Preferences help
enabled [disable] Abstract
Number of results
2016 | 130 | 1 | 175-177
Article title

Palm Vein Authentication and Verification System

Title variants
Languages of publication
In this work, both hardware and software of a palm vein capture system have been designed and a prototype is produced. By using this system, a genuine database was created with age and gender information of volunteered test subjects. Widely used pre-processing, acquisition of feature vectors, and classification methods were tested on the database and results are compared with speed versus accuracy. All the modules used in hardware and software were determined as open source. Python has been chosen as a software module programming on a single board computer with Linux kernel. As a result, an appropriately running system has been built with both secure software and hardware interfaces having maximum accuracy at 95.33% while specificity is at 100%.
  • Mersin University, Department of Electrical and Electronics Engineering, Mersin, Turkey
  • Mersin University, Department of Electrical and Electronics Engineering, Mersin, Turkey
  • [1] J.M. Cross, C.L. Smith, in: Security Technology, 1995. Proc. 29th Int. Carnahan Conf. on, Sanderstead, IEEE, 1995, p. 20, doi: 10.1109/CCST.1995.524729
  • [2] O. Nikisins, M. Greitans, R. Fuksis, M. Pudzs, Z. Serzane, BIOSIG 164, 133 (2010)
  • [3] Y. Zhou, A. Kumar, Inform. Forens. Secur. IEEE Trans. Biom. Compend. 6, 1259 (2011), doi: 10.1109/TIFS.2011.2158423
  • [4] A. Gupta, A. Malage, D. More, P. Hemane, P. Bhautmage, D. Dhandekar, in: Advances in Engineering and Technology Research (ICAETR), Proc. Int. Conf. on, Unnao, IEEE, 2014, p. 1, doi: 10.1109/ICAETR.2014.7012805
  • [5] L. Wang, G. Leedham, D.S.Y. Cho, Pattern Recogn. 3, 920 (2008), doi: 10.1016/j.patcog.2007.07.012
  • [6] M. Manocha, P. Kaur, Int. J. Innovat. Technol. Explor. Eng. 3, 2278 (2013)
  • [7] D.Y. Perwira, B.W.T. Agung, M.D. Sulistiyo, in: ICITSI 2014, Int. Conf. on Information Technology Systems and Innovation, Bandung, 2014, p. 99, doi: 10.1109/ICITSI.2014.7048245
  • [8] LedEngin LZ1, 2015, Oct.
  • [9] Raspberry Pi NoIR Camera - Infrared Camera, 2015, Oct.
  • [10] Raspberry Pi 1 Model B, 2015, Oct
  • [11] S. van der Walt, J.L. Schönberger, J. Nunez-Iglesias, F. Boulogne, J.D. Warner, N. Yager, E. Gouillart, T. Yu, PeerJ 2, e453 (2014), doi: 10.7717/peerj.453
  • [12] S. van der Walt, S.C. Colbert, G. Varoquaux, Comput. Sci. Eng. 13, 22 (2011), doi: 10.1109/MCSE.2011.37
  • [13] P. Ladoux, C. Rosenberger, B. Dorizzi, Adv. Biometr. 5558, 1290 (2009), doi: 10.1007/978-3-642-01793-3_130
  • [14] A. Kumar, K.V. Prathyusha, IEEE Trans. Image Process. 18, 2127 (2009), doi: 10.1109/TIP.2009.2023153
  • [15] L. Mirmohamadsadeghi, A. Drygajlo, in: Biometrics (IJCB), 2011 Int. Joint Conf. on Biometrics Compendium, IEEE, Washington, DC 2011, p. 1, doi: 10.1109/IJCB.2011.6117804
  • [16] W. Jia, R. Hu, Y. Lei, Y. Zhao, J. Gui, Biometr. Compend. IEEE 44, 385 (2013), doi: 10.1109/TSMC.2013.2258010
  • [17] M. Mohan, J. Saxena, K. Teckchandani, P. Pandey, in: IWOBI 2015, 4th Int. Work Conf. on Bioinspired Intelligence, San Sebastian, IEEE, 2015, p. 151, doi: 10.1109/IWOBI.2015.7160159
Document Type
Publication order reference
YADDA identifier
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.