SlideShare a Scribd company logo
VIVEKANANDHA COLLEGE OF ENGINEERING FOR WOMEN
(AUTONOMOUS)
JOINT PALMPRINT AND PALMVEIN
VERIFICATION BY DUAL COMPETITIVE
CODING
DEPARTMENT OF ELECTRICAL AND ELECTRONICS ENGINEERING
BY
BANUPRIYA.R
DHARANI.B
KAVIYA.T
III -YEAR
Content
 Objective
 Introduction
 Existing system
 Proposed system
 Palm print
 Palm vein
Contd……
 Fusion
 Dual competitive coding
 System analysis
 System design
 Simulation results
 Literature survey
 conclusion
Objective
 Biometric identification with vein and print of palm
patterns is a more recent approach that uses the vast
network of blood vessels underneath a person’s skin.
 An attempt to copy an identity is extremely difficult
Introduction
 Palmprint is one of the relatively new physiological
biometric technologies which exploit the unique features
on the human palmprint, namely principle lines,
wrinkles, ridges, datum points, etc…,
 palmprint features will be extracted by texture coding.
 palmvein features will be extracted by matched filters.
Literature survey
Title Author name Technique Used Limitation
Online palm print
identification
David Zhang Competitive approach
used
Low resolution
palmprint images
Two dimensional
locality preserving
projections with its
applications to
palmprint recognition
D.Hu,G.Feng Line Edge Map
(LEM) used
No biometric traits are
perfect for
identification because
they are not
sufficiently accurate.
Existing system
 They use fingerprints, face, iris, speech and hand
geometry for the case of person identification.
 No biometric traits are perfect for identification because
they are not sufficiently accurate.
Proposed system
 The human palm vein pattern is extremely complex and
it shows a huge no of vessels.
 The biometric information is located inside the human
body and it is protected against forgery and
manipulation.
Palmprint
 A palm print refers to an image acquired of the palm
region of the hand. It can be either an online image (i.e.
Taken by a scanner or CCD) or offline image where the
image is taken with ink and paper.
 Palm prints can be used for criminal, forensic, or
commercial applications.
Palmvein
 As veins are under the skin and have a wealth of
differentiating features.
 An attempt to copy an identity is extremely difficult.
 Uniqueness, stability and strong immunity to forgery
Fusion
 The information presented by multiple traits can be
fused at various levels: image level, feature level,
matching score level or decision level
 Palm print and palm vein can be captured
simultaneously by using specially designed devices
 The joint use of palmprint and palm vein features
can effectively available in the system
Modules
 Login
 Options
 New User Entry
 Search Details
 Crime Details
Login
 Login that is a simple form with a username and
password field.
 Upon clicking the submit button I would like to check
the database if that username and password exist.
 If it does I would like to set some session variables, if not
then I would simply like to redirect.
Login
Option
 After Successful Login User can Select the Following
options :
New User Entry
Searching Details
 Crime Details
Selection
New user entry
 The user should be able to enter records.
b. Each record represents information about a person
and contains an image of his/her Palm.
c. Records may consists of:
 First name.
 Last name.
 Phone.
 Address (city-street address).
 Palm image(s).
 ID-number.
New user entry
Searching detail
The results should be viewed by showing the palm
matches the input, and display the most possible image
first, in numerical order. The user should be able to
chose (click on) the result that he/she wants and view
the full record’s information of the person. The system
can do noisy filter on images.
Searching detail
Crime detail
 In our database we already added the most wanted
criminals palm veins.
 Suppose that persons are enter the new user entry it
matches to the image from database.
 It will immediately inform the admin.
Biometrics
Many biometric systems,
such as face, fingerprint and
iris have been studied
extensively for personal
verification and identification
purposes
Anti-spoofing
Liveness detection
• A new software-based liveness detection
approach using a novel fingerprint
parameterization based on quality related
features is proposed.
• The system is tested on a highly challenging
database comprising over 10,500 real and fake
images
Contd…
 In this paper, we have proposed palmprint and palm
vein system for real-time biometric authentication.
 So , a joint palmprint-palmvein coding scheme was
proposed by regarding both palm line and palm vein
features as line structures. By investigating the original
CompCode algorithm
Advantages
 higher accuracy
 higher accuracy could be achieved by fusing them than
using only one of them. In addition, the whole
verification procedure can be completed in 1.2 s, which
implies that the system can work in real time
reference
 D. Hu, G. Feng, and Z. Zhou, "Two-dimensional locality
preserving projections (2DLPP) with its application to
palmprint recognition", Pattern Recognition, vol.
40,2007, pp. 339-342.
 T. Connie, A Jin, M. Ong, and D. Ling, "An automated
palmprint
recognition system", Image and Vision Computing, vol.
23,2005, 501-515.
 A. Kong, and D. Zhang, "Competitive coding scheme for
palmprint verification", International Conference on
Pattern Recognition, 2004,pp. 520-523
conclusion
 we proposed a new line orientation code, namely the
DualCompCode, by extracting and fusing
 The dissimilarity was measured by bitwise Hamming
distance.
Future work
• Future work will focus on how to effectively use all the
directional information provided by the Gabor filtering
for a more accurate palmprint and palmvein recognition
algorithm
joint palmprint and palmvein verification using dual competitive coding

