FINGER VEIN VERIFICATION. Krishna Veni A/P Selvan

Similar documents
BORANG PENGESAHAN STATUS TESIS

PINEAPPLE DISTRIBUTION CLASSIFICATION USING RGB AND FUZZY EZRIN TASNIM BIN ABDUL GANI

18V TO 1000V BOOST CONVERTER BENNEDICT BALLY ANAK NAROK UNIVERSITI MALAYSIA PAHANG

BORANG PENGESAHAN STATUS TESIS

A DESIGN METHODOLOGY FOR A SELF-OSCILLATING ELECTRONIC BALLAST AMIRA BINTI MUSTAPA

DEVELOPMENT OF REMOTELY OPERATED UNDERWATER VEHICLE AFIQ FIKRI BIN HAMID UNIVERSITI MALAYSIA PAHANG

BORANG PENGESAHAN STATUS TESIS

Faculty of Mechanical Engineering UNIVERSITI MALAYSIA PAHANG

FIR FILTER FOR MAKHRAJ RECOGNITION SYSTEM AIMI NADIA AZMI

FABRICATION OF PERPETUAL MOTION WATER DRINKING TOY BIRD CHEE SAI HOW UNIVERSITI MALAYSIA PAHANG

DESIGN AND FABRICATE A FLEXIBLE TOILET HOSE WITH SPOOL ABDULLAH MUNZIR BIN ZUL SAFARUDDIN UNIVERSITI MALAYSIA PAHANG

DEVELOPMENT OF A TOOL TO DESIGN AC HARMONIC FILTER FOR HVDC TRANSMISSION SYSTEM CHA KWAN HUNG. A thesis submitted in fulfillment of the

UNIVERSITI MALAYSIA PAHANG BORANG PENGESAHAN STATUS TESIS

UNIVERSITI MALAYSIA PAHANG BORANG PENGESAHAN STATUS TESIS JUDUL: PREDICTION OF GRINDING MACHANABILITY WHEN GRIND HAYNES 242 USING WATER BASED COOLANT

LINE TRACKING ROBOT USING VISION SYSTEMS CHE ROHAZLI BIN CHE MAZLAM

THE DESIGN OF OPTIMUM INVERTER JUSTIN ANAK JAMES

DUAL THRESHOLD VOLTAGE FOR HIGH PERFORMANCE DOMINO LOGIC

BORANG PENGESAHAN STATUS TESIS

UNIVERSITI MALAYSIA SARAWAK

DESIGN OF LOW VOLTAGE CMOS TRISTATE BUFFER. Nurul Huda binti Zulkifli

IMAGE RESTORATION USING MEAN, MEDIAN AND ADAPTIVE FILTER ADELINE CHUA JIA MIN UNIVERSITI TEKNIKAL MALAYSIA MELAKA

ENERGY EFFICIENT ELECTRONIC BLIND SYSTEM FOR HOME WINDOWS. Liew Hon Choi

Study of Laser Cutting Machine & Its Application in Malaysian Industries

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

UNIVERSITI TEKNIKAL MALAYSIA MELAKA DESIGN ANALYSIS OF A PRESS MACHINE FOR DISPOSABLE PET BOTTLE

MOBILE RFID TRACKING SYSTEM: SOFTWARE ARCHITECTURE MD SYAHRUL FAEZ BIN ABD MANAN

1it i I! l <t\ ; i :i'1 "i i "i i; i'»t! : \ f- i " i(f;f! M i'ci i;!i.l iv jm ; i J i.hv{\ i i\oi j i I i'u>u i. V:l j t'i\ l i l ^ f : rft O m

UNIVERSITI TEKNIKAL MALAYSIA MELAKA DEVELOPMENT OF INTERACTIVE MACHINING PROCESS DESIGN AND MACHINING TIME CALCULATION

AN ADAPTIVE ALGORITHM FOR THE TUNING OF TWO INPUT SHAPING METHODS NUR HAFIZAH BINTI HASSAN

Faculty of Cognitive Science and Human Development

UNIVERSITI TEKNIKAL MALAYSIA MELAKA OPTIMIZATION OF FDM PARAMETERS WITH TAGUCHI METHOD FOR PRODUCTION OF FLEXIBLE ABS PART

