SlideShare a Scribd company logo
1 of 8
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. III (May – Jun. 2015), PP 01-08
www.iosrjournals.org
DOI: 10.9790/0661-17330108 www.iosrjournals.org 1 | Page
Touchless Palmprint Verification using Shock Filter,
SIFT, I-RANSAC, and LPD
Saravanan Chandran, Ph.D, MIEEE1
, Satya Bhushan Verma2
1, 2
(Computer Centre, National Institute of Technology, Durgapur, India)
Abstract: Palmprint have some basic features. These basic features are unique and unchangeable in one’s life.
It is constant and not easy to fake. A palmprint contains three major lines that are called principal line,
secondary line, and wrinkles. These lines give rich information for personal verification and have robust
discernment. In this paper a new method proposed for palmprint verification. Shock filter is used in the
proposed method for preprocessing. SIFT feature matching using I-RANSAC and LPD refinement are used for
feature matching. The results of the preprocessed and without preprocessed palmprint images are displayed,
compared, and discussed in this paper. The experiment is carried out using IITD palmprint database and CASIA
palmprint database.
Keywords - Palmprint, I-RANSAC, SIFT, Shock Filter, Touchless.
I. Introduction
The science of calculating and analyzing the biological, physiological data is known as biometric. The
biometric system uses these types of data for validation and authentication of people. The palmprint verification
system as a biometric technology becoming popular in the recent years because of its simplicity. Palmprint
verification system achieves high accuracy and user friendly. The researchers have been working on low
resolution palmprint images and high resolution palmprint images. High resolution image refers to 400 dpi or
more and low resolution image refers to 150 dpi or less. The high resolution images mainly used in criminal
detection and scientific purpose [8], low resolution images mainly used in automatic attendance, gate entry, and
public authentication applications.
The intra-class variations due to the hand deformation are the main challenge in the contactless image
acquisition. The SIFT (Scale Invariant Feature Transformation) feature of images won’t change during image
rotation, translation, and scale variations. I-RANSAC (Iterative Random Sample Consensus) achieves more
matching SIFT points than the normal RANSAC algorithm. The contact acquisition has few limitations. In
contact acquisition a CCD scanner is used because of its size. The scanner requires regular cleaning for each and
every palmprint acquisition which takes more time. Contact based acquisition in public may create hygienic
related issues. Contactless acquisition is carried out using a simple camera which consume less power than
scanner and no need of frequent cleaning. Nowadays, the researchers work on biometric application using
mobile devices with in-built camera for capturing the palmprint image.
The original SIFT technique has two main problems. First one is orientation-histogram-based where
SIFT descriptors are insufficient to discriminate different key points on palmprint. Another one is for translation
and rotation invariance. The original SIFT technique matches each key point of one image with all the key
points of other image ignoring their topological relations, which is important to differentiate different stretched
palmprint. To solve these type of problems in original SIFT proposed a touch less palmprint verification
technique, with the matching refinement.
The Shock filter is morphological image enhancement and restoration method. Kramer and Bruckner
introduced Shock filter in the year 1975 [3]. They presented an idea using dilation process near the maximum
and the erosion process near minimum.
The decision of pixel belongs to a maximum or a minimum is made on the basis of the Laplacian. If the
Laplacian is negative, then the pixel is considered as in impact zone of a maximum, while Laplacian is positive,
then the pixel considered as in impact zone of a minimum. By iterating this procedure produces a sharp
discontinuity at the borderline between two influence zones. Within each zone, a constant segment is created
paper.
II. Related Works
Xiangqian Wu et al. [14] used circular Gabor filter for the preprocessing. Then they used SIFT (Scale
Invariant Feature Transform) feature extraction and matching. Further they apply two stage refinement, first one
is I-RANSAC (Iterative-Random Sample Consensus) and second refinement is LPD (Local Palmprint
Descriptors).
Shahla Saedi et al [12] proposed a palmprint authentication technique, which is based on the discrete
orthonormal S-Transform. For the texture analysis and calculation of feature vector they used 2-D DOST
Touchless Palmprint Verification using Shock Filter, SIFT,I- RANSAC, and LPD
DOI: 10.9790/0661-17330108 www.iosrjournals.org 2 | Page
(Discrete Orthonormal S-Transform). They also used ICA (Independent Component Analysis) for removal of
redundant and dependent component which is given by feature vector. Nesrine et al. [9] proposed a bimodal
biometric system. It is based on the combination of hand shape and palmprint. They find matching score by
using SIFT (Scale Invariant Feature Transform) feature extraction, for the both hand and palmprint respectively.
Authors of [13] uses the Gabor filter for the feature extraction and use hamming distance for the
comparison of two images. Authors in [15] used Gabor filter for calculation of local invariant features and they
used KNN (K- Nearest Neighbor) as a classifier.
Romulus Terebes et al. [10] proposed a novel shock filter for image enhancement. They analyzed the
partial differential equations (PDE) based filter and described the evolution of real and imaginary parts of an
image.
III. Proposed Technique
The IITD and CASIA palmprint database are used for this experiment [1, 4]. The order of execution in
the proposed method is shown in the following flow chart.
Fig.1: Flowchart of proposed method.
Shock filter is applied for the preprocessing of the segmented palmprint image. The shock filtering
introduced by the Osher and Rudin in 1990 [11]. They introduced a continuous class of filters based on PDE
