Abstract

In this study problems of using biometric authentication methods for physical access systems are analyzed. Possibilities for applying biometric authentication methods are also examined. It is suggested that fingerprint recognition methods could be applied to finger vein recognition. The experiment shows that method for fingerprint matching using hybrid shape and orientation descriptor finger vein recognition could be used in finger vein based physical access systems. Finger vein image quality has low impact for this method. Ill. 6, bibl. 21, tabl. 3 (in English; abstracts in English and Lithuanian). DOI: http://dx.doi.org/10.5755/j01.eee.121.5.1660

Highlights

  • The purpose of any physical security system is to permit only authorized users to access restricted objects/areas

  • Various user authentication methods are used in contemporary electronic security systems [1, 2]: certain codes – password, personal identification number (PIN); electronic cards – magnetic, smart-cards; biometrical methods – physical user parameters: fingerprint, face, hand shape, eye iris, vein image; behaviour: voice, writing

  • During the experiment we explored fingerprint recognition method suitability for finger vein recognition as well as how image resolution and noise influences results

Read more

Summary

Introduction

The purpose of any physical security system is to permit only authorized users to access restricted objects/areas. Physical security appliances operate in complex conditions: rain, temperature fluctuations, dust, dirt, etc. Users of security systems encompass a vast range of people; they can be old or young and have varying degrees of ability to operate such systems. Security systems must be able to both control access to objects/areas and to save and contain data relevant to the access of these objects/areas. These systems have to be smart, reliable (unbreakable), simple to use, resistant to environmental impacts and cheap (not requiring a lot of resources)

Biometric authentication methods for access control
Fingerprint Iris Face Voice Vein Pattern
Finger vein recognition algorithm
Experiments
Perlin Noise
Findings
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.