UNIVERSITI TEKNOLOGI MALAYSIA BORANG PENGESAHAN STATUS TESIS. JUDUL: MICROSTRIP SIERPINSKI CARPET ANTENNA DESIGN. SESI PENGAJlAN: 2004/2005

PERPUSTAKAAN UTHM * *

GENERALIZED CHEBYSHEV MICROWAVE FILTER FOR WIDEBAND APPLICATIONS LIM FENG SHENG

NURHASLINDA BINTI MUSTAFFA KAMAL

MERLIN MIABOT PRO ROBOT SOCCER (2 WHEELS) MUHAMMAD ASYRAF BIN BADARUDDIN

PORTABLE DISTANCE MEASUREMENT MOHD ASHRAF BIN MD SAID

DESIGN AND IMPLEMENTATION OF ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING RECEIVER NORAZNI BINTI YUSOFF

SMART COLOR SORTING ROBOT SITI NADRAH BINTI SELAMAT

Universiti Teknologi Malaysia BORANG PENGESAHAN STATUS TESIS QUALITY CONTROL IN PILE MANAGEMENT SYSTEM SESI PENGAJIAN : 2006/2007

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

DESIGN AND ANALYSIS OF A LOW POWER OPERATIONAL AMPLIFIER USING CADENCE NABILAH BINTI SK.ABD.AZIZ

PERFORMANCE EVALUATION OF OPTICAL AMPLIFIER IN WDM SYSTEM PEH PO ING

PROPAGATION COVERAGE FOR COMMERCIAL BUILDINGS SCENARIOS USING RAY TRACING TECHNIQUES NURUL HASLIN BT NURYA YA

SOCIAL INTERACTION IN VIRTUAL ENVIRONMENT (VIRTUAL ENVIRONMENT/ 3D ANIMATION) ZATIL ALYANI BINTI HANIFAH. for. This project is one of the requirements

PROJECT S TITE EH ZHENG YI

Design and Development of Grass Cutting Machine using DFMA Methodology

WEARABLE ANTENNA FOR 2.4GHz FREQUENCY FOR WLAN APPLICATION NUR RAFEDAH BINTI SATAR

SECURITY EQUIPMENT USING BIOMETRICS MUHAMAD FIRDAUS BIN JUSOH

SPEED CONTROL OF PNEUMATIC CYLINDER USING ON/OFF VALVE AND PWM SITI AMIRAH BINTI MOHD PADLI

DESIGN OF APPLICATION WIRELESS HOME SPEAKER SYAFIQAH BINTI SHAHRUZZAMAN

M! <"; P-. r» S.IT P» '<» ;f. r A J, ft 9" Ffc -"N!"> S 5 t I! A; '? ; ' -t' :.» T" V 1. u.i.ju S iuvw-» ( imiti v Slls.-nnwi..i!

