SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1755
Optimization of Human Finger Knuckle Print as a Neoteric Biometric
Identifier
Mr.Vishal.B.Raskar1, Ms. Sampada.H.Raut2,
1Professor, dept. of E&TC , JSPM’S Imperial college of engineering and Research, Pune, India
2Master of Engineering Student, dept. of E&TC , JSPM’S Imperial college of engineering and Research, Pune, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Among the several biometric measures
developed, the figure knuckle surface is becoming a eminent
choice of researchers due to its natural ease of
reproducibility and verification. For any purpose of personal
identification or crime analysis, figure knuckles surface do
not need to be a voluntarily presented, they get exposed
naturally. Specific lines, creases, folds and texture pattern
on the figure knuckle surfaces can be used as effective
biometric measure on their own or in combination with
other biometrics. This paper proposes the development of a
figure knuckle based biometric identification system. The
system incorporates principal component analysis (PCA) for
feature extraction after pre-processing and enhancing input
image extracted from knuckle surface from video input
capture. Secondly the system employs k-nn classifier as a
matching classifier for personal identification algorithm.
Not only the principal component but Local Binary Pattern
is also tested, also various parameters are extracted from
the training and testing data. The system implementation is
tested, verified and validated with real time data sample
test experiments.
Key Words: finger knuckle print, pca, K-NN classifier,
biometric identifier ,feature extraction, classification,
feature matching
1. INTRODUCTION
In the developing in digital world, concept of biometric
plays an imperative role in security systems, surveillance
systems, national ID systems, ecommerce, forensics,
information technology and also banking where
authentication is vital. Such systems require authentic
identification for their system to work flawless. With
growth in the population of world, it is presently
exceptionally hard to maintain records using traditional
ways such as signature, photo identity card. Thus,
maintaining digital data records of the individual and
using them for identification procedure is very important.
Many countries including India (aadhar card i.e. Unique
Identity Card) are opting biometric parameters for
providing more security and unique identity for the
citizens.
Identification of humans utilizing their different
anatomical and physiological characteristics has been
increasingly researched for their variety of applications.
There are number of organizations which require precise,
on the web and high scale automated personal
identification. This has introduced new difficulties for the
biometrics technologies. So there is a necessity of
introducing and researching on very much simple and
robust identification methods. For this, biometrics,
described as the unique physiological and in addition
behavioral qualities of human beings, will be utilized for
differentiating between individuals. In the previous couple
of decades, analysts have precisely examined the
utilization of different biometric characteristics.
Biometrics refers to metrics associated with human
characteristics. Biometrics validation is utilized in
computer science as a kind of kind of identification
and access control. It also can be additionally utilized to
find person in gatherings that are under surveillance.
Biometric identifiers are the unmistakable, quantifiable
characteristics utilized for labeling and depict people.
Biometric identifiers are regularly classified as
physiological against behavioral attributes. Physiological
features are identified with the buildup of the body. Cases
fuse, however are not confined to fingerprint, palm
veins, face recognition, DNA, palm print, hand
geometry, iris recognition, retina and odor/scent.
Behavioral characteristics are identified with the example
of conduct of a person, having be that as it may, not
constrained be that as it may, not confined to typing
rhythm, gait, and voice. Some specialists have begun the
term behavior measurements to depict the last class of
biometrics.
More customary method in the vein of verification are
token-based identification frameworks, for example,
a driver's license or passport, and knowledge-based or
memory depending on distinguishing proof frameworks,
like, a password or personal identification number. Since
biometric identifiers are one of a kind to people, they are
extremely much dependable in checking identity than
token and knowledge based techniques; be that as it may,
