chapter 2 literature survey -...

51
9 CHAPTER 2 LITERATURE SURVEY Presently biometricverification systems are extensivelyused since theses offers inherent advantages above classical information based and token based personal recognition approaches. This Chapter of the thesis describes the survey related to the unimodal biometrics of palm namely palmprint and fingerprint along with multimodal biometric fusions used for personal identification or system authentication. 2.1 Literature review of palmprint as unimodal biometrics Palmprint has demonstrated to be unique and stable biometric individuality. It led to the expansion of products with palmprints as biometric features and their use in a number of real applications. Roughly all palmprint recognition techniques that are currently availablecapture the 2D image of the palm and useit for extracting the features and matching. Even though 2D palmprint recognition can attain high accuracy, it is very easy to counterfeit the 2D palmprint images.In depth 3D information is also lost in the imaging process.Since last decade; palmprint has been used as biometricmodality. These palmprint recognition systems uses encoding and matching of creases, it is found that these systems are not reliable like the systems which use ridges. It restricts the palmprint usage application in large scale person identification where the distinctiveness and insensitivity of the biometric modality required with the change in skin conditions and age.In recent time, to fill gap, researchers have proposed many algorithms for palmprint matching which uses ridges.These systems uses simple fingerprint matching algorithm. These systems use multiple features for matching purpose and also establishes reliable orientation field. However the palmprint features are different than the fingerprint in many aspects: 1) palmprints are larger than fingerprints and hence contains more numbers of minutias, 2) deformability of palms is more as compared to fingertips, and 3) the discrimination power and quality for different palm regions vary considerably. Hence these matchers can are not handle the noise and distortionproperly despite of heavy computational cost.However due to the vulnerability of biometric systems to replay, brute force attacks and database , these attacks need to be analyzed before massively deploying biometric systems in security systems.

Upload: dangphuc

Post on 01-Apr-2018

217 views

Category:

Documents


2 download

TRANSCRIPT

9

CHAPTER 2

LITERATURE SURVEY

Presently biometricverification systems are extensivelyused since theses offers inherent

advantages above classical information based and token based personal recognition

approaches. This Chapter of the thesis describes the survey related to the unimodal

biometrics of palm namely palmprint and fingerprint along with multimodal biometric

fusions used for personal identification or system authentication.

2.1 Literature review of palmprint as unimodal biometrics

Palmprint has demonstrated to be unique and stable biometric individuality. It led to the

expansion of products with palmprints as biometric features and their use in a number of

real applications. Roughly all palmprint recognition techniques that are currently

availablecapture the 2D image of the palm and useit for extracting the features and

matching. Even though 2D palmprint recognition can attain high accuracy, it is very easy to

counterfeit the 2D palmprint images.In depth 3D information is also lost in the imaging

process.Since last decade; palmprint has been used as biometricmodality. These palmprint

recognition systems uses encoding and matching of creases, it is found that these systems

are not reliable like the systems which use ridges. It restricts the palmprint usage application

in large scale person identification where the distinctiveness and insensitivity of the

biometric modality required with the change in skin conditions and age.In recent time, to fill

gap, researchers have proposed many algorithms for palmprint matching which uses

ridges.These systems uses simple fingerprint matching algorithm. These systems use

multiple features for matching purpose and also establishes reliable orientation field.

However the palmprint features are different than the fingerprint in many aspects: 1)

palmprints are larger than fingerprints and hence contains more numbers of minutias, 2)

deformability of palms is more as compared to fingertips, and 3) the discrimination power

and quality for different palm regions vary considerably.

Hence these matchers can are not handle the noise and distortionproperly despite of heavy

computational cost.However due to the vulnerability of biometric systems to replay, brute

force attacks and database , these attacks need to be analyzed before massively deploying

biometric systems in security systems.

10

The popularity of palmprint as a biometric and availability of literature in the field, owes to

its various advantages and hence many researchers contribute in this area. N. Duta [4]

presented a survey on hand shape based biometric systems. The survey consists of review of

component modules including the employed algorithms, system taxonomies, performance

evaluation methodologies, summary of the accuracy results reported in the literature, testing

issues, commercial hand shape biometric systems, successful deployments and US

government evaluations. They have also mentioned few limitations of the hand shape

biometric and gave some directions for future research. A. Kong et al [5] gave an overview

of palmprint investigationfor particular the devices used for capturing palmprints, required

preprocessing, different verification algorithms and fusion algorithms for large databases

along with measures for protecting the real time palmprint identification systems and

privacy of the users followed by some suggestions.

D. Zhang et al [6] presented online personal identification using low resolution palmprint

images effectively. A device for acquiring online palmprint images and fast palmprint

recognition algorithm make up the system. The system has been implemented for real time

personal identification based on CCD camera to capture the palmprint images. The image

alignment for feature extraction has been performed with the help of a robust image

coordinate system followed by preprocessing, feature extraction, representation and

matching. The algorithm used for preprocessing extracts the central area from a palmprint

image. The texture features of palmprint are extracted using 2-D Gabor phase coding.

Normalized hamming distance has been used for matching measurement. Genuine

acceptance rate of 98 percent and false acceptance rate of 0.04 percent has been achieved

with equal error rate of 0.6 percent on palmprint database produced of 7,752 palmprint

images from 386 different palms. A. Kumar et al [7] investigated an approach to enumerate

the quality of sensed data from the user templates to incorporate the quality of sensed data

for generating a reliable estimation for the matching scores. Extraction of user quality

depends on the confidence of generating reliable matching scores from the user templates.

Simultaneous extraction of palmprint and hand-shape images from the single hand image

has been conducted to ascertain the performance improvement for the individual trait.

Quality of biometric measurement also depends on the image quality, which is often linked

to imaging resolution. Finger knuckles have also been employed for experimentation.

Results presented in the paper show significant improvement in performance while

incorporating the method of user quality in the matching stages. The user quality based

fusion of the two biometric modalities also achieved promising improvement in

11

performance.C.Han et al [8] proposed a personal authentication system based on scanner

consisting of enrollment and verification stages using palmprint features suitable in many

network based applications. Training samples have been collected and passed through

preprocessing, feature extraction and modeling modules to generate the matching templates

during the enrollment phase. During verification phase a query sample has been processed

by the preprocessing and feature extraction modules followed by matching with the

reference templates from the stored database. The preprocessing module extracts the region

of interest for each sample through image threshold, border tracing and wavelet based

segmentation. The palmprint features have been extracted from this region using Sobel and

morphological operators. Modeling module generates the reference templates of specific

user. Finally back propagation neural network and the linear correlation function have been

used for the template matching and to measure the similarity during the verification phase.

Experimental results verify the validity of the approaches in personal authentication by

obtaining accuracy rate more than 98% with FAR and FRR values below 2%. C. Lin et al

[9] presented reliable and robust personal verification approach using palmprint features

that does not require prior knowledge about the objects and the parameters can be set

automatically. They have adopted a flatbed scanner for capturing palmprint images that

work without palm inking or a docking device. Two finger webs selected automatically as

the datum points define the region of interest in the palmprint image. From this region the

main palmprint features that include directional information and multiresolution

decompositions have been extracted by applying hierarchical decomposition mechanism at

different resolutions. Validity of the palmprint verification approach have been verified on

4800 palmprint images collected from 160 persons with FRR as 0.75% and FAR equal to

0.69%. The training and on-site image taking habits are consistent. D. Hu et al [10]

proposed an algorithm for extracting the proper features from image environment based on

locality conserving criterion using two dimensional locality preserving projections. The

algorithm works directly on the image matrix of images and the dimensionality of the bases

derived for image representation is much smaller, which means a more accurate

approximation of the original image. Experimental results on PolyU palmprint images show

the effectiveness of the method. K. Tiwari et al [11] present a palmprint based automatic

recognition system that uses local structure tensor for extracting features from the

palmprint. Features have been acquired from an enhanced palmprint image by dividing the

image into sub-images, based on local properties within the sub-image. To emphasize the

texture of the palmprint, force field transformation has been used and the chosen dominant

12

orientation pixels have been used for feature extraction to reduce the effect of noise. A

tensor matrix for the sub-image by averaging structure tensor values of the dominant

orientation pixels within a sub-image. Feature matrix has been generated by Eigen

decomposition of each tensor matrix. Matching decision has been made using Euclidean

distance between feature matrices of two palmprints. The proposed scheme has been tested

on 549 images of IITK database, 5238 images ofCASIA database and 7752 images of

PolyU database. It has been found that the structure with kernel value k=5 for filtering

achieved high accuracy for these databases and performed well again than the two top

known systems [6, 12].

M. Adan et al [13] present a hand biometric system for verification and recognition

purposes based on three keys. 1) The system is based on a natural reference system defined

on natural layout of the hand and thus no hand-pose training or a pre-fixed position required

in the registration process. 2) The features of hand are obtained through the polar

representation of the contour of hand implying minimum image processing and low

computational cost. 3) Right and left hands are used instead of common methods that use

one hand allowing consideration of distance measures for direct (R/R, L/L) and crossed

(R/L, L/R) hands obtaining improvements in identification ratios,false rejection rate and

false acceptance rate. The experimentation is performed on 5640 images belonging to 470

users providing results good enough for future security/control applications.G.Badrinath et

al [14] presented a palmprint based human recognition scheme which uses the palmprint

extraction from the obtained hand image. The extracted palmprintis enhanced for correction

of difference in brightness.Histogram utilization and coarse estimation of reflection can

improve the texture of palmprint.The improved palmprint is then divided into overlapping

square blocks.Principle component analysis reconstruction error has been used to categorize

the blocks into non-palmprint block or good block.The phase difference of vertical and

horizontal phase from each good block has been used as the palmprint features.

Hamming distance has been used for computation fo matching score for features of live

palmprint and corresponding good bloks of enrolled palmprint. The weighted sum rule in

which weights based on the average discriminating level has been used for the fusion of the

score obtained from all good blocks. 549 images from IITK database, 5239 hand images

from CASIA and 7752 hand images from PolyU database has been used for analyzing the

system performance. For all datasets theresults acheived Correct Recgnition Rate of 100

percent and a low Equal Error Rate.Robust system performence found till the noise level is

less than 50% and 64 % for good region and the bad region respectively.M. Aykut et al [15]

13

propose active appearance model for robust palm segmentation that eliminates the

requirement of the whole hand image appearing in the scene. The model has ability to

efficiently perform palm segmentation on the cluttered backgrounds and accurate decision

making on whether object in the scene is a palm. Performance evaluation is based on two

metrics namely modified point-to-curve distance and a margin width. Experimental results

exhibit outcomes like efficient segmentation of the palm area from the complex

background, successfully determine the hand objects because of the texture matching

property, palm model fitting for identifying hand object in the scene, effective fitting results

of the proposed palm model; at the 768 × 576 image resolution, average fitting error is

approximately 3 pixels.

J. Doi et al [16] proposed a personal authentication method using noncontact real-time

feature extraction. The feature extraction of the palm flexion creases and finger geometry

are integrated into a small number of discrete points based on the anatomy. A video camera

acquires image of palm placed freely facing toward the camera. In order to eliminate any

constraints, the fingers are brought together and the palm is straightened out. Intersection

points of the three finger flexion creases on the four finger skeletal lines form the discrete

feature points for the fingers. Intersection points of the major palm flexion creases and

prominent creases of the palm on the extended finger skeletal lines form the feature points

for the palm. The orientations of the creases at the intersection points are also extracted as

the features and used for matching purpose. Personalized threshold values and additional

parameter comparisons are applicable for a more reliable matching. The enrollment is as

simple as to acquire the palm image for the new image. The high quality of newly captured

image causes the replacement of the previously acquired image. X. Wu et al [17] used

stable line features of palm included thewrinkles and principal lines to clearly explain a

palm print in low-resolution images. The palm line extraction has been achieved through a

set of directional line detectors used for extracting these lines in dissimilar directions. These

uneven lines are characterized using their chain code in order for avoiding the loss of details

of the palm line organization. For matching the palm lines, a matching score is defined

among two palm prints based on the points of their palm lines. The investigational results

carried out on general database (DB1) for palm print verification and performance has been

compared with the 2-D Gabor algorithm and the Sobel method. Another experiment for

testing robustness against dirty palms (DB2 and DB3) confirms the advantage over the 2-D

Gabor algorithm. The speed and storage required for a real-time biometric schemecan be

satisfied.Biometric identity is also verified with palmer flexion crease recognition. T.

14

Cooket al [18] proposed a method of automated flexion crease recognition that can be used

to identify palmer flexion creases in online palmprint images. To extract the flexion creases,

a modified image seams algorithm has been used and a matching algorithm using k d-tree

nearest neighbor searching has been used to calculate the similarity between them.

Experimental results on 1000 images from 100 palms show that when compared to

manually identified flexion creases, a genuine acceptance rate of 100% has been achieved

with 0.0045% as false acceptance rate. O. Nibouche et al [19] suggest a palmprint matching

system based on the extraction of feature points. The feature points are corners formed by

the intersection of creases and lines as shown by a scale-space representation. Such points

can still be extracted even on low resolution palmprints, unlike minutiae. Matching has been

performed using an SVD factorization of a proximity matrix taking in account the

coordinates of the detected points and their local texture. The experiments have evidenced

an EER of 0.10%. N. Duta et al [20]investigate the practicality of individual identification

in light of feature focuses separated from palmprint images. A set of feature points along the

prominent palm lines, and the associated line orientation, has been extracted from a given

palmprint image. Matching scores between the corresponding sets of feature points of the

two palmprints have been used to decide if two palmprints belong to the same hand. Point

matching technique that takes into account the nonlinear deformations as well as the outlier

points present in the two sets aids in matching the two sets of feature points/orientations.

The discrimination power of palmprints has been exhibited by the estimates of the matching

score distributions for the genuine and imposter sets of palm pairs. Overlap between

genuine and imposter distributions has been found to be about 5%. The overlap has been

due to the noise present in the palm images or other non-linear deformation. With addition

of more subjects, one expects some overlap due to similar palms of different persons.

Adding palmprint information may improve the identity verification provided by

fingerprints in cases where fingerprint images cannot be properly captured e.g. due to dry

skin.

Palmprint recognition became a demanding problem due to large nonlinear distortion, low

superiority of the patterns and the calculationcomplexity for the big image size. R. Cappelli

et al [21] introduced high resolution palmprint recognition scheme using minutiae that deal

with these issues. Though the system follows the typical sequence of steps used in

fingerprint recognition, care has been taken to specifically design and optimize each step to

process large palmprint images with a good tradeoff between accuracy and speed. Reliable

detection of minutiae has been extracted using series of steps for robust feature extraction.

