SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
www.ijarcet.org 2064
Hand Geometry Recognition System Using
Feature Extraction
Poonam Rathi, Dr. Sipi Dubey
CSE Dept. CSE Dept.
RCET, Bhilai (C.G) India RCET, Bhilai (C.G) India
Abstract- Biometrics traits such as fingerprints, hand
geometry, face and voice verification provide a reliable
alternative for identity verification and are gaining
commercial and high user acceptability rate. Hand
geometry based biometric system has proven to be the
most suitable and acceptable biometric trait for
medium and low security application. Geometric
measurements of the human hand have been used for
identity authentication in a number of commercial
systems.
This paper proposes a technique for hand biometric
feature extraction using hand contour matching. Hand
shape feature is obtained by using Euclidian distance
from starting reference point and then calculate the tip
and valley point of finger. Then apply some
mathematical calculation for calculate the hand
geometry features like finger length, width and
perimeter.
Index Terms: hand geometry, feature extraction,
mathematical calculation.
1. INTRODUCTION:
Personal identification using biometric methods is
gaining attention in today’s automated world.
Biometric recognition can be done using
physiological or behavioral characteristics of the
individual. The physiological characteristics signifies
using human body parts for authentication like
fingerprint, iris, ear, palm print, face etc. The
behavioral characteristics include action done using
body parts like voice, signature and gait etc. for
authentication.
The existing biometric verification systems employ
various biometric traits such as fingerprint, face, iris,
retina, voice, signature, palm print etc. Hand
geometry - based recognition is considered both user
friendly as well as fairly accurate biometric system.
Biometric system has four characterstics:
• universality, which means the characteristic
should be present in all individuals;
• uniqueness, as the characteristic has to be unique to
each individual;
• Permanence: its resistance to aging;
• Measurability: how easy is to acquire image or
signal from the individual;
• Performance: how good it is at recognizing and
identifying individuals;
• Acceptability: the population must be willing to
provide the characteristic
Biometric systems can be used for identification and
recognition purposes. In all cases there should be a
database where biometric features from a set of
individuals are stored. The role of the system is to
compare an input with all the entries in the database
and verify if there is a match, thus confirming the
identity of the individual. To compare any kind of
biometric characteristics it is necessary to represent
them in a stable fashion.
That is divided into two tasks:
1. Represent a biometric characteristic in
reproducible and stable features that resist input
variability.
2. Compare such features so users can accurately be
identified.
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
www.ijarcet.org 2065
2. LITRECTURE REVIEW
Hand geometry refers to the geometric structure of
hand, which includes lengths of fingers, widths at
various points on the finger, diameter of the palm,
thickness of the palm, etc. These features are not as
discriminating as other biometric characteristics
(such as fingerprints), they can easily be used for
verification purpose.
Hand biometric systems have evolved from early
approaches which considered flat-surface and pegs to
guide the placement of the user’s hand to completely
platform-free, non-contact techniques were user
collaboration is almost not required . This
development can be classified into three categories
according to the image acquisition criteria:
• Constrained and contact based. Systems
requiring a flat platform and pegs or pins to restrict
hand degree of freedom.
• Unconstrained and contact based. Peg-free
scenarios, although still requiring a platform to place
the hand, like a scanner.
• Unconstrained and contact-free. Platform-
free and contact-less scenarios where neither pegs nor
platform are required for hand image acquisition.
There has been several hand geometry verification
systems published in literature. Jain et al. [2]
developed a pegged hand geometry verification
system for web security. Later Jain and Duta [3]
developed another pegged system which aligns the
two images and define a metric,
Mean Alignment Error as the average distance
between corresponding points measured between the
images to be verified. Wong and Shi [4] developed
system which uses a hierarchical recognition process,
with gaussian mixture model used for the one set of
features and a distance metric classification for a
different set of features. Geometrical features have
received notorious attention and research efforts, in
comparison to other hand parameters. Methods based
on this strategy (like widths, angles and lengths)
reduce the information given in a hand sample to a
N-dimensional vector, proposing any metric distance
for computing the similarity between two samples.
In this paper we purpose to extract features like
length, width, centroid , min axis length, max axis
length by using some mathematical function.
3. PERPOSED SYSTEM
In our research, we do not fix the hand’s position in
the image acquisition process. We take image from
