Full-text resources of PSJD and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


Preferences help
enabled [disable] Abstract
Number of results
2016 | 130 | 1 | 175-177

Article title

Palm Vein Authentication and Verification System

Authors

Content

Title variants

Languages of publication

EN

Abstracts

EN
In this work, both hardware and software of a palm vein capture system have been designed and a prototype is produced. By using this system, a genuine database was created with age and gender information of volunteered test subjects. Widely used pre-processing, acquisition of feature vectors, and classification methods were tested on the database and results are compared with speed versus accuracy. All the modules used in hardware and software were determined as open source. Python has been chosen as a software module programming on a single board computer with Linux kernel. As a result, an appropriately running system has been built with both secure software and hardware interfaces having maximum accuracy at 95.33% while specificity is at 100%.

Keywords

EN

Contributors

author
  • Mersin University, Department of Electrical and Electronics Engineering, Mersin, Turkey
author
  • Mersin University, Department of Electrical and Electronics Engineering, Mersin, Turkey

References

  • [1] J.M. Cross, C.L. Smith, in: Security Technology, 1995. Proc. 29th Int. Carnahan Conf. on, Sanderstead, IEEE, 1995, p. 20, doi: 10.1109/CCST.1995.524729
  • [2] O. Nikisins, M. Greitans, R. Fuksis, M. Pudzs, Z. Serzane, BIOSIG 164, 133 (2010)
  • [3] Y. Zhou, A. Kumar, Inform. Forens. Secur. IEEE Trans. Biom. Compend. 6, 1259 (2011), doi: 10.1109/TIFS.2011.2158423
  • [4] A. Gupta, A. Malage, D. More, P. Hemane, P. Bhautmage, D. Dhandekar, in: Advances in Engineering and Technology Research (ICAETR), Proc. Int. Conf. on, Unnao, IEEE, 2014, p. 1, doi: 10.1109/ICAETR.2014.7012805
  • [5] L. Wang, G. Leedham, D.S.Y. Cho, Pattern Recogn. 3, 920 (2008), doi: 10.1016/j.patcog.2007.07.012
  • [6] M. Manocha, P. Kaur, Int. J. Innovat. Technol. Explor. Eng. 3, 2278 (2013)
  • [7] D.Y. Perwira, B.W.T. Agung, M.D. Sulistiyo, in: ICITSI 2014, Int. Conf. on Information Technology Systems and Innovation, Bandung, 2014, p. 99, doi: 10.1109/ICITSI.2014.7048245
  • [8] LedEngin LZ1, 2015, Oct. http://www.ledengin.com/files/products/LZ1/LZ1-00R602.pdf
  • [9] Raspberry Pi NoIR Camera - Infrared Camera, 2015, Oct. http://www.raspberrypi.org/products/pi-noir-camera/
  • [10] Raspberry Pi 1 Model B, 2015, Oct http://www.raspberrypi.org/products/model-b/
  • [11] S. van der Walt, J.L. Schönberger, J. Nunez-Iglesias, F. Boulogne, J.D. Warner, N. Yager, E. Gouillart, T. Yu, PeerJ 2, e453 (2014), doi: 10.7717/peerj.453
  • [12] S. van der Walt, S.C. Colbert, G. Varoquaux, Comput. Sci. Eng. 13, 22 (2011), doi: 10.1109/MCSE.2011.37
  • [13] P. Ladoux, C. Rosenberger, B. Dorizzi, Adv. Biometr. 5558, 1290 (2009), doi: 10.1007/978-3-642-01793-3_130
  • [14] A. Kumar, K.V. Prathyusha, IEEE Trans. Image Process. 18, 2127 (2009), doi: 10.1109/TIP.2009.2023153
  • [15] L. Mirmohamadsadeghi, A. Drygajlo, in: Biometrics (IJCB), 2011 Int. Joint Conf. on Biometrics Compendium, IEEE, Washington, DC 2011, p. 1, doi: 10.1109/IJCB.2011.6117804
  • [16] W. Jia, R. Hu, Y. Lei, Y. Zhao, J. Gui, Biometr. Compend. IEEE 44, 385 (2013), doi: 10.1109/TSMC.2013.2258010
  • [17] M. Mohan, J. Saxena, K. Teckchandani, P. Pandey, in: IWOBI 2015, 4th Int. Work Conf. on Bioinspired Intelligence, San Sebastian, IEEE, 2015, p. 151, doi: 10.1109/IWOBI.2015.7160159

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.bwnjournal-article-appv130n1044kz
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.