the accumulation of biometric identifiers maximizes
security worries about an absolute utilization of this data.
The biometrics derived from Greek, where bio implied
lively likewise metric implied measure. There are couple
of standard rules for biometrics. These are universality,
permanence and measurability. Firstly, it is its universality
in nature. All universality implies each ordinary person
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1756
possess the biometric. Like the generally used biometrics,
e.g. iris, fingerprints, ear surfaces etc. are recognized to be
with any typical human personality. Secondly, the
permanence implies the time invariance of biometric
feature. For example, the fingerprints stay unaltered over
the time or by growing age of the person. So one can
utilize them for identification or verify regardless of age of
the subject. In conclusion, it is the quantifiably of the
biometric. Measurability, the biometric can be removed by
method for a framework, in a sort of data which can be
further prepared, looked at or stored as and when needed.
For example the personal iris coloured structure can be
verified with the stored one then again finger knuckle
print can be put away and later verified for identification.
2. RELATED WORK
In paper [1] authors made use of 2D FKP as a
biometric identifier for personal authentication. A cost-
effective FKP system, having the image acquisition device
as well as the associated FKP image processing algorithms
is implemented. The database known as FKP which has
5,760 images of 480 different fingers is created. According
to authors the system is user friendly, has no remains also
moderate size and cost-effectiveness. Authors stated that
the system can be improved and employed in real
applications.
In paper [2], authors developed a system for personal
authentication by making use of the finger knuckle surface
for feature extraction. The developed FKR method is
evaluated utilizing database of all categories of Finger
Knuckle samples. They also stated that pre-processing of
the database eliminates the noise and also enhances the
FKP image that improves the accuracy of the system.
Authors stated that the proposed technique has accuracy of
89.99 % and EER of 10.01%.
In paper [3], authors proposed a reconstruction based FKP
verification technique which minimizes the false rejections
generated by finger pose variations in data collection
process. For an input query image whose matching
distance falls into the uncertain interval, authors
reconstructed a novel case of it by using a dictionary
learned from the gallery set. Also an adaptive binary fusion
(ABF) rule is developed to fuse the two matching distances
for the last decision making. The given reconstruction
based FKP verification with ABF, denoted by R-ABF, can
effectively reduce the false rejections without increasing
much the false acceptances.
In paper [4], authors have proposed a model which works
in two steps. At first stage they investigated the data fusion
in single modal, which is the FKP biometric. For fusing the
information of each FKP, two different representation of
every image is utilized. On the other hand, two different
subsets of feature vectors are extracted from each image. In
second stage, the data of every finger at two different
fusion levels is fused: feature and matching score level.
Also used fusion rules in different levels, by which
recognition rate is improved.
In paper [5] authors concentrated on multimodal
biometrics based personal authentication. Two efficient as
well as distinct biometric identifiers like palm print as well
as inner knuckle print has selected. Novel approach known
as Monogenic Binary Coding (MBC) has been used for palm
print recognition also Ridgelet transform and SIFT has
been used for extracting the features of inner knuckle print.
3. SYSTEM IMPLEMENTATION
3.1 Proposed System
The execution of the framework is described using
the figure 1. The system uses real time database, which has to
undergo training first and then testing, later which gives real
time output for identification. Here, feature extraction for the
testing dataset plus the training dataset is performed. The
system architecture is as follows,
Fig. 1: System architecture for Finger Knuckle Identification
System
The web video input camera send frames of input image to
the pre-processing and feature extraction. The values from
the features extracted during testing and also training are
compared using classifier. In this system Principal
Component Analysis (PCA) for feature extraction, it also
reduces multi-dimensional data in to lower dimensional
data with very less or zero loss of information. Also Local
Binary Pattern is used for feature extraction. (LBP- only for
