Skip to main content

Differential Operation Based Palmprint Authentication for Multimedia Security

  • Conference paper
Book cover Advances in Multimedia Information Processing - PCM 2006 (PCM 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4261))

Included in the following conference series:

  • 696 Accesses

Abstract

This paper presents a novel approach of palmprint authentication for multimedia security by using the differential operation. In this approach, a differential operation is first conducted to the palmprint image in horizontal direction. And then the palmprint is encoded according to the sign of the value of each pixel of the differential image. This code is called DiffCode of the palmprint. The size of DiffCode is 128 bytes, which is the smallest one among the existing palmprint features and suitable for multimedia security. The similarity of two DiffCode is measured using their Hamming distance. This approach is tested on the public PolyU Palmprint Database and the EER is 0.6%, which is comparable with the existing palmprint recognition methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Golshani, F.: Computational Biometrics, Multimedia Analysis, and Security. IEEE MultiMedia 10, c2,1 (2003)

    Google Scholar 

  2. Jain, A., Bolle, R., Pankanti, S.: Techniques for Securing Multimedia Content in Consumer Electronic Appliances using Biometric Signatures. IEEE Transactions on Consumer Electronics 51, 545–551 (2005)

    Article  Google Scholar 

  3. Zhang, D.: Automated Biometrics–Technologies and Systems. Kluwer Academic Publishers, Dordrecht (2000)

    Google Scholar 

  4. Jain, A., Bolle, R., Pankanti, S.: Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, Dordrecht (1999)

    Google Scholar 

  5. Jain, A., Hong, L., Bolle, R.: On-line fingerprint verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 19, 302–313 (1997)

    Article  Google Scholar 

  6. Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.: Fvc2000: Fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligence 24, 402–412 (2002)

    Article  Google Scholar 

  7. Wildes, R.: Iris recognition: an emerging biometric technology. Proceedings of the IEEE 85, 1348–1363 (1997)

    Article  Google Scholar 

  8. Jain, A., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Transaction on Circuit and System for Video Technology 14, 4–20 (2004)

    Article  Google Scholar 

  9. Han, C., Chen, H., Lin, C., Fan, K.: Personal authentication using palm-print features. Pattern Recognition 36, 371–381 (2003)

    Article  Google Scholar 

  10. Kumar, A., Wong, D., Shen, H., Jain, A.: Personal verification using palmprint and hand geometry biometric. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 668–678. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Wu, X., Wang, K., Zhang, D.: Fisherpalms based palmprint recognition. Pattern Recognition Letters 24, 2829–2838 (2003)

    Article  Google Scholar 

  12. Zhang, D., Kong, W., You, J., Wong, M.: Online palmprint identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 1041–1050 (2003)

    Article  Google Scholar 

  13. Kong, A.W., Zhang, D.: Feature-level fusion for effective palmprint authentication. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 761–767. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Polyu palmprint palmprint database, http://www.comp.polyu.edu.hk/biometrics/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wu, X., Wang, K., Zhang, D. (2006). Differential Operation Based Palmprint Authentication for Multimedia Security. In: Zhuang, Y., Yang, SQ., Rui, Y., He, Q. (eds) Advances in Multimedia Information Processing - PCM 2006. PCM 2006. Lecture Notes in Computer Science, vol 4261. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922162_28

Download citation

  • DOI: https://doi.org/10.1007/11922162_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48766-1

  • Online ISBN: 978-3-540-48769-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics