SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Palmprint Verification using Lagrangian
Decomposition and Invariant Interest Points
Authors: P. Gupta, A. Rattani, D. R. Kisku,
*C. J. Hwang, J. K. Sing
Presented by - C. J. Hwang
Department of Computer Science,
Texas State University,
San Marcos, Texas 78666, U.S.A
25 - 29 April 2011
Orlando World
Center Marriott
Resort & Convention
Center
Orlando, Florida,
USA
Outline of Talk:
• Biometrics
• Palmprint Biometrics
– Hand Geometry
– Palm Characteristics
• Advantages of Palmprint Trait
• Proposed Palmprint Identification System
• ROI Extraction
• Feature Extraction using SIFT
• Palmprint Matching using Graph
• Experimental Results
– CASIA Database
– IIT Kanpur Database
– Results
– Conclusion
Biometrics System:
• Biometrics authentication is a method by which one can
be recognized based on one or more intrinsic physical or
behavioral human characteristics.
Palmprint Biometrics:
• Hand Geometry
– Features: Hand shape and dimensions, finger size
and lengths
• Palm Characteristics
– Features: Principal lines, wrinkles and creases
• Principal lines: Heart line, head line and life line
• Wrinkles: Weaker and irregular lines, much thinner than
principal lines
• Creases: More like fingerprint structure, have ridges and
valleys
Advantages of Palmprint System:
– High distinctiveness
– High permanence
– High performance
– Non – intrusiveness
– Low resolution imaging
– User – friendly
– Low price palmprint devices and low setup cost
– Highly stable
Proposed Palmprint Identification
System:
• ROI [25] is detected and extracted from palm image.
• Uniform intensity distribution is obtained by applying
histogram equalization
• SIFT is applied to the ROI (region of interest) of
palmprint image to extract invariant features
• Palmprint matching is performed using Lagrangian
decomposition and graph matching technique
ROI Extraction:
To extract ROI of palm image the following steps are
followed:
• Convert the palm image to a binary image. Gaussian
smoothing is used to enhance the image.
• Apply boundary-tracking algorithm to obtain the
boundaries of the gaps between the fingers. Since the
ring and the middle fingers are not useful for processing.
Therefore, boundary of the gap between these two
fingers is not extracted.
Contd…..ROI Extraction
• Determine palmprint coordinate system by computing the tangent of
the two gaps with any two points on these gaps. The Y-axis is
considered as the line which joining these two points. To determine
the origin of the coordinate system, midpoint of these two points are
taken through which a line is passing and the line is perpendicular to
the Y-axis.
• Finally, extract ROI for feature extraction which is the central part of
the palmprint.
Feature Extraction using SIFT:
The scale invariant feature transform, called SIFT
descriptor, has been proposed by and proved to be
invariant to image rotation, scaling, partly illumination
changes and projective transform.
The basic idea of the SIFT descriptor is detecting feature
points efficiently through a staged filtering approach that
identifies stable points in the scale-space.
Contd….
Local feature points are extracted from the following steps:
• Scale-space extrema detection: select candidates for
feature points by searching peaks in the scale-space from a
difference of Gaussian (DoG) function
• Keypoint localization: localize the feature points by using
the measurement of their stability
• Orientation assignment: assign orientations based on
local image properties
• Keypoint descriptor: calculate the feature descriptors
which represent local shape distortions and illumination
changes.
Contd….
• Palmprint Image
• Palmprint Image After Applying Histogram Equalization
• SIFT Features Extraction from Enhanced Palmprint
Image.
50 100 150 200 250 300
50
100
150
200
250
Palmprint Matching using Lagrangian
Network Graph:
Problem formulation:
• Let G1 and G2 be two graphs obtained from a pair of palmprint images after
having extracted SIFT features
• A permutation matrix is determined from the pair of graphs and this
permutation matrix is used to minimize the distance between these graphs.
• Permutation matrix is a zero-one matrix whose rows and columns sum to
one. Rows and columns can add up to one or zero.
• In the deterministic annealing framework, permutation matrix constraints
can be formulated. The rows and columns constraints are known as winner-
take-alls (WTAs).
• The proposed approach gets inspired by Lagrangian decomposition
approach in which the rows and columns constraints are satisfied
separately by Lagrange multipliers which are used to equate the two
solutions.
Contd….
• Let us consider, G1x1y1 and G2x2y2 are the two adjacency matrices of
two graphs G1(V,E) and G2(V,E), respectively. Now, a permutation
matrix M will be determined which will minimize the distance between
the two graphs.
• The adjacency matrices of the two undirected graphs can be
represented as symmetric and sparse matrices with zero diagonal
entries.
• The problem can be defined as follows
∑ ∑ ∑ 







