Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Analysis of Palmprint Verification Using Wavelet Filter and Competitive Code

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Tamrakar, D. ; PDPM Indian Inst. of Inf. Technol., Design & Manuf. Jabalpur, Jabalpur, India ; Khanna, P.

This paper presents an algorithm to extract the region of interest (ROI) from the palm print image of the Hong Kong PolyU large-scale palm print database (version 2). Competitive coding method is used for feature extraction. Coding based methods are among the most promising palm print recognition methods because of their small feature size, fast matching speed, and high verification accuracy. Competitive Coding Scheme (CCS), first convolves the palm print image from real part of six Gabor filters with different orientations and then encodes the dominant orientation into its bit wise representation. Palm print image is decomposed into two levels using discrete wavelet transform. Approximation details give compress and denoised image of the original image. The competitive scheme is applied in the approximation details of decomposed image for feature extraction. KNN Classifier is used for palm print verification. In this experiment, Genuine Acceptance Rate is calculated for four different wavelet filters (Db1, Db4, Sym4, and Coif4) with different values of K (number of nearest neighbors).

Published in:

Computational Intelligence and Communication Networks (CICN), 2010 International Conference on

Date of Conference:

26-28 Nov. 2010