14,870 research outputs found

    Matching hand radiographs

    Get PDF
    Biometric verification and identification methods of medical images can be used to find possible inconsistencies in patient records. Such methods may also be useful for forensic research. In this work we present a method for identifying patients by their hand radiographs. We use active appearance model representations presented before [1] to extract 64 shape features per bone from the metacarpals, the proximal, and the middle phalanges. The number of features was reduced to 20 by applying principal component analysis. Subsequently, a likelihood ratio classifier [2] determines whether an image potentially belongs to another patient in the data set. Firstly, to study the symmetry between both hands, we use a likelihood-ratio classifier to match 45 left hand images to a database of 44 (matching) right hand images and vice versa. We found an average equal error probability of 6.4%, which indicates that both hand shapes are highly symmetrical. Therefore, to increase the number of samples per patient, the distinction between left and right hands was omitted. Secondly, we did multiple experiments with randomly selected training images from 24 patients. For several patients there were multiple image pairs available. Test sets were created by using the images of three different patients and 10 other images from patients that were in the training set. We estimated the equal error rate at 0.05%. Our experiments suggest that the shapes of the hand bones contain biometric information that can be used to identify persons

    Hand Geometry Techniques: A Review

    Full text link
    Volume 2 Issue 11 (November 2014

    Biometrics and Network Security

    Get PDF
    This paper examines the techniques used in the two categories of biometric techniques (physiological and behavioral) and considers some of the applications for biometric technologies. Common physiological biometrics include finger characteristics (fingertip [fingerprint], thumb, finger length or pattern), palm (print or topography), hand geometry, wrist vein, face, and eye (retina or iris). Behavioral biometrics include voiceprints, keystroke dynamics, and handwritten signatures

    Body language, security and e-commerce

    Get PDF
    Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations

    Hand geometry recognition: an approach for closed and separated fingers

    Get PDF
    Hand geometry has been a biometric trait that has attracted attention from several researchers. This stems from the fact that it is less intrusive and could be captured without contact with the acquisition device. Its application ranges from forensic examination to basic authentication use. However, restrictions in hand placement have proven to be one of its challenges. Users are either instructed to keep their fingers separate or closed during capture. Hence, this paper presents an approach to hand geometry using finger measurements that considers both closed and separate fingers. The system starts by cropping out the finger section of the hand and then resizing the cropped fingers. 20 distances were extracted from each finger in both separate and closed finger images. A comparison was made between Manhattan distance and Euclidean distance for features extraction. The support vector machine (SVM) was used for classification. The result showed a better result for Euclidean distance with a false acceptance ratio (FAR) of 0.6 and a false rejection ratio (FRR) of 1.2

    Hand-Based Biometric Analysis

    Get PDF
    Hand-based biometric analysis systems and techniques are described which provide robust hand-based identification and verification. An image of a hand is obtained, which is then segmented into a palm region and separate finger regions. Acquisition of the image is performed without requiring particular orientation or placement restrictions. Segmentation is performed without the use of reference points on the images. Each segment is analyzed by calculating a set of Zernike moment descriptors for the segment. The feature parameters thus obtained are then fused and compared to stored sets of descriptors in enrollment templates to arrive at an identity decision. By using Zernike moments, and through additional manipulation, the biometric analysis is invariant to rotation, scale, or translation or an in put image. Additionally, the analysis utilizes re-use of commonly-seen terms in Zernike calculations to achieve additional efficiencies over traditional Zernike moment calculation
    • …
    corecore