Abstract
Automated security is one of the major concerns of modern times. Secure and reliable authentication systems are in great demand. A biometric trait like the finger knuckle print (FKP) of a person is unique and secure. Finger knuckle print is a novel biometric trait and is not explored much for real-time implementation. In this paper, three different algorithms have been proposed based on this trait. The first approach uses Radon transform for feature extraction. Two levels of security are provided here and are based on eigenvalues and the peak points of the Radon graph. In the second approach, Gabor wavelet transform is used for extracting the features. Again, two levels of security are provided based on magnitude values of Gabor wavelet and the peak points of Gabor wavelet graph. The third approach is intended to authenticate a person even if there is a damage in finger knuckle position due to injury. The FKP image is divided into modules and module-wise feature matching is done for authentication. Performance of these algorithms was found to be much better than very few existing works. Moreover, the algorithms are designed so as to implement in real-time system with minimal changes.
Similar content being viewed by others
References
Lingyu, W., Leedham, G.: Near and far infrared imaging for vein pattern biometrics. In: Proceedings of IEEE International Conference on Video and Signal Based Surveillance (AVSS 06), pp. 52–52 (2006)
Jain, A. K., Ross, A. A.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. Special Issue Image Video Based Biometr. 14(1), 4–20 (2004)
Pankanti, S., Prabhakar, S., Jain, A. K.: On the individuality of fingerprints. IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR-2001), pp. 805–812 (2001)
Hegde, C., Prabhu, R., Sagar, D.S., Vishnu Prasad, K., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Authentication of damaged hand vein patterns by modularization. In: Proceedings of IEEE Region 10 Conference (TENCON-2009), November (2009)
Hegde, C., Manu, S., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Secure authentication using image processing and visual cryptography for banking applications. In: Proceedings of 16th International Conference on Advanced Computing (ADCOM 2008), pp. 65–72 (2008)
Boles, W.: A security system based on human iris identification using wavelet transforms. In: Proceedings of First International Conference on Knowledge-Based Intelligent Electronics Systems (1997)
Hegde, C., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Ear pattern recognition using centroids and cross-points for robust authentication. In: Proceedings of 2nd International Conference on Intelligent Human and Computer Interaction (IHCI 2010), pp. 378–384 (2010)
Hegde, C., Prabhu, R., Sagar, D.S., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Human authentication based on ECG waves using Radon transform. In: Proceedings of International Conference Security Technology-Special Session on Biometrics Security and Technology (SecTech-BTS-2010), pp. 197–206 (2010)
Hegde, C., Prabhu, R., Sagar, D.S., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Statistical analysis for human authentication using ECG Waves. In: Proceedings of 5th International Conference Information Systems, Technology and Management (ICISTM-2011), pp. 287–298, (2011)
Chetana, Hegde, Rahul, Prabhu, Deepa, Shenoy P.: Heartbeat biometrics for human authentication. Springer Signal Image Video Process. J. Special Issue Unconstrained Biometr Adv Trends 5(3), 485–493 (2011)
Woodard, D.L., Flynn, P.J.: Finger surface as a biometric identifier. Comput. Vision Image Underst. 100(3), 357–384 (2005)
Ajay, Kumar, Yingbo, Zhou: Personal identification using Finger Knuckle orientation features. Electron. Lett. 45(20), 1–8 (2009)
Ajay, Kumar, Ravikanth, Ch.: Personal authentication using Finger Knuckle surface. IEEE Trans. Inf. Forensics Security 4(1), 98–110 (2009)
Woodard, D.L., Flynn, P.J.: Personal identification utilizing Finger surface features. In: Proceedings of Computer Vision and, Pattern Recognition (CVPR-2005), pp. 1030–1036 (2005)
Ravikanth, Ch., Kumar, A.: Biometric authentication using Finger-back surface. In: Proceedings of Computer Vision and, Pattern Recognition (CVPR-2007), pp. 1–6 (2007)
Zhang, L., Zhang, L., Zhang, D., Zhu, H.: Online Finger knuckle print verification for personal authentication. Pattern Recognit. 43(7), 2560–2571 (2010)
Zhang, L., Zhang, L., Zhang, D.: Finger Knuckle Print: A new biometric identifier. In: Proceedings of IEEE International Conference on Image Processing (2009)
Zhang, L., Zhang, L., Zhang, D.: Finger Knuckle Print verification based on band-limited phase-only correlation. In: Proceedings of 13th International Conference on Computer Analysis of Images and Patterns, pp. 141–148 (2009)
Lin, Zhang, Lei, Zhang, David, Zhang, Hailong, Zhu: Ensemble of local and global information for Finger Knuckle Print recognition. Pattern Recognit. 44(9), 1990–1998 (2011)
PolyU FKP Database, http://www.comp.polyu.edu.hk/biometrics/FKP.htm
Hegde C., Phanindra J., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Human authentication using Finger Knuckle Print. In: Proceedings of ACM, Compute 2011 (2011)
Hegde, C., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: FKP biometrics for human authentication using Gabor wavelets. In: Proceedings of TENCON 2011—IEEE Region10 Conference, pp. 1149–1153 (2011)
Ariyapreechakul, P., Covavisaruch, N.: Personal verification and identification via iris pattern using radon transform. In: Proceedings of First National Conference on Computing and Information Technology, pp. 287–292 (2005)
Loy, G.: Fast computation of the Gabor wavelet transform. In: Proceedings of Digital Image Computing Techniques and Applications (DICTA-2002), pp. 21–27, (2002)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hegde, C., Shenoy, P.D., Venugopal, K.R. et al. Authentication using Finger Knuckle Prints. SIViP 7, 633–645 (2013). https://doi.org/10.1007/s11760-013-0469-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11760-013-0469-7