ArticlePDF Available

Fragile Bits in Palmprint Recognition

Authors:
  • Zhongan Technology

Abstract and Figures

Recent years have witnessed a growing interest in developing automatic palmprint recognition methods. Among them, coding-based ones, representing the texture of a palmprint using a binary code, are most prevalent and successful. We find that not all bits in a code map generated by a specific coding scheme are equally consistent. A bit is deemed fragile if its value changes across code maps created from different images of the same palmprint. In this paper, we first analyze the fragile bits phenomenon in a state-of-the-art palmprint coding scheme, namely, binary orientation co-occurrence vector (BOCV). Then, based on our analysis, we extend BOCV to E-BOCV by incorporating fragile bits information in appropriate ways. Experiments conducted on the benchmark dataset demonstrate that E-BOCV can achieve the highest verification accuracy among all the state-of-the-art palmprint verification methods evaluated. To our knowledge, this is the first work investigating the fragile bits of coding-based palmprint recognition approaches.
Content may be subject to copyright.
IEEE SIGNAL PROCESSING LETTERS, VOL. 19, NO. 10, OCTOBER 2012 663
Fragile Bits in Palmprint Recognition
Lin Zhang, Member, IEEE, Hongyu Li, and Junyu Niu
Abstract—Recent years have witnessed a growing interest in de-
veloping automatic palmprint recognition methods. Among them,
coding-based ones, representing the texture of a palmprint using
a binary code, are most prevalent and successful. We nd thatnot
all bits in a code map generated by a specic coding scheme are
equally consistent. A bit is deemed fragile if its value changes across
code maps created from different images of the same palmprint.
In this paper, we rst analyze the fragile bits phenomenon in a
state-of-the-art palmprint coding scheme, namely, binary orienta-
tion co-occurrence vector (BOCV). Then, based on our analysis,
we extend BOCV to E-BOCV by incorporating fragile bits infor-
mation in appropriate ways. Experiments conducted on the bench-
mark dataset demonstrate that E-BOCV can achieve the highest
verication accuracy among all the state-of-the-art palmprint ver-
ication methods evaluated. To our knowledge, this is the rst work
investigating the fragile bits of coding-based palmprint recognition
approaches.
Index Terms—BOCV, fragile bits, palmprint.
I. INTRODUCTION
BOLSTERED by the requirements of numerous appli-
cations, such as access control, aviation security, or
e-banking, recognizing the identity of a person with high con-
dence has become a topic of intense study. Biometrics based
methods are drawing more and more attention. As an important
member of the biometrics family, palmprint-based personal au-
thentication systems have been corroborated to have the merits
of high distinctiveness, robustness, high user-friendliness, and
cost effectiveness [1], [2]. In the past decade or so, a plethora
of algorithms have been proposed for palmprint recognition
[3], [4].
Among various palmprint recognition schemes, coding-based
ones are the most prevalent and appealing since in general they
have the advantages of high accuracy, robustness to illumina-
tion variation, and fast feature extraction and matching speed.
In a typical coding-based method, each eld of the code map
is assigned a bit-wised code, based on the quantization result
Manuscript received June 11, 2012; revised July 18, 2012; accepted July 26,
2012. Date of publication August 03, 2012; date of current version August 13,
2012. This work was supported by the Fundamental Research Funds for the
Central Universities under Grant 2100219 033. The associate editor coordinating
the review of this manuscript and approving it for publication was Dr. Xiao-Ping
Zhang.
L. Zhang is with the School of Software Engineering, Tongji University,
Shanghai 201804, China (e-mail: cslinzhang@tongji.edu.cn).
H. Li is with the School of Software Engineeri ng, Tongji University, Shanghai
201804, China and also with the Department of Electronic Engineering, Fudan
University, Shanghai 200433, China (e-mail: hyli@tongji.edu.cn).
J. Niu is with the School of Computer Science, Fudan University, Shanghai
200433, China (e-mail: jyniu@fudan.edu.cn).
Color versions of one or more of the gures in this paper are available online
at http://ieeexplore.ieee.org.
Digital Object Identier 10.1109/LSP.2012.2211589
of the image’s responses to a set of speciclters. PalmCode
proposed in [1] uses a single Gabor lter to extract the local
phase information. Its computational architecture is the same as
the IrisCode [5]. In [6], Kong and Zhang proposed the compet-
itive code (CompCode) scheme, which encodes the local orien-
tation eld of a palmprint using symmetric Gabor lters along
six different orientations. In [7], Jia et al. proposed a different
coding method to extract the local orientation information of
palmprints, namely robust line orientation code (RLOC), which
isbasedonamodied nite Radon transform. In [8], Sun et
al. used differences between two orthogonal Gaussians to ex-
tract the local ordinal measures from palmprints. In [9], Guo et
al. proposed another coding method by binarizing a palmprint
image’s responses to the real Gabor lters along six different
orientations and they named their method as binary orientation
co-occurrence vector (BOCV). BOCV can get a state-of-the-art
verication accuracy so far. Recently, another two palmprint
verication methods were proposed [10], [11] and they could
achieve higher verication accuracies than BOCV; but both of
them have much higher computational complexities for feature
extraction and matching than BOCV.