15

The matching algorithm found to beextremely efficient and robust to skin distortion as it is

based on a local matching policy and anproficient and compressedillustration of the

minutiae. Investigational results on the database (THUPALMLAB)shows that the scheme

compares very positively with state-of-the-artschemes. With complex and open working

environment, low-quality images are playing a major role in real life biometric

identification systems. The crucial component of low quality is low resolution. C. Su [22]

uses the object extraction method to extractindex, thumb, ring, middle and small fingers

from the hand images. The algorithm finds the exact locations of thefinger to finger

valleysand fingertips. Many useful geometry features are contained in the extracted fingers

that can be used for person identification. For image comparison, the geometry features are

transferred by using descriptor to another feature-domain. Scaling and magnification of

finger image is performed to obtain more salient feature. Subtraction of image is used to

examine the difference between the two images. The small finger has false acceptance rate

of 1% while false rejection rate is 1%. The thumb finger has false acceptance rate of 1% and

false rejection rate is 5%. The palm image has false acceptance rate of 5% while false reject

rate is 7%. C. Su [23] uses an extracting technique to obtain palm images. This algorithm

determines the precise locations of finger to finger valleys and fingertips and on a hand.

Palm images can be extracted after locating these positions. Such images contain many

useful geometrical features that can be used to identify palms. Orientations and centroid of

palms are identified in the algorithm. To align different palms to the same position for

geometrical comparison, image rotation, shifting and interpolation techniques are used. It is

observed that the overall error rate was below 3% for the entire experimental results. J. Wu

et al [24] proposed improved regional content feature and hand geometry based technique

for low resolution hand images with croping th ROI. At coarse level it has added the angle

information to the line based hand geometry. A simple sequence labeling segmentation

method has been developed that chooses conditional regions which are comparatively

steady in segmentation through constraint of region area; Assuming that at fine level, the

gray level changing rate is presented by gradient value of each pixel. From conditional

regions the low average gray-levels have been selected sincedense textures and distinctive

lines foreverdisplay lower gray-levels than their surrounding areas. Feature vectors are the

regional centroid coordinates. For measuring distances between feature vectors with

different dimensions, regional spatial relationship matrix has been built up. The method

utilizes more information available in low-resolution hand images compared to region of

16

interest based state-of-the-art algorithms. Also, method has been effective and robust to

rotation and translation.

A. Kumar et al [25] present an approach for personal authentication using hand images.

Performance of verification system based on palmprint has been achieved by integrating

features of hand geometry. A single camera has been employed to simultaneously acquire

palmprint and hand geometry images, avoiding inconvenience of using two different

sensors. Salient features of palmprint and hand shape images have been extracted and their

combined and individual performance has been examined. Simple image acquisition setup

without special illumination and avoiding use of alignment pegs are the advantages of the

method. Database consisting images of 100 users achieves promising results suggesting that

the fusion of matching scores can achieve better performance than the fusion at

representation. J. Guo et al [26] present an approach using infrared illumination device for

personal identification using hand geometrical features. The system can be widely used

under dark environment and complex background scenarios. The users can place their hand

freely in front of the camera without any pegs or templates. Total 13 important points have

been detected from a palm image and 34 features calculated from these points for further

recognition; thus achieving better detection accuracy. The averaged Correct Identification

Rate is 96.23% and averaged False Accept Rate is 1.85%. The results prove that the contact

free system can be considered as an effective practical identity verification system.

Though the technology of hand shape recognition has existed for about last three decades

most of the earlier works aimed to implement fast, low cost and practical systems where

fixed positioning guides have been used to facilitate the placements of hands and fingers.

These guides also serve as reference points to reduce the deformability of the shapes of

hands and fingers and to assist the extraction of features of the hands. Yet, since the hands

are highly articulated, there is still variance of the measured features even if the guides are

used, which results in low-medium positive recognition accuracy. Furthermore, position

fixed guides are not suitable for all hands of different dimensions. W. Xiong et al [27]

addressed the problem of deformable hand shape recognition in biometric systems without

any positioning aids like pegs. Separation and recognition of multiple rigid fingers has been

achieved under Euclidean transformations. Representation and optimal alignments of the

fingers has been done using an elliptical model. Similarity measure during alignment search

based on finger width measurements defined at nodes by controllable intervals achieves

balanceable recognition accuracy and computational cost. The method bridges the

traditional handcrafted feature methods and the shape distance methods. R. Hu et al [28]

17

propose a recognition technique for hand which is named as Coherent Distance Shape

Contexts. This method that is in light of two traditional shape representations specifically

Shape Contexts and Inner-separation Shape Contexts. Coherent Distance Shape Contexts

has great capacity to catch discriminative features from hand shape and manage the vague

correspondence issue of hand landmark points. It can extract features from the curve of

fingers. It is very robust to different poses of hand or elastic deformations of finger valleys.

To check the efficacy of Coherent Distance Shape Contexts, a hand picture database

containing 4000 grayscale left hand pictures of 200 subjects has been made, on which

Coherent Distance Shape Contexts has attained to the precise distinguishing proof rate of

99.60% for identification and the Equal Error Rate of 0.9% for confirmation that are

equivalent with best in class hand shape acknowledgment systems.J. Wang et al [29]

propose compact hand extraction to assist in computerized hand shape recognition. Initially,

an image enhancement technique based on singular value decomposition has been devised

to remove dark backgrounds by reserving the skin color pixels of image of hand. The

polynomial approximation YCbCr color model has been then used to extract the hand.

Lighting compensation has been applied after alignment to the adaptable singular value

decomposition. A hierarchical pyramid sampling algorithm has been finally used to reduce

the impact of variations in hand shape. A self-Eigen hand recognizer with genetic

algorithms (GA) has been constructed for selecting discriminant eigenvector subsets for

classification. The work maximizes the differences in hand images for various hand shapes

and also minimizes variations in lighting and pose for same hand shape. The method

applied to images from own database and a live sequence, performs more efficiently than

conventional ones that do not use compact hand extraction against complex scenes. The

classification system achieved an AAR of 99.55% and an FAR of 0.0001% for 768 images

included in inside testing. Live testing achieved classification accuracy rate of 91.7%, with

an error rate of 8.3%. Using an AMD64 Athlon CPU 2.0 GHz personal computer for images

size of 160×120 pixels, the speed up achieved is less than 1 s per hand shape.

Image alignment is an important step in palmprint recognition. W. Li et al [30] proposed an

automatic invariant feature based palmprint alignment method that deals with various image

distortions such as image rotation and shift. Two invariant features namely outer boundary

direction and end point of heart line have been introduced to align palmprints. Correct

identification rate can be improved up to 13% using this method. The local coordinate

system has been established using a few key points among fingers or in palm boundary. The

present alignment methods use it for detecting ROI and extracting it for matching and

18

feature extraction. These alignment techniques give way a coarse alignment of the

palmprint images. These erroneous image alignments cause to a lot of missed and false

matches. For improving the accuracy of palmprint verification W. Li et al [31] presented a

palmprint alignment refinement method consists of application of iterative closest point

method to estimate the translation and rotation parameters after extracting the principal lines

from the palmprint image. Refinement in the alignment of palmprint feature maps has been

carried out with the help of the estimated parameters. Experimental results on the HK-

PolyU database showed improvement in the recognition accuracy and computational

complexity hence can be implemented in real time for verification as well as identification

of middle size database.

G. Amayeh et al [32] propose hand-based identification and verification using a component-

based approach which improves robustness and accuracy and also it avoids use of pegs.

This approach decomposes the hand silhouette in various regions. These regions correspond

to the back of the palm and fingers.The approach accounts for finger and hand motion. The

robustness and accuracy has been improved by fusing the information from various parts of

the hand.No guidance pegs or extraction of land mark points on hand is required when flat

lighting table is used for acquiring the hand images. Robust methodwhich uses iterative

morphological filtering system helps decomposing the silhouette of the hand in different

regions. By using an efficient method, high-order Zernike momentsbased region descriptors

helps in capturing the geometry of the back of the palm and the fingers. A database of 1010

images of101 subjects with 10 images and five enrollment templates per subject has

displayed a TAR = 99.98% when FAR = 0.1% and EER = 0.044 for verification and

99.98% accuracy for identification. System implementation on a 64-bits machine with 3.19

GHz processor and 2 GB of RAM, the Zernike moments computation for the fingers and the

palm using double precision architecture up to order 20/30 in Visual C++ Studio 2005 is

less than 0.01 s. The total preprocessing time required is less than 0.73 s for hand–arm

segmentation and finger–palm segmentation using MATLAB 7.4.0.Examinations with

option methodologies utilizing the entire hand or individual parts of the hand, outline the

prevalence of the proposed methodology both as far as accuracy and speed. Also, the

system performance found to be comparable or better when qualitatively compared with

schemes accounted in the literature. The approach using the whole hand or different parts of

the hand demonstrate the advantage of the proposed scheme. The approach has comparable

or better accuracy in terms of qualitative and quantitative comparisons with state-of-the-art

approaches. For developing non-invasive and hygienic biometric technology, G. Michael et

19

al [33] propose an innovative touch-less palm print recognition system. Users are concerned

about touching the biometric scanners for many reasons. A low-resolution web camera is

used to capture the hand of user at a distance for recognition and hence users need not have

to touch any device for their palm print to be acquired. To track and capture the palm of

user in real-time video stream, a novel hand tracking and palm print region of interest

extraction techniques are used based on application of local binary pattern texture descriptor

on the palm print directional gradient responses. Improved performance has been achieved

when a modified probabilistic neural network is used for feature matching and verification

done in less than one second in the proposed system. Proposed system meets real-time

recognition challenges like hand movement, lighting change and variation in hand position

and orientation.

Effective biometric authentication based on palmprint uses minutiae features and features

like line features,delta features, geometry features,datum points. Line features are extracted

based on edge detection methods. J. Malik et al [34] pre-process the hand image to get the

preferred Region of interest. Sobel palmprint feature vector stores extracted features and

matching has been performed using Hamming distance method. The system accuracy has

been improved by Min Max threshold technique that matches a person with many threshold

values. Initially, reference threshold has been used for global authentication of person and

then for a person maximum and minimum thresholds are defined at local level. Min Max

threshold range is an effective method that increases accuracy of palmprint authentication

system. In this method the False Acceptance Rate is considerably reduced. The existing

schemes employ a fixed method for extracting features and similarity measurement but J.

You et al [35] extracted several features and implemented different matching measures at

different stages to attain high performance by a coarse-to-fine guided search. The approach

uses four-level features defined as global geometry-based key point distance (Level-1

feature), global texture energy (Level-2 feature), fuzzy interest line (Level-3 feature), and

local directional texture energy (Level-4 feature). The hierarchical multi-feature coding

method makes easy coarse-to-fine matching for proficient and efficient palmprint

authentication and recognition for a huge database. The technique has been tried with the

database of 7752 palmprint pictures from 386 unique palms. The utilization of initial three

level highlights can expel applicants from the database by 9.6%, 7.8%, and 60.6%,

separately.It has been viewed that mixture of four levels of features has a vast change

between diverse classes while keeping up a high minimization inside the class. The coarse-

level characterization by Level-1, Level-2, and Level-3 highlights is compelling and vital to

20

decrease the quantity of tests fundamentally for further preparing at the fine level. The

Level-4 nearby surface prompts a quick look for the best match.L.Zhang et al [36] presented

a palmprint identification scheme that characterizes a palmprint using a set of statistical

signatures. The palmprint is initially transformed into wavelet domain and the directional

context of each wavelet sub band has been computed in order to collect the predominant

coefficients of its principal lines and wrinkles. A set of statistical signatures including

density, spatial dispersivity, gravity center and energy characterizes the palmprint with the

selected directional context values. These signatures have been used for classification and

identification. The experiments have been performed with two hundreds palmprint images

from fifty persons. The selected fifty individuals have been classified into eight categories.

The correct recognition rate observed to be 98%. The results are affected due to similarity

of signatures of few palmprints and observed as the limitation of the work. P. Shang et al

[37] proposed a palmprint recognition method based on multi-fractal spectrum using

statistical moment. The identification process initiates by capturing the palmprint image,

extracting and normalizing the sub-images followed by defining a coordinate system and

calculating partition function and estimating multi fractal spectrum. Three distinguishing

palmprint features have been used that include the width spread, maximum of multi-fractal

spectrum and a parameter that describes the asymmetry of the spectrum curve. Finally the

feature matching and palmprint identification has been carried out. Compared with the line

segments matching or interesting points matching based palmprint verification schemes, the

scheme uses a much smaller amount of data signatures. H.Li et al [38] proposed a scheme

for generating cancelable palmprint templates using a chaotic high speed stream cipher

based on coupled nonlinear dynamic filters that have flows inverse to each other followed

by generation of renewable and privacy preserving palmprint templates using the coupled

nonlinear dynamic filter chaotic stream cipher with multiple orientation palmprint features

obtained from a bank of Gabor filters and encoded in a phase coding scheme. Cancelable

templates have greater ability to discriminate palmprints from different hands by increasing

the inter-class deviation of dissimilar palms maintaining the intra-class distance among

palmprints of the same hands as compared with the standard palmprint templates. Finally

the matching is performed directly on the cancelable/encryption domain in parallel to

accelerate matching and to protect user‟s privacy. To obtain the final matching score

various fusion rules have been investigated for different directional palm codes. The Sum

rule accelerates the speed and improves the performance as compared with Max, Min,

Median and Product fusion rules. Experimental results on PolyU palmprint database verify

21

the high performance and security levels with a very strong ability to reissue palmprint

templates. The approach has a high ability to reissue templates and achieves a better

separation of the genuine and the impostor populations with a zero equal error rate.J.You et

al [39] described a method to authenticate individuals based on palmprint identification and

verification using texture feature and interesting points. The proposed model is texture

based active selection system that make easy the fast hunt for best matching of the model in

the database in a hierarchical style. Texture energy measurements have a big discrepancy

among different classes whereas it retains high firmness inside the class. Dynamic selection

of a little set of like candidates from the database at coarse level directed by the global

texture energy distinguished with high convergence of inner palm resemblance. Also the

good quality dispersion of inter palm discrimination has been used for further processing.

