Person Identification based on Palm and Hand Geometry Qaisar N. Ashraf1, Fayyaz A. Afsar2 DCIS, PIEAS, Nilore, Islamabad [email protected], [email protected]

Abstract This paper proposes a new multimodal biometric system using feature level fusion of hand shape, hand geometry and palm texture. Both the palmprint and hand-shape features are proposed to be extracted from a single hand image acquired using a simple flatbed scanner. These features are then examined for their individual and combined performances. A database of 500 hand images is used to validate the performance of proposed system. By fusing the features extracted by proposed techniques i.e. PCA, Hand geometry, and wavelet transform, improvement in verification and identification is obtained. The similarity of two feature vector is measured by using Euclidean distance as similarity measure. Accuracy of the proposed system using Pieas hand database is 96.4%.

1.

Introduction

Biometric person recognition is becoming increasingly important in our information and network based society. Many physiological characteristics of humans are typically time invariant, easy to acquire, and unique for every individual. Various technologies have been proposed and implemented in the literature, including palmprint, iris, fingerprint, hand geometry, voice, face, signature, and retina identification [1]. One distinct advantage the hand modality offers is that its imaging conditions are less complex, for example a relatively simple digital camera or flatbed scanner would suffice. The palmprint and hand-shape information can be simultaneously extracted from a single hand image at medium resolution. Researchers have proposed several promising methods for palmprint recognition such as 2D Gabor filter [2], 2D Gabor filter [3], and 2D PCA and LDA [4] and hand-shape recognition such as implicit polynomials and geometric features [7], [8]. Bimodal biometric systems have recently attracted the attention of researchers and some work has already reported in the literature such as integration of face,

gait and fingerprint [5] and face and iris [6]. The advantages of the proposed system are: (i) The security threat associated with the handshape biometric, due to a fake hand, can be restricted with the integration of palmPrint features. (ii) A higher accuracy can been assured due to the usage of multimodal features.

2. 2.1

Materials and Methods Extraction images

of

palmprint

and

hand

In order to assess the performance of the proposed system a database of 50 users (PIEAS Hand Database) is used for experiments. This database consists of 500 right hand images from 50 individuals, 10 images from each individual. In this dataset, 42 individuals are male, and the age distribution of the subjects is: about 90% are below 30 years, about 8% are aged between 30 and 50 years and about 2% are older than 50 years. The images in this database are captured using a simple flatbed document scanner (Camera Model: Hp scanjet 5590). To ensure proper hand alignment a transparent sheet with five pegs on it is placed on the scanner. These five pegs on the platform serve as control points for the placement of hands. Using pegs makes sure that the fingers don’t touch each other and most of the part of the hand touches the imaging sheet containing the pegs. These pegs also reduce the time requirement for image pre-processing for hand alignment. There are mainly three steps in hand recognition i.e. Image pre-processing, Feature extraction and Matching. 2.1.1

Pre-processing

Image pre-processing is an important step in image recognition. In the proposed system pre-processing is done as shown in figure below.

Pegs are removed such that peg template

peg (i, j ) is first negated then multiplied with the binary image I (i, j ) . I ' (i, y ) = I (i, y ).* ¬peg (i, y ) Figure 1 Image pre-processing block diagram The input color image is cropped to eliminate the undesired portion of the image as shown in figure 1(a, b). Then the cropped image is converted to a gray scale image. A median filter of size 19-by-19 of the neighborhood is used to reduce the noise. [10]. Then to get a binary image Otsu's method [10] is used.

After peg removing the next step of image preprocessing is the edge detection. In our proposed system, Sobel operator is used for edge detection [10].

2.2

Feature Extraction Approaches

In the proposed system three types of features are extracted from a hand image i.e. PCA based global hand shape feature, hand geometry features and wavelet domain features of palmprint. Then these feature are merged enhance the accuracy of the verification and identification of system. 2.2.1

a-Grayscale image without cropping

b-Cropped image

Hand shape Feature extraction using PCA

In the proposed system PCA is used to extract hand shape features [4]. It is a common technique for finding patterns in data of high dimension. It projects images into a subspace such that the first orthogonal dimension of this subspace captures the greatest amount of variance among the images and the last dimension of this subspace captures the least amount of variance among the images [9]. In order to create an eigenspace each image is stored in a vector of size N. x i = ⎡⎣ x i1........xNi ⎤⎦ − − − − − −(1) Then all the training images are mean centered. x − i = x i − m, Where m =

c-Binary Image before peg removal

c-Peg template for peg removal

1 p i ∑ x − − − − − −(2) P i =1

Data matrix is created by combining these centered images. X = ⎢⎣ x −1 | x −2 | ....|x − p ⎥⎦ − − − − − −(3) A covariance matrix is created by multiplying the data matrix with its transpose. T