(Partial Differential Equations).
Shock filters has many advantages. It divides clearly at the edges in image, within the particular area
filtered signal becomes flat. Create segmentations using shock filters [6]. The shock filter do not increase the total
variation in a signal. They also have inherent stability properties [5]. The Shock filter also satisfies a maximum
and minimum principle stating that the range of filtered image remains within the range of the original image.
Touchless Palmprint Verification using Shock Filter, SIFT,I- RANSAC, and LPD
DOI: 10.9790/0661-17330108 www.iosrjournals.org 3 | Page
Fig.2: (A) Original palmprint image and (B) Result of preprocessing.
SIFT was introduced for the finding image features in different variant like image scaling, translation,
and rotation [2]. This is done by choosing key locations at the local minima and local maxima in the difference of
Gaussian function applied in scale space. The local minima and local maxima are constructed by continually
down sampling the image. Maxima and minima of this scale space function are resolute by comparing each pixel
with its neighbors. During matching, all the SIFT key points of first images are compared with second image. A
SIFT point is matched when the distance between the point and its adjacent points is enough larger than the
distance between point and another adjacent neighbor.
The following are the four steps for SIFT features extraction which is proposed by D. Lowe.
1. Scale space construction. Scale space construction is a first step, in this step the computation searches over
all scales and image locations. It identifies the potential interest points by using difference-of-Gaussian
function. The potential interest points are invariant to scale and orientation.
2. Keypoint localization: Key point localization is achieved in the difference of Gaussian images. The keypoints
are obtained through calculation of their stability.
3. Orientation assignment: On the basis of directions of the local image gradient is assign single or multiple
orientations to the keypoints. In the image data all the operations are performed and that has been changed
relative to the assigned direction, scale, and location.
4. Keypoint descriptor: The local image gradients focused at a keypoint and is equally split into sub-blocks,
from the each sub-block, the gradient orientation histogram is computed. The descriptor for the keypoint is
obtained by the concatenating the gradient orientation histogram.
Figure 3 shows the result of SIFT points detection, in that (A) and (B) are detected points from figure 2 (A) and
(B), respectively. There are 1145 points in original image and 3204 points in preprocessed image, this result show
the detected points in preprocessed image has much more points than the original image.
Fig.3: Detection of SIFT points: (A) SIFT points in original palmprint image
(B) SIFT points in preprocessed image.
Touchless Palmprint Verification using Shock Filter, SIFT,I- RANSAC, and LPD
DOI: 10.9790/0661-17330108 www.iosrjournals.org 4 | Page
The following figure 4 and figure 5 shows the shift points matching.
Fig.4: Shift Points matching with the same hand palmprint.
Fig.5: Shift Points matching with two different palmprint.
The RANSAC algorithm (Random Sample Consensus) was introduced by [7] M. Fischler and Bolles in
the year 1981. It was developed as a method to estimate the parameters of an assured model starting from a set of
data surrounding by large amounts of outliers. The Random sample consensus (RANSAC) is an iterative
technique to estimate parameters of a mathematical model from a set of observed data. It was a non-deterministic
algorithm in the sense that it produces a sensible result only with a certain chance, with this probability increasing
as more iterations are allowed.
The I-RANSAC algorithm [7] which is frequently used for refining the matched SIFT points, estimates a
transformation model (homography) according to all of the matched SIFT points and keep the points which
comply with the model as inliers, and discard other points which fail to comply with the model as outliers. In
contactless palmprint images non-linear deformations exist due to the variance of stretching degrees of hands. In
such cases, it is very difficult to model these non-linear deformations using only one transformation model.
Fig.6: Matched SIFT point’s finds with some mismatched points (A) Total 58 points (B) 44 points.
Touchless Palmprint Verification using Shock Filter, SIFT,I- RANSAC, and LPD
DOI: 10.9790/0661-17330108 www.iosrjournals.org 5 | Page
Fig.7: Refinement using I-RANSAC (A) Total refined 42 points of image 6(A). (B) Total refined 27 points of
image 6 (B).
LPD algorithm [14] used for refinement of the SIFT matched points. Some mismatched points shown in
figure 7(A) and 7(B), are removed using LPD shown in figure 9(A) and 9(B). The removal of mismatched points
known as refining the SIFT points. In this refinement remove mismatched points by LPD. In each inlier set
obtained by SIFT, the related points can well aligned by using the corresponding transformation model in LPD.
The feature extractors used for corresponding LPD, and LPD don’t have invariant in scale, rotation and
translation variances.
Fig.8: Refinement using LPD (A) Total refined 42 points of image 6(A). (B) Total refined 28 points of image 6
(B).
Touchless Palmprint Verification using Shock Filter, SIFT,I- RANSAC, and LPD
DOI: 10.9790/0661-17330108 www.iosrjournals.org 6 | Page
IV. Result And Discussion
IIT Delhi and CASIA palmprint database are used in this experiment. IIT Delhi palmprint image
database contains left and right hand color images of 230 persons taken from age group 14–56 years. Each person
has least six palmprint samples of both hands. All hand images of this database taken by contact less CMOS
camera which is saved in JPG format [4]. The segmented hand image also provided in that database which is
stored in BMP format at dimension 150X150 at gray scale. The CASIA palmprint Image Database contains 5,502
images of 312 different people and each person has 8-10 hand images of both hands. They use CMOS camera for
palmprint image acquisition and stored in JPG format at 8 bit greyscale [1].
Fig.9: Segmented palmprint form IIT Delhi database (A) Without preprocessing, (B) Corresponding preprocessed
image.
The images form IITD palmprint database show in figure 9(A) and the corresponding preprocessed
image show in figure 9(B). Applied the proposed approach in these images and calculated the SIFT matching
score. The TABLE 1 shows the SIFT matching score of preprocessed and without preprocessing image. The
preprocessed image gives greater accuracy than the without preprocessing. The palmprint number P1, P2, and P3
are same hand which are taken by different angle. The palmprint P4 and P5 belongs to another person. A
threshold value of 0.5 is assumed in this experiment. The palmprint of a person is matched with the same person
palmprint then SIFT matching score is above the threshold value. The palmprint of a person is matched with
another person palmprint then SIFT matching score is below the threshold value.
Table 1: IIT Delhi Palmprint Database SIFT Matching Score
Palmprint matched SIFT Matching Score
Without
Preprocessing
With Preprocessing
Palmprint P1 to P1 1.000 1.000
Palmprint P1 to P2 0.877 0.895
Palmprint P1 to P3 0.754 0.796
Palmprint P1 to P4 0.258 0.212
Palmprint P1 to P5 0.352 0.333
The images form CASIA palmprint database show in figure 10(A) and the respective preprocessed
image show in figure 10(B) and P1, P2, P3, P4, and P5 are the number of palmprint images. Applied the proposed
approach in CASIA images and calculated the SIFT matching score.
Touchless Palmprint Verification using Shock Filter, SIFT,I- RANSAC, and LPD
DOI: 10.9790/0661-17330108 www.iosrjournals.org 7 | Page
Figure 10: Segmented palmprint form CASIA palmprint database (A) Without preprocessing, (B) Corresponding
preprocessed image.
The TABLE 2 shows the SIFT matching score of preprocessed and without preprocessing image. The
preprocessed image gives greater accuracy than the without preprocessing. The palmprint number P1, P2, and P3
are belongs to same hand which are taken by different angle. The palmprint P4 and P5 are belongs to another
hand. The palmprint of the same person matches which produces higher SIFT matching score than the threshold
value.
Table 2: CASIA Palmprint Database SIFT Matching Score
Palmprint matched
SIFT Matching Score
Without Preprocessing With Preprocessing
Palmprint P1 to P1 1.000 1.000
Palmprint P1 to P2 0.728 0.731
Palmprint P1 to P3 0.653 0.663
Palmprint P1 to P4 0.357 0.333
Palmprint P1 to P5 0.333 0.143
The experiment carried out using MATLAB 2014a on desktop computer having 3.3 GHz processing and
2 GB RAM. The average execution time of each steps are listed in TABLE 3. This proposed approach takes 1.6
sec for verification, experimental results shows that the proposed new method is suitable for the real time
verification.
Table 3: Average execution time
Steps Average execution time in second
Preprocessing 0.321
SIFT feature extraction 0.415
SIFT feature matching 0.282
I-RANSAC based refinement 0.254
LPD based refinement 0.337
Total 1.609
V. Conclusion
This paper presented a new novel method of touchless palmprint verification, that uses SIFT and shock
filter with matching refinement. Initially, it uses the shock filter for preprocessing then SIFT feature extracted
and matched. The few non-matching points are refined by I-RANSAC and LPD in parallel. After refinement
SIFT matching score is calculated and compared with the threshold value. If the matching score is higher than
the threshold value then the both palmprint are considered as from same hand otherwise considered as from
different hands. The IITD database CASIA database are used in the experiment and the experiment results
shows that the proposed novel method matches the palmprint 100% accuracy and in short time.
Touchless Palmprint Verification using Shock Filter, SIFT,I- RANSAC, and LPD
DOI: 10.9790/0661-17330108 www.iosrjournals.org 8 | Page
References
[1]. CASIA Palmprint Database, http://www.cbsr.ia.ac.cn/PalmDatabase.htm.
[2]. D. Lowe, Distinctive image features from scale-invariant keypoints, International journal of computer vision, (2004) 60 (2) 91–110.
[3]. H. P. Kramer and J. B. Bruckner. Iterations of a non-linear transformation for enhancement of digital images. Pattern Recognition,
(1975)7:53 58.
[4]. IIT Delhi Touchless Palmprint Database version 1.0, http://web.iitd.ac.in/ ajaykr/Database Palm.htm.
[5]. Joachim Weickert, Coherence-Enhancing Shock Filters, Mathematical Image Analysis Group, http://www.mia.uni-
saarland.de/weickert.
[6]. L. Alvarez and L. Mazorra. Signal and image restoration using shock flters and anisotropic di_usion. SIAM Journal on Numerical
Analysis, (1994)31:590,605.
[7]. M. Fischler, R. Bolles, Random sample consensus: a paradigm for model fitting with applications to image analysis and automated
cartography, (1981) Commun ACM 24 (6) 381–395.
[8]. NEC Automated Palmprint Identification System http://www.necmalaysia.com.my/Solutions/PID/products/ppi.html.
[9]. Nesrine Charfi, Hanene Trichili, Adel M. Alimi, Basel Solaiman, Bimodal Biometric System based on SIFT Descriptors of Hand
Images, IEEE International Conference on Systems, Man, and Cybernetics, San Diego, CA, USA, (2014)October 5-8.
[10]. Romulus Terebes, Monica Borda, Christian Germain, Olivier Lavialle, A novel shock filter for image restoration and enhancement,
20th European Signal Processing Conference, (2012) 255-259.
[11]. S. Osher and L. I. Rudin. Feature-oriented image enhancement using shock filters. SIAM Journal on Numerical Analysis,
(1990)27:919.
[12]. Shahla Saedi and Nasrollah Moghadam Charkari, Palmprint authentication based on discrete orthonormal S-Transform, Applied
Soft Computing, Elsevier, (2014)21, 341–351.
[13]. W.K. Kong, D. Zhang and W. Li, Palmprint feature extraction using 2-D Gabor filters, Pattern Recogn. (2003) 36 (10) 2339-2347.
[14]. [Xiangqian Wu a,n, Qiushi Zhao a and Wei Bu b, A SIFT-based contactless palmprint verification approach using iterative
RANSAC and local palmprint descriptors, Pattern Recognition, Elsevier, (2014) 47, 3314–3326.
[15]. [15] Xin Pan and Qiu-Qi Ruan, Palmprint recognition using Gabor feature-based local invariant features, Neurocomputing (2009)
72 2040-2045.

