scholarly journals Palm Print Recognition : A biometric Identification Technique

Author(s):  
Abhilove Kumar ◽  
Apoorv Mishra

Biometric technology classified into two stanzas as authentication and second one is identification this is majorly used in various fields or different- different applications because it verifies the data with help of other rectification technique. Here, we face so many difficulties which play an essential role in rectification process such as the disturbance in picture, blurring, not cleared the minutiae points and picture superiority. Here we use some algorithm which boosts up the algorithms and performance of recognition. This process is very efficient to rectify any of the documents and it is also been good to detect the features or attributes in terms of security.

Author(s):  
Z.-M. Zadorozhnyy ◽  
V. Muravskyi ◽  
S. Yatsyshyn ◽  
O. Shevchuk

Abstract. Modern conditions of growing cyber threats caused by the hybrid conflicts around the world and looming biological threat of the COVID-19 pandemic necessitate the introduction of biometric authentication of employees, leading to the transformation in the methodology and organization of accounting at enterprises. The procedure for accounting and control of time worked and wages of the employees is the first to undergo changes due to the forcibly limited access of employees to the enterprise data and premises, which determines the topicality and aims of this research. The aim of the article is to investigate the prospects for monitoring the working time and movement of employees on the premises (facilities) of the enterprise with the use of biometric technology in order to develop the methodology of automation of the accounting of payments made to employees and to ensure the cybersecurity of economic entities. The prospects of using an automated employee checkpoint system based on biometrics for the purposes of accounting and control are explored. The paper improves the methodology of accounting and control over the working time and wages of employees based on the automated employee authentication system using data on the time spent on premises and performance of job functions. Recommendations are made on ensuring biological and cyber security of enterprises in terms of categorizing the enterprise premises and equipment according to their functions and level of access to information and material flows. The research examines the prospects of accounting for the employee costs, as well as accurate distribution of overhead and other costs based on data of the biometric employee authentication system. It is advised to conduct further research into the peculiarities of methodology and organization of accounting under conditions of distance and isolated job performance by accounting employees, as it raises the requirements to cybersecurity of enterprises. Keywords: accounting, working time, wages (salary), biometrics, employee authentication, automation of accounting and control, cybersecurity, COVID-19. JEL Classification M41, M49 Formulas: 0; fig.: 2; tabl.: 1; bibl.: 18.


2012 ◽  
Vol 43 (5) ◽  
pp. 457-474 ◽  
Author(s):  
Elida K. U. Jacobsen

The last decade has seen an increased focus on secured forms of identification in security governance, leading to a massive growth and standardization in the application of biometric technologies globally. This article examines what is currently the largest biometric technology project in the world: the nationwide Unique Identification (UID) number system in India. It emphasizes the importance of investigating the postcolonial contexts of governance in which biometric technology is currently being applied. Approaching the Indian scheme as a discursive/practical assemblage of multiple actors and rationales, the article investigates three contexts within which the biometric project emerged: India’s Home Ministry, the Unique Identification Authority of India and a project focusing on the biometric identification of homeless people in Delhi. In particular, the article examines the various targets of intervention constructed in the discourses and practices of the national ID scheme. It is argued that the practice of biometric identification is produced as a solution to a wide array of problems of governance, both as a means of financial inclusion and as a method of surveillance.


2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Gayathri Rajagopal ◽  
Senthil Kumar Manoharan

Biometrics authentication is an effective method for automatically recognizing a person’s identity with high confidence. Multispectral palm print biometric system is relatively new biometric technology and is in the progression of being endlessly refined and developed. Multispectral palm print biometric system is a promising biometric technology for use in various applications including banking solutions, access control, hospital, construction, and forensic applications. This paper proposes a multispectral palm print recognition method with extraction of multiple features using kernel principal component analysis and modified finite radon transform. Finally, the images are classified using Local MeanK-Nearest Centroid Neighbor algorithm. The proposed method efficiently accommodates the rotational, potential deformations and translational changes by encoding the orientation conserving features. The proposed system analyses the hand vascular authentication using two databases acquired with touch-based and contactless imaging setup collected from multispectral Poly U palm print database and CASIA database. The experimental results clearly demonstrate that the proposed multispectral palm print authentication obtained better result compared to other methods discussed in the literature.


2015 ◽  
Vol 15 (03) ◽  
pp. 1550008 ◽  
Author(s):  
Y. L. Malathi Latha ◽  
Munaga V. N. K. Prasad ◽  
Banoth Sammulal

Palm print authentication is a biometric technology to identify a person's identity. In this paper, phase congruency method is used to extract features from palm print ROI images. The phase congruency is an efficient method to extract features at varying illumination condition and the image is invariant to contrast. By applying this method, local phase congruency (LPC), local orientation (LO) and local phase (LP) are extracted individually and fused using score level fusion. To reduce false acceptance rate (FAR), Min-Max threshold range is employed and the proposed method is tested on PolyU database of 7480 images from 374 individuals, with 20 image samples per individual. The proposed system achieves genuine acceptance rate (GAR) of 100% and FAR of 0.65%.


Biometric technology has been commonly used for authentication. Fingerprint or iris become one of the biometrics that is widely applied. However, this type of biometrics tends to be easily falsified and damaged. So it is misused for manipulating actions and even crime. Therefore a new biometric method is needed to overcome this problem. One potential modality is biometrics based on an electrocardiogram (ECG) signal. This research simulates a one-lead ECG waveform for person authentication. ECG waves were taken from eleven healthy adult volunteers with a length of 60 seconds. ECG waves from each person are segmented into 10 sections so that a total of 110 ECG waves are used for person authentication simulations. All noise of the ECG waves was removed using a bandpass filter to reduce artifacts and high-frequency noise. Wavelet packet decomposition (3 Level) was applied to decompose the signal in several intrinsic parts so that typical wave information can be retrieved. Entropy-based feature extraction applied to all decomposed signals. A total of 14 entropy features have been calculated and used as predictors in the classification process. Validation and performance tests are carried out by cross-validation combined with linear discriminant analysis and support vector machines with five scenarios. The proposed method provides the highest accuracy of 71.8% using discriminant analysis and cubic support vector machine. The best accuracy value was achieved if all entropy features from all wavelet decomposition levels are used as predictors in the classification process. This research is expected to be a reference that ECG has the potential to become a future biometric modality


2020 ◽  
Vol 176 ◽  
pp. 2088-2097
Author(s):  
Paul Prasse ◽  
Lena A. Jäger ◽  
Silvia Makowski ◽  
Moritz Feuerpfeil ◽  
Tobias Scheffer

2021 ◽  
Author(s):  
Kala H S ◽  
Shreya Kumar ◽  
Rakshanda B Reddy ◽  
Nishanth Shastry ◽  
Rounak Thakur

2014 ◽  
Vol 618 ◽  
pp. 415-420
Author(s):  
Yu Chen Wang ◽  
Su Xue Peng ◽  
Jian Jun Yan ◽  
Yi Qin Wang ◽  
Yi Ming Hao ◽  
...  

Palm-print medicine is a discipline in traditional Chinese medicine (TCM), equivalent to thepalm-print diagnosis discipline and palm medicine. And it’s a meaningful work to combine the biometric identification technology with traditional Chinese palm-print medicine for the diagnosis of human diseases. According to the characteristics of palm-print images, this paper makes a simple summary of the key technology and core algorithm in the field of palm-print identification.


Sign in / Sign up

Export Citation Format

Share Document