As stated, a bit at a specicl
ocation of a code map generated
by a coding scheme discussed above is typically binarized from
the image’s response to a lter. Consider multiple images of the
same palmprint. Across all images, responses for that location
will be similar, but not exactly the same. Similarly, the bit from
the binary quantization could be the same across all code maps,
or it may differ in some of the code maps. A bit in a palmprint’s
code map is consistent if it has the same value for most images
of that palmprint; otherwise, it is considered as fragile. Actu-
ally, the concept of fragile bit and its effects on IrisCode have
been well studied in [12]–[14]. However, to our knowledge, no
investigation about fragile bits has been reported for palmprint
recognition in the literature.
In this paper, we attempt to give a thorough study on the
effects of fragile bits for palmprint recognition in the context
of a speciccod
ing scheme—binary orientation co-occurrence
vector (BOCV) [9], which is a state-of-the-art coding method
for palmprint recognition. To this end, at rst, a straightforward
method for identifying fragile bits for BOCV is proposed. Then,
we propose to improve the verication performance of BOCV
by masking out the fragile bits when calculating the Hamming
distance. In addition, we believe that fragile bit patterns can
also bringinsomebenecial information for palmprint recog-
nition. Thus, we propose a new metric fragile-bit pattern dis-
tance (FPD) to quantitatively measure the coincidence of the
fragile-bit patterns in two BOCV code maps. Then, FPD is fused
with the modied Hamming distance to further improve the
verication accuracy of the conventional BOCV scheme. Our
claims are validated by extensive experiments performed on the
PolyU palmprint dataset [15]. This paper focuses only on the
1070-9908/$31.00 © 2012 IEEE
664 IEEE SIGNAL PROCESSING LETTERS, VOL. 19, NO. 10, OCTOBER 2012
Fig. 1. Real Gabor lters along six different orientations.
feature extraction and matching stage of a palmprint recogni-
tion system. For the data preprocessing of palmprint images,
such as the ROI (region of interest) extraction, please refer to
[1] for details.
The remainder of this paper is organized as follows. Section II
presents a method for identifying fragile bits. Section III dis-
cusses how to extend the original BOCV by making use of
fragile bits information. Section IV reports the experimental re-
sults and Section V concludes the paper.
II. FRAGILE BITS IN BOCV
As pointed out in [13], [14], bit fragility generally occurs
when the inner product between a lter and a particular part of
the examined image produces a value with a small magnitude.
Hence, the fragility of each bit in a code map depends on a com-
bination of the palmprint structure at that particular location,
the lter adopted by the coding scheme, and the quantization
method for the lter response. We put our focus on investigating
the effects of fragile bits in the context of a speciccoding
method—BOCV [9], since it can achieve a state-of-the-art ver-
ication accuracy.
The neurophysiology-based Gabor lter proposed by Lee
[16] is used in BOCV. It is dened as
(1)
where , ,
,.In(1), is the radial frequency in
radians per unit length and is the orientation of the Gabor
lter. is dened by ,where is
the half-amplitude bandwidth of the frequency response. can
be determined by ,where is the standard deviation
of the Gaussian envelop. Examples of such real Gabor lters
are shown in Fig. 1 and their parameters are set as ,
.
The computational architecture of BOCV is rather simple and
straightforward. A BOCV code map consists of six bit-planes,
each of which is binarized from the image’s response to a real
Gabor lter along a specic orientation. Such a process is il-
lustrated in Fig. 2. Fig. 2(a) is a palmprint ROI image while
Fig. 2(b) are the 6 corresponding bit-planes binarized from ’s
responses to 6 Gabor lters with 6 different orientations.
For a lter applied to a specic location in a single image,
if the response has a large magnitude, then the corresponding
bit will likely be consistent. On the contrary, if the response is
close to zero, the corresponding bit will be very likely to be
fragile. Based on this analysis, we can use a simple method to
gure out the potential fragile bits in a single BOCV code map
approximately, similar as Hollingsworth et al. did for IrisCode
[14]. Given a palmprint ROI image, suppose that we have ob-
tained its response to the ()Gaborlter.