−
21
2
1 2
22211111 21min
xx y y
xyyxxyyx
M
GMMG
∑ ∑ ==
1 2
2121 1,1
x x
xxxx MM
Contd….
• The match matrix M contained in the distance measure must satisfy
the permutation matrix constraints. In addition to these constraints it
also includes row and column WTAs
∑ ∑ ==
1 2
2121 )1,1(
x x
xxxx MandM
• Let us consider two match matrices are given as and
which have the following properties,
)1(
21xxM
)2(
21xxM
∑ ∑ ==
1 2
2121 1,1
x x
xxxx MandM
• In the given constrains these properties are always satisfied. The
properties given in above equation can be established by taking a
new objective which is given by
∑ ∑∑ 







−=
21
2
2
22
)2(
21
1
)1(
2111
)2()1(
,
21),(min )2()1(
xx y
xyyx
y
xyyx
MM
GMMGMMD
Contd….
subject to
• The constraint given in the above equation can be established using
a Lagrange parameter λ.
• Finally, the distance is compared with a predefined threshold and
accordingly decision of acceptance or rejection is made.
)2(
21
)1(
21 xxxx MM =
Evaluation: Databases
• CASIA Database
– 5502 palmprint images / 312 subjects
– Left and right palms
– 8-bit gray scale JPEG images
– Taken with uniform-colored background
– Uniform distributed illumination
– Normalized to 150×150 pixels
• IIT Kanpur Database
– 800 palmprint images / 400 subjects
– Resolution is set to 200 dpi
– Images are rotated by at most ±35 degree
– Images are normalized to 150×150 pixels
Contd….Experimental Results
Table 1. FRR, FAR and Recognition Rates Determined on CASIA
and IIT Kanpur Databases
97.140.984.73IIT Kanpur
Database
95.82.396.01CASIA
Database
RECOGNITION RATE
(%)
FAR (%)FRR (%)DATABASE
Conclusion:
• In this paper, a palmprint based verification system using SIFT
features and Lagrangian network graph technique has been
proposed.
• Region of interest (ROI) has been extracted from the wide palm
texture at the preprocessing stage and histogram equalization
technique is applied to palmprint image for obtaining uniform
intensity.
• At the next stage, SIFT feature extraction is performed on palmprint
image, whereas only the ROI is considered for invariant points
extraction.
• Finally, identity is established by finding permutation matrix for a pair
of reference and probe palm graphs drawn on extracted SIFT
features. Permutation matrix is used to minimize the distance
between two graphs.
• The experimental results computed on CASIA and IITK palmprint
databases show the effectiveness and the robustness of the
proposed system.
References:
[1] Zhang, L., and Zhang, D., “Characterization of palmprints by wavelet signatures via directional context
modeling,” IEEE Transactions on Systems, Man and Cybernetics – B, 34(3), 1335 – 1347 (2004).
[2] Zhang, D., Kong, W. K., You, J., and Wong, M., “On-line palmprint identification,” IEEE Transactions on Pattern
Analysis and Machine Intelligence, 25, 1041 – 1050 (2003).
[3] Han, C. C., Cheng, H. L., Lin, C. L., and Fan, K. C., “Personal authentication using palmprint features,” Pattern
Recognition 36(2), 371 – 381 (2003).
[4] Lowe, D., “Distinctive image features from scale-invariant keypoints,” International Journal of Computer Vision,
60(2), 91 – 110 (2004).
[5] Christmas, W, J., Kittler, J., and Petrou, M., “Structural matching in computer vision using probabilistic
relaxation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 17, 749 – 764 (1995).
[6] Kong, W., and Zhang, D., “Feature-level fusion for effective palmprint authentication,” In: Zhang, D., Jain, A.K.
(eds.) ICBA 2004 LNCS, 3072, 761 – 767 (2004).
[7] Kisku, D. R., Gupta, P., and Sing, J. K., "Feature level fusion of face and palmprint biometrics by isomorphic
graph-based improved K-medoids partitioning," 4th International Conference on Information Security and
Assurance Lecture Notes in Computer Science, 6059, 70 – 81 (2010).
[8] Han, Y.F., Sun, Z.N., and Tan, T.N., “Palmprint recognition based on directional features and graph matching,”
International Conference on Biometrics, LNCS, 4642, 1164 – 1173 (2007).
[9] Jain, A. K., and Jianjiang, F., “Latent palmprint matching,” IEEE Transactions on Pattern Analysis and Machine
Intelligence, 31(6), 1032 – 1047 (2009)
[10] Kostin, A., Kittler, J., and Christmas, W. J., “Object recognition by symmetrised graph matching using relaxation
labelling with an inhibitory mechanism,” Pattern Recognition Letters, 26(3), 381 - 393 (2005)
[11] Gold, S., and Rangarajan, A., “A graduated assignment algorithm for graph matching,” IEEE Transactions on
Pattern Analysis and Machine Intelligence, 18(4), 377–388 (1996).
[12] Ullman, J. R., “An algorithm for subgraph isomorphism,” Journal of ACM, 23(1), 31 – 42 (1976).
[13] Jornsten, K., and Nasberg, M., “A new Lagrangian relaxation approach to the generalized assignment problem,”
European Journal of Operational Research, 27, 313 – 323 (1986).
[14] Guignard, M., and Kim, S., “Lagrangean decomposition: A model yielding stronger Lagrangian bounds,”
Mathematical Programming, 39, 215 – 228 (1987).
Questions ???
Thank You !!!
Contact Author: drkisku@ieee.orgContact Author: drkisku@ieee.orgContact Author: drkisku@ieee.orgContact Author: drkisku@ieee.org

