Abstract
Biometric based systems for individual authentication are increasingly becoming indispensable for protecting life and property. They provide ways for uniquely and reliably authenticating people, and are difficult to counterfeit. Biometric based authenticity systems are currently used in governmental, commercial and public sectors. However, these systems can be expensive to put in place and often impose physical constraint to the users. This paper introduces an inexpensive, powerful and easy to use hand geometry based biometric person authentication system using neural networks. The proposed approach followed to construct this system consists of an acquisition device, a pre-processing stage, and a neural network based classifier. One of the novelties of this work comprises on the introduction of hand geometry’s related, position independent, feature extraction and identification which can be useful in problems related to image processing and pattern recognition. Another novelty of this research comprises on the use of error correction codes to enhance the level of performance of the neural network model. A dataset made of scanned images of the right hand of fifty different people was created for this study. Identification rates and Detection Cost Function (DCF) values obtained with the system were evaluated. Several strategies for coding the outputs of the neural networks were studied. Experimental results show that, when using Error Correction Output Codes (ECOC), up to 100% identification rates and 0% DCF can be obtained. For comparison purposes, results are also given for the Support Vector Machine method.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Bleumer G (1999) Biometric authentication and multilateral security. In: Mller G, Rannenberg K (eds) Multilaterial security in communications, Addison-Wesley, pp 157–172
Cristianini N, Shawe-Taylor J (2003) An introduction to support vector machines, vol 1. Cambridge University Press
Martin A et al (1997) The det curve in assessment of detection performance. In: European speech Processing Conference Eurospeech, vol 4. pp 1895–1898
Faundez-Zanuy M (2004a). Door-opening system using a low-cost fingerprint scanner and a pc. IEEE Aerosp Electron Syst Mag 19(8): 23–26
Faundez-Zanuy M (2004b). On the vulnerability of biometric security systems. IEEE Aerosp Electron Syst Mag 19(6): 3–8
Faundez-Zanuy M (2005). Biometric recognition: why not massively adopted yet?. IEEE Aerosp Electron Syst Mag 20: 25–28
Faundez-Zanuy M (2005a). Data fusion in biometrics. IEEE Aerosp Electron Syst Mag 20(1): 34–38
Faundez-Zanuy M (2005b). Privacy issues on biometric systems. IEEE Aerosp Electron Syst Mag 20(2): 13–15
Faundez-Zanuy M and Fierrez-Aguilan J (2005c). Testing report of a fingerprint-based door-opening system. IEEE Aerosp Electron Syst Mag 20(6): 18–20
Dietterich TG, Bakiri G (1991) Error-correcting output codes: a general method for improving multiclass inductive learning programs. In: Proceedings of the 9th national conference on artificial intelligence (AAAI-91), AAAI Press, Anaheim, CA
Jain AK, Bolte R, Pankari S (1999) Introduction to biometrics in Biometrics Personal identification in networked society. Kluwer Academic Publishers
Kumar A, Wong D, Shen H, Jain A (2003) Personal verification using palmprint and hand geometry biometric. In: AVBPA03. pp 668–678
OGorman L, Kasturi R (1995) Document image analysis. IEEE Computer Society Press
Haykin S (1999) Neural nets. A comprehensive foundation, 2nd edn. Prentice Hall
Sanchez-Reillo R (2000) Hand geometry pattern recognition through gaussian mixture modeling. In: 5th international conference on pattern recognition (ICPR’00), vol 2
Sonka M, Hlavac V, Boyle R (1998) Image processing analysis and machine vision, 2nd edn. Thomson-Engineering, September 1998
Dietterich T (1991) Do hidden units implement error-correcting codes? Technical report, Oregon State University, 1991
Tajine M and Elizondo D (1997). The recursive deterministic perceptron neural network. Neural Networks 11: 1571–1588
Tajine M and Elizondo D (1998). Growing methods for constructing recursive deterministic perceptron neural networks and knowledge extraction. Artif Intell 102: 295–322
Travieso-González CM, Alonso JB, David S, Ferrer-Ballester MA (2004) Optimization of a biometric system identification by hand geometry. Complex systems intelligence and modern technological applications, pp 581–586, September 2004
Wicker SB (1995). Error Control Systems for Digital Communication and Storage. Prentice Hall, Upper Saddle River, NJ
Wong ALN, Shi P (2002) Peg-free hand geometry recognition using hierarchical geometry and shape matching. In: IAPR workshop on machine vision applications, Nara, pp 281–284, Japan, December 2002
Yoruk E, Konukoglu E, Sankur B and Darbon J (2006). Shape-based hand recognition. IEEE Trans Image Process 15(7): 1803–1815
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Faundez-Zanuy, M., Elizondo, D.A., Ferrer-Ballester, MÁ. et al. Authentication of Individuals using Hand Geometry Biometrics: A Neural Network Approach. Neural Process Lett 26, 201–216 (2007). https://doi.org/10.1007/s11063-007-9052-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11063-007-9052-y