testing and comparision) Proposed system has a
preprocessing step which is developed in order to
maximize the image features. Various features like as
mean, standard deviation, entropy, smoothness, skewness,
contrast, kurtosis, homogeneity, variance and correlations
are extracted. At last KNN classification technique is
employed to classify knuckle images. Accuracy for LBP and
PCA testing are compared in the results.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1757
3.2 Algorithms:
Generic steps involved in algorithm of PCA :
1. Acquisition of data
2. Subtract the mean from each data dimension.
This produces a data set whose mean is zero.
3. Calculate the covariance matrix
4. Calculate the eigenvectors and eigenvalues of
the covariance matrix
5. Choose components and form a feature vector
and form a new dataset.
Feature vector = ( eig1, eig2, …., eign )
Here, PCA algorithm extracts relevant information from
a knuckle image [Principal Components] and encodes that
information in a suitable data structure.
3.3 Mathematical Equations
1. Mean is given:
=
∑
Where the meanand is n is the no of elements.
2. Standard Deviation (SD):
The Standard Deviation (SD) of an information set is a
measure of how the information is spread out.
SD is calculated as,
∑ ̅
Where, σ is the standard deviation of a sample.
3. The formula for variance could also be written like
this,
∑ ( )
4. Covariance:
Standard Deviation and variance is measured in one
dimensions but covariance is measured in two dimensions.
The formula for covariance is given as
∑
5. Skewness: Skewness is a measure of symmetry, or
more precisely, the lack of symmetry.
6. LBP:
A local binary pattern encoding acquires local knuckle
patterns and also represent multi-scale texture patterns.
The binary pattern for every pixel centred at with
neighbouring pixel is computed as [6]
( ) { }
LBP code for corresponding pixel is is generated by
assigning binomial weight to the above equation 5.1.
∑ ( )
Where p is the total number of pixels in a local region
and p =0,1,2,...p −1. The LBP encoded knuckle images are
used to generate LBP descriptors using local histograms.
The histogram information from each of the local regions is
concatenated to extract the LBP descriptors. The similarity
between two LBP descriptors is computed by comparing
histogram intersection similarity measure as follows
∑
where w is the number of histogram bins while and
represent LBP descriptors from the enhanced knuckle
images
7. KNN classifier
√∑
where a1 and a2 are two different points between the
distance to be calculated
4. RESULTS AND ANALYSIS
4.1 Database Collection
Fig.2: Database collected of a person A
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1758
The fig.2 shows database collected of an individual for six
times by using a video camera. In this way database can be
collected for n number of persons and can be stored
4.2 Testing And Results Validation
Fig.3 : Testing of image with pre-processing result and LBP
feature extraction
The fig. 3 shows the testing of image acquired from person
A . The LBP feature extraction method is applied for the
same . it shows the features extracted in the graphical
form too. The same image is processed using PCA and the
following fig.4 shows the results for the mentioned system
.
Fig.4 Results For PCA Feature Extraction
Table 1 Testing database.
Table 1 shows the number of testing and training image
samples and the no. of individuals tested.
Table 2: Result for testing with LBP+KNN
Table 3: Result for testing with PCA+KNN
Method: PCA+KNN
Person Image name Expected
Result
Our Result
1 A-test1.jpg to A-
test4.jpg
Person A Person A
A-test5.jpg Person A Person A
A-tes65.jpg Person A Person A
2 B-test1.jpg to B-
test4.jpg
Person B Person B
B-test5.jpg Person B Person B
B-tes65.jpg Person B Person B
3 C-test1.jpg to C-
test4.jpg
Person C Person C
C-test5.jpg Person C Person C
C-test6.jpg Person C Person E
4 D-test1.jpg to D-
test4.jpg
Person D Person D
D-test5.jpg Person D Person D
D-test6.jpg Person D Person A
5 E-test1.jpg to E-
test4.jpg
Person E Person E
E-test5.jpg Person E Person E
E-test6.jpg Person E Person E
Total no of Test image : 10
Total no of training image : 20
Total no of person : 5
Method: LBP+KNN
Person Image name Expected
Result
Our
Result
1 A-test1.jpg to A-
test4.jpg
Person A Person A
A-test5.jpg Person A Person A
A-tes65.jpg Person A Person A
2 B-test1.jpg to B-
test4.jpg
Person B Person B
B-test5.jpg Person B Person B
B-test6.jpg Person B Person A
3 C-test1.jpg to C-
test4.jpg
Person C Person C
C-test5.jpg Person C Person C
C-test6.jpg Person C Person A
4 D-test1.jpg to D-
test4.jpg
Person D Person D
D-test5.jpg Person D Person D
