Palm print Recognition using 2D Fourier Transformation and Integration Function
DOI:
https://doi.org/10.32628/CSEIT2173165Keywords:
Machine Learning, Palm print, Histogram, MinutiaeAbstract
Palm print authentication technique is very powerful technique as compare with other technique and it is also very friendly with the user and environment. Palm is the mainly inner part of the hand which shows different features as compare with other in this it technique it mainly provide the path to authenticate the user or modify the user. In this technique we use phase based matching algorithm and if in this problems will occur then it reduce by using of Fourier Transform technique and Integration system. These techniques extract the features of the palm to modify it and there are so many features for extraction. In this we authenticate the user with applying some of the transformation where when we extract the feature vector then it will not give the accurate result. That's why we using this transformation technique in this which is very useful for the user.
References
- A.-M. Cretu and P. Payeur, Visual attention model with adaptive weighting of conspicuity maps for building detection in satellite image, International Journal on Smart Sensing and Intelligent.
- B. Aleksandra, "Biometric Authentication. Types of biometric identifiers," Helsingfors, 2012.
- W. Kong and D. Zhang, "Palm print texture analysis based on low-resolution images for personal authentication," in Pattern Recognition, 2002. Proceedings. 16th International Conference, Quebec City, Canada, 2002.
- D. Zhang, W. Kong, J. You and M. Wong, "Online palm print identification," Pattern Analysis and Machine Intelligence, IEEE Transactions, vol. 25, no. 9, pp. 1041-1050, September 2003.
- L. Zhang and D. Zhang, "Characterization of palm prints by wavelet signatures via directional context modeling," IEEE Transactions on Systems Man and Cybrentics – part B: Cybrentics, vol. 34, no. 3, pp. 1335 - 1347, June 2004.
- X. Jing and D. Zhang, "A face and palmprint recognition approach based on discriminant DCT feature extraction," IEEE Trans Syst Man Cybern B Cybern, vol. 34, no. 6, pp. 2405-15, Dec. 2004.
- Vikash Yadav et al, “Detection of Melanoma Skin Disease by Extracting High Level Features for Skin Lesions”, International Journal of Advanced Intelligence Paradigms (IJAIP), Vol. 11, No. 3/4, pp. 397-408, September 2018.
- Vikash Yadav et al, “A Hybrid Image Compression Technique for Medical Images”, 7th IEEE International Conference on Computational Intelligence and Communication Networks (CICN-2015), pp. 222-227, Organized by Machine Intelligence Research Labs, Jabalpur, India on December 12-14, 2015.
- Vikash Yadav et al, “A Biometric approach to Secure Big Data”, International Conference on Innovation and Challenges in Cyber Security (ICICCS-2016), pp. 75-79, Organized by Department of Computer Science & Engineering, Amity University, Greater Noida, India on February 03-05, 2016.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.