A Review on Scope of 3D Palm Print and Its Application in Modern ERA

Advancements and Applications of 3D Palm Print Biometrics

by Ritu Sharma*, Dr. Mukesh Kumar,

- Published in Journal of Advances and Scholarly Researches in Allied Education, E-ISSN: 2230-7540

Volume 15, Issue No. 9, Oct 2018, Pages 250 - 253 (4)

Published by: Ignited Minds Journals


ABSTRACT

Biometrics is technology of identifying uniquely human subjects by means of measuring analyzing one or more inherent behavioral or physical traits. These human body characteristics include fingerprints, voice patterns, eye retinas irises, facial patterns hand dimension. Biometric systems are used to authenticate identity by measuring physiological andor behavioral characteristics. So, two main categories of biometrics are ‘physiological’ andor ‘behavioral’. The physiological category includes physical human traits such as palm print, hand shape, eyes, veins, etc. The behavioral category includes movement of human, such as hand gesture, speaking style, signature etc. The measurement of these traits helps within authentication using biometric systems. In this paper the study has been made about existing biometric system along with their working and application in modern era. This paper also represents various researches in field of 3D PALM PRINT.

KEYWORD

biometrics, palm print, 3D, authentication, biometric systems, physiological, behavioral, modern era, existing biometric system, application

1. INTRODUCTION

Biometric systems include applications making use of biometric technologies & which allow identification automatically, verification or authentication of a natural person. In principle, processing of personal data involving use of a biometric system is considered by privacy experts to be only justified within places requiring a high level of security & absolute identification procedures. The implementation of similar systems should take place within a transparent way & therefore appropriate information should always be provided to employees. Where introduction of biometric systems is necessary, employers should opt for that system which provides a high level of comfort within terms of privacy requirements. It is possible within view of technological progress achieved within this field.

2. PALM PRINT RECOGNITION

Palm print recognition is one of biometrics available at present. One of most successful biometric systems is palm print recognition system. This system recognizes on basis of palm print of a person. It is reliable due to fact that print patterns are always unique. Palm print is made up of principal lines, wrinkles, & ridges. Three kind of features are within palm print: geometry features (width, length, & area of palm), line features (principal lines, coarse wrinkles, & fine wrinkles), & point features (minutiae & delta points). Palm print verification uses these features to verify identity of a person. However, geometrical features, such as width of palm could be faked easily by making a model of a hand. Delta points & minutiae only could be extracted from fine resolution images. Principal lines & wrinkles are very important to discriminate between different palm prints & they could be extracted from low resolution images. Palm lines are very irregular & even within same palm they have quite different directions, shapes, & contrast, thus this is very difficult task to extract these lines. Thus palm print recognition is a very interesting research area. Much work has already been done within this area, but there is still a lot of scope to make systems more efficient. Here, we have tried to analyze already existing systems & there by propose a new approach. A biometric system might be used for personal recognition instead of token-based methods such as a passport, a physical key & an ID card or Knowledge base method such as a password. In token-based, ―token‖ could be stolen or lost easily while knowledge could be forgotten.

3. EXISTING RESEARCHES

There have been several researches in field of biometrics. Some of them are research related to support vector machines in finger print, comparison of 3d Biometric modalities, Multi-Biometric section discusses the objectives and results of existing research papers that are related to proposed research work.

In 2001 wrote by C. Chang and C. Lin. LIBSVM: a library for support vector machines in finger print

A fingerprint in its narrow sense is an impression left by friction ridges of a human finger. Recovery of fingerprints from a crime scene is an important method of forensic science. Fingerprints are easily deposited on suitable surfaces (such as glass or metal or polished stone) by natural secretions of sweat from eccrine glands that are present in epidermal ridges. These are sometimes referred to as "Chanced Impressions". In a wider use of term, fingerprints are traces of an impression from friction ridges of any part of a human or other primate hand.

In 2015 wrote by Damon L. Woodard, Timothy C. Faltemier, Ping Yan, Patrick J. Flynn, Kevin W. Bowyer in 2015 A Comparison of 3D Biometric Modalities

This paper presents structure of a 3D facial authentication system. Focus is on acquisition & processing of 3D facial data, different 3D facial representations i.e. models & various 3D facial features. Advantages & disadvantages of different representations & features are discussed.