Ω = X X − − − − − −(4)

The eigenvalues and eigenvectors are computed for Ω using eigenvector decomposition. Ω' = Λ 'V ' − − − − − −(5) where V ' is set of eigenvectors and Λ ' is the set of eigenvalues. '

d-Binary Image after peg removal

T

e-Edge detection

Figure 2 Image pre-processing

Eigenvectors V of X X are computed by multiplying data matrix with V’. V = XV ' − − − − − −(6) The eigenvectors are divided by their norm.

vi =

vi − − − − − −(7) || vi ||

2.2.3

Eigenvectors νi are sorted according to their corresponding eigenvalues. And those eigenvectors selected which are associated with eigenvalues contain energy more than 98%. Using this threshold only 15 features are selected and remaining 235 features are discarded. Once eigenspace is created all mean centered training images are projected into it. x ~i = V T x − i − − − − − −(9) Each test image is centered as training images, and then these test images are projected onto the created eigenspace. y − i = y i − m, Where m =

1 p i ∑ x − − − − − −(10) P i =1

i

y ~ i = V T y − − − − − − − (11) And Using PIEAS hand database, accuracy of the proposed system by using only PCA features is about 94.5%.

2.2.2

Extraction of Hand Geometry Features

In recent years, hand geometry (Figure 3) has become a very popular access control biometrics. The characteristics of hand geometry include the length and width of palm, length and width of figures, length of hand etc. In the proposed system binary image is used to compute significant hand geometry features. A total of 16 hand geometry features were used as shown in figure 3. (i) finger lengths(L1,L2,L3 and L4) (ii) finger widths ( w1, w2, .. and w8) (iii) Palm width (iv) Palm length (v) Hand area (vi) Hand length Finger w idths:w 1,w 2,..w 8 and Finger length: L1,L2..L4

w6

w7

L2

L3

Texture Feature extraction using Wavelet Transform

In proposed system texture features are extracted by applying wavelet transform on palmprints. Image segmentation is applied to extract the palmprint images such that a square palm image of variable side length depending on the distance between the two extreme fingers is extracted. Palm print image is further segmented into four equal segments and then 2D wavelet decomposition is applied on each segment. Different level of decomposition is applied on palm segments but optimal decomposition level that is found was three. Similarly different wavelets are tested and best results are obtained by using dmey wavelet. Following two types of features are extracted as texture features of the palmprint. (i) The percentage of energy corresponding to the approximation, horizontal, vertical, and diagonal details. (ii) Energy of autocorrelation functions of the wavelet coefficients. In this way we get eighty features of a palm. Feature reduction is done by applying the PCA such that those features are retained containing 98% energy. Using threshold 0.98, 40 features retained and remaining 40 features are discarded. Using PIEAS hand database, accuracy of the proposed system using texture features by applying wavelets is about 93.74%. 2.2.4

Feature Normalization

Each feature is normalized before matching score to have range [0, 1]. The normalization procedure is to transform the feature component x to a random variable with zero mean and unit variance as ~ x −μ xi = i i − − − − − (12) σi where µi and σi are the sample mean and the sample standard deviation of that feature respectively.

w8 L4

w5 L1

Hand Length w1

w2

w3

2.2.5

Feature Matching

w4

Palm width Palm Length

Figure 3 Hand geometry features Using PIEAS hand database, accuracy of the proposed system by using only hand geometry features is about 91.73%.

Length of feature vector after integrating all techniques is 71.The similarity measure between ƒ1 (feature vector from the user) and ƒ2 (stored template) is used as the matching score and is computed as follows: ωT =

f1 . f 2 − − − − − − (13) | f1 || f 2 |

If ωT less than threshold then no match Else correct match

3.

Results and discussions

4.

The experiments reported in this paper utilize hand images obtained from flatbed scanner, as discussed in section above. A database of 500 hand images, 10 samples from each user is used to validate the accuracy of proposed system. The first five images from each user were used for training and the rest were used for testing. Proposed techniques can be examined for their individual and combined Performances in table 1. It clearly shows that combined techniques give better result than individuals. Table 1 Comparisons of Proposed techniques METHOD

PCA

HAND GEOMETRY

WAVELET S

PCA+ WAVELETS + HAND GEOMETRY

Accuracy (%) Number of Features Time for training (per image)

94.5 % 15

91.73%

93.74%

96.4%

16

40

71

1.5 sec.

1.65sec.

3.2sec.

6.35sec.

This paper introduces a new approach for person identification and verification based method based on palmprint and hand geometry features. A palmprint image contains the texture information and wavelet transform is applied to extract the texture features. PCA is applied to extract the hand shape features. By the integration of features extracted by proposed techniques i.e. PCA, Hand geometry, and wavelet domain analysis of palm, a higher performance is achieved. Experimental results suggest that majority features of hand are useful for person recognition. Using PIEAS hand database, accuracy of the proposed system is about 96.4%.