Mais conteúdo relacionado

Mais procurados

Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...CSCJournals
 
A Novel Approach for Moving Object Detection from Dynamic Background
A Novel Approach for Moving Object Detection from Dynamic BackgroundA Novel Approach for Moving Object Detection from Dynamic Background
A Novel Approach for Moving Object Detection from Dynamic BackgroundIJERA Editor
 
Automatic Image Segmentation Using Wavelet Transform Based On Normalized Gra...
Automatic Image Segmentation Using Wavelet Transform Based  On Normalized Gra...Automatic Image Segmentation Using Wavelet Transform Based  On Normalized Gra...
Automatic Image Segmentation Using Wavelet Transform Based On Normalized Gra...IJMER
 
A comparative study of dimension reduction methods combined with wavelet tran...
A comparative study of dimension reduction methods combined with wavelet tran...A comparative study of dimension reduction methods combined with wavelet tran...
A comparative study of dimension reduction methods combined with wavelet tran...ijcsit
 
Change Detection of Water-Body in Synthetic Aperture Radar Images
Change Detection of Water-Body in Synthetic Aperture Radar ImagesChange Detection of Water-Body in Synthetic Aperture Radar Images
Change Detection of Water-Body in Synthetic Aperture Radar ImagesCSCJournals
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014SondosFadl
 
Image Registration
Image RegistrationImage Registration
Image RegistrationAngu Ramesh
 
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...IOSR Journals
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologiesijsrd.com
 
Image classification in remote sensing
Image classification in remote sensingImage classification in remote sensing
Image classification in remote sensingAlexander Decker
 
Wavelet Transform based Medical Image Fusion With different fusion methods
Wavelet Transform based Medical Image Fusion With different fusion methodsWavelet Transform based Medical Image Fusion With different fusion methods
Wavelet Transform based Medical Image Fusion With different fusion methodsIJERA Editor
 
V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1KARTHIKEYAN V
 
Local Phase Oriented Structure Tensor To Segment Texture Images With Intensit...
Local Phase Oriented Structure Tensor To Segment Texture Images With Intensit...Local Phase Oriented Structure Tensor To Segment Texture Images With Intensit...
Local Phase Oriented Structure Tensor To Segment Texture Images With Intensit...CSCJournals
 
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainSondosFadl
 

Mais procurados (19)

Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
 
A Novel Approach for Moving Object Detection from Dynamic Background
A Novel Approach for Moving Object Detection from Dynamic BackgroundA Novel Approach for Moving Object Detection from Dynamic Background
A Novel Approach for Moving Object Detection from Dynamic Background
 
Automatic Image Segmentation Using Wavelet Transform Based On Normalized Gra...
Automatic Image Segmentation Using Wavelet Transform Based  On Normalized Gra...Automatic Image Segmentation Using Wavelet Transform Based  On Normalized Gra...
Automatic Image Segmentation Using Wavelet Transform Based On Normalized Gra...
 
A comparative study of dimension reduction methods combined with wavelet tran...
A comparative study of dimension reduction methods combined with wavelet tran...A comparative study of dimension reduction methods combined with wavelet tran...
A comparative study of dimension reduction methods combined with wavelet tran...
 
Change Detection of Water-Body in Synthetic Aperture Radar Images
Change Detection of Water-Body in Synthetic Aperture Radar ImagesChange Detection of Water-Body in Synthetic Aperture Radar Images
Change Detection of Water-Body in Synthetic Aperture Radar Images
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
 
Image Registration
Image RegistrationImage Registration
Image Registration
 
3 video segmentation
3 video segmentation3 video segmentation
3 video segmentation
 
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
 
Image classification in remote sensing
Image classification in remote sensingImage classification in remote sensing
Image classification in remote sensing
 
Wavelet Transform based Medical Image Fusion With different fusion methods
Wavelet Transform based Medical Image Fusion With different fusion methodsWavelet Transform based Medical Image Fusion With different fusion methods
Wavelet Transform based Medical Image Fusion With different fusion methods
 
D45012128
D45012128D45012128
D45012128
 
V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1
 
Local Phase Oriented Structure Tensor To Segment Texture Images With Intensit...
Local Phase Oriented Structure Tensor To Segment Texture Images With Intensit...Local Phase Oriented Structure Tensor To Segment Texture Images With Intensit...
Local Phase Oriented Structure Tensor To Segment Texture Images With Intensit...
 
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
 
B49010511
B49010511B49010511
B49010511
 
I04302068075
I04302068075I04302068075
I04302068075
 
Pd3426592664
Pd3426592664Pd3426592664
Pd3426592664
 

Destaque

1530 girls in-industry
1530 girls in-industry1530 girls in-industry
1530 girls in-industrycosmicnet
 
1 s2.0-s0022369702003566-main
1 s2.0-s0022369702003566-main1 s2.0-s0022369702003566-main
1 s2.0-s0022369702003566-maintonamiry
 
โครงร่างโครงงาน
โครงร่างโครงงานโครงร่างโครงงาน
โครงร่างโครงงานAngkana Potha
 
Website may25latest
Website may25latestWebsite may25latest
Website may25latestnfindelicato
 
Gli italiani "social" e le marche - Fotografia di uno scenario
Gli italiani "social" e le marche - Fotografia di uno scenarioGli italiani "social" e le marche - Fotografia di uno scenario
Gli italiani "social" e le marche - Fotografia di uno scenarioInnexa
 
Truzim meslek-lisesi
Truzim meslek-lisesiTruzim meslek-lisesi
Truzim meslek-lisesizeynep_zyn85
 
Gianfranco rondon personas en tu vida
Gianfranco rondon personas en tu vidaGianfranco rondon personas en tu vida
Gianfranco rondon personas en tu vidaGianfranco Rondon
 
The British Backgammon Awards 2012
The British Backgammon Awards 2012The British Backgammon Awards 2012
The British Backgammon Awards 2012stw672
 
Dominate paola galvisss
Dominate paola galvisssDominate paola galvisss
Dominate paola galvisssPATHICO
 
Academi militar
Academi militarAcademi militar
Academi militarbyron18
 
Stopping by the woods on a snowy evening(World Literature)
Stopping by the woods on a snowy evening(World Literature)Stopping by the woods on a snowy evening(World Literature)
Stopping by the woods on a snowy evening(World Literature)Sarah Cruz
 

Destaque (16)

Tejolisboa3
Tejolisboa3Tejolisboa3
Tejolisboa3
 
1530 girls in-industry
1530 girls in-industry1530 girls in-industry
1530 girls in-industry
 
1 s2.0-s0022369702003566-main
1 s2.0-s0022369702003566-main1 s2.0-s0022369702003566-main
1 s2.0-s0022369702003566-main
 