By binarizing , we can get the BOCV bit-plane .At
Fig. 2. (a) is a palmprint ROI image ; (b) are the 6 bit-planes binarized from
’s responses to a set of Gabor lters dened by (1) with 6 different orientations.
Fig. 3. (a) and (b) are the different images taken from the same palmprint while
(c) is captured from a different palmprint; (d) is a fragility mask “slice” for (a);
(e) is a fragility mask “slice” for (b); (f) is a fragility mask “slice” for (c). Black
pixels are bits masked as fragile.
the same time, we can sort magnitude values contained in the
matrix to identify percent smallest ones. Then, we regard
the corresponding bits in binarized from these smallest mag-
nitudes as fragile. Fragility mask is stored in a separate matrix
. Consistent bits are represented as ones while fragile bits are
marked as zeros in the fragility mask. Thus, indicates
whether the bit is consistent or not.
Examples of fragility masks are shown in Fig. 3. In Fig. 3, (a)
and (b) are different images captured from the same palmprint
while (c) is an image captured from another different palmprint.
We convolve the images with . Then, for each image, the lo-
cations with the smallest 25% magnitudes are masked as fragile
(black pixels). Fragility masks generated from (a), (b), and (c)
are shown in (d), (e), and (f). It needs to be noted that each image
actually has 6 such fragility masks since BOCV uses 6 Gabor
lters . Then, these 6 mask “slices” form the
nal fragility mask matrix.
III. EXTENDED BOCV
In this section, two ways to improve the verication accuracy
of the conventional BOCV scheme will be presented in detail.
A. Fragile Bit Masking
The original BOCV scheme adopts the normalized Hamming
distance to match two BOCV code maps. In the following, we
will use to represent the conventional Hamming distance.
weights all bits in a code map equally. However, actually
not all of the bits in a code map are equally useful. Instead,
fragile bits tend to magnify an intra-class matching distance.
According to this consideration, we propose to mask out fragile
ZHANG et al.: FRAGILE BITS IN PALMPRINT RECOGNITION 665
bits when computing the Hamming distance. With this modi-
cation, the matching distance in a comparison is based on fewer
bits, but each bit used is more consistent.
The modied Hamming distance can be computed as the fol-
lowing. Suppose that and are two BOCV code maps. Their
fragility mask matrices are and , respectively. Then, the mod-
ied Hamming distance, denoted by ,isdened as
(2)
where ()isthe bit-plane of (), represents the
bitwise “exclusive OR” operation, and means bitwise “AND”
operation.
B. Fragile-Bit Pattern Distance
From observation we nd that the locations of fragile bits tend
to be consistent across different code maps of the same palm-
print while they quite disagree with each other in code maps
from different palmprints as illustrated by examples shown in
Fig. 3. This implies that further useful information could be ex-
tracted from fragile-bit patterns. To this end, we present a new
metric fragile-bit pattern distance (FPD) to quantitatively mea-
sure the dissimilarity of two fragile-bit patterns.
Consider two fragile bit pattern matrices, and . Their FPD
is dened as
(3)
where is the area of the code map. In practice, taking into ac-
count the possible translations in the extracted ROI sub-image
with respect to the one extracted in the enrolment, multiple
matches are performed by translating one set of features in hori-
zontal and vertical directions. And the minimum of the resulting
matching distances is considered to be the nal matching dis-
tance. In such cases, is the area of the overlapping parts of the
two code maps.
Even though is not as powerful as , we can com-
bine them together in order to create a better classier. We adopt
a simple weighted-average fusion rule to fuse and
together as
(4)
where is a parameter to control the contribution
of in the fusion. In the following, we refer the method
using to calculate the matching distance as Extended-BOCV,
or E-BOCV for short.
IV. EXPERIMENTAL RESULTS AND DISCUSSIONS
A. Dataset, Test Protocol, and Parameter Settings
Experiments were conducted on the benchmark PolyU palm-
print dataset [15], which contains 7,752 images captured from
384 different palms. In that dataset, sample images for each sub-
ject were collected in two sessions.
TAB L E I
VERIFICATION PERFORMANCE BY USING AND
IN THE CONTEXT OF BOCV
In our experiments, we took images collected in the rst ses-
sion as the gallery set and images collected at the second session
as the probe set. Under such experimental settings, the gallery
set contained 3,889 images while the probe set contained 3,863
images. To obtain statistical results, each image in the probe set
was matched with all the images in the gallery set. If the two
images were from the same class, the matching between them
was counted as a genuine matching; otherwise it was counted
as an imposter matching. The equal error rate (EER), which is
the point where the false accept rate (FAR) is equal to the false
reject rate (FRR), is used to evaluate the verication accuracy.