AN AUTOMATIC POURING MACHINE ADNAN BIN AHMAD

DESIGN AND SIMULATION OF ADAPTIVE CRUISE CONTROL USING MATLAB/SIMULINK MOHD FIRDAUS BIN JAHAR

LOCALIZATION AND POSITIONING via Wi-Fi SIGNALS MOHD IDZWAN BIN OTHMAN

DESIGN AND DEVELOPMENT OF SEMG ACQUISITION SYSTEM USING NI MYRIO FOR PROSTHESIS HAND LIAO SHING WEN

MICROSTRIP BANDPASS FILTER DESIGN (COMBLINE) MOHAMAD HAMIZAN BIN TUAH

CHILD SAFETY MONITORING SYSTEM

MUSIC SYNCHRONIZED LIGHTING SITI HAWA BINTI MAT ISA

OPTIMUM DESIGN OF RECTIFYING CIRCUIT OF RF ENERGY TRANSFER RAHMIYENI BINTI ASWIR

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

POWER AMPLIFIER DESIGN FOR ULTRA-WIDEBAND APPLICATIONS MUHAMMAD SYAHIR BIN YOSUF

A COMPARATIVE STUDY OF TOPOLOGY CONTROL ALGORITHM IN WIRELESS SENSOR NETWORK MUHAMAD IZZAT AFIFI BIN ROSLAN

MICROSTRIP LEAKY WAVE ANTENNA DESIGN FOR WLAN APPLICATION NURLIYANA BT ABD MALIK

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

DESIGN OF DUAL BAND FREQUENCY SELECTIVE SURFACE NORSHAHIDA BINTI MOHD SAIDI B

MELISSA SARA ECHA ANAK GABRIEL

DESIGN OF RECTIFIER WITH IMPEDANCE MATCHING CIRCUIT FOR RF ENERGY HARVESTING ENA BINTI AMILHAJAN

DESIGN AND IMPLEMENTATION OF A LOW COST PORTABLE AND COMPACT 2.4 GHZ SPECTRUM ANALYZER

A NEW APPROACH FOR INDUSTRIAL PRODUCT INSPECTION BASED ON COMPUTER VISION AND IMAGE PROCESSING TECHNIQUE MOHD KHAIRULDIN BIN HASSAN

WIRELESS ENERGY TRANSFER MOHD NASUHA BIN MOHAMAD ZIN

LINE FOLLOWING ROBOT

Design of Wheelbarrow for Construction Industry Utilizing Ergonomics Analysis and QFD

SIMULATION OF AN ARTICULATED ROBOT ARM MUHAMAD FAZRUL BIN MD ZAIN UNIVERSITI TEKNIKAL MALAYSIA MELAKA

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

VISION SYSTEM BASED HEIGHT MEASURING MACHINE ROZEANA BINTI ABD RAHMAN

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

A METHODOLOGY TO DEVELOP ONTOLOGY OF ADDITIVE MANUFACTURING USING FORMAL ATTRIBUTES SPECIFICATION TEMPLATE (FAST)

THE DESIGN OF ANTIPODAL VIVALDI ANTENNA USING GRAPHENE NURUL SYUHADA BINTI HASIM UNIVERSITI TEKNIKAL MALAYSIA MELAKA

BO RANG PENGESAHAN ST A TUS TES IS*

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

ENERGY SCAVENGING FOR MOBILE AND WIRELESS DEVICE USING HIGH-EFFICIENCY RECTIFIER CIRCUIT LEE YOUHUI UNIVERSITI TEKNIKAL MALAYSIA MELAKA

COMPARISON OF PERFORMANCE OF VARIOUS OP-AMP TOPOLOGIES USING CMOS 0.13µm TECHNOLOGY NURUS SAADAH BT CHE MAT

LOG PERIODIC ANTENNA DESIGN SITI NORHIDAYAH BINTI HJ. MOHAMED

WIRELESS POWER TRANSFER FOR ELECTRIC VEHICLES AMALUDDIN BIN ZAINUDDIN

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

HOME AUTOMATION SYSTEM USING POWER LINE COMMUNICATION DARLENE BINTI MOHAMAD DOUGLAS

STUDY OF DESIGN CONSIDERATION AND PERFORMANCE ANALYSIS OF SUBSTRATE INTEGRATED WAVEGUIDE COMPONENTS ADILAH BINTI ABU SAMAH

DESIGN OF THERMOELECTRIC ENERGY HARVESTER USING LTC 3108 BOOST CONVERTER MUHAMMAD ZULHAIZER BIN AB RASHID

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

UNIVERSITI TEKNIKAL MALAYSIA MELAKA FINAL YEAR PROJECT 2 BENU 4984 TITLE:

AN ANALYSIS OF SIGLE-LAYER DIFFERENTIAL CPW-FED NOTCHED-BAND TAPERED-SLOT UWB ANTENNA MUHAMMAD FATHI BIN AZHAR

Signature : Supervisor : Mr. Loi Wei Sen

UNIVERSITI TEKNIKAL MALAYSIA MELAKA STUDY OF SPEED CONTROL FOR AN ELECTRIC BICYCLE BASED ON PID CONTROL ALGORITHM

WIRELESS WEATHER STATION BY USING ZIGBEE

CENTRALIZED WIRELESS SENSOR NETWORK DEPLOYMENT MAGESWARAN A/L R JAGANATHAN

B BACHELOR OF MANUFACTURING ENGINEERING (MANUFACTURING PROCESS) (HONS.) 2012 UTeM

CURVE TRACER USING MICROCONTROLLER ASYRAF TAQIUDDIN BIN AHMAT TAHIR

Transcription:

FINGER VEIN VERIFICATION Krishna Veni A/P Selvan Bachelor of Engineering with Honours (Electronics and Computer Engineering) 2009

