Contactless palmprint and knuckle biometrics for mobile devices

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobile Verification by Palmprint Biometrics

This paper presents a method for verifying the identity of a mobile device user in real time by capturing an image of the user’s palm with a mobile camera. A consistent region of interest is extracted from the center of the palm using a method that is robust to orientation, scale, and lighting. A set of directional line filters then detects the stable palm lines from this region, and the result...

متن کامل

A Contactless Palmprint Recognition Algorithm for Mobile Phones

Mobile phones have become indispensable and powerful digital devices to use many services. To protect mobile devices and stored data, biometric authentication would play an important role. This paper proposes a contactless palmprint recognition algorithm for mobile phones which combines a hand segmentation algorithm using skin-color thresholding and region growing and a palmprint matching algor...

متن کامل

Contactless Gesture Recognition for Mobile Devices

While gesture interfaces become pervasive, most existing approaches are undesirable for mobile devices because of the high power consumption, or the inconvenience that users need to wear/hold specific sensors. In this paper, we present a contactless gesture recognition system for mobile devices using proximity sensors. A set of infrared signal feature extraction methods and a decision-tree-base...

متن کامل

Towards contactless palmprint authentication

This study examines the issues related to two of the most palmprint promising approaches applied to the contactless biometric authentication and presents a performance evaluation on three different scenarios. The presence of significant scale, rotation, occlusion and translation variations in the contactless palmprint images requires the feature extraction approaches that can accommodate such w...

متن کامل

Biometrics for Authentication on Mobile Devices

Mobile devices are rapidly becoming the most popular user end computing and networking device. Mobile devices are often used to access and store personal information. Due to their size and portability, they are a common target for thieves and malicious activity. Unauthorized authentication of mobile devices can result in a great deal of damage to the legitimate owner. However, securing mobile d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Pattern Analysis and Applications

سال: 2011

ISSN: 1433-7541,1433-755X

DOI: 10.1007/s10044-011-0248-4