More Related Content

What's hot

A New Technique of Extraction of Edge Detection Using Digital Image Processing
A New Technique of Extraction of Edge Detection Using Digital  Image Processing A New Technique of Extraction of Edge Detection Using Digital  Image Processing
A New Technique of Extraction of Edge Detection Using Digital Image Processing IJMER
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...idescitation
 
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsGesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsIJRES Journal
 
Cozzella presentation ICAPMMOMI 2010
Cozzella presentation ICAPMMOMI 2010Cozzella presentation ICAPMMOMI 2010
Cozzella presentation ICAPMMOMI 2010Lorenzo Cozzella
 
Object recognition
Object recognitionObject recognition
Object recognitionsaniacorreya
 
Digital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelDigital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelEditor IJMTER
 
Removing fence and recovering image details various techniques with performan...
Removing fence and recovering image details various techniques with performan...Removing fence and recovering image details various techniques with performan...
Removing fence and recovering image details various techniques with performan...RSIS International
 
Introduction To Palmprint Recognition
Introduction To Palmprint RecognitionIntroduction To Palmprint Recognition
Introduction To Palmprint RecognitionIRJET Journal
 
International Journal of Image Processing (IJIP) Volume (3) Issue (1)
International Journal of Image Processing (IJIP) Volume (3) Issue (1)International Journal of Image Processing (IJIP) Volume (3) Issue (1)
International Journal of Image Processing (IJIP) Volume (3) Issue (1)CSCJournals
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologiesijsrd.com
 
Image processing
Image processingImage processing
Image processingkamal330
 
Presentation on deformable model for medical image segmentation
Presentation on deformable model for medical image segmentationPresentation on deformable model for medical image segmentation
Presentation on deformable model for medical image segmentationSubhash Basistha
 

What's hot (17)

Ed34785790
Ed34785790Ed34785790
Ed34785790
 
A New Technique of Extraction of Edge Detection Using Digital Image Processing
A New Technique of Extraction of Edge Detection Using Digital  Image Processing A New Technique of Extraction of Edge Detection Using Digital  Image Processing
A New Technique of Extraction of Edge Detection Using Digital Image Processing
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
 
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsGesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
 
Cozzella presentation ICAPMMOMI 2010
Cozzella presentation ICAPMMOMI 2010Cozzella presentation ICAPMMOMI 2010
Cozzella presentation ICAPMMOMI 2010
 
Object recognition
Object recognitionObject recognition
Object recognition
 
Digital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelDigital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection Model
 
Removing fence and recovering image details various techniques with performan...
Removing fence and recovering image details various techniques with performan...Removing fence and recovering image details various techniques with performan...
Removing fence and recovering image details various techniques with performan...
 
Introduction To Palmprint Recognition
Introduction To Palmprint RecognitionIntroduction To Palmprint Recognition
Introduction To Palmprint Recognition
 
International Journal of Image Processing (IJIP) Volume (3) Issue (1)
International Journal of Image Processing (IJIP) Volume (3) Issue (1)International Journal of Image Processing (IJIP) Volume (3) Issue (1)
International Journal of Image Processing (IJIP) Volume (3) Issue (1)
 
Iw3515281533
Iw3515281533Iw3515281533
Iw3515281533
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
 
Ex4301908912
Ex4301908912Ex4301908912
Ex4301908912
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 
Image processing
Image processingImage processing
Image processing
 
Presentation on deformable model for medical image segmentation
Presentation on deformable model for medical image segmentationPresentation on deformable model for medical image segmentation
Presentation on deformable model for medical image segmentation
 
N026080083
N026080083N026080083
N026080083
 

Viewers also liked

Nghiên cứu giảm dao động cho công trình theo mô hình con lắc ngược chịu tác d...
Nghiên cứu giảm dao động cho công trình theo mô hình con lắc ngược chịu tác d...Nghiên cứu giảm dao động cho công trình theo mô hình con lắc ngược chịu tác d...
Nghiên cứu giảm dao động cho công trình theo mô hình con lắc ngược chịu tác d...https://www.facebook.com/garmentspace
 
DROGAS
DROGASDROGAS
DROGASDA NY
 
Superservice Glendora Success Story_PR2
Superservice Glendora Success Story_PR2Superservice Glendora Success Story_PR2
Superservice Glendora Success Story_PR2Matt Parsons
 
Nghiên cứu khả năng sinh trưởng, phát triển của một số giống đậu tương nhập n...
Nghiên cứu khả năng sinh trưởng, phát triển của một số giống đậu tương nhập n...Nghiên cứu khả năng sinh trưởng, phát triển của một số giống đậu tương nhập n...
Nghiên cứu khả năng sinh trưởng, phát triển của một số giống đậu tương nhập n...https://www.facebook.com/garmentspace
 
Nghiên cứu đặc điểm phân bố theo sinh cảnh và mối quan hệ sinh thái của quần ...
Nghiên cứu đặc điểm phân bố theo sinh cảnh và mối quan hệ sinh thái của quần ...Nghiên cứu đặc điểm phân bố theo sinh cảnh và mối quan hệ sinh thái của quần ...
Nghiên cứu đặc điểm phân bố theo sinh cảnh và mối quan hệ sinh thái của quần ...https://www.facebook.com/garmentspace
 
293193275 ada-3-e-j-s-c-bloque-3
293193275 ada-3-e-j-s-c-bloque-3293193275 ada-3-e-j-s-c-bloque-3
293193275 ada-3-e-j-s-c-bloque-3Fredycf1107
 
Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...
Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...
Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...https://www.facebook.com/garmentspace
 
Ukraine laws and regulations 413
Ukraine laws and regulations 413Ukraine laws and regulations 413
Ukraine laws and regulations 413braga william
 
Ukraine laws and regulations 411
Ukraine laws and regulations 411Ukraine laws and regulations 411
Ukraine laws and regulations 411braga william
 
Deon Puzey Brand
Deon Puzey Brand Deon Puzey Brand
Deon Puzey Brand Deon Puzey
 
Exploitanten brochure 15-10-2013
Exploitanten brochure 15-10-2013Exploitanten brochure 15-10-2013
Exploitanten brochure 15-10-2013gradje
 

Viewers also liked (15)

CV ASLLAN XHOKLI
CV ASLLAN XHOKLI CV ASLLAN XHOKLI
CV ASLLAN XHOKLI
 
Nghiên cứu giảm dao động cho công trình theo mô hình con lắc ngược chịu tác d...
Nghiên cứu giảm dao động cho công trình theo mô hình con lắc ngược chịu tác d...Nghiên cứu giảm dao động cho công trình theo mô hình con lắc ngược chịu tác d...
Nghiên cứu giảm dao động cho công trình theo mô hình con lắc ngược chịu tác d...
 