UNIVERSITI MALAYSIA SARAWAK BORANG PENGESAHAN STATUS TESIS R13a Judul: FINGER VEIN VERIFICATION SESI PENGAJIAN: 2008/2009 Saya KRISHNA VENI A/P SELVAN mengaku membenarkan tesis * ini disimpan di Pusat Khidmat Maklumat Akademik, Universiti Malaysia Sarawak dengan syarat-syarat kegunaan seperti berikut: 1. Tesis adalah hakmilik Universiti Malaysia Sarawak. 2. Pusat Khidmat Maklumat Akademik, Universiti Malaysia Sarawak dibenarkan membuat salinan untuk tujuan pengajian sahaja. 3. Membuat pendigitan untuk membangunkan Pangkalan Data Kandungan Tempatan. 4. Pusat Khidmat Maklumat Akademik, Universiti Malaysia Sarawak dibenarkan membuat salinan tesis ini sebagai bahan pertukaran antara institusi pengajian tinggi. 5. ** Sila tandakan ( ) di kotak yang berkenaan SULIT (Mengandungi maklumat yang berdarjah keselamatan atau kepentingan Malaysia seperti yang termaktub di dalam AKTA RAHSIA RASMI 1972). TERHAD (Mengandungi maklumat TERHAD yang telah ditentukan oleh organisasi/badan di mana penyelidikan dijalankan). TIDAK TERHAD Disahkan oleh (KRISHNA VENI SELVAN) (EN. TENGKU MOHD AFENDI) Alamat tetap: 52, Laluan Sg. Choh 5, Taman Berjaya, 31250 Ipoh, Perak. Tarikh: Tarikh: CATATAN * Tesis dimaksudkan sebagai tesis bagi Ijazah Doktor Falsafah, Sarjana dan Sarjana Muda. ** Jika tesis ini SULIT atau TERHAD, sila lampirkan surat daripada pihak berkuasa/organisasi berkenaan dengan menyatakan sekali sebab dan tempoh tesis ini perlu dikelaskan sebagai SULIT atau TERHAD.

This final year project report: Title : Finger Vein Verification Prepared by : Krishna Veni A/P Selvan Matric No. : 14306 Is hereby read and approved by: En. Tengku Mohd Afendi Zulcaffle Date ( Project Supervisor )

FINGER VEIN VERIFICATION KRISHNA VENI A/P SELVAN Thesis is submitted to Faculty of Engineering, Universiti Malaysia Sarawak in partial fulfillment of the requirements for the degree of Bachelor of Engineering with Honours (Electronic and Computer Engineering) 2009

Dedicated to my beloved parent

ACKNOWLEDGEMENT Initially, the author would like to express her sincere appreciation and gratitude to her project supervisor, Mr. Tengku Mohd Afendi Zulcaffle for his guidance and support in accomplishing the project. Likewise, the author would be very pleased to extend her appreciation to Dr. Bakhtiar Affendi Rosdi from University of Science Malaysia, Penang for giving such previous database that enable the project to be conducted successfully. The author would also like to express her earnest appreciation to her parent and siblings for their unwavering love and support. At the same time, the author would like to dedicate a special thanks to all her friends for their constant encouragements. Last but not least, the author would like to acknowledge the assistance and help of her seniors, Kak Siti and brother Lai in completing the project.

ABSTRAK Pada masa kini, sistem biometrik digemari ramai kerana peringkat keselamatannya yang tinggi dapat mengurangkan penipuan, pencerobohan dan peniruan. Sistem biometrik menggunakan ciri-ciri fisiologi dan karakteristik kelakuan seseorang seperti muka, cap jari, iris, tulisan, suara, tandatangan dan sebagainya. Dewasa ini, antara ciri biologi yang digunakan sebagai sistem biometrik adalah urat jari. Urat jari memiliki kekuatan, kestabilan dan yang paling pentingnya ia amat unik bagi setiap individu. Oleh yang demikian, fungsi ini menawarkan tahap keselamatan yang tinggi kerana sebarang penipuan tidak dapat dilakukan dengan mudah. Projek mengesahkan urat jari ini dapat mengesahkan urat jari identiti seseorang berdasarkan corak urat seseorang. Secara umumnya, imej-imej urat jari tersebut akan diproses terdahulu dan satu rangkaian neural akan dikembangkan untuk mengesahkan imej urat jari. Prestasi pengesahan urat jari ini akan dinilai. Secara keseluruhannya, projek ini telah mencapai kejituan sebanyak 82.86%.

