Palmprint Classification



Similar documents
Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap

Palmprint as a Biometric Identifier

Multimodal Biometric Recognition Security System

Framework for Biometric Enabled Unified Core Banking

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE.

Development of Palmprint Verification System Using Biometrics

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

Two novel characteristics in palmprint verification: datum point invariance and line feature matching

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.

Biometric Authentication using Online Signatures

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability

Template-based Eye and Mouth Detection for 3D Video Conferencing

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

Efficient on-line Signature Verification System

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

A Various Biometric application for authentication and identification

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals

Automated PolyU Palmprint sample Registration and Coarse Classification

Development of Academic Attendence Monitoring System Using Fingerprint Identification

Palmprint Recognition with PCA and ICA

A Dynamic Approach to Extract Texts and Captions from Videos

A Generic Framework for Three-Factor Authentication

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

TIETS34 Seminar: Data Mining on Biometric identification

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device

Circle Object Recognition Based on Monocular Vision for Home Security Robot

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Application-Specific Biometric Templates

Face Recognition For Remote Database Backup System

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Fingerprint s Core Point Detection using Gradient Field Mask

Establishing the Uniqueness of the Human Voice for Security Applications

Palmprint Identification Based on Principle Line Using Machine Learning Techniques

High Resolution Fingerprint Matching Using Level 3 Features

Assignment 1 Biometric authentication

May For other information please contact:

Document Image Retrieval using Signatures as Queries

A colour Code Algorithm for Signature Recognition

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

Jiří Matas. Hough Transform

The Development of a Pressure-based Typing Biometrics User Authentication System

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION

How To Filter Spam Image From A Picture By Color Or Color

A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics

Simultaneous Gamma Correction and Registration in the Frequency Domain

AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM

Alternative Biometric as Method of Information Security of Healthcare Systems

Automatic Detection of PCB Defects

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Face Recognition in Low-resolution Images by Using Local Zernike Moments

Facial Biometric Templates and Aging: Problems and Challenges for Artificial Intelligence

How To Improve Security Of An Atm

An Algorithm for Classification of Five Types of Defects on Bare Printed Circuit Board

Automatic Extraction of Signatures from Bank Cheques and other Documents

ATM Transaction Security Using Fingerprint/OTP

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network

Regional fusion for high-resolution palmprint recognition using spectral minutiae representation

Efficient Attendance Management: A Face Recognition Approach

Aman Chadha et al, Int. J. Comp. Tech. Appl., Vol 2 (5),

Online teaching: Do you know who is taking the final exam?

A Comparative Study on ATM Security with Multimodal Biometric System

Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

A Fully Automatic Approach for Human Recognition from Profile Images Using 2D and 3D Ear Data

Multi-Factor Biometrics: An Overview

Computer Forensics Application. ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification

Denial of Service Attack Detection Using Multivariate Correlation Information and Support Vector Machine Classification

Financial Trading System using Combination of Textual and Numerical Data

Accessing the bank account without card and password in ATM using biometric technology

Visual-based ID Verification by Signature Tracking

Reliability of Fingerprint Verification in Ghana

Signature verification using Kolmogorov-Smirnov. statistic

Healthcare Data Mining: Prediction Inpatient Length of Stay

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

COMPARISON OF VARIOUS BIOMETRIC METHODS

Blog Post Extraction Using Title Finding

International Conference on Web Services Computing (ICWSC) 2011 Proceedings published by International Journal of Computer Applications (IJCA)

NFC & Biometrics. Christophe Rosenberger

Development of Attendance Management System using Biometrics.

Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 269 Class Project Report

Research Article. ISSN (Print) *Corresponding author Nathan David

Price Prediction of Share Market using Artificial Neural Network (ANN)

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT

Method of Fault Detection in Cloud Computing Systems

Reflection and Refraction

Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition

False alarm in outdoor environments

HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT

A Model to Secure Mobile Devices Using Keystroke Dynamics through Soft Computing Techniques

Credit Card Fraud Detection Using Self Organised Map

Introduction to Pattern Recognition

Securing Electronic Medical Records using Biometric Authentication

Cloud User Voice Authentication enabled with Single Sign-On framework using OpenID

Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature


Transcription:

