User Authentication Using Hand Images
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 118 | Monthly Hits: ⮙10

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014

User Authentication Using Hand Images

Aditya Pratap Singh, Ranjan Kumar Thakur, Arabind Kumar, Ram Baksh

Hand geometry is recently realized as the biometric modality for personal authentication. Hand geometry has been adjudged to be one of the safest biometric modalities due to its strong resilience against the impostor attack and also one of the easiest modality as per the acquisition. This paper presents an approach for the biometric based authentication using hand geometry from hand images. The proposed biometric system includes enrollment where the hand images are collected, normalization of image, extraction of normalized contour and extraction of palm region.The ROI extracted after the normalization of image. The contour of the hand region from ROI is used to extract structural features that describe the shape of the hand. These features of the known and the unknown users are matched using support vector machine classifier at the verification stage.

Keywords: Pre-processing, Contour, Features, Inertia Matrix

Edition: Volume 3 Issue 3, March 2014

Pages: 317 - 322

Share this Article

How to Cite this Article?

Aditya Pratap Singh, Ranjan Kumar Thakur, Arabind Kumar, Ram Baksh, "User Authentication Using Hand Images", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131108, Volume 3 Issue 3, March 2014, 317 - 322

Enter Your Registered Email Address





Similar Articles with Keyword 'Pre-processing'

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1979 - 1982

Palm Vein Authentication: A Review

Gitanjali Sikka, Er. Vikas Wasson

Share this Article

Downloads: 108 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 965 - 969

Identification of Ovarian Mass: A Survey

Hemita Pathak, Vrushali Kulkarni, Sarika Bobde

Share this Article

Downloads: 108 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 994 - 997

Content Based Image Retrieval: Bone Age Assessment

Manjula Gururaj H, Dr. G. S. Nagaraja

Share this Article

Downloads: 109 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2530 - 2533

Shadow Attacks Based On Password Patterns Password Reuses

Bhavika Garse, N. D. Kale

Share this Article

Downloads: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 619 - 625

Customized Travel Itinerary Mining for Tourism Services

Bonuguntla Saranya, Miryala Venkatesh

Share this Article

Similar Articles with Keyword 'Contour'

Downloads: 64 | Weekly Hits: ⮙3 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021

Pages: 1165 - 1168

A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features

Chengcheng Yan, Yanping Hu

Share this Article

Downloads: 67 | Weekly Hits: ⮙3 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 890 - 894

A Survey on Types of Crawlers and Web Searching Algorithms

T. Yogameera, Dr. D. Shanthi

Share this Article

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1789 - 1791

Role of Active Contour in Image Processing

Manjeet Kaur, Sukhpreet Kaur

Share this Article

Downloads: 111 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1459 - 1463

A System for Providing Highly Secured Authentication

Kishori N. Ushir, R. B. Joshi

Share this Article

Downloads: 111 | Weekly Hits: ⮙3 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 143 - 146

Offline Signature Verification Using Contour Tracing

Madhuri, Alok

Share this Article

Similar Articles with Keyword 'Features'

Downloads: 126 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 480 | Weekly Hits: ⮙5 | Monthly Hits: ⮙70

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 7 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 778 - 782

A Helpline Application in COVID-19 Pandemic Situation

G. Muni Venkatesh

Share this Article

Downloads: 34 | Weekly Hits: ⮙5 | Monthly Hits: ⮙22

Research Paper, Computer Science & Engineering, Syria, Volume 10 Issue 3, March 2021

Pages: 524 - 528

Detection and Classification of Skin Cancer using Image Processing Techniques

Maha Shawish, Balsam Eid

Share this Article

Downloads: 34 | Weekly Hits: ⮙2 | Monthly Hits: ⮙20

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 1179 - 1182

Face Detection Using Haar Cascade Classifiers

Bhavana R. Maale, Dr. Suvarna Nandyal

Share this Article



Top