Leung, M.K.H., Fong, A.C.M. and Hui, S.C. (2007) Palmprint verification for controlling access to shared computing resources. IEEE Pervasive Computing, 6(4), pp. 40-47. (doi: 10.1109/MPRV.2007.78)
Full text not currently available from Enlighten.
Abstract
Access security is an important aspect of pervasive computing systems. It offers the system developer and end users a certain degree of trust in the use of shared computing resources. Biometrics offers many advantages over the username-plus-password approach for access security control. Palmprint-based personal identification has seen less research than identification using fingerprints, irises, and faces. A proposed personal verification system employs palmprint images stored as 8-bit grayscale TIFF files. The system components include mechanisms for locating and aligning, extracting, and matching palmprints. The system first detects a human hand's interfinger key points and locates the palmprint on the basis of those points. Next, the system generates a line-edge-map representation of palmprint features. Finally, it performs feature matching based on the line segment Hausdorff distance. The LHD matching score provides the basis for verification decisions. Experimental results demonstrate that the key-point-detection technique is effective and that the palmprint line edge map has high discriminative power. This article is part of a special issue on security and privacy.
Item Type: | Articles |
---|---|
Additional Information: | Special Issue on Security and Privacy |
Status: | Published |
Refereed: | Yes |
Glasgow Author(s) Enlighten ID: | Fong, Dr Alvis Cheuk Min |
Authors: | Leung, M.K.H., Fong, A.C.M., and Hui, S.C. |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
College/School: | College of Science and Engineering > School of Computing Science |
Journal Name: | IEEE Pervasive Computing |
ISSN: | 1536-1268 |
ISSN (Online): | 1558-2590 |
University Staff: Request a correction | Enlighten Editors: Update this record