Research on palmprint identification method based on quantum algorithms
- PMID: 25105165
- PMCID: PMC4106095
- DOI: 10.1155/2014/670328
Research on palmprint identification method based on quantum algorithms
Abstract
Quantum image recognition is a technology by using quantum algorithm to process the image information. It can obtain better effect than classical algorithm. In this paper, four different quantum algorithms are used in the three stages of palmprint recognition. First, quantum adaptive median filtering algorithm is presented in palmprint filtering processing. Quantum filtering algorithm can get a better filtering result than classical algorithm through the comparison. Next, quantum Fourier transform (QFT) is used to extract pattern features by only one operation due to quantum parallelism. The proposed algorithm exhibits an exponential speed-up compared with discrete Fourier transform in the feature extraction. Finally, quantum set operations and Grover algorithm are used in palmprint matching. According to the experimental results, quantum algorithm only needs to apply square of N operations to find out the target palmprint, but the traditional method needs N times of calculation. At the same time, the matching accuracy of quantum algorithm is almost 100%.
Figures










References
-
- Zhang D, Guo Z, Lu G, Zhang L, Liu Y, Zuo W. Online joint palmprint and palmvein verification. Expert Systems with Applications. 2011;38(3):2621–2631.
-
- Badrinath GS, Gupta P. Palmprint based recognition system using phase-difference information. Future Generation Computer Systems. 2012;28(1):287–305.
-
- Zhang D, Zuo WM, Yue F. A comparative study of palmprint recognition algorithms. ACM Computing Surveys. 2012;44(1, article 2)
-
- Jing X, Li S, Zhang D, Lan C, Yang J. Optimal subset-division based discrimination and its kernelization for face and palmprint recognition. Pattern Recognition. 2012;45(10):3590–3602.
-
- Guo ZH, Zhang D, Zhang L, Liu WH. Feature band selection for online multispectral palmprint recognition. IEEE Transactions on Information Forensics and Security. 2012;7(3):1094–1099.
Publication types
MeSH terms
LinkOut - more resources
Full Text Sources
Other Literature Sources