DocumentCode :
924346
Title :
Palmprint Verification for Controlling Access to Shared Computing Resources
Author :
Leung, Maylor K H ; Fong, A.C.M. ; Hui, Siu Cheung
Author_Institution :
Nanyang Technol. Univ., Singapore
Volume :
6
Issue :
4
fYear :
2007
Firstpage :
40
Lastpage :
47
Abstract :
You can build an effective palmprint verification system using a combination of mostly off-the-shelf components and techniques. Access security is an important aspect of pervasive computing systems. It offers the system developer and end users a certain degree of trust in the use of shared computing resources. Biometrics verification offers many advantages over the username-plus-password approach for access control. Users don´t have to memorize any codes or passwords, and biometric systems are more reliable because biometric characteristics can´t easily be duplicated, lost, or stolen. Researchers have studied such biometric characteristics as faces, fingerprints, irises, voices, and palmprints.Facial appearance and features change with age. Fingerprints can be affected by surface abrasions or otherwise compromised. Capturing iris images is relatively difficult, and iris scans can be intrusive. Voices are susceptible to noise corruption and can be easily copied and manipulated. Palmprints are potentially a good choice for biometric applications because they´re invariant with a person, easy to capture, and difficult to duplicate. They offer greater security than fingerprints because palm veins are more complex than finger veins. However, compared to other biometric characteristics, they have perhaps seen less research. This provides a big opportunity for advancing palmprint technology and applications. We´ve developed an effective prototype palmprint verification system using a combination of mostly off-the-shelf (and therefore tried and tested) components and techniques. Such an approach should make palmprint verification an appealing proposition.
Keywords :
biometrics (access control); image recognition; ubiquitous computing; access control; access security; biometric application; biometrics verification; off-the-shelf components; palmprint verification; pervasive computing system; shared computing resources; username-plus-password approach; Access control; Biometrics; Fingerprint recognition; Fingers; Iris; Pervasive computing; Prototypes; Security; Veins; Waveguide discontinuities; authentication; biometrics; palmprint; personal identification; security access control;
fLanguage :
English
Journal_Title :
Pervasive Computing, IEEE
Publisher :
ieee
ISSN :
1536-1268
Type :
jour
DOI :
10.1109/MPRV.2007.78
Filename :
4343897
Link To Document :
بازگشت