Touchless Palmprint Verification using Shock Filter,SIFT, I-RANSAC, and LPD
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Palmprint have some basic features. These basic features are unique and unchangeable in one’s life.It is constant and not easy to fake. A palmprint contains three major lines that are called principal line, secondary line, and wrinkles. These lines give rich information for personal verification and have robust discernment. In this paper a new method proposed for palmprint verification. Shock filter is used in the proposed method for preprocessing. SIFT feature matching using I-RANSAC and LPD refinement are used forfeature matching. The results of the preprocessed and without preprocessed palmprint images are displayed,compared, and discussed in this paper. The experiment is carried out using IITD palmprint database and CASIApalmprint database
Authors and Affiliations
Saravanan Chandran, Ph. D, MIEEE , Satya Bhushan Verma
Segmentation to Sound Conversion
Abstract: Our motive, the task of unsupervised topic segmentation of speech data operating over raw acoustic information. In contrast to existing algorithms for topic segmentation of speech, our approach does not r...
Dynamic and transparent seat allocation using QR Code in a Mobile Application
Abstract: Indian Railway is world’s largest human transport system which is currently dealing with a lot of problems, such as availability of confirming seat to waiting list passengers after its departure. Moreover, ther...
A Review: Hadoop Storage and Clustering Algorithms
Abstract : In the last few years there has been voluminous increase in the storing and processing of data, which require convincing speed and also requirement of storage space. Big data is a defined as large, diverseand...
A Review on Solving ECDLP over Large Finite Field Using Parallel Pollard’s Rho (ρ) Method
Abstract: Elliptic Curve Discrete Log Problem (ECDLP) is the underlying basis of many popular Public Key Scheme like Diffie-Hellman and ElGamal. The strength of such public key schemes is based on the difficulty ofsolvin...
Opportunistic Networks: A Review
Abstract: Opportunistic network is a wireless ad hoc network. It is a type of delay tolerant network and an extension of mobile ad hoc networks. This network has a special characteristic which is intermittent connectivit...