In this paper, biometric security system for access control based on hand geometry is presented. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. Experiments show that the physical dimensions of a human hand contain information that is capable to verify the identity of an individual. The database created for our system consists of 408 hand images from 24 people of young ages and different sex. Different pattern recognition techniques have been tested to be used for verification. Achieved experimental results FAR=0,1812% and FRR=14,583% show the possibilities of using this system in environment with medium security level with full acceptance from all...
This paper studies the reliability of geometric features for the identification of users based on ha...
The use of digital media or information is very precarious for increasing of hacker in the nation. S...
We know that common authentication technologies like having password, keys or cards, the system only...
Introduction Biometric recognition systems find applications in security systems with varying requi...
This paper present a state of art about biometric hand, different techniques used.Biometric is essen...
Abstract: The encroachment of information is considered the most important attack that affects the p...
Hand recognition systems are among the oldest biometric tools used for automatic person authenticati...
We present an identification and authentication system based on hand modality which is part of a ref...
Now a days, whenever we think of developing a system or software, the first thing that comes in one’...
This thesis presents an approach for personal identification/authentication with the use of Hand Geo...
This work presents a complete control access system based on the hand geometry, a hardware key and a...
In the information age, security is a critical issue faced by many organizations. There are three ba...
In this paper we present an identification and authentication system based on hand geometry. First, ...
This paper presents a new approach for personal authentication using hand images. The proposed metho...
In this paper we present an identification and authentication system based on hand geometry. First, ...
This paper studies the reliability of geometric features for the identification of users based on ha...
The use of digital media or information is very precarious for increasing of hacker in the nation. S...
We know that common authentication technologies like having password, keys or cards, the system only...
Introduction Biometric recognition systems find applications in security systems with varying requi...
This paper present a state of art about biometric hand, different techniques used.Biometric is essen...
Abstract: The encroachment of information is considered the most important attack that affects the p...
Hand recognition systems are among the oldest biometric tools used for automatic person authenticati...
We present an identification and authentication system based on hand modality which is part of a ref...
Now a days, whenever we think of developing a system or software, the first thing that comes in one’...
This thesis presents an approach for personal identification/authentication with the use of Hand Geo...
This work presents a complete control access system based on the hand geometry, a hardware key and a...
In the information age, security is a critical issue faced by many organizations. There are three ba...
In this paper we present an identification and authentication system based on hand geometry. First, ...
This paper presents a new approach for personal authentication using hand images. The proposed metho...
In this paper we present an identification and authentication system based on hand geometry. First, ...
This paper studies the reliability of geometric features for the identification of users based on ha...
The use of digital media or information is very precarious for increasing of hacker in the nation. S...
We know that common authentication technologies like having password, keys or cards, the system only...