Professional Documents
Culture Documents
•
•
COMPARISON:
• Input image was compared with already trained set of images
• Percentage of closeness is the output.
WORK PLAN
• •
• •
• •
• •
• •
• •
• •
• •
• •
• Human identification using vein patterns provides high security since the data
cannot be duplicated.
• This technique is much more preferred over finger print recognition due to its
greater level of security and convenience.
• As a biometric trait, palm vein pattern-based technology is highly effective for
personal identification.
• In future, vein detection can be used for medical purposes like locating the
patient's hidden veins for vaccinations.
[1] Finger and palm print based multibiometric authentication system with GUI interface” V. Vijayalakshmi ; R. Divya ; K. Jaganath
2013 International Conference on Communication and Signal Processing
[2] Naoto Miura, Akio Nagasaka, Takafumi Miyatake, "Feature Extraction of Finger Vein Patterns Based on Repeated Line Tracking
and Its Application to Personal Identification", Machine Vision and Applications, HITACHI, Ltd, 1-280, 2004.
[3] Junichi Hashimoto, "Finger Vein Authentication Technology and Its Future", Symposium on VLSI Circuits Digest of Technical
Papers, 2006.
[4] A. K. Jain, A. Ross, S. Pankanti, "Biometric: A Tool for Information Security", IEEE Trans. Information Forensics and Security,
vol. 1, no. 2, pp. 125-144, Jun. 2006.
[5] "Understanding of a Convolutional Neural Network" Saad Albawi , Tareq Abed Mohammed, Saad Al-Zawi 2017 International
Conference on Engineering and Technology (ICET).
[6] "Survey of contrast enhancement techniques based on histogram equalization" Manpreet Kaur, Jasdeep Kaur and
[7] "A Study Of Changes In Image Contrast With Various Algorithms" Catalin Ionescu, Cristian Fosalau and Daniel
Petrisor 2014 International Conference and Exposition on Electrical and Power Engineering (EPE).
[8] "Near- and Far- Infrared Imaging for Vein Pattern Biometrics" Lingyu Wang and Graham Leedham 2006 IEEE
[9] "A design of infrared finger vein image acquisition terminal" Chen Liukui, Li Zuojin, Wu Ying and Xiang Yi
, 2011 International Conference on Business Management and Electronic Information.
[10] "Performance of Some Image Processing Algorithms in Tensorflow" Damir Demirović ,Emir Skejić ,Amira
Šerifović–Trbalić -2018 25th International Conference on Systems, Signals and Image Processing (IWSSIP)
THANK YOU