In 2014 wrote by Dr. T. Karthikeyan Multi-Biometric Personal Authentication with 3d Face and Iris Images Using Sum Rule Based Fusion of Matching Score

Image pre-processing techniques for eigenface based face recognition. ―They have presented a range of image processing techniques as potential pre-processing steps,which attempt to improve performance of eigen face method of face recognition.

In (1994) wrote by Dyar. C.R "Face Recognition by purposive control of observer motion", Computer Vision and Pattern Recognition

A face recognition system is a group of programs for automatically recognize a person from a digital image or a video frame from a source.Ways to do this is by comparing selected characteristics from image and face database.

In 2003 wrote by Gerhard X. Ritter; Joseph N. Wilson, “ Handbook of Computer Vision Algorithms in Image Algebra

Since the field of image algebra is a recent development it will be instructive to provide some background information .In the broad sense, image establishment of a comprehensive and unifying theory of image transformations, image analysis, and image understanding in the discrete as well as the continuous domain.

In 2003 wrote by L. Ma, and T. Tisse, "Personal Recognition Based on Iris Texture Analysis

With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention over the past decade.Iris recognition, as an emerging biometric recognition approach, is becoming a very active topic in both research and practical applications.In general,a typical iris recognition system includes iris imaging, iris liveness detection, and recognition.This paper focuses on the last issue and describes a new scheme for iris recognition from an image sequence.

4. MOTIVATION FOR CURRENT RESEARCH

During last year‘s there has been growing use of automatic personal recognition systems. Palmprint based biometric approaches have been intensively developed over last 12 years because they possess several advantages over other systems. Palmprint images could be acquired with low resolution cameras & scanners & still have enough information to achieve good recognition rates. In this case, discriminate information relies within palm lines & texture. However, if high resolution pictures are captured, ridges & wrinkles could be detected, resulting within an image similar to fingerprints[5].

Palmprint are one of four biometric modalities possessing all of following properties: • Universality, which means trait should be present within all individuals. • Uniqueness, as characteristic has to be unique to each individual. • Permanence, its opposition to aging. • Measurability, how easy is to obtain picture or signal from individual. • Performance, how good this is at recognizing & identifying any person. • Acceptability, population must be willing to provide characteristics.

During enrollment phase, data is immediately converted into a template containing a unique binary code which represents characteristics or measurements of biometric feature. This binary code is normally encrypted & kept within a separate storage space, for instance, within memory of biometric device. In this way biometric data is segregated from other personal information conventionally contained within a back-end database & kept for administrative purposes. For instance, every time person makes use of biometric device to enter or exit work premises, system will convert fingerprint [5] data to a binary code & match code with one previously contained during enrolment phase to authenticate individual. The method of identification based on biometric characteristics is preferred over traditional passwords & PIN based methods for various reasons such as: The person to be identified is required to be physically present at time-of-identification. Identification based on biometric techniques obviates need to remember a password or carry a token. A biometric system is essentially a pattern recognition system which makes a personal identification by determining authenticity of a specific physiological or behavioral characteristic possessed by user. Biometric technologies are thus defined as "automated methods of identifying or authenticating individuality of a living person based on a physiological or behavioral characteristic". Identification - One to Many: Biometrics could be used to determine a person's individuality even without his knowledge or consent. For example, scanning a crowd with a camera & using face recognition technology, one could determine matches against a known database. Verification - One to One: Biometrics could also be used to verify a person's individuality. For example, one could grant physical access to a secure area within a building by using finger scans or could grant access to a bank account at an ATM by using retinal scan. Biometric authentication requires to compare a registered or enrolled biometric sample (biometric template or identifier) against a newly captured biometric sample.

6. AREA OF APPLICATION

Biometric systems are basically used for security and accountability purposes.

1. For Security: Protect Sensitive Data, High degree of individuality certainty within transactions & Create databases with singular identities. keeping & for efficiency. Reduce password-related problems. It is also used within following areas: enterprise-wide network security infrastructures, secure electronic banking, investing & other financial transactions, retail sales, law enforcement, health & social services.

