Submit Search
Upload
Optimization of human finger knuckle print as a neoteric biometric identifier
•
0 likes
•
53 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i1/IRJET-V4I1351.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 7
Download now
Download to read offline
Recommended
Ijetcas14 598
Ijetcas14 598
Iasir Journals
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
IJERA Editor
Internation Journal Conference
Internation Journal Conference
Hemanth Kumar
50120130406045
50120130406045
IAEME Publication
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
IRJET Journal
IRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of Fingerprint
IRJET Journal
Recommended
Ijetcas14 598
Ijetcas14 598
Iasir Journals
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
IJERA Editor
Internation Journal Conference
Internation Journal Conference
Hemanth Kumar
50120130406045
50120130406045
IAEME Publication
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
IRJET Journal
IRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of Fingerprint
IRJET Journal
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Online
s-mueller
Iris feature extraction
Iris feature extraction
Alexander Decker
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
TELKOMNIKA JOURNAL
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
IDES Editor
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
iosrjce
(2010) HBSI and Hand Geometry
(2010) HBSI and Hand Geometry
International Center for Biometric Research
A survey paper on various biometric security system methods
A survey paper on various biometric security system methods
IRJET Journal
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
ijtsrd
J1076975
J1076975
IJERD Editor
Iris based Human Identification
Iris based Human Identification
dswazalwar
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris Features
CSCJournals
Bw33449453
Bw33449453
IJERA Editor
Ict Security Measures
Ict Security Measures
syamil91
Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)
ainizbahari97
A Study of Iris Recognition
A Study of Iris Recognition
editor1knowledgecuddle
A new multimodel approach for human authentication sclera vein and finger ve...
A new multimodel approach for human authentication sclera vein and finger ve...
eSAT Journals
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
Journal For Research
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
IRJET Journal
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET Journal
A novel multi-biometric technique for verification of secure e-document
A novel multi-biometric technique for verification of secure e-document
IJECEIAES
IRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed Sensing
IRJET Journal
More Related Content
What's hot
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Online
s-mueller
Iris feature extraction
Iris feature extraction
Alexander Decker
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
TELKOMNIKA JOURNAL
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
IDES Editor
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
iosrjce
(2010) HBSI and Hand Geometry
(2010) HBSI and Hand Geometry
International Center for Biometric Research
A survey paper on various biometric security system methods
A survey paper on various biometric security system methods
IRJET Journal
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
ijtsrd
J1076975
J1076975
IJERD Editor
Iris based Human Identification
Iris based Human Identification
dswazalwar
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris Features
CSCJournals
Bw33449453
Bw33449453
IJERA Editor
Ict Security Measures
Ict Security Measures
syamil91
Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)
ainizbahari97
A Study of Iris Recognition
A Study of Iris Recognition
editor1knowledgecuddle
A new multimodel approach for human authentication sclera vein and finger ve...
A new multimodel approach for human authentication sclera vein and finger ve...
eSAT Journals
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
Journal For Research
What's hot
(18)
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Online
Iris feature extraction
Iris feature extraction
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
(2010) HBSI and Hand Geometry
(2010) HBSI and Hand Geometry
A survey paper on various biometric security system methods
A survey paper on various biometric security system methods
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
J1076975
J1076975
Iris based Human Identification
Iris based Human Identification
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris Features
Bw33449453
Bw33449453
Ict Security Measures
Ict Security Measures
Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)
A Study of Iris Recognition
A Study of Iris Recognition
A new multimodel approach for human authentication sclera vein and finger ve...
A new multimodel approach for human authentication sclera vein and finger ve...
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
Similar to Optimization of human finger knuckle print as a neoteric biometric identifier
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
IRJET Journal
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET Journal
A novel multi-biometric technique for verification of secure e-document
A novel multi-biometric technique for verification of secure e-document
IJECEIAES
IRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed Sensing
IRJET Journal
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET Journal
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
An embedded finger vein recognition system
An embedded finger vein recognition system
eSAT Publishing House
Latent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identification
eSAT Publishing House
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
Biometric Ear Recognition System
Biometric Ear Recognition System
IRJET Journal
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
IRJET Journal
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
IRJET Journal
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
IRJET Journal
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
ijcsa
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Maria Perkins
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
Kishor Singh
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET Journal
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
Editor IJCATR
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
IRJET Journal
Similar to Optimization of human finger knuckle print as a neoteric biometric identifier
(20)
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
A novel multi-biometric technique for verification of secure e-document
A novel multi-biometric technique for verification of secure e-document
IRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed Sensing
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
An embedded finger vein recognition system
An embedded finger vein recognition system
Latent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identification
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
Biometric Ear Recognition System
Biometric Ear Recognition System
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Recently uploaded
(20)
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Optimization of human finger knuckle print as a neoteric biometric identifier
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1755 Optimization of Human Finger Knuckle Print as a Neoteric Biometric Identifier Mr.Vishal.B.Raskar1, Ms. Sampada.H.Raut2, 1Professor, dept. of E&TC , JSPM’S Imperial college of engineering and Research, Pune, India 2Master of Engineering Student, dept. of E&TC , JSPM’S Imperial college of engineering and Research, Pune, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Among the several biometric measures developed, the figure knuckle surface is becoming a eminent choice of researchers due to its natural ease of reproducibility and verification. For any purpose of personal identification or crime analysis, figure knuckles surface do not need to be a voluntarily presented, they get exposed naturally. Specific lines, creases, folds and texture pattern on the figure knuckle surfaces can be used as effective biometric measure on their own or in combination with other biometrics. This paper proposes the development of a figure knuckle based biometric identification system. The system incorporates principal component analysis (PCA) for feature extraction after pre-processing and enhancing input image extracted from knuckle surface from video input capture. Secondly the system employs k-nn classifier as a matching classifier for personal identification algorithm. Not only the principal component but Local Binary Pattern is also tested, also various parameters are extracted from the training and testing data. The system implementation is tested, verified and validated with real time data sample test experiments. Key Words: finger knuckle print, pca, K-NN classifier, biometric identifier ,feature extraction, classification, feature matching 1. INTRODUCTION In the developing in digital world, concept of biometric plays an imperative role in security systems, surveillance systems, national ID systems, ecommerce, forensics, information technology and also banking where authentication is vital. Such systems require authentic identification for their system to work flawless. With growth in the population of world, it is presently exceptionally hard to maintain records using traditional ways such as signature, photo identity card. Thus, maintaining digital data records of the individual and using them for identification procedure is very important. Many countries including India (aadhar card i.e. Unique Identity Card) are opting biometric parameters for providing more security and unique identity for the citizens. Identification of humans utilizing their different anatomical and physiological characteristics has been increasingly researched for their variety of applications. There are number of organizations which require precise, on the web and high scale automated personal identification. This has introduced new difficulties for the biometrics technologies. So