Loughborough University
Browse
Investigation of Dimensionality Reduction in a Finger Vein Verification System - final submission.pdf (463.48 kB)

Investigation of dimensionality reduction in a finger vein verification system

Download (463.48 kB)
conference contribution
posted on 2017-10-20, 09:42 authored by Ei W. Ting, M.Z. Ibrahim, David Mulvaney
Popular methods of protecting access such as Personal Identification Numbers and smart cards are subject to security risks that result from accidental loss or being stolen. Risk can be reduced by adopting direct methods that identify the person and these are generally biometric methods, such as iris, face, voice and fingerprint recognition approaches. In this paper, a finger vein recognition method has been implemented in which the effect on performance has of using principal components analysis has been investigated. The data were obtained from the finger-vein database SDMULA-HMT and the images underwent contrast-limited adaptive histogram equalization and noise filtering for contrast improvement. The vein pattern was extracted using repeated line tracking and dimensionality reduction using principal components analysis to generate the feature vector. A ‘speeded-up robust features’ algorithm was used to determine the key points of interest and the Euclidean Distance was used to estimate similarity between database images. The results show that the use of a suitable number of principal components can improve the accuracy and reduce the computational overhead of the verification system.

Funding

This work was supported by University Malaysia Pahang and funded by Ministry of Higher Education Malaysia under FRGS Grant RDU160108.

History

School

  • Mechanical, Electrical and Manufacturing Engineering

Published in

Lecture Notes in Electrical Engineering

Volume

449

Pages

194 - 201

Citation

TING, E.W., IBRAHIM, M.Z. and MULVANEY, D.J., 2017. Investigation of dimensionality reduction in a finger vein verification system. IN: Kim K., Kim H. and Baek N. (eds). IT Convergence and Security 2017. ICITS 2017. Lecture Notes in Electrical Engineering, 449, pp. 194-201.

Publisher

© Springer

Version

  • AM (Accepted Manuscript)

Publisher statement

This work is made available according to the conditions of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) licence. Full details of this licence are available at: https://creativecommons.org/licenses/by-nc-nd/4.0/

Publication date

2017

Notes

This is a pre-copyedited version of a contribution published in Kim K., Kim H. and Baek N. (eds). IT Convergence and Security 2017. ICITS 2017 published by Springer. The definitive authenticated version is available online via https://doi.org/10.1007/978-981-10-6451-7_24

ISBN

9789811064500

ISSN

1876-1100

eISSN

1876-1119

Book series

Lecture Notes in Electrical Engineering;449

Language

  • en