Palmprint Classification Li Fang*, Maylor K.H. Leung, Tejas Shikhare, Victor Chan, Kean Fatt Choon School of Computer Engineering, Nanyang Technological University, Singapore 639798 E-mail: asfli@ntu.edu.sg Abstract In today s world, biometrics system is used almost everywhere for the security and personal recognition. The palmprint is one of the most reliable physiological characteristics that can be used to distinguish between individuals. Palmprint classification provides an important indexing mechanism in a palmprint database. An accurate and consistent classification can greatly reduce palmprint matching time for a large database. We propose a palmprint classification algorithm which is able to classify palmprints into ten evenly-distributed categories (1, 2, 3, 4, 6, A, B, C, D, and E). The algorithm uses a novel representation and is based on a two-stage classifier to make a classification. I. INTRODUCTION Today, in our daily life, we are often being asked for verification of our identity. Normally, this is done through the use of passwords when pursuing activities like domain accesses, single sign-on, application logon etc. In the process, the role of personal identification and verification becomes increasingly important in our society. With the onslaught of improved forgery and identity impersonation methods, previous ways of correct authentication are not sufficient. Therefore, new ways of efficiently proving the authenticity of an identity at a low cost are greatly needed. Various avenues have been explored to provide a solution and biometric-based identification is proved to be an accurate and efficient answer to the problem. Biometrics has been an emerging field of research in the recent years and is devoted to identification of individuals using physical traits, such as those based on iris or retinal scanning, face recognition, fingerprints, or voices[1]-[4]. As unauthorized users are not able to display the same unique physical properties to have a positive authentication, reliability will be ensured. This is much better than the current methods of using passwords, tokens or personal identification number (PINs) at the same time provides a cost effective convenience way of having nothing to carry or remember. Although there are numerous distinguishing traits used for personal identification, this research will focus on using palmprints to more correctly and efficiently identify different personnel through classification at a low cost. Palmprint is preferred compared to other methods such as fingerprint or iris because it is distinctive, easily captured by low resolution devices as well as contains additional features such as principal lines. With the help of palm geometry, a highly accurate biometric system can be designed. Iris input devices are expensive and the method is intrusive as people might fear of adverse effects on their eyes. Fingerprint identification requires high resolution capturing devices and may not be suitable for all as some may be finger deficient [5]-[8]. Palmprint is therefore suitable for everyone and it is also non-intrusive as it does not require any personal information of the user [9]-[12]. Palmprint images are captured by acquisition module and are fed into recognition module for authentication [12]-[17]. As shown in Fig.1, recognition module has many numbers of stages which are preprocessing, feature extraction, template extraction as well as matching with the database [18]-[21]. This requires a large amount of time. This makes it important to divide this major category into evenly-distributed subcategories so that the classification process becomes more efficient. In the current systems [12]-[17], firstly, the user's palmprint is captured by the system. Then, it is compared to every single image in the database, and a result is produced. On the next page, current process will be shown using a flow chart. This process posed some limitations. The captured image had to be compared with every single image in the database. This method takes up excessive amount of resources. Furthermore, it is time-consuming. Even if every comparison of image just takes up a few milliseconds, in this context we are referring to thousands of images. As such, the computational complexity is too high to be practical.

Category 1 Category 2 Fig.1. Flow of traditional palmprint matching Wu et al [22] proposed the classification of palmprints using principle lines. The algorithm has the ability to classify low-resolution palmprints into six categories according to the number of principal lines and the number of their intersections. The samples of 6 categories of palmprints are shown in Fig.2. The proportions of these six categories (1 6) from a 13,800 samples database [23] are 0.36%, 1.23%, 2.83%, 11.81%, 78.12% and 5.65%, respectively. The proposed algorithm is shown to classify palmprints with an accuracy of 96.03%. We did a survey on the people living in Singapore. This includes people from different gender, age groups and nationalities [24]. The survey results show that we could classify the resident's palmprint into 6 different categories. These are mainly palms with one principal line, two principal lines without intersection, two principal lines with intersection, three principal lines without intersection, three principal lines of which two intersects and three principal lines of which all lines intersects each other. They are same as the 6 categories described in [22]. Also, we found that 80% of the residents fall in the 5th category, which matches the distribution in [22]. As illustrated in the following pie chart, which is shown in Fig.3, the six categories of palmprint are not evenly distributed with the main bulk of the samples falling into Category 5. Assuming worst case situation, an input palmprint image falls into Category 5, the matching process may still have to search through 78.12% of the original database samples before finding a match. Therefore in this proposed algorithm, the resulting classification may not reduce search time significantly [25]. Category 3 Category 4 Category 5 Category 6 Fig.2. Samples of 6 categories Fig.3. Pie chart of category distribution cat 1 cat 2 cat 3 cat 4 cat 5 cat 6 As such, in this research we decide to further categorize the palmprints that fall into Category 5 into five sub-categories. The further classification method will be elaborated in section 3. The rest of this paper is organized as follows: Section 2 introduces the structure of the proposed palmprint classification system. The algorithm is discussed in detail in

