scholarly journals A Survey Paper on Palm Prints Based Biometric Authentication System

Author(s):  
Swati Verma ◽  
Pomona Mishra

In this paper we are providing an approach for authentication using palm prints. Reliability in computer aided personal authentication is becoming increasingly important in the information-based world, for effective security system. Biometrics is physiological characteristics of human beings, unique for every individual that are usually time invariant and easy to acquire. Palm print is one of the relatively new physiological biometrics due to its stable and unique characteristics. The rich information of palm print offers one of the powerful means in personal recognition.

2019 ◽  
Vol 16 (11) ◽  
pp. 4883-4888
Author(s):  
P. Kumaran ◽  
R. Ashoka Rajan ◽  
T. Veeramani ◽  
R. Thilagavathy

To develop a complete biometric authentication system, security is highly needed. Even though there are several methods for storing fingerprint templates, they are compromised by the attacker leaving it as an unprotected system. In this paper, a novel method is proposed for protecting biometrics through an user defined graph named Web Modulo Graph. Feature vectors are extracted from the Left Fingerprint, Right Fingerprint and Palm Print during the enrollment process. The captured information from the biometrics are combined and stored in Web Modulo Graph where the insertion and traversal of feature vectors are unknown to the attacker. So even if the database or the graph structure is stolen by the attacker the correct sequence cannot be obtained. In this case, guessing the correct sequence is not almost possible as user defined graph is used and the system can achieve this with an Equal Error Rate (EER) of 4.8%. After various analyses, the proposed system is found to have high computational hardness.


ID and Analysis Of Palm Print In Biometric Authentication System Using Bayes TechniquesIn nowadays there is a hazard that others can get to a similar data anyplace and whenever. At present passwords, individual recognizable proof cards are utilized for individual ID. Presently a days Biometric based acknowledgment is the most prevalent human acknowledgment design. Biometrics estimates person's one of a kind or conduct attributes to validate individual personality. It gives progressively dependable and proficient methods for character check. The physical component of hand known as palm geometry contains data that is fit for confirming the personality of a person. The objective of biometrics check framework comprises in choosing whether two attributes have a place with same individual or not.In this case picture can be utilized for confirmation purposes. The term worldwide states that entire picture of the palm is considered for confirmation. Principle work for this situation is the pre-handling of picture, at that point extricating the highlights, making the informational index, bunching calculation and Classification calculation is utilized and execution is looked at in both the cases.


Author(s):  
David Wendell Moller
Keyword(s):  
The Poor ◽  

Why are kings without pity for their subjects? Because they count on never being common human beings. Why are the rich so hard toward the poor? It is because they have no fear of being poor. . . .—Jean-Jacques Rousseau, Émile; or, On Education1In Shakespeare’s ...


2021 ◽  
Author(s):  
Fatin Atiqah Rosli ◽  
Saidatul Ardeenawatie Awang ◽  
Azian Azamimi Abdullah ◽  
Mohammad Shahril Salim

2021 ◽  
Vol 17 (1) ◽  
pp. 287-292
Author(s):  
Adriana-Meda UDROIU ◽  
Ștefan-Antonio DAN-ȘUTEU

Abstract: We introduce the term usable security to refer to security systems, models, mechanisms and applications that have as the main goal usability. Secure systems cannot exist without secure authentication methods. Thus we outline biometric authentication methods and we focus on iris recognition because is the most reliable and accurate method for human identification]. The most important advantage of iris biometric over other biometrics is that irises have enormous pattern variability meaning that the variation between individual is almost maximum and variation for any person across time or conditions is minimum. Taking into consideration this observations, this survey covers researches in this field, methods of technical implementation and the usability of this method as an authentication system on iOS environment.


Sign in / Sign up

Export Citation Format

Share Document