Besides, by adjusting the matching threshold, a detection error
tradeoff (DET) curve, which is a plot of FRR against FAR for
all possible thresholds, can be created. Thus, the DET curves
obtained by methods evaluated will also be provided.
Parameters involved were tuned based on a sub-dataset
which contained the rst 192 palmprints of the PolyU palm-
print dataset and the tuning criterion was that parameter values
that could lead to a lower EER would be chosen. As a result, the
parameters used in this paper were set as: , ,
,and .
Considering the imperfectness of the ROI extraction step,
we shifted the code maps vertically and horizontally in a small
range when matching. The minimal distance obtained by shift
matching was taken as the nal matching distance. The shift
range was set as [ , 4] in the following experiments.
B. Effectiveness of Fragile Bit Masking
In this experiment, we compared the verication accuracies
obtained by using and respectively in the context of
BOCV. Their EERs are listed in Table I. From the results we can
see that by masking out fragile bits in code maps the EER could
be reduced from 0.03677% to 0.03365%. The drop of EER is
8.49% ( ). It demonstrates that the
palmprint verication accuracy could be improved by masking
out fragile bits.
C. Performance Evaluation of E-BOCV
Compared with the original BOCV scheme, the novelty of
E-BOCV lies in the matching method it adopts. Specically,
it fuses the modied Hamming distance and the fragile-bit
pattern distance to compute the dissimilarity of two code maps.
In this experiment, its verication performance was evaluated
and compared with the other four state-of-the-art coding based
palmprint verication methods, including CompCode [6],
RLOC [7], OrdinalCode [8], and BOCV [9]. The results in
terms of EER are summarized in Table II. Fig. 4(a) shows the
DET curves generated by the ve different palmprint verica-
tion methods. Distance distributions of genuine matchings and
imposter matchings obtained by the proposed E-BOCV scheme
are plotted in Fig. 4(b).
666 IEEE SIGNAL PROCESSING LETTERS, VOL. 19, NO. 10, OCTOBER 2012
Fig. 4. (a) DET curves obtained by using various palmprint verication
methods; (b) distance distributions of genuine matchings and imposter match-
ings obtained by E-BOCV.
TAB L E I I
VERIFICATION PERFORMANCE OF DIFFERENT SCHEMES
From the results listed in Table II and the DET curves shown
in Fig. 4(a), we can see that E-BOCV performs the best in terms
of the verication accuracy among all the state-of-the-art palm-
print verication methods evaluated. With our experimental
settings, the EER achieved by the proposed E-BOCV scheme
was 0.0316%. Compared with the conventional BOCV method,
the drop of EER is 14.06% ( ),
which is quite signicant. Therefore, the experimental results
clearly corroborated our claim that by appropriately making
use of fragile bits information, the performance of a palmprint
coding scheme could be largely improved.
V. C ONCLUSIONS
This paper is the rst work discussing the fragility of bits
in a palmprint code map. We investigated the effects of fragile
bits in palmprint recognition in the context of a speciccoding
scheme, BOCV. We proposed to mask out the fragile bits when
computing the Hamming distance. Furthermore, we proposed a
new metric FPD to measure the dissimilarity of two fragile-bit
masks. By fusing the modied Hamming distance and the FPD
together, we extended the original BOCV to E-BOCV. The ef-
fectiveness of the proposed methods was corroborated by ex-
periments conducted on the benchmark palmprint dataset.
REFERENCES
[1] D. Zhang, W. Kong, J. You, and M. Wong, “Online palmprint identi-
cation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 9, pp.
1041–1050, Sep. 2003.
[2] A. K. Jain and J. Feng, “Latent palmprint matching,” IEEE Trans. Pat-
tern Anal. Mach. Intell., vol. 31, no. 6, pp. 1032–1047, Jun. 2009.
[3] A. Kong, D. Zhang, and M. Kamel, “A survey of palmprint recogni-
tion,” Pattern Recognit., vol. 42, no. 7, pp. 1408–1418, Jul. 2009.
[4] D.Zhang,W.Zuo,andF.Yue, “A comparative study of palmprint
recognition algorithms,” ACM Comput. Surv.,vol.4
4, no. 1, pp.
2:1–37, Jan. 2012.
[5] J.G.Daugman,“Highcondence visual recognition of persons by a
test of statistical independence,” IEEE Trans. Pattern Anal. Mach. In-
tell., vol. 15, no. 11, pp. 1148–1161, Nov. 1993.
[6] W. K. Kong and D. Zhang, “Competitive coding scheme for palm-
print verication,” in Proc. IEEE Int. Conf. Pattern Recognit., 2004,
pp. 520–523.
[7] W.Jia,D.Huang,andD.Zhang,“Palmprintverication based on
robust line orientation code,” Pattern Recognit.,vol.41,no.5,pp.
