Touchless Palmprint Verification using Shock Filter,SIFT, I-RANSAC, and LPD
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Palmprint have some basic features. These basic features are unique and unchangeable in one’s life.It is constant and not easy to fake. A palmprint contains three major lines that are called principal line, secondary line, and wrinkles. These lines give rich information for personal verification and have robust discernment. In this paper a new method proposed for palmprint verification. Shock filter is used in the proposed method for preprocessing. SIFT feature matching using I-RANSAC and LPD refinement are used forfeature matching. The results of the preprocessed and without preprocessed palmprint images are displayed,compared, and discussed in this paper. The experiment is carried out using IITD palmprint database and CASIApalmprint database
Authors and Affiliations
Saravanan Chandran, Ph. D, MIEEE , Satya Bhushan Verma
Optimizing Neuro-Fuzzy Fault Diagnostic Algorithm for Photovoltaic Systems
Abstract: The main goal of this research is to develop a novel optimum neuro-fuzzy system for diagnosis the complex and dynamic systems. .It has used the Particle Swarm Optimization (PSO) technique for training the Adapt...
Anonymizied Approach to Preserve Privacy of Published Data Through Record Elimination
Abstract: Data mining is the process of analyzing data. Data Privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological da...
Reliable SPIN in Wireless Sensor Network: A Review
Abstract: Wireless sensor network (WSN) is becoming famous because of its use in various applications of different areas such as environment, defense, medical, house, media and education. WSN is a structure free ne...
Palm Vein Extraction and Matching For Personal Identification
Abstract : The most common method used for authentication is Textual passwords. But Textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Biometric passwords a...
Efficient Construction of Dictionary using Directed Acyclic Word Graph
Abstract: Implementation of dictionary is a topic on which research is going on since a long time in the search of a better and efficient algorithm both in terms of space and time complexity. Its necessity has increased...