Signal, Image and Video Processing

, Volume 7, Issue 4, pp 633–645 | Cite as

Authentication using Finger Knuckle Prints

  • Chetana HegdeEmail author
  • P. Deepa Shenoy
  • K. R. Venugopal
  • L. M. Patnaik
Original Paper


Automated security is one of the major concerns of modern times. Secure and reliable authentication systems are in great demand. A biometric trait like the finger knuckle print (FKP) of a person is unique and secure. Finger knuckle print is a novel biometric trait and is not explored much for real-time implementation. In this paper, three different algorithms have been proposed based on this trait. The first approach uses Radon transform for feature extraction. Two levels of security are provided here and are based on eigenvalues and the peak points of the Radon graph. In the second approach, Gabor wavelet transform is used for extracting the features. Again, two levels of security are provided based on magnitude values of Gabor wavelet and the peak points of Gabor wavelet graph. The third approach is intended to authenticate a person even if there is a damage in finger knuckle position due to injury. The FKP image is divided into modules and module-wise feature matching is done for authentication. Performance of these algorithms was found to be much better than very few existing works. Moreover, the algorithms are designed so as to implement in real-time system with minimal changes.


Correlation coefficient Eigenvalues FAR FRR Gabor wavelets Magnitude values Probability Radon transform ROC 


  1. 1.
    Lingyu, W., Leedham, G.: Near and far infrared imaging for vein pattern biometrics. In: Proceedings of IEEE International Conference on Video and Signal Based Surveillance (AVSS 06), pp. 52–52 (2006)Google Scholar
  2. 2.
    Jain, A. K., Ross, A. A.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. Special Issue Image Video Based Biometr. 14(1), 4–20 (2004)Google Scholar
  3. 3.
    Pankanti, S., Prabhakar, S., Jain, A. K.: On the individuality of fingerprints. IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR-2001), pp. 805–812 (2001)Google Scholar
  4. 4.
    Hegde, C., Prabhu, R., Sagar, D.S., Vishnu Prasad, K., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Authentication of damaged hand vein patterns by modularization. In: Proceedings of IEEE Region 10 Conference (TENCON-2009), November (2009)Google Scholar
  5. 5.
    Hegde, C., Manu, S., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Secure authentication using image processing and visual cryptography for banking applications. In: Proceedings of 16th International Conference on Advanced Computing (ADCOM 2008), pp. 65–72 (2008)Google Scholar
  6. 6.
    Boles, W.: A security system based on human iris identification using wavelet transforms. In: Proceedings of First International Conference on Knowledge-Based Intelligent Electronics Systems (1997)Google Scholar
  7. 7.
    Hegde, C., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Ear pattern recognition using centroids and cross-points for robust authentication. In: Proceedings of 2nd International Conference on Intelligent Human and Computer Interaction (IHCI 2010), pp. 378–384 (2010)Google Scholar
  8. 8.
    Hegde, C., Prabhu, R., Sagar, D.S., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Human authentication based on ECG waves using Radon transform. In: Proceedings of International Conference Security Technology-Special Session on Biometrics Security and Technology (SecTech-BTS-2010), pp. 197–206 (2010)Google Scholar
  9. 9.
    Hegde, C., Prabhu, R., Sagar, D.S., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Statistical analysis for human authentication using ECG Waves. In: Proceedings of 5th International Conference Information Systems, Technology and Management (ICISTM-2011), pp. 287–298, (2011)Google Scholar
  10. 10.
    Chetana, Hegde, Rahul, Prabhu, Deepa, Shenoy P.: Heartbeat biometrics for human authentication. Springer Signal Image Video Process. J. Special Issue Unconstrained Biometr Adv Trends 5(3), 485–493 (2011)Google Scholar
  11. 11.
    Woodard, D.L., Flynn, P.J.: Finger surface as a biometric identifier. Comput. Vision Image Underst. 100(3), 357–384 (2005)CrossRefGoogle Scholar
  12. 12.
    Ajay, Kumar, Yingbo, Zhou: Personal identification using Finger Knuckle orientation features. Electron. Lett. 45(20), 1–8 (2009)Google Scholar
  13. 13.
    Ajay, Kumar, Ravikanth, Ch.: Personal authentication using Finger Knuckle surface. IEEE Trans. Inf. Forensics Security 4(1), 98–110 (2009)CrossRefGoogle Scholar
  14. 14.
    Woodard, D.L., Flynn, P.J.: Personal identification utilizing Finger surface features. In: Proceedings of Computer Vision and, Pattern Recognition (CVPR-2005), pp. 1030–1036 (2005)Google Scholar
  15. 15.
    Ravikanth, Ch., Kumar, A.: Biometric authentication using Finger-back surface. In: Proceedings of Computer Vision and, Pattern Recognition (CVPR-2007), pp. 1–6 (2007) Google Scholar
  16. 16.
    Zhang, L., Zhang, L., Zhang, D., Zhu, H.: Online Finger knuckle print verification for personal authentication. Pattern Recognit. 43(7), 2560–2571 (2010)Google Scholar
  17. 17.
    Zhang, L., Zhang, L., Zhang, D.: Finger Knuckle Print: A new biometric identifier. In: Proceedings of IEEE International Conference on Image Processing (2009)Google Scholar
  18. 18.
    Zhang, L., Zhang, L., Zhang, D.: Finger Knuckle Print verification based on band-limited phase-only correlation. In: Proceedings of 13th International Conference on Computer Analysis of Images and Patterns, pp. 141–148 (2009)Google Scholar
  19. 19.
    Lin, Zhang, Lei, Zhang, David, Zhang, Hailong, Zhu: Ensemble of local and global information for Finger Knuckle Print recognition. Pattern Recognit. 44(9), 1990–1998 (2011)CrossRefGoogle Scholar
  20. 20.
  21. 21.
    Hegde C., Phanindra J., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: Human authentication using Finger Knuckle Print. In: Proceedings of ACM, Compute 2011 (2011)Google Scholar
  22. 22.
    Hegde, C., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M.: FKP biometrics for human authentication using Gabor wavelets. In: Proceedings of TENCON 2011—IEEE Region10 Conference, pp. 1149–1153 (2011)Google Scholar
  23. 23.
    Ariyapreechakul, P., Covavisaruch, N.: Personal verification and identification via iris pattern using radon transform. In: Proceedings of First National Conference on Computing and Information Technology, pp. 287–292 (2005)Google Scholar
  24. 24.
    Loy, G.: Fast computation of the Gabor wavelet transform. In: Proceedings of Digital Image Computing Techniques and Applications (DICTA-2002), pp. 21–27, (2002)Google Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  • Chetana Hegde
    • 1
    Email author
  • P. Deepa Shenoy
    • 2
  • K. R. Venugopal
    • 2
  • L. M. Patnaik
    • 3
  1. 1.RNS Institute of TechnologyBangaloreIndia
  2. 2.Department of CSEUVCE, Bangalore UniversityBangaloreIndia
  3. 3.Indian Institute of ScienceBangaloreIndia

Personalised recommendations