D-test6.jpg Person D Person E
5 E-test1.jpg to E-
test4.jpg
Person E Person E
E-test5.jpg Person E Person C
E-test6.jpg Person E Person E
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1759
4.3 Accuracy Calculations:
Table4: Accuracy for LBP+KNN Method
Total no. images : 30
Accuracy = ( correctly classified image / total no. of
image)
Accuracy=(26/30)*100
Accuracy = 86.67%
Table5: Accuracy for PCA+KNN Method
Total no. Images: 30
Accuracy = (correctly classified image / total no. Of
image)
Accuracy=(28/30)*100
Accuracy = 93.33%
Fig.5 Accuracy calculated for database for both the
methods.
Table 6. statistical feature values extracted for person A
Sr
.
N
o.
Featured
extracted
Values extracted
for training image
Values extracted
for testing image
1. Mean 129.5216 129.5101
2.
Standard
deviation
73.3174 73.3304
3. Entropy -0.4856 -0.4605
4. Smoothness .-0.0827 -0.0787
5. Skewness -0.0025 -0.0030
6. Contrast 1.0000 1.0025
7. Kurtosis 0.2070 0.2180
8.
Homogeneit
y
0.0403 0.0325
9. Variance 0.5362 0.5222
1
0.
Correalatio
n
16.1904 16.2508
4.4 Output Result
Fig. 6 Output window with the person identified
The fig. 6 shows when the finger knuckle is placed on the
surface under a camera i.e. Input device, the person gets
identified by classifying with stored data in the system.
Fig.7 experimental setup
4.5 Graphs
The following images are of the graphs plotted for the
features extracted during the training period of the
system. The same graphs are plotted during the testing of
the image having continuous output since, the input
frames are continuously acquired from the video input
camera. Also the accuracy graphs for the PCA+KNN and
LBP+KNN are shown with rate of person identified.
Fig. 8 Graph for Skewness
Accuracy
in %, LBP
+ KNN,
86.67
Accuracy
in %,
PCA+KNN
, 93.33
LBP + KNN PCA+KNN
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1760
Fig. 9 Graph for Standard Deviation
Fig. 10: Graph for Covariance
Fig. 11 : Graph for Mean
Fig.12 Results For LBP+KNN Method For Person A
Fig.13 Results For PCA+KNN Method For Person A
5. CONCLUSION
This paper proposes the method for personal
identification using finger knuckle print image. This work
presented the finger knuckle print image acquisition and
database collection, further the image preprocessing,
feature extraction, various features, and their matching
using K-NN classifier is mentioned. Also the proposed
method was compared and validated with the existing
techniques. This work concluded that finger knuckle print
identification using PCA and K-NN classifier gives quite
effective results and achieves high performance in knuckle
identification. Thus , finger knuckle print can be used as
neoteric biometric identifier.
REFERENCES
[1] L. Zhang, L. Zhang and D. Zhang, "Finger-knuckle-
print: A new biometric identifier," 2009 16th IEEE
International Conference on Image Processing (ICIP),
Cairo, 2009, pp. 1981-1984
[2] R. D. Raut, S. Kulkarni and N. N. Gharat, "Biometric
Authentication Using Kekre's Wavelet Transform," 2014
International Conference on Electronic Systems, Signal
Processing and Computing Technologies, Nagpur, 2014,
pp. 99-104.
[3] G. Gao, L. Zhang, J. Yang, L. Zhang and D. Zhang,
"Reconstruction Based Finger-Knuckle-Print Verification
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1761
With Score Level Adaptive Binary Fusion," in IEEE
Transactions on Image Processing, vol. 22, no. 12, pp.
5050-5062, Dec. 2013.
[4] Z. S. Shariatmadar and K. Faez, "An Efficient Method for
Finger-Knuckle-Print Recognition by Using the
Information Fusion at Different Levels," 2011
International Conference on Hand-Based Biometrics,
Hong Kong, 2011, pp. 1-6.
[5] B. Bhaskar and S. Veluchamy, "Hand based
multibiometric authentication using local feature
extraction," 2014 International Conference on Recent
Trends in Information Technology, Chennai, 2014, pp. 1-
5.
[6] T. Ojala, M. Pietikäinen, and T. Mäenpää, “Trans.
Pattern Anal. Mach Multiresolution gray-scale
and rotation invariant texture classification with local
binary patterns,” IEEE. Intell., vol. 24, no. 7, pp. 971–
987, Jul. 2001.
[7] Ajay Kumar, “Importance of Being Unique from Finger Dorsal
Patterns: Exploring Minor Finger Knuckle Patterns In
Verifying Human Identities” Information Forensics And
Security, vol 9, no. 8, pp. 1288-1298, Aug 2014
[8] Woodard D.L., Flynn P.J., “Finger surface as a biometric
identifier”, CVIU, vol. 100, pp. 357–384, 2005.
[9] Shubhangi Neware,Kamal Mehta , “Finger Knuckle
Identification using Principal Component Analysis and
Nearest Mean Classifier”,International Journal of
Computer Applications (0975 – 8887) Volume 70– No.9,
May 2013.
[10] A tutorial on Principal Components Analysis,Lindsay I
SmithFebruary 26, 2002

