Skip to main content
Top

2019 | OriginalPaper | Chapter

Secured Human Authentication Using Finger-Vein Patterns

Authors : M. V. Madhusudhan, R. Basavaraju, Chetana Hegde

Published in: Data Management, Analytics and Innovation

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In any organization, providing a secured authentication system is a challenge. Here, we propose a secured authentication process using finger-vein patterns. Finger vein is a reliable biometric trait because of its distinctiveness and permanence properties. The proposed algorithm initially captures the finger-vein image and is preprocessed using Gaussian blur and morphological operations. Then features like number of corner points and the location of these corner points are extracted. The features fetched for an individual from database are compared against the extracted features. If the comparison satisfies predefined threshold value, then the authentication is successful. The simulation results of the proposed algorithm have produced the FAR as 2.78%, FRR as 0.09% and the overall performance as 99.96%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lingyu, W., & Leedham, G. (2006). Near and far infrared imaging for vein pattern biometrics. In IEEE International Conference on Video and Signal Based Surveillance (AVSS 06) (p. 52). Lingyu, W., & Leedham, G. (2006). Near and far infrared imaging for vein pattern biometrics. In IEEE International Conference on Video and Signal Based Surveillance (AVSS 06) (p. 52).
2.
go back to reference Hegde, C., et al. (2011). FKP biometrics for human authentication using Gabor wavelets. In Proceedings of International Conference IEEE—TENCON 2011 (pp. 1072–1076). Bali, Indonesia. Hegde, C., et al. (2011). FKP biometrics for human authentication using Gabor wavelets. In Proceedings of International Conference IEEE—TENCON 2011 (pp. 1072–1076). Bali, Indonesia.
3.
go back to reference Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and System, 14(1), 4–20. Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and System, 14(1), 4–20.
4.
go back to reference Hegde, C., et al. (2009). Authentication of damaged hand-vein patterns by modularization. In Proceedings of International conference IEEE TENCON-2009 (pp. 1–6), Singapore. Hegde, C., et al. (2009). Authentication of damaged hand-vein patterns by modularization. In Proceedings of International conference IEEE TENCON-2009 (pp. 1–6), Singapore.
5.
go back to reference Liang, B., et. al. (2014). A novel fingerprint-based biometric encryption. In Proceedings of International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). Liang, B., et. al. (2014). A novel fingerprint-based biometric encryption. In Proceedings of International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
6.
go back to reference Yuan, L., Mu, Z., & Xu, Z. (2005, October). Using ear biometrics for personal recognition. In International Workshop on Biometric Recognition Systems, IWBRS2005 (pp. 221–228), Beijing, China. Yuan, L., Mu, Z., & Xu, Z. (2005, October). Using ear biometrics for personal recognition. In International Workshop on Biometric Recognition Systems, IWBRS2005 (pp. 221–228), Beijing, China.
7.
go back to reference Hegde, C., et al. (2011). Heartbeat biometrics for human authentication. Signal, Image and Video Processing Journal, Special Issue on Unconstrained Biometrics: Advances and Trends, 5(3), 485–493. ISSN 1863-1703. Hegde, C., et al. (2011). Heartbeat biometrics for human authentication. Signal, Image and Video Processing Journal, Special Issue on Unconstrained Biometrics: Advances and Trends, 5(3), 485–493. ISSN 1863-1703.
8.
go back to reference Singh, Y. N., & Gupta, P. (2009). Biometrics method for human identification using electrocardiogram. In M. Tistarelli, M. S. Nixon (Eds.), ICB 2009 (LNCS, Vol. 5558, pp. 1270–1279). Springer, Heidelberg. Singh, Y. N., & Gupta, P. (2009). Biometrics method for human identification using electrocardiogram. In M. Tistarelli, M. S. Nixon (Eds.), ICB 2009 (LNCS, Vol. 5558, pp. 1270–1279). Springer, Heidelberg.
9.
go back to reference Simon, B. P., & Eswaran, C. (1997). An ECG classifier designed using modified decision based neural network. Computers and Biomedical Research, 30, 257–272.CrossRef Simon, B. P., & Eswaran, C. (1997). An ECG classifier designed using modified decision based neural network. Computers and Biomedical Research, 30, 257–272.CrossRef
10.
go back to reference Zhang, L., Zhang, L., & Zhang, D. (2009). Finger-knuckle-print: A new biometric identifier. In Proceedings of IEEE International Conference on Image Processing. Zhang, L., Zhang, L., & Zhang, D. (2009). Finger-knuckle-print: A new biometric identifier. In Proceedings of IEEE International Conference on Image Processing.
11.
go back to reference Hegde, C., et al. (2013). Authentication using Finger Knuckle Prints. Signal, Image and Video Processing Journal, Special Issue on Image and Video Processing for Security, 7(4), 633–645. ISSN 1863-1703. Hegde, C., et al. (2013). Authentication using Finger Knuckle Prints. Signal, Image and Video Processing Journal, Special Issue on Image and Video Processing for Security, 7(4), 633–645. ISSN 1863-1703.
12.
