SlideShare a Scribd company logo
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 11, Issue 05 (May 2015), PP.01-03
1
Palm Authentication Using Biometric System
Devendra Singh Kushwaha, Dr. Vikash Kumar Singh, Sonal sharma
Assistant Professor, Dept. of Computer Science, Indira Gandhi National Tribal University, Amarkantak
Abstract:- Biometric authentication has been receiving much interest over the past decade with rising demands
in automated personal identification. Biometric systems are superior because they provide a non-transferable
means of identifying people not just cards or badges. Reliability and accuracy in personal authentication
system is a dominant concern to the security world. Palm vein authentication technologies are one of the
upcoming technologies which is highly secure. It is the world’s very first contactless and personal identification
system that uses the vein patterns in human palms to confirm a person’s identity. The Palm Secure technology
is designed in such a way that it can only detect the vein pattern of living people. The scanned process was
extremely fast and does not involve any contact meaning that Palm Secure meets the stringent hygienic
requirements that are normally necessary for use in public environments. Image fusion is the technology that
combines several images of the same area or the same object under different imaging conditions. It is used to
generate a result which describes the scene better than any single image with respect to relevant properties; it
means the acquisition of perceptually important information. Palm prints are believed to have the critical
properties of universality, uniqueness, and collectability for personal authentication. Palms are large in size and
contain abundant features of different levels, such as creases, palm lines, texture, ridges, delta points and
minutiae. Palms are more robust to damage and dirt.
Keywords:- Biometrics, Palm vein authentication, DCT, Walsh, Hybrid, EDT, Threshold value.
I. INTRODUCTION
Biometric authentication has been receiving much interest over the past decade with rising demands
in automated personal identification. Reliability and accuracy in personal authentication system is a
dominant concern to the security world. Biometric systems are superior because they provide a non-
transferable means of identifying people not just cards and badges. The key point is all about of an
identification method that is ”non-transferable" means it cannot be given or lent to another individual so
nobody can get around the system - they personally have to go through the control point .
The fundamentals of biometrics are that they are things about a person: Measurable - things that can
be counted as well as numbered or otherwise quantified, the Physiological characteristics - like height, eye color,
fingerprint, DNA etc. and Behavioral characteristics - such as the way a person moves, walks, types . Among
many biometric techniques, palm print recognition is one of the most trustworthy approaches. Palm vein
pattern authentication is the first contactless technology that uses vascular patterns as personal identification
data.
Palm print identification and verification is an innovative endeavor especially in academic research
field. Palm print provides abundant and stable attributes, such as principal lines, wrinkles, minutiae, delta
points, etc., to palm print recognition system. Palm prints are believed to have the critical properties of
universality, uniqueness, and collectability for personal authentication. Palms are large in size and contain
abundant features of different levels, such as creases, palm lines, texture, ridges, delta points and minutiae.
Palms are more robust to damage and dirt. In this ubiquitous network culture, where individuals can easily
access their information anytime and anywhere, they also can face the risk that others might easily access the
same information anytime and from anywhere. Due to this risk, personal identification technology which
distinguishes between registered legitimate users and imposters is now coming into the picture. Currently,
passwords, Personal Identification Numbers (4-digit PIN numbers) or identification cards are used for personal
identification. However, cards can be stolen, and passwords and numbers can be guessed or forgotten.
Hence to solve such kind of problems, biometric authentication technology, which is one among
the best identifies people by their unique and very distinct features of biological information, is seeking the
attention of every user. In biometric authentication, an account holder’s or the registered user bodies the
characteristics or behaviors (habits) of the human being's are registered in a database and then compared with
