. Knuckle features are then extracted. In feature extraction, first the target vector is created. Target vector is n x n matrix with are zeros. The purpose of feature extraction is to extract the significant features of images. 4.5 IDENTIFICATION Identification is the final application portion of the system it is used to identify the name of the user. The input feature vector is extracted from the user input image file. The binarized templates generated from every finger knuckle image is subjected to template matching to ascertain the similarity between claimed user identity and the input template(s) stored in the enrollment database. The degree of the similarity or the dissimilarity between two templates is determined using the Hamming distance. 4.6 ARCHITECTURE DIAGRAM An architectural diagram is a rich and rigorous diagram, created using available standards, in which the primary concern is to illustrate a specific set of tradeoffs inherent in the structure and design of a system or ecosystem. The architectural of feature image extraction is described in figure 1. Fig 1. Architecture Diagram 5. SOFTWARE OVERVIEW 5.1 FRONT END The front end is an interface between the user and the back end. The front ends may be distributed amongst one or more systems. The front is an abstraction, simplyfying the underlying component by providing a user-friendly interface. Front end development is the development of those elements of a website that the customer sees and interacts with directly. 5.2 MATLAB MATLAB (matrix laboratory) is a multi-paradigm numerical computing environment and fourth - generation programming language. Developed by Math- works, MATLAB allows matrix manipulations, plotting of functions and data, implementation of algorithms, © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 124
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 creation of user interfaces, and interfacing with programs written in other languages, including C, C++, Java, Fortran and Python. Although MATLAB is intended primarily for numerical computing, an optional toolbox uses the MuPAD symbolic engine, allowing access to symbolic computing capabilities. An additional package, Simulink, adds graphical multi-domain simulation and Model-Based Design for dynamic and embedded systems. In 2004, MATLAB had around one million users across industry and academia. MATLAB users come from various backgrounds of engineering, science, and economics. MATLAB is widely used in academic and research institutions as well as industrial enterprises. 6. FUTURE ENHANCEMENT This paper has successfully investigated the possibility of employing minor finger knuckle images for the biometric identification. The coarse-to-fine segmentation strategy developed in this paper has been quite successful as it has been able to achieve higher matching accuracy. In future, both major and minor knuckle images are retrieved for better performance and security. The new matching method is created for higher matching accuracy. 7. CONCLUSION The possibility of employing minor finger knuckle images for the biometric identification. The coarse-to- fine segmentation strategy developed in this paper has been quite successful as it has been able to achieve higher matching accuracy. The use of only major knuckle patterns, small number of subjects, and lack of systematic evaluation in various age groups reflects narrow focus on this topic in this paper. Availablility of such images acquired after an interval of years in public domain will serve as useful evidence to favourly argue on suspects/offenders for forensic The finger dorsal images employed this paper were acquired in single session and therefore conclusions on the accuracy points towards the uniqueness of major/minor finger knuckle patterns in the given database rather than on the stability of such patterns with time. And law-enforcement applications. ACKNOWLEDGEMENT The authors are grateful to reviewers for thorough reports with comments and corrections that have helped to improve this article. I would like to thanks to Prof. Anbarasan who guided and supported me for this work. REFERENCES 1. Aoyama. S, Ito .K, and Aoki .T (2011), “Finger-knuckle- print recognition using BLPOC-based local block matching,” in Proc. ACPR, pp. 625–529. 2. Deepak Gautam, Usha Mittal (2014), “An Efficient and Improved Technique For Human Identification Using Finger Vein” International Journal of Latest Scientific Research and Technology 1(2), pp. 72-77 ISSN: 2348- 9464. 3. Kam Yuen, Ajay Kumar, “Contactless Finger Knuckle Identification Using Smartphone‟s” Department of Computing, The Hong Kong Polytechnic University. 4. Lin Zhang, Lei Zhang, And David Zhang, “Finger- Knuckle-Print Verification Based On Band-Limited Phase-Only Correlation” Biometrics Research Center, Department of Computing, The Hong Kong Polytechnic University. 5. Mathivanan B, Palanisamy V and Selvarajan S (2012), “A Hybrid Model For Human Recognition System Using Hand Dorsum Geometry And Finger-Knuckle-Print” Journal of Computer Science, 8 (11), 1814-1821, ISSN 1549-3636. 6. Shubhangi Neware1, Dr. Kamal Mehta, Dr. A.S. Zadgaonkar (2012), “Finger Knuckle Surface Biometrics” International Journal of Emerging Technology and Advanced Engineering Website, ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 2, Issue. © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 125