Section 3. Section 4 presents the results for hierarchical classification. Finally, the conclusion and future work are highlighted in Section 5. II. SYSTEM OVERVIEW Previously, Wu et al s [22] proposed classification method divided palmprints into six palmprint categories. This section proposes a novel classification method to further categorize Category 5 of the previous classification into five sub-categories, which are shown in Fig. 4. lie in different categories. In the decision making process, the input palmprint image will be categorized with Wu s classification method and if it falls into Category 5, the image will be further sub-categorized into A, B, C, D or E. Fig.6 illustrates the relationship between the categories and sub-categories. Matching will be done with the same fining category in the database. Fig.5. Block diagram of proposed palmprint matching system Fig.4. Proposed five categories At the top of Fig 4, the various categories from A to E are shown there. It can be seen that the triangle at the top right hand corner is A, top left hand corner is B, bottom left hand corner is C, bottom right hand corner is D and finally anything outside these 4 triangle is considered E. Flowchart in Fig. 5 shows the new process after importing the proposed hierarchical classification technique into the matching system. Firstly, the image is captured via a palmprint capturing device. After the palmprint is captured, it is matched with the algorithm described in [22]. It has been mentioned earlier that 78% lie in the category 5 while the rest Fig.6. Categories and sub-categories

III. PROPOSED SECOND-STAGE CLASSIFICATION ALGORITHM A. Definition and notations of key lines and key points In this report we are concerning with three main lines on the palm namely life line, heart line and head line [26]. For clarity purposes, the convention for the rest of this paper will follow the diagrams below and the notations are defined on each line and each point. Fig.9. The points needed to do the sub-categorizing B. Construction of boundaries As mentioned earlier, Category 5 is subdivided into 5 categories A, B, C, D and E, depending on where the intersection point β falls in. The definition of the location of β is demonstrated in Fig.9. The sub-categories A, B, C, D and E, are defined in Table 1 and shown in Fig. 10. Fig.7 Principle lines In Fig. 7, Line ab represents the heart line o a is start of heart line o b is end of heart line Line cd represents the head line o c is start of head line o d is end of head line Line ef represents the life line o e is end of life line o f is start of life line Category A B C D E TABLE 1 DEFINITIONS OF BOUNDARY OF EACH SUB-CATEGORY Falls in XYZ WXZ SWZ SYZ Not in A, B, C or D Fig.10. Boundaries Fig.8. Key points notation In Fig.8, AB is parallel to CL DK is parallel to EI FI is parallel to GH and EJ AH is parallel to BG Based on the proposed algorithm, the task of locating the boundaries can be divided into four steps: Step 1: Locate points G, Q, R, T and U. (G is the point on the last finger) (Q is the intersection of heart line and head line) (R is the end of the life line) Plot out the lines GQ and QR Locate point S (S is the intersection of GQ with heart line as shown in Fig.11 (a))

Step 2: Calculate, midpoint V of QR, midpoint X of QV, midpoint W of QS, midpoint Y of SV, intersection point Z of SX with WY as shown in Fig. 9(b). Step 3: Calculate, intersection point β of TQ with RU as shown in Fig.10(c). lies in which category. As you can see, the result is well-distributed. Among all the samples belong to category 5, 17.6% of them belong to category A, 22.3% of them to category B, 18.3% of them to category C, 23.1% of them to category D, and 18.7% of them to category E. This affirms the effectiveness of the algorithm. It can be concluded that the algorithm is successful and can be implemented into current palmprint matching systems. Step 4: Calculate the gradients and constant C for lines of equation for WY, SX, WX, XY, SY and SW. Using substitution method, find out which region point β lies in. V. CONCLUSION Palmprint classification provides an important indexing mechanism in a palmprint database. An accurate and consistent classification can greatly reduce palmprint matching time for a large database. Automatic classification of palmprints is a difficult problem because of the selection of even-distribution signatures. The proposed two-stage classification algorithm gives even-distributed categories than the work reported in the literature. The novel representation scheme is directly derived from principal line structures. The representation does not use wrinkles, and singular points. It is capable of tolerating poor image quality. We have tested our algorithm and a very good performance has been achieved (0.36% for 1 st category, 1.23% for 2 nd category, 2.83% for 3 rd category, 11.81% for 4 th category, 5.65% for 6 th category, 13.75% for category A, 17.42% for category B, 14.30% for category C, 18.05% for category D, and 14.61% for category E). These results are encouraging to reduce the computational complexity of the current palmprint matching program by 80% and the scheme will be tested in palmprint matching system. Fig.11 Steps of sub-classification IV. RESULTS Fig. 12 Results of distribution of sub-categories We report the results of our classification algorithm on the 500 palmprint database for the second stage palmprint classification. The pie chart shows the percentage of palms REFERENCES [1] Z. Riha and V. Matyas, Biometric authentication systems, FI MU Report Series, FIMU-RS-2000-08, November 2000. [2] A. Jain and H. Lin, On-Line fingerprint verification, IEEE Proceedings of ICPR 96, pp. 596-600, 1996. [3] C.J. Liu and H. Wechsler, Independent component analysis of Gabor features for face recognition, IEEE Transactions on Neural networks, vol. 14, no. 4, pp. 919-928, 2003. [4] P.S. Huang, Automatic gait recognition via statistical approaches for extended template features, IEEE Transactions on systems, man, and cybernetics-part B: cybernetics, vol. 31, no. 5, pp. 818-824, 2001. [5] V. Athitsos and S. Sclaroff, Estimating 3D hand pose from a cluttered Image, Boston University Computer Science Tech. Report No. 2003-009, 2003. [6] R. Chaudhry and S.K. Pant, Identification of authorship using lateral palm print a new concept, Forensic Science International, 141(1):49-57, Apr 20 2004 [7] A.K Jain, S. Prabhakar and H. Lin, A Multichannel approach to fingerprint classification, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol 21, Issue 4, pp 348-359, 1999 [8] Y.S. Gao, and M.K.H. Leung, Face recognition using line edge map, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 6, pp. 764-779, 2002. [9] W.X. Lin, D. Zhang, and Z.Q. Xu, Image alignment based on invariant features for palmprint identification, Signal Processing: Image Communication, vol. 18, pp. 373-379, 2003.

