Pattern Recognition 42 (2009) 1408--1418
Contents lists available at ScienceDirect
Pattern Recognition
journal homepage: www.elsevier.com/locate/pr
A survey of palmprint recognition
Adams Kong
a, ∗
, David Zhang
b
, Mohamed Kamel
c
a
Forensic and Security Laboratory, School of Computer Engineering, Nanyang Technological University, Block N4, Nanyang Avenue, Singapore 639798, Singapore
b
Biometrics Research Centre, Department of Computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong
c
Pattern Analysis and Machine Intelligence Research Group, Department of Electrical and Computer Engineering, University of Waterloo, 200 University Avenue West, Ontario, Canada
ARTICLE INFO ABSTRACT
Article history:
Received 14 December 2007
Received in revised form 7 November 2008
Accepted 11 January 2009
Keywords:
Biometrics
Security
Identical twins
Privacy
Template protection
Palmprint recognition has been investigated over 10 years. During this period, many different problems
related to palmprint recognition have been addressed. This paper provides an overview of current palm-
print research, describing in particular capture devices, preprocessing, verification algorithms, palmprint-
related fusion, algorithms especially designed for real-time palmprint identification in large databases
and measures for protecting palmprint systems and users' privacy. Finally, some suggestion is offered.
© 2009 Elsevier Ltd. All rights reserved.
1. Introduction
The inner surface of the palm normally contains three flexion
creases, secondary creases and ridges. The flexion creases are also
called principal lines and the secondary creases are called wrinkles.
The flexion and the major secondary creases are formed between
the third and fifth months of pregnancy [36] and superficial lines
appear after we born. Although the three major flexions are genet-
ically dependent, most of other creases are not [2]. Even identical
twins have different palmprints [2]. These non-genetically determin-
istic and complex patterns are very useful in personal identifica-
tion. Human beings were interested in palm lines for fortune telling
long time ago. Scientists know that palm lines are associated with
some genetic diseases including Down syndrome, Aarskog syndrome,
Cohen syndrome and fetal alcohol syndrome [68]. Scientists and for-
tunetellers name the lines and regions in palm differently as shown
in Fig. 1 [30].
Palmprint research employs either high or low resolution im-
ages. High resolution images are suitable for forensic applications
such as criminal detection [24]. Low resolution images are more
suitable for civil and commercial applications such as access control.
Generally speaking, high resolution refers to 400 dpi or more and low
resolution refers to 150 dpi or less. Fig. 2 illustrates a part of a high-
resolution palmprint image and a low resolution palmprint image.
Researchers can extract ridges, singular points and minutia points
∗
Corresponding author. Tel.: +65 6513 8041; fax: +65 6792 6559.
E-mail addresses: adamskong@ieee.org, adamskong@ntu.edu.sg (A. Kong).
0031-3203/$ - see front matter © 2009 Elsevier Ltd. All rights reserved.
doi:10.1016/j.patcog.2009.01.018
as features from high resolution images while in low resolution im-
ages they generally extract principal lines, wrinkles and texture. Ini-
tially palmprint research focused on high-resolution images [69,70]
but now almost all research is on low resolution images for civil and
commercial applications. This is also the focus of this paper.
The design of a biometric system takes account of five objectives:
cost, user acceptance and environment constraints, accuracy, com-
putation speed and security (Fig. 3). Reducing accuracy can increase
speed. Typical examples are hierarchical approaches. Reducing user
acceptance can improve accuracy. For instance, users are required
to provide more samples for training. Increasing cost can enhance
security. We can embed more sensors to collect different signals for
liveness detection. In some applications, environmental constraints
such as memory usage, power consumption, size of templates and
size of devices have to be fulfilled. A biometric system installed in
PDA (personal digital assistant) requires low power and memory
consumption but these requirements may not be vital for biometric
access control systems. A practical biometric system should balance
all these aspects.
A typical palmprint recognition system consists of five parts:
palmprint scanner, preprocessing, feature extraction, matcher and
database illustrated in Fig. 4. The palmprint scanner collects palm-
print images. Preprocessing sets up a coordinate system to align
palmprint images and to segment a part of palmprint image for fea-
ture extraction. Feature extraction obtains effective features from
the preprocessed palmprints. A matcher compares two palmprint
features and a database stores registered templates.
The rest of this paper is organized as follows: Section 2 reviews
palmprint scanners and preprocessing algorithms, Section 3 lists ver-
ification algorithms, Section 4 summarizes various fusion approaches