References [1]. [2].

Accuracy of the system is measured in terms of FAR and FRR for different thresholds and the same is plotted (Figs.4) to get the optimal threshold for the system with low false acceptance and low false rejection rates. At optimal threshold i.e. 0.66, accuracy is about 96.4%.

[3].

[4].

PIEAS Hand Database Result applying PCA, wavelet Domain and hand geoemtry 100

80

[5].

FAR FRR

50 Individuals 5 images for testing and 5 images for training

90

FAR and FRR

70

[6].

60 50 40

[7].

30 20 10 0 -1

[8]. -0.8

-0.6

-0.4

-0.2

0

0.2

0.4

0.6

X: 0.66 Y: 3.631 0.8

Threshold(w T)

Figure 4 False acceptance rate and false rejection rate Different techniques are implemented in the literature. A comparison of these techniques is shown in table 2. Table 2 Comparison of different techniques implemented in literature TECHNIQUE 2D Gabor phase coding scheme [2] PCA[12] 2DPCA[12] Liang Li, Xin Yang (F.Mellin Transformation) [13]

DATABASE (NO. OF PERSONS) 386

ACCURACY (%)

160 160 386

85.63 99 95.1

99.4

Conclusions

1

[9].

[10]. [11]. [12]. [13].

K .Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circuits Syst. Video Technol., vol.14, no.1, Jan. 2004, pp. 4–20. D.Zhang, W. K. Kong, J. You, and M. Wong, “On-line palm print identification,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 9, Sep. 2003, pp. 1041–1050. D. Zhang and W. Shu, “Two novel characteristics in palmprint verification: datum point invariance and line feature matching,” Pattern Recognit., vol. 32, no. 4, Apr.1999, pp. 691–702. X. Lu, D. Zhang, and K. Wang, “Fisher palms based palmprint recognition,” Pattern Recognit. Lett., vol. 24, Nov. 2003, pp. 2829–2838. L. Hong and A. Jain, “Integrating faces and fingerprints for personal identification,” IEEE Trans. Pattern Anal. Mach. Intell. , vol. 20, no.12, Dec. 1998,pp. 1295–1307. Y. Wang, T. Tan, and A. K. Jain, “Combining face and iris for identity verification,” in Proc AVBPA, Guildford, U.K., Jun. 2003, pp.805–813. C. Oden, A. Ercil, and B. Buke, “Combining implicit polynomials and Geometric features for hand recognition,” Pattern Recognit. Lett., vol. 24,2003, pp.2145–2152. A. Ross, A. K. Jain, “Information fusion in biometrics,” Pattern Recognit. Lett., vol. 24 Sep. 2003, pp. 2115–2125,. Jonathon Shlens, “A Tutorial on Principal Component Analysis”, Systems Neuro biology Laboratory, Salk Institute for Biological Studies LaJolla, CA92037, Version2, December10, 2005. Gonzalez and Woods, Digital Image Processing, 3rd Edition, Prentice Hall, 2008 Jiangwen Deng; Tsui, H.T.; “A PCA/MDA scheme for hand posture recognition”, Fifth IEEE International Conference, May 2002, pp.294 – 299. Meng Wang, Qiuqi Ruan, “Palmprint Recognition Based on Two-Dimensional Methods”, ICSP Preceding, 2006. G. Shobha , M. Krishna, S.C. Sharma, “Development of Palmprint Verification System Using Biometrics”, ISSN 1000-9825, CODEN RUXUEW, Journal of Software,Vol.17, No.8, August 2006, pp.1824-1836

Person Identification based on Palm and Hand ... - Semantic Scholar

using Pieas hand database is 96.4%. 1. ... The images in this database are captured using a simple .... Each feature is normalized before matching score to.

182KB Sizes 0 Downloads 289 Views

Recommend Documents

Person Identification based on Palm and Hand ... - Semantic Scholar
amount of variance among the images and the last dimension of this subspace ... A covariance matrix is created by multiplying the data matrix with its transpose.

Person Re-identification Based on Global Color Context
which is of great interest in applications such as long term activity analysis [4] and continuously ..... self-similarities w.r.t. color word occurred by soft assignment.

Person Memory and Judgment: Pragmatic ... - Semantic Scholar
San. Diego, CA: Academic Press. Jones, E. E., Schwartz, J., & Gilbert, D. T. (1984). Perception of moral expectancy violations: The role of expectancy source.