ABSTRACT At present, biometric system is well-liked as its high security level manage to reduce frauds, intrudes and forgeries. A biometric system utilizes physiological features and behavior characteristics of an individual such as face, finger mark, iris, handwriting, voice, signature and others. One of the recent biology feature used as biometric system is the finger vein. The vein features are robust, stable and most importantly unique for every individual. This trait offers a higher security because forgery is extremely difficult. The finger vein verification project verifies a person s identity based on the vein patterns. Generally, the finger vein images are pre-processed and a neural network algorithm is developed to verify the finger vein images. Last but not least, the performance of the finger vein verification is evaluated. The project achieved an overall accuracy of 82.86%.

TABLE OF CONTENTS Contents Pages ACKNOWLEDGEMENT ABSTRAK ABSTRACT TABLE OF CONTENTS LIST OF FIGURES LIST OF TABLES LIST OF ABBREVIATIONS iii iv v vi x xii xiii CHAPTER 1 INTRODUCTION 1.1 Background 1 1.2 Problem Statement 3 1.3 Motivation 4 1.4 Project Overview 5 1.5 Project Objectives 5 1.6 Project Outlines 6 1.7 Summary 8 CHAPTER 2 LITERATURE REVIEW 2.1 Vascular Biometric 9

2.2 Biometric Verification for Personal Identification 10 2.3 Digital Image Processing 10 2.3.1 Digital Images 11 2.3.2 Basic Concepts of Digital Imaging 11 2.4 Finger Vein Processing Techniques 12 2.4.1 Median Filtering 12 2.4.2 Image Threshold 15 2.4.3 Pattern Extraction 16 2.4.3.1 Sobel Edge Detector 17 2.4.3.2 Prewitt Edge Detector 19 2.4.3.3 Roberts Edge Detector 20 2.4.3.4 Canny Edge Detector 21 2.5 Artificial Neural Network 23 2.5.1 Biological Neural Network 23 2.5.2 Neural Network Model 24 2.5.3 Feedforward Network 27 2.5.4 Training 28 2.5.4.1 Supervised Learning Rules 28 2.5.4.2 Unsupervised Learning Rules 29 2.5.5 Pattern Recognition 30 2.6 Summary 31 CHAPTER 3 METHODOLOGY 3.1 Data Set 32 3.2 MATLAB : Image Processing Toolbox 33

3.3 Flow Chart of the Finger Vein Verification Project 34 3.3.1 Image Crop 35 3.3.2 Training and Testing Images 36 3.3.3 Image Pre-processing 36 3.3.3.1 Converting into Gray Image 37 3.3.3.2 Median Filter 38 3.3.3.3 Canny Edge Detection 39 3.3.4 Backpropagation Neural Network 40 3.3.4.1 Architecture of Backpropagation Neural Network with Two Hidden Layers 40 3.3.4.2 Algorithm of Backpropagation Neural Network 42 3.3.4.3 Notation 43 3.3.4.4 Activation Function 45 3.3.4.5 Training Algorithm 46 3.4 Training the Network 49 3.4.1 Flow Chart for Image Training 50 3.4.1.1 Random Weight Initialization 52 3.4.1.2 Training Images and Targets 52 3.4.1.3 Image Resized and Converted into Row Matrices 53

3.4.1.4 Flow Chart of Backpropagation Training 54 3.4.1.5 Stored Weight Matrices 56 3.5 Finger Vein Verification 57 3.6 Performance Evaluation 59 3.7 Summary 60 CHAPTER 4 RESULTS, ANALYSIS AND DISCUSSIONS 4.1 Image Pre-processing 61 4.2 Random Weight Initialization 63 4.3 Learning Rate 65 4.4 Number of Hidden Neurons 66 4.5 Number of Iterations 67 4.6 Training the Network 68 4.7 Finger Vein Verification 72 4.8 Performance Evaluation 73 4.8.1 Correct Verifications 73 4.8.2 Incorrect Verifications 74 4.9 Summary 75 CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS 5.1 Conclusions 76 5.2 Recommendations 77 REFERENCES 79 APPENDIX A 83 APPENDIX B 85