For final confirmation an interesting point based image matching has been performed on the

selected similar patterns at fine level that has reduced the number of samples. Hausdorff

distance as the matching criterion can handle the partial occluded palmprint patterns. The

experimental results demonstrated the accuracy, robustness, efficiency, and effectiveness of

the algorithm.W.Kong et al [40] utilized 2D Gabor filter for extracting textural features for

palmprint authentication. Filter 11 found to be the best of 12 filters with regard to accuracy.

Matching process using hamming distance found to be translation and rotation invariant.

Experimental results demonstrate the effectiveness of this method.Orientation feature has

been demonstrated to be one of the most effective features for low resolution palmprint

recognition. W. Zuo et al [41] investigate the accurate orientation extraction and appropriate

distance measure problems for effective palmprint recognition using steerable filter.

Initially high order steerable filter have been used to extract accurate continuous orientation

and quantify it into discrete representation. For effective matching of accurate orientations,

a generalized orientation distance measure has been proposed. The distance measure for

matching of discrete orientations has been further extended and several existing distance

measures can be viewed as its special cases. The proposed method obtains state-of-the-art

verification accuracy on both Hong Kong PolyU and CASIA palmprint databases. The

proposed method enables small template size and satisfactory matching speed for practical

applications with support of a look up table. W. Jia et al [42] proposed robust line

orientation code for palmprint verification. Modified finite Radon transform has been used

for extracting the orientation feature of palmprint that helps in solving the problem of sub

sampling improvably. The problem of large rotations caused by imperfect preprocessing has

been solved by constructing enlarged training set. Matching algorithm that supports pixel to

22

area comparison and haveimproved fault liberalcapability has been used. Investigational

results of verification on PolyU palmprint database demonstrate faster processing speed

andhigher recognition rate. Genuine acceptance rate found to be 98.37% while the false

acceptance rate is 4 × 10−5

% and its equal error rate 0.16%.

Coding based schemes are mainly promising palmprint recognition techniquesbecause they

have small size features, verification accuracy is high and matching speed is fast.F. Yue et

al [43] proposed a modified fuzzy C-means cluster algorithm to decide the orientation of

each Gabor filter based on the statistical orientation distribution and the orientation

separation. The method achieves higher verification accuracy as compared to the original

competitive coding scheme. Though improved competitive code with six Gabor filters

achieved higher verification accuracy than that with four filters; further increase in the

number of filters cannot significantly improve the verification accuracy. Considering

computational complexity and verification accuracy the competitive code with six

orientations would be the optimal choice for palmprint recognition. H. Imtiaz et al [44]

propose a feature extraction algorithm for palm-print recognition based on two dimensional

discrete wavelet transform that efficiently exploits the local spatial variations in a palm-

print image. A palm-print recognition system developed extracts histogram-based dominant

wavelet features from each of several spatial modules obtained after segmentation of the

palm-image into segmented modules. Feature dimension has been reduced by selection of

dominant features for the purpose of recognition; also capturing precisely the detail

variations within the palm-print image. The modularization of the palm-print image

enhances the discriminating capabilities of the proposed features and hence results in high

within-class compactness and between-class separability of the extracted features.

Daubechieswavelets (db1–db10) have been utilized for the purpose of feature extraction to

see the effect upon the recognition performance. Principal component analysis further

reduces the feature dimension. Extensive simulations on different standard palm-print

databases provide excellent recognition performance both in terms of recognition accuracy

and several ROC curves.Z. Guo et al [45] propose a algorithm for feature extraction, for a

local region,binary orientation co-occurrence vector represents the multiple orientations.

The binary orientation co-occurrence vector defines the local orientation features. It is

robust to image rotation. The equal error rate reduces from 0.0379% to 0.0189% by the

proposed binary orientation co-occurrence vector if the same Gabor filters are used as that

of in CompCode. Binary orientation co-occurrence vector can be stretched to other binary

feature extraction algorithms, likeRLOC, POC and orthogonal line ordinal feature. Binary

23

orientation co-occurrence vector outperforms the RLOC, CompCode and POC by reducing

the equal error rate significantly.

The identification accuracy of palmprint identification system is improved by storing

multiple templates for each subject. When a test palmprint image is applied to the system,

these templates are searched for a match to its nearest neighbor. For moderate or large scale

identification system to speed up the identification process F. Yue et al [46] proposed uses

of intrinsic characteristics of the templates of each subject to build a tree. This tree structure

then assists in fast nearest neighbor searching. The speed up in identification process is

further achieved by constructing a tree structure with virtual template and real templates of

each subject. The effectiveness of proposed strategies is demonstrated by adopting two

representative coding-based methods namely ordinal code andcompetitive code. The results

using the PolyU palmprint database (version 2) and a large scale palmprint database exhibit

faster nearest neighbors searching than brute force searching and with more templates per

subject in the database, the speedup becomes larger. This system is proves effective for

moderate scale embedded system and large scale PC based identification systems.

X. Pan et al [47] propose an improved 2D locality preserving projections forextracting

features straight from image matrices based on locality preserving criterion. The

improvements mostly concentrate on aspects. The nearest neighbor graph is constructed

taking each node corresponding to a column in the matrix, instead of the whole image,

forproperly modeling the intrinsic manifold structure. The two-dimensional principal

component analysis is applied in the row direction before2D locality preserving projections

in the column direction, for reducingthe final feature dimensions andthe calculation

complexity. Better recognition performance has been achieved in terms of both speed and

accuracy. The robustness of Gabor filter for variations advances the better-quality2D

locality preserving projections based on the Gabor features to further enhance the

recognition rate. The improved 2D locality preserving projections achieves 1.958%

improvement over two-dimensional locality preserving projections for the average

recognition rate when tested on a huge database DBII comprisingof 1730 images from 346

different palms, adopting a k-fold cross-validation for recognition. W. Zuo et al [48]

investigate the rationale of the post-processing approach using a Gaussian function and

demonstrate the mutual relationship between the post-processing approach and the image

Euclidean distance method. The post-processing approach has been extended to palmprint

recognition. The FERET face and PolyU palmprint databases have been used to evaluate the

post-processed linear discriminant analysis method. Recognition rate for linear discriminant

24

analysis based face and palmprint recognition has been improved using the post-processing

approach. Using three samples of each subject for training, the recognition rate of post-

processed enhanced Fisher model is 2.80% higher than that of enhanced Fisher model on

the FERET subset and 2.51% higher on the Hongkong PolyU palmprint database (version

2). J. Chen et al [49] propose a texture based approach for palmprint feature extraction

along with template representation and matching. The approach is effective, simple, flexible

and reliable because of symbolic aggregate approximation, a time series technology and 2D

data. On the PolyU database containing 7752 palmprints, this method achieves an equal

error rate of 0.3% for a one to one verification experiment and a rank one identification

accuracy of 99.90%. On CASIA database, an equal error rate of 0.9% can be achieved. The

approach has very low computational complexity to efficiently implement on slow mobile

embedded platforms. Local image features of palmprint, iris and finger-knuckle-print can be

appropriately extracted by using Riesz transforms in a unified outline. L. Zhang et al [50]

propose utilization of Riesz transforms for encoding the local patterns of biometric images.

The proposed schemes RCode1 and RCode2 uses Riesz transform. Both the methods uses 3

bits for representing each code and employs normalized Hamming distance for matching

purpose. RCode1 and RCode2 are evaluated. RCode2 attainsfairly similar authentication

accuracies with the state-of-the-art Comp Code technique and requires much less time at the

feature extraction step that condenses them improved candidates when time is considerable

factor.

S.Chakraborty et al [51] propose a method for palmprint based biometric authentication

utilizing the textural information existing on the palmprint by using the dual tree complex

wavelet transform. A histogram of the two dimensional image has been determined after

constructing the region of interest for the scanned color images of the palm. Thus enabling

utilization of a feature extraction module implemented using the one-dimensional dual tree

complex wavelet transform on the histogram signal. The dual tree complex wavelet

transform provides nearly shift invariant performance, reduced aliasing and directional

wavelets in higher dimensions. For authentication purposes utilizing extracted features back

propagation neural-network based binary classifiers are developed. Several real life scanned

color images of palms of individuals have been used for developing the system. The overall

mean accuracy of system is 98.35%. The utility of proposed system was further

demonstrated by employing it for CASIA database where also the system could achieve

mostly high average recognition accuracy of the order of 96-98%.

25

L.Shang et al [52] propose a technique for palmprint recognition based on neural network.

This radial basis probabilistic neural network has been trained by orthogonal least squre

algorithm. Its structure has been optimized with the recursive least square algorithm. The

approach has been tested by exploiting a fast fixed point algorithm pre-processed PolyU

database for independent component analysis. The experimental results show that the radial

basis probabilistic neural network gets higher recognition rate and improved classification

efficiency than the-state-of-art classifiers. J.Kong et al [53] propose an approach for

handprint identification. Initially, region of interest is segmented through key points of hand

localization, and then the Gabor filtering and Zernike moment are used to extract the

palmprint features. The degree of similarity in the identification stage has been measured by

a two stage neural network structure. The proposed system makes the combination of SOM

and BP neural network for effective two stage personal identification. The system AR can

reach above 97.6%. The recognition performance of palmprint images degrade due to

variations occurring on the images. To handle the variations of rotation, translation and

illumination, raised by the capturing device and the palm structure, X.Pan et al [54] propose

an approach to extract local invariant features using Gabor function. The local invariant

features have been obtained by dividing a Gabor filtered image into two-layered partitions.

Further the differences of variance between each lower-layer sub-block and its resided

upper-layer block called local relative variance have been calculated. The global

disturbance occurred on palmprint images is counteracted as the extracted features only

reflect relations between local sub-blocks and its resided upper-layer block. The method has

been highly efficient for the local invariant features that are simple statistical quantities

without sophisticated calculation.Palmprint verification methods like palmprint orientation

code, robust line orientation code and competitive code are based on orientation coding with

fast matching speeds. Two distance measure types, SUM_XOR (angular distance) and

OR_XOR (Hamming distance) are used for orientation code. Z.Guo et al [55] propose a

unified distance measure having both SUM_XOR and OR_XOR as special cases and also

providedcertain principles for determination of the parameters for the unified distance.

Utilizing these methods of extracting features and coding techniques, the unified distance

measure has lower equal error rates than the original distance measures.

M. Mu et al [56] presentsoutline for extracting features for palmprint identification which

gives description of image that is shift a bleand invariant to gray scalethat to having high

identification accuracy at a low computational cost. The decomposition of the image has

been performed using the shift able complex directional filter bank which gives arbitrarily

26

directional resolution, two-dimensional decomposition of energy scalable and shift able

multi resolution, low redundant ratio andefficient implementation. The sub band

coefficients of complex directional filter bank decomposition have been operated by gray

scale invariant uniform local binary pattern and which covers information about the

distribution of the local micro-patterns. This results into local binary pattern mapping

having divided into many sub-blocks which are used for independent achievement of

statistical histogram. Fisher linear discriminant classifier has been learned in the statistical

histogram feature space for palmprint identification. PolyU palmprint database of 7752

images has been used for experiments. Several other multi-resolution and multi-directional

transform like dual-tree complex wavelet, Gabor filter and Contourlet transforms have also

been investigated. Complex directional filter bank produces the fine performance which

balances the identification accuracy with storage necessity and computational complexity

for extracting feature outline.W.Xuan et al [57] describe a texture based algorithm for

palmprint recognition combining 2D Gabor wavelets and pulse coupled neural network to

alleviate the limitation that the recent texture based algorithms of palmprint recognition

have unsatisfactory robustness to the variations of position, orientation and illumination in

capturing palmprint images. Initially the palmprint images have been decomposed by 2D

Gabor wavelets and then pulse coupled neural network is applied to imitate the creatural

vision perceptive process and decompose each Gabor sub-band into a series of binary

images. The features of these binary images are their entropies. Classification is performed

based on support vector machine based classifier. The proposed approach yields better

performance results in terms of correct classification percentages and high robustness to the

variations ofillumination, orientation and position in comparison with other texture based

approaches. X. Wang et al [58] describe on-line fast palmprint identification system. An

adaptive lifting wavelet scheme to decompose a palmprint image into several sub bands has

been constructed and then the pulse-coupled neural network used to decompose each sub

band into a series of binary images to reduce the computational cost of extracting palmprint

features from a palmprint image and make it easy to implement with hardware. Entropies

calculated from these images forms the features. Classification step involves support vector

machine-based classifier. The proposed approach yields a better performance in terms of the

correct classification percentages compared with the recent on-line palmprint recognition

algorithms. Low computational cost and ease of hardware implementation have also been

observed. L. Nanni et al [59] presents a method for personal authentication which uses palm

image. Three ensembles of matchers are designed that employ different feature

27

representation schemes of the images like discrete cosine coefficients, invariant local binary

patterns and Gabor filters. To train the matchers, each ensemble is obtained by varying the

features. The three methods provide complementary information that has been exploited by

fusion rules. Palm based system is combined with other biometric characteristics that can be

extracted from the hand like middle finger, ring finger and hand geometry; thus obtaining a

further improvement in the performance. M. Fahmy [60] presents an application of Mel

frequency Cepstral coefficients for identification of palmprint. Initially for feature

extraction palmprint image has been transformed into one dimensional signal followed by

extraction of Mel frequency Cepstral coefficients from this signal. To help in the

recognition process, discrete wavelet transform of the one dimensional palmprint signals are

used. The Mel frequency Cepstral coefficients features of this discrete wavelet transform

have been added to Mel frequency Cepstral coefficients feature vector generated from the

original palmprint signal, to form a large feature vector that has been used for palmprint

identification. Feed forward back propagation error neural network has been used for

feature matching. The method is robust in the presence of noise. N.Alex et al [61] propose

use of multiple databases for high speed authentication using the acquired palmprint image

of the hand. Hand could be held in any pose providing hand independence for biometric

authentication. Appearance analysis has been used for feature extraction. It has been a

robust technique for detecting the extremities using a neighborhood scan method.H. Li et al

[62] outline cancelable palmprint binary orientation co-occurrence vector based on

anisotropic filter using feed forward feedback nonlinear dynamic filter and then fused the

independent matching scores at the score level to efficiently protect the security of template

and enhance the privacy of user. The system provides large re-issuance ability and fast

implementation for real robust applications. Experimental results on PolyU palmprint

database confirm EER to be 0.07%.A multi-scale method to represent curves sparsely is

Curvelet transform. Palmprint images are made up of several main curves. W. Xinchun et al

[63] utilize the curvelet transform to extract the feature information of palmprint images on

different scales, deal with the information by dimension reduction of principal component

analysis and then provide the information for RBF network for study and decision making.

