Security of Hand Geometry
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F17%3APU126404" target="_blank" >RIV/00216305:26230/17:PU126404 - isvavai.cz</a>
Result on the web
<a href="http://www.fit.vutbr.cz/research/pubs/all.php?id=11413" target="_blank" >http://www.fit.vutbr.cz/research/pubs/all.php?id=11413</a>
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Security of Hand Geometry
Original language description
How can we reliably identify a person or verify a persons identity and how secure this method is? The area of biometrics offers a solution to this issue by claiming, that in order to determine ones identity, we need only some of his/her physical traits. Many security systems of today identify people using various biometrics, most often fingerprint, facial markers or retina scan. These systems however, are not applicable in every situation either due to environmental, price or other reasons, and another method may be required. Hand geometry represents an alternative approach to human identification and verification, that avoids issues, that make more conventional approaches inconvenient, such as placement in areas where face needs to be covered or where fingerprints can become obscured (non-clean environment). In this paper, the hand geometry biometrics and its advantages and disadvantages in terms of security will be described. How are disadvantages being addressed by current and future avenues of research and development will be explored. As of now, the existing systems utilizing hand biometrics are predominantly analyzing 2D representation of a hand, its silhouette, which is acquired statically. As the static acquisition presents possible vector of attack on this system, the method of dynamic acquisition of hand geometry using a line scanner will be presented. The largest limiting factor preventing widespread of this technology however, is the relatively low entropy of hand silhouette, which in turn limits the size of the serviceable database and increases FAR and FRR and therefore its usage. This paper will therefore also explore how the 3D acquisition and following analysis of 3D model can lead to increased security and larger serviceable databases as well as how the line scan technology and 3D acquisition can be combined.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
20206 - Computer hardware and architecture
Result continuities
Project
<a href="/en/project/LQ1602" target="_blank" >LQ1602: IT4Innovations excellence in science</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach
Others
Publication year
2017
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Proceedings of Conference SPI 2017
ISBN
978-80-7231-414-0
ISSN
—
e-ISSN
—
Number of pages
13
Pages from-to
17-29
Publisher name
Brno University of Defence
Place of publication
Brno
Event location
Brno
Event date
Jun 1, 2017
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
—