More Related Content

PDF
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PDF
Using (Bio)Metrics To Predict Code Quality Online
PPTX
Paper multi-modal biometric system using fingerprint , face and speech
PDF
Zahid Akhtar - Ph.D. Defense Slides
PDF
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
PDF
Final Report Biometrics
PDF
Finger vein based biometric security system
PPTX
Finger vein technology
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
Using (Bio)Metrics To Predict Code Quality Online
Paper multi-modal biometric system using fingerprint , face and speech
Zahid Akhtar - Ph.D. Defense Slides
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Final Report Biometrics
Finger vein based biometric security system
Finger vein technology

What's hot (20)

PPT
biometric technology
PPTX
Biometric Security Systems ppt
PPTX
Biometricsppt
PPT
Multimodal Biometric Systems
PPTX
Presentation Fingervein Authentication
DOCX
Fingerprint recognition (term paper) Project
PPT
Vein Recognition Method
PPT
Biometrics
PPT
Biometric
PPTX
Biometric technology
PPT
Biometric security Presentation
PPTX
implementation of finger vein authentication technique
PPT
Ubiquitous security- is it just biometrics?
PPTX
Biometric authentication
PPTX
Biometrics
PDF
hand vein structure authentication
PPTX
Biometric authentication reiew
PPTX
Biometrics
PPT
A study on biometric authentication techniques
PPTX
Biometric security using cryptography
biometric technology
Biometric Security Systems ppt
Biometricsppt
Multimodal Biometric Systems
Presentation Fingervein Authentication
Fingerprint recognition (term paper) Project
Vein Recognition Method
Biometrics
Biometric
Biometric technology
Biometric security Presentation
implementation of finger vein authentication technique
Ubiquitous security- is it just biometrics?
Biometric authentication
Biometrics
hand vein structure authentication
Biometric authentication reiew
Biometrics
A study on biometric authentication techniques
Biometric security using cryptography
Ad

Similar to joint palmprint and palmvein verification using dual competitive coding (20)

PDF
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
PDF
M.Phil Computer Science Biometric System Projects
PDF
M phil-computer-science-biometric-system-projects
PDF
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
PDF
M.E Computer Science Biometric System Projects
PDF
Palmprint Identification Based on Principle Line Using Machine Learning Tech...
DOC
Biometrics for e-voting
PDF
Improving the accuracy of fingerprinting system using multibiometric approach
PPTX
Pattern recognition palm print authentication system
PDF
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
PDF
IRIS Recognition Based Authentication System In ATM
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
IRJET - An Enhanced Signature Verification System using KNN
PDF
J1802035460
PDF
Authentication Schemes for Session Passwords using Color and Images
PDF
Optimization of human finger knuckle print as a neoteric biometric identifier
PDF
Automatic signature verification with chain code using weighted distance and ...
PDF
4.report (biometric security system)
PDF
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
PDF
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
M.Phil Computer Science Biometric System Projects
M phil-computer-science-biometric-system-projects
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
M.E Computer Science Biometric System Projects
Palmprint Identification Based on Principle Line Using Machine Learning Tech...
Biometrics for e-voting
Improving the accuracy of fingerprinting system using multibiometric approach
Pattern recognition palm print authentication system
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
IRIS Recognition Based Authentication System In ATM
International Journal of Computational Engineering Research(IJCER)
IRJET - An Enhanced Signature Verification System using KNN
J1802035460
Authentication Schemes for Session Passwords using Color and Images
Optimization of human finger knuckle print as a neoteric biometric identifier
Automatic signature verification with chain code using weighted distance and ...
4.report (biometric security system)
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Ad

Recently uploaded (20)

PDF
Well-logging-methods_new................
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
additive manufacturing of ss316l using mig welding
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Artificial Intelligence
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Current and future trends in Computer Vision.pptx
Well-logging-methods_new................
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Lecture Notes Electrical Wiring System Components
bas. eng. economics group 4 presentation 1.pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Internet of Things (IOT) - A guide to understanding
CYBER-CRIMES AND SECURITY A guide to understanding
Automation-in-Manufacturing-Chapter-Introduction.pdf
Digital Logic Computer Design lecture notes
additive manufacturing of ss316l using mig welding
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Operating System & Kernel Study Guide-1 - converted.pdf
Artificial Intelligence
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Foundation to blockchain - A guide to Blockchain Tech
Current and future trends in Computer Vision.pptx

