Advertisement

Biometric Finger Vein Recognition Methods for Authentication

  • Dnyaneshwari P. WaghEmail author
  • H. S. Fadewar
  • G. N. Shinde
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1025)

Abstract

Nowadays personal information security is an important issue. Number of valuable data and files are stored in server and moreover private data are shared in worldwide. To access the private information only by the authorized user is becoming indispensable. Biometric plays a big role in strong security and large attention in research field. The biometric characteristics like palm print, finger print, Iris, DNA, face detection, finger vein etc. are used. Now finger vein is leading technique now. The big advantages of finger vein pattern are lively detection, present under the skin, and cant possible to copy or stolen. Finger vein authentication base applications are widely used in Japan’s like bank, airport, person authentication, jail etc. This paper, we study comparatively the various techniques of finger vein identification or authentication. The main focus is comparative study of existing vein pattern acquisition methods, feature extraction techniques and its results.

Keywords

Biometric Security Authentication Finger vein 

References

  1. 1.
    Hashimoto, J.: Finger Vein Authentication Technology and Its Future. IEEE (2006)Google Scholar
  2. 2.
    Khellat-kihel, S., Abrishambaf, R., Cardoso, N., Monteiro, J., Benyettou1, M.: Finger vein recognition using Gabor filter and support vector machine. In: IEEE IPAS’14: International Image Processing Applications and Systems Conference (2014)Google Scholar
  3. 3.
    Liu, Z., Song, S.: An embedded real-time finger-vein recognition system for mobile devices. IEEE Trans. Consum. Electron. 58(2) (2012)Google Scholar
  4. 4.
    Hoshyar, A.N., Sulaiman, R.: Review on Finger Vein Authentication System by Applying Neural Network. IEEE (2010)Google Scholar
  5. 5.
    Dev, R., Khanam, R.: Review on finger vein feature extraction methods. In: International Conference on Computing, Communication and Automation (2017)Google Scholar
  6. 6.
    Peng, J., Wang, N., El-Latif, A.A.A., Li, Q., Niu, X.: Finger-vein verification using Gabor filter and sift feature matching. In: IEEE Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2012)Google Scholar
  7. 7.
    Khalil-Hani, M., Nambiar, V.P., Marsono, M.N.: GA-based parameter tuning in finger-vein biometric embedded system for information security. In: First IEEE International Conference on Communications in China: Communications Theory and Security (CTS) (2012)Google Scholar
  8. 8.
    Song, W., Kim, T., Kim, H.C. Choi, J.H., Kong, H.J., Lee, S.R.: A finger-vein verification system using mean curvature (2011). ElsevierGoogle Scholar
  9. 9.
    Liu, Z., Yin, Y., Wang, H., Song, S., Li, Q.: Finger vein recognition with manifold learning. J. Netw. Comput. Appl. 33 (2010). ElsevierGoogle Scholar
  10. 10.
    Lee, H.C., Kang, B.J., Lee, E.C., Park, K.R.: Finger vein recognition using weighted local binary pattern code based on a support vector machine. J. Zhejiang Univ. Sci. C (Computers & Electronics) (2010)Google Scholar
  11. 11.
    Guan, F., Wang, K., Mo, H., Ma, H., Liu, J.: Research of Finger Vein Recognition Based on Fusion of Wavelet Moment and Horizontal and Vertical 2DPCA. IEEE (2009)Google Scholar
  12. 12.
    Yang, G., Xiao, R., Yin, Y., Yang, L.: Finger vein recognition based on personalized weight maps. ISSN 1424-8220, Sept 2013Google Scholar
  13. 13.
    Hong, J., Qubo, C.: The finger vein image acquisition method and vein pattern extraction study based on near infrared (2010)Google Scholar
  14. 14.
    Patil, M.N., Iyer, B., Arya, R.: Performance evaluation of PCA and ICA algorithm for facial expression recognition application. In: Proceedings of Fifth International Conference on Soft Computing for Problem Solving, pp. 965–976 (2016)Google Scholar
  15. 15.
    Deshpande, P., Iyer, B.: Research directions in the Internet of Every Things (IoET). In: International Conference on Computing, Communication and Automation (ICCCA), pp. 1353–1357 (2017)Google Scholar
  16. 16.
    Pati, N., Iyer, B.: Health monitoring and tracking system for soldiers using Internet of Things (IoT). In: International Conference on Computing, Communication and Automation (ICCCA), pp. 1347–1352 (2017)Google Scholar
  17. 17.
    Iyer, B., Patil, N.: IoT enabled tracking and monitoring sensor for military applications. Int. J. Syst. Assur. Eng. Manage. 9(6), 1294–1301 (2018)CrossRefGoogle Scholar
  18. 18.
    Deshpande, P., Sharma, S.C., Peddoju, S.K., Abhrahm, A.: Efficient multimedia data storage in cloud environment. Informatica Int. J. Comput. Inform. 39(4), 431–442 (2015)Google Scholar
  19. 19.
    Deshpande, P., Sharma, S.C., Peddoju S.K.: Implementation of a private cloud: a case study. In: Pant, M., Deep, K., Nagar, A., Bansal, J. (eds.) Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol. 259. Springer, New Delhi (2014)Google Scholar
  20. 20.
    Deshpande, P., Sharma, S.C., Peddoju, S.K.: Data storage security in cloud paradigm. In: Pant, M., Deep, K., Bansal, J., Nagar, A., Das, K. (eds.) Proceedings of Fifth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol. 436. Springer, Singapore (2016)Google Scholar
  21. 21.
    Yang, W., Rao, Q., Liao, Q.: Personal Identification for Single Sample using Finger Vein Location and Direction Coding. IEEE (2011)Google Scholar
  22. 22.
    Miura, N., Nagasaka, A.: Extraction of finger-vein patterns using maximum curvature points in image profiles. In: IAPR Conference on Machine Vision Applications, Tsukuba Science City, Japan, 16–18 May 2005Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Dnyaneshwari P. Wagh
    • 1
    Email author
  • H. S. Fadewar
    • 1
  • G. N. Shinde
    • 1
  1. 1.School of Computational SciencesSRTMUNandedIndia

Personalised recommendations