Contactless palmprint and knuckle biometrics for mobile devices
نویسندگان
چکیده
منابع مشابه
Mobile Verification by Palmprint Biometrics
This paper presents a method for verifying the identity of a mobile device user in real time by capturing an image of the user’s palm with a mobile camera. A consistent region of interest is extracted from the center of the palm using a method that is robust to orientation, scale, and lighting. A set of directional line filters then detects the stable palm lines from this region, and the result...
متن کاملA Contactless Palmprint Recognition Algorithm for Mobile Phones
Mobile phones have become indispensable and powerful digital devices to use many services. To protect mobile devices and stored data, biometric authentication would play an important role. This paper proposes a contactless palmprint recognition algorithm for mobile phones which combines a hand segmentation algorithm using skin-color thresholding and region growing and a palmprint matching algor...
متن کاملContactless Gesture Recognition for Mobile Devices
While gesture interfaces become pervasive, most existing approaches are undesirable for mobile devices because of the high power consumption, or the inconvenience that users need to wear/hold specific sensors. In this paper, we present a contactless gesture recognition system for mobile devices using proximity sensors. A set of infrared signal feature extraction methods and a decision-tree-base...
متن کاملTowards contactless palmprint authentication
This study examines the issues related to two of the most palmprint promising approaches applied to the contactless biometric authentication and presents a performance evaluation on three different scenarios. The presence of significant scale, rotation, occlusion and translation variations in the contactless palmprint images requires the feature extraction approaches that can accommodate such w...
متن کاملBiometrics for Authentication on Mobile Devices
Mobile devices are rapidly becoming the most popular user end computing and networking device. Mobile devices are often used to access and store personal information. Due to their size and portability, they are a common target for thieves and malicious activity. Unauthorized authentication of mobile devices can result in a great deal of damage to the legitimate owner. However, securing mobile d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Pattern Analysis and Applications
سال: 2011
ISSN: 1433-7541,1433-755X
DOI: 10.1007/s10044-011-0248-4