The palmprint recognition has been performed as per requirements of customers by

choosing decision rules to get the fusion of the results. The method makes use of the

features information of images to obtain higher recognition rate than other methods.R.

Kumar et al [64] describe an automated approach to palm-print recognition. The system is

resistant to motion variance of the palm. A low pass Gaussian filter has been applied to

28

remove the noise from the input image. Region of interest is extracted using the centre of

mass of palm-print image. Scale invariant feature transformation has been used further for

extracting and storing stable texture features from the region of interest. Biometric based

identification and security has been provided by comparing features extracted from the

region of interest with those from region of interest of other palmprint images.G.Badrinath

et al [65] proposed a technique that uses the instantaneous-phase difference got from

Stockwell transform of overlapping circular-strips for extracting palmprint features. The

Stockwell transform generates instantaneous-phase of user image in terms of time and

therefore it gives enhanced discriminant information regarding the user. It greatly increases

probability of identifying the user with. A low cost scanner has been used to obtain hand

images. Depending on their inherent characteristics, these hand images have been classified

as right or left hand then accordingly hand image is extracted from the palm-print. For

testing the system, IITK database consisting 549 images, CASIA database with 5239

images and PolyU databse with 7751 images were used. The performed in terms of

recognition rate found to be 100% correct. The equal error rate for all databases resulted

was less than 1% for all the databases.K.Wang et al [66] propose a Point-Line Duality

method for image registration in which a line in the image (x–y) space corresponds to a

point in the dual (h–q) space. Initially edge points have been detected and then linked and

segmented into chains, in a template image and a target image. Chains fitted to lines and

lines have been mapped to dual points in the dual space. A point merging algorithm deals

with the fragmentary line segments that should belong to a single line to improve stability

and efficiency. Line matching problem is converted to a point pattern matching problem.

Determination of registration parameters and matched line pairs is performed by a point

pattern matching algorithm. The technique has been effective for images under occlusion,

rigid body transformation and illumination change.X.Jing et al [67] presented an approach

that uses a two dimensional separability judgment to select the DCT frequency bands and

linear discrimination technique for face and palmprint recognition. The linear discriminative

features from the selected bands have been extracted by an improved Fisher face method

and the classification has been performed by the nearest neighbor classifier. The detailed

analysis showed the theoretical advantages of the approach over other frequency domain

transform techniques and state-of-the-art linear discrimination methods. For

experimentation purpose two face databases and a palmprint database have been used. The

approach significantly improves image recognition compared with the conventional

29

discrimination methods. The approach reduces the dimension of feature space and

computing time.

Presently most of the palmprint recognition systems have active source as a key component

in the system to acquire images. To capture palmprint image, many data collection devices

have been used. The cameras with active light sources are popularly used to get good image

quality and high speed data capturing.Z.Guo et al [68] analyze the performance ofpalmprint

recognition under seven dissimilar illuminations together with the white light and based on

the experimental results on a huge database of multispectral palmprints conclude that

magenta or yellow light achieve higher accuracy in palmprint recognition as compared to

white light. D.Zhang et al [69] presented an online multispectral palmprint system.

Multispectral palmprint database has been established by capturing the palmprint images

under Red, Green,Blue, and near-infrared (NIR) illuminations by means of a data

acquisition device for investigating the performance recognition of each spectral band. It

has been observed that Red channel attains the best result while the comparable

performance by Blue and Green channels but are slightly inferior when compared with NIR

channel. To integrate the multispectral information palm line orientation code as extracted

features from different bands have been used with score level fusionsystem originated from

the set theory that reduces the overlapping effect between bands. The EER can be

significantly reduced as different bands highlights different texture information.

Considering higher verification accuracy and anti-spoofing capability the verification

results confirmedthat the multispectral fusion are superior to each single spectrum. The

fusion of Red and Blue hasachieved the best result. L.Zhang et al [70] initially analyzed the

fragile bits phenomenon and extend BOCV to E-BOCV by incorporating fragile bits

information in appropriate ways. They proposed to mask out the fragile bits when

computing the Hamming distance. Also they have proposed a metric FPD to measure the

dissimilarity of two fragile-bit masks. Extension of the original BOCV to E-BOCV has been

achieved by fusing the modified Hamming distance and the FPD. Experiments conducted

demonstrate that E-BOCV can achieve the highest verification accuracy.

W. Zuo et al [71] proposed a technique that deal with the issues of feature extraction and

classification simultaneously by using bidirectional principal component analysis

supplemented with an assembled matrix distance metric. Bidirectional principal component

analysis has been used for feature extraction by reducing the dimensionality in both column

and row directions. Assembled matrix distance metric has been used for classification to

calculate the distance between two feature matrices and then the nearest neighbor and

30

nearest feature line classifiers have been used for image recognition. Bidirectional principal

component analysis achieved an average error rate of 3.55 using the ORL database with five

training images of each person for the neural network classifier and 2.70 for the neuro-fuzzy

classifier. Bidirectional principal component analysis achieved an error rate of 1.67 and

neuro-fuzzy classifier achieved an error rate of 1.33 on the PolyU palm print database.

P.Yeomans et al [72] proposed a palmprint classification algorithm that uses a multiple

correlation filters per class. The output of correlation filter produces a sharp peak while

filtering sample is of their class else it gives noisy output. Training of the filters is carried

out with the different regions of palmprint where high degree of line content is found on the

palm for every class. A simple line energy measure and line detection technique has been

used for scoring the palm regions. For training the filters of each class only the top ranked

regions have been used.While using the multiple correlation filter as classifier and training

the filter at same location (with respect to fiducial points), the algorithm performed better.

Using 64×64 pixels size multiple filters the classifier gained an average EER of 1.12 on

huge data base consisting 385 classes. The identification accuracy was found to be 99.88%

(five misclassifications out of 3465). D.Huang et al [73] proposed heuristic structure

optimization method for radial basis probabilistic neural network. Initially a minimum

volume covering hyper-spheres algorithm has been used for selecting the initial hidden

layer centers of the neural network followed by the recursive orthogonal least square

algorithm in combination with the particle swarm optimization algorithm to optimize the

initial neural network structure. The algorithm can solve practical problems having multiple

extrema and can simplify and accelerate the optimization process by efficiently initializing

the neural network. Also, the algorithm can optimize completely not only the hidden centers

but also the controlling parameter simultaneously. Eight benchmark classification problems

and two real world application problemshave been used for evaluating performance of the

algorithms. Experimental results show that the neural network achieves higher statistical

recognition rate, better classification efficiency and faster training and test speedscompared

toradial basis function neural network and multilayer perceptron in both the tasks.

Discriminant analysis is effective in extracting discriminative features and reducing

dimensionality. X. Jing et al [74] propose an optimal subset-division based discrimination

approach to enhance the classification performance of discriminant analysis technique.

Optimal subset-division initially divides the sample set into several subsets by using an

improved stability criterion and K-means algorithm. The optimal discriminant vectors from

each subset have been separately calculated. Projection transformation by combining the

31

discriminant vectors derived from all subsets has been constructed. A nonlinear extension of

optimal subset-division based kernel discrimination approach has been provided. Kernel K-

means algorithm to divide the sample set in the kernel space and obtaining the nonlinear

projection transformation has been employed. These approaches are applied to face and

palmprint recognition and examined using the AR and FERET face databases and the

PolyU palmprint database. The approach outperforms several related linear and nonlinear

discriminant analysis methods. An approach which encodes the discriminant information

into the objective by protecting the projections called as discriminant locality preserving

projection, it also improves classification ability. Optimization of the objective function in

reproducing kernel Hilbert space enhance the nonlinear description ability of discriminant

locality preserving projection and called as kernel based discriminant locality preserving

projection. However, it suffers from the problems like: 1) larger computational burden; 2)

no explicit mapping functions that results in more computational burden when projecting a

new sample into the low dimensional subspace; and 3) it cannot obtain optimal discriminant

vectors that remarkably optimize the objective of discriminant locality preserving

projection. The weaknesses of kernel based discriminant locality preserving projection have

been overcome by X.Chen et al [75] with Hammerstein polynomial expansion. The method

directly implements the objective of discriminant locality preserving projection in high-

dimensional second-order Hammerstein polynomial space without matrix inverse that

extracts the optimal discriminant vectors without larger computational burden. Performance

of the technique has been evaluated through simulation on facial and palmprint feature

extraction and classification.J.Li et al [76] used two phase test samples representation

method for palmprint identification. Proper setting of the parameter (the number of the

nearest neighbors) is crucial for real world applications and found to be different for

different bands. For shorter band wavelength the number of the nearest neighbors becomes

smaller. Two phase test samples representation is a competent representation based

classification method and found to be computationally much more efficient than the original

sparse representation methods. For automatic classification of low resolution palmprints

X.Wua et al [77] proposed an algorithm that uses principal lines and number of

intersections. Initially principal lines in the palm image have been defined depending upon

their thickness and position. Set of directional line detectors have been used to extract the

potential beginnings of the principal lines followed by applying a recursive process for

extracting the principal lines in their totality. Six categories have been formed for

classifying the palmprints according to the number of intersections and the principal

32

lines.The proportions of these six categories for the generated database containing 13,800

samples found to be 0.36%, 1.23%, 2.83%, 11.81%, 78.12% and 5.65% respectively. The

algorithm has shown classification accuracy of 96.03%. G.Chen et al [78] propose methods

for palmprint classification and handwritten numeral recognition by using the contourlet

features. The contourlet transform is a 2D extension of wavelet transform by applying

multi-scale and directional filter banks. The dominant features in palmprint images and

handwritten numeral images have been effectively captured using the algorithm. For

classification AdaBoost is used. The contourlet features are very stable features for

invariant palmprint classification and handwritten numeral recognition. Better classification

rates are reported when compared with other existing classification methods.

Because of the susceptibility of the biometric systems to database, replay and brute-force

attacks, these attacks must be analyzed before massive deployment of biometric techniques

in security systems. A.Kong et al [79] proposed a projected multinomial distribution for

studying the probability of successfully using brute-force attacks to break into a palmprint

system. Competitive Code has been used as the features and angular distance as the

matching scheme forms a projected multinomial distribution to describe the relationship

between the probability of the false acceptance and the number of attacks. Simulation has

been conducted to validate the model and the results demonstrate accurate estimate of the

probability for the model. Computationally it is not practicable to break this model into the

palmprint system with the use of brute-force attacks as the system threshold is set to lower

than 0.39. A.Jain et al [80] proposed and developed a prototype a system which is needed in

forensic applications which matches latent-to-full palmprint. Minutiae features have been

extracted from latent palmprints captured at 500 dpi or higher resolution. It is challenging

problem to match the Latent palmprint the latent prints which are lifted at crime sights

cover a small area of the palm, have poor quality and have a complex background and also

content less number of minutiae and creases as compared to full prints. The algorithm deals

with reliable estimation of the local ridge direction and frequency that makes possibleto

extractminutiae features and the ridges from poor quality palmprints. A fixed length minutia

code that captures texture and neighboring minutiae information has been utilized to

provide distinctive information around each minutia. In order to match two palmprints an

alignment based minutiae matching algorithm has been used. Performance of the algorithm

has been tested on two sets of partial palmprints against a database which consists of full

palmprints. For live scanned 150 partial and 100 latent palmprints, the system achieved

recognition rates of 78.7 and 69 percent respectivelyagainst a background database of

33

10,200 full palmprints. Latent quality has a considerable effect on the matching accuracy.

The matching speed and matching accuracy can be significantly improved with additional

information like palm region, palm orientation and hand type. For the latents of same palm

a simple „OR‟ rank level fusion of these latents can be used for improving the matching

accuracy from 69 to 90 percent.

2.2Literature review of fingerprint as unimodal biometrics

The fingerprint foreground consists of oriented pattern with deviations in orientations.

Practically more robust segmentation methods are required due to existence of noise. For

segmenting the foreground in the fingerprint image firstly the global and local thresholding

methods have been used. B.Mehtre et al [81] used local histogram of ridge orientations for

secluding the area of fingerprint. For each block of 16 × 16 the histogram is computed and

at each pixel the ridge orientation is computed. An orientation pattern means foreground is

indicated as significant peak presence in the histogram means whereas background is

characterized by flat histogram. B.Mehtre et al [82] proposed a composed segmentation

method which uses the local histogram of the gray-scale variance of each block and

orientations. Low variance blocks are assigned to the background when no reliable

information acquired from the histograms. This algorithm is capable of handling the images

with uniform background i.e. background with white block. N.Ratha et al [83] assigned the

background or foreground to each 16 × 16 block with respect to the variation of gray-levels

in an orthogonal direction to the ridge orientation. The background has uniform variance

and direction independent. For orthogonal direction to the ridge the foreground has very

high variance and extremely low variance alongside the ridges.D.Maio et al [84] take apart

the region of interest. It is based on average magnitude of gradients in each block of image.

Presence of valleys and ridges makes the fingerprint area rich which results in high gradient

response in the fingerprint region and small for the background. L.Shen et al [85] proposed

a technique that convolves each image block with eight Gabor filters. They segmented the

fingerprint according to their quality using variance of the filter as “good,” “poor,”

“smudged,” or “dry.”A pixel-wise segmentation method has been proposed by A.Bazen et

al [86]. For each pixel they computed the mean of three features gradient intensity, intensity

variance, andcoherence.The pixel is associated with foreground or background by a linear

classifier. For each specific acquisition sensor the optimal parameters are learned by using a

supervised method.Elimination of the holes in foreground as well as background is the final

post-processing step morphological has been suggested by R.Gonzalez et al [87]. In a

34

manual fingerprint matching process, experts were using a set of features, which were

established 105 years ago by F.Galton [88]. Fingerprint is represented by locally oriented

ridge and valleys; the discontinuities in the ridges are called as minutiae. Eighteen different

kinds of minutiae have been reported in [89]. In automated systems commonly used

minutiae features are ridge ending and ridge bifurcation.