โครงร่างโครงงาน
โครงร่างโครงงานโครงร่างโครงงาน
โครงร่างโครงงาน
 
Website may25latest
Website may25latestWebsite may25latest
Website may25latest
 
Gli italiani "social" e le marche - Fotografia di uno scenario
Gli italiani "social" e le marche - Fotografia di uno scenarioGli italiani "social" e le marche - Fotografia di uno scenario
Gli italiani "social" e le marche - Fotografia di uno scenario
 
Truzim meslek-lisesi
Truzim meslek-lisesiTruzim meslek-lisesi
Truzim meslek-lisesi
 
Gianfranco rondon personas en tu vida
Gianfranco rondon personas en tu vidaGianfranco rondon personas en tu vida
Gianfranco rondon personas en tu vida
 
aya ueto
aya uetoaya ueto
aya ueto
 
Biomedigala dimarts
Biomedigala dimartsBiomedigala dimarts
Biomedigala dimarts
 
Brand U - Session 1
Brand U - Session 1Brand U - Session 1
Brand U - Session 1
 
The British Backgammon Awards 2012
The British Backgammon Awards 2012The British Backgammon Awards 2012
The British Backgammon Awards 2012
 
Dominate paola galvisss
Dominate paola galvisssDominate paola galvisss
Dominate paola galvisss
 
n0bisuke Isltm10
n0bisuke Isltm10n0bisuke Isltm10
n0bisuke Isltm10
 
Academi militar
Academi militarAcademi militar
Academi militar
 
Stopping by the woods on a snowy evening(World Literature)
Stopping by the woods on a snowy evening(World Literature)Stopping by the woods on a snowy evening(World Literature)
Stopping by the woods on a snowy evening(World Literature)
 

Semelhante a Palmprint verification using lagrangian decomposition and invariant interest

Successive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionSuccessive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionDr. Vinayak Bharadi
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171Yaxin Liu
 
Improved Characters Feature Extraction and Matching Algorithm Based on SIFT
Improved Characters Feature Extraction and Matching Algorithm Based on SIFTImproved Characters Feature Extraction and Matching Algorithm Based on SIFT
Improved Characters Feature Extraction and Matching Algorithm Based on SIFTNooria Sukmaningtyas
 
IRJET-Computer Aided Touchless Palmprint Recognition Using Sift
IRJET-Computer Aided Touchless Palmprint Recognition Using SiftIRJET-Computer Aided Touchless Palmprint Recognition Using Sift
IRJET-Computer Aided Touchless Palmprint Recognition Using SiftIRJET Journal
 
Face recognition by multimodal and multi algorithmic feature fusion of hybrid...
Face recognition by multimodal and multi algorithmic feature fusion of hybrid...Face recognition by multimodal and multi algorithmic feature fusion of hybrid...
Face recognition by multimodal and multi algorithmic feature fusion of hybrid...Dr. Vinayak Bharadi
 
journal paper publication
journal paper publicationjournal paper publication
journal paper publicationrikaseorika
 
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...ijcsit
 
Visual diagnostics for more effective machine learning
Visual diagnostics for more effective machine learningVisual diagnostics for more effective machine learning
Visual diagnostics for more effective machine learningBenjamin Bengfort
 
Linearity of Feature Extraction Techniques for Medical Images by using Scale ...
Linearity of Feature Extraction Techniques for Medical Images by using Scale ...Linearity of Feature Extraction Techniques for Medical Images by using Scale ...
Linearity of Feature Extraction Techniques for Medical Images by using Scale ...ijtsrd
 
An fpga based efficient fruit recognition system using minimum
An fpga based efficient fruit recognition system using minimumAn fpga based efficient fruit recognition system using minimum
An fpga based efficient fruit recognition system using minimumAlexander Decker
 
Ear Biometrics shritosh kumar
Ear Biometrics shritosh kumarEar Biometrics shritosh kumar
Ear Biometrics shritosh kumarshritosh kumar
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELD
FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELDFINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELD
FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELDijesajournal
 
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”Er. Arpit Sharma
 
Intelligent Auto Horn System Using Artificial Intelligence
Intelligent Auto Horn System Using Artificial IntelligenceIntelligent Auto Horn System Using Artificial Intelligence
Intelligent Auto Horn System Using Artificial IntelligenceIRJET Journal
 
