Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Palmprint Verification for Images Captured in Peg-Less Scenarios

View through CrossRef
This paper presents a reliable and robust palmprint verification approach using palmprint feature point number (FPN). The feature verified by support vector machine (SVM). It has the advantages of capturing palm images in peg-less scenarios and by a low cost and low-resolution (100dpi) digital scanner. The low-resolution images lead a less database size. There are 4800 palmprint images were collected from 160 persons to verify the validity of the proposed approach and the results are satisfactory with 98.30% classification correct rate (CCR). Experimental results demonstrate that the proposed approach is feasible and effective in palmprint verification. Our findings will help to extend palmprint verification technologies to security access control systems.
Title: Palmprint Verification for Images Captured in Peg-Less Scenarios
Description:
This paper presents a reliable and robust palmprint verification approach using palmprint feature point number (FPN).
The feature verified by support vector machine (SVM).
It has the advantages of capturing palm images in peg-less scenarios and by a low cost and low-resolution (100dpi) digital scanner.
The low-resolution images lead a less database size.
There are 4800 palmprint images were collected from 160 persons to verify the validity of the proposed approach and the results are satisfactory with 98.
30% classification correct rate (CCR).
Experimental results demonstrate that the proposed approach is feasible and effective in palmprint verification.
Our findings will help to extend palmprint verification technologies to security access control systems.

Related Results

Multiview-Learning-Based Generic Palmprint Recognition: A Literature Review
Multiview-Learning-Based Generic Palmprint Recognition: A Literature Review
Palmprint recognition has been widely applied to security authentication due to its rich characteristics, i.e., local direction, wrinkle, and texture. However, different types of p...
Biometric verification by palmprint using contourlet transform
Biometric verification by palmprint using contourlet transform
Palmprint is a reliable biometric that can be used for identity verification because it is stable and unique for every individual. Palmprint images contain rich, unique features fo...
Drought stress effects on Lathyrus seedlings: A morpho-physiological and molecular study
Drought stress effects on Lathyrus seedlings: A morpho-physiological and molecular study
The experiment aimed to investigate the impact of polyethylene glycol (PEG) treatments, specifically 0% (control), 15% (PEG-I), and 20% (PEG-II), on various seed quality traits, pr...
Copolyester of trimellitic acid, glycerol, and poly(ethylene glycol): Synthesis and characterization
Copolyester of trimellitic acid, glycerol, and poly(ethylene glycol): Synthesis and characterization
AbstractA series of copolyesters having a broad range of biodegradable crosslinks were synthesised by FeCl3‐catalyzed polyesterification of trimellitic acid and glycerol containing...
BLOCK WISE 3D PALMPRINT RECOGNITION BASED ON TAN AND TRIGGS WITH BSIF DESCRIPTOR
BLOCK WISE 3D PALMPRINT RECOGNITION BASED ON TAN AND TRIGGS WITH BSIF DESCRIPTOR
Faced by problems such as lack of robustness from 2D palmprint recognition system which can result to be attacked using a fake palmprint or having the same palmprint as another ind...
Analyses of peg‐hole jamming in automatic assembly machines
Analyses of peg‐hole jamming in automatic assembly machines
PurposeThe purpose of this paper is to investigate theoretically the process of jamming in the peg‐hole type parts and to derive a mathematical model of jamming.Design/methodology/...

Back to Top