0% found this document useful (0 votes)
29 views5 pages

Model IEEE Format

Uploaded by

vdarshan0703
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views5 pages

Model IEEE Format

Uploaded by

vdarshan0703
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

House Authentication Using Finger Vein Based On Anatomical

Features of Vein Patterns

D.Chithra1, T. Veena2, A.M Sermakani3, S. Juliafaith4, P. Senthil5


1,2,3,4,5,6
Department of Information Technology ,S.A Engineering College (Anna University), Chennai, India
1
[email protected], [email protected], [email protected], [email protected],
5
[email protected]

Abstract: robust authentication mechanism. The project's

Finger vein recognition, a method of biometric primary goal is to seamlessly integrate Finger Vein

authentication, utilizes pattern recognition ID into existing home access control systems,

techniques based on finger vein images located prioritizing both seamlessness and high security.

beneath the skin's surface. Serving as a biometric Motivated by the escalating need for advanced

authentication system, Finger Vein ID compares an security measures, the project aims to address the

individual's vein pattern with previously collected importance of safeguarding sensitive personal

data. With a focus on bolstering home security, our information within homes. Finger Vein

objective is to offer straightforward and adaptable Authentication emerges as a promising solution,

solutions for safeguarding sensitive information surpassing traditional access control measures in

within residential settings. The integration of finger effectiveness and reliability. Overall, the

vein authentication at the home entry level ensures introduction highlights the innovative potential of

that only authorized individuals gain access. By Finger Vein Authentication in reshaping home

leveraging finger vein authentication for home security, promising enhanced privacy and comfort

security, we aim to explore its various applications while safeguarding against unauthorized access.

and underscore its effectiveness in ensuring the


II.METHODOLOGY
privacy of personal data within the confines of
homes. The methodology for implementing finger vein
authentication for securing house access is outlined
Keywords: FEBA classification, finger vein
comprehensively in this project. It initiates with
biometrics, Matching vein anatomy, Cloud-based
authorized individuals scanning their finger vein
authorized, biometrics verification
pattern, which is then compared against stored
patterns in the database. If a match is detected,
I.INTRODUCTION
access is granted; otherwise, an alarm alerts the
authorized user of a potential unauthorized attempt.
The introduction presents Finger Vein
The methodology encompasses several essential
Authentication, also known as Finger Vein ID, as a
modules such as Bio Auth, Data Curate, Trespass
cutting-edge biometric authentication method
Alert, Sensory Scrutiny, Vision Probe, and Cloud
tailored for home security. It utilizes advanced
Sentry. These modules collectively establish a
pattern recognition techniques to analyze unique
robust security system using finger vein
vein patterns beneath the skin's surface, ensuring a
authentication, ensuring both access control and enhancing overall system security. Additionally,
monitoring capabilities. sensory scrutiny and the vision probe module

In the finger vein authentication process, the contribute to real-time monitoring and identity

scanned finger vein pattern undergoes detailed verification, further bolstering the system's security

pattern extraction and analysis against pre- measures.

registered templates using sophisticated algorithms. The Cloud Sentry module offers a contemporary
This meticulous process evaluates the similarity remote access control solution, allowing authorized
between the scanned pattern and authorized users to manage access privileges, set personalized
templates, enabling secure and reliable schedules, and monitor security events through a
authentication based on unique vein patterns. The cloud-based platform. This module enhances
data curation process refines and analyzes finger accessibility and provides comprehensive real-time
vein patterns to ensure the accuracy and monitoring capabilities, further strengthening the
effectiveness of the authentication system. overall security infrastructure. The implementation
Preprocessing of raw images, feature extraction, of these modules is visually represented in a
classification, and pattern analysis are integral diagrammatic format, facilitating a clear
steps in this process, enhancing understanding and understanding of the system architecture and

enabling comprehensive authentication. workflow. The implementation of these modules is


visually represented in a diagrammatic format, as
illustrated in Figure 1.
III.IMPLEMENTATIONS

The F3EB2AS classification system is a notable


advancement in biometric authentication,
expanding upon the original set of vein patterns to
include eight distinct patterns. This classification
enables a comprehensive analysis of finger vein
patterns, facilitating precise comparison between
an individual's vein pattern and authorized
templates for accurate authentication.
FIGURE 1 . Module Implementation
FORK PATTERNS: F1, F2, F3

Unauthorized access detection involves continuous The vascular structures exhibit a distinct 'Y' shaped
monitoring of access attempts to identify any pattern, commonly referred to as forks, formed by
unauthorized patterns. Upon detecting a mismatch, the branching streams of the primary arteries
the system promptly generates alert messages, within the system. Our observation identified three
swiftly delivered to authorized users through primary types of fork shapes: Up Fork (UF), Down
various communication channels. This proactive Fork (DF), and the Double Fork (DF).
approach to security breaches ensures timely Up Fork (UF):
response and mitigation of potential threats,
The Up Fork pattern occurs when a vein segment
divides into two branches, with both branches The eye structure results from the fusion of two
pointing upwards. It represents a Y-shaped circularly bent and intersecting segments. There
structure pointing upward, contributing to its are different types of eyes: A loop viewed within or
recognition and analysis for biometric within the same SAV. Multiple loops were created
authentication purposes. in the same SAV.