DROGAS
DROGASDROGAS
DROGAS
 
Báo giá quảng cáo Yeutreho.com
Báo giá quảng cáo Yeutreho.com Báo giá quảng cáo Yeutreho.com
Báo giá quảng cáo Yeutreho.com
 
Superservice Glendora Success Story_PR2
Superservice Glendora Success Story_PR2Superservice Glendora Success Story_PR2
Superservice Glendora Success Story_PR2
 
Nghiên cứu khả năng sinh trưởng, phát triển của một số giống đậu tương nhập n...
Nghiên cứu khả năng sinh trưởng, phát triển của một số giống đậu tương nhập n...Nghiên cứu khả năng sinh trưởng, phát triển của một số giống đậu tương nhập n...
Nghiên cứu khả năng sinh trưởng, phát triển của một số giống đậu tương nhập n...
 
Nghiên cứu đặc điểm phân bố theo sinh cảnh và mối quan hệ sinh thái của quần ...
Nghiên cứu đặc điểm phân bố theo sinh cảnh và mối quan hệ sinh thái của quần ...Nghiên cứu đặc điểm phân bố theo sinh cảnh và mối quan hệ sinh thái của quần ...
Nghiên cứu đặc điểm phân bố theo sinh cảnh và mối quan hệ sinh thái của quần ...
 
293193275 ada-3-e-j-s-c-bloque-3
293193275 ada-3-e-j-s-c-bloque-3293193275 ada-3-e-j-s-c-bloque-3
293193275 ada-3-e-j-s-c-bloque-3
 
Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...
Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...
Nghiên cứu một số biện pháp kỹ thuật phát triển hoa cúc tại thành phố thái ng...
 
Ukraine laws and regulations 413
Ukraine laws and regulations 413Ukraine laws and regulations 413
Ukraine laws and regulations 413
 
Ukraine laws and regulations 411
Ukraine laws and regulations 411Ukraine laws and regulations 411
Ukraine laws and regulations 411
 
New NGOs Required
New NGOs RequiredNew NGOs Required
New NGOs Required
 
Deon Puzey Brand
Deon Puzey Brand Deon Puzey Brand
Deon Puzey Brand
 
Cv
CvCv
Cv
 
Exploitanten brochure 15-10-2013
Exploitanten brochure 15-10-2013Exploitanten brochure 15-10-2013
Exploitanten brochure 15-10-2013
 

Similar to Touchless Palmprint Verification using Shock Filter, SIFT, I-RANSAC, and LPD

An Assessment of Image Matching Algorithms in Depth Estimation
An Assessment of Image Matching Algorithms in Depth EstimationAn Assessment of Image Matching Algorithms in Depth Estimation
An Assessment of Image Matching Algorithms in Depth EstimationCSCJournals
 
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdfmokamojah
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformIRJET Journal
 
An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...Kunal Kishor Nirala
 
Real-time Moving Object Detection using SURF
Real-time Moving Object Detection using SURFReal-time Moving Object Detection using SURF
Real-time Moving Object Detection using SURFiosrjce
 
Multi-feature Fusion Using SIFT and LEBP for Finger Vein Recognition
Multi-feature Fusion Using SIFT and LEBP for Finger Vein RecognitionMulti-feature Fusion Using SIFT and LEBP for Finger Vein Recognition
Multi-feature Fusion Using SIFT and LEBP for Finger Vein RecognitionTELKOMNIKA JOURNAL
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmIJARIIT
 
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...IRJET Journal
 
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...ijfcstjournal
 
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET Journal
 
IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...IRJET Journal
 
Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...
Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...
Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...ijma
 
Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...TELKOMNIKA JOURNAL
 
Ear Biometrics shritosh kumar
Ear Biometrics shritosh kumarEar Biometrics shritosh kumar
Ear Biometrics shritosh kumarshritosh kumar
 
Video Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFTVideo Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFTIRJET Journal
 

Similar to Touchless Palmprint Verification using Shock Filter, SIFT, I-RANSAC, and LPD (20)

An Assessment of Image Matching Algorithms in Depth Estimation
An Assessment of Image Matching Algorithms in Depth EstimationAn Assessment of Image Matching Algorithms in Depth Estimation
An Assessment of Image Matching Algorithms in Depth Estimation
 
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf10.1109@ICCMC48092.2020.ICCMC-000167.pdf
10.1109@ICCMC48092.2020.ICCMC-000167.pdf
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
 
An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...
 
J017377578
J017377578J017377578
J017377578
 
Real-time Moving Object Detection using SURF
Real-time Moving Object Detection using SURFReal-time Moving Object Detection using SURF
Real-time Moving Object Detection using SURF
 
E017443136
E017443136E017443136
E017443136
 
Multi-feature Fusion Using SIFT and LEBP for Finger Vein Recognition
Multi-feature Fusion Using SIFT and LEBP for Finger Vein RecognitionMulti-feature Fusion Using SIFT and LEBP for Finger Vein Recognition
Multi-feature Fusion Using SIFT and LEBP for Finger Vein Recognition
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithm
 
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
 
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...
 