The difficulty of automatic minutiae extraction has been carefully studied but

nevertotallyresolved. The performance of minutiae based verification/identification system

heavily depends on the fingerprint image quality. The fingerprint quality degrades during

the image acquisition method. Quality of fingerprint image and the various image

processing articrafts introduces the false minutiae to reduce the performance of the

algorithm. Several approaches to minutiae extraction have been reported, most of them

transform the gray scale fingerprint image to the binary ridge pattern. Basically the minutiae

extraction process primarily involves segmentation, ridge detection, thinning, and minutiae

detection. A critical task in minutiae extraction is ridge extraction. A global thresholding

method is not able to correctly segment the ridges from the background. B.Moayer et al [90]

proposed an iterative application of Laplacian operator and a pair of dynamic threshold for

bineration. At each iteration the fingerprint image is convolved through a Laplacian

operator and the pixels whose intensity is external with respect to range bounded by the two

thresholds are set to 0 and 1. The thresholds are progressively moved towards a unique

value so that a secure convergence is obtained. A similar approach has been proposed by

Q.Xiao et al in [91] where after convolution, a local threshold has employed. A fuzzy based

approach to image enhancement and the use of an adaptive threshold, form the basis of

bineration proposed in [92, 93]. The image is at first partitioned in little regions, which

processed separately. Each region follows smoothing and fuzzy coding of the pixel

intensities, contrast enhancement, bineration, counting of 1 and 0, fuzzy decoding, and

parameter adjusting. The sequence is repeated until the number of 1 approximately equals

the number of 0. Coetzee et al [94] proposed a new binarization technique based on the use

of the edges in conjunction with the grayscale image. Edge extraction is performed using

Marr-Hildreth algorithm [95]. L.O‟Gorman et al [96] presented a technique for image

enhancement and binarizationwhere the image convolution with some filters oriented

according to the directional image has been done. The filters are computed parametrically

with respect to the ridgeline characteristics. Since the filtering relies on directional

information, which extracts the ridge information from the poor images too. Short time

Fourier transform (STFT) is a recognizedmethod in signal processing for studying non-

35

stationary signals. S.Chikkerur et al [97] extend application of STFT to 2-D fingerprint

images for enhancement. The algorithm concurrently estimates the fingerprint intrinsic

properties like the local ridge orientation,foreground region mask andlocal ridge frequency.

Also they have proposed a probabilistic approach that robustly estimates these parameters.

The experimentations show that the technique performs favorably over other filtering

approaches in literature. M.Sepasian et al [98] explored the performance of fingerprint

based unimodal biometric system where three step procedures like 'Clip Limit', standard

deviation and sliding neighborhood is used for the identification and enhancement. The

fingerprints are enhanced using contrast limited adaptive histogram with the use of these

three steps. In the first step the contrast of the small tiles where the fingerprints existsis

enhanced using clip limit. To remove the artifact i.e. artificially introduced boundaries

because of clip limit process, the neighboring tiles are combined to the enhanced tile using

bilinear interpolation technique. In the second step, image is divided into non overlapping

blocks and they are discriminated by calculating the standard deviation of each block.

Which in turn, remove the background of image and calculate the boundary of region of

interest. In the last step, Minutiae (endpoints and bifurcations) in each specific pixel are

clarified using slide neighborhood processing. This process is also known as

thinningprocess.

Mehtre [99] proposed an algorithm using the directional image. The directional image,

which represents the local ridge direction in a 16 × 16 neighborhood, is first computed and a

set of eight 7 × 7 convolution masks is applied to the gray-level input fingerprint images to

improve the quality of ridge structure. Then, the ridges are extracted by applying a locally

adaptive thresholding method and a thinning operation is applied to the ridges. Finally, the

minutiae are obtained based on the computation of connection number. A post processing

stage based on the heuristics is used to remove the spurious minutiae. A method for

extracting structural features from fingerprint image has been proposed by N. Ratha et al

[100]. They viewed the fingerprint image as a textured image; orientation field has been

computed and used to design the adaptive filters in the minutiae extraction process. The

ridges are accurately located and detected by using a waveform projection segmentation

approach. The local maxima search detects the ridge pixels. The ridge skeleton image is

acquired and morphological operators are used for smoothing to detect the minutiae. The

post processing involves the removal of false minutiae from the detected minutiae. The

algorithm proposed by Ratha is robust to noise.

36

B. Sherlock et al [101] proposed a technique for fingerprint enhancement and binarization,

which performs a frequency domain filtering through position dependent filters. The filters,

which are constituted by directional band pass, enhance the image according to the local

ridge orientation and also remove the noise associated to both low and high frequencies.

D.Hung et al [102] enhances fingerprint image by equalizing the ridge width. The input

image is assumed to be a binary image. The directional enhancement of ridges is done after

estimating the local dominant direction. The enhancement process consists of direction

oriented ridge shrinking followed by direction oriented ridge expanding. The skeleton of the

enhanced image is obtained by Baja‟s algorithm. The algorithm also describes methods for

detecting bridges and breaks as separate features. A.Jain et al [103] described the design and

development of enhanced version of minutiae extraction algorithm projected by N.Ratha et

al [100]. They propose a hierarchical approach for obtaining a smooth orientation field

approximation of the input fingerprint image, to improve the performance of extraction of

minutiae. In the local neighborhood block the consistency level of the orientation field has

been computed and if it is to be higher than certain threshold then the local orientations

about the region are re-estimated at lower resolution level.Because of this a fairly smooth

orientation field obtained. The performance of a good algorithm for extracting minutiae

depends on the performance of the ridge segmentation method. Before the ridge

segmentation the directional filtering could be employed to enhance the fingerprint image at

the cost of heavy computations. Also the post-processing is an essential part of the minutiae

based verification systems.A fingerprint is the observable impression that papillary

produces when the papillary peak contact in a surface. The fingerprint impression is the

most established and the most well known feature utilized for identification or

authentication of individuals. The finger impression has novel highlights called minutiae,

which are focuses where a bend track completes the process of (ending), cross or branches

off (Bifurcation).L.Mary et al [104] dealt with the matter of selecting an optimal algorithm

for matching fingerprint based on minutia points for designing a system that matches

required condition in accuracy andperformance. B.Saropourian [105] have worked on the

single dots existing on the finger-print liked ridge-ending and bifurcation that works very

fine on the binary images and also gray scanned photo.. The observation is about finger-

print recognition that uses state of the single steak in the finger-print image, because

patterns of the veins in the finger-print without notice of the finger-print about person, and

can be used for identified person. J.Leon-Garcia et al [106] proposed an automatic

fingerprint recognition schemewhich usesinvariant moments andfingerprint features. Two

37

algorithms namely Fast Fourier Transform and bank of Gabor filters are used for processing

enhancement image.An algorithm for extracting minutiae information is applied after the

enhancement process. This algorithm gives angle, coordinates and distance from the

minutiae. The invariant moments have been used for discriminationamong those

fingerprints that are confused. R.Kaur et al [107] notice the noise presence in fingerprint

images that directs to spurious minutiae. To surmount this problem, features are extracted

which efficiently decides the minutiae points in fingerprint. The technique can be used for

finding bifurcation and termination for matching the template. They also proposed an

algorithm smoothing for the features detection from fingerprints. The method finds the

ridges in the fingerprint image by using eight different masks. This process forms the binary

image of the ridges from grayscale fingerprint image. The experimental results illustrated

the algorithm accuracy in terms of false rejection rate false acceptance rate, and genuine

acceptance rate.C.Pornpanomchai et al [108] proposed the fingerprint recognition by

Euclidean distance method. The system uses a technique of image processing, which

consists of 3 major components, which are: 1) preprocessing component, the module that

reduces the noise of the original images and adjusts the sharpness of the lined pattern that is

the components of the fingerprint, 2) feature extraction component, the module that defines

the position of the core point used as a reference point and finds out the position of the

bifurcation points, and 3) fingerprint recognition component, the module to compare the

shape context of training and testing data sets. Based on the experimental results, the system

has acceptable accuracy with average access time of around 19.68 seconds per image.

K.Nandakumar et al [109] presented a fully automatic person identification system based on

fingerprint minutiae. They remove high curvature points got from the fingerprint impression

introduction field and utilization of them as aide information to adjust the format and

queryminutiae. The assistant information itself doesn‟t release any data about the details

layout, yet contain adequate data to adjust the format and question fingerprints

precisely.Further, application of a minutiae matcher during decoding leads to significant

improvement in the genuine accept rate. They have shown that improvedperformance can

be attained by the use of multiple fingerprint impressions throughverification and

enrollment.

Most of the biometric systems which uses fingerprint store the minutiae templates of an

individual in database. Traditionally it is assumed that the original fingerprint information

of user is not disclosed by minutiae templates. A.Ross et al [110] illustrated that three

information levels concerning the parent fingerprint can be extracted from the minutiae

38

template only, viz., 1) the information of orientation field, 2) the type orclass information,

and 3) the structure of friction ridge. Using the evidence of minutiae triplets, the orientation

estimation algorithm find out the direction of local ridges. The class of the fingerprint can

be predicted with the given minutiae distribution and the determined estimation orientation

field.The streamline based on the approximated orientation field generates the ridge

arrangement of parent fingerprint.The texture is imparted to resulting ridges by using line

integral convolution.It results in ridge map which looks like parent finger. Ability of

preserving the minutiae in restructured ridge map at specified locations is the salient feature

of this non iterative technique. J.Ravi et al [111] projected a fingerprint recognition

technique that uses minutia score matching.Block filter have been used for thinning the

fingerprint image, at the boundary it scans the image to preserve the image quality and the

minutiae extractedfrom the thinned image. Experimentations showed that the false matching

ratio is better compared to the existing algorithm. H.Wang et al [112] established theorems

for designing the robustness templates of fingerprint feature extraction cellular

neural/nonlinear networks, which are able to extract the endings and bifurcations as two

important features in a fingerprint image. The theorems provide the template parameter

dissimilarities to determine parameter periods for employing the corresponding functions.

Simulation result shows the effectiveness of the methodology. For building minutia matcher

and a minutiaextractor M. Kaur et al [113] combined many methods. The grouping of

multiple techniques comes from a extensive study of research papers. in additiona few novel

changes similar to segmentation by Morphological operations, false minutiae elimination

methods, enhanced thinning, special consideration of triple branch counting forminutia

marking, minutia unification using decomposition of a branch in three terminations, unified

x-y coordinate system matching subsequent to a two-step transformation use.

C. Srinivasa et al [114] used virtual minutiae for fingerprint recognition, here the virtual

minutiae is used for reconstruction of fingerprint orientation as well as to enhance the

system performance during the matching. The conventional minutiae matching arecombined

to reconstructed orientation field by decision fusion process. As orientation field is

asignificant global feature of fingerprints, the proposed techniquecan achieve better results

than that of conventional techniques. Fingerprint ridge particulars are usuallyexplained in a

hierarchical order by three different levels i.e. Level 1 (pattern), Level 2 (minutia points),

and Level 3 (pores and ridge contours). Though latent print auditors often take benefit of

Level 3 features to help in recognition, Automated Fingerprint Identification Systems

(AFIS) at present rely only on Level 1 and Level 2 features. In fact, the Federal Bureau of

39

Investigation‟s (FBI) standard of fingerprint resolution for AFIS is 500 pixels per inch (ppi),

which is insufficient for capturing Level 3 features, like pores. With the progress in

fingerprint sensing knowledge, many sensors are at the presentready with dual resolution

(500 ppi/1,000 ppi) scanning ability. But, with the increase in the scan resolution only does

not essentiallyoffer any performance improvement in fingerprint matching, exceptutilization

of an extended feature set. It results in need of a organized study to find out how much

performance gain can be achieved by the introduction of Level 3 features in AFIS is

extremelypreferred Anil Jain et al [115] proposed a hierarchical matching scheme which

uses extracted features from all the three levels from 1,000 ppi fingerprint scans. Gabor

filter and wavelet transform are used for automatic extraction of Level 3 features like ridge

counters and pores and Iterative Closet Point algorithm is used for matching.The

experimentation proves that Level 3 features hold important discriminatory information.The

matching system equal error rate (EER) relatively reduced by 20% if Level 3 features are---

-.There is a relative reduction of 20 percent in the (EER) of the matching system when

Level 3 features are utilized in grouping with Level 1 and 2 features. This noteworthy

performance gain is constantly observed across a variety of quality fingerprint imagesPartial

fingerprint recognition has a crucial step of alignment of high resolution partial

fingerprints.The inadequate feature resulted from fragmentation of small fingers makes the

methods unsuitable for fingerprint recognition. It is observed for previously developed

fingerprint alignment techniques which includes both the minutiae based and non minutiae

based also.

Q. Zhao et al [116] proposed a pore based new approach for alignment of high resolution

partial fingerprints. Pores are a category of fingerprint fine ridge features which are present

in a plenty of numberseven on minute fingerprint areas. A difference of Gaussian filtering

approach is used for extraction of pores.After extraction of the pores, characterization of the

pores is done using pore-valley descriptor which is based on their orientations and locations,

as well as valley structures around them and orientation fields.For locating pore

correspondence a coarse-to-fine core matching algorithm is developed which is based on

pore-valley descriptor.The alignment transformation between two partial fingerprints can be

estimated because of determination of corresponding pores. Two fingerprint matchers and

high resolution partial fingerprint dataset are established for comparing the method with

orientation field based and minutiae base methods.The PVD based method experiments

resulted in locating the corresponding feature points accurately and estimating the

alignment transformation properly.Hence for the high resolution partial fingerprint

40

recognition the accuracy significantly improved. M.Islam et al [117] made a comparative

study by implementing number of methods on graph based matching,global features

matching and evaluated the performances by false rejection rate and equal error rate and

found that the authentication matching performance varies on the use of different

enhancement methods along with the images quality gained by means of various

sensortypes. A. Aburas et al [118] motivated to present another way to tackle the problem

that is relies on the properties of Huffman coding algorithm. No additional verifications are

needed. All you need is the image itself and go ahead. The obtained results are very

promising in terms of simplicity, reliability, and cost (time and storage).The output of filter

or a transform can also be used for representing the fingerprint image.The filter output in

the form of some statistical measure like variance has been used for matching (as

feature).Gabor transform possesses the frequency localization and orientation, found to be

useful for extracting features from fingerprint.Using the orientation and frequency

selectiveness of Gabor transform, the authors in [119-122]used the Gabor transform and

reported the results.The strong directionality in fingerprint pattern is represented as

orientation field. The first orientation image was introduced by Graselli[123].