others who may try to access that account to see if the attempt is legitimate.
Palm Authentication Using Biometric System
2
II. METHODOLOGY
The Palm vein authentication design and implementation is done using the following algorithms:
1. Hybrid approach
2. Edge detection histogram approach
III. HYBRID APPROACH
Absolute value is less than threshold value then print match is found else match is not found. If
match is found then calculate the Euclidean distance and display the match.
The Kekre's hybrid transform is generated by combination of two basic matrices like namely
Discrete Cosine Transformation and Walsh as well as Kekre’s transform and Hartley transform which world is
widely known. Kekre’s hybrid wavelet transform is generated by using two input matrices so that best
qualities of both of the matrices can be incorporated into hybrid matrix. The matrix which has one of the
major advantage is that it can be used for images which are not integer power of 2.Image fusion combines
two or more images of same object or scene so that the final output image contains more information . There
are several situations in which image processing require high spatial and high spectral resolution in a single
image. In image fusion process the most significant features in the input images are identified and transferred
them without loss into the fused image. Here basically the direct cosines transform and Walsh transform
matrix is used to obtain the hybrid matrix.
IV. EDGE DETECTION HISTOGRAM
Edges in images constitute an important feature to represent their content. Also, the human eyes
which are very sensitive to edge features for image perception. The edge histogram is very useful for indexing
and retrieving images. One way of representing such an important edge feature i.e.EHD is to use a histogram.
An edge histogram in the image space which represents the frequency and the directionality of the brightness
changes in the image. It is a unique feature of the images, which in any case cannot be duplicated by a color
histogram or the homogeneous texture features.
V. PROPOSED ALGORITHM
Take the input image. Check if the image is of 128*128 sizes. If not then convert it into the size and if
it is of appropriate size then mark it as a test image. Now generate two DCT matrix and Walsh transform
matrix: DCT is a 8*8 matrix size & Walsh transform is a 16*16 matrix size. Then generate the hybrid
matrix using fusion techniques on both DCT and Walsh Matrix. After this feature extraction is done by edge
histogram descriptor. Using hybrid transform matrix and trained set. Check for threshold value – If
VI. ADVANTAGES
Palm print offers advantages: non-intrusive, low resolution imaging, user-friendly, moderate price
capture devices, stable and distinct feature In addition to the palm, the vein technology which authenticates can
be done using the vascular pattern on the back of the hand or a finger. Vein patterns are unique to individuals
and contain detailed characteristics for formulation of algorithm .However; the palm vein pattern is the most
complex and covers the widest area. Because the palm which has no hair, it becomes much easier to
photograph its vascular pattern of the palm. The palm also has no significant variations in skin colour
compared with fingers or the back of the hand, where the colour can darken in certain areas. Vein
recognition technology is secure because the authentication data exists inside the body and is therefore very
difficult to forge. Contactless authentication is hygienic and non-invasive, thus promoting the high-level of
acceptance of any user. Advanced authentication algorithm produces high level of accuracy and application
versatility
VII. CONCLUSION
Palm vein technology is highly secure because it uses information contained within the body and is
also highly accurate because the pattern of veins in the palm is complex and unique to each individual. In
addition to this, its contactless feature gives it a hygienic advantage over other biometric authentication
technologies.
Palm Authentication Using Biometric System
3
REFERENCES
[1]. International Conference on Communication, Information & Computing Technology (ICCICT),
Mumbai, 2012 Image Fusion Using Kekre’s hybrid Wavelet Transform.
[2]. International Journal of Control and Automation Vol. 3, No. 1, March, 2010 Palm Vein Authentication
System: A Review
[3]. International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2,
Issue-5, June 2013, A Hybrid Approach for Securing Biometric Template
[4]. ETRI Journal, Volume 24, Number 1, February 2002 Efficient Use of MPEG-7 Edge Histogram
Descriptor
[5]. International Journal of Advanced Computer Science and Applications, Vol. 4, No.3, 2013 Multi-
resolution Analysis of Multi-spectral Palm prints using Hybrid Wavelets for Identification