1504–1513, May 2008.
[8] Z.Sun,T.Tan,Y.Wang,andS.Z.Li,“Ordinalpal
mprint represen-
tation for personal identication,” in Proc. IEEE Int. Conf. Computer
Vis. and Pattern Recognit., 2005, pp. 279–284.
[9] Z.Guo,D.Zhang,L.Zhang,andW.Zuo,“Palm
print verication using
binary orientation co-occurrence vector,” Pattern Recognit. Lett., vol.
30, no. 13, pp. 1219–1227, Oct. 2009.
[10] W. Zuo, Z. Lin, Z. Guo, and D. Zhang, “The Multiscale competitive
code via sparse representation for palmprint verication,” in Proc.
IEEE Int. Conf. Computer Vis. and Pattern Recognit., 2010, pp.
2265–2272.
[11] F. Yue, W. Zuo, and D. Zhang, “ICP registration using principal line
and orientation features for palmprint alignment,” in Proc. IEEE Int.
Conf. Image Process., 2010, pp. 3069–3072.
[12] R. M. Bolle, S. Pankanti, J. H. Connell, and N. Ratha, “Iris individu-
ality: A partial iris model,” in Proc. IEEE Int. Conf. Pattern Recognit.,
2004, pp. 927–930.
[13] K. P. Hollingsworth, K. W. Bowyer, and F. J. Flynn, “The best bits in
an iris code,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 31, no. 6,
pp. 964–973, Jun. 2009.
[14] K. P. Hollingsworth, K. W. Bowyer, and F. J. Flynn, “Improved iris
recognition through fusion of Hamming distance and fragile bit dis-
tance,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 12, pp.
2465–2476, Dec. 2011.
[15] PolyU Palmprint Database 2006 [Online]. Available: http://www.
comp.polyu.edu.hk/~biometrics
[16] T. S. Lee, “Image representation using 2D Gabor wavelet,” IEEE
Trans. Pattern Anal. Mach. Intell., vol. 18, no. 10, pp. 957–971, Oct.
1996.
... However, given that palm lines are oriented in various directions, a single orientation proved insufficient for comprehensive palmprint representation. Subsequent research saw the development of fusion codes [10], dominant orientation extraction and encoding [11][12][13], binary orientation co-occurrence vector (BOCV) [14], the incorporation of fragile bits with BOCV [15], XOR-SUM codes [16], Double Orientation Code (DOC) [17], half orientation codes (HOC) [18], discriminative and robust dominant orientation (DRCC) [19], neighboring Directional Indicator Code (NDIC) [20], and banana filter-based concavity code [21]. ...
... The major aim of this parameter investigation is to find out optimum parameters at which it can better represent both the fine and thick lines of the palmprint. Thus, the range of α= [7,9,11,13] and β= [15,17,19,21] are chosen into the consideration. The curvature of the proposed filter is controlled by parameter, c which is fixed to 2 and 3 for each pair of α and β. ...
Article
The inherent curvature in palm lines can pose challenges for palmprint recognition, particularly at lower resolutions where wrinkles become indistinguishable, leading to performance degradation. To address these issues, this study introduces a novel methodology employing curvi-linear anisotropic Gaussian filter-based Combined Differential Concavity and Infirmity (CDCI) codes. The use of curved filters has been proposed to represent curved palm lines more accurately, while anisotropic filtering is expected to enhance the extraction of blurred palm lines. The new representation, grounded in curvi-linear anisotropic Gaussian filtering, is posited to improve the recognition system's performance by effectively addressing these challenges. The proposed approach's effectiveness has been tested using the touchless IITD database and the contact-based PolyU 2D database. The experimental results suggest that the proposed methodology surpasses the performance of state-of-the-art coding-based procedures in palmprint recognition with the improvement of 3.82% and 36.36% in recognition rate and equal error rate.
... Inspired by this work, [13] proposed to extract 2nd-order features and combine them with 1st-order features to achieve better performance. Accordingly, several magnitude feature-based methods have been proposed following this vein [14][15][16][17]. However, magnitude features are sensitive to illumination changes, which impede the robustness of these methods [18]. ...