scanner. Proposed method which consists of hand
geometry and their feature and we extract features by
using image processing techniques and mathematical
calculation.
The steps in the palm print biometric system are:
A. Acquisition: The images are captured using
a scanner. The input image is a color image of both
left and right palm without any deformity. This
provides a simple, low-cost, non contact, comfortable
and user-friendly acquisition mechanism. We do not
fix the hand’s position in the image acquisition
process. We take image from scanner in three
different angles (90,180, -180 angle).The input image
is stored in jpeg format. In cases of standard
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
www.ijarcet.org 2066
deformity such as a missing finger the system
expresses its inability to process the image.
Fig 3.2 Acquisition of palm print
B. Preprocessing: The next stage is Palm Print
preprocessing module. In this module we prepare the
image for feature extraction. In this stage color image
transform into gray level image then we reduce the
noise pixels from the gray image.
Fig 3.3 RGB Color to Gray color
Furthermore the gray level image is binarized.
Fig 3.4 gray image and binarized image
C. Feature Extraction: The feature extraction
module is the most important module in a biometric
system. The feature extraction module extracts the
features of hand geometry.
Fig 3.5 Feature Extraction
We calculate features of hand print by using
reference point:
a) Tip point of all fingers including thumb.
b) Starting reference point and ending
reference point
c) Centriod of the hand
d) Major axis length
e) Minor axis length
f) Perimeter
D. Matching:
The last module of the biometric system is matching.
Here the features extracted in the previous section are
matched up with the features of that individual
previously stored in the database. The proposed
system produces a match score based on a
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
www.ijarcet.org 2067
comparison scheme. The match score represents the
closeness of the current image to the one present in
the database. A higher score represents a higher
closeness of the images. Based on experimentations a
threshold is decided. The threshold is a value which
lies in the range of match score. For any image if the
match score is less than the threshold the image is
rejected as a match to the database image specified.
However if the match score of an image is higher
than the threshold it is said to match the image in the
database.
4. EXPERIMENTS AND RESULTS
There are 50 test users in our experiments. Six image
of the hand is acquired from each user, three from left
hand and three from right hand. It is used for the
enrolment process to define the users’ templates, or
feature vectors. The features are extracted and match
with database.
5. CONCLUSION
The Hand geometry has proved to be a reliable
biometric. The proposed work shows how to utilize
the contour of the hand to extract features using very
simple mathematical formulas. We are attempting to
improve the performance of hand geometry based
verification system by reducing the amount of
features and integrating new features. Further we can
make a multi model biometric system for improve the
efficiency of the system.
Reference
[1] Saraf Ashish - Design of Hand Geometry Based Recognition
System Department of Computer Science & Engineering Indian
Institute of Technology Kanpur in Jan 2007.
[2] Arun Ross A.K.Jain and S.Pankati. A prototype hand-
geometry based veri_cation system. Int'l Conference on Audio-
and Video-based Biometric Person Authentication (AVBPA),
pages 166{171, March 1999.
[3] A. K. Jain and N. Duta. Deformable matching of hand shapes
for veri_cation. International Conference on Image Processing,
pages 857{861, October 1999.
[4] L. Wong and P. Shi. Peg-free hand geometry recognition using
hierarchical geometry and shape matching. IAPR Workshop on
Machine Vision Applications, pages 281{284, 2002
[5] Mongkon Sakdanupab and Nongluk Covavisaruch, A Fast and
Efficient Palmprint Identification Method for a Large Database.
[6] Jobin J., Jiji Joseph, Sandhya Y.A, Soni P. Saji, Deepa P.L.
Palm Biometrics Recognition and Verification System on
International Journal of Advanced Research in Electrical,
Electronics and Instrumentation Engineering .
[7] Gnanou Florence Sudha, M. Niveditha, K. Srinandhini, and S.
Narmadha Hand Based Biometric Recognition Based on Zernike
Moments and Log Gabor Filters, International Journal of Research
and Reviews in Information Sciences (IJRRIS).
[8] Kasturika B. Ray, Rachita Misra: Palmprint as a Biometric
Identifier,on IJECT Vol. 2.
[9] A. Kirthika and S. Arumugam: TEXTURE AND COLOR
INTENSIVE BIOMETRIC MULTIMODAL SECURITY USING
HAND GEOMETRY AND PALM PRINT in International Journal
of Advances in Engineering & Technology
[10] Arun Ross on A Prototype Hand Geometry-based
Verification System.
[11] Sarat C. Dass, Yongfang Zhu, Anil K. Jain: Validating a
Biometric Authentication System: Sample Size Requirements in
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND
MACHINE INTELLIGENCE.
[12] Anil K. Jain, Arun Ross, and Sharath Pankanti: Biometrics: A
Tool for Information Security on IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY
[13] Karthik Nandakumar, Anil K. Jain and Arun Ross: Fusion in
Multibiometric Identification Systems: What about the Missing
Data