More Related Content

PDF
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PDF
Paper id 21201494
PDF
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
PDF
HMM-Based Face Recognition System with SVD Parameter
PDF
(2005) An Evaluation Of Fingerprint Image Quality Across An Elderly Populatio...
PDF
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
PDF
Bw33449453
PDF
Paper id 25201413
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
Paper id 21201494
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
HMM-Based Face Recognition System with SVD Parameter
(2005) An Evaluation Of Fingerprint Image Quality Across An Elderly Populatio...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bw33449453
Paper id 25201413

What's hot (18)

PDF
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
PDF
Biometric Authentication Based on Hash Iris Features
PDF
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
PDF
“Enhancing Iris Scanning Using Visual Cryptography”
DOCX
Biometric Class Attendace System
PPTX
Seminar
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
A Comparison Based Study on Biometrics for Human Recognition
PDF
Role of fuzzy in multimodal biometrics system
PDF
Computer vision approaches for offline signature verification & forgery detec...
PDF
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
PDF
A Study on Fingerprint (biometrics) Recognition
PDF
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
PDF
High Security Human Recognition System using Iris Images
PPTX
Biometric Security Systems ppt
PPT
Ubiquitous security- is it just biometrics?
PDF
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
PDF
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Biometric Authentication Based on Hash Iris Features
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
“Enhancing Iris Scanning Using Visual Cryptography”
Biometric Class Attendace System
Seminar
International Journal of Computational Engineering Research(IJCER)
A Comparison Based Study on Biometrics for Human Recognition
Role of fuzzy in multimodal biometrics system
Computer vision approaches for offline signature verification & forgery detec...
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A Study on Fingerprint (biometrics) Recognition
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
High Security Human Recognition System using Iris Images
Biometric Security Systems ppt
Ubiquitous security- is it just biometrics?
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
Ad

Similar to Palm Authentication Using Biometric System (20)

PDF
Enhancing the Cash Point using Multimode Biometric System
PPTX
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
PPS
Ranjith_Bm
DOC
8 g iris-recognition_system
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
hand vein structure authentication
PPTX
Biometric security using cryptography
PDF
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
PPTX
Presentation Fingervein Authentication
PDF
Fingerprint Based Biometric ATM Authentication System
PDF
Douglas2018 article an_overviewofsteganographytechn (1)
PPTX
Security
DOCX
Design of a hand geometry based biometric system
TXT
kiran's slide info
PPTX
Computer science ppt
PDF
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
PDF
Enhancing Security of Multimodal Biometric Authentication System by Implement...
PDF
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
PDF
IRJET- Advanced Two Factor Authentication using Image Processing
PDF
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Enhancing the Cash Point using Multimode Biometric System
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Ranjith_Bm
8 g iris-recognition_system
International Journal of Engineering Research and Development (IJERD)
hand vein structure authentication
Biometric security using cryptography
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Presentation Fingervein Authentication
Fingerprint Based Biometric ATM Authentication System
Douglas2018 article an_overviewofsteganographytechn (1)
Security
Design of a hand geometry based biometric system
kiran's slide info
Computer science ppt
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
IRJET- Advanced Two Factor Authentication using Image Processing
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Ad

More from IJERD Editor (20)

PDF
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
PDF
MEMS MICROPHONE INTERFACE
PDF
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
PDF
Gold prospecting using Remote Sensing ‘A case study of Sudan’
PDF
Reducing Corrosion Rate by Welding Design
PDF
Router 1X3 – RTL Design and Verification
PDF
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
PDF
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
PDF
Study on the Fused Deposition Modelling In Additive Manufacturing
PDF
Spyware triggering system by particular string value
PDF
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
PDF
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
PDF
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
PDF
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
PDF
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
PDF
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
PDF
Moon-bounce: A Boon for VHF Dxing
PDF
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
PDF
Importance of Measurements in Smart Grid
PDF
Study of Macro level Properties of SCC using GGBS and Lime stone powder
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
MEMS MICROPHONE INTERFACE
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Reducing Corrosion Rate by Welding Design
Router 1X3 – RTL Design and Verification
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Study on the Fused Deposition Modelling In Additive Manufacturing
Spyware triggering system by particular string value
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Moon-bounce: A Boon for VHF Dxing
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
Importance of Measurements in Smart Grid
Study of Macro level Properties of SCC using GGBS and Lime stone powder

Recently uploaded (20)

