By Topic

Palmprint Verification for Controlling Access to Shared Computing Resources

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Maylor K. H. Leung ; Nanyang Technological University ; A. C. M. Fong ; Siu Cheung Hui

You can build an effective palmprint verification system using a combination of mostly off-the-shelf components and techniques. Access security is an important aspect of pervasive computing systems. It offers the system developer and end users a certain degree of trust in the use of shared computing resources. Biometrics verification offers many advantages over the username-plus-password approach for access control. Users don't have to memorize any codes or passwords, and biometric systems are more reliable because biometric characteristics can't easily be duplicated, lost, or stolen. Researchers have studied such biometric characteristics as faces, fingerprints, irises, voices, and palmprints.Facial appearance and features change with age. Fingerprints can be affected by surface abrasions or otherwise compromised. Capturing iris images is relatively difficult, and iris scans can be intrusive. Voices are susceptible to noise corruption and can be easily copied and manipulated. Palmprints are potentially a good choice for biometric applications because they're invariant with a person, easy to capture, and difficult to duplicate. They offer greater security than fingerprints because palm veins are more complex than finger veins. However, compared to other biometric characteristics, they have perhaps seen less research. This provides a big opportunity for advancing palmprint technology and applications. We've developed an effective prototype palmprint verification system using a combination of mostly off-the-shelf (and therefore tried and tested) components and techniques. Such an approach should make palmprint verification an appealing proposition.

Published in:

IEEE Pervasive Computing  (Volume:6 ,  Issue: 4 )