Investigation of Dimensionality Reduction in a Finger Vein Verification System - final submission.pdf (463.48 kB)
Investigation of dimensionality reduction in a finger vein verification system
conference contribution
posted on 2017-10-20, 09:42 authored by Ei W. Ting, M.Z. Ibrahim, David MulvaneyPopular methods of protecting access such as Personal Identification Numbers and smart cards are subject to security risks that result from accidental loss or being stolen. Risk can be reduced by adopting direct methods that identify the person and these are generally biometric methods, such as iris, face, voice and fingerprint recognition approaches. In this paper, a finger vein recognition method has been implemented in which the effect on performance has of using principal components analysis has been investigated. The data were obtained from the finger-vein database SDMULA-HMT and the images underwent contrast-limited adaptive histogram equalization and noise filtering for contrast improvement. The vein pattern was extracted using repeated line tracking and dimensionality reduction using principal components analysis to generate the feature vector. A ‘speeded-up robust features’ algorithm was used to determine the key points of interest and the Euclidean Distance was used to estimate similarity between database images. The results show that the use of a suitable number of principal components can improve the accuracy and reduce the computational overhead of the verification system.
Funding
This work was supported by University Malaysia Pahang and funded by Ministry of Higher Education Malaysia under FRGS Grant RDU160108.
History
School
- Mechanical, Electrical and Manufacturing Engineering
Published in
Lecture Notes in Electrical EngineeringVolume
449Pages
194 - 201Citation
TING, E.W., IBRAHIM, M.Z. and MULVANEY, D.J., 2017. Investigation of dimensionality reduction in a finger vein verification system. IN: Kim K., Kim H. and Baek N. (eds). IT Convergence and Security 2017. ICITS 2017. Lecture Notes in Electrical Engineering, 449, pp. 194-201.Publisher
© SpringerVersion
- AM (Accepted Manuscript)
Publisher statement
This work is made available according to the conditions of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) licence. Full details of this licence are available at: https://creativecommons.org/licenses/by-nc-nd/4.0/Publication date
2017Notes
This is a pre-copyedited version of a contribution published in Kim K., Kim H. and Baek N. (eds). IT Convergence and Security 2017. ICITS 2017 published by Springer. The definitive authenticated version is available online via https://doi.org/10.1007/978-981-10-6451-7_24ISBN
9789811064500ISSN
1876-1100eISSN
1876-1119Publisher version
Book series
Lecture Notes in Electrical Engineering;449Language
- en