PPTX
Geodesy 1.pptx...............................................
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Well-logging-methods_new................
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPT
Project quality management in manufacturing
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Welding lecture in detail for understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
composite construction of structures.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Construction Project Organization Group 2.pptx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Digital Logic Computer Design lecture notes
Geodesy 1.pptx...............................................
UNIT 4 Total Quality Management .pptx
Well-logging-methods_new................
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Model Code of Practice - Construction Work - 21102022 .pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
CYBER-CRIMES AND SECURITY A guide to understanding
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Project quality management in manufacturing
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Welding lecture in detail for understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
composite construction of structures.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Operating System & Kernel Study Guide-1 - converted.pdf
Construction Project Organization Group 2.pptx
additive manufacturing of ss316l using mig welding
Internet of Things (IOT) - A guide to understanding
Digital Logic Computer Design lecture notes

Palm Authentication Using Biometric System

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 11, Issue 05 (May 2015), PP.01-03 1 Palm Authentication Using Biometric System Devendra Singh Kushwaha, Dr. Vikash Kumar Singh, Sonal sharma Assistant Professor, Dept. of Computer Science, Indira Gandhi National Tribal University, Amarkantak Abstract:- Biometric authentication has been receiving much interest over the past decade with rising demands in automated personal identification. Biometric systems are superior because they provide a non-transferable means of identifying people not just cards or badges. Reliability and accuracy in personal authentication system is a dominant concern to the security world. Palm vein authentication technologies are one of the upcoming technologies which is highly secure. It is the world’s very first contactless and personal identification system that uses the vein patterns in human palms to confirm a person’s identity. The Palm Secure technology is designed in such a way that it can only detect the vein pattern of living people. The scanned process was extremely fast and does not involve any contact meaning that Palm Secure meets the stringent hygienic requirements that are normally necessary for use in public environments. Image fusion is the technology that combines several images of the same area or the same object under different imaging conditions. It is used to generate a result which describes the scene better than any single image with respect to relevant properties; it means the acquisition of perceptually important information. Palm prints are believed to have the critical properties of universality, uniqueness, and collectability for personal authentication. Palms are large in size and contain abundant features of different levels, such as creases, palm lines, texture, ridges, delta points and minutiae. Palms are more robust to damage and dirt. Keywords:- Biometrics, Palm vein authentication, DCT, Walsh, Hybrid, EDT, Threshold value. I. INTRODUCTION Biometric authentication has been receiving much interest over the past decade with rising demands in automated personal identification. Reliability and accuracy in personal authentication system is a dominant concern to the security world. Biometric systems are superior because they provide a non- transferable means of identifying people not just cards and badges. The key point is all about of an identification method that is ”non-transferable" means it cannot be given or lent to another individual so nobody can get around the system - they personally have to go through the control point . The fundamentals of biometrics are that they are things about a person: Measurable - things that can be counted as well as numbered or otherwise quantified, the Physiological characteristics - like height, eye color, fingerprint, DNA etc. and Behavioral characteristics - such as the way a person moves, walks, types . Among many biometric techniques, palm print recognition is one of the most trustworthy approaches. Palm vein pattern authentication is the first contactless technology that uses vascular patterns as personal identification data. Palm print identification and verification is an innovative endeavor especially in academic research field. Palm print provides abundant and stable attributes, such as principal lines, wrinkles, minutiae, delta points, etc., to palm print recognition system. Palm prints are believed to have the critical properties of universality, uniqueness, and collectability for personal authentication. Palms are large in size and contain abundant features of different levels, such as creases, palm lines, texture, ridges, delta points and minutiae. Palms are more robust to damage and dirt. In this ubiquitous network culture, where individuals can easily access their information anytime and anywhere, they also can face the risk that others might easily access the same information anytime and from anywhere. Due to this risk, personal identification technology which distinguishes between registered legitimate users and imposters is now coming into the picture. Currently, passwords, Personal Identification Numbers (4-digit PIN numbers) or identification cards are used for personal identification. However, cards can be stolen, and passwords and numbers can be guessed or forgotten. Hence to solve such kind of problems, biometric authentication technology, which is one among the best identifies people by their unique and very distinct features of biological information, is seeking the attention of every user. In biometric authentication, an account holder’s or the registered user bodies the characteristics or behaviors (habits) of the human being's are registered in a database and then compared with others who may try to access that account to see if the attempt is legitimate.
