This paper presents a new approach for personal authentication using hand images. The proposed method attempts to improve the performance of palmprint-based verification system by integrating hand geometry features. Unlike prior bimodal biometric systems, the users do not have to undergo the inconve
Personal authentication using palm-print features
✍ Scribed by Chin-Chuan Han; Hsu-Liang Cheng; Chih-Lung Lin; Kuo-Chin Fan
- Publisher
- Elsevier Science
- Year
- 2003
- Tongue
- English
- Weight
- 764 KB
- Volume
- 36
- Category
- Article
- ISSN
- 0031-3203
No coin nor oath required. For personal study only.
✦ Synopsis
Biometrics-based authentication is a veriÿcation approach using the biological features inherent in each individual. They are processed based on the identical, portable, and arduous duplicate characteristics. In this paper, we propose a scanner-based personal authentication system by using the palm-print features. It is very suitable in many network-based applications. The authentication system consists of enrollment and veriÿcation stages. In the enrollment stage, the training samples are collected and processed by the pre-processing, feature extraction, and modeling modules to generate the matching templates. In the veriÿcation stage, a query sample is also processed by the pre-processing and feature extraction modules, and then is matched with the reference templates to decide whether it is a genuine sample or not. The region of interest (ROI) for each sample is ÿrst obtained from the pre-processing module. Then, the palm-print features are extracted from the ROI by using Sobel and morphological operations. The reference templates for a speciÿc user are generated in the modeling module. Last, we use the template-matching and the backpropagation neural network to measure the similarity in the veriÿcation stage. Experimental results verify the validity of our proposed approaches in personal authentication.
📜 SIMILAR VOLUMES
In this paper, we demonstrate that use of a recently proposed feature set, termed Maximum Auto-Correlation Values, which utilizes information from the source part of the speech signal, signiÿcantly improves the robustness of a text independent identity veriÿcation system. We also propose an adaptive