Explore chapters and articles related to this topic
Secure Biometric Modalities for Effective Communication
Published in S. Ramakrishnan, Cryptographic and Information Security, 2018
A palm print based authentication system uses the palm as a means of secure authentication. This technique may include cancellable biometric concept which is designed for transforming the palm image into a feature representation of lower dimensions. Cancellable biometric design can be done with the random number generation methods. Pseudo random data is being generation with wavelet based palm print features. Research done by Purdue University shows that majority of people appreciated the use of this secure method. Besides, the human hand can be divided into different parts associated with fingers and then the confidence value of each of them can be calculated. Then a support vector data description is reduced by putting it in place. The calculated confidence is then compared with the threshold value and, if it is higher than that, to maintain the symmetry, confidence of other fingers is also raised.
Internet of Biometric Things
Published in Karm Veer Arya, Robin Singh Bhadoria, The Biometric Computing, 2019
Zoran S. Bojkovic, Dragorad A. Milovanovic
Palm print is a unique and reliable biometric characteristic of the image acquired from the palm region of the hand. It can be used in a forensic or commercial case (Fisher and Fisher, 2012). As in the case of fingerprint, it also contains some other information (texture, indents) on marking which can be useful when comparing one palm print to another. A biometric hand scanner identifies the person by the palm of their hand, while a finger scanner identifies the person by their fingerprint. A biometric retina or iris scanner can identify a person by scanning the iris or retina of their eyes.
Survey of Biometric Tools and Big Data
Published in Rodgers Waymond, Artificial Intelligence in a Throughput Model, 2020
Palm print works very similarly to fingerprint recognition. Every palm print is distinct, so it is also fairly easy to compare to others and make a decision to an individual’s identity. The palm is also scanned and the ridge patterns, endings and paths of the raised portion of the palm are all measured.
Identifying untrusted interactive behaviour in Enterprise Resource Planning systems based on a big data pattern recognition method using behavioural analytics
Published in Behaviour & Information Technology, 2022
Qian Yi, Mengyao Xu, Shuping Yi, Shiquan Xiong
Traditional mechanisms for securing network information have several limitations. Universal identification mechanisms adopt static passwords; however, an attacker can easily trace the legal user by monitoring his/her static passwords (Ying and Nayak 2019). Smart cards store user information, certificates, and biometrics, replacing the user’s login password in real-time, which is extremely safe; however, smart cards can be easily lost. Biometrics (e.g. a palm print or face data) require a clear biometric image, which may leak private user data. In addition, the cost of confidentiality is huge because biometric equipment is expensive. Intrusion detection and security audit mechanisms feature real-time, dynamic, and online monitoring, but can only be initiated to prevent vandalism as the illegal act is being committed and cannot alert users when illegal behaviour is about to occur. In addition, with the development of big data and cloud computing technologies, the information security of ERP systems faces greater challenges such as data leakage, account hijacking, and other threats (Elmonem, Nasr, and Geith 2016).
Fingerprint Liveness Detection Schemes: A Review on Presentation Attack
Published in Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, 2022
D. S. Ametefe, S. S. Sarnin, D. M. Ali, M. Z. Zaheer
In biometric fingerprint recognition, garnering sufficient information for the discernment between real and spoof fingerprints is essential. Similarly, a study by (Lipane and Gundre 2013) proposed the use of palm-print as a modality for personal identification like other biometric modalities such as fingerprint, iris, face due to its uniqueness. The usage of palm-print proved to be reliable because attacks relatively find it hard to replicate the whole palm-prints enormous impression area as compared to that of fingerprints.
Multimodal Biometrics for Person Identification Using Ear and Palm Print Features
Published in IETE Journal of Research, 2021
M. S. Lohith, M. N. Eshwarappa
The reason behind our choice of multimodal person identification using ear and palm print is that ear images can be captured using conventional cameras, it requires less co-operation from user, effect of aging is less and effect of facial expression is less. Reason for palm print selection is palm print images provide rich and stable information. Therefore, we believe that ear and palm print images are textured images having different structure lines.