7. SCOPE OF RESEARCH

In future Palm Print process is found to be most secure as compared to other biometric techniques. It could be useful to enhance secure transaction within banks & other financial organization. However there are many challenges within frequent use of this technology but within future due to advent of new technology it would be possible to use this technology easily. Enterprise & government both acknowledge convergence of physical & information security environments,but there are new security challenges on horizon just-in-time inventory control, sophisticated supply chain management,& even a phenomenon called "coopetition" in that companies that compete within some areas, cooperate within others. Managing this convergence of physical & information security requirements now drives security system architecture design & implementation & is an increasingly key factor within biometric technology selection. Managing convergence would only become a more complex task because as IT & communications becomes increasingly wireless, there is a need for robust individuality management would become more acute. Palm Print 3D sees this technology as a natural "fit" for within physical & wireless arenas. This growing need, as well as Palm Print 3D competence within this technology, coupled with core interests within IT & wireless, provide impetus for design efforts for future & makes Palm Print 3D one to watch for new developments within individuality management tomorrow & beyond.

REFERENCE

1. Abhilash Kumar Sharma, Ashish Raghuwanshi, Vijay Kumar Sharma (2015). "Biometric System- A Review ",International Journal of Computer Science and Information Technologies, Vol. 6 (5), pp. 4616-4619. 2. Ahmad Tasnim Siddiqui (2015). "Biometric Authentications to Control ATM Theft"Asian Journal of Technology & ―Design and Development of FPGA based Adaptive Thresholder for Image Processing Applications‖, on line access 4. Bartoli, A. (2006). "Groupwise Geometric and Photometric Direct Image Registration," Proc. 17th British Machine Vision Conf., Sept. 2006. 5. C. Chang and C. Lin (2001). LIBSVM: a library for support vector machines finger print 2001. Software available at http://www. csie. ntu.edu. tw/cjlin/libsvm, 2001. 6. C. Fancourt, L. Bogoni, K. Hanna, Y. Guo, and R. Wildes, and N. Takahashi, and U. Jain (2005). "Iris Recognition at a Distance", in Proceedings of the International Conference on Audio and Video-Based Biometric Person Authentication, pp. 1-13. 7. Damon L. Woodard, Timothy C. Faltemier, Ping Yan (2015). Patrick J. Flynn, Kevin W. Bowyer in 2015 A Comparison of 3D Biometric Modalities 8. Dr. T. Karthikeyan (2014). Multi-Biometric Personal Authentication with 3d Face and Iris Images Using Sum Rule Based Fusion of Matching Score 9. Dyar. C.R. (1994). "Face reconiging by purposive control of observer motion", Computer Vision and Pattern Recognition, 2015. Proceedings CVPR '94., 1994 IEEE Computer Society Conference 10. D. Zhang and Y. Wang. (2009). Gender Recognition Based on Fusion of Face and Multi-view Gait.(2009) In LNCS, volume 5558, pages 1010-1018. Springer, 2009. 11. Elham Ashari , Richard Hornsey (2015). ― FPGA Implementation of Real-Time Adaptive Image Thresholding‖ ,online access (2015) ISSN: 0975-0290 2397 Analysis and Machine Intelligence, IEEE Transactions on, Volume:31, Issue: 7 12. E. Yahya, and M. J. Nordin (2008). "A New Technique for Iris Localization in Iris Recognition System", Information Technology Journal, Vol. 7, No. 6, pp. 924-928. 13. Gao , B. Cao , S. Shan , X. Chen , D. Zhou , X. Zhang and D. Zhao (2008). "The CAS-PEAL large-scale Chinese face database and baseline evaluations", IEEE Trans. ―Handbook of Computer Vision Algorithms in Image Algebra‖ CRC Press, CRC Press LLC ISBN:0849326362 Pub Date: 05/01/2003 15. Girish Tialk, Shivamurthy M (2018). ―Applications of Biometric In Automobiles‖International Research Journal of Engineering and echnology(IRJET), Volume: 05 Issue: 02 | Feb-2018 16. Harsha H, Sumalatha K. A. (2014). "Biometric Palmprint Recognition System: A Review"International Journal of Advanced Research in Computer Science and Software Engineering,Volume 4, Issue 1,January2014 ISSN: 2277 128X. 17. Hu L and Wei Z (2009). "An Algorithm of Glass-Image Recognition Based on Wavelet Packet Decomposition, "International Conference on Computational Intelligence and Natural Computing, vol.1, 2009, pp. 206-209. 18. J. Daugman (2007). "New Methods in Iris Recognition", IEEE Trans. on Systems, Man, and Cybernetics, Vol. 37, No. 5, pp. 1167-1175.

Corresponding Author Ritu Sharma*

Research Scholar, Department of Computer Science and Engineering, TITS Bhiwani sharmaritu2492@gmail.com