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...IRJET Journal
 
Gesture recognition system
Gesture recognition systemGesture recognition system
Gesture recognition systemeSAT Journals
 

Semelhante a Palmprint verification using lagrangian decomposition and invariant interest (20)

Palmprint Identification Using FRIT
Palmprint Identification Using FRITPalmprint Identification Using FRIT
Palmprint Identification Using FRIT
 
Successive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionSuccessive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature Recognition
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171
 
Improved Characters Feature Extraction and Matching Algorithm Based on SIFT
Improved Characters Feature Extraction and Matching Algorithm Based on SIFTImproved Characters Feature Extraction and Matching Algorithm Based on SIFT
Improved Characters Feature Extraction and Matching Algorithm Based on SIFT
 
IRJET-Computer Aided Touchless Palmprint Recognition Using Sift
IRJET-Computer Aided Touchless Palmprint Recognition Using SiftIRJET-Computer Aided Touchless Palmprint Recognition Using Sift
IRJET-Computer Aided Touchless Palmprint Recognition Using Sift
 
Face recognition by multimodal and multi algorithmic feature fusion of hybrid...
Face recognition by multimodal and multi algorithmic feature fusion of hybrid...Face recognition by multimodal and multi algorithmic feature fusion of hybrid...
Face recognition by multimodal and multi algorithmic feature fusion of hybrid...
 
journal paper publication
journal paper publicationjournal paper publication
journal paper publication
 
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
 
Visual diagnostics for more effective machine learning
Visual diagnostics for more effective machine learningVisual diagnostics for more effective machine learning
Visual diagnostics for more effective machine learning
 
E017443136
E017443136E017443136
E017443136
 
Linearity of Feature Extraction Techniques for Medical Images by using Scale ...
Linearity of Feature Extraction Techniques for Medical Images by using Scale ...Linearity of Feature Extraction Techniques for Medical Images by using Scale ...
Linearity of Feature Extraction Techniques for Medical Images by using Scale ...
 
An fpga based efficient fruit recognition system using minimum
An fpga based efficient fruit recognition system using minimumAn fpga based efficient fruit recognition system using minimum
An fpga based efficient fruit recognition system using minimum
 
Ear Biometrics shritosh kumar
Ear Biometrics shritosh kumarEar Biometrics shritosh kumar
Ear Biometrics shritosh kumar
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELD
FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELDFINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELD
FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELD
 
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
 
Intelligent Auto Horn System Using Artificial Intelligence
Intelligent Auto Horn System Using Artificial IntelligenceIntelligent Auto Horn System Using Artificial Intelligence
Intelligent Auto Horn System Using Artificial Intelligence
 
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
 
Gesture recognition system
Gesture recognition systemGesture recognition system
Gesture recognition system
 

Último

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Palmprint verification using lagrangian decomposition and invariant interest