The local orientation of the fingerprint ridges is encoded as the element of matrix,this

matrix is called as orientation image. Each element of this the grey level watershed methods

can be used to locate the ridges on a particular fingerprint image. Using this an efficient

fingerprint technique is described by G.Rao et al[124]. The inked images or scanned

fingerprints are as metrics for describing identification technique performance.These

metrics are given fed to gray levelwater shed method. Five level decomposition is

performed to achieve the accuracy in matching the images. The better performance in

comparing the resulting fingerprintscan be achieved by using these parameters. A database

consisting 7 images when tested on this system is found to be faster and accurate for the

fingerprint matchingprocess study.A fingerprint verification method was proposed by

Helfroush et al [125]. This method is based on introduction of feature extraction from

spectrum and direction domains of fingerprints.Here the fingerprint spectrum is divided into

sector. Each sector contains equal number of pixels, the respective statistical parameters

standarddeviation and average is calculated.For any fingerprint this feature vector can be

used for calculating distance measure of different fingerprints. A particular value can be

assigned to the resemblance of Block Directional Filed (BDF) of the two fingerprints.To

verify the input fingerprint image, the fusion of BDF and the above mentioned distance is

used.The simplicity and no requirement of preprocessing makes the verification speed high.

41

Moreover unlike the other image based methods, reference point detection is not needed.

The experimentation results for verification accuracy are better when compared with the

other important methods in the literature.

B. Kumar et al [126] adopted an algorithm that uses Short Time Fourier Transform

(STFT)for fingerprint image enhancement. For analyzing non-stationary signals, STFT is a

well known time-frequency analysis technique. The existing fingerprint feature extracting

algorithms based on predominantly local landmarks (e.g., minutiae-based) or exclusively

global information. The fingerprint texture that relies on extracting one (or more) invariant

points of reference of the fingerprint texture based on an analysis of its orientation fieldhave

been used. A predetermined region of interest around the reference point is circular

tessellated into cells. Each cell is then examined for the information in one or more

different, orientation specific, spatial frequency channels. An ordered details of the features

thus extracted from each cell is used as the representation of the fingerprint. Thus, the

representation elements capture the local information and ordered enumeration of the

tessellation captures the invariant global relationship among the local patterns. The local

discriminatory information in the sector, decomposed by Gabor filter bank and compute the

average absolute deviation from the mean of gray value intensities is called the Finger

Code. Fingerprint coordinate is the way to the scheme and consequences for the efficiency

and precision of the entire system straightforwardly. Fingerprints are matched essentially in

light of their texture pattern, which can be described with the orientation field of

fingerprints. A fingerprint, having different orientation angle structure in different local area

of the fingerprint and if this texture pattern correlates amongst the adjacent local areas of

the fingerprint, can be observed as a Markov stochastic field. H.Guo [127] and D.Singh et al

[128] presented a fingerprint matching technique, based on embedded Hidden Markov

Model that is used for representation the orientation field of fingerprint. Matching

Embedded Hidden Markov Model parameters gives robust and accurate fingerprint match.

After the process of feature extraction from fingerprint these parameters are built, forming

the samples of observation vectors and training the embedded Hidden Markov Model

parameters. N.Ratha et al [129] proposed an accurate,efficient and distortion-tolerant

technique for fingerprint authentication which uses graph representation. For the reference

and query fingerprint the weighted and labeled minutiae graphs has been constructed. In the

first phase minimum set of matched node pairs have been obtained by matching their

neighborhood structures. The second phase included more pairs in the match by comparing

distances with respect to matched pairs obtained in first phase. An optional third phase,

42

extended the neighborhood around each feature, was entered if it cannot arrive at a decision

based on the analysis in first two phases. Simple and intuitive cost functions form basis of

the algorithm and the robustness of the algorithm has been substantiated by experimental

results on large databases. Various parallel implementations to speed up the algorithm have

been considered .S.Parthasaradhi et al [130] described a fingerprint scanner susceptible to

spoofing using artificial materials. For fingerprint scanners, a liveness detection using an

anti-spoofing method has been developed. The technique quantified a pattern in fingerprints

(specific temporal perspiration), acquired from live claimants. Enhanced perspiration

detection algorithm performs better than state-of-the-art work on fingerprint scanner

technologies. The results show an improvement in past reports by decreasing the time

needed to make the decision and demonstrating its applicability to a variety of fingerprint

sensor technologies. Diverse subject populations provide approximately 90% classification

rate for all scanners. The method is totally software based and no additional hardware is

required.

The recognition of a person needs a comparison of his fingerprint with the fingerprints

which are stored in a database. As in civilian and forensic applications this database may be

extremely large. For these situations the identification process takes more response time. It

can be speed up by minimizing the comparisons required to be performed.This can achieve

by dividing the fingerprint database into number of bins. These bins can be formed on

predefined classes. Hence the fingerprint to be recognized is then required to compare with

the fingerprints from one bin in database only which depends on its class.Thus, fingerprint

classification refers to the problem of assigning a fingerprint to a class in a consistent and

reliable manner. The geometric features like delta and core point of fingerprints are used for

classifying fingerprints. F.Galton [88] was the first who studied fingerprint in depth.Two

more classes are added by E Henry [131] to the classes proposed by Galton.Galton - Henry

classification techniques consists of tented arch ,right loop, left loop, classes arch, and

whorl.

For automatic fingerprint classification several methods are used such as statistical,

syntactic, rule based, structural, neural network and classifier approach. Here some of them

are presented. Using poin-care indexthe type and position of singular points is found. It is

used for a coarse classification [132]. The ridge line flow is traced to get finer classification.

To improve the classification accuracy,valid numbers of singularity points are detected by

iterative regularization[133]. Hong et al introduced more robust technique [134].They

togetherly used number of ridges found in the image and number of singularities are used in

43

a rule base approach.This distinct feature combination leads tobetter performance.In a

classification method,B Cho et al[135] used the loop point only. They used the orientation

of the fingerprint area near the loop and the curvature for fingerprint classification. A.Jain et

al [136] proposed ridge geometrical shape based classification. They defined fingerprint

kernel for each class. By finding the best fitting kernel for orientation filed of particular

fingerprint, the classification is done. The classification using structural approach is

proposed by D. Maio et al [137]. The partition of orientation image is done using

minimizing cost function. The minimizing cost function considers the element orientation

variance in each region.Then the classprototype is compared with relational graph using

inexact graph matching method.Template based matching for guiding the partitioning of the

orientation image proposed by R.Chappelli et al [138]. Since this approach only relies on

global structure information, it can deal withpartial fingerprints which contain no singularity

points sometimes. It also works on noisy images.Classification of fingerprint using hidden

markov model classifier is proposed by Senior [139]. A.Jain et al [140] proposed a k-nearest

neighbor statistical classifier. KL transform has been used for fingerprint classification by

R. Chappelli et al [141, 142].B.Vikram et al [143] proposed a technique of using the image

parameters like median, mean, standard deviation, root mean square and variance value to

train fuzzy inference system based adaptive network for classifying the test image. The

image classification is done as arch, tented arch, right loop, left loop, twin loop and whirl.

Using the matching algorithm this classification permits us to proceed with the images

which fall in theexactinggroup of ridge structure thus saving time.

D.Batra et al [144] used a Gabor filter-based Feature extraction scheme to generate a 384

dimensional feature vector for each fingerprint image. The classification of these patterns is

done through a two stage classifier in which K Nearest Neighbor (KNN) acts as the first

step and finds out the two most frequently represented classes amongst the K nearest

patterns, followed by the pertinent SVM classifier choosing the most apt class of the two.

Finally six SVMs have to be trained for a four class problem, that is, all one-against-one

SVMs. The maximum accuracy reported as 98.81% with a rejection percentage of 1.95%.

The SVM training time was 145 seconds, i.e. 24 seconds per SVM on a Pentium III

machine. B.Gour et al [145] proposed a system to group the fingerprints based on the ART1

neural network. The clustering quality of ART1 supported clustering method has been

compared with the Self Organizing Neural Network clustering algorithm. They have also

presented a multilevel classification method for a fingerprint generating class-code for

eachminutiaon in a fingerprint.

44

U.Rajanna et al [146] presented fingerprint classification by comparing four different

feature extraction techniques i.e. orientation maps (OMs), Gabor filters, minutiae maps and

orientation co linearity based feature extraction. They also studied the issue of rank-level

fusion method to improve classification performance. They concluded that the performance

of OMs is more in comparison to Gabor features because features extracted by Gabor filter

are sensitive to errors in localizing the registration point. Similarly, combinations involving

OMs improves during fusion of ranking improved its performance demonstrate the

importance of orientation information for classification purpose. Thus OMs achieved best

classification with orientation collinearity classifiers. V.Conti et al [147] presented a

technique in which pseudo-singularity-points were detected and extracted to make possible

fingerprint classification and matching.

For current fingerprint indexing schemes, global textures and minutiae structures are usually

utilized. To extend the existing methods of feature extraction, S.He et al [148] studied the

three most popular local descriptors for fingerprint indexing and give a comparison of

indexing performance for evaluation of these three features on public fingerprint databases.

For index construction, the locality sensitive hashing is used to efficiently retrieve similarity

queries in a small fraction of the database. Experiments show that all the features perform

equally well.Latent fingerprint recognition is of serious significance to law enforcement

groups in forensic applications. Though incredible development has been made in the field

of automatic fingerprint matching, latent fingerprint matching persists to be a hard problem

since the challenge concerned are fairly dissimilar to plain or rolled fingerprint matching.

The main complexities like small finger area, large non-linear distortion and poor value of

friction ridge impressions are a few of them latent fingerprint matching A.Jain et al [149]

proposed a scheme that matches latent images with rolled fingerprints considering the

precise characteristics of latent matching difficulty. With minutiae, extra features similar to

quality map and orientation field are also utilized in the scheme. Experimental outcomes

point that introducing the quality map and orientation field to minutiae-based matching

directs to good quality detection performance in spite of the inherently complicated nature

of the problem.

K. Saini et al [150] have made a fingerprint matching system to provide a security to a

virtual process. The fingerprint detection method may undergo attacks at different points

through the verification procedure. The mainly general attacks arise by using the fake

fingerprint at some stage in capturing the image. The broadcast channel connecting the

feature extractor and matching might also be interrupted and the fingerprint characteristic

45

may be stored for later use. The major difficulty relies on differentiating a live finger from

the synthetic material made finger. The types of attacks, fingerprint damage or stolen by

some another person, effect of illness are some of the topics discussed here. This approach

eliminates these kinds of attacks by means of a virtual system. Along with the virtual

system this paper also considers aspects related with security of fingerprint. Some aspects

related to secure fingerprint is also be considered in this paper.

Security of biometric information is gaining attention and digital watermarking methods are

used to protect the biometric information from either intentional or accidental

attacks.Amongst the different biometrics, fingerprints are more popular for authentication,

as they are unique for individual and are primarily used for the instant establishment of

instant personal identity. However, they are vulnerable to intentional or accidental attacks,

when transmitted over network. Thus, a protective scheme is required which will protect

fidelity and avoid alterations. D.Mathivadhani et al [151] considers two techniques that

protects of fingerprint biometric data using digital watermarking techniques. Both the

techniques discussed are based on Discrete Wavelet Transformation (DWT). From the

experimental results, it can be concluded that both techniques provide adequate security to

the fingerprint data without degrading visual quality. Further, the verification performance

after dewatermarking is also analyzed.

2.3Literature review ofmultimodal biometrics

Generally biometric system which uses single modality for the recognition purpose is called

as unimodal biometric system. The modalities in unimodal biometric system such as

fingerprint, face, palmprint, FKP, iris and voice are somewhatsusceptible to the problems

such as intra class variation, noisy data , non versatility, non-universality, spoof attacks, etc.

which results in high FRR and FAR. Therefore to conquer these limitations andprovide

higher security features a typical solution is to use the multimodal biometrics instead of

unimodal. Here more than one modalityused jointly to validate the individuality of a person.

But the high error rate in the presently available multimodal biometric systemsfound in

state-of-the-art literature does not found suitable for online recognition systems [152].

Multimodal biometric system involves utilization two or more modalities for the personnel

identification purpose like finger and iris [153], palm and finger [154], face and palm [155],

face and finger [156] etc..Previously many literatures have proposed Multimodal biometric

[157, 158]. It is found that except hand geometry (palmprint) and fingerprint, remaining all

modality has weakness in their characteristic. The fusion of these modalities is the vital

46

requirement for multimodal biometric systems.Sensor level, feature level, match level and

decision level are the different levels where the fusion of these modalities can be achieved.

L. Hong et al [159] present an approach to integrate face and fingerprint for personal

identification. Face recognition demonstrates to be fast but unreliable whereas fingerprint

detection is consistent but incompetent in database recovery. A model biometric method

that incorporates fingerprint, face and surmount the limitations of face identification

systems as well as fingerprint verification systems. The integrated prototype system

operated in the identification mode with an admissible response time. The system

establishes the identity which is reliable more than any face recognition. The performance

improvement at decision fusion is achieved by integration of multiple cues and different

confidence measures.The decision fusion scheme assumed that the similarity values

between faces are statistically independent of the similarity values between fingerprints.

Experimental results demonstrated the system performance with good response time and

accuracy.Y.Isobe et al [160] present a biometrics-based personal authentication system

using combination of a smart card, a Public Key Infrastructure (PKI) such as X.509

certificate and fingerprint verification technologies. The legal aspects of using the personal

authentication system described in the report have been considered for application to

construct a public key platform such as the digital signature method by means of X.509

platform.

S. Ribaric et al [161] develop multimodal biometric recognition system that uses the human

hand features using eigen palm features and eigen finger .In this method, the fusion was

used at matching-score level. The identification method has been separated into image

capturing, extracting and normalizing the palm, preprocessing, and strip-like finger sub

images; extracting the eigen finger and eigen palm features base on the K-L transform;

matching and also fusion; and a (k, l)-NN classifier and thresholding based decision.. The

method has been tested with database of 1820 hand images of 237 people. The results prove

the efficiency of the method in terms of the recognition rate (100 percent), the equal error

rate (EER = 0.58 percent), and the total error rate (TER = 0.72 percent). The unimodal

biometric systems based on single biometric information are all the time affected by

problems likesusceptibility to circumvention, no-universality andnoisy sensor data. F.Yang

et al [162] combined palm-print, finger print, and hand-geometry for person

individualityauthentication. Dissimilarto the other multimodal biometric methods, the user

does not need to experience the problem of using two separate sensors, as all the three

biometrics taken from the same image. Wavelet transform has been utilized for extracting

47

the features from palm-printand fingerprint. The hand-geometry features (like width, length)

arealso extracted following the pre-processing stage. Mach score fusion and Feature fusion

are jointly employed to set upindividuality. The system has been tested on a database of 98

persons. Multimodal biometric system has some disadvantages like expensive devices,

required more resources for computation and storage causing some inconvenience to the

user. G.Amayeh et al [163],illustrated a verification system based on hand which uses

segmentation and fusion of fingerand palmprint. The 2D images obtained by placing the

hand on a planar lighting table with no use of guidance pegs are used for this system.