  • 2. Palm Authentication Using Biometric System 2 II. METHODOLOGY The Palm vein authentication design and implementation is done using the following algorithms: 1. Hybrid approach 2. Edge detection histogram approach III. HYBRID APPROACH Absolute value is less than threshold value then print match is found else match is not found. If match is found then calculate the Euclidean distance and display the match. The Kekre's hybrid transform is generated by combination of two basic matrices like namely Discrete Cosine Transformation and Walsh as well as Kekre’s transform and Hartley transform which world is widely known. Kekre’s hybrid wavelet transform is generated by using two input matrices so that best qualities of both of the matrices can be incorporated into hybrid matrix. The matrix which has one of the major advantage is that it can be used for images which are not integer power of 2.Image fusion combines two or more images of same object or scene so that the final output image contains more information . There are several situations in which image processing require high spatial and high spectral resolution in a single image. In image fusion process the most significant features in the input images are identified and transferred them without loss into the fused image. Here basically the direct cosines transform and Walsh transform matrix is used to obtain the hybrid matrix. IV. EDGE DETECTION HISTOGRAM Edges in images constitute an important feature to represent their content. Also, the human eyes which are very sensitive to edge features for image perception. The edge histogram is very useful for indexing and retrieving images. One way of representing such an important edge feature i.e.EHD is to use a histogram. An edge histogram in the image space which represents the frequency and the directionality of the brightness changes in the image. It is a unique feature of the images, which in any case cannot be duplicated by a color histogram or the homogeneous texture features. V. PROPOSED ALGORITHM Take the input image. Check if the image is of 128*128 sizes. If not then convert it into the size and if it is of appropriate size then mark it as a test image. Now generate two DCT matrix and Walsh transform matrix: DCT is a 8*8 matrix size & Walsh transform is a 16*16 matrix size. Then generate the hybrid matrix using fusion techniques on both DCT and Walsh Matrix. After this feature extraction is done by edge histogram descriptor. Using hybrid transform matrix and trained set. Check for threshold value – If VI. ADVANTAGES Palm print offers advantages: non-intrusive, low resolution imaging, user-friendly, moderate price capture devices, stable and distinct feature In addition to the palm, the vein technology which authenticates can be done using the vascular pattern on the back of the hand or a finger. Vein patterns are unique to individuals and contain detailed characteristics for formulation of algorithm .However; the palm vein pattern is the most complex and covers the widest area. Because the palm which has no hair, it becomes much easier to photograph its vascular pattern of the palm. The palm also has no significant variations in skin colour compared with fingers or the back of the hand, where the colour can darken in certain areas. Vein recognition technology is secure because the authentication data exists inside the body and is therefore very difficult to forge. Contactless authentication is hygienic and non-invasive, thus promoting the high-level of acceptance of any user. Advanced authentication algorithm produces high level of accuracy and application versatility VII. CONCLUSION Palm vein technology is highly secure because it uses information contained within the body and is also highly accurate because the pattern of veins in the palm is complex and unique to each individual. In addition to this, its contactless feature gives it a hygienic advantage over other biometric authentication technologies.
  • 3. Palm Authentication Using Biometric System 3 REFERENCES [1]. International Conference on Communication, Information & Computing Technology (ICCICT), Mumbai, 2012 Image Fusion Using Kekre’s hybrid Wavelet Transform. [2]. International Journal of Control and Automation Vol. 3, No. 1, March, 2010 Palm Vein Authentication System: A Review [3]. International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-5, June 2013, A Hybrid Approach for Securing Biometric Template [4]. ETRI Journal, Volume 24, Number 1, February 2002 Efficient Use of MPEG-7 Edge Histogram Descriptor [5]. International Journal of Advanced Computer Science and Applications, Vol. 4, No.3, 2013 Multi- resolution Analysis of Multi-spectral Palm prints using Hybrid Wavelets for Identification