2015 IEEE International Symposium on Technology and Society (ISTAS) 2015
DOI: 10.1109/istas.2015.7439441
|View full text |Cite
|
Sign up to set email alerts
|

Palm-print recognition for authentication on smartphones

Abstract: In a world where smart phones are becoming ubiquitous and are more powerful than ever, security is becoming an issue. Equipped with good cameras, smart phones are prime candidates for software designed to recognize objects and people around them. By recognizing biometric patterns such as the face, palm-prints or hand knuckles, smart phones can heighten security standards. Depending on the intended action, specific security requirements should be met. For instance, bank services need a reliable authentication s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…However, this approach relied on constrained acquisition, as the background was not overly complex. Another approach using Harris corners was proposed by Javidnia et al [72]. After obtaining an initial candidate for the hand region based on skin segmentation, the palm region was located using an iterative process based on the strength of the Harris corners.…”
Section: A Standard Palmprint Roi Extractionmentioning
confidence: 99%
“…However, this approach relied on constrained acquisition, as the background was not overly complex. Another approach using Harris corners was proposed by Javidnia et al [72]. After obtaining an initial candidate for the hand region based on skin segmentation, the palm region was located using an iterative process based on the strength of the Harris corners.…”
Section: A Standard Palmprint Roi Extractionmentioning
confidence: 99%
“…The first kind of local texture descriptors are designed for general applications but are adapted to the field of palmprint verification, such as LBP, HOG [44], SIFT [45] and LDP. In addition, local texture descriptors specially designed for palmprints have been proposed, and the typical ones include LBP+SIFT [7] and IHOL [46].…”
Section: Approaches For Palmprint Verificationmentioning
confidence: 99%
“…However, ignored by many, palmprint is also a great choice for personal identity authentication. Palmprint [5,6,7] refers to the skin pattern on the inner surface of the palm, which mainly includes two characteristics: palm frictional ridges (ridges and valleys like fingerprints) and palm flexion creases (discontinuities in epidermal ridges). Palmprint, as an important member of the biometrics family, has many desired characteristics, such as strong uniqueness, durability and user-friendliness [8].…”
Section: Introductionmentioning
confidence: 99%
“…However, this approach relied on constrained acquisition, as the background was not overly complex. Another approach using Harris corners was proposed by Javidnia et al [57]. After obtaining an initial candidate for the hand region based on skin segmentation, the palm region was located using an iterative process based on the strength of the Harris corners.…”
Section: A Standard Palmprint Roi Extractionmentioning
confidence: 99%