KEMBAR78
Pattern recognition palm print authentication system | PPTX
Palm print Authentication System
By
Zaynab
Introduction
What is palm print recognition?
- form of computer- aided personal recognition.
- capturing images of palm print and matching it with the data
base.
- use for security purposes in many countries.
- palm print is a physiological charactries.
Palm Print
The palm print system is a hand-based biometric
technology.
Palm print is concerned with the inner surface of a
hand.
A palm is covered with the same kind of skin as the
fingertips and it is larger than a fingertip in size.
Why palm print
High Distinctiveness.
High Permanence (duration).
High Performance.
Medium Collectability.
Medium Acceptability.
Medium Universality.
Medium Circumvention (fooling).
Feature of palm print
Geometry Features: According to the palm's shape, we
can easily get the corresponding geometry features, such as
width, length and area.
Principal Line Features: Both location and form of
principal lines in a palmprint are very important
physiological characteristics for identifying individuals.
Wrinkle Features: In a palmprint, there are many wrinkles
which are different from the principal lines in that they are
thinner and more irregular.
Contd. Feature of palm print
Delta Point Features: The delta point is defined as the
center of a delta-like region in the palm print. Usually, there
are delta points located in the finger-root region.
Minutiae Features: A palm print is basically composed of
the ridges, allowing the minutiae features to be used as
another significant measurement.
Contd. Feature of palm print
System framework
The palm print authentication system has four major components:
User Interface Module provides an interface between the system
and users for the smooth authentication operation.
Acquisition Module is the channel for the palm prints to be
acquired for the further processing.
Recognition Module is the key part of our system, which will
determine whether a user is authenticated. It consists of image pre-
processing, feature extraction, template creation, database updating,
and matching.
External Module receives the signal from the recognition module,
to allow some operations to be performed or deny the operations
requested.
The breakdown of each module of the
palm print authentication system
Content interface device
The Key pad
LCD display
Palm putting and location flat surface
Recognition Engine
After the palm print images are captured by the
Acquisition Module, they are fed into the recognition
engine for palm print authentication. The recognition
engine is the key part of the palm print authentication
system, consisting of:
 1- image preprocessing.
 2- feature extraction.
 3- matching.
Palm print Recognition Flowchart
Image Acquisition
A palm print image is captured by our palm print
scanner.
Scanned into 400x400, 256 gray levels at 100 or
200 dpi
preprocessing
Transforming image from RGB to Gray.
Use a threshold to convert the gray scale image into a
binary image, then use a low-pass filter to smooth the
binary image.
Cut only the palm from the hand.
Input Image of apalm Threshold Image of a Palm Masked Image of a Palm
Feature Extraction
Try to extract texture features from low
resolution palm print images.
There are method of feature extraction:
- Elimination of creases.
- Discrete finger and palm print extraction.
- Gabor filter.
Matching
Feature matching determines the degree of similarity between the
identification template and the master template.
Depending on the types of features extracted, a variety of
matching techniques were used to compare two palm print
images.
There are method Palm print–Matching Scheme
1. Euclidean distance.
2. Hamming distance.
3. Hausdorff distance.
4. Feature matching using skeletal lines.
Advantage
- ease of acquisition.
- high user acceptance and reliability.
-Widely used by many security agencies.
- Cost effective
- Possible to build highly accurate biometric
system.
Limitations
- Image captured has to be matched with every -
- single image in database.
- Time consuming.
- Too high computational complexity to be
applicable.
Uses
Palm prints can be used for criminal, forensic or
commercial applications. Palm prints, typically from
the butt of the palm, are often found at crime scenes
as the result of the offender's gloves slipping during
the commission of the crime, and thus exposing part
of the unprotected hand.
Thank you very much
for your attention
Pattern recognition palm print authentication system

Pattern recognition palm print authentication system

  • 1.
    Palm print AuthenticationSystem By Zaynab
  • 2.
    Introduction What is palmprint recognition? - form of computer- aided personal recognition. - capturing images of palm print and matching it with the data base. - use for security purposes in many countries. - palm print is a physiological charactries.
  • 3.
    Palm Print The palmprint system is a hand-based biometric technology. Palm print is concerned with the inner surface of a hand. A palm is covered with the same kind of skin as the fingertips and it is larger than a fingertip in size.
  • 4.
    Why palm print HighDistinctiveness. High Permanence (duration). High Performance. Medium Collectability. Medium Acceptability. Medium Universality. Medium Circumvention (fooling).
  • 5.
    Feature of palmprint Geometry Features: According to the palm's shape, we can easily get the corresponding geometry features, such as width, length and area. Principal Line Features: Both location and form of principal lines in a palmprint are very important physiological characteristics for identifying individuals. Wrinkle Features: In a palmprint, there are many wrinkles which are different from the principal lines in that they are thinner and more irregular.
  • 6.
    Contd. Feature ofpalm print Delta Point Features: The delta point is defined as the center of a delta-like region in the palm print. Usually, there are delta points located in the finger-root region. Minutiae Features: A palm print is basically composed of the ridges, allowing the minutiae features to be used as another significant measurement.
  • 7.
  • 8.
    System framework The palmprint authentication system has four major components: User Interface Module provides an interface between the system and users for the smooth authentication operation. Acquisition Module is the channel for the palm prints to be acquired for the further processing. Recognition Module is the key part of our system, which will determine whether a user is authenticated. It consists of image pre- processing, feature extraction, template creation, database updating, and matching. External Module receives the signal from the recognition module, to allow some operations to be performed or deny the operations requested.
  • 9.
    The breakdown ofeach module of the palm print authentication system
  • 11.
    Content interface device TheKey pad LCD display Palm putting and location flat surface
  • 12.
    Recognition Engine After thepalm print images are captured by the Acquisition Module, they are fed into the recognition engine for palm print authentication. The recognition engine is the key part of the palm print authentication system, consisting of:  1- image preprocessing.  2- feature extraction.  3- matching.
  • 13.
  • 14.
    Image Acquisition A palmprint image is captured by our palm print scanner. Scanned into 400x400, 256 gray levels at 100 or 200 dpi
  • 15.
    preprocessing Transforming image fromRGB to Gray. Use a threshold to convert the gray scale image into a binary image, then use a low-pass filter to smooth the binary image. Cut only the palm from the hand. Input Image of apalm Threshold Image of a Palm Masked Image of a Palm
  • 16.
    Feature Extraction Try toextract texture features from low resolution palm print images. There are method of feature extraction: - Elimination of creases. - Discrete finger and palm print extraction. - Gabor filter.
  • 17.
    Matching Feature matching determinesthe degree of similarity between the identification template and the master template. Depending on the types of features extracted, a variety of matching techniques were used to compare two palm print images. There are method Palm print–Matching Scheme 1. Euclidean distance. 2. Hamming distance. 3. Hausdorff distance. 4. Feature matching using skeletal lines.
  • 18.
    Advantage - ease ofacquisition. - high user acceptance and reliability. -Widely used by many security agencies. - Cost effective - Possible to build highly accurate biometric system.
  • 19.
    Limitations - Image capturedhas to be matched with every - - single image in database. - Time consuming. - Too high computational complexity to be applicable.
  • 20.
    Uses Palm prints canbe used for criminal, forensic or commercial applications. Palm prints, typically from the butt of the palm, are often found at crime scenes as the result of the offender's gloves slipping during the commission of the crime, and thus exposing part of the unprotected hand.
  • 21.
    Thank you verymuch for your attention