Más contenido relacionado

La actualidad más candente

Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemKishor Singh
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...cscpconf
 
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...SubmissionResearchpa
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition systemeSAT Publishing House
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsVijay Karan
 
Correlation Based Fingerprint Liveness Detection
Correlation Based Fingerprint Liveness DetectionCorrelation Based Fingerprint Liveness Detection
Correlation Based Fingerprint Liveness DetectionAshish Pawar
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extractioniosrjce
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNrahulmonikasharma
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...IDES Editor
 
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...ijtsrd
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 

La actualidad más candente (17)

Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
 
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
 
An optimal face recoginition tool
An optimal face recoginition toolAn optimal face recoginition tool
An optimal face recoginition tool
 
G0333946
G0333946G0333946
G0333946
 
Correlation Based Fingerprint Liveness Detection
Correlation Based Fingerprint Liveness DetectionCorrelation Based Fingerprint Liveness Detection
Correlation Based Fingerprint Liveness Detection
 
Palmprint Identification Using FRIT
Palmprint Identification Using FRITPalmprint Identification Using FRIT
Palmprint Identification Using FRIT
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extraction
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
 
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 

Similar a Volume 2-issue-6-2064-2067

Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric systemBhavi Bhatia
 
A hybrid learning scheme towards authenticating hand-geometry using multi-mo...
A hybrid learning scheme towards authenticating  hand-geometry using multi-mo...A hybrid learning scheme towards authenticating  hand-geometry using multi-mo...
A hybrid learning scheme towards authenticating hand-geometry using multi-mo...IJECEIAES
 
IRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of FingerprintIRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of FingerprintIRJET Journal
 
Gesture Recognition System
Gesture Recognition SystemGesture Recognition System
Gesture Recognition SystemIRJET Journal
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...INFOGAIN PUBLICATION
 
Finger Vein Recognition Based on PCA Feature using Artificial Neural Network
Finger Vein Recognition Based on PCA Feature using Artificial Neural NetworkFinger Vein Recognition Based on PCA Feature using Artificial Neural Network
Finger Vein Recognition Based on PCA Feature using Artificial Neural Networkrahulmonikasharma
 
Sign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesSign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesIRJET Journal
 
IRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture RecognitionIRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture RecognitionIRJET Journal
 
Dorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaksDorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peakseSAT Publishing House
 
FOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDING
FOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDINGFOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDING
FOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDINGsipij
 
Virtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect SensorVirtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect SensorIRJET Journal
 
Hand gesture recognition using support vector machine
Hand gesture recognition using support vector machineHand gesture recognition using support vector machine
Hand gesture recognition using support vector machinetheijes
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
 
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESFUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESvasim hasina
 
Mems Sensor Based Approach for Gesture Recognition to Control Media in Computer
Mems Sensor Based Approach for Gesture Recognition to Control Media in ComputerMems Sensor Based Approach for Gesture Recognition to Control Media in Computer
Mems Sensor Based Approach for Gesture Recognition to Control Media in ComputerIJARIIT
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
 
Human Activity Recognition Using Smartphone
Human Activity Recognition Using SmartphoneHuman Activity Recognition Using Smartphone
Human Activity Recognition Using SmartphoneIRJET Journal
 

Similar a Volume 2-issue-6-2064-2067 (20)

Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
 
A hybrid learning scheme towards authenticating hand-geometry using multi-mo...
A hybrid learning scheme towards authenticating  hand-geometry using multi-mo...A hybrid learning scheme towards authenticating  hand-geometry using multi-mo...
A hybrid learning scheme towards authenticating hand-geometry using multi-mo...
 
H03201039049
H03201039049H03201039049
H03201039049
 
IRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of FingerprintIRJET - Biometric Traits and Applications of Fingerprint
IRJET - Biometric Traits and Applications of Fingerprint
 
Gesture Recognition System
Gesture Recognition SystemGesture Recognition System
Gesture Recognition System
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
 
D56021216
D56021216D56021216
D56021216
 
Finger Vein Recognition Based on PCA Feature using Artificial Neural Network
Finger Vein Recognition Based on PCA Feature using Artificial Neural NetworkFinger Vein Recognition Based on PCA Feature using Artificial Neural Network
Finger Vein Recognition Based on PCA Feature using Artificial Neural Network
 
Sign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesSign Language Identification based on Hand Gestures
Sign Language Identification based on Hand Gestures
 
IRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture RecognitionIRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture Recognition
 
Dorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaksDorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaks
 
FOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDING
FOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDINGFOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDING
FOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDING
 
Cc4301455457
Cc4301455457Cc4301455457
Cc4301455457
 
Virtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect SensorVirtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect Sensor
 
