Survey Paper on 3-D Hand Geometry Based Recognition System for User Authentication Using Image Processing

Authors

  • Prof. Y. L. Tonape  Department of Computer Engineering, S. B. Patil College ofEngineering, Pune, Maharashtra, India
  • Akshata A. Ajatrao  Department of Computer Engineering, S. B. Patil College ofEngineering, Pune, Maharashtra, India
  • Mrunal R. Chaudhari  Department of Computer Engineering, S. B. Patil College ofEngineering, Pune, Maharashtra, India
  • Jaydeep P. Lakade  Department of Computer Engineering, S. B. Patil College ofEngineering, Pune, Maharashtra, India
  • Gayatri C. Randive  Department of Computer Engineering, S. B. Patil College ofEngineering, Pune, Maharashtra, India

Keywords:

Hand geometry, hand features, radius distance methods, computational intelligence, hand biometrics, palm geometry analysis, palm equations.

Abstract

User authentication is a critical aspect of modern security systems, ranging from personal devices to secure facilities. Traditional authentication methods often rely on passwords, PINs, or biometric features like fingerprints or facial recognition. However, these methods can be vulnerable to unauthorized access or spoofing. This paper presents a novel approach to user authentication using 3D hand geometry-based recognition, leveraging image processing techniques. A Palm print, biometric characteristics, was mostly found in civil and commercial applications for security system because it has more reliable and easy to capture by low resolution devices. This research focuses on the development of hand identification and hand geometry using hand features, including the length of the hand, length and width of each finger, size of palm. We use radius distance methods to find the position of the fingertip and the concave of the finger from the hand contour. The radius distance method is highly flexible, accurately detecting the curves of fingertip and concave of finger. We use these reference points to identify the characteristics of individual hands. The sample images are acquired from the simple and low-cost acquisition system. The experimental results demonstrate the efficiency of the proposed method. 3D shape reconstruction from multiple hand-drawn sketches is an intriguing way to 3D shape modelling. Currently, state-of-the-art methods employ neural networks to learn a mapping from multiple sketches from arbitrary view angles to a 3D voxel grid. Because of the cubic complexity of 3D voxel grids, however, neural networks are hard to train and limited to low resolution reconstructions, which leads to a lack of geometric detail and low accuracy. To resolve this issue, we propose to reconstruct 3D shapes from multiple sketches using direct shape optimization (DSO), which does not involve deep learning models for direct voxel-based 3D shape generation. Specifically, we first leverage a conditional generative adversarial network (CGAN) to translate each sketch into an attenuance image that captures the predicted geometry from a given viewpoint. Then, DSO minimizes a project-and-compare loss to reconstruct the 3D shape such that it matches the predicted attenuance images from the view angles of all input sketches. Based on this, we further propose a progressive update approach to handle inconsistencies among a few hand-drawn sketches for the same 3D shape. Our experimental results show that our method significantly outperforms the state-of-the-art methods under widely used benchmarks and produces intuitive results in an interactive application.