Person Memory and Judgment: Pragmatic ... - Semantic Scholar
ert S. Wyer, Jr., Department of Psychology, University of Illinois, 603. East Daniel, Champaign ... These data suggest that subjects with the goal of forming an impression of a person on the basis ..... was not open to question. Moreover, the other .

Identification of putative trait based markers for ... - Semantic Scholar
low productivity of Eucalyptus plantations in India, ... at http://dendrome.ucdavis.edu/ index.php. In eucalypts ... The present paper highlights the development of.

Efficient Speaker Identification and Retrieval - Semantic Scholar
Department of Computer Science, Bar-Ilan University, Israel. 2. School of Electrical .... computed using the top-N speedup technique [3] (N=5) and divided by the ...

Efficient Speaker Identification and Retrieval - Semantic Scholar
identification framework and for efficient speaker retrieval. In ..... Phase two: rescoring using GMM-simulation (top-1). 0.05. 0.1. 0.2. 0.5. 1. 2. 5. 10. 20. 40. 2. 5. 10.

Online Video Recommendation Based on ... - Semantic Scholar
Department of Computer Science and Technology, Tsinghua University, Beijing 100084, P. R. ... precedented level, video recommendation has become a very.

Robust Part-Based Hand Gesture Recognition ... - Semantic Scholar
or histograms. EMD is widely used in many problems such as content-based image retrieval and pattern recognition [34], [35]. EMD is a measure of the distance between two probability distributions. It is named after a physical analogy that is drawn fr

Language Recognition Based on Score ... - Semantic Scholar
1School of Electrical and Computer Engineering. Georgia Institute of ... over all competing classes, and have been demonstrated to be effective in isolated word ...

Language Recognition Based on Score ... - Semantic Scholar
1School of Electrical and Computer Engineering. Georgia Institute ... NIST (National Institute of Standards and Technology) has ..... the best procedure to follow.

An Empirical Study on Uncertainty Identification in ... - Semantic Scholar
etc.) as information source to produce or derive interpretations based on them. However, existing uncertainty cues are in- effective in social media context because of its specific characteristics. In this pa- per, we propose a .... ity4 which shares

On Robust Key Agreement Based on Public Key ... - Semantic Scholar
in practice. For example, a mobile user and the desktop computer may hold .... require roughly 1.5L multiplications which include L square operations and 0.5L.

Identification of Parametric Underspread Linear ... - Semantic Scholar
Feb 5, 2011 - W.U. Bajwa is with the Department of Electrical and Computer Engineering, ... 1. Schematic representation of identification of a time-varying linear ..... number of temporal degrees of freedom available for estimating H [8]: N ...... bi

Extension of Linear Channels Identification ... - Semantic Scholar
1Department of Physics, Faculty of Sciences and Technology, Sultan Moulay ... the general case of the non linear quadratic systems identification. ..... eters h(i, i) and without any information of the input selective channel. ..... Phase (degrees).

Identification of Parametric Underspread Linear ... - Semantic Scholar
Feb 5, 2011 - converter; see Fig. 2 for a schematic ... as the Kτ -length vector whose ith element is given by Ai (ejωT ), the DTFT of ai[n]. It can be shown.

Mixin-based Inheritance - Semantic Scholar
Department of Computer Science ... enforces a degree of behavioral consistency between a ... reference, within the object instance being defined. The.

On Knowledge - Semantic Scholar
Rhizomatic Education: Community as Curriculum by Dave Cormier. The truths .... Couros's graduate-level course in educational technology offered at the University of Regina provides an .... Techknowledge: Literate practice and digital worlds.

On Knowledge - Semantic Scholar
Rhizomatic Education: Community as Curriculum .... articles (Nichol 2007). ... Couros's graduate-level course in educational technology offered at the University ...

Identification of potential maintainers and restorers ... - Semantic Scholar
under bagged condition. Potential maintainers were identified as having >90% pollen sterility and

Writer Identification and Verification: A Review - Semantic Scholar
in the database. Most of the present ... reference database in the identification process. From these two ..... Heterogeneous Feature Groups”, Proc. of Int. Conf. on ...

Writer Identification and Verification: A Review - Semantic Scholar
Faculty of Information & Communication Technology ... verification: feature extraction phase, classification phase ... cons of each of the writer identification systems. .... A stroke ending is defined as ..... Handwriting & Develop Computer-Assisted

Field-Effect Tunneling Transistor Based on Vertical ... - Semantic Scholar
Feb 2, 2012 - Page 1. www.sciencemag.org/cgi/content/full/science.1218461/DC1. Supporting Online Material for. Field-Effect Tunneling Transistor ...

MCGP: A Software Synthesis Tool Based on Model ... - Semantic Scholar
Department of Computer Science, Bar Ilan University. Ramat Gan 52900 .... by following the best generated programs, and by navigating through the chain.