Hand gesture recognition using support vector machine
Hand gesture recognition using support vector machineHand gesture recognition using support vector machine
Hand gesture recognition using support vector machine
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approach
 
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESFUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
 
Mems Sensor Based Approach for Gesture Recognition to Control Media in Computer
Mems Sensor Based Approach for Gesture Recognition to Control Media in ComputerMems Sensor Based Approach for Gesture Recognition to Control Media in Computer
Mems Sensor Based Approach for Gesture Recognition to Control Media in Computer
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
 
Human Activity Recognition Using Smartphone
Human Activity Recognition Using SmartphoneHuman Activity Recognition Using Smartphone
Human Activity Recognition Using Smartphone
 

Más de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Más de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Volume 2-issue-6-2064-2067

  • 1. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 www.ijarcet.org 2064 Hand Geometry Recognition System Using Feature Extraction Poonam Rathi, Dr. Sipi Dubey CSE Dept. CSE Dept. RCET, Bhilai (C.G) India RCET, Bhilai (C.G) India Abstract- Biometrics traits such as fingerprints, hand geometry, face and voice verification provide a reliable alternative for identity verification and are gaining commercial and high user acceptability rate. Hand geometry based biometric system has proven to be the most suitable and acceptable biometric trait for medium and low security application. Geometric measurements of the human hand have been used for identity authentication in a number of commercial systems. This paper proposes a technique for hand biometric feature extraction using hand contour matching. Hand shape feature is obtained by using Euclidian distance from starting reference point and then calculate the tip and valley point of finger. Then apply some mathematical calculation for calculate the hand geometry features like finger length, width and perimeter. Index Terms: hand geometry, feature extraction, mathematical calculation. 1. INTRODUCTION: Personal identification using biometric methods is gaining attention in today’s automated world. Biometric recognition can be done using physiological or behavioral characteristics of the individual. The physiological characteristics signifies using human body parts for authentication like fingerprint, iris, ear, palm print, face etc. The behavioral characteristics include action done using body parts like voice, signature and gait etc. for authentication. The existing biometric verification systems employ various biometric traits such as fingerprint, face, iris, retina, voice, signature, palm print etc. Hand geometry - based recognition is considered both user friendly as well as fairly accurate biometric system. Biometric system has four characterstics: • universality, which means the characteristic should be present in all individuals; • uniqueness, as the characteristic has to be unique to each individual; • Permanence: its resistance to aging; • Measurability: how easy is to acquire image or signal from the individual; • Performance: how good it is at recognizing and identifying individuals; • Acceptability: the population must be willing to provide the characteristic Biometric systems can be used for identification and recognition purposes. In all cases there should be a database where biometric features from a set of individuals are stored. The role of the system is to compare an input with all the entries in the database and verify if there is a match, thus confirming the identity of the individual. To compare any kind of biometric characteristics it is necessary to represent them in a stable fashion. That is divided into two tasks: 1. Represent a biometric characteristic in reproducible and stable features that resist input variability. 2. Compare such features so users can accurately be identified.
  • 2. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 www.ijarcet.org 2065 2. LITRECTURE REVIEW Hand geometry refers to the geometric structure of hand, which includes lengths of fingers, widths at various points on the finger, diameter of the palm, thickness of the palm, etc. These features are not as discriminating as other biometric characteristics (such as fingerprints), they can easily be used for verification purpose. Hand biometric systems have evolved from early approaches which considered flat-surface and pegs to guide the placement of the user’s hand to completely platform-free, non-contact techniques were user collaboration is almost not required . This development can be classified into three categories according to the image acquisition criteria: • Constrained and contact based. Systems requiring a flat platform and pegs or pins to restrict hand degree of freedom. • Unconstrained and contact based. Peg-free scenarios, although still requiring a platform to place the hand, like a scanner. • Unconstrained and contact-free. Platform- free and contact-less scenarios where neither pegs nor platform are required for hand image acquisition. There has been several hand geometry verification systems published in literature. Jain et al. [2] developed a pegged hand geometry verification system for web security. Later Jain and Duta [3] developed another pegged system which aligns the two images and define a metric, Mean Alignment Error as the average distance between corresponding points measured between the images to be verified. Wong and Shi [4] developed system which uses a hierarchical recognition process, with gaussian mixture model used for the one set of features and a distance metric classification for a different set of features. Geometrical features have received notorious attention and research efforts, in comparison to other hand parameters. Methods based on this strategy (like widths, angles and lengths) reduce the information given in a hand sample to a N-dimensional vector, proposing any metric distance for computing the similarity between two samples. In this paper we purpose to extract features like length, width, centroid , min axis length, max axis length by using some mathematical function. 