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
 
IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...
 
Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...
Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...
Leader Follower Formation Control of Ground Vehicles Using Dynamic Pixel Coun...
 
Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...
 
Ear Biometrics shritosh kumar
Ear Biometrics shritosh kumarEar Biometrics shritosh kumar
Ear Biometrics shritosh kumar
 
Video Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFTVideo Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFT
 
1834 1840
1834 18401834 1840
1834 1840
 
1834 1840
1834 18401834 1840
1834 1840
 
G011134454
G011134454G011134454
G011134454
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

Touchless Palmprint Verification using Shock Filter, SIFT, I-RANSAC, and LPD

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. III (May – Jun. 2015), PP 01-08 www.iosrjournals.org DOI: 10.9790/0661-17330108 www.iosrjournals.org 1 | Page Touchless Palmprint Verification using Shock Filter, SIFT, I-RANSAC, and LPD Saravanan Chandran, Ph.D, MIEEE1 , Satya Bhushan Verma2 1, 2 (Computer Centre, National Institute of Technology, Durgapur, India) Abstract: Palmprint have some basic features. These basic features are unique and unchangeable in one’s life. It is constant and not easy to fake. A palmprint contains three major lines that are called principal line, secondary line, and wrinkles. These lines give rich information for personal verification and have robust discernment. In this paper a new method proposed for palmprint verification. Shock filter is used in the proposed method for preprocessing. SIFT feature matching using I-RANSAC and LPD refinement are used for feature matching. The results of the preprocessed and without preprocessed palmprint images are displayed, compared, and discussed in this paper. The experiment is carried out using IITD palmprint database and CASIA palmprint database. Keywords - Palmprint, I-RANSAC, SIFT, Shock Filter, Touchless. I. Introduction The science of calculating and analyzing the biological, physiological data is known as biometric. The biometric system uses these types of data for validation and authentication of people. The palmprint verification system as a biometric technology becoming popular in the recent years because of its simplicity. Palmprint verification system achieves high accuracy and user friendly. The researchers have been working on low resolution palmprint images and high resolution palmprint images. High resolution image refers to 400 dpi or more and low resolution image refers to 150 dpi or less. The high resolution images mainly used in criminal detection and scientific purpose [8], low resolution images mainly used in automatic attendance, gate entry, and public authentication applications. The intra-class variations due to the hand deformation are the main challenge in the contactless image acquisition. The SIFT (Scale Invariant Feature Transformation) feature of images won’t change during image rotation, translation, and scale variations. I-RANSAC (Iterative Random Sample Consensus) achieves more matching SIFT points than the normal RANSAC algorithm. The contact acquisition has few limitations. In contact acquisition a CCD scanner is used because of its size. The scanner requires regular cleaning for each and every palmprint acquisition which takes more time. Contact based acquisition in public may create hygienic related issues. Contactless acquisition is carried out using a simple camera which consume less power than scanner and no need of frequent cleaning. Nowadays, the researchers work on biometric application using mobile devices with in-built camera for capturing the palmprint image. The original SIFT technique has two main problems. First one is orientation-histogram-based where SIFT descriptors are insufficient to discriminate different key points on palmprint. Another one is for translation and rotation invariance. The original SIFT technique matches each key point of one image with all the key points of other image ignoring their topological relations, which is important to differentiate different stretched palmprint. To solve these type of problems in original SIFT proposed a touch less palmprint verification technique, with the matching refinement. The Shock filter is morphological image enhancement and restoration method. Kramer and Bruckner introduced Shock filter in the year 1975 [3]. They presented an idea using dilation process near the maximum and the erosion process near minimum. The decision of pixel belongs to a maximum or a minimum is made on the basis of the Laplacian. If the Laplacian is negative, then the pixel is considered as in impact zone of a maximum, while Laplacian is positive, then the pixel considered as in impact zone of a minimum. By iterating this procedure produces a sharp discontinuity at the borderline between two influence zones. Within each zone, a constant segment is created paper. II. Related Works Xiangqian Wu et al. [14] used circular Gabor filter for the preprocessing. Then they used SIFT (Scale Invariant Feature Transform) feature extraction and matching. Further they apply two stage refinement, first one is I-RANSAC (Iterative-Random Sample Consensus) and second refinement is LPD (Local Palmprint Descriptors). Shahla Saedi et al [12] proposed a palmprint authentication technique, which is based on the discrete orthonormal S-Transform. For the texture analysis and calculation of feature vector they used 2-D DOST