LIST OF FIGURES Figures Pages 1.1 Applications of finger vein authentication and future developments. 2 2.1 The operation of median filter. 13 2.2 Original finger vein image is shown in the left side and in the right side is its pattern extracted using adaptive threshold method. 15 2.3 The Sobel edge detector. 18 2.4 Prewitt edge detector. 19 2.5 Roberts edge detector. 20 2.6 Roberts, Sobel, Prewitt and Canny edge detection operators. 22 2.7 Biological neural network structure. 24 2.8 The connection between inputs and weights in a neuron model. 25 2.9 A simple neural network. 26 2.10 A feedforward 3-2-3-2 network. 27 2.11 The supervised learning. 29 2.12 Unsupervised learning. 30

3.1 Three samples of finger vein images of three different people in (a), (b) and (c) with its original size 480 640 pixels. 33 3.2 Flow chart of the finger vein verification project. 34 3.3 Image (a) is the original image of 480 640 pixels and image (b) is the cropped image with new size of 480 190 pixels. 35 3.4 Image pre-processing methods. 37 3.5 Backpropagation neural network with two hidden layers. 41 3.6 Binary sigmoid, range (0,1). 46 3.7 A detail flow chart for image training. 51 3.8 Flow chart of backpropagation training. 55 3.9 Flow chart of the finger vein verification. 58 4.1 Image (a) is the extracted ROI. After performing Canny edge detection, image (b) is the result without median filtering and image (c) is the result with median filtering. 62

LIST OF TABLES Tables Pages 3.1 A set of notations used in the backpropagation net. 43 4.1 The influence of initial weight. 64 4.2 The result of several learning rates used. 65 4.3 The influences of numbers of neurons. 66 4.4 The influence of the number of iterations. 68 4.5 The result of the image training. 69

LIST OF ABBREVIATIONS CSV - Comma Separate Value MATLAB - Matrix Laboratory RGB - Red Green Blue ROI - Region of Interest

CHAPTER 1 INTRODUCTION 1.1 Background According to [21], rapid developments of science and information technology lead to a major security problem that needs an immediate solution. Basically, there are two types of traditional identity recognition. The first technique is based on the contents, such as code, password and others. There are possibilities for the codes and passwords to be forgotten. While, the second technique is based on items, such as certificate, key, smart card and many more. The certificate, key and smart card are more prone to be forged, stolen or lost. Furthermore, both of these methods can be abused and easily intruded. Hence, it gives rises to the identity recognition based on biology features. It utilizes inherent physiological features and behavior characteristics of an individual. Examples of physiological features are face, finger mark, iris, vein and so on. Some examples of behavior characteristics are like handwriting, voice, signature and others.

Vein pattern is defined as the vast network of blood vessels underneath the skin of a particular part of a human body. Veins features are robust, stable and largely hidden patterns. Vein biometric systems work on the fact that everyone has distinct vein patterns. In addition, vein patterns are not easily observed, damaged, or changed. Finger vein verification is a biometric approach to verify an individual s identity by recognizing the pattern of blood veins in the finger. The applications of finger vein authentication and future developments are shown in Figure 1.1. Figure 1.1 Applications of finger vein authentication and future developments. [7]

1.2 Problem Statement Generally, security has become a popular issue as the growth of computer and network technology increases. This is due to the great security demand for person goods, in-house network, building passage, internet and electronic commerce. Thus, the requirement for a better and more reliable method for identity authentication becomes more significant. Biometrics can provide a better solution to reduce these security problems. [20] As stated in [20], there are more possibilities for the identity cards to be lost or the passwords can be forgotten. These problems can be overcome by using an individual s biology features such as face, finger mark, palm print and veins. In comparison, the finger mark recognition, face recognition, iris recognition, palm shape recognition and gait recognition have lower assurance coefficients. A relatively mature, reliable, nondisturbing and more convenient biometric technique by using the finger mark. But, this finger mark methods have some drawbacks: There are less finger mark features for some people or some colony can t meet the demands of building record. The crime finger mark databank in the automatic finger mark identifying system is so widely used by the global judicial practice that people have wariness with it. By using finger mark, the user s finger mark pattern is left in the finger mark collector, and these patterns can be used to copy finger mark.