Without the extracting any landmark point on the hand, the finger and palmprints are

segmented. At first a morphological operators based robust iterative technique is used for

segmenting the hand from forearm. Again the morphological operators are used for

segmenting the hand into six regions. These six regions correspond to the fingers and the

palm. High order Zernike moments calculated by using an efficient method represents the

geometry of each component of the hand. Verification is carried out by the fusion of the

information from various parts of the hand. A database of 101 subjects has been used for

evaluating the system. The system illustrated robustness and high accuracy. Comparing

with competitive approaches that uses whole hand demonstrated the dominance of the

component-based approach with reference to accuracy and robustness.A.Meraoumia et al

[164] integrate FP and FKP in order to construct an efficient multi-biometric recognition

system based on matching score level and image level fusion. To determine the

effectiveness of the method, the work uses minimum average correlation energy (MACE)

and Unconstrained MACE (UMACE) filters in conjunction with two correlation plane

performance measures, max peak value and peak-to-sidelobe ratio. The experimental results

show that the designed system achieved an excellent recognition rate on the Hong Kong

polytechnic University (PolyU) FKP and high resolution fingerprint database.

R. Telgad et al [165] develop multimodal biometric system by using face and fingerprint

multimodalities. The system takes the advantage of individual Biometric System. The

fusion of face and fingerprint modalities at score level fusion has been presented. The

system extracts the features used for matching. Euclidean distance matcher has been used

for face and finger print modalities. Fingerprint recognition has been done with the help of

minutiae matching and Gabor filter. Face feature has been extracted with the help of PCA

(Principle Component Analysis) for dimensionality reduction. The match scores are then

normalized and sum score level fusion used to develop the system. The recognition rate has

been increased and the error rate decreased with the help of this systemM.Ferrer et al [166]

48

present a multimodal biometric recognition method which combinesthe geometrical, finger

and palm print features of human hand. The right hand images captured using commercial

scanner having 150dpi resolutionsis used.Using Support Vector Machines as verifier,

geometrical feature are gained from binarized images having 15 measures, the geometrical

features are computed. Various 2D Gabor phase encoding methods are used to obtain the

palmprint and fingerprint textures. For assuring the image alignment, a robust coordinate

system is defined. For verifying the individuality the threshold and a Hamming distance is

used. The improvement proved by a score, decision and feature level fusion. A.Kumar et al

[167] present an approach for authenticating persons by the use of triangulation of hand

vein images and knuckle shape information extraction at the same time. The scheme is fully

automated and uses palm dorsal hand vein images obtained by contactless imaging which is

near infrared and the low-cost also. Considering the knuckle tips as key point, extracting the

region of interest and image normalization have been done. The matching scores have been

generated in two parallel stages. The first one is the hierarchical matching score from the

four topologies of triangulation in the binarized vein structured and the geometrical features

consisting of knuckle point perimeter distances in the acquired images. The weighted score

level grouping from these two matching scores have been used to validate the persons. The

results from the method using contactless palm dorsal-hand vein images are shows potential

with equal error rate of 1.14% and suggested more user friendly option for user recognition.

From the same image simultaneously the unique knuckle point perimeter distances are

extracted which are utilized for achieving the performance enhancement. The usefulness of

knuckle shape has been quoted in biometric literature with negligible attention for usage.

For the database of 100 users the experiments result illustrated 1.14 percent EER. The

demonstrated performance are to be taken in the context of touch less imaging as presence

of higher intra class variations is expected in these images as compared to the images

obtained from fixed imaging devices with hand docking.

L. Nanni et al [168] presented a trained technique to combine biometric matchers at the

score level. The technique is based on a combining machine learning classifiers trained by

the use of the match scores from various biometric advances as features. Finite Gaussian

mixture model parameters have been used to model the genuine and imposter score

densities through fusion method. Numerous tests on different biometric authentication

methods that relates to fingers, fingerprints, hand geometry, palms, and faces prove that the

technique outperforms other trained and non-trained approaches to combine biometric

matchers.It has likewise been tried on distinctive classifiers like support vector machines,

49

AdaBoost of neural networks, also on their random subspace versions, representing that the

technique has Random Subspace of AdaBoost. The densities expected using a mixture of

Gaussian models has been used for training a machine learning classifier. The likelihood

ratio based feature coupled with a Random Subspace of AdaBoost of neural networks

attains a low Equal Error Rate in numerous tests with no parameter alteration for each

dataset. A.Tharwat et al [169] propose two multimodal biometric authentication methods

using ear and FKP images based on image-level fusion along with a multi-level fusion

method at image and classification levels. The fusion of images of ear and FKP has been

performed before feature level and hence there is no information loss. The features have

been extracted from the fused images using different classifiers and then the outputs of

these classifiers in the abstract, rank, and score levels of fusion have been combined.

Experimental results show that the authentication method increase the recognition rate

compared to the state-of-the-art methods. Experiments show that score level report better

results than rank or abstract levels. The processing time of extracting the features from ear

image has been small compared with FKP image because the dimensions of ear image are

smaller than FKP image.Y.Chen et al [170] propose a scheme that uses linear regression

and expand a method called reconstructive discriminate analysis (RDA) for extracting

feature and reducing the dimensionality. RDA has been provoked from linear Regression

Classification (LRC). LRC suppose that each class lies on a linear subspace and locates the

nearest subspace for a particular sample. RDA has been intended for matching the samples

with their nearest subspaces that describes the intra-class rebuilding scatter also the inter-

class rebuilding scatter, looking for finding the projections that concurrently maximize the

inter-class reconstruction scatter and minimize the intra-class reconstruction scatter. RDA

can also be considered as another type of classical linear discriminant analysis (LDA) from

the reconstructive observation. The technique has been applied to FKP and face

identification on the ORL, extended YALE-B, FERET face databases and the PolyU FKP

database. The projections of RDA expose and divide the subspaces matching to different

classes in the condensed subspace. The investigational results on three face image databases

and one FKP database showed that RDA plus LRC has been extra efficient than other

grouping of dimensionality reduction methods and classification. Comparing with LDA,

RDA has natural connections to classifiers as RDA has been induced from LRC. LRC can

completely use the feature of the RDA subspace. RDA and LRC can be flawlessly included

into a pattern recognition system. RDA can extract more features than LDA. Just like LDA,

RDA also suffered from the small sample size problems. A.Meraoumia et al [171] propose

50

an efficient online personal identification system based on FKP using the Gaussian Mixture

Model (GMM) and two-dimensional Block Based Discrete Cosine Transform (2DBDCT).

A segmented FKP has been divided into non-overlapping and equal-sized blocks and then

the 2D-BDCT over each block has been applied. By using zigzag scanned order each

transform block has been reordered to produce the feature vector. The GMM for modeling

the feature vector of each FKP has been subsequently used. Log-likelihood scores have

been used for FKP matching. Experimental results show that the proposed method yield

best performance for identifying FKPs and able to provide excellent identification rate and

provide more security. M.Natarajan et al [172] proposed a security system that deals with

Multi-Modal biometric features namely FKP and fingerprint for recognition and

verification. For every transaction, a distinct random key has been generated from the user‟s

samples. Random Triangle Hashing method has been used for random key generation.

Shuffling process has been used for key management and reliable transaction. The system

keeps secret the content of information from unauthorized parties, detecting the alteration of

data, identifying data origin and preventing an entity from denying previous actions.

L. Lu et al [173] proposed a finger multi-biometric cryptosystem using feature-level fusion

to simultaneously protect multiple templates of finger vein, fingerprint, FKP and finger

shape traits as a single secure sketch. Analyses lead the feature-level fusion for finger multi-

biometric cryptosystem with respect to their impact on security and recognition accuracy.

Comparative experimental results ascertain that finger multi-biometric cryptosystem

outperforms the uni-biometric counterparts in terms of verification performance and

template security. Z.Shariatmadar et al [174] propose an efficient FKP recognition

algorithm based on multi-instance fusion that combines the left index/middle and right

index/middle fingers of an individual at the matching score level. Prior to fusion, a novel

normalization strategy has been applied on each score and a fused score generated for the

final decision by summing the normalized scores. Experimental results on PolyU FKP

database show that the method has an obvious performance improvement compared with

the single-instance method and different normalization strategies.

K.Faez et al [175] present a multimodal biometric identification system based on new

features extraction of palm and ear and describe a biometric approach to personal

identification using robust pattern recognition. Each element of the set has a complex

feature obtained by combining position and scale-tolerant edge detectors over neighboring

positions and multiple orientations. The system‟s architecture has been motivated by a

quantitative model of visual cortex, with fusion applied at the matching-score level. The

51

identification process is then divided into four phases: capturing the image, pre-processing,

extracting and normalizing the palm and ear; feature extraction; matching and fusion; and a

decision based on the kNN and SVM classifiers. The system has been tested on a database

of 600 people with 300 palm and 300 ear images. The experimental results show the

effectiveness of the system in terms of the recognition rate. A.Kumar et al [176] proposed a

bimodal biometric fusion system with fusion at feature level. They illustrated the fusion of a

palm texture of a digital camera capture single hand image at feature level. The

demonstrated the discrete cosine transform coefficient basec approach for palm print

recognition. These coefficients can be directly obtained from camera hardware. The results

illustrates that in practice even a small subset of hand shpae and palmprint features are

sufficient for constructing an accurate model for subject identification.A personal

recognition systems using biometrics can be constituted by selecting proper combination of

palmprint features and hand shape. A.Kumar et al [177] proposed a nonlinear rank-level

multi-biometric fusion approach for personal identification. The comparative experimental

results consists of rank-level combination for palmprint matchers using four different

approaches vizBorda count, weighted Borda count, highest and product of ranks, and

Bucklin majority voting along with a nonlinear approach for combining the ranks.

Experimental results carried out on NIST BSSR1 database show significant improvement in

the recognition accuracy with rank-level combinations as compared to individual palmprint.

Also the nonlinear approach simultaneously can improve the FPIR versus FNIR

performance.

Multispectral imaging has been employed with a fusion strategy to acquire more

discriminative information in order to improve the accuracy of palmprint recognition.

PolyU multispectral palmprint images contain four kinds of palmprint images captured

under blue, green, red and near infrared illuminations and contain much information than

the single band. Also there is redundant information and to extract the critical information

among the multispectral palmprint images and to fuse them is an emerging problem. J.Cui

et al [178] addressed the problem of selecting bands from the original four bands by using

the extended general color image discriminant model to generate three new color

components for further improvement of the recognition performance. They have integrated

the extended general color image discriminant algorithm for the color image representation

and recognition. The effectiveness of the models and fusion strategy has been shown

through experiments using the PolyU multispectral palmprints database. The extended

general color image discriminant algorithm can optimally select the spectral bands and is

52

able to obtain the best fusion result under the condition that the number of the used spectral

bands is fixed. The general color image discriminant algorithm generates three color

components which contain more information than original color component bands.

Texture and feature based palmprint recognition methods can well exploit the minutiae of

the palmprint but are not very robust to the possible variation such as the rotation and shift

of the palm. Representation based palmprint recognition method can well take advantage of

the holistic information but cannot fully exploit the minutiae of the palmprint. S.Zhang et al

[179] proposed fusion of the competitive coding method and two phase test sample sparse

representation method for palmprint recognition. Two phase test sample sparse

representation method takes the whole palmprint image as the input and determines the

contribution of the training samples of each class in representing the test sample. It also uses

the contribution to calculate the similarities between the test sample and every class.

Competitive coding method is a feature based method and is highly complementary with

two phase test sample sparse representation. To combine the matching scores generated

from two phase test sample sparse representation and the competitive coding method a

weighted fusion scheme has been used. Very high classification accuracy has been obtained

with the method by integrating the global and direction features. A.Kumar et al [180]

investigated comparative performance between Gabor line and appearance based palmprint

representations and using their score and decision level fusion. Product of sum rule achieves

better performance over the fixed combination rules of various representations since the

features from the same image may be correlated. Experimental results on the database of

100 users achieve 34.56% improvement in performance (equal error rate) as compared to

the case when features from single palmprint representation have been employed. Usage of

multiple palmprint representations on the peg free and non contact imaging setup achieves

promising results and demonstrates its usefulness. Best performance can be achieved from

the Gabor filter based representation as compared to the Line or PCA based representations.

Distance measure used to compute the matching distance has important effect on the

performance.A.Kong et al [181] proposed feature level fusion approach for improving the

efficiency of palmprint identification. Phase information on a palmprint image has been

extracted by employing multiple elliptical Gabor filters with different orientations and then

merged according to a fusion rule to form single feature called the Fusion Code.

Normalized hamming distance has been used to measure the similarity of two Fusion

Codes. Final decision has been made using dynamic threshold. Performance of the method

has been validated on database containing 9599 palmprint images from 488 different palms

53

and found genuine acceptance rate of 96.33% with execution time about 0.4s. Small sample

recognition problem often leads to unsatisfactory recognition performance in real world

applications. To solve this problem X.Jing et al [182] proposed fusion approach at the

lowest level i.e. the image pixel level by combining face feature (contactless biometric) and

palmprint feature (contacting biometric). Initially they combine the normalized Gabor

transformed face and palmprint images at the pixel level followed by classification to

classify the fused biometric images. Classifier adopted uses nonlinear discriminative feature

extraction approach, kernel discriminative common vectors approach and radial base

function network. Performance evaluation of the algorithm has been carried out with two

largest public face databases (AR and FERET) and a large palmprint database as the test

data. Experimental results demonstrate the effectiveness of the approach for small sample

biometric recognition problem.

T.Savic et al [183] developed a prototype multimodal biometric personal recognition system

based on features extracted from a set of 14 geometrical parameters of hand, palmprint,

digitprint and fingerprint. The features have been extracted from a single high resolution

gray scale image of the palmer surface of the hand using linear discriminant analysis.

Normalized correlation and Euclidean distance has been used for template matching.

