The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - October-December (2007 vol.6)
pp: 40-47
Maylor K.H. Leung , Nanyang Technological University
A.C.M. Fong , Nanyang Technological University
Siu Cheung Hui , Nanyang Technological University
ABSTRACT
Access security is an important aspect of pervasive computing systems. It offers the system developer and end users a certain degree of trust in the use of shared computing resources. Biometrics offers many advantages over the username-plus-password approach for access security control. Palmprint-based personal identification has seen less research than identification using fingerprints, irises, and faces. A proposed personal verification system employs palmprint images stored as 8-bit grayscale TIFF files. The system components include mechanisms for locating and aligning, extracting, and matching palmprints. The system first detects a human hand's interfinger key points and locates the palmprint on the basis of those points. Next, the system generates a line-edge-map representation of palmprint features. Finally, it performs feature matching based on the <it>line segment Hausdorff distance</it>. The LHD matching score provides the basis for verification decisions. Experimental results demonstrate that the key-point-detection technique is effective and that the palmprint line edge map has high discriminative power. This article is part of a special issue on security and privacy.
INDEX TERMS
biometrics, palmprint, authentication, personal identification, security access control
CITATION
Maylor K.H. Leung, A.C.M. Fong, Siu Cheung Hui, "Palmprint Verification for Controlling Access to Shared Computing Resources", IEEE Pervasive Computing, vol.6, no. 4, pp. 40-47, October-December 2007, doi:10.1109/MPRV.2007.78
REFERENCES
1. Y. Gao, S.C. Hui, and A.C.M. Fong, "A MultiView Facial Analysis Technique for Identity Authentication," IEEE Pervasive Computing, vol. 2, no. 1, 2003, pp. 38–45.
2. "Biometric Enrollment Errors a Problem, but Not Fatal," ID Newswire,9 July 2003, pp. 1–3; www.itl.nist.gov/iad/Articles7903IDNewswire.pdf .
3. M. Kothavale, R. Markworth, and P. Sandhu, "Computer Security SS3: Biometric Authentication," 2004, www.cs.bham.ac.uk/~mdr/teaching/modules03/ security/students/SS3handout.
4. R.C. Gonzalez and R.E. Woods, Digital Image Processing, 2nd ed., Prentice-Hall, 2002.
5. M.K. Leung and Y.H. Yang, "Dynamic Two-Strip Algorithm in Curve Fitting," Pattern Recognition, vol. 23, nos. 1–2, 1990, pp. 69–79.
6. Y. Gao and M.K. Leung, "Face Recognition Using Line Edge Map," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 24, no. 6, 2002, pp. 764–779.
7. W.J. Rucklidge, "Efficiently Locating Objects Using the Hausdorff Distance," Int'l J. Computer Vision vol. 24, no. 3, 1997, pp. 251–270.
8. C. Du, G. Su, and X. Lin, "Face Recognition Using a Modified Line Segment Hausdorff Distance," Proc. 2003 Int'l Conf. Machine Learning and Cybernetics, vol. 5, IEEE Press, 2003, pp. 3016–3021.
9. P.J. Phillips et al., "An Introduction to Evaluating Biometric Systems," Computer, vol. 33, no. 2, 2000, pp. 56–63.
10. C.L. Wilson and R.M. McCabe, Simple Test Procedure for Image-Based Biometric Verification Systems, tech. report NISTIR6336, Nat'l Inst. Standards and Technology, 1999.
11. V. Matyas Jr. and Z. Riha, "Toward Reliable User Authentication through Biometrics," IEEE Security &Privacy, vol. 1, no. 3, 2003, pp. 45–49.
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool