2012
DOI: 10.3390/s120201352
|View full text |Cite
|
Sign up to set email alerts
|

On the Feasibility of Interoperable Schemes in Hand Biometrics

Abstract: Personal recognition through hand-based biometrics has attracted the interest of many researchers in the last twenty years. A significant number of proposals based on different procedures and acquisition devices have been published in the literature. However, comparisons between devices and their interoperability have not been thoroughly studied. This paper tries to fill this gap by proposing procedures to improve the interoperability among different hand biometric schemes. The experiments were conducted on a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
11
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 41 publications
0
11
0
Order By: Relevance
“…Regarding shape-based recognition applied to other biometrics traits, we may find examples in hand [13,[25][26][27] and signature biometrics [28,29].…”
Section: Figmentioning
confidence: 99%
“…Regarding shape-based recognition applied to other biometrics traits, we may find examples in hand [13,[25][26][27] and signature biometrics [28,29].…”
Section: Figmentioning
confidence: 99%
“…In order to train the hand-shape generator and initialize the Uphill Simplex (i.e., compute the initialization parameters G, P , k,x), the GPDS2 DB [50] is used. This database comprises one sample of the right hand of 100 users, captured with a 60 dpi commercial scanner in one session.…”
Section: Databasesmentioning
confidence: 99%
“…The images used to train the hand generator and to compute the initialization parameters are taken from the GPDS2 database [50], while the real hand shape samples to be reconstructed are taken from the GPDS [20] and the UST [63] databases. It is important to notice that the images used to train the generator are independent and belong to completely different users than those being reconstructed.…”
Section: Databasesmentioning
confidence: 99%
“…This way, the posterior processing of the images is eased and the intra-user variability derived from hand pose variations is reduced. Nevertheless, these capturing devices present some drawbacks such as shape distortion, discomfort or unnatural posture of the hands [55].Thus, these capturing devices evolved into scanners which requires the hand to be in contact with a flat surface but does not restrict the openess degree of the fingers nor the position [137,141,154,127,106,87]. Most of contact-based approaches guarantee uniform lighting conditions and well contrasted background with the aim of facilitating the segmentation process.…”
mentioning
confidence: 99%
“…These methods include global thresholding, which is the easiest but most extended approach as commented above, and more sophisticated and well known methods such as Graph Cuts. Thresholding segmentation is a really simple solution which requires low computational resources but entail very specific capturing conditions to provide a good per- [153,189,137,156,65,70,141,27,51,111,195,72,11,194,155,154,115,7,56,5,53,100,58,197,8,55,196,128,3,179,147,127,106,87 Table 2. : Hand segmentation for biometric applications using visual spectrum images classified according to the nature of the testing images in terms of pose restrictions and environmental conditions.…”
mentioning
confidence: 99%