  • 1. Palmprint Verification using Lagrangian Decomposition and Invariant Interest Points Authors: P. Gupta, A. Rattani, D. R. Kisku, *C. J. Hwang, J. K. Sing Presented by - C. J. Hwang Department of Computer Science, Texas State University, San Marcos, Texas 78666, U.S.A 25 - 29 April 2011 Orlando World Center Marriott Resort & Convention Center Orlando, Florida, USA
  • 2. Outline of Talk: • Biometrics • Palmprint Biometrics – Hand Geometry – Palm Characteristics • Advantages of Palmprint Trait • Proposed Palmprint Identification System • ROI Extraction • Feature Extraction using SIFT • Palmprint Matching using Graph • Experimental Results – CASIA Database – IIT Kanpur Database – Results – Conclusion
  • 3. Biometrics System: • Biometrics authentication is a method by which one can be recognized based on one or more intrinsic physical or behavioral human characteristics.
  • 4. Palmprint Biometrics: • Hand Geometry – Features: Hand shape and dimensions, finger size and lengths • Palm Characteristics – Features: Principal lines, wrinkles and creases • Principal lines: Heart line, head line and life line • Wrinkles: Weaker and irregular lines, much thinner than principal lines • Creases: More like fingerprint structure, have ridges and valleys
  • 5. Advantages of Palmprint System: – High distinctiveness – High permanence – High performance – Non – intrusiveness – Low resolution imaging – User – friendly – Low price palmprint devices and low setup cost – Highly stable
  • 6. Proposed Palmprint Identification System: • ROI [25] is detected and extracted from palm image. • Uniform intensity distribution is obtained by applying histogram equalization • SIFT is applied to the ROI (region of interest) of palmprint image to extract invariant features • Palmprint matching is performed using Lagrangian decomposition and graph matching technique
  • 7. ROI Extraction: To extract ROI of palm image the following steps are followed: • Convert the palm image to a binary image. Gaussian smoothing is used to enhance the image. • Apply boundary-tracking algorithm to obtain the boundaries of the gaps between the fingers. Since the ring and the middle fingers are not useful for processing. Therefore, boundary of the gap between these two fingers is not extracted.
  • 8. Contd…..ROI Extraction • Determine palmprint coordinate system by computing the tangent of the two gaps with any two points on these gaps. The Y-axis is considered as the line which joining these two points. To determine the origin of the coordinate system, midpoint of these two points are taken through which a line is passing and the line is perpendicular to the Y-axis. • Finally, extract ROI for feature extraction which is the central part of the palmprint.
  • 9. Feature Extraction using SIFT: The scale invariant feature transform, called SIFT descriptor, has been proposed by and proved to be invariant to image rotation, scaling, partly illumination changes and projective transform. The basic idea of the SIFT descriptor is detecting feature points efficiently through a staged filtering approach that identifies stable points in the scale-space.
  • 10. Contd…. Local feature points are extracted from the following steps: • Scale-space extrema detection: select candidates for feature points by searching peaks in the scale-space from a difference of Gaussian (DoG) function • Keypoint localization: localize the feature points by using the measurement of their stability • Orientation assignment: assign orientations based on local image properties • Keypoint descriptor: calculate the feature descriptors which represent local shape distortions and illumination changes.
  • 11. Contd…. • Palmprint Image • Palmprint Image After Applying Histogram Equalization • SIFT Features Extraction from Enhanced Palmprint Image. 50 100 150 200 250 300 50 100 150 200 250
  • 12. Palmprint Matching using Lagrangian Network Graph: Problem formulation: • Let G1 and G2 be two graphs obtained from a pair of palmprint images after having extracted SIFT features • A permutation matrix is determined from the pair of graphs and this permutation matrix is used to minimize the distance between these graphs. • Permutation matrix is a zero-one matrix whose rows and columns sum to one. Rows and columns can add up to one or zero. • In the deterministic annealing framework, permutation matrix constraints can be formulated. The rows and columns constraints are known as winner- take-alls (WTAs). • The proposed approach gets inspired by Lagrangian decomposition approach in which the rows and columns constraints are satisfied separately by Lagrange multipliers which are used to equate the two solutions.
  • 13. Contd…. • Let us consider, G1x1y1 and G2x2y2 are the two adjacency matrices of two graphs G1(V,E) and G2(V,E), respectively. Now, a permutation matrix M will be determined which will minimize the distance between the two graphs. • The adjacency matrices of the two undirected graphs can be represented as symmetric and sparse matrices with zero diagonal entries. • The problem can be defined as follows ∑ ∑ ∑         − 21 2 1 2 22211111 21min xx y y xyyxxyyx M GMMG ∑ ∑ == 1 2 2121 1,1 x x xxxx MM
