Skip to main content

Hand Image Biometric Based Personal Authentication System

  • Chapter
  • First Online:

Part of the book series: Studies in Computational Intelligence ((SCI,volume 660))

Abstract

Hand geometry is widely accepted biometric modality for identification of human beings. This is considered as safest biometric indicator due to its strong resistance against the unauthorized access and easy to use modality from the user point of view. This chapter presents an approach for the personal authentication using geometrical structure of hand images. The proposed approach consists of many phases like acquisition of hand images of the user to the system, normalization of images, normalized contour and palm region extraction etc. The contour of the hand region from Region of Interest (ROI) is computed and is used to extract structural information, which describe the shape of the hand. The features of the test and the trainee images are matched using machine learning based classifier at the verification stage.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sanchez-Reillo R, Sanchez-Avila Gonzalez-Marcos A (2000) Biometric identification through hand geometry measurements. IEEE Trans Pattern Anal Mach Intell 22(10):1168–1171

    Article  Google Scholar 

  2. Kumar R, Chandra P, Hanmandlu M (2011) Fingerprint matching based on orientation feature. In: Advanced materials research, vol 403. Trans Tech Publications, pp 888–894

    Google Scholar 

  3. Kumar R, Chandra P, Hanmandlu M (2013) Fingerprint matching based on texture feature. In: Mobile communication and power engineering. Springer, Berlin, p 86–91

    Google Scholar 

  4. Kumar R, Chandra P, Hanmandlu M (2013) Local directional pattern (LDP) based fingerprint matching using SLFNN. In: 2013 IEEE second international conference on image information processing (ICIIP). IEEE, pp 493–498

    Google Scholar 

  5. Kumar R, Chandra P, Hanmandlu M (2013) Fingerprint matching using rotational invariant image based descriptor and machine learning techniques. In: 2013 6th International conference on emerging trends in engineering and technology (ICETET). IEEE, pp 13–18

    Google Scholar 

  6. Kumar R, Chandra P, Hanmandlu M (2014) Rotational invariant fingerprint matching using local directional descriptors. Int J Comput Intell Stud 3(4):292–319

    Article  Google Scholar 

  7. Kumar R, Chandra P, Hanmandlu M (2012) Statistical descriptors for fingerprint matching. Int J Comput Appl 59(16)

    Google Scholar 

  8. Kumar R, Hanmandlu M, Chandra P (2014) An empirical evaluation of rotation invariance of LDP feature for fingerprint matching using neural networks. Int J Comput Vis Robot 4(4):330–348

    Article  Google Scholar 

  9. Kumar A, Zhang D (2006) Combining fingerprint, palmprint and hand-shape for user authentication. In: 18th international conference on pattern recognition, 2006 (ICPR 2006), vol 4. IEEE, pp 549–552

    Google Scholar 

  10. Moore AW (2001) support vector machines, tutorial slides. http://www.autonlab.org/tutorials/svm.html

  11. Ma Y, Pollick F, Hewitt WT (2004) Using b-spline curves for hand recognition. In: Proceedings of the 17th international conference on pattern recognition, 2004 (ICPR 2004), vol 3. IEEE, pp 274–277

    Google Scholar 

  12. Han CC, Cheng HL, Lin CL, Fan KC (2003) Personal authentication using palm-print features. Pattern Recogn 36(2):371–381

    Article  Google Scholar 

  13. Kumar A, Zhang D (2006) Integrating shape and texture for hand verification. Int J Image Graph 6(01):101–113

    Article  Google Scholar 

  14. Dey N, Nandi B, Das P, Das A Chaudhary SS (2013) Retention of electrocardioGram features insiGnificantly devalorized as an effect of watermarkinG for. In: Advances in biometrics for secure human authentication and recognition, p 175

    Google Scholar 

  15. Erçil A, Yõldõz VT, Kõrmõzõtas H, Büke B (2001) Hand recognition using implicit polynomials and geometric features. In: Audio-and video-based biometric person authentication. Springer, Berlin, pp 336–341