go back to reference Miura, N., & Nagasaka, A. (2004). Feature extraction of finger-vein pattern based on repeated line tracking and its application to personal identification. Machine Vision and Applications, 15(4), 194–203.CrossRef Miura, N., & Nagasaka, A. (2004). Feature extraction of finger-vein pattern based on repeated line tracking and its application to personal identification. Machine Vision and Applications, 15(4), 194–203.CrossRef
13.
go back to reference Miura, N., Nagasaka, A., & Miyatake, T. (2007). Extraction of finger-vein patterns using maximum curvature points in image profiles. IEICE Transactions on Information and Systems, E90-D(8), 1185–1194. Miura, N., Nagasaka, A., & Miyatake, T. (2007). Extraction of finger-vein patterns using maximum curvature points in image profiles. IEICE Transactions on Information and Systems, E90-D(8), 1185–1194.
14.
go back to reference Kumar, A., & Zhou, Y. B. (2012). Human identification using finger images. IEEE Transactions on Image Process, 21(4), 2228–2244.MathSciNetCrossRef Kumar, A., & Zhou, Y. B. (2012). Human identification using finger images. IEEE Transactions on Image Process, 21(4), 2228–2244.MathSciNetCrossRef
15.
go back to reference Song, W., Kim, T., Kim, H. C., Choi, J. H., Kong, H. J., & Lee, S. R. (2011). A finger-vein verification system using mean curvature. Pattern Recognition Letter, 32(11), 1541–1547.CrossRef Song, W., Kim, T., Kim, H. C., Choi, J. H., Kong, H. J., & Lee, S. R. (2011). A finger-vein verification system using mean curvature. Pattern Recognition Letter, 32(11), 1541–1547.CrossRef
16.
go back to reference Qin, H. F., Yu, C. B., & Qin, L. (2011). Region growth–based feature extraction method for finger-vein recognition. Optical Engineering, 50(5), 057208–057208. Qin, H. F., Yu, C. B., & Qin, L. (2011). Region growth–based feature extraction method for finger-vein recognition. Optical Engineering, 50(5), 057208–057208.
17.
go back to reference Lee, E. C., & Park, K. R. (2009). Restoration method of skin scattering blurred vein image for finger vein recognition. Electronics Letters, 45(21), 1074–1076. Lee, E. C., & Park, K. R. (2009). Restoration method of skin scattering blurred vein image for finger vein recognition. Electronics Letters, 45(21), 1074–1076.
18.
go back to reference Liu, T., Xie, J. B., Yan, W., Li, P. Q., & Lu, H. Z. (2013). An algorithm for finger-vein segmentation based on modified repeated line tracking. The Imaging Science Journal, 61(6), 491–502.CrossRef Liu, T., Xie, J. B., Yan, W., Li, P. Q., & Lu, H. Z. (2013). An algorithm for finger-vein segmentation based on modified repeated line tracking. The Imaging Science Journal, 61(6), 491–502.CrossRef
19.
go back to reference Wu, J.-D., & Ye, S.-H. (2009). Driver identification using finger-vein patterns with Radon transform and neural network. Expert Systems and Application, 36(3), 5793–5799. Wu, J.-D., & Ye, S.-H. (2009). Driver identification using finger-vein patterns with Radon transform and neural network. Expert Systems and Application, 36(3), 5793–5799.
20.
go back to reference Kono, M., Ueki, H., & Umemura, S. (2002). Near-infrared finger vein patterns for personal identification. Applied Optics, 41(35), 7429–7436. Kono, M., Ueki, H., & Umemura, S. (2002). Near-infrared finger vein patterns for personal identification. Applied Optics, 41(35), 7429–7436.
21.
go back to reference Nandakumar, K., Chen, Y., Dass, S. C., & Jain, A. K. (2008). Likelihood ratio based biometric score fusion. IEEE Transactions on Pattern Analysis and Machine Intelligence, 30(2), 342–347. Nandakumar, K., Chen, Y., Dass, S. C., & Jain, A. K. (2008). Likelihood ratio based biometric score fusion. IEEE Transactions on Pattern Analysis and Machine Intelligence, 30(2), 342–347.
22.
go back to reference Mulyono, D., & Jinn, H. S. (2008). A study of finger vein biometric for personal identification. In Proceedings of ISBAST (pp. 1–8). Mulyono, D., & Jinn, H. S. (2008). A study of finger vein biometric for personal identification. In Proceedings of ISBAST (pp. 1–8).
23.
go back to reference Sim, T., Zhang, S., Janakiraman, R., & Kumar, S. (2007). Continuous verification using multimodal biometrics. IEEE Transaction on Pattern Analysis and Machine Intelligence, 29(4), 687–700. Sim, T., Zhang, S., Janakiraman, R., & Kumar, S. (2007). Continuous verification using multimodal biometrics. IEEE Transaction on Pattern Analysis and Machine Intelligence, 29(4), 687–700.
24.
go back to reference Harris, C., & Stephens, M. (1988). A combined corner and edge detector. In Proceedings of the 4th Alvey Vision Conference (pp. 147–151). Harris, C., & Stephens, M. (1988). A combined corner and edge detector. In Proceedings of the 4th Alvey Vision Conference (pp. 147–151).
25.
go back to reference Yin, Y. L., Liu, L. L., & Sun, X. W. (2011). SDUMLA-HMT: A multimodal biometric database. In The 6th Chinese Conference on Biometric Recognition, LNCS 7098 (pp. 260–268), Beijing, China. Yin, Y. L., Liu, L. L., & Sun, X. W. (2011). SDUMLA-HMT: A multimodal biometric database. In The 6th Chinese Conference on Biometric Recognition, LNCS 7098 (pp. 260–268), Beijing, China.
Metadata
Title
Secured Human Authentication Using Finger-Vein Patterns
Authors
M. V. Madhusudhan
R. Basavaraju
Chetana Hegde
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-1402-5_24