Date post: | 04-Jul-2015 |
Category: |
Documents |
Upload: | shamili-nookala |
View: | 610 times |
Download: | 1 times |
An Embedded Real-Time
Finger-Vein Recognition
System
for Mobile Devices
PRESENTED BY
N.LAKSHMI SHAMILI
III B.TECH,ECE
SVEW
BIOMETRICS
Unique measurable characteristics of a human being that can be used to automatically recognize an individual or verify an individual identity.
Used for security authentication.
FINGER VEIN
AUTHENTICATION
TECHNOLOGY A promising biometric
pattern for personal identification in terms of its security and convenience.
Uses DSP platform.
Takes only about 0.8seconds to verify one input finger- vein sample.
VEIN RECOGNITION
A system for Identification using a person’s uniquevein patterns.
Veins as a biometrics tool involve the measurement of the blood vesselson the back of your palm or a single finger of hand.
OVERVIEW OF THE PROPOSED
SYSTEM
IMAGE
ACQUISITION
PROCESSING
HUMAN-MACHINE
COMMUNICATION
MODULE
It uses four modules
NIR light source
Transparent acryl
Daylight cut-off
filters
Monochromatic
camera
IMAGE ACQUISITION
FLOW CHART OF PROPOSED
RECOGNITION ALGORITHM
Input finger-vein images with
corresponding ID
Segmentation and Alignment
Enhancement
Feature Extraction
Feature Templates
Input finger-vein images with
corresponding ID
Segmentation and Alignment
Enhancement
Feature Extraction
Matching
Accept or reject
IMAGE SEGMENTATION &
ALIGNMENT
Segmentation
Normalization
Alignment
Between two joints
Canny operator
Midline
Rotate
IMAGE ENHANCEMENT:
Enhanced to
improve its
contrast.
Resized
Histogram
equalization
FEATURE EXTRACTION & MATCHING
Lacunarity
Quantify the denseness
Spatial heterogeneity
Matching (hamming distance)
EXPERIMENTAL RESULTS
DATA SET:
100 subjects (55% male and 45%female)
Images from the forefinger, middle
finger, and ring finger.
PERFORMANCE EVALUATION
Two types of errors
• which claims a genuine pair as impostor
FALSE REJECTION RATE(FRR)
• which claims an impostor pair as genuine
FALSE ACCEPTANCE
RATE(FAR)
FRR FAR EER
APPLICATION AREAS
CONCLUSION
Highly Secure
Low power consumption
Low computational complexity
High Accuracy
Less Expensive
Small size
Quick response(0.8s)
Low EER (0.07%)