3. PERPOSED SYSTEM In our research, we do not fix the hand’s position in the image acquisition process. We take image from scanner. Proposed method which consists of hand geometry and their feature and we extract features by using image processing techniques and mathematical calculation. The steps in the palm print biometric system are: A. Acquisition: The images are captured using a scanner. The input image is a color image of both left and right palm without any deformity. This provides a simple, low-cost, non contact, comfortable and user-friendly acquisition mechanism. We do not fix the hand’s position in the image acquisition process. We take image from scanner in three different angles (90,180, -180 angle).The input image is stored in jpeg format. In cases of standard
  • 3. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 www.ijarcet.org 2066 deformity such as a missing finger the system expresses its inability to process the image. Fig 3.2 Acquisition of palm print B. Preprocessing: The next stage is Palm Print preprocessing module. In this module we prepare the image for feature extraction. In this stage color image transform into gray level image then we reduce the noise pixels from the gray image. Fig 3.3 RGB Color to Gray color Furthermore the gray level image is binarized. Fig 3.4 gray image and binarized image C. Feature Extraction: The feature extraction module is the most important module in a biometric system. The feature extraction module extracts the features of hand geometry. Fig 3.5 Feature Extraction We calculate features of hand print by using reference point: a) Tip point of all fingers including thumb. b) Starting reference point and ending reference point c) Centriod of the hand d) Major axis length e) Minor axis length f) Perimeter D. Matching: The last module of the biometric system is matching. Here the features extracted in the previous section are matched up with the features of that individual previously stored in the database. The proposed system produces a match score based on a
  • 4. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 www.ijarcet.org 2067 comparison scheme. The match score represents the closeness of the current image to the one present in the database. A higher score represents a higher closeness of the images. Based on experimentations a threshold is decided. The threshold is a value which lies in the range of match score. For any image if the match score is less than the threshold the image is rejected as a match to the database image specified. However if the match score of an image is higher than the threshold it is said to match the image in the database. 4. EXPERIMENTS AND RESULTS There are 50 test users in our experiments. Six image of the hand is acquired from each user, three from left hand and three from right hand. It is used for the enrolment process to define the users’ templates, or feature vectors. The features are extracted and match with database. 5. CONCLUSION The Hand geometry has proved to be a reliable biometric. The proposed work shows how to utilize the contour of the hand to extract features using very simple mathematical formulas. We are attempting to improve the performance of hand geometry based verification system by reducing the amount of features and integrating new features. Further we can make a multi model biometric system for improve the efficiency of the system. Reference [1] Saraf Ashish - Design of Hand Geometry Based Recognition System Department of Computer Science & Engineering Indian Institute of Technology Kanpur in Jan 2007. [2] Arun Ross A.K.Jain and S.Pankati. A prototype hand- geometry based veri_cation system. Int'l Conference on Audio- and Video-based Biometric Person Authentication (AVBPA), pages 166{171, March 1999. [3] A. K. Jain and N. Duta. Deformable matching of hand shapes for veri_cation. International Conference on Image Processing, pages 857{861, October 1999. [4] L. Wong and P. Shi. Peg-free hand geometry recognition using hierarchical geometry and shape matching. IAPR Workshop on Machine Vision Applications, pages 281{284, 2002 [5] Mongkon Sakdanupab and Nongluk Covavisaruch, A Fast and Efficient Palmprint Identification Method for a Large Database. [6] Jobin J., Jiji Joseph, Sandhya Y.A, Soni P. Saji, Deepa P.L. Palm Biometrics Recognition and Verification System on International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering . [7] Gnanou Florence Sudha, M. Niveditha, K. Srinandhini, and S. Narmadha Hand Based Biometric Recognition Based on Zernike Moments and Log Gabor Filters, International Journal of Research and Reviews in Information Sciences (IJRRIS). [8] Kasturika B. Ray, Rachita Misra: Palmprint as a Biometric Identifier,on IJECT Vol. 2. [9] A. Kirthika and S. Arumugam: TEXTURE AND COLOR INTENSIVE BIOMETRIC MULTIMODAL SECURITY USING HAND GEOMETRY AND PALM PRINT in International Journal of Advances in Engineering & Technology [10] Arun Ross on A Prototype Hand Geometry-based Verification System. [11] Sarat C. Dass, Yongfang Zhu, Anil K. Jain: Validating a Biometric Authentication System: Sample Size Requirements in IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE. [12] Anil K. Jain, Arun Ross, and Sharath Pankanti: Biometrics: A Tool for Information Security on IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY [13] Karthik Nandakumar, Anil K. Jain and Arun Ross: Fusion in Multibiometric Identification Systems: What about the Missing Data