Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Authentication of Individuals using Hand Geometry Biometrics: A Neural Network Approach

  • Published:
Neural Processing Letters Aims and scope Submit manuscript

Abstract

Biometric based systems for individual authentication are increasingly becoming indispensable for protecting life and property. They provide ways for uniquely and reliably authenticating people, and are difficult to counterfeit. Biometric based authenticity systems are currently used in governmental, commercial and public sectors. However, these systems can be expensive to put in place and often impose physical constraint to the users. This paper introduces an inexpensive, powerful and easy to use hand geometry based biometric person authentication system using neural networks. The proposed approach followed to construct this system consists of an acquisition device, a pre-processing stage, and a neural network based classifier. One of the novelties of this work comprises on the introduction of hand geometry’s related, position independent, feature extraction and identification which can be useful in problems related to image processing and pattern recognition. Another novelty of this research comprises on the use of error correction codes to enhance the level of performance of the neural network model. A dataset made of scanned images of the right hand of fifty different people was created for this study. Identification rates and Detection Cost Function (DCF) values obtained with the system were evaluated. Several strategies for coding the outputs of the neural networks were studied. Experimental results show that, when using Error Correction Output Codes (ECOC), up to 100% identification rates and 0% DCF can be obtained. For comparison purposes, results are also given for the Support Vector Machine method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Bleumer G (1999) Biometric authentication and multilateral security. In: Mller G, Rannenberg K (eds) Multilaterial security in communications, Addison-Wesley, pp 157–172

  2. Cristianini N, Shawe-Taylor J (2003) An introduction to support vector machines, vol 1. Cambridge University Press

  3. Martin A et al (1997) The det curve in assessment of detection performance. In: European speech Processing Conference Eurospeech, vol 4. pp 1895–1898

  4. Faundez-Zanuy M (2004a). Door-opening system using a low-cost fingerprint scanner and a pc. IEEE Aerosp Electron Syst Mag 19(8): 23–26

    Article  Google Scholar 

  5. Faundez-Zanuy M (2004b). On the vulnerability of biometric security systems. IEEE Aerosp Electron Syst Mag 19(6): 3–8

    Article  Google Scholar 

  6. Faundez-Zanuy M (2005). Biometric recognition: why not massively adopted yet?. IEEE Aerosp Electron Syst Mag 20: 25–28

    Article  Google Scholar 

  7. Faundez-Zanuy M (2005a). Data fusion in biometrics. IEEE Aerosp Electron Syst Mag 20(1): 34–38

    Article  Google Scholar 

  8. Faundez-Zanuy M (2005b). Privacy issues on biometric systems. IEEE Aerosp Electron Syst Mag 20(2): 13–15

    Article  Google Scholar 

  9. Faundez-Zanuy M and Fierrez-Aguilan J (2005c). Testing report of a fingerprint-based door-opening system. IEEE Aerosp Electron Syst Mag 20(6): 18–20

    Article  Google Scholar 

  10. Dietterich TG, Bakiri G (1991) Error-correcting output codes: a general method for improving multiclass inductive learning programs. In: Proceedings of the 9th national conference on artificial intelligence (AAAI-91), AAAI Press, Anaheim, CA

  11. Jain AK, Bolte R, Pankari S (1999) Introduction to biometrics in Biometrics Personal identification in networked society. Kluwer Academic Publishers

  12. Kumar A, Wong D, Shen H, Jain A (2003) Personal verification using palmprint and hand geometry biometric. In: AVBPA03. pp 668–678

  13. OGorman L, Kasturi R (1995) Document image analysis. IEEE Computer Society Press

  14. Haykin S (1999) Neural nets. A comprehensive foundation, 2nd edn. Prentice Hall

  15. Sanchez-Reillo R (2000) Hand geometry pattern recognition through gaussian mixture modeling. In: 5th international conference on pattern recognition (ICPR’00), vol 2

  16. Sonka M, Hlavac V, Boyle R (1998) Image processing analysis and machine vision, 2nd edn. Thomson-Engineering, September 1998

  17. Dietterich T (1991) Do hidden units implement error-correcting codes? Technical report, Oregon State University, 1991

  18. Tajine M and Elizondo D (1997). The recursive deterministic perceptron neural network. Neural Networks 11: 1571–1588

    Article  Google Scholar 

  19. Tajine M and Elizondo D (1998). Growing methods for constructing recursive deterministic perceptron neural networks and knowledge extraction. Artif Intell 102: 295–322

    Article  MATH  MathSciNet  Google Scholar 

  20. Travieso-González CM, Alonso JB, David S, Ferrer-Ballester MA (2004) Optimization of a biometric system identification by hand geometry. Complex systems intelligence and modern technological applications, pp 581–586, September 2004

  21. Wicker SB (1995). Error Control Systems for Digital Communication and Storage. Prentice Hall, Upper Saddle River, NJ

    MATH  Google Scholar 

  22. Wong ALN, Shi P (2002) Peg-free hand geometry recognition using hierarchical geometry and shape matching. In: IAPR workshop on machine vision applications, Nara, pp 281–284, Japan, December 2002

  23. Yoruk E, Konukoglu E, Sankur B and Darbon J (2006). Shape-based hand recognition. IEEE Trans Image Process 15(7): 1803–1815

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David A. Elizondo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Faundez-Zanuy, M., Elizondo, D.A., Ferrer-Ballester, MÁ. et al. Authentication of Individuals using Hand Geometry Biometrics: A Neural Network Approach. Neural Process Lett 26, 201–216 (2007). https://doi.org/10.1007/s11063-007-9052-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11063-007-9052-y

Keywords

Navigation