More Related Content

What's hot

Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality OnlineUsing (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Onlines-mueller
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesIDES Editor
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABijtsrd
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identificationdswazalwar
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measuressyamil91
 
Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)ainizbahari97
 
A new multimodel approach for human authentication sclera vein and finger ve...
A new multimodel approach for human authentication  sclera vein and finger ve...A new multimodel approach for human authentication  sclera vein and finger ve...
A new multimodel approach for human authentication sclera vein and finger ve...eSAT Journals
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEJournal For Research
 

What's hot (18)

Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality OnlineUsing (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Online
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
(2010) HBSI and Hand Geometry
(2010) HBSI and Hand Geometry(2010) HBSI and Hand Geometry
(2010) HBSI and Hand Geometry
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
 
J1076975
J1076975J1076975
J1076975
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris Features
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
A new multimodel approach for human authentication sclera vein and finger ve...
A new multimodel approach for human authentication  sclera vein and finger ve...A new multimodel approach for human authentication  sclera vein and finger ve...
A new multimodel approach for human authentication sclera vein and finger ve...
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
 

Similar to Optimization of human finger knuckle print as a neoteric biometric identifier

An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningIRJET Journal
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
A novel multi-biometric technique for verification of secure e-document
A novel multi-biometric technique for verification of secure e-documentA novel multi-biometric technique for verification of secure e-document
A novel multi-biometric technique for verification of secure e-documentIJECEIAES
 
IRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed SensingIRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed SensingIRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition systemeSAT Publishing House
 
Latent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identificationLatent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identificationeSAT Publishing House
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition SystemIRJET Journal
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET Journal
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionIRJET Journal
 
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...ijcsa
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemKishor Singh
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
 
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARSEMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARSIRJET Journal
 

Similar to Optimization of human finger knuckle print as a neoteric biometric identifier (20)

An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
A novel multi-biometric technique for verification of secure e-document
A novel multi-biometric technique for verification of secure e-documentA novel multi-biometric technique for verification of secure e-document
A novel multi-biometric technique for verification of secure e-document
 
IRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed SensingIRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed Sensing
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
Latent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identificationLatent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identification
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
 
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
 
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARSEMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Recently uploaded (20)