Article
Full-text available
Palmprint as biometrics has gained increasing attention recently due to its discriminative ability and robustness. However, existing methods mainly improve palmprint verification within one spectrum, which is challenging to verify across different spectrums. Additionally, in distributed server-client-based deployment, palmprint verification systems predominantly necessitate clients to transmit private data for model training on the centralized server, thereby engendering privacy apprehensions. To alleviate the above issues, in this paper, we propose a physics-driven spectrum-consistent federated learning method for palmprint verification, dubbed as PSFed-Palm. PSFed-Palm draws upon the inherent physical properties of distinct wavelength spectrums, wherein images acquired under similar wavelengths display heightened resemblances. Our approach first partitions clients into short- and long-spectrum groups according to the wavelength range of their local spectrum images. Subsequently, we introduce anchor models for short- and long-spectrum, which constrain the optimization directions of local models associated with long- and short-spectrum images. Specifically, a spectrum-consistent loss that enforces the model parameters and feature representation to align with their corresponding anchor models is designed. Finally, we impose constraints on the local models to ensure their consistency with the global model, effectively preventing model drift. This measure guarantees spectrum consistency while protecting data privacy, as there is no need to share local data. Extensive experiments are conducted to validate the efficacy of our proposed PSFed-Palm approach. The proposed PSFed-Palm demonstrates compelling performance despite only a limited number of training data. The codes have been released at https://github.com/Zi-YuanYang/PSFed-Palm.
... The dissimilarity between two binary templates are measured by Hamming distance. Table 1 summarizes the texture coding palmprint recognition methods, including PalmCode (PC) [4], Comp-Code (CC) [38], OrdinalCode (OC) [39], FusionCode (FC) [37], Robust Line Orientation Code (RLOC) [41], Binary Orientation Co-occurrence Vector (BOCV) [42], Extend Binary Orientation Co-occurrence Vector (E-BOCV) [43], Half-orientation Code (HOC) [44], Double-orientation Code (DOC) [45], Neighboring Direction Indicator (NDI) [46], Discriminative Competitive Code (DCC) [47], Discriminative and Robust Competitive Code (DRCC) [47], 2nd-order Texture Co-occurrence Code (2TCC) [48], Multi-order Texture Co-occurrence Code (MTCC) [48]. Figure 1 shows the acquisition interface screen view of DLSP for left hand. ...
Article
Full-text available
Palmprint is a promising biometric modality and has several advantages. However, many serious challenges severely restrict the development of palmprint recognition in mobile environments. Double-line-single-point (DLSP), as a state-of-the-art assisting graph, can be free from pre-processing, and effectively reduce the errors of pre-processing; however, its accuracy heavily depends on users’ cooperation and operation proficiency. This paper proposes boundary line calibration (BLC) and finger valley calibration (FVC) to suppress the translational dislocations in DLSP. Firstly, the samples acquired according to DLSP are rotated around the center so that the assisting lines are horizontal. Secondly, a rectangular area is cropped as the region of line detection (RLD) with the assisting line as the reference; while a rectangular area is cropped as the region of point detection (RPD) with the assisting point as the reference. The cropped rectangular regions are convolved with Gabor filters along an optimized direction to enhance edges. The accurate palm boundary is localized in RLD to reduce the vertical dislocation; and the accurate inter-finger valley point (IFVP) is localized in RPD to reduce the horizontal dislocation. The sufficient experiments show that the proposed algorithm can calibrate the translational dislocations caused by users’ imperfect cooperation, and accordingly remarkably improve the accuracy and users’ comfort.
... Finally, for matching, normalized Euclidean distances between vectorial codes quantify palmprint identity similarity. [62] proposed a novel approach for palmprint identification based on local direction encoding. Specifically, the authors augment native BOCV descriptors with additional "fragile bits" constituting noise-sensitive activations to derive extended BOCV (E-BOCV). ...
Article
Full-text available
This paper presents a comprehensive survey examining the prevailing feature extraction methodologies employed within biometric palmprint recognition models. It encompasses a critical analysis of extant datasets and a comparative study of algorithmic approaches. Specifically, this review delves into palmprint recognition systems, focusing on different feature extraction methodologies. As the dataset wields a profound impact within palmprint recognition, our study meticulously describes 20 extensively employed and recognized palmprint datasets. Furthermore, we classify these datasets into two distinct classes: contact-based datasets and contactless-based datasets. Additionally, we propose a novel taxonomy to categorize palmprint recognition feature extraction approaches into line-based approaches, texture descriptor-based approaches, subspace learning-based methods, local direction encoding-based approaches, and deep learning-based architecture approaches. Within each class, most foundational publications are reviewed, highlighting their core contributions, the datasets utilized, efficiency assessment metrics, and the best outcomes achieved. Finally, open challenges and emerging trends that deserve further attention are elucidated to push progress in future research.
... Guo et al. [20] introduced binary orientation co-occurrence vector (BOCV) which employed zero crossings of Gabor filter bank responses at six different orientations for generating the binary representation of palmprint. Zhang et al. [21] incorporated fragile bits in BOCV [20] to obtain better performance. Fragile bits were masked by making use of inconsistent areas between the boundaries of ones and zeros regions. ...