The finger vein identifying system is more efficient and can solve many difficulties faced by traditional biometrics method. Compared to finger mark, the finger vein has more advantages which are emphasized in [20] such as: Universality and uniqueness. The vein images are different for all human. Plus, the vein images are not influenced by the increase of ages. The vein lies inside human body. Thus, the finger vein recognition has no effects on body health. It is difficult to forge or change the vein feature of an individual. The epidermis status does not have any effects on the finger vein. 1.3 Motivation The characteristics of the finger vein which makes the user authentication more secure are the uniqueness, stability and its tolerance to forgery. The number of veins, their position and the points at which they cross are not the same for everyone. Even identical twins have different vein patterns. Finger veins are never influenced by aging, skin discoloration or time which means the vein pattern remains as it was. Furthermore, the finger veins are invisible and internal to the body, so it is difficult for intruders to forge them. Thereby, the finger veins are proved to be more reliable and enabling a very high level of security. This finger vein biometrics will gain public s attention due to its high accuracy, response timing, contact-less and non-intrusive technology.

1.4 Project Overview Finger vein is a very unique and stable biology characteristic that has a huge potential to be used in user identifications as compared to other biology characteristics like finger print, iris, palm print, face and so forth. Finger vein verification is a process of verifying an individual s finger vein by matching the person s finger vein with the templates stored in database. This project involves the application of digital image processing to pre-process the finger vein images. The software used for the project is Matrix Laboratory (MATLAB ). An algorithm is created for finger vein verification using neural network. Specifically, the supervised backpropagation neural network is implied in this project. The project is divided into two main phases, training the images and finger vein verification. 1.5 Project Objectives The objectives of the project are: i. To apply digital image processing methods to pre-process the finger vein images. ii. Develop an algorithm to match and verify the finger vein images with the stored images using neural network.

1.6 Project Outlines Chapter 1 is generally an introduction to the project. In the background section, a general explanation on biometric systems is presented. Problem statement is section where the drawbacks of current biometric systems are discussed. Meanwhile, the motivation section suggested a better biometric solution using finger vein. Also, this chapter contains project overview, project objectives and project outlines. In the project overview, it briefly describes about the finger vein verification project. The project objectives are the aims of doing this project and they are successfully achieved at the end of the project. Furthermore, the project outline provides information which is delivered via the separate chapters. Chapter 2 gathers all the information needed to accomplish the project. This chapter emphasizes on past researches and studies done by other researchers or engineers which is related to the project. The chapter begins with some details regarding vascular biometrics and biometrics verification. Next, the digital image processing methods that are used for image pre-processing are discussed. Lastly, a brief introduction about artificial neural network and its descriptions are given.

Chapter 3 begins with a brief explanation of image database for the project. This is followed by detailed flow charts for the developed project. The next sub-topic discussed on the methods used to process, pre-filter as well as to extract features of the finger vein images. Finally, the patterns matching procedures are elaborated. Some related neural networks information is explained in order to understand the developed algorithm. The overall methods of finger vein verification process are discussed in very detail in this chapter. In chapter 4, all the important results obtained are shown and explained in well manner. Related data, plots and graphs are inserted into this chapter to justify the obtained results. The results are translated into an inclusive conclusion. The analysis section emphasizes on analyzing the images, factors that affects the image matching and verification process. All the problems faced in the project that resists from getting the expected results are also discussed in this chapter. The overall results and performance are indicated. The chapter 5 concludes the overall objectives and targets that are achieved. The finger vein verification s project limitations are elaborated. Furthermore, some useful recommendations are given for future works.

1.7 Summary Biometric system is very useful as it employs biology features of an individual. Finger vein features are one of the good biological characteristic that is stable and distinct for everybody. Thus, it can ensure a higher security of the developed system. Compare to other biological traits such as finger mark, finger vein provides more advantages in terms of their uniqueness. Therefore, it strictly disallows frauds and intrudes into its system. Finger vein verification verifies an individual s finger vein by comparing and matching the person s finger vein with the stored templates. The objectives of the project are to apply digital image processing methods to pre-process the finger vein images and to develop an algorithm to match and verify the finger vein images with the stored images using neural network. Last but not least, an outline of the structures of the following chapters is provided.