    Google Scholar 

  16. Wu Y, Huang TS (1999) Human hand modeling, analysis and animation in the context of HCI. In: Proceedings of the international conference on image processing, 1999 (ICIP 99), vol 3. IEEE, pp 6–10

    Google Scholar 

  17. Nandi S, Roy S, Dansana J, Karaa WBA, Ray R, Chowdhury SR, Chakraborty S, Dey N (2014) Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system. Int J Comput Netw Inf Secur 6(11):1

    Google Scholar 

  18. Biswas S, Roy AB, Ghosh K, Dey N (2012) A biometric authentication based secured ATM banking system. Int J Adv Res Comput Sci Softw Eng. ISSN:2277

    Google Scholar 

  19. Dey N, Nandi B, Dey M, Biswas D, Das A, Chaudhuri SS (2013) Biohash code generation from electrocardiogram features. In: IEEE 3rd international advance computing conference (IACC). IEEE, pp 732–735

    Google Scholar 

  20. Dey M, Dey N, Mahata SK, Chakraborty S, Acharjee S, Das A (2014) Electrocardiogram feature based inter-human biometric authentication system. In: International conference on electronic systems, signal processing and computing technologies (ICESC). IEEE, pp 300–304

    Google Scholar 

  21. Acharjee S, Chakraborty S, Karaa WBA, Azar AT, Dey N (2014) Performance evaluation of different cost functions in motion vector estimation. Int J Serv Sci Manag Eng Technol (IJSSMET) 5(1):45–65

    Article  Google Scholar 

  22. Dey N, Das A, Chaudhuri SS (2012) Wavelet based normal and abnormal heart sound identification using spectrogram analysis. arXiv:1209.1224

  23. Dey N, Das S, Rakshit P (2011) A novel approach of obtaining features using wavelet based image fusion and Harris corner detection. Int J Mod Eng Res 1(2):396–399

    Google Scholar 

  24. Kaliannan J, Baskaran A, Dey N (2015) Automatic generation control of thermal-thermal-hydro power systems with PID controller using ant colony optimization. Int J Serv Sci Manag Eng Technol (IJSSMET) 6(2):18–34

    Article  Google Scholar 

  25. Bose S, Chowdhury SR, Sen C, Chakraborty S, Redha T, Dey N (2014) Multi-thread video watermarking: a biomedical application. In: 2014 International conference on circuits, communication, control and computing (I4C). IEEE, pp 242–246

    Google Scholar 

  26. Bose S, Chowdhury SR, Chakraborty S, Acharjee S, Dey N (2014) Effect of watermarking in vector quantization based image compression. In: 2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT). IEEE, pp 503–508

    Google Scholar 

  27. Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE, pp 1–6

    Google Scholar 

  28. Hanmandlu M, Kumar A, Madasu VK, Yarlagadda P (2008) Fusion of hand based biometrics using particle swarm optimization. In: Fifth international conference on information technology: new generations, 2008 (ITNG 2008). IEEE, pp 783–788

    Google Scholar 

  29. Lin CL, Fan KC (2004) Biometric verification using thermal images of palm-dorsa vein patterns. IEEE Trans Circuits Syst Video Technol 14(2):199–213

    Article  Google Scholar 

  30. Kumar A, Hanmandlu M, Gupta HM (2009) Online biometric authentication using hand vein patterns. In: IEEE symposium on computational intelligence for security and defense applications, 2009 (CISDA 2009). IEEE, pp 1–7.

    Google Scholar 

  31. Linear SVM image, http://areshopencv.blogspot.in/2011/07/artificial-intelligencesupport-vector.html

  32. Lu G, Zhang D, Wang K (2003) Palmprint recognition using eigenpalms features. Pattern Recogn Lett 24(9):1463–1467

    Article  MATH  Google Scholar 

  33. Bulatov Y, Jambawalikar S, Kumar P, Sethia S (2004) Hand recognition using geometric classifiers. In: Beusl N (ed) Biometric authentication. Springer, Berlin, pp 753–759

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ravinder Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Kumar, R. (2017). Hand Image Biometric Based Personal Authentication System. In: Dey, N., Santhi, V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44790-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44789-6

  • Online ISBN: 978-3-319-44790-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics