The growing amount of collected and processed data means that there is a need to control access to these resources. Very often, this type of control is carried out on the basis of biometric analysis. The article proposes a new user authentication method based on a spatial analysis of the movement of the finger’s position. This movement creates a sequence of data that is registered by a motion recording device. The presented approach combines spatial analysis of the position of all fingers at the time. The proposed method is able to use the specific, often different movements of fingers of each user. The experimental results confirm the effectiveness of the method in biometric applications. In this paper, we also introduce an effective meth...
AbstractIn this work we created two hand image databases, usingmobile phone cameras and webcams. The...
In this paper, biometric security system for access control based on hand geometry is presented. Bio...
The increasing demand of security oriented to mobile applications has raised the attention to biomet...
This article proposes an innovative biometric technique based on the idea of authenticating a person...
This study treats behavioral biometric authentication, and its focus is on creating an application t...
As technology evolves, we need better tools to secure our sensitive data on our smartphones. The com...
A novel hand biometric authentication method based on measurements of the user\u27s stationary hand ...
The identification and authentication of individuals by their palmprints is a recent approach in the...
This paper presents a novel personal authentication system using hand-based biometrics, which utiliz...
Hand-based authentication is a key biometric technology with a wide range of potential applications ...
This thesis presents an approach for personal identification/authentication with the use of Hand Geo...
AbstractWe propose the significance in use of multiple databases for the purpose of authentication u...
This paper present a state of art about biometric hand, different techniques used.Biometric is essen...
Abstract: The encroachment of information is considered the most important attack that affects the p...
Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric ide...
AbstractIn this work we created two hand image databases, usingmobile phone cameras and webcams. The...
In this paper, biometric security system for access control based on hand geometry is presented. Bio...
The increasing demand of security oriented to mobile applications has raised the attention to biomet...
This article proposes an innovative biometric technique based on the idea of authenticating a person...
This study treats behavioral biometric authentication, and its focus is on creating an application t...
As technology evolves, we need better tools to secure our sensitive data on our smartphones. The com...
A novel hand biometric authentication method based on measurements of the user\u27s stationary hand ...
The identification and authentication of individuals by their palmprints is a recent approach in the...
This paper presents a novel personal authentication system using hand-based biometrics, which utiliz...
Hand-based authentication is a key biometric technology with a wide range of potential applications ...
This thesis presents an approach for personal identification/authentication with the use of Hand Geo...
AbstractWe propose the significance in use of multiple databases for the purpose of authentication u...
This paper present a state of art about biometric hand, different techniques used.Biometric is essen...
Abstract: The encroachment of information is considered the most important attack that affects the p...
Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric ide...
AbstractIn this work we created two hand image databases, usingmobile phone cameras and webcams. The...
In this paper, biometric security system for access control based on hand geometry is presented. Bio...
The increasing demand of security oriented to mobile applications has raised the attention to biomet...