Academic Journals Database
Disseminating quality controlled scientific knowledge

Authentication Method Using Hand Images for Access Control systems

ADD TO MY LIST
 
Author(s): Raed Sahawneh | Ahmed Ibrahim | Sami Qawasmeh | Arwa Zabian.

Journal: International Arab Journal of e-Technology
ISSN 1997-6364

Volume: 1;
Issue: 4;
Start page: 115;
Date: 2010;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Recognition system | hand image | control access system | invariance affine transformation

ABSTRACT
The encroachment of information is considered the most important attack that affects the performance of thenetwork. Biometric based authentications have emerged as promising components of information security. Biometric is usedfor two major purposes: identification and authentication. We propose a palm based authentication method that uses handimages to define a set of referencing points considered as invariable and unique in the authentication process. The method ofcircular histogram analysis has been used to enable the definition of the angular orientation of palm representation and thecorner of turn where it is necessary to turn the image for correct determination of supporting points which is based on twodimensionaldiscrete differentiations of image with the next analysis of given points of brightness projections forming thecurves of peaks and cavities of hand- fingers and facilitating the searching process for such given points. The system of signsrecognition,which allows authentication of identity, regardless of palm location and its position within the limits of thescanning field has been used and proved to be economic and capable of improving the operability of the authentication system.
Save time & money - Smart Internet Solutions      Why do you need a reservation system?