References

  1. Meiru Mu, QiuQi Ruan and Yongsheng Shen, "Palmprint Recognition Based on Discriminative Local Binary Patterns Statistic Feature," Signal Acquisition and Processing, 2010. ICSAP '10. International Conference on, pp. 193-197, 9-10 Feb. 2010
  2. X. Wu, K. Wang and D. Zhang, "HMMs Based Palmprint Identification," Biometric Authentication, vol. 3072, no. 4, pp. 775- 781, 2004.
  3. C. C. Han, "A hand-based personal authentication using a coarse-tofine strategy," Image and Vision Computing, vol. 22, no. 11, pp. 909- 918, Sept. 2004.
  4. D. Zhang, W. K. Kong, J. You and M. Wong, "Online palmprint identification," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 25, no. 9, pp. 1041-1050, Sept. 2003.
  5. honghua Lin, "A novel iris recognition method based on the naturalopen eyes," Signal Processing (ICSP), 2010 IEEE 10th International Conference on, pp. 1090-1093, 24-28 Oct. 2010.
  6. Da Silva, Sandro, and J. I. Agbinya. "Face Recognition Programming on Mobile Handsets." In Proceedings of ICT. 2005.
  7. Amit Kumar Singh, Amrit Kumar Agrawal, Chandra Bhan Pal, “Hand geometry verification system: a review”, Proc ICUMT 2009.
  8. Nesrine Charfi, “Biometric recognition based on hand schape and palmprint modalities”, PhD thesis. Ecole nationale supérieure Mines-Télécom Atlantique, 2017.
  9. Shi Chuan Soh, M. Z. Ibrahim and Marlina Binti Yakno, “A review: personal identification based on vein infrared pattern”, Journal of Telecommunication, Electronic and Computer Engineering, vol. 10, No. 1-4, 2018, pp. 175 – 180.
  10. Swapnali, Londhe, et al. "A Cryptographic Key Generation on a 2D Graphics Using RGB Pixel Shuffling and Transposition." Proceedings of the International Conference on Data Engineering and Communication Technology: ICDECT 2016, Volume 2. Springer Singapore, 2017.
  11. K. S. Gaikwad and S. B. Waykar, "Detection and Removal Of Node Isolation Attack In OLSR Protocol Using Imaginary Nodes with Neighbour Response in MANET," 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, 2017, pp. 1-5, doi: 10.1109/ICCUBEA.2017.8463762.
  12. Dietterich T., “Do Hidden Units Implement ErrorCorrecting Codes?” Technical report 1991.
  13. Wicker, Stephen B., Error Control Systems for Digital Communication and Storage, Upper Saddle River, N.J., Prentice Hall, 1995.
  14. S. T. Shirkande and M. J. Lengare, "Optimization of Underwater Image Enhancement Technique by Combining WCID and Wavelet Transformation Technique," 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, 2017, pp. 1-6, doi: 10.1109/ICCUBEA.2017.8463759.
  15. Kale, R., Shirkande, S. T., Pawar, R., Chitre, A., Deokate, S. T., Rajput, S. D., & Kumar, J. R. R. (2023). CR System with Efficient Spectrum Sensing and Optimized Handoff Latency to Get Best Quality of Service. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), 829-839.
  16. Nagtilak, S., Rai, S., & Kale, R. (2020). Internet of things: A survey on distributed attack detection using deep learning approach. In Proceeding of International Conference on Computational Science and Applications: ICCSA 2019 (pp. 157-165). Springer Singapore.
  17. Mane, Deepak, and Aniket Hirve. "Study of various approaches in machine translation for Sanskrit language." International Journal of Advancements in Research & Technology 2.4 (2013): 383.
  18. Shivadekar, S., Kataria, B., Limkar, S. et al. Design of an efficient multimodal engine for preemption and post-treatment recommendations for skin diseases via a deep learning-based hybrid bioinspired process. Soft Comput (2023). https://doi.org/10.1007/s00500-023-08709-5
  19. Shivadekar, Samit, et al. "Deep Learning Based Image Classification of Lungs Radiography for Detecting COVID-19 using a Deep CNN and ResNet 50." International Journal of Intelligent Systems and Applications in Engineering 11.1s (2023): 241-250.
  20. Gaikwad, Yogesh J. "A Review on Self Learning based Methods for Real World Single Image Super Resolution." (2021).
  21. V. Khetani, Y. Gandhi and R. R. Patil, "A Study on Different Sign Language Recognition Techniques," 2021 International Conference on Computing, Communication and Green Engineering (CCGE), Pune, India, 2021, pp. 1-4, doi: 10.1109/CCGE50943.2021.9776399.
  22. Vaddadi, S., Arnepalli, P. R., Thatikonda, R., & Padthe, A. (2022). Effective malware detection approach based on deep learning in Cyber-Physical Systems. International Journal of Computer Science and Information Technology, 14(6), 01-12.
  23. Thatikonda, R., Vaddadi, S.A., Arnepalli, P.R.R. et al. Securing biomedical databases based on fuzzy method through blockchain technology. Soft Comput (2023). https://doi.org/10.1007/s00500-023-08355-x
  24. Rashmi, R. Patil, et al. "Rdpc: Secure cloud storage with deduplication technique." 2020 fourth international conference on I-SMAC (IoT in social, mobile, analytics and cloud)(I-SMAC). IEEE, 2020.
  25. Khetani, V., Gandhi, Y., Bhattacharya, S., Ajani, S. N., & Limkar, S. (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253-262.
  26. Khetani, V., Nicholas, J., Bongirwar, A., & Yeole, A. (2014). Securing web accounts using graphical password authentication through watermarking. International Journal of Computer Trends and Technology, 9(6), 269-274.

Downloads

Published

2023-10-30

Issue

Section

Research Articles

How to Cite

[1]
Prof. Y. L. Tonape, Akshata A. Ajatrao, Mrunal R. Chaudhari, Jaydeep P. Lakade, Gayatri C. Randive, " Survey Paper on 3-D Hand Geometry Based Recognition System for User Authentication Using Image Processing" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 10, pp.10-17, September-October-2023.