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

Optimization of human finger knuckle print as a neoteric biometric identifier

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1755 Optimization of Human Finger Knuckle Print as a Neoteric Biometric Identifier Mr.Vishal.B.Raskar1, Ms. Sampada.H.Raut2, 1Professor, dept. of E&TC , JSPM’S Imperial college of engineering and Research, Pune, India 2Master of Engineering Student, dept. of E&TC , JSPM’S Imperial college of engineering and Research, Pune, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Among the several biometric measures developed, the figure knuckle surface is becoming a eminent choice of researchers due to its natural ease of reproducibility and verification. For any purpose of personal identification or crime analysis, figure knuckles surface do not need to be a voluntarily presented, they get exposed naturally. Specific lines, creases, folds and texture pattern on the figure knuckle surfaces can be used as effective biometric measure on their own or in combination with other biometrics. This paper proposes the development of a figure knuckle based biometric identification system. The system incorporates principal component analysis (PCA) for feature extraction after pre-processing and enhancing input image extracted from knuckle surface from video input capture. Secondly the system employs k-nn classifier as a matching classifier for personal identification algorithm. Not only the principal component but Local Binary Pattern is also tested, also various parameters are extracted from the training and testing data. The system implementation is tested, verified and validated with real time data sample test experiments. Key Words: finger knuckle print, pca, K-NN classifier, biometric identifier ,feature extraction, classification, feature matching 1. INTRODUCTION In the developing in digital world, concept of biometric plays an imperative role in security systems, surveillance systems, national ID systems, ecommerce, forensics, information technology and also banking where authentication is vital. Such systems require authentic identification for their system to work flawless. With growth in the population of world, it is presently exceptionally hard to maintain records using traditional ways such as signature, photo identity card. Thus, maintaining digital data records of the individual and using them for identification procedure is very important. Many countries including India (aadhar card i.e. Unique Identity Card) are opting biometric parameters for providing more security and unique identity for the citizens. Identification of humans utilizing their different anatomical and physiological characteristics has been increasingly researched for their variety of applications. There are number of organizations which require precise, on the web and high scale automated personal identification. This has introduced new difficulties for the biometrics technologies. So there is a necessity of introducing and researching on very much simple and robust identification methods. For this, biometrics, described as the unique physiological and in addition behavioral qualities of human beings, will be utilized for differentiating between individuals. In the previous couple of decades, analysts have precisely examined the utilization of different biometric characteristics. Biometrics refers to metrics associated with human characteristics. Biometrics validation is utilized in computer science as a kind of kind of identification and access control. It also can be additionally utilized to find person in gatherings that are under surveillance. Biometric identifiers are the unmistakable, quantifiable characteristics utilized for labeling and depict people. Biometric identifiers are regularly classified as physiological against behavioral attributes. Physiological features are identified with the buildup of the body. Cases fuse, however are not confined to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odor/scent. Behavioral characteristics are identified with the example of conduct of a person, having be that as it may, not constrained be that as it may, not confined to typing rhythm, gait, and voice. Some specialists have begun the term behavior measurements to depict the last class of biometrics. More customary method in the vein of verification are token-based identification frameworks, for example, a driver's license or passport, and knowledge-based or memory depending on distinguishing proof frameworks, like, a password or personal identification number. Since biometric identifiers are one of a kind to people, they are extremely much dependable in checking identity than token and knowledge based techniques; be that as it may, the accumulation of biometric identifiers maximizes security worries about an absolute utilization of this data. The biometrics derived from Greek, where bio implied lively likewise metric implied measure. There are couple of standard rules for biometrics. These are universality, permanence and measurability. Firstly, it is its universality in nature. All universality implies each ordinary person
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1756 possess the biometric. Like the generally used biometrics, e.g. iris, fingerprints, ear surfaces etc. are recognized to be with any typical human personality. Secondly, the permanence implies the time invariance of biometric feature. For example, the fingerprints stay unaltered over the time or by growing age of the person. So one can utilize them for identification or verify regardless of age of the subject. In conclusion, it is the quantifiably of the biometric. Measurability, the biometric can be removed by method for a framework, in a sort of data which can be further prepared, looked at or stored as and when needed. For example the personal iris coloured structure can be verified with the stored one then again finger knuckle print can be put away and later verified for identification. 