joint palmprint and palmvein verification using dual competitive coding

  • 1. VIVEKANANDHA COLLEGE OF ENGINEERING FOR WOMEN (AUTONOMOUS) JOINT PALMPRINT AND PALMVEIN VERIFICATION BY DUAL COMPETITIVE CODING DEPARTMENT OF ELECTRICAL AND ELECTRONICS ENGINEERING BY BANUPRIYA.R DHARANI.B KAVIYA.T III -YEAR
  • 2. Content  Objective  Introduction  Existing system  Proposed system  Palm print  Palm vein
  • 3. Contd……  Fusion  Dual competitive coding  System analysis  System design  Simulation results  Literature survey  conclusion
  • 4. Objective  Biometric identification with vein and print of palm patterns is a more recent approach that uses the vast network of blood vessels underneath a person’s skin.  An attempt to copy an identity is extremely difficult
  • 5. Introduction  Palmprint is one of the relatively new physiological biometric technologies which exploit the unique features on the human palmprint, namely principle lines, wrinkles, ridges, datum points, etc…,  palmprint features will be extracted by texture coding.  palmvein features will be extracted by matched filters.
  • 6. Literature survey Title Author name Technique Used Limitation Online palm print identification David Zhang Competitive approach used Low resolution palmprint images Two dimensional locality preserving projections with its applications to palmprint recognition D.Hu,G.Feng Line Edge Map (LEM) used No biometric traits are perfect for identification because they are not sufficiently accurate.
  • 7. Existing system  They use fingerprints, face, iris, speech and hand geometry for the case of person identification.  No biometric traits are perfect for identification because they are not sufficiently accurate.
  • 8. Proposed system  The human palm vein pattern is extremely complex and it shows a huge no of vessels.  The biometric information is located inside the human body and it is protected against forgery and manipulation.
  • 9. Palmprint  A palm print refers to an image acquired of the palm region of the hand. It can be either an online image (i.e. Taken by a scanner or CCD) or offline image where the image is taken with ink and paper.  Palm prints can be used for criminal, forensic, or commercial applications.
  • 10. Palmvein  As veins are under the skin and have a wealth of differentiating features.  An attempt to copy an identity is extremely difficult.  Uniqueness, stability and strong immunity to forgery
  • 11. Fusion  The information presented by multiple traits can be fused at various levels: image level, feature level, matching score level or decision level  Palm print and palm vein can be captured simultaneously by using specially designed devices  The joint use of palmprint and palm vein features can effectively available in the system
  • 12. Modules  Login  Options  New User Entry  Search Details  Crime Details
  • 13. Login  Login that is a simple form with a username and password field.  Upon clicking the submit button I would like to check the database if that username and password exist.  If it does I would like to set some session variables, if not then I would simply like to redirect.
  • 14. Login
  • 15. Option  After Successful Login User can Select the Following options : New User Entry Searching Details  Crime Details
  • 17. New user entry  The user should be able to enter records. b. Each record represents information about a person and contains an image of his/her Palm. c. Records may consists of:  First name.  Last name.  Phone.  Address (city-street address).  Palm image(s).  ID-number.
  • 19. Searching detail The results should be viewed by showing the palm matches the input, and display the most possible image first, in numerical order. The user should be able to chose (click on) the result that he/she wants and view the full record’s information of the person. The system can do noisy filter on images.
  • 21. Crime detail  In our database we already added the most wanted criminals palm veins.  Suppose that persons are enter the new user entry it matches to the image from database.  It will immediately inform the admin.
  • 22. Biometrics Many biometric systems, such as face, fingerprint and iris have been studied extensively for personal verification and identification purposes
  • 24. Liveness detection • A new software-based liveness detection approach using a novel fingerprint parameterization based on quality related features is proposed. • The system is tested on a highly challenging database comprising over 10,500 real and fake images
  • 25. Contd…  In this paper, we have proposed palmprint and palm vein system for real-time biometric authentication.  So , a joint palmprint-palmvein coding scheme was proposed by regarding both palm line and palm vein features as line structures. By investigating the original CompCode algorithm
  • 26. Advantages  higher accuracy  higher accuracy could be achieved by fusing them than using only one of them. In addition, the whole verification procedure can be completed in 1.2 s, which implies that the system can work in real time
  • 27. reference  D. Hu, G. Feng, and Z. Zhou, "Two-dimensional locality preserving projections (2DLPP) with its application to palmprint recognition", Pattern Recognition, vol. 40,2007, pp. 339-342.  T. Connie, A Jin, M. Ong, and D. Ling, "An automated palmprint recognition system", Image and Vision Computing, vol. 23,2005, 501-515.  A. Kong, and D. Zhang, "Competitive coding scheme for palmprint verification", International Conference on Pattern Recognition, 2004,pp. 520-523
  • 28. conclusion  we proposed a new line orientation code, namely the DualCompCode, by extracting and fusing  The dissimilarity was measured by bitwise Hamming distance.
  • 29. Future work • Future work will focus on how to effectively use all the directional information provided by the Gabor filtering for a more accurate palmprint and palmvein recognition algorithm