Loading…
Palmprint Verification for Controlling Access to Shared Computing Resources
You can build an effective palmprint verification system using a combination of mostly off-the-shelf components and techniques. Access security is an important aspect of pervasive computing systems. It offers the system developer and end users a certain degree of trust in the use of shared computing...
Saved in:
Published in: | IEEE pervasive computing 2007-10, Vol.6 (4), p.40-47 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | You can build an effective palmprint verification system using a combination of mostly off-the-shelf components and techniques. Access security is an important aspect of pervasive computing systems. It offers the system developer and end users a certain degree of trust in the use of shared computing resources. Biometrics verification offers many advantages over the username-plus-password approach for access control. Users don't have to memorize any codes or passwords, and biometric systems are more reliable because biometric characteristics can't easily be duplicated, lost, or stolen. Researchers have studied such biometric characteristics as faces, fingerprints, irises, voices, and palmprints.Facial appearance and features change with age. Fingerprints can be affected by surface abrasions or otherwise compromised. Capturing iris images is relatively difficult, and iris scans can be intrusive. Voices are susceptible to noise corruption and can be easily copied and manipulated. Palmprints are potentially a good choice for biometric applications because they're invariant with a person, easy to capture, and difficult to duplicate. They offer greater security than fingerprints because palm veins are more complex than finger veins. However, compared to other biometric characteristics, they have perhaps seen less research. This provides a big opportunity for advancing palmprint technology and applications. We've developed an effective prototype palmprint verification system using a combination of mostly off-the-shelf (and therefore tried and tested) components and techniques. Such an approach should make palmprint verification an appealing proposition. |
---|---|
ISSN: | 1536-1268 1558-2590 |
DOI: | 10.1109/MPRV.2007.78 |