2. RELATED WORK In paper [1] authors made use of 2D FKP as a biometric identifier for personal authentication. A cost- effective FKP system, having the image acquisition device as well as the associated FKP image processing algorithms is implemented. The database known as FKP which has 5,760 images of 480 different fingers is created. According to authors the system is user friendly, has no remains also moderate size and cost-effectiveness. Authors stated that the system can be improved and employed in real applications. In paper [2], authors developed a system for personal authentication by making use of the finger knuckle surface for feature extraction. The developed FKR method is evaluated utilizing database of all categories of Finger Knuckle samples. They also stated that pre-processing of the database eliminates the noise and also enhances the FKP image that improves the accuracy of the system. Authors stated that the proposed technique has accuracy of 89.99 % and EER of 10.01%. In paper [3], authors proposed a reconstruction based FKP verification technique which minimizes the false rejections generated by finger pose variations in data collection process. For an input query image whose matching distance falls into the uncertain interval, authors reconstructed a novel case of it by using a dictionary learned from the gallery set. Also an adaptive binary fusion (ABF) rule is developed to fuse the two matching distances for the last decision making. The given reconstruction based FKP verification with ABF, denoted by R-ABF, can effectively reduce the false rejections without increasing much the false acceptances. In paper [4], authors have proposed a model which works in two steps. At first stage they investigated the data fusion in single modal, which is the FKP biometric. For fusing the information of each FKP, two different representation of every image is utilized. On the other hand, two different subsets of feature vectors are extracted from each image. In second stage, the data of every finger at two different fusion levels is fused: feature and matching score level. Also used fusion rules in different levels, by which recognition rate is improved. In paper [5] authors concentrated on multimodal biometrics based personal authentication. Two efficient as well as distinct biometric identifiers like palm print as well as inner knuckle print has selected. Novel approach known as Monogenic Binary Coding (MBC) has been used for palm print recognition also Ridgelet transform and SIFT has been used for extracting the features of inner knuckle print. 3. SYSTEM IMPLEMENTATION 3.1 Proposed System The execution of the framework is described using the figure 1. The system uses real time database, which has to undergo training first and then testing, later which gives real time output for identification. Here, feature extraction for the testing dataset plus the training dataset is performed. The system architecture is as follows, Fig. 1: System architecture for Finger Knuckle Identification System The web video input camera send frames of input image to the pre-processing and feature extraction. The values from the features extracted during testing and also training are compared using classifier. In this system Principal Component Analysis (PCA) for feature extraction, it also reduces multi-dimensional data in to lower dimensional data with very less or zero loss of information. Also Local Binary Pattern is used for feature extraction. (LBP- only for testing and comparision) Proposed system has a preprocessing step which is developed in order to maximize the image features. Various features like as mean, standard deviation, entropy, smoothness, skewness, contrast, kurtosis, homogeneity, variance and correlations are extracted. At last KNN classification technique is employed to classify knuckle images. Accuracy for LBP and PCA testing are compared in the results.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1757 3.2 Algorithms: Generic steps involved in algorithm of PCA : 1. Acquisition of data 2. Subtract the mean from each data dimension. This produces a data set whose mean is zero. 3. Calculate the covariance matrix 4. Calculate the eigenvectors and eigenvalues of the covariance matrix 5. Choose components and form a feature vector and form a new dataset. Feature vector = ( eig1, eig2, …., eign ) Here, PCA algorithm extracts relevant information from a knuckle image [Principal Components] and encodes that information in a suitable data structure. 3.3 Mathematical Equations 1. Mean is given: = ∑ Where the meanand is n is the no of elements. 2. Standard Deviation (SD): The Standard Deviation (SD) of an information set is a measure of how the information is spread out. SD is calculated as, ∑ ̅ Where, σ is the standard deviation of a sample. 3. The formula for variance could also be written like this, ∑ ( ) 4. Covariance: Standard Deviation and variance is measured in one dimensions but covariance is measured in two dimensions. The formula for covariance is given as ∑ 5. Skewness: Skewness is a measure of symmetry, or more precisely, the lack of symmetry. 6. LBP: A local binary pattern encoding acquires local knuckle patterns and also represent multi-scale texture patterns. The binary pattern for every pixel centred at with neighbouring pixel is computed as [6] ( ) { } LBP code for corresponding pixel is is generated by assigning binomial weight to the above equation 5.1. ∑ ( ) Where p is the total number of pixels in a local region and p =0,1,2,...p −1. The LBP encoded knuckle images are used to generate LBP descriptors using local histograms. The histogram information from each of the local regions is concatenated to extract the LBP descriptors. The similarity between two LBP descriptors is computed by comparing histogram intersection similarity measure as follows ∑ where w is the number of histogram bins while and represent LBP descriptors from the enhanced knuckle images 7. KNN classifier √∑ where a1 and a2 are two different points between the distance to be calculated 4. RESULTS AND ANALYSIS 4.1 Database Collection Fig.2: Database collected of a person A