[10] W. Shu, G. Rong, Z.Q. Bian, and D. Zhang, Automatic palmprint verification, International Journal of Image and Graphics, vol. 1, no. 1, pp. 135-151, 2001. [11] D. Zhang, W. Shu, Two novel characteristics in palmprint verification: Datum point invariance and line feature matching, Pattern Recognition, vol. 33, no. 4, pp. 691-702, 1999. [12] L. Zhang, and D. Zhang, Characterication of palmprint by wavelet signatures via directional context modeling, IEEE Transactions on Systems, Man. And Cybernetics-Part B: Cybernetics, vol. 34, no.3, pp. 1335-1347, 2004. [13] J. You, W.K. K, D. Zhang, and K.H. Cheung, On hierarchical palmprint coding with multiple features for personal identification in large databases, IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 2, pp. 234-243, 2004. [14] W.X. Li, D. Zhang, and Z.Q. Xu, Palmprint identification by Fourier transform, International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 4, pp. 417-432, 2002. [15] G.M. Lu, D. Zhang, and K.Q. Wang, Palmprint recognition using eigenpalms features, Pattern Recognition Letters, vol. 24, pp.1463-1467, 2003. [16] N. Duta, A.K. Jain, Matching of palmprints, Pattern Recognition LettersI, vol. 23, pp. 477-485, 2002 [17] J. You, W.X. Li, and D. Zhang, Hierarchical palmprint identification via multiple feature extraction, Pattern Recognition, vol. 35, pp. 847-859, 2002. [18] J.R. Beveridge and E.M. Riseman, How easy is matching 2D line models using local search?, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 6, pp. 564-579, 1997. [19] J.Y. Chen, M.K.H. Leung, and Y.S. Gao, Noisy logo recognition using line segment Hausdorff Distance. Pattern recognition, vol. 36, pp. 943-955, 2003. [20] X.Z. Yu, M.K.H. Leung, Y.S. Gao, Hausdorff Distance for shape matching, The 4 th LASTED International Conference on visualization, image, and image processing, 2004. [21] X.L. Yi, and O.I. Camps, Line-Based recognition using a multidimentional Hausdorff Distance, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 21, no. 9, pp. 901-916, 1999. [22] X. Wu, D. Zhang, K. Wang and B. Huang, Palmprint classification using principle lines, Pattern Recognition, Vol 37, No 10, pp 1987-1998, Oct 2004 [23] Palmprint database from Biometric Research Center, The Hong Kong Polytechnic University. Available: http://www4.comp.polyu.edu.hk/~biometrics/ [24] Biometric user Authentication, Dell Corp. Available: http://www.dell.com/us/en/hea/topics/vectors_2000-biometric s.htm. [25] D. Zhang, W. K. Kong, J. You, and M. Wong, Online palmprint identification, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 9, pp. 1041-1050, 2003. [26] A biometric reference site. Available: http://homepage.ntlworld.com/avanti/.