there is a necessity of introducing and researching on very much simple and robust identification methods. For this, biometrics, described as the unique physiological and in addition behavioral qualities of human beings, will be utilized for differentiating between individuals. In the previous couple of decades, analysts have precisely examined the utilization of different biometric characteristics. Biometrics refers to metrics associated with human characteristics. Biometrics validation is utilized in computer science as a kind of kind of identification and access control. It also can be additionally utilized to find person in gatherings that are under surveillance. Biometric identifiers are the unmistakable, quantifiable characteristics utilized for labeling and depict people. Biometric identifiers are regularly classified as physiological against behavioral attributes. Physiological features are identified with the buildup of the body. Cases fuse, however are not confined to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odor/scent. Behavioral characteristics are identified with the example of conduct of a person, having be that as it may, not constrained be that as it may, not confined to typing rhythm, gait, and voice. Some specialists have begun the term behavior measurements to depict the last class of biometrics. More customary method in the vein of verification are token-based identification frameworks, for example, a driver's license or passport, and knowledge-based or memory depending on distinguishing proof frameworks, like, a password or personal identification number. Since biometric identifiers are one of a kind to people, they are extremely much dependable in checking identity than token and knowledge based techniques; be that as it may, the accumulation of biometric identifiers maximizes security worries about an absolute utilization of this data. The biometrics derived from Greek, where bio implied lively likewise metric implied measure. There are couple of standard rules for biometrics. These are universality, permanence and measurability. Firstly, it is its universality in nature. All universality implies each ordinary person
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1756 possess the biometric. Like the generally used biometrics, e.g. iris, fingerprints, ear surfaces etc. are recognized to be with any typical human personality. Secondly, the permanence implies the time invariance of biometric feature. For example, the fingerprints stay unaltered over the time or by growing age of the person. So one can utilize them for identification or verify regardless of age of the subject. In conclusion, it is the quantifiably of the biometric. Measurability, the biometric can be removed by method for a framework, in a sort of data which can be further prepared, looked at or stored as and when needed. For example the personal iris coloured structure can be verified with the stored one then again finger knuckle print can be put away and later verified for identification. 2. RELATED WORK In paper [1] authors made use of 2D FKP as a biometric identifier for personal authentication. A cost- effective FKP system, having the image acquisition device as well as the associated FKP image processing algorithms is implemented. The database known as FKP which has 5,760 images of 480 different fingers is created. According to authors the system is user friendly, has no remains also moderate size and cost-effectiveness. Authors stated that the system can be improved and employed in real applications. In paper [2], authors developed a system for personal authentication by making use of the finger knuckle surface for feature extraction. The developed FKR method is evaluated utilizing database of all categories of Finger Knuckle samples. They also stated that pre-processing of the database eliminates the noise and also enhances the FKP image that improves the accuracy of the system. Authors stated that the proposed technique has accuracy of 89.99 % and EER of 10.01%. In paper [3], authors proposed a reconstruction based FKP verification technique which minimizes the false rejections generated by finger pose variations in data collection process. For an input query image whose matching distance falls into the uncertain interval, authors reconstructed a novel case of it by using a dictionary learned from the gallery set. Also an adaptive binary fusion (ABF) rule is developed to fuse the two matching distances for the last decision making. The given reconstruction based FKP verification with ABF, denoted by R-ABF, can effectively reduce the false rejections without increasing much the false acceptances. In paper [4], authors have proposed a model which works in two steps. At first stage they investigated the data fusion in single modal, which is the FKP biometric. For fusing the information of each FKP, two different representation of every image is utilized. On the other hand, two different subsets of feature vectors are extracted from each image. In second stage, the data of every finger at two different fusion levels is fused: feature and matching score level. Also used fusion rules in different levels, by which recognition rate is improved. In paper [5] authors concentrated on multimodal biometrics based personal authentication. Two efficient as well as distinct biometric identifiers like palm print as well as inner knuckle print has selected. Novel approach known as Monogenic Binary Coding (MBC) has been used for palm print recognition also Ridgelet transform and SIFT has been used for extracting the features of inner knuckle print. 