  • 14. Contd…. • The match matrix M contained in the distance measure must satisfy the permutation matrix constraints. In addition to these constraints it also includes row and column WTAs ∑ ∑ == 1 2 2121 )1,1( x x xxxx MandM • Let us consider two match matrices are given as and which have the following properties, )1( 21xxM )2( 21xxM ∑ ∑ == 1 2 2121 1,1 x x xxxx MandM • In the given constrains these properties are always satisfied. The properties given in above equation can be established by taking a new objective which is given by ∑ ∑∑         −= 21 2 2 22 )2( 21 1 )1( 2111 )2()1( , 21),(min )2()1( xx y xyyx y xyyx MM GMMGMMD
  • 15. Contd…. subject to • The constraint given in the above equation can be established using a Lagrange parameter λ. • Finally, the distance is compared with a predefined threshold and accordingly decision of acceptance or rejection is made. )2( 21 )1( 21 xxxx MM =
  • 16. Evaluation: Databases • CASIA Database – 5502 palmprint images / 312 subjects – Left and right palms – 8-bit gray scale JPEG images – Taken with uniform-colored background – Uniform distributed illumination – Normalized to 150×150 pixels • IIT Kanpur Database – 800 palmprint images / 400 subjects – Resolution is set to 200 dpi – Images are rotated by at most ±35 degree – Images are normalized to 150×150 pixels
  • 17. Contd….Experimental Results Table 1. FRR, FAR and Recognition Rates Determined on CASIA and IIT Kanpur Databases 97.140.984.73IIT Kanpur Database 95.82.396.01CASIA Database RECOGNITION RATE (%) FAR (%)FRR (%)DATABASE
  • 18. Conclusion: • In this paper, a palmprint based verification system using SIFT features and Lagrangian network graph technique has been proposed. • Region of interest (ROI) has been extracted from the wide palm texture at the preprocessing stage and histogram equalization technique is applied to palmprint image for obtaining uniform intensity. • At the next stage, SIFT feature extraction is performed on palmprint image, whereas only the ROI is considered for invariant points extraction. • Finally, identity is established by finding permutation matrix for a pair of reference and probe palm graphs drawn on extracted SIFT features. Permutation matrix is used to minimize the distance between two graphs. • The experimental results computed on CASIA and IITK palmprint databases show the effectiveness and the robustness of the proposed system.
  • 19. References: [1] Zhang, L., and Zhang, D., “Characterization of palmprints by wavelet signatures via directional context modeling,” IEEE Transactions on Systems, Man and Cybernetics – B, 34(3), 1335 – 1347 (2004). [2] Zhang, D., Kong, W. K., You, J., and Wong, M., “On-line palmprint identification,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 25, 1041 – 1050 (2003). [3] Han, C. C., Cheng, H. L., Lin, C. L., and Fan, K. C., “Personal authentication using palmprint features,” Pattern Recognition 36(2), 371 – 381 (2003). [4] Lowe, D., “Distinctive image features from scale-invariant keypoints,” International Journal of Computer Vision, 60(2), 91 – 110 (2004). [5] Christmas, W, J., Kittler, J., and Petrou, M., “Structural matching in computer vision using probabilistic relaxation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 17, 749 – 764 (1995). [6] Kong, W., and Zhang, D., “Feature-level fusion for effective palmprint authentication,” In: Zhang, D., Jain, A.K. (eds.) ICBA 2004 LNCS, 3072, 761 – 767 (2004). [7] Kisku, D. R., Gupta, P., and Sing, J. K., "Feature level fusion of face and palmprint biometrics by isomorphic graph-based improved K-medoids partitioning," 4th International Conference on Information Security and Assurance Lecture Notes in Computer Science, 6059, 70 – 81 (2010). [8] Han, Y.F., Sun, Z.N., and Tan, T.N., “Palmprint recognition based on directional features and graph matching,” International Conference on Biometrics, LNCS, 4642, 1164 – 1173 (2007). [9] Jain, A. K., and Jianjiang, F., “Latent palmprint matching,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 31(6), 1032 – 1047 (2009) [10] Kostin, A., Kittler, J., and Christmas, W. J., “Object recognition by symmetrised graph matching using relaxation labelling with an inhibitory mechanism,” Pattern Recognition Letters, 26(3), 381 - 393 (2005) [11] Gold, S., and Rangarajan, A., “A graduated assignment algorithm for graph matching,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 18(4), 377–388 (1996). [12] Ullman, J. R., “An algorithm for subgraph isomorphism,” Journal of ACM, 23(1), 31 – 42 (1976). [13] Jornsten, K., and Nasberg, M., “A new Lagrangian relaxation approach to the generalized assignment problem,” European Journal of Operational Research, 27, 313 – 323 (1986). [14] Guignard, M., and Kim, S., “Lagrangean decomposition: A model yielding stronger Lagrangian bounds,” Mathematical Programming, 39, 215 – 228 (1987).
  • 21. Thank You !!! Contact Author: drkisku@ieee.orgContact Author: drkisku@ieee.orgContact Author: drkisku@ieee.orgContact Author: drkisku@ieee.org