This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Palmprint Verification for Controlling Access to Shared Computing Resources
October-December 2007 (vol. 6 no. 4)
pp. 40-47
Maylor K.H. Leung, Nanyang Technological University
A.C.M. Fong, Nanyang Technological University
Siu Cheung Hui, Nanyang Technological University
Access security is an important aspect of pervasive computing systems. It offers the system developer and end users a certain degree of trust in the use of shared computing resources. Biometrics offers many advantages over the username-plus-password approach for access security control. Palmprint-based personal identification has seen less research than identification using fingerprints, irises, and faces. A proposed personal verification system employs palmprint images stored as 8-bit grayscale TIFF files. The system components include mechanisms for locating and aligning, extracting, and matching palmprints. The system first detects a human hand's interfinger key points and locates the palmprint on the basis of those points. Next, the system generates a line-edge-map representation of palmprint features. Finally, it performs feature matching based on the line segment Hausdorff distance. The LHD matching score provides the basis for verification decisions. Experimental results demonstrate that the key-point-detection technique is effective and that the palmprint line edge map has high discriminative power. This article is part of a special issue on security and privacy.

1. Y. Gao, S.C. Hui, and A.C.M. Fong, "A MultiView Facial Analysis Technique for Identity Authentication," IEEE Pervasive Computing, vol. 2, no. 1, 2003, pp. 38–45.
2. "Biometric Enrollment Errors a Problem, but Not Fatal," ID Newswire,9 July 2003, pp. 1–3; www.itl.nist.gov/iad/Articles7903IDNewswire.pdf .
3. M. Kothavale, R. Markworth, and P. Sandhu, "Computer Security SS3: Biometric Authentication," 2004, www.cs.bham.ac.uk/~mdr/teaching/modules03/ security/students/SS3handout.
4. R.C. Gonzalez and R.E. Woods, Digital Image Processing, 2nd ed., Prentice-Hall, 2002.
5. M.K. Leung and Y.H. Yang, "Dynamic Two-Strip Algorithm in Curve Fitting," Pattern Recognition, vol. 23, nos. 1–2, 1990, pp. 69–79.
6. Y. Gao and M.K. Leung, "Face Recognition Using Line Edge Map," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 24, no. 6, 2002, pp. 764–779.
7. W.J. Rucklidge, "Efficiently Locating Objects Using the Hausdorff Distance," Int'l J. Computer Vision vol. 24, no. 3, 1997, pp. 251–270.
8. C. Du, G. Su, and X. Lin, "Face Recognition Using a Modified Line Segment Hausdorff Distance," Proc. 2003 Int'l Conf. Machine Learning and Cybernetics, vol. 5, IEEE Press, 2003, pp. 3016–3021.
9. P.J. Phillips et al., "An Introduction to Evaluating Biometric Systems," Computer, vol. 33, no. 2, 2000, pp. 56–63.
10. C.L. Wilson and R.M. McCabe, Simple Test Procedure for Image-Based Biometric Verification Systems, tech. report NISTIR6336, Nat'l Inst. Standards and Technology, 1999.
11. V. Matyas Jr. and Z. Riha, "Toward Reliable User Authentication through Biometrics," IEEE Security &Privacy, vol. 1, no. 3, 2003, pp. 45–49.
1. D. Warren-Davis, The Hand Reveals, Element Books, 1993.
2. D. Zhang, Automated Biometrics: Technologies and Systems, Kluwer Academic Publishers, 2000.
3. D. Zhang and W. Shu, "Two Novel Characteristics in Palmprint Verification: Datum Point Invariance and Line Feature Matching," Pattern Recognition, vol. 33, no. 4, 1999, pp. 691–702.
4. N. Duta, A.K. Jain, and K.V. Mardia, "Matching of Palmprints," Pattern Recognition Letters, vol. 23, no. 4, 2002, pp. 477–485.
5. W.W. Boles and S.Y.T. Chu, "Personal Identification Using Images of the Human Palm," Proc. IEEE TENCON'97: Speech and Image Technologies for Computing and Telecommunications, vol. 1, IEEE Press, 1997, pp. 295–298.
6. J. Chen, C. Zhang, and G. Rong, "Palmprint Recognition Using Crease," Proc. Int'l Conf. Image Processing, vol. 3, IEEE Press, 2001, pp. 234–237.
7. "Fujitsu Announces Global Launch of Its Contactless Palm Vein Authentication Technology," press release, Fujitsu Corp., 30 June 2005; www.fujitsu.com/global/news/pr/archives/ month/200520050630-01.html.
8. L. Sherriff, "Japanese Banks Deploy Biometric Palm Scanners," The Register,27 Aug. 2004, www.theregister.co.uk/2004/08/27palm_biometrics .

Index Terms:
biometrics, palmprint, authentication, personal identification, security access control
Citation:
Maylor K.H. Leung, A.C.M. Fong, Siu Cheung Hui, "Palmprint Verification for Controlling Access to Shared Computing Resources," IEEE Pervasive Computing, vol. 6, no. 4, pp. 40-47, Oct.-Dec. 2007, doi:10.1109/MPRV.2007.78
Usage of this product signifies your acceptance of the Terms of Use.