3. SYSTEM IMPLEMENTATION 3.1 Proposed System The execution of the framework is described using the figure 1. The system uses real time database, which has to undergo training first and then testing, later which gives real time output for identification. Here, feature extraction for the testing dataset plus the training dataset is performed. The system architecture is as follows, Fig. 1: System architecture for Finger Knuckle Identification System The web video input camera send frames of input image to the pre-processing and feature extraction. The values from the features extracted during testing and also training are compared using classifier. In this system Principal Component Analysis (PCA) for feature extraction, it also reduces multi-dimensional data in to lower dimensional data with very less or zero loss of information. Also Local Binary Pattern is used for feature extraction. (LBP- only for testing and comparision) Proposed system has a preprocessing step which is developed in order to maximize the image features. Various features like as mean, standard deviation, entropy, smoothness, skewness, contrast, kurtosis, homogeneity, variance and correlations are extracted. At last KNN classification technique is employed to classify knuckle images. Accuracy for LBP and PCA testing are compared in the results.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1757 3.2 Algorithms: Generic steps involved in algorithm of PCA : 1. Acquisition of data 2. Subtract the mean from each data dimension. This produces a data set whose mean is zero. 3. Calculate the covariance matrix 4. Calculate the eigenvectors and eigenvalues of the covariance matrix 5. Choose components and form a feature vector and form a new dataset. Feature vector = ( eig1, eig2, …., eign ) Here, PCA algorithm extracts relevant information from a knuckle image [Principal Components] and encodes that information in a suitable data structure. 3.3 Mathematical Equations 1. Mean is given: = ∑ Where the meanand is n is the no of elements. 2. Standard Deviation (SD): The Standard Deviation (SD) of an information set is a measure of how the information is spread out. SD is calculated as, ∑ ̅ Where, σ is the standard deviation of a sample. 3. The formula for variance could also be written like this, ∑ ( ) 4. Covariance: Standard Deviation and variance is measured in one dimensions but covariance is measured in two dimensions. The formula for covariance is given as ∑ 5. Skewness: Skewness is a measure of symmetry, or more precisely, the lack of symmetry. 6. LBP: A local binary pattern encoding acquires local knuckle patterns and also represent multi-scale texture patterns. The binary pattern for every pixel centred at with neighbouring pixel is computed as [6] ( ) { } LBP code for corresponding pixel is is generated by assigning binomial weight to the above equation 5.1. ∑ ( ) Where p is the total number of pixels in a local region and p =0,1,2,...p −1. The LBP encoded knuckle images are used to generate LBP descriptors using local histograms. The histogram information from each of the local regions is concatenated to extract the LBP descriptors. The similarity between two LBP descriptors is computed by comparing histogram intersection similarity measure as follows ∑ where w is the number of histogram bins while and represent LBP descriptors from the enhanced knuckle images 7. KNN classifier √∑ where a1 and a2 are two different points between the distance to be calculated 4. RESULTS AND ANALYSIS 4.1 Database Collection Fig.2: Database collected of a person A
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1758 The fig.2 shows database collected of an individual for six times by using a video camera. In this way database can be collected for n number of persons and can be stored 4.2 Testing And Results Validation Fig.3 : Testing of image with pre-processing result and LBP feature extraction The fig. 3 shows the testing of image acquired from person A . The LBP feature extraction method is applied for the same . it shows the features extracted in the graphical form too. The same image is processed using PCA and the following fig.4 shows the results for the mentioned system . Fig.4 Results For PCA Feature Extraction Table 1 Testing database. Table 1 shows the number of testing and training image samples and the no. of individuals tested. Table 2: Result for testing with LBP+KNN Table 3: Result for testing with PCA+KNN Method: PCA+KNN Person Image name Expected Result Our Result 1 A-test1.jpg to A- test4.jpg Person A Person A A-test5.jpg Person A Person A A-tes65.jpg Person A Person A 2 B-test1.jpg to B- test4.jpg Person B Person B B-test5.jpg Person B Person B B-tes65.jpg Person B Person B 3 C-test1.jpg to C- test4.jpg Person C Person C C-test5.jpg Person C Person C C-test6.jpg Person C Person E 4 D-test1.jpg to D- test4.jpg Person D Person D D-test5.jpg Person D Person D D-test6.jpg Person D Person A 5 E-test1.jpg to E- test4.jpg Person E Person E E-test5.jpg Person E Person E E-test6.jpg Person E Person E Total no of Test image : 10 Total no of training image : 20 Total no of person : 5 Method: LBP+KNN Person Image name Expected Result Our Result 1 A-test1.jpg to A- test4.jpg Person A Person A A-test5.jpg Person A Person A A-tes65.jpg Person A Person A 2 B-test1.jpg to B- test4.jpg Person B Person B B-test5.jpg Person B Person B B-test6.jpg Person B Person A 3 C-test1.jpg to C- test4.jpg Person C Person C C-test5.jpg Person C Person C C-test6.jpg Person C Person A 4 D-test1.jpg to D- test4.jpg Person D Person D D-test5.jpg Person D Person D D-test6.jpg Person D Person E 5 E-test1.jpg to E- test4.jpg Person E Person E E-test5.jpg Person E Person C E-test6.jpg Person E Person E
