Biometric Security System Using Palm print

ثبت نشده
چکیده

Biometrics as a method for identification systems has been widely used for its robustness; one of its used is based on human palm. Palm has unique characteristics to be used in personal identification because of it features. In this paper the palm features are extracted using Discrete Cosine Transform energy features, Wavelet Transform energy features and Sobel Code to obtain feature vectors and the extracted features are matched individually using similarity measurement methods such as Euclidian distance and Hamming distance. KEY WORDS-Palmprint Identification, Discrete Cosine Transform, Wavelet Transform, Sobel Code, Similarity Measurement.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Palm Print: A Biometric for Human Identification

As in today’s life security is main concern. So, a lot of researches are going in the field of security like password, security question, pattern matching and a very important approach is biometric security. So my work is to study about the palm print recognition to identify human. Palm print recognition system has proved its efficiency with many machine learning techniques like LBP, Repeated l...

متن کامل

Parallel Palm print Identification on GPU

Biometric technologies are becoming inevitable in highly secure identification and personal verification solutions. With an increase in transaction frauds, security breaches the need for highly secure identification and personal verification technologies is becoming need of the hour. The major advantage of biometric system over traditional methods is that they are typically unique for each pers...

متن کامل

Enhancing Security in Palm Print Recognition Systems Using Encryption Algorithms

Nowadays, the use of biometric characteristics (e.g., palmprints, irises, fingerprints) is incrementing for individual recognition and many applications of biometrics are already available. Biometrics recognition has many advantages over the traditionally used methods (e.g., password, smart card), because biometric characteristics cannot be shared or forgotten, as it is inherently associated wi...

متن کامل

Efficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along With Multiple Biometrics

Electronic passports have known a wide and fast deployment all around the world since the International Civil Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the ...

متن کامل

Visual Cryptography Using Palm Print Based on DCT Algorithm

In many applications, Palm print data hiding can be viewed as a trade-off between capacity, robustness (against attacks), and embedding induced distortion. In this paper, we consider the security of the hidden information. Specifically, we propose a system that increases the security of the hidden data by biometric system. Multi-pixel Visual Cryptography for color images to generate two meaning...

متن کامل

Texture and Color Intensive Biometric Multimodal Security Using Hand Geometry and Palm Print

Hand geometry based verification systems are amongst the utmost in terms of user satisfactoriness for biometric qualities. This is obvious from their extensive profitable deployments around the world. Regardless of the profitable achievement, a number of issues remain to be addressed to formulate these systems more comprehensible. Shape features (hand/finger geometry) obtained from the hand car...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015