Security of Hand Geometry
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F17%3APU126404" target="_blank" >RIV/00216305:26230/17:PU126404 - isvavai.cz</a>
Výsledek na webu
<a href="http://www.fit.vutbr.cz/research/pubs/all.php?id=11413" target="_blank" >http://www.fit.vutbr.cz/research/pubs/all.php?id=11413</a>
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Security of Hand Geometry
Popis výsledku v původním jazyce
How can we reliably identify a person or verify a persons identity and how secure this method is? The area of biometrics offers a solution to this issue by claiming, that in order to determine ones identity, we need only some of his/her physical traits. Many security systems of today identify people using various biometrics, most often fingerprint, facial markers or retina scan. These systems however, are not applicable in every situation either due to environmental, price or other reasons, and another method may be required. Hand geometry represents an alternative approach to human identification and verification, that avoids issues, that make more conventional approaches inconvenient, such as placement in areas where face needs to be covered or where fingerprints can become obscured (non-clean environment). In this paper, the hand geometry biometrics and its advantages and disadvantages in terms of security will be described. How are disadvantages being addressed by current and future avenues of research and development will be explored. As of now, the existing systems utilizing hand biometrics are predominantly analyzing 2D representation of a hand, its silhouette, which is acquired statically. As the static acquisition presents possible vector of attack on this system, the method of dynamic acquisition of hand geometry using a line scanner will be presented. The largest limiting factor preventing widespread of this technology however, is the relatively low entropy of hand silhouette, which in turn limits the size of the serviceable database and increases FAR and FRR and therefore its usage. This paper will therefore also explore how the 3D acquisition and following analysis of 3D model can lead to increased security and larger serviceable databases as well as how the line scan technology and 3D acquisition can be combined.
Název v anglickém jazyce
Security of Hand Geometry
Popis výsledku anglicky
How can we reliably identify a person or verify a persons identity and how secure this method is? The area of biometrics offers a solution to this issue by claiming, that in order to determine ones identity, we need only some of his/her physical traits. Many security systems of today identify people using various biometrics, most often fingerprint, facial markers or retina scan. These systems however, are not applicable in every situation either due to environmental, price or other reasons, and another method may be required. Hand geometry represents an alternative approach to human identification and verification, that avoids issues, that make more conventional approaches inconvenient, such as placement in areas where face needs to be covered or where fingerprints can become obscured (non-clean environment). In this paper, the hand geometry biometrics and its advantages and disadvantages in terms of security will be described. How are disadvantages being addressed by current and future avenues of research and development will be explored. As of now, the existing systems utilizing hand biometrics are predominantly analyzing 2D representation of a hand, its silhouette, which is acquired statically. As the static acquisition presents possible vector of attack on this system, the method of dynamic acquisition of hand geometry using a line scanner will be presented. The largest limiting factor preventing widespread of this technology however, is the relatively low entropy of hand silhouette, which in turn limits the size of the serviceable database and increases FAR and FRR and therefore its usage. This paper will therefore also explore how the 3D acquisition and following analysis of 3D model can lead to increased security and larger serviceable databases as well as how the line scan technology and 3D acquisition can be combined.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
—
OECD FORD obor
20206 - Computer hardware and architecture
Návaznosti výsledku
Projekt
<a href="/cs/project/LQ1602" target="_blank" >LQ1602: IT4Innovations excellence in science</a><br>
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2017
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Proceedings of Conference SPI 2017
ISBN
978-80-7231-414-0
ISSN
—
e-ISSN
—
Počet stran výsledku
13
Strana od-do
17-29
Název nakladatele
Brno University of Defence
Místo vydání
Brno
Místo konání akce
Brno
Datum konání akce
1. 6. 2017
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—