Article
Full-text available
The straight excitatory filters such as Gabor filters and Modified finite Radon transform can not include the vital and inherent curvature information residing in palmlines of the palmprint. Moreover, Gabor filter bank, employed in majority research work of the literature, is frequency dependent which require tuning to avoid false line representation for principle line/wrinkles. Therefore in this work to evade the false palmline assessment within the neighbourhood region and include inherent curvature attribute of the palmlines, a curvilinear anisotropic filter, (CAGF\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$C_{AGF}$$\end{document}) is proposed and employed for palmprint representation. The proposed filter bank exploits both positive and negative concavities constituted within the palmlines. A novel representation called as the Anisotropic Differential Concavity (ADC\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$AD_{C}$$\end{document}) codes is obtained from difference plane obtained by subtracting curvilinear anisotropic filter responses of the palmprint sample at various orientations and for both positive and negative concavities, followed by the zero-crossings of these difference planes. Finally, it is observed that the experimental performance of the proposed representation, on standard PolyU 2D and IITD touch-less databases, outperforms several state-of-the-art approaches.
Article
Palmprint recognition has gained considerable attention in recent years, accompanied by significant progress. However, large-scale palmprint recognition, which holds great potential for extensive civilian applications like university access control, remains underexplored. In this work, we propose the CUHK-T dataset, the largest palmprint dataset to date, containing over 10k individuals ’ palmprints. As the data volume expands, the heightened complexity, such as similar principal lines from different palms, necessitates a recognition method capable of extracting more discriminative features. Motivated by the rich palm lines distributed in palmprint, including not only nonintersecting, but also intersecting line segments, we model intersecting lines, investigate their properties, and propose a novel and explainable palmprint recognition method. The model treats the nonintersecting line segment as a special case, allowing for the extraction of orientation information from both types of line segments. In addition to the rich orientation information of the intersecting lines, the extracted feature accounts for the relative width of these lines. These advancements enable the extracted rich orientation code to be more discriminative and representative for palmprint. We then present a bitwise similarity measurement for efficiently and effectively comparing two rich orientation codes. Our extensive experiments and evaluations with popular palmprint recognition algorithms demonstrate the effectiveness and superior performance of our method on the large-scale dataset. These results also serve as a foundational baseline, facilitating the advancement of further research in the domain of large-scale palmprint recognition.
Article
Palmprint recognition is an emerging biometrics technology that has attracted increasing attention in recent years. Many palmprint recognition methods have been proposed, including traditional methods and deep learning-based methods. Among the traditional methods, the methods based on directional features are mainstream because they have high recognition rates and are robust to illumination changes and small noises. However, to date, in these methods, the stability of the palmprint directional response has not been deeply studied. In this paper, we analyse the problem of directional response instability in palmprint recognition methods based on directional feature. We then propose a novel palmprint directional response stability measurement (DRSM) to judge the stability of the directional feature of each pixel. After filtering the palmprint image with the filter bank, we design DRSM according to the relationship between the maximum response value and other response values for each pixel. Using DRSM, we can judge those pixels with unstable directional response and use a specially designed encoding mode related to a specific method. We insert the DRSM mechanism into seven classical methods based on directional feature, and conduct many experiments on six public palmprint databases. The experimental results show that the DRSM mechanism can effectively improve the performance of these methods. In the field of palmprint recognition, this work is the first in-depth study on the stability of the palmprint directional response, so this paper has strong reference value for research on palmprint recognition methods based on directional features.
Conference Paper
Full-text available
Palm lines are the most important features for palmprint recognition. They are best considered as typical multiscale features, where the principal lines can be represented at a larger scale while the wrinkles at a smaller scale. Moti- vated by the success of coding-based palmprint recognition methods, this paper investigates a compact representation of multiscale palm line orientation features, and proposes a novel method called the sparse multiscale competitive code (SMCC). The SMCC method first defines a filter bank of sec- ond derivatives of Gaussians with different orientations and scales, and then uses the l1-norm sparse coding to obtain a robust estimation of the multiscale orientation field. Finally, a generalized competitive code is used to encode the domi- nant orientation. Experimental results show that the SMCC achieves higher verification accuracy than state-of-the-art palmprint recognition methods, yet uses a smaller template size than other multiscale methods.
Conference Paper
Full-text available
Biometrics-based personal authentication systems are becoming popular with increased demand on security. A biometrics is expected to have significant amount of discriminatory information in representing uniqueness of a person. This discriminatory information about the biometric is loosely defined as the individuality. Even though some individuality studies have been carried out for fingerprints, face and handwriting, formal analysis of iris individuality has not been carried out. We propose a partial model for iris individuality and show its usefulness in predicting the empirical performance results.