  • 2. Touchless Palmprint Verification using Shock Filter, SIFT,I- RANSAC, and LPD DOI: 10.9790/0661-17330108 www.iosrjournals.org 2 | Page (Discrete Orthonormal S-Transform). They also used ICA (Independent Component Analysis) for removal of redundant and dependent component which is given by feature vector. Nesrine et al. [9] proposed a bimodal biometric system. It is based on the combination of hand shape and palmprint. They find matching score by using SIFT (Scale Invariant Feature Transform) feature extraction, for the both hand and palmprint respectively. Authors of [13] uses the Gabor filter for the feature extraction and use hamming distance for the comparison of two images. Authors in [15] used Gabor filter for calculation of local invariant features and they used KNN (K- Nearest Neighbor) as a classifier. Romulus Terebes et al. [10] proposed a novel shock filter for image enhancement. They analyzed the partial differential equations (PDE) based filter and described the evolution of real and imaginary parts of an image. III. Proposed Technique The IITD and CASIA palmprint database are used for this experiment [1, 4]. The order of execution in the proposed method is shown in the following flow chart. Fig.1: Flowchart of proposed method. Shock filter is applied for the preprocessing of the segmented palmprint image. The shock filtering introduced by the Osher and Rudin in 1990 [11]. They introduced a continuous class of filters based on PDE (Partial Differential Equations). Shock filters has many advantages. It divides clearly at the edges in image, within the particular area filtered signal becomes flat. Create segmentations using shock filters [6]. The shock filter do not increase the total variation in a signal. They also have inherent stability properties [5]. The Shock filter also satisfies a maximum and minimum principle stating that the range of filtered image remains within the range of the original image.
  • 3. Touchless Palmprint Verification using Shock Filter, SIFT,I- RANSAC, and LPD DOI: 10.9790/0661-17330108 www.iosrjournals.org 3 | Page Fig.2: (A) Original palmprint image and (B) Result of preprocessing. SIFT was introduced for the finding image features in different variant like image scaling, translation, and rotation [2]. This is done by choosing key locations at the local minima and local maxima in the difference of Gaussian function applied in scale space. The local minima and local maxima are constructed by continually down sampling the image. Maxima and minima of this scale space function are resolute by comparing each pixel with its neighbors. During matching, all the SIFT key points of first images are compared with second image. A SIFT point is matched when the distance between the point and its adjacent points is enough larger than the distance between point and another adjacent neighbor. The following are the four steps for SIFT features extraction which is proposed by D. Lowe. 1. Scale space construction. Scale space construction is a first step, in this step the computation searches over all scales and image locations. It identifies the potential interest points by using difference-of-Gaussian function. The potential interest points are invariant to scale and orientation. 2. Keypoint localization: Key point localization is achieved in the difference of Gaussian images. The keypoints are obtained through calculation of their stability. 3. Orientation assignment: On the basis of directions of the local image gradient is assign single or multiple orientations to the keypoints. In the image data all the operations are performed and that has been changed relative to the assigned direction, scale, and location. 4. Keypoint descriptor: The local image gradients focused at a keypoint and is equally split into sub-blocks, from the each sub-block, the gradient orientation histogram is computed. The descriptor for the keypoint is obtained by the concatenating the gradient orientation histogram. Figure 3 shows the result of SIFT points detection, in that (A) and (B) are detected points from figure 2 (A) and (B), respectively. There are 1145 points in original image and 3204 points in preprocessed image, this result show the detected points in preprocessed image has much more points than the original image. Fig.3: Detection of SIFT points: (A) SIFT points in original palmprint image (B) SIFT points in preprocessed image.
  • 4. Touchless Palmprint Verification using Shock Filter, SIFT,I- RANSAC, and LPD DOI: 10.9790/0661-17330108 www.iosrjournals.org 4 | Page The following figure 4 and figure 5 shows the shift points matching. Fig.4: Shift Points matching with the same hand palmprint. Fig.5: Shift Points matching with two different palmprint. The RANSAC algorithm (Random Sample Consensus) was introduced by [7] M. Fischler and Bolles in the year 1981. It was developed as a method to estimate the parameters of an assured model starting from a set of data surrounding by large amounts of outliers. The Random sample consensus (RANSAC) is an iterative technique to estimate parameters of a mathematical model from a set of observed data. It was a non-deterministic algorithm in the sense that it produces a sensible result only with a certain chance, with this probability increasing as more iterations are allowed. The I-RANSAC algorithm [7] which is frequently used for refining the matched SIFT points, estimates a transformation model (homography) according to all of the matched SIFT points and keep the points which comply with the model as inliers, and discard other points which fail to comply with the model as outliers. In contactless palmprint images non-linear deformations exist due to the variance of stretching degrees of hands. In such cases, it is very difficult to model these non-linear deformations using only one transformation model. Fig.6: Matched SIFT point’s finds with some mismatched points (A) Total 58 points (B) 44 points.
  • 5. Touchless Palmprint Verification using Shock Filter, SIFT,I- RANSAC, and LPD DOI: 10.9790/0661-17330108 www.iosrjournals.org 5 | Page Fig.7: Refinement using I-RANSAC (A) Total refined 42 points of image 6(A). (B) Total refined 27 points of image 6 (B). LPD algorithm [14] used for refinement of the SIFT matched points. Some mismatched points shown in figure 7(A) and 7(B), are removed using LPD shown in figure 9(A) and 9(B). The removal of mismatched points known as refining the SIFT points. In this refinement remove mismatched points by LPD. In each inlier set obtained by SIFT, the related points can well aligned by using the corresponding transformation model in LPD. The feature extractors used for corresponding LPD, and LPD don’t have invariant in scale, rotation and translation variances. Fig.8: Refinement using LPD (A) Total refined 42 points of image 6(A). (B) Total refined 28 points of image 6 (B).