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1758 The fig.2 shows database collected of an individual for six times by using a video camera. In this way database can be collected for n number of persons and can be stored 4.2 Testing And Results Validation Fig.3 : Testing of image with pre-processing result and LBP feature extraction The fig. 3 shows the testing of image acquired from person A . The LBP feature extraction method is applied for the same . it shows the features extracted in the graphical form too. The same image is processed using PCA and the following fig.4 shows the results for the mentioned system . Fig.4 Results For PCA Feature Extraction Table 1 Testing database. Table 1 shows the number of testing and training image samples and the no. of individuals tested. Table 2: Result for testing with LBP+KNN Table 3: Result for testing with PCA+KNN Method: PCA+KNN Person Image name Expected Result Our Result 1 A-test1.jpg to A- test4.jpg Person A Person A A-test5.jpg Person A Person A A-tes65.jpg Person A Person A 2 B-test1.jpg to B- test4.jpg Person B Person B B-test5.jpg Person B Person B B-tes65.jpg Person B Person B 3 C-test1.jpg to C- test4.jpg Person C Person C C-test5.jpg Person C Person C C-test6.jpg Person C Person E 4 D-test1.jpg to D- test4.jpg Person D Person D D-test5.jpg Person D Person D D-test6.jpg Person D Person A 5 E-test1.jpg to E- test4.jpg Person E Person E E-test5.jpg Person E Person E E-test6.jpg Person E Person E Total no of Test image : 10 Total no of training image : 20 Total no of person : 5 Method: LBP+KNN Person Image name Expected Result Our Result 1 A-test1.jpg to A- test4.jpg Person A Person A A-test5.jpg Person A Person A A-tes65.jpg Person A Person A 2 B-test1.jpg to B- test4.jpg Person B Person B B-test5.jpg Person B Person B B-test6.jpg Person B Person A 3 C-test1.jpg to C- test4.jpg Person C Person C C-test5.jpg Person C Person C C-test6.jpg Person C Person A 4 D-test1.jpg to D- test4.jpg Person D Person D D-test5.jpg Person D Person D D-test6.jpg Person D Person E 5 E-test1.jpg to E- test4.jpg Person E Person E E-test5.jpg Person E Person C E-test6.jpg Person E Person E
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1759 4.3 Accuracy Calculations: Table4: Accuracy for LBP+KNN Method Total no. images : 30 Accuracy = ( correctly classified image / total no. of image) Accuracy=(26/30)*100 Accuracy = 86.67% Table5: Accuracy for PCA+KNN Method Total no. Images: 30 Accuracy = (correctly classified image / total no. Of image) Accuracy=(28/30)*100 Accuracy = 93.33% Fig.5 Accuracy calculated for database for both the methods. Table 6. statistical feature values extracted for person A Sr . N o. Featured extracted Values extracted for training image Values extracted for testing image 1. Mean 129.5216 129.5101 2. Standard deviation 73.3174 73.3304 3. Entropy -0.4856 -0.4605 4. Smoothness .-0.0827 -0.0787 5. Skewness -0.0025 -0.0030 6. Contrast 1.0000 1.0025 7. Kurtosis 0.2070 0.2180 8. Homogeneit y 0.0403 0.0325 9. Variance 0.5362 0.5222 1 0. Correalatio n 16.1904 16.2508 4.4 Output Result Fig. 6 Output window with the person identified The fig. 6 shows when the finger knuckle is placed on the surface under a camera i.e. Input device, the person gets identified by classifying with stored data in the system. Fig.7 experimental setup 4.5 Graphs The following images are of the graphs plotted for the features extracted during the training period of the system. The same graphs are plotted during the testing of the image having continuous output since, the input frames are continuously acquired from the video input camera. Also the accuracy graphs for the PCA+KNN and LBP+KNN are shown with rate of person identified. Fig. 8 Graph for Skewness Accuracy in %, LBP + KNN, 86.67 Accuracy in %, PCA+KNN , 93.33 LBP + KNN PCA+KNN
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1760 Fig. 9 Graph for Standard Deviation Fig. 10: Graph for Covariance Fig. 11 : Graph for Mean Fig.12 Results For LBP+KNN Method For Person A Fig.13 Results For PCA+KNN Method For Person A 5. CONCLUSION This paper proposes the method for personal identification using finger knuckle print image. This work presented the finger knuckle print image acquisition and database collection, further the image preprocessing, feature extraction, various features, and their matching using K-NN classifier is mentioned. Also the proposed method was compared and validated with the existing techniques. This work concluded that finger knuckle print identification using PCA and K-NN classifier gives quite effective results and achieves high performance in knuckle identification. Thus , finger knuckle print can be used as neoteric biometric identifier. REFERENCES [1] L. Zhang, L. Zhang and D. Zhang, "Finger-knuckle- print: A new biometric identifier," 2009 16th IEEE International Conference on Image Processing (ICIP), Cairo, 2009, pp. 1981-1984 [2] R. D. Raut, S. Kulkarni and N. N. Gharat, "Biometric Authentication Using Kekre's Wavelet Transform," 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies, Nagpur, 2014, pp. 99-104. [3] G. Gao, L. Zhang, J. Yang, L. Zhang and D. Zhang, "Reconstruction Based Finger-Knuckle-Print Verification
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1761 With Score Level Adaptive Binary Fusion," in IEEE Transactions on Image Processing, vol. 22, no. 12, pp. 5050-5062, Dec. 2013. [4] Z. S. Shariatmadar and K. Faez, "An Efficient Method for Finger-Knuckle-Print Recognition by Using the Information Fusion at Different Levels," 2011 International Conference on Hand-Based Biometrics, Hong Kong, 2011, pp. 1-6. [5] B. Bhaskar and S. Veluchamy, "Hand based multibiometric authentication using local feature extraction," 2014 International Conference on Recent Trends in Information Technology, Chennai, 2014, pp. 1- 5. [6] T. Ojala, M. Pietikäinen, and T. Mäenpää, “Trans. Pattern Anal. Mach Multiresolution gray-scale and rotation invariant texture classification with local binary patterns,” IEEE. Intell., vol. 24, no. 7, pp. 971– 987, Jul. 2001. [7] Ajay Kumar, “Importance of Being Unique from Finger Dorsal Patterns: Exploring Minor Finger Knuckle Patterns In Verifying Human Identities” Information Forensics And Security, vol 9, no. 8, pp. 1288-1298, Aug 2014 [8] Woodard D.L., Flynn P.J., “Finger surface as a biometric identifier”, CVIU, vol. 100, pp. 357–384, 2005. [9] Shubhangi Neware,Kamal Mehta , “Finger Knuckle Identification using Principal Component Analysis and Nearest Mean Classifier”,International Journal of Computer Applications (0975 – 8887) Volume 70– No.9, May 2013. [10] A tutorial on Principal Components Analysis,Lindsay I SmithFebruary 26, 2002