CFP last date
20 January 2025
Reseach Article

Pamlprint Biometric System for Personal Authentication

Published on November 2014 by S S Tamilchelvi, N B Mahesh Kumar
International Conference on Innovations in Information, Embedded and Communication Systems
Foundation of Computer Science USA
ICIIECS - Number 1
November 2014
Authors: S S Tamilchelvi, N B Mahesh Kumar
2e0ef175-1dcd-4d15-a589-ae6b7be207d2

S S Tamilchelvi, N B Mahesh Kumar . Pamlprint Biometric System for Personal Authentication. International Conference on Innovations in Information, Embedded and Communication Systems. ICIIECS, 1 (November 2014), 14-17.

@article{
author = { S S Tamilchelvi, N B Mahesh Kumar },
title = { Pamlprint Biometric System for Personal Authentication },
journal = { International Conference on Innovations in Information, Embedded and Communication Systems },
issue_date = { November 2014 },
volume = { ICIIECS },
number = { 1 },
month = { November },
year = { 2014 },
issn = 0975-8887,
pages = { 14-17 },
numpages = 4,
url = { /proceedings/iciiecs/number1/18648-1428/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovations in Information, Embedded and Communication Systems
%A S S Tamilchelvi
%A N B Mahesh Kumar
%T Pamlprint Biometric System for Personal Authentication
%J International Conference on Innovations in Information, Embedded and Communication Systems
%@ 0975-8887
%V ICIIECS
%N 1
%P 14-17
%D 2014
%I International Journal of Computer Applications
Abstract

Biometrics refers to technologies that measure and analyzes human body behavioral characteristics such as fingerprints, palmprint, knuckles, hand geometry hand vein, retinas, irises and physiological characteristics such as gait, signature, key stroke etc. for authentication purposes. The palmprint is emerging biometric with the advantages of large Region of Interest (ROI) and chances of damages are very rare. In biometric based authentication decision tree is used for the classification of genuine and imposter classes. If the data is noisy, decision tree leads to false branches called over-fitting of the tree. This requires pruning of tree which will lead to decrease in performance. For that Fuzzy Decision Trees (FDT) is developed for classification of claimed identity into two classes genuine and imposter, hence it termed as Fuzzy Binary Decision Tree (FBDT). Fuzzy gini index and fuzzy entropy is used for selection of tree nodes. Matching training scores are used for automatic generation of fuzzy membership functions.

References
  1. Chandra, B & Varghese, PP 2008 "Fuzzy SLIQ decision tree algorithm", IEEE Trans. Syst. Man Cybern. -Part b: Cybern. , vol. 38, no. 5, pp. 1294-1301.
  2. Janikow, CZ 1998 "Fuzzy decision trees: issues and methods", IEEE Trans. Man Syst. Cybern. , vol. 28, no. 1, pp. 1-14.
  3. Jain, AK , Ross, A, & Prabhakar, S 2004 "An introduction to biometric recognition", IEEE Trans. Circuits Syst. Video Technol. , vol. 14, no. 1, pp. 4-20.
  4. Jain, AK, & Ross, A 2003 "Information fusion in biometrics", Pattern Recognition Lett. , vol. 24, no. 10, pp. 2115-2125.
  5. Kumar, A & Zhang, D 2006 "Personal recognition using hand shape and texture", IEEE Trans. Image Process. , vol. 15, no. 8, pp. 2454-2461
  6. Kumar, A 2008 "Incorporating cohort information for reliable palmprint authentication", Proceedings of the ICVGIP, pp 583-590.
  7. Lee, G, Tsoi, A, Lawrence, AD, 1997 "Back, Face recognition: A convolutional neural network approach", IEEE Trans. Neural Networks, vol. 8 no. 1, pp. 98–113.
  8. Available from: / http://www4. comp. polyu. edu. hk/_csajaykr/ IITD/ Database_Palm. htmS.
  9. Kumar, A, Hanmandlu, M & Gupta, HM 2013 "Fuzzy binary decision tree for biometric based personal authentication", SciVerse Science Direct at neurocomputing, vol. 99, no. 5, pp. 87-97
  10. Markham, IS, Mathieu, RG, & Wray, BA 2000, "A comparative study of artificial neural networks and decision trees", IEEE Integrated Manuf. , vol. 11, no. 4, pp. 239-246.
  11. Sheng, Y, Phoha, VV, & Rovnyak, SK 2005 "A Parallel Decision Tree-Based Method for User Authentication Based on Keystroke Patterns", IEEE Transactions on Systems, Man, and Cybernetics -Part B: Cybernetics, vol. 35, no. 4, pp. 826-823.
  12. Zhang, D, Kong, WK, You, J, & Wong, M 2003 "On-line palmprint identification", IEEE Trans. Pattern Anal. Mach. Intell. , vol. 25 no. 9, pp. 1041-1050.
Index Terms

Computer Science
Information Sciences

Keywords

Decision Tree (dt) Fuzzy Binary Decision Tree (fbdt) Mean-index Splitting Criteria Fuzzy Membership Functions Fuzzy Entropy Fuzzy Gini Index. Keywords Are Your Own Designated Keywords Which Can Be Used For Easy Location Of The Manuscript Using Any Search Engines.