Abstract
Hand geometry is widely accepted biometric modality for identification of human beings. This is considered as safest biometric indicator due to its strong resistance against the unauthorized access and easy to use modality from the user point of view. This chapter presents an approach for the personal authentication using geometrical structure of hand images. The proposed approach consists of many phases like acquisition of hand images of the user to the system, normalization of images, normalized contour and palm region extraction etc. The contour of the hand region from Region of Interest (ROI) is computed and is used to extract structural information, which describe the shape of the hand. The features of the test and the trainee images are matched using machine learning based classifier at the verification stage.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Sanchez-Reillo R, Sanchez-Avila Gonzalez-Marcos A (2000) Biometric identification through hand geometry measurements. IEEE Trans Pattern Anal Mach Intell 22(10):1168–1171
Kumar R, Chandra P, Hanmandlu M (2011) Fingerprint matching based on orientation feature. In: Advanced materials research, vol 403. Trans Tech Publications, pp 888–894
Kumar R, Chandra P, Hanmandlu M (2013) Fingerprint matching based on texture feature. In: Mobile communication and power engineering. Springer, Berlin, p 86–91
Kumar R, Chandra P, Hanmandlu M (2013) Local directional pattern (LDP) based fingerprint matching using SLFNN. In: 2013 IEEE second international conference on image information processing (ICIIP). IEEE, pp 493–498
Kumar R, Chandra P, Hanmandlu M (2013) Fingerprint matching using rotational invariant image based descriptor and machine learning techniques. In: 2013 6th International conference on emerging trends in engineering and technology (ICETET). IEEE, pp 13–18
Kumar R, Chandra P, Hanmandlu M (2014) Rotational invariant fingerprint matching using local directional descriptors. Int J Comput Intell Stud 3(4):292–319
Kumar R, Chandra P, Hanmandlu M (2012) Statistical descriptors for fingerprint matching. Int J Comput Appl 59(16)
Kumar R, Hanmandlu M, Chandra P (2014) An empirical evaluation of rotation invariance of LDP feature for fingerprint matching using neural networks. Int J Comput Vis Robot 4(4):330–348
Kumar A, Zhang D (2006) Combining fingerprint, palmprint and hand-shape for user authentication. In: 18th international conference on pattern recognition, 2006 (ICPR 2006), vol 4. IEEE, pp 549–552
Moore AW (2001) support vector machines, tutorial slides. http://www.autonlab.org/tutorials/svm.html
Ma Y, Pollick F, Hewitt WT (2004) Using b-spline curves for hand recognition. In: Proceedings of the 17th international conference on pattern recognition, 2004 (ICPR 2004), vol 3. IEEE, pp 274–277
Han CC, Cheng HL, Lin CL, Fan KC (2003) Personal authentication using palm-print features. Pattern Recogn 36(2):371–381
Kumar A, Zhang D (2006) Integrating shape and texture for hand verification. Int J Image Graph 6(01):101–113
Dey N, Nandi B, Das P, Das A Chaudhary SS (2013) Retention of electrocardioGram features insiGnificantly devalorized as an effect of watermarkinG for. In: Advances in biometrics for secure human authentication and recognition, p 175
Erçil A, Yõldõz VT, Kõrmõzõtas H, Büke B (2001) Hand recognition using implicit polynomials and geometric features. In: Audio-and video-based biometric person authentication. Springer, Berlin, pp 336–341
Wu Y, Huang TS (1999) Human hand modeling, analysis and animation in the context of HCI. In: Proceedings of the international conference on image processing, 1999 (ICIP 99), vol 3. IEEE, pp 6–10
Nandi S, Roy S, Dansana J, Karaa WBA, Ray R, Chowdhury SR, Chakraborty S, Dey N (2014) Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system. Int J Comput Netw Inf Secur 6(11):1
Biswas S, Roy AB, Ghosh K, Dey N (2012) A biometric authentication based secured ATM banking system. Int J Adv Res Comput Sci Softw Eng. ISSN:2277
Dey N, Nandi B, Dey M, Biswas D, Das A, Chaudhuri SS (2013) Biohash code generation from electrocardiogram features. In: IEEE 3rd international advance computing conference (IACC). IEEE, pp 732–735
Dey M, Dey N, Mahata SK, Chakraborty S, Acharjee S, Das A (2014) Electrocardiogram feature based inter-human biometric authentication system. In: International conference on electronic systems, signal processing and computing technologies (ICESC). IEEE, pp 300–304
Acharjee S, Chakraborty S, Karaa WBA, Azar AT, Dey N (2014) Performance evaluation of different cost functions in motion vector estimation. Int J Serv Sci Manag Eng Technol (IJSSMET) 5(1):45–65
Dey N, Das A, Chaudhuri SS (2012) Wavelet based normal and abnormal heart sound identification using spectrogram analysis. arXiv:1209.1224
Dey N, Das S, Rakshit P (2011) A novel approach of obtaining features using wavelet based image fusion and Harris corner detection. Int J Mod Eng Res 1(2):396–399
Kaliannan J, Baskaran A, Dey N (2015) Automatic generation control of thermal-thermal-hydro power systems with PID controller using ant colony optimization. Int J Serv Sci Manag Eng Technol (IJSSMET) 6(2):18–34
Bose S, Chowdhury SR, Sen C, Chakraborty S, Redha T, Dey N (2014) Multi-thread video watermarking: a biomedical application. In: 2014 International conference on circuits, communication, control and computing (I4C). IEEE, pp 242–246
Bose S, Chowdhury SR, Chakraborty S, Acharjee S, Dey N (2014) Effect of watermarking in vector quantization based image compression. In: 2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT). IEEE, pp 503–508
Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE, pp 1–6
Hanmandlu M, Kumar A, Madasu VK, Yarlagadda P (2008) Fusion of hand based biometrics using particle swarm optimization. In: Fifth international conference on information technology: new generations, 2008 (ITNG 2008). IEEE, pp 783–788
Lin CL, Fan KC (2004) Biometric verification using thermal images of palm-dorsa vein patterns. IEEE Trans Circuits Syst Video Technol 14(2):199–213
Kumar A, Hanmandlu M, Gupta HM (2009) Online biometric authentication using hand vein patterns. In: IEEE symposium on computational intelligence for security and defense applications, 2009 (CISDA 2009). IEEE, pp 1–7.
Linear SVM image, http://areshopencv.blogspot.in/2011/07/artificial-intelligencesupport-vector.html
Lu G, Zhang D, Wang K (2003) Palmprint recognition using eigenpalms features. Pattern Recogn Lett 24(9):1463–1467
Bulatov Y, Jambawalikar S, Kumar P, Sethia S (2004) Hand recognition using geometric classifiers. In: Beusl N (ed) Biometric authentication. Springer, Berlin, pp 753–759
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Kumar, R. (2017). Hand Image Biometric Based Personal Authentication System. In: Dey, N., Santhi, V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-44790-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44789-6
Online ISBN: 978-3-319-44790-2
eBook Packages: EngineeringEngineering (R0)