Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 206-209.

• Pattern Recognition & Image Processing • Previous Articles     Next Articles

Algorithm for Human Dorsal Vein FeatureIdentification

YAN Jiao-jiao, CHONG Lan-xiang,LI Ting   

  1. College of Information Science and Technology,Northwest University,Xi’an 710127,China
  • Online:2018-06-20 Published:2018-08-03

Abstract: For the current hand vein image recognition using the extraction structure features such as refinement and skeleton operations,it’s easy to cause the loss of vein structure details and misjudgment of feature points,this paper proposed a hand vein feature recognition algorithm based on gradient histogram gradient (HOG).Adopting general biometric identification process,this algorithm extracts the HOG texture feature of the low-frequency sub-band graph by the directly decomposing two-level wavelet packet after the hand dorsal vein image is preprocessed by image grey normalization pretreatment and filtering enhancement.Then,the personal identity is recognized by using K neighbor classifier.This algorithm was verified finally by using self-established dorsal vein image database.The experimental results show that the proposed algorithm is effective and its correct recognition rate is 95%,and its application prospect is broad.

Key words: Hand vein, Image database, Wavelet packet decomposition, HOG feature, K neighbor classifier

CLC Number: 

  • TP391
[1]赵士伟,张如彩,王月明,等.生物特征识别技术综述[J].中国安防,2015(7):79-86.
[2]郭凯.生物识别技术在社保领域的应用[J].电子技术与软件工程,2017(9):257.
[3]刘元庆.基于指纹识别技术的考务管理终端在国家级教育考试中的应用研究—以徐州考区为例[J].信息技术与信息化,2016(12):36-38.
[4]宋丹,黄旭.生物识别技术及其在金融支付安全领域的应用[J].信息安全研究,2016(1):27-32.
[5]武卫.生物识别技术在机场安保领域的应用[J].中国民用航空,2012(8):16-19.
[6]ZHANG Q,ZHANG X.Research of Key Algorithm in the Technology of Fingerprint Identification [M].IEEE,2010:282-284.
[7]JAFRI R,ARABNIA H R.A Survey of Face Recognition Techniques[J].Journal of Information Processing Systems,2010,5(2):41-68.
[8]李海青,孙哲南,谭铁牛,等.虹膜识别技术进展与趋势[J].信息安全研究,2016(1):40-43.
[9]AKRAM M,AWAN H,KHAN A.Dorsal hand veins based person identification[C]∥IEEE International Conference on Image Processing Theory,Tools and Applications.IEEE,2014:1-6.
[10]HUANG D,ZHU X,WANG Y,et al.Dorsal hand vein recognition via hierarchical combination of texture and shape clues [J].Neurocomputing,2016,214(C):815-828.
[11]张成浩.基于手背静脉的身份识别技术研究[D].哈尔滨:哈尔滨理工大学,2017.
[12]DING Y,ZHANG D,WANG K.A study of hand vein recognition method[C]∥Proceedings of the IEEE International Confe-rence on Mechatronics & Automation.NiagaraFalls,IEEE,2005:2106-2110.
[13]屈冰广.基于基准点和NMI的手背静脉识别算法研究[D].天津:天津理工大学,2016.
[14]WANG Y,LIAO W.Hand vein recognition based on feature coding[C]∥Proceedings of the 7th Chinese Conference on Biometric Recognition,LNCS 7701.Piscataway:IEEE Press,2012:165-175.
[15]ZHU X,HUANG D,WANG Y.Hand dorsal vein recognition based on shape representation of the venous network[C]∥14th Pacific-Rim Conference on Multimedia,PCM 2013.LNCS,2013,8294:158-169.
[16]WU K,LEE J,LO T,et al.A secure palm vein recognition system[J].Journal of Systems and Software,2013,86(11):2870-2876.
[17]任桐慧,刘富,姜守坤,等.基于特征点距离的手背静脉特征融合方法[J].吉林大学学报(信息科学版),2016,34(1):73-78.
[18]田宏亮.基于原点静矩向量的手背静脉识别技术研究[D].开封:河南大学,2010.
[19]HU Y,WANG Z,YANG X,et al.Hand vein recognition based on the connection lines of reference point and feature point[J].Infrared Physics and Technology,2014,62:110-114.
[20]雷芸.人体手背图像中的静脉纹路特征提取优化算法[J].计算机仿真,2015(8):435-438.
[21]岂兴明,周建兴,矫津毅.LabVIEW 8.2中文版入门与典型实例[M].北京:人民邮电出版社,2010.
[22]TANG Y,HUANG D,WANG Y.Hand-dorsa vein recognition based on multi-level keypoint detection and local feature matching[C]∥21st International Conference on Pattern Recognition(ICPR 2012).2012:2837-2840.
[23]林喜荣,庄波,苏晓生.人体手背静脉血管图像的特征提取及匹配[J].清华大学学报(自然科学版),2003,43(2):164-167.
[24]YEN G,LIN K.Wavelet packet feature extraction forvibration monitoring[J].IEEE Transactions on Industrial Electronics,2002,47(3):650-667.
[1] LIU Ying, ZHANG Shuai, GE Yu-xiang, WANG Fu-ping, LI Da-xiang. Survey of Tire Pattern Image Retrieval Techniques [J]. Computer Science, 2018, 45(12): 52-60.
[2] TIAN Xian-xian,BAO Hong and XU Cheng. Improved HOG Algorithm of Pedestrian Detection [J]. Computer Science, 2014, 41(9): 320-324.
[3] ZHOU Xuan-ru,YUAN Jia-zheng,LIU Hong-zhe and YANG Rui. Research on Algorithm for Real-time Recognition of Traffic Light Based on HOG Features [J]. Computer Science, 2014, 41(7): 313-317.
[4] LU Xing-jia,CHEN Zhi-rong,YIN Tian-he and YANG Fan. Research of Pedestrian Tracking Based on HOG Feature and Haar Feature [J]. Computer Science, 2013, 40(Z6): 199-203.
[5] . Construction of Multi-layer Semantic Image Database Based on Mpeg-7 [J]. Computer Science, 2012, 39(Z6): 532-535.
[6] . [J]. Computer Science, 2006, 33(3): 212-214.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .