alexa Abstract | Weapon Authentication and Control System Using Palm Image Verfication
ISSN ONLINE(2278-8875) PRINT (2320-3765)

International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article Open Access


A system designed to prevent people from accessing firearms such as guns or pistols of an authorized person, so that the fire arms are not misused. In many cases these arms are misused by the authorized persons itself after the license period, so to overcome these defects we are discovering a new system in which we use a biometric system to detect the palm print of the person who owns it. There must be a license period for the fire arms and these license period say for one year is entered in the embedded microprocessor fitted in the firearm. A biometric system is essentially a pattern recognition system that makes use of biometric traits to recognize individuals. Palm is the inner surface of the hand between the wrist and fingers. Palm print is referred to as the principal lines, wrinkles and ridges on the palm. This system proposes Weber’s local descriptors based texture analysis of palm print. The hand palm print image is aligned and cropped according to the key points. The palm print image is enh anced and resized. The features of the palm print are compared with the database image feature vectors using correlation metric. If this module is completed successfully then the person info which contains person authentication number with four digits key will be matched with the extracted data from the already hidden image for second level security.

To read the full article Peer-reviewed Article PDF image | Peer-reviewed Full Article image

Author(s): C.A.Devi

Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version