  • 6. Touchless Palmprint Verification using Shock Filter, SIFT,I- RANSAC, and LPD DOI: 10.9790/0661-17330108 www.iosrjournals.org 6 | Page IV. Result And Discussion IIT Delhi and CASIA palmprint database are used in this experiment. IIT Delhi palmprint image database contains left and right hand color images of 230 persons taken from age group 14–56 years. Each person has least six palmprint samples of both hands. All hand images of this database taken by contact less CMOS camera which is saved in JPG format [4]. The segmented hand image also provided in that database which is stored in BMP format at dimension 150X150 at gray scale. The CASIA palmprint Image Database contains 5,502 images of 312 different people and each person has 8-10 hand images of both hands. They use CMOS camera for palmprint image acquisition and stored in JPG format at 8 bit greyscale [1]. Fig.9: Segmented palmprint form IIT Delhi database (A) Without preprocessing, (B) Corresponding preprocessed image. The images form IITD palmprint database show in figure 9(A) and the corresponding preprocessed image show in figure 9(B). Applied the proposed approach in these images and calculated the SIFT matching score. The TABLE 1 shows the SIFT matching score of preprocessed and without preprocessing image. The preprocessed image gives greater accuracy than the without preprocessing. The palmprint number P1, P2, and P3 are same hand which are taken by different angle. The palmprint P4 and P5 belongs to another person. A threshold value of 0.5 is assumed in this experiment. The palmprint of a person is matched with the same person palmprint then SIFT matching score is above the threshold value. The palmprint of a person is matched with another person palmprint then SIFT matching score is below the threshold value. Table 1: IIT Delhi Palmprint Database SIFT Matching Score Palmprint matched SIFT Matching Score Without Preprocessing With Preprocessing Palmprint P1 to P1 1.000 1.000 Palmprint P1 to P2 0.877 0.895 Palmprint P1 to P3 0.754 0.796 Palmprint P1 to P4 0.258 0.212 Palmprint P1 to P5 0.352 0.333 The images form CASIA palmprint database show in figure 10(A) and the respective preprocessed image show in figure 10(B) and P1, P2, P3, P4, and P5 are the number of palmprint images. Applied the proposed approach in CASIA images and calculated the SIFT matching score.
  • 7. Touchless Palmprint Verification using Shock Filter, SIFT,I- RANSAC, and LPD DOI: 10.9790/0661-17330108 www.iosrjournals.org 7 | Page Figure 10: Segmented palmprint form CASIA palmprint database (A) Without preprocessing, (B) Corresponding preprocessed image. The TABLE 2 shows the SIFT matching score of preprocessed and without preprocessing image. The preprocessed image gives greater accuracy than the without preprocessing. The palmprint number P1, P2, and P3 are belongs to same hand which are taken by different angle. The palmprint P4 and P5 are belongs to another hand. The palmprint of the same person matches which produces higher SIFT matching score than the threshold value. Table 2: CASIA Palmprint Database SIFT Matching Score Palmprint matched SIFT Matching Score Without Preprocessing With Preprocessing Palmprint P1 to P1 1.000 1.000 Palmprint P1 to P2 0.728 0.731 Palmprint P1 to P3 0.653 0.663 Palmprint P1 to P4 0.357 0.333 Palmprint P1 to P5 0.333 0.143 The experiment carried out using MATLAB 2014a on desktop computer having 3.3 GHz processing and 2 GB RAM. The average execution time of each steps are listed in TABLE 3. This proposed approach takes 1.6 sec for verification, experimental results shows that the proposed new method is suitable for the real time verification. Table 3: Average execution time Steps Average execution time in second Preprocessing 0.321 SIFT feature extraction 0.415 SIFT feature matching 0.282 I-RANSAC based refinement 0.254 LPD based refinement 0.337 Total 1.609 V. Conclusion This paper presented a new novel method of touchless palmprint verification, that uses SIFT and shock filter with matching refinement. Initially, it uses the shock filter for preprocessing then SIFT feature extracted and matched. The few non-matching points are refined by I-RANSAC and LPD in parallel. After refinement SIFT matching score is calculated and compared with the threshold value. If the matching score is higher than the threshold value then the both palmprint are considered as from same hand otherwise considered as from different hands. The IITD database CASIA database are used in the experiment and the experiment results shows that the proposed novel method matches the palmprint 100% accuracy and in short time.
  • 8. Touchless Palmprint Verification using Shock Filter, SIFT,I- RANSAC, and LPD DOI: 10.9790/0661-17330108 www.iosrjournals.org 8 | Page References [1]. CASIA Palmprint Database, http://www.cbsr.ia.ac.cn/PalmDatabase.htm. [2]. D. Lowe, Distinctive image features from scale-invariant keypoints, International journal of computer vision, (2004) 60 (2) 91–110. [3]. H. P. Kramer and J. B. Bruckner. Iterations of a non-linear transformation for enhancement of digital images. Pattern Recognition, (1975)7:53 58. [4]. IIT Delhi Touchless Palmprint Database version 1.0, http://web.iitd.ac.in/ ajaykr/Database Palm.htm. [5]. Joachim Weickert, Coherence-Enhancing Shock Filters, Mathematical Image Analysis Group, http://www.mia.uni- saarland.de/weickert. [6]. L. Alvarez and L. Mazorra. Signal and image restoration using shock flters and anisotropic di_usion. SIAM Journal on Numerical Analysis, (1994)31:590,605. [7]. M. Fischler, R. Bolles, Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography, (1981) Commun ACM 24 (6) 381–395. [8]. NEC Automated Palmprint Identification System http://www.necmalaysia.com.my/Solutions/PID/products/ppi.html. [9]. Nesrine Charfi, Hanene Trichili, Adel M. Alimi, Basel Solaiman, Bimodal Biometric System based on SIFT Descriptors of Hand Images, IEEE International Conference on Systems, Man, and Cybernetics, San Diego, CA, USA, (2014)October 5-8. [10]. Romulus Terebes, Monica Borda, Christian Germain, Olivier Lavialle, A novel shock filter for image restoration and enhancement, 20th European Signal Processing Conference, (2012) 255-259. [11]. S. Osher and L. I. Rudin. Feature-oriented image enhancement using shock filters. SIAM Journal on Numerical Analysis, (1990)27:919. [12]. Shahla Saedi and Nasrollah Moghadam Charkari, Palmprint authentication based on discrete orthonormal S-Transform, Applied Soft Computing, Elsevier, (2014)21, 341–351. [13]. W.K. Kong, D. Zhang and W. Li, Palmprint feature extraction using 2-D Gabor filters, Pattern Recogn. (2003) 36 (10) 2339-2347. [14]. [Xiangqian Wu a,n, Qiushi Zhao a and Wei Bu b, A SIFT-based contactless palmprint verification approach using iterative RANSAC and local palmprint descriptors, Pattern Recognition, Elsevier, (2014) 47, 3314–3326. [15]. [15] Xin Pan and Qiu-Qi Ruan, Palmprint recognition using Gabor feature-based local invariant features, Neurocomputing (2009) 72 2040-2045.