Personal authentication through dorsal hand vein patterns

被引:15
|
作者
Hsu, Chih-Bin [1 ]
Hao, Shu-Sheng [1 ]
Lee, Jen-Chun [2 ]
机构
[1] Natl Def Univ, Chung Cheng Inst Technol, Dept Elect & Elect Engn, Taipei, Taiwan
[2] Chinese Naval Acad, Dept Elect Engn, Kaohsiung, Taiwan
关键词
biometrics; dorsal hand vein recognition; modified two-directional two-dimensional principal component analysis; FACE REPRESENTATION; 2-DIMENSIONAL PCA;
D O I
10.1117/1.3607413
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Biometric identification is an emerging technology that can solve security problems in our networked society. A reliable and robust personal verification approach using dorsal hand vein patterns is proposed in this paper. The characteristic of the approach needs less computational and memory requirements and has a higher recognition accuracy. In our work, the near-infrared charge-coupled device (CCD) camera is adopted as an input device for capturing dorsal hand vein images, it has the advantages of the low-cost and noncontact imaging. In the proposed approach, two finger-peaks are automatically selected as the datum points to define the region of interest (ROI) in the dorsal hand vein images. The modified two-directional two-dimensional principal component analysis, which performs an alternate two-dimensional PCA (2DPCA) in the column direction of images in the 2DPCA subspace, is proposed to exploit the correlation of vein features inside the ROI between images. The major advantage of the proposed method is that it requires fewer coefficients for efficient dorsal hand vein image representation and recognition. The experimental results on our large dorsal hand vein database show that the presented schema achieves promising performance (false reject rate: 0.97% and false acceptance rate: 0.05%) and is feasible for dorsal hand vein recognition. (C) 2011 Society of Photo-Optical Instrumentation Engineers (SPIE). [DOI: 10.1117/1.3607413]
引用
收藏
页数:10
相关论文
共 50 条
  • [21] HAND DORSAL VEIN RECOGNITION BY MATCHING WIDTH SKELETON MODELS
    Li, Xiaoxia
    Huang, Di
    Zhang, Renke
    Wang, Yunhong
    Xie, Xianbo
    2016 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2016, : 3146 - 3150
  • [22] Haptics for recognizing and quantifying hand movement patterns for authentication
    Iglesias, R.
    Orozco, M.
    El Saddik, A.
    2007 IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING, CONFERENCE PROCEEDINGS BOOK, 2007, : 847 - 852
  • [23] Comparative Study of Deep Learning Methods on Dorsal Hand Vein Recognition
    Li, Xiaoxia
    Huang, Di
    Wang, Yunhong
    BIOMETRIC RECOGNITION, 2016, 9967 : 296 - 306
  • [24] PCANet based biometric system with fusion of palmprint and dorsal hand vein
    Kaur, Surinder
    Chaudhary, Gopal
    Kumar, Javalkar Dinesh
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (02) : 841 - 849
  • [25] Dorsal hand vein identification based on binary particle swarm optimization
    Benziane S.H.
    Benyettou A.
    Benyettou, Abdelkader (sarah.benziane@univ-oran.dz), 1600, Korea Information Processing Society (13): : 268 - 283
  • [26] Biometric Authentication through Unification of Finger Dorsal Biometric Traits
    Choudhury, Surabhi Hom
    Kumar, Amioy
    Laskar, Shahedul Haque
    INFORMATION SCIENCES, 2019, 497 : 202 - 218
  • [27] Authentication in mobile devices through hand gesture recognition
    J. Guerra-Casanova
    C. Sánchez-Ávila
    G. Bailador
    A. de Santos Sierra
    International Journal of Information Security, 2012, 11 : 65 - 83
  • [28] Authentication in mobile devices through hand gesture recognition
    Guerra-Casanova, J.
    Sanchez-Avila, C.
    Bailador, G.
    de Santos Sierra, A.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (02) : 65 - 83
  • [29] Dorsal hand vein recognition via hierarchical combination of texture and shape clues
    Huang, Di
    Zhu, Xiangrong
    Wang, Yunhong
    Zhang, David
    NEUROCOMPUTING, 2016, 214 : 815 - 828
  • [30] Parametric study of hand dorsal vein biometric recognition vulnerability to spoofing attacks
    Mizinov, Pavel V. V.
    Konnova, Natalia S. S.
    Basarab, Mikhail A. A.
    Pleshakova, Ekaterina S. S.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (03) : 383 - 396