32 Citations
Person authentication based on hand shape
- Computer Science2004 12th European Signal Processing Conference
- 2004
It is shown that, at least for groups of one hundred subjects, hand-based recognition becomes a viable and secure access control scheme.
Person authentication based on hand shape
- Computer ScienceProceedings of the IEEE 12th Signal Processing and Communications Applications Conference, 2004.
- 2004
It is shown that, at least for groups of one hundred subjects, hand-based recognition becomes a viable and secure access control scheme.
VISUAL IMAGE BASED HAND RECOGNITIONS
- Computer Science
- 2013
This paper investigates a new approach to achieve performance improvement for hand area geometry systems by recognition of area of finger and hand and also the relative area betweenfinger and hand which overcomes the conventional hand geometry based personal verification systems.
Hand shape and hand gesture recognition
- Computer Science2009 IEEE Symposium on Industrial Electronics & Applications
- 2009
A method for the recognition of hand gestures using geometrical and Radon transform (RT) features is proposed.
Hand Shape Geometry and Palmprint Features for the Personal Identification
- Computer ScienceSixth International Conference on Intelligent Systems Design and Applications
- 2006
Hand geometry based biometric verification has proven to be the most suitable and acceptable biometrics trait for medium and low security applications.
Identity Verification Utilizing Finger Surface Features
- Computer ScienceAVBPA
- 2005
The results of the experiments indicate that this approach performs well for a first-of-its-kind biometric technique, which utilized finger surface features as a biometric identifier.
Basic Principles and Trends in Hand Geometry and Hand Shape Biometrics
- Computer Science
- 2012
Mentioned features make hand geometry an ideal candidate for research and development of new acquisition, preprocessing and verification techniques, i.e. personal authentication.
Peg-Free Hand Shape Verification Using High Order Zernike Moments
- Computer Science2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06)
- 2006
This work proposes using high-order Zernike moments to represent hand geometry, avoiding the more difficult and prone to errors process of hand-landmark extraction, and employs an efficient algorithm that uses arbitrary precision arithmetic, a look-up table, and avoids recomputing the same terms multiple times.
Trends in Hand Geometry Biometrics
- Computer Science
- 2012
Researchers in the field of biometrics found that human hand contains some characteristics that can be used for personal identification, including hand geometry and hand shape, which makes them suitable for development of various acquisition and authentication methods.
Combining 2D and 3D hand geometry features for biometric verification
- Computer Science2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops
- 2009
This paper investigates a new approach to achieve performance improvement for hand geometry systems by simultaneously acquiring three dimensional features from the presented hands by utilizing a laser based 3D digitizer and two new representations that characterize the local features on the finger surface are extracted from the acquired range images.
References
SHOWING 1-10 OF 17 REFERENCES
Handwritten Digit Recognition with a Back-Propagation Network
- Computer ScienceNIPS
- 1989
Minimal preprocessing of the data was required, but architecture of the network was highly constrained and specifically designed for the task, and has 1% error rate and about a 9% reject rate on zipcode digits provided by the U.S. Postal Service.
Highly accurate flatness and parallelism in the manufacture of thin sapphire flat lenses
- Computer Science
- 1994
A new method for lapping sapphire flat lenses is designed that is based on the mechanism of the correction of a double-sided lapping machine's lapping plate and the measurement of highly accurate parallelism by means of lateral shearing interference.
A Data-Driven Intermediate Level Feature Extraction Algorithm
- Computer Science, MathematicsIEEE Trans. Pattern Anal. Mach. Intell.
- 1989
The algorithm provides a powerful technique enabling a data-driven intermediate-level vision module to extract parametric features needed for higher-level processing by repeatedly applying this procedure to the edge data excluded from the previous fitting.
A strategy for repetitive neighbor finding in images represented by quadtrees
- Computer SciencePattern Recognit. Lett.
- 1997
Optics & Laser Technology
- Physics
- 1990
17 'F.iectute· analysis of a s~aee-coated cer~ by $peclde-: 23 Design of epitaxial AlGaAs multilayer structures: interference filters and opticfllly contron~ble ren~iQnmodulatQrs
Fabrication and testing of high quality small germanium plano-convex lens. Optics and Lasers in Engineering 1994;21:257±72
- 1994
Use of Hough transformation to detect lines in pictures
- Commnu ACM
- 1972