A new approach to hand-based authentication

被引:0
|
作者
Amayeh, G. [1 ]
Bebis, G. [1 ]
Erol, A. [1 ]
Nicolescu, M. [1 ]
机构
[1] Univ Nevada, Comp Vis Lab, Reno, NV 89557 USA
来源
BIOMETRIC TECHNOLOGY FOR HUMAN IDENTIFICATION IV | 2007年 / 6539卷
关键词
biometrics; hand-based authentication; Zernike moments;
D O I
10.1117/12.721032
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Hand-based authentication is a key biometric technology with a wide range of potential applications both in industry and government. Traditionally, hand-based authentication is performed by extracting information from the whole hand. To account for hand and finger motion, guidance pegs are employed to fix the position and orientation of the hand. In this paper, we consider a component-based approach to hand-based verification. Our objective is to investigate the discrimination power of different parts of the hand in order to develop a simpler, faster, and possibly more accurate and robust verification system. Specifically, we propose a new approach which decomposes the hand in different regions, corresponding to the fingers and the back of the palm, and performs verification using information from certain parts of the hand only. Our approach operates on 2D images acquired by placing the hand on a flat lighting table. Using a part-based representation of the hand allows the system to compensate for hand and finger motion without using any guidance pegs. To decompose the hand in different regions, we use a robust methodology based on morphological operators which does not require detecting any landmark points on the hand. To capture the geometry of the back of the palm and the fingers in sufficient detail, we employ high-order Zernike moments which are computed using an efficient methodology. The proposed approach has been evaluated on a database of 100 subjects with 10 images per subject, illustrating promising performance. Comparisons with related approaches using the whole hand for verification illustrate the superiority of the proposed approach. Moreover, qualitative comparisons with state-of-the-art approaches indicate that the proposed approach has comparable or better performance.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] A Multi Factor Authentication Approach Based on Biometrics, Optical Interference and Chaotic Maps
    Souza, D. F. L.
    Burlamaqui, A. M. F.
    Souza Filho, G. L.
    IEEE LATIN AMERICA TRANSACTIONS, 2017, 15 (09) : 1700 - 1708
  • [42] Knowledge-based gait behavioural authentication through a machine learning approach
    Chaitanya, Gogineni Krishna
    Sekhar, Krovi Raja
    INTERNATIONAL JOURNAL OF BIOMEDICAL ENGINEERING AND TECHNOLOGY, 2021, 36 (01) : 25 - 42
  • [43] Fuzzy Rule Based Approach for Face and Facial Feature Extraction in Biometric Authentication
    Chowdhury, Mozammel
    Gao, Junbin
    Islam, Rafiqul
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON IMAGE AND VISION COMPUTING NEW ZEALAND (IVCNZ), 2016, : 169 - 173
  • [44] A new biometrics-based authentication protocol for smart card applications
    Elkamchouchi, Hassan M.
    Abouelseoud, Yasmine
    Shouaib, Wafaa S.
    INTERNATIONAL JOURNAL OF HEALTHCARE TECHNOLOGY AND MANAGEMENT, 2012, 13 (1-3) : 45 - 61
  • [45] Understanding Physiological and Behavioral Characteristics Separately for High-Performance Video-Based Hand Gesture Authentication
    Song, Wenwei
    Kang, Wenxiong
    Zhang, Yufeng
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2023, 72
  • [46] A NOVEL APPROACH TO FINGER VEIN AUTHENTICATION
    Tagkalakis, Fotios
    Vlachakis, Dimitrios
    Megalooikonomou, Vasileios
    Skodras, Athanassios
    2017 IEEE 14TH INTERNATIONAL SYMPOSIUM ON BIOMEDICAL IMAGING (ISBI 2017), 2017, : 659 - 662
  • [47] Exploring the Hand and Finger-Issued Behaviors Toward Natural Authentication
    Wang, Haipeng
    Chen, Tianying
    Liu, Xingrui
    Chen, Jiaxin
    IEEE ACCESS, 2020, 8 : 55815 - 55825
  • [48] Secure authentication system incorporating hand shapes verification and cryptography techniques
    He, B
    Qiu, ZD
    Sun, DM
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 156 - 159
  • [49] A more Multifactor Secure Authentication Scheme based on graphical authentication
    Joshi, Ashish
    Kumar, Sonu
    Goudar, R. H.
    2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC), 2012, : 186 - 189
  • [50] Random hand gesture authentication via efficient Temporal Segment Set Network
    Lin, Yihong
    Song, Wenwei
    Kang, Wenxiong
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2023, 97