Article
Full-text available
Palmprint images contain rich unique features for reliable human identification, which makes it a very competitive topic in biometric research. A great many different low resolution palmprint recognition algorithms have been developed, which can be roughly grouped into three categories: holistic-based, feature-based, and hybrid methods. The purpose of this article is to provide an updated survey of palmprint recognition methods, and present a comparative study to evaluate the performance of the state-of-the-art palmprint recognition methods. Using the Hong Kong Polytechnic University (HKPU) palmprint database (version 2), we compare the recognition performance of a number of holistic-based (Fisherpalms and DCT+LDA) and local feature-based (competitive code, ordinal code, robust line orientation code, derivative of Gaussian code, and wide line detector) methods, and then investigate the error correlation and score-level fusion performance of different algorithms. After discussing the achievements and limitations of current palmprint recognition algorithms, we conclude with providing several potential research directions for the future.
Article
In this paper, we propose a novel robust line orientation code for palmprint verification, whose performance is improved by using three strategies. Firstly, a modified finite Radon transform (MFRAT) is proposed, which can extract the orientation feature of palmprint more accurately and solve the problem of sub-sampling better. Secondly, we construct an enlarged training set to solve the problem of large rotations caused by imperfect preprocessing. Finally, a matching algorithm based on pixel-to-area comparison has been designed, which has better fault tolerant ability. The experimental results of verification on Hong Kong Polytechnic University Palmprint Database show that the proposed approach has higher recognition rate and faster processing speed.
Article
The development of accurate and robust palmprint verification algorithms is a critical issue in automatic palmprint authentication systems. Among various palmprint verification approaches, the orientation based coding methods, such as competitive code (CompCode), palmprint orientation code (POC) and robust line orientation code (RLOC), are state-of-the-art ones. They extract and code the locally dominant orientation as features and could match the input palmprint in real-time and with high accuracy. However, using only one dominant orientation to represent a local region may lose some valuable information because there are cross lines in the palmprint. In this paper, we propose a novel feature extraction algorithm, namely binary orientation co-occurrence vector (BOCV), to represent multiple orientations for a local region. The BOCV can better describe the local orientation features and it is more robust to image rotation. Our experimental results on the public palmprint database show that the proposed BOCV outperforms the CompCode, POC and RLOC by reducing the equal error rate (EER) significantly.
Conference Paper
Image alignment is a crucial step for palmprint recognition. Current key point based palmprint pre-processing methods, however, can only provide coarse alignment. The rotation of extracted region of interest (ROI) often causes the failure of genuine matching. To solve this problem, in this paper we propose to use iterative closest point (ICP) algorithm for palmprint alignment before matching of features. Using both the palm line and orientation features extracted by high order steerable filters, the proposed method has fast convergence speed and high registration accuracy, which result in greatly improved verification accuracy. Experimental results on Hong Kong PolyU palmprint database demonstrate the effectiveness of the proposed method.
Article
Palmprint recognition has been investigated over 10 years. During this period, many different problems related to palmprint recognition have been addressed. This paper provides an overview of current palmprint research, describing in particular capture devices, preprocessing, verification algorithms, palmprint-related fusion, algorithms especially designed for real-time palmprint identification in large databases and measures for protecting palmprint systems and users’ privacy. Finally, some suggestion is offered.
Article
The most common iris biometric algorithm represents the texture of an iris using a binary iris code. Not all bits in an iris code are equally consistent. A bit is deemed fragile if its value changes across iris codes created from different images of the same iris. Previous research has shown that iris recognition performance can be improved by masking these fragile bits. Rather than ignoring fragile bits completely, we consider what beneficial information can be obtained from the fragile bits. We find that the locations of fragile bits tend to be consistent across different iris codes of the same eye. We present a metric, called the fragile bit distance, which quantitatively measures the coincidence of the fragile bit patterns in two iris codes. We find that score fusion of fragile bit distance and Hamming distance works better for recognition than Hamming distance alone. To our knowledge, this is the first and only work to use the coincidence of fragile bit locations to improve the accuracy of matches.
Article
Biometrics-based personal identification is regarded as an effective method for automatically recognizing, with a high confidence, a person's identity. This paper presents a new biometric approach to online personal identification using palmprint technology. In contrast to the existing methods, our online palmprint identification system employs low-resolution palmprint images to achieve effective personal identification. The system consists of two parts: a novel device for online palmprint image acquisition and an efficient algorithm for fast palmprint recognition. A robust image coordinate system is defined to facilitate image alignment for feature extraction. In addition, a 2D Gabor phase encoding scheme is proposed for palmprint feature extraction and representation. The experimental results demonstrate the feasibility of the proposed system. Author name used in this publication: Wai-Kin Kong