Pattern recognition palm print authentication system
The document discusses a palm print authentication system, highlighting its features as a biometric technology for personal recognition. It details the system's components, including user interface, image acquisition, recognition, and external modules, as well as the process of image preprocessing and feature extraction. While palm print recognition is advantageous due to ease of acquisition and reliability, it also faces limitations such as high computational complexity and time consumption.
Introduction
What is palmprint recognition?
- form of computer- aided personal recognition.
- capturing images of palm print and matching it with the data
base.
- use for security purposes in many countries.
- palm print is a physiological charactries.
3.
Palm Print
The palmprint system is a hand-based biometric
technology.
Palm print is concerned with the inner surface of a
hand.
A palm is covered with the same kind of skin as the
fingertips and it is larger than a fingertip in size.
Feature of palmprint
Geometry Features: According to the palm's shape, we
can easily get the corresponding geometry features, such as
width, length and area.
Principal Line Features: Both location and form of
principal lines in a palmprint are very important
physiological characteristics for identifying individuals.
Wrinkle Features: In a palmprint, there are many wrinkles
which are different from the principal lines in that they are
thinner and more irregular.
6.
Contd. Feature ofpalm print
Delta Point Features: The delta point is defined as the
center of a delta-like region in the palm print. Usually, there
are delta points located in the finger-root region.
Minutiae Features: A palm print is basically composed of
the ridges, allowing the minutiae features to be used as
another significant measurement.
System framework
The palmprint authentication system has four major components:
User Interface Module provides an interface between the system
and users for the smooth authentication operation.
Acquisition Module is the channel for the palm prints to be
acquired for the further processing.
Recognition Module is the key part of our system, which will
determine whether a user is authenticated. It consists of image pre-
processing, feature extraction, template creation, database updating,
and matching.
External Module receives the signal from the recognition module,
to allow some operations to be performed or deny the operations
requested.
9.
The breakdown ofeach module of the
palm print authentication system
Recognition Engine
After thepalm print images are captured by the
Acquisition Module, they are fed into the recognition
engine for palm print authentication. The recognition
engine is the key part of the palm print authentication
system, consisting of:
1- image preprocessing.
2- feature extraction.
3- matching.
Image Acquisition
A palmprint image is captured by our palm print
scanner.
Scanned into 400x400, 256 gray levels at 100 or
200 dpi
15.
preprocessing
Transforming image fromRGB to Gray.
Use a threshold to convert the gray scale image into a
binary image, then use a low-pass filter to smooth the
binary image.
Cut only the palm from the hand.
Input Image of apalm Threshold Image of a Palm Masked Image of a Palm
16.
Feature Extraction
Try toextract texture features from low
resolution palm print images.
There are method of feature extraction:
- Elimination of creases.
- Discrete finger and palm print extraction.
- Gabor filter.
17.
Matching
Feature matching determinesthe degree of similarity between the
identification template and the master template.
Depending on the types of features extracted, a variety of
matching techniques were used to compare two palm print
images.
There are method Palm print–Matching Scheme
1. Euclidean distance.
2. Hamming distance.
3. Hausdorff distance.
4. Feature matching using skeletal lines.
18.
Advantage
- ease ofacquisition.
- high user acceptance and reliability.
-Widely used by many security agencies.
- Cost effective
- Possible to build highly accurate biometric
system.
19.
Limitations
- Image capturedhas to be matched with every -
- single image in database.
- Time consuming.
- Too high computational complexity to be
applicable.
20.
Uses
Palm prints canbe used for criminal, forensic or
commercial applications. Palm prints, typically from
the butt of the palm, are often found at crime scenes
as the result of the offender's gloves slipping during
the commission of the crime, and thus exposing part
of the unprotected hand.