Matching scores are normalized using the linear 3-segment normalization technique and

combined using the matcher weighting fusion rule, and finally the best fusion score is

compared with the experimentally determined decision threshold. Optimization of the

system performance for resolution of the images, similarity/dissimilarity measures, match

score normalization and the fusion rule has been determined experimentally. System

configuration showed average equal error rate of 0.0005% with optimum parameters.

R.Raghavendra et al [184] address the problem of designing efficient fusion schemes of

complementary biometric modalities such as face and palmprint that are effectively coded

using Log-Gabor transformation resulting in high dimensional feature spaces. Based on the

FRGC face database of 250 virtual people and PolyU palmprint database for comparison,

different fusion schemes at match score level and feature level have been proposed. A

particle swarm optimization procedure that allows a number of features (identifying a

dominant subspace of the large dimension feature space) to be significantly reduced has

been implemented in order to reduce the complexity of the fusion scheme while keeping the

same level of performance. Significant improvement in performance of 6% has been shown

in both closed identification and verification rates, when performing feature fusion in Log-

Gabor space over the more common optimized match score level fusion method. Due to the

54

implementation of a particle swarm optimization algorithm, a reduction in the number of

features by a factor of roughly 45% has been observed while keeping the same level of

performance. J.Aguilar et al [185] presents a modified strategy which combines general user

dependent and general informationin multimodal biometric verification at the decision

level. Bimodal system that uses written signature and fingerprint have been used to compare

user dependent, use independent and adapted fusion and decision schemes. With availability

enough training data for the trained approaches, various experimental findings have been

obtained. Trained fusion/decision outperforms non-trained simple approaches such as sum

rule. Local learning of the fusion functions outperforms localized trained decisions on

summed scores, for the same amount of training data. Local learning outperforms global

learning. Adapted learning using both global information from a pool of users and user

specific training data outperforms all other approaches. When comparing the trained to the

not trained and the global to the local approaches, the issue of critical training data has been

reported. It has been found better to exploit the available information for training the fusion,

instead of the use of existing information for post-fusion trained decisions.

L.Nanni et al [186] study the usefulness of multi-resolution analysis for the face and palm

authentication problems. Different wavelets have been employed to decompose the images

into frequency sub bands with different levels of decomposition. Wavelet coefficients

extracted from some selected sub bands of several wavelet families have been adopted as

features for the authentication. A multi-matcher, formed by combining matchers using the

max rule, has been trained using a single sub band. Sequential forward floating selection has

been used for band selection. Several linear subspace projection techniques have been tested

and compared. Experiments carried out on several biometric datasets show that the

application of Laplacian low equal error rate has been obtained by employing Eigen maps

on a little subset of wavelet sub bands chosen by sequential forward floating selection.

Z.Le-qing et al [187] present a multimodal biometric identification system using geometry

of finger, knuckle print and palm print features of the human hand. A digital camera

captures hand image and preprocesses to get the finger and palm region of interest. The

finger region of interest has been used to extract finger geometry features and knuckle print

features like index, middle, ring and little fingers. Key points and their local descriptors

extracted from palm region of interest represent palm print features. For efficient hand

recognition in a large database, a coarse-to-fine hierarchical method has been employed to

match multiple features. For guided matching in a large database multiple features, namely

Level-1 finger geometry feature, Level-2 knuckle print feature, Level-3 palm print feature,

55

have been extracted from a hand. The combination of three levels of features possesses a

large variance between different classes while maintaining a high compactness within the

class. To reduce the number of samples significantly for further processing at the fine level,

coarse-level classification by Level-1, Level-2 features is effective and essential. Palm print

matching implements a high precision verification at Level-3. AND rule fusion shows

improvement of the combined scheme at the decision level. G.Michael et al [188] propose

contactless palm print and knuckle print tracking approach to automatically detect and

capture these features from low-resolution video stream. The encoding of palm print feature

in bit string representation is performed using simple and robust directional coding

technique. Speedy template matching and effective template storage and retrieval is

achieved using bit string representation. Ridgelet transform has been used for extraction of

knuckle print features without resizing the knuckle print images to standard size. Support

Vector Machine has been used for fusing the palm print and knuckle print output scores.

Support Vector Machine with Radial Basis Function kernel has been deployed to fuse the

palm print and knuckle print modalities to yield promising result.

Large numbers of individuals, small sample size and high dimensionality are three major

characteristics of data used in biometrics authentication technologies. Single sample

biometrics recognition faced in real-world applications leads to bad recognition result. To

solve this problem, Y.Yao et al [189] present an approach based on feature level biometrics

fusion by combining two kinds of biometrics namely face as contactless biometrics and

palmprint as a typical contact biometrics. The discriminant feature has been extracted using

Gabor-based image preprocessing and principal component analysis techniques followed by

design of a distance-based separability weighting strategy to conduct feature level fusion.

Large face database (AR database) and a large palmprint database (PolyU database) as the

test data show that the presented approach significantly improves the recognition effect of

single sample biometrics problem and also there is strong supplement between face and

palmprint biometrics. Y.Xu et al [190] define the crossing matching score of two biometrics

traits and combine it with the conventional matching scores for performing personal

authentication. The method is suitable for the bimodal biometrics systems with two similar

biometrics traits such as the system with visible light and infrared face images and the

system with palm images captured at two bands. Initially, the method runs respectively for

the first and biometrics traits. Proposed method calculates the matching scores between the

testing sample and each training sample, for each of these two biometrics traits. The first

and second matching scores are the matching scores generated from the first and second

56

traits, respectively. The proposed method then calculates the cross matching scores that are

the matching scores between the testing sample of the second biometrics trait and the

training samples of the first biometrics trait. A weighted fusion scheme finally to combines

the first, second and crossing matching scores for personal authentication. Y. Xu et al [191]

propose a sparse representation method for bimodal biometrics. Initially the method

accomplishes the feature level fusion by combining the samples of the two biometric traits

into a real vector in advance. The method then considers that an approximate representation

of the test sample to be more useful for classification and uses the approximate

representation for classification of sample under test. To produce the approximate

representation of the test sample as basis for classification, the proposed method exploits a

weighted sum of the neighbors from the set of training samples of the test sample. Higher

accuracy has been achieved as demonstrated by the experimentation. D.Zhang et al [192]

present an online personal verification system by fusing palmprint and palmvein

information. Palmvein refers to the palm feature under near-infrared spectrum while

palmprint verification has achieved a great success. Specially designed devices have been

used for capturing palmprint and palmvein features simultaneously to increase robustness,

accuracy and anti-spoof capability of palm based biometric techniques. A dynamic fusion

technique adaptive to image quality has been developed to match the varying quality of the

palmvein image. Liveness detection method based on the image property has been

developed to enhance anti-spoof capability of the system. Higher accuracy has been

achieved by fusing palmprint and palmvein as they contain complementary information.

The system proves to be real time as the verification procedure has been completed in 1.2s

with EER only about 0.0158%. Multi biometrics addresses the challenges such as

unacceptable error rates, intra-class variations and noisy data. M.Heenaye et al [193]

implement a hand vein biometric comprising of dorsal and palmer vein to improve the

accuracy of biometric system using Multi biometrics. Initially, individual scores have been

generated by the individual matchers and used for testing the biometric system. Using score

level fusion that is easy to access and combine the scores obtained from the different

modalities, these scores have been fused. Performance comparison with unimodal biometric

provides better FAR and FRR.Mahesh P. et al [194] propose a multimodal biometric system

using two modalities namely palmprint and speech. The recognition performance has been

increased by integrating the palmprint and speech features. The discriminant features have

been extracted using a modified canonical form method for the palmprint and the Mel

Frequency Cepstral Coefficients technique for speech. Final decision is based on fusion at

57

the matching score level. The experimental results on large database show significant

improvement in reliability of recognition systems and demonstrate increases in the

recognition rate.

One of the primary factors affecting the performance of a biometric authentication system is

resolution of the acquired biometric image. Powerful feature extraction is essential for low

quality images. Legendre polynomial has been used for translation and scale invariant

Legendre moments but does not yield rotational invariant form. L.Deepika et al [195]

propose a palmprint verification system in which the 2D Legendre moments are represented

as a linear combination of geometric moment invariants. The modified Legendre moments

have been used for feature extraction. A weighted fusion technique has been used to fuse

the matching scores of the sub-images. Baye‟s classifier based results indicate prediction

accuracy of 98% and hence validating the choice of low order Legendre moment for

effective palmprint verification. A. Mansoor et al [196] present identification scheme based

on palmprint whichmakes use of the textural information obtainable from the palmprint by

using a feature level fusion of non-sub sampled contourlet transform and contourlet

transform. Local and global details in a palmprint have been captured as compact fixed

length palm code. Two-dimensional spectrum has been divided into fine slices using

iterated directional filter banks after establishment of the region of interest. Sub band

outputs for two transforms are separately computed by finding the directional energy

component for each block. The fusion of features from both domains is performed at feature

levels. Normalized Euclidean distance classifier has been used for matching palmprint. The

algorithm is tested on 7752 palm images of PolyU database and 500 palm images of GPDS

Hand database(University of Las Palmas de Gran Canaria). On palm of PolyU database,

contourlet transform based approach confirmed the decidability index of 2.7734 and equal

error rate of 0.2333% whereas non-sub sampled contourlet transform based approach has

shown decidability index of 2.8125 and EER of 0.1604%. On GPDS hand database,

contourlet transform based approach demonstrated the decidability index of 2.6212 and

equal error rate of 0.7082% while non-sub sampled contourlet transform based approach

has shown decidability index of 2.7278 and equal error rate of 0.5082%. Feature fusion

based multimodal approach achieved decidability index of 2.8914 and equal error rate of

0.1563% on PolyUdatabase and decidability index of 2.7956 and equal error rate of

0.3112% on GPDS hand database.A.Lumini et al [197] presented a detailed study of fusion

policies for iris and fingerprint for personal identification. They investigated whether the

integration of fingerprint and iris can attain performance which is not being possible using a

58

single biometric.Furthermore they evaluated the correlation among the best algorithms for

verification of fingerprint presented at FVC2004. The results obtained by FVC2004

competitors are combined with IRIS matcher in terms of EER areconsiderably lower than

for other approaches. Itpoints tothe intrinsic error of the system found to be very low and

tending towards 0 in some cases. These results verify that a multimodal biometric

overcomes some of the limitations of a single biometric with a substantial improvement in

performance. H.Mahafzah et al [198] have proposed the use of multi-instance as a mean to

improve the performance of FKP verification. Local orientation information used as FKP

features have been extracted using a log-Gabor filter. Experiments performed using the FKP

database consisting of 7920 images indicate that the Multi-instance verification approach at

Score Level (Max Rule) and Decision Level (OR Rule) outperforms that using any single

instance. At Score Level (Min Rule) and Decision Level (AND Rule) there is no

performance improvement. Using multiple instance of biometric collected using single

sensor has good security level. The degree of improvement in accuracy by fusing multiple

instances is marginal since different instance of the same trait produced the same redundant

features. G.Gao et al [199] describe finger knuckle print (FKP) for personal authentication.

One of the advantages of FKP verification lies in its user friendliness in data collection. The

user flexibility in positioning fingers leads to a certain degree of pose variations in the

collected query FKP images. Gabor filtering based competitive coding scheme has been

sensitive to such variations, resulting in many false rejections. To alleviate such a problem

by reconstructing the query sample with a dictionary learned from the template samples in

the gallery set has been proposed. The reconstructed FKP image can reduce much the

enlarged matching distance caused by finger pose variations simultaneously reducing both

the intra-class and inter-class distances. A score level adaptive binary fusion rule to

adaptively fuse the matching distances before and after reconstruction has been proposed

and aims at reduction of the false rejections without increasing much the false acceptances.

Experimental results on PolyU FKP database show that the method significantly improved

the FKP verification accuracy.

The preceding work on multimodal biometric fusion focused on different techniques for

feature extraction. Use of wavelet filter based on Log-Gabor is proposed by O.Aly et al

[200] to extract the features of palm and face. Features extracted from face and palms are

fused with finger knuckle points at the match level. Gabor wavelet transform technique

based feature extraction method is proposed by Y.Chin et al [201]. The features of

palmprint and fingerprint are fused at feature level. The features extracted using the Gabor

59

wavelet filter depends on scale, variance and frequency causing large number of feature

sets. Therefore, accuracy of matching is compared for different length of features at the

fusion level and concluded that more number of features are required for higher accuracy.

D.Sharma et al [202] utilized Log-Gabor filter and Local Binary Pattern to extract and to

fuse the features of Iris and face at feature level. However, due to high redundancy in the

Log-Gabor filter, particle swam optimization method is used to achieve proper Gabor filter

with respect to the modality in [203]. The extracted features are fused at the match level by

normalizing the 1D Log-Gabor filter [204]. They achieved 1.569% FRR and 0.012% FAR.

Three main disadvantageshas been observed for the Gabor based wavelet transform: (1) It is

shift variance, (2) It has poor directionality and (3) It do not contain any phase information.

Iris and ear based multimodal biometric system is proposed by M.Nadheen et al [205]. PCA

method is used to extract the features of each modality and match level fusion is used with

sum operator. They achieved95% accuracyLDA and PCA methods are used to reduce the

dimensions of Gabor filter extracted features and feature level fusion is used

[206].M.Fahmy et al [207] usedSVM for fusionof the fingerprint and iris at match level.

According to them normalization process is required to get better accuracy. The match level

fusion of face and iris is proposed in [208]. This method uses Euclidean distance based

phase of iris and Laplacian face.Match level fusion of DNA, Iris and Face is proposed by

Dinerstein et al [209]. They derived appropriate features from multiple SVM and used them

in fusion process. S.Geethu et al [210] also proposed a match level fusion technique for

fingerprint and iris using multiple SVM. SVM has good generalization properties SVM

found to be more accurate for small training sample sets.Its major limitations are the time

required for training time and parameter selection difficulty [211].

Zernike moment projects 2D image using orthogonal basis function. The Zernike moment

magnitude is invariant to the translation, rotation and scaling. Hence it has powerful

potential in extracting the biometric features. High order moments preservemore features.

Using this,palm and finger features are fused [212].Feature level, match level and decision

level fusion are used with respect to different parts of the hands. Since this model is based

on the segmentation of palm and finger, the finger touch must be avoided during the

acquisition process make it suitable for the higher recognition rate. Rotation invariance is

required to obtained higher recognition rate for any multimodal biometric, and therefore

Zernike moments have better accuracy. However, the computation time is proportional to

the order of Zernike moments [213].