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1759 4.3 Accuracy Calculations: Table4: Accuracy for LBP+KNN Method Total no. images : 30 Accuracy = ( correctly classified image / total no. of image) Accuracy=(26/30)*100 Accuracy = 86.67% Table5: Accuracy for PCA+KNN Method Total no. Images: 30 Accuracy = (correctly classified image / total no. Of image) Accuracy=(28/30)*100 Accuracy = 93.33% Fig.5 Accuracy calculated for database for both the methods. Table 6. statistical feature values extracted for person A Sr . N o. Featured extracted Values extracted for training image Values extracted for testing image 1. Mean 129.5216 129.5101 2. Standard deviation 73.3174 73.3304 3. Entropy -0.4856 -0.4605 4. Smoothness .-0.0827 -0.0787 5. Skewness -0.0025 -0.0030 6. Contrast 1.0000 1.0025 7. Kurtosis 0.2070 0.2180 8. Homogeneit y 0.0403 0.0325 9. Variance 0.5362 0.5222 1 0. Correalatio n 16.1904 16.2508 4.4 Output Result Fig. 6 Output window with the person identified The fig. 6 shows when the finger knuckle is placed on the surface under a camera i.e. Input device, the person gets identified by classifying with stored data in the system. Fig.7 experimental setup 4.5 Graphs The following images are of the graphs plotted for the features extracted during the training period of the system. The same graphs are plotted during the testing of the image having continuous output since, the input frames are continuously acquired from the video input camera. Also the accuracy graphs for the PCA+KNN and LBP+KNN are shown with rate of person identified. Fig. 8 Graph for Skewness Accuracy in %, LBP + KNN, 86.67 Accuracy in %, PCA+KNN , 93.33 LBP + KNN PCA+KNN
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1760 Fig. 9 Graph for Standard Deviation Fig. 10: Graph for Covariance Fig. 11 : Graph for Mean Fig.12 Results For LBP+KNN Method For Person A Fig.13 Results For PCA+KNN Method For Person A 5. CONCLUSION This paper proposes the method for personal identification using finger knuckle print image. This work presented the finger knuckle print image acquisition and database collection, further the image preprocessing, feature extraction, various features, and their matching using K-NN classifier is mentioned. Also the proposed method was compared and validated with the existing techniques. This work concluded that finger knuckle print identification using PCA and K-NN classifier gives quite effective results and achieves high performance in knuckle identification. Thus , finger knuckle print can be used as neoteric biometric identifier. REFERENCES [1] L. Zhang, L. Zhang and D. Zhang, "Finger-knuckle- print: A new biometric identifier," 2009 16th IEEE International Conference on Image Processing (ICIP), Cairo, 2009, pp. 1981-1984 [2] R. D. Raut, S. Kulkarni and N. N. Gharat, "Biometric Authentication Using Kekre's Wavelet Transform," 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies, Nagpur, 2014, pp. 99-104. [3] G. Gao, L. Zhang, J. Yang, L. Zhang and D. Zhang, "Reconstruction Based Finger-Knuckle-Print Verification
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1761 With Score Level Adaptive Binary Fusion," in IEEE Transactions on Image Processing, vol. 22, no. 12, pp. 5050-5062, Dec. 2013. [4] Z. S. Shariatmadar and K. Faez, "An Efficient Method for Finger-Knuckle-Print Recognition by Using the Information Fusion at Different Levels," 2011 International Conference on Hand-Based Biometrics, Hong Kong, 2011, pp. 1-6. [5] B. Bhaskar and S. Veluchamy, "Hand based multibiometric authentication using local feature extraction," 2014 International Conference on Recent Trends in Information Technology, Chennai, 2014, pp. 1- 5. [6] T. Ojala, M. Pietikäinen, and T. Mäenpää, “Trans. Pattern Anal. Mach Multiresolution gray-scale and rotation invariant texture classification with local binary patterns,” IEEE. Intell., vol. 24, no. 7, pp. 971– 987, Jul. 2001. [7] Ajay Kumar, “Importance of Being Unique from Finger Dorsal Patterns: Exploring Minor Finger Knuckle Patterns In Verifying Human Identities” Information Forensics And Security, vol 9, no. 8, pp. 1288-1298, Aug 2014 [8] Woodard D.L., Flynn P.J., “Finger surface as a biometric identifier”, CVIU, vol. 100, pp. 357–384, 2005. [9] Shubhangi Neware,Kamal Mehta , “Finger Knuckle Identification using Principal Component Analysis and Nearest Mean Classifier”,International Journal of Computer Applications (0975 – 8887) Volume 70– No.9, May 2013. [10] A tutorial on Principal Components Analysis,Lindsay I SmithFebruary 26, 2002
Download now