Down Fork (DF):

In contrast, the Down Fork pattern features


branches that extend downwards, appearing as a
bifurcation where the vein splits into two
downward-facing branches. It shares similarities FIGURE 3. Eye Pattern

with the Up Fork pattern


BRIDGE PATTERNS: B1, B2
he bridge class is characterized by the bridge-like
pattern connecting two SAVs, resembling at least
but differs in the direction of branch extension as one "tilted H" shape in the figure. A key feature is
shown in Fig 2(b). the direct correlation between SAVs, providing a
Double Fork (DF): combination of Y and inverted Y models. The
bridges exhibit various group differences, resulting
The Double Fork pattern is characterized by a more
in complex patterns in the figures.
complex bifurcation, where one vein segment
divides into two sets of branches. Recognizing this Acute Bridge (AB):
In the Acute Bridge pattern, the angle formed
pattern involves analyzing distinct features within between the connecting vein segments is acute,
vein images, contributing to its accurate meaning it is less than 90 degrees. This pattern
appears as a bridge-like structure as shown in
identification and analysis for biometric
Fig 4(a) where two SAVs are connected by a
authentication purposes as shown in Fig 2(a). vein segment, forming sharp, acute angles at the
connection points between the SAV.

Obtuse Bridge (OB):


In contrast, the Obtuse Bridge pattern features an
angle between the connecting vein segments that is
obtuse, meaning it is greater than 90 degrees. This
FIGURE 2. (a) Double Fork (b) Down Fork
pattern involves a bridge-like structure connecting
EYE PATTERN: two SAVs as shown in Fig 4(b), with wider, obtuse
This eye class is characterized by visual inspection angles at the connection points between the SAVs.
of the nerve or its branches which form a loop-like
structure reminiscent of the contour of the human
"eye" as shown in Fig 3, hence its name is
distinguished by the enclosed region of fibers a
parallels connecting two SAVs if found elsewhere.
FIGURE 4(a)Acute Bridge(b) Obtuse Bridge
home security system, providing users with
ARCH PATTERN increased convenience and peace of mind.
The Arch class is characterized by the presence of
V.CONCLUSION
an arch-like structure that connects two SAVs,
resembling the superficial venous arch found in The conclusion highlights the success of Finger

finger vein anatomy. This class typically consists of Vein Authentication in securing home access

tributaries without major branches and exhibits key through robust pattern recognition. Integration of

characteristics such as a convex-shaped structure web camera sensing and cloud-based access

located between two SAVs. Additionally, the arch enhances functionality, while alarms for

usually displays few connecting lines, forming a unauthorized access and visual monitoring bolster

sunburst-like pattern at its junctions with the SAVs. security measures. Proposed enhancements aim to
address existing limitations, offering real- time
monitoring and improved accuracy. Overall, Finger
Vein Authentication proves promising for
safeguarding residential spaces with its reliable and
effective access control capabilities.
FIGURE 5 . Arch Pattern

SPIRAL PATTERN
The Spiral pattern in finger vein recognition
involves vein segments winding around a VI.REFERENCES
central axis, forming a distinctive spiral-shaped
pattern. These patterns vary in complexity, with [1] K. Shaheed, A. Mao, I. Qureshi, M.
some tightly wound and others loosely arranged. Kumar, S. Hussain, and X. Zhang, ‘‘Recent
They can be continuous or interrupted, showing
differences in the number of coils, tightness, and advancements in finger vein recognition
orientation. Recognizable by its unique technology: Method- ology, challenges and
appearance, the Spiral pattern provides valuable opportunities,’’ Inf. Fusion, vol. 79, pp. 84–109,
information for accurate and reliable
identification in biometric authentication Mar. 2022.
systems based on finger vein recognition.
IV.FUTURE ENHANCEMENT [2] W. Liu, H. Lu, Y. Wang, Y. Li, Z. Qu, and
Y. Li, ‘‘MMRAN: A novel model for finger vein
The content discusses plans to enhance the current
recognition based on a residual attention
home security system by developing a mobile
mechanism,’’ Appl. Intell., vol. 53, no. 3, pp. 3273–
application. This app will enable authorized users
3290, Feb. 2023.
to remotely manage home access using their
smartphones or tablets. It will offer features such [3] J. Peng, N. Wang, A. A. A. El-Latif, Q. Li,
as real-time alerts for security incidents, simplified and X. Niu, ‘‘Finger-vein verification using Gabor
management of temporary access permissions, filter and SIFT feature matching,’’ in Proc. 8th Int.
remote door control, and live surveillance feed Conf. Intell. Inf. Hiding Multimedia Signal
access for visual verification of visitors. Overall, Process., Jul. 2012, pp. 45–48.
the integration of mobile capabilities aims to [4] B. A. Rosdi, W. S. Chai, and S. A. Suandi,
improve the functionality and accessibility of the ‘‘Finger vein recognition using local line binary
pattern,’’ Sensors, vol. 11, no. 12, pp. 11357–
11371, 2011.

[5] L. Yang, G. Yang, X. Xi, X. Meng, C.


Zhang, and Y. Yin, ‘‘Tri-branch vein structure
assisted finger vein recognition,’’ IEEE Access,
vol. 5,pp. 21020–21028, 2017.

[6] A. Krishnan, T. Thomas, and D. Mishra,


‘‘Finger vein pulsation-based biometric
recognition,’’ IEEE Trans. Inf. Forensics Security,
vol. 16,pp. 5034–5044, 2021.

[7] G. R. Nayar, T. Thomas, and S. Emmanuel,


‘‘Graph based secure can- celable palm vein
biometrics,’’ J. Inf. Secur. Appl., vol. 62, Nov.
2021, Art. no. 102991.

[8] C. B. Yu, H. F. Qin, and Y. Z. Cui, ‘‘Finger-


vein image recognition combining modified
Hausdorff distance with minutiae feature matching,’’
Interdiscipl. Sci. Comput. Life Sci., vol. 1, no. 4, pp.
280–289, 2009.

You might also like