Sliding Window-Based Fast Corner Matching Palmprint Authentication

Sliding Window-Based Fast Corner Matching Palmprint Authentication

Jyoti Malik (National Institute of Technology Kurukshetra, India), G. Sainarayanan (Maples ESM Technologies Chennai, India) and Ratna Dahiya (National Institute of Technology Kurukshetra, India)
DOI: 10.4018/978-1-4666-3906-5.ch012
OnDemand PDF Download:
No Current Special Offers


Authentication time is the main and important part of the authentication system. Normally the response time should be fast but as the number of persons in the database increases, there is probability of more response time taken for authentication. The need of fast authentication system arises so that authentication time (matching time) is very less. This paper proposes a sliding window approach to make fast authentication system. The highlight of sliding window method is constant matching time, fast and can match translated images also. Several palmprint matching methods like match by correlation etc. are dependent upon the number of corners detected and so is the matching time. In sliding window method, matching time is constant as the numbers of matching operations are limited and the matching time is independent of the number of corners detected. The palmprint corner features extracted using two approaches Phase Congruency Corner Detector and Harris Corner Detector are binarized so that only useful information (features) is matched. The two approaches of Phase Congruency Corner Detector and Harris Corner Detector, when matched with hamming distance using sliding window can achieve recognition rate of 97.7% and 97.5% respectively.
Chapter Preview

2. Palmprint Authentication System

In this chapter, the palmprint authentication system is divided in following two subsystems:

  • 1.

    Pre-Authentication System

  • 2.

    Authentication System

In pre-authentication (Figure 1), a database of Palmprint features and reference threshold is prepared. These values will be used in training the system.

Figure 1.

Palmprint pre-authentication system


In authentication (Figure 2), the person is considered genuine or imposter based on the value of reference threshold value stored in pre-authentication system database.

Figure 2.

Palmprint authentication system


Complete Chapter List

Search this Book: