Preview

Dr. Mohamed Khairy Shahin

Powerful Essays
Open Document
Open Document
5649 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Dr. Mohamed Khairy Shahin
INTERNATIONAL JOURNAL OF BIOMEDICAL SCIENCES VOLUME 2 NUMBER 3 2007 ISSN 1306-1216

Biometric Authentication Using Fast
Correlation of Near Infrared Hand Vein Patterns
Mohamed Shahin, Ahmed Badawi, and Mohamed Kamel

behavioral categories. Common physiological biometrics include face, eye (retina or iris), finger (fingertip, thumb, finger length or pattern), palm (print or topography), and geometry, back of the hand vein pattern or thermal images.
Behavioral biometrics includes voiceprints, handwritten signatures, and keystroke/signature dynamics.
Personal verification has become an important and highdemand technique for security access systems in the last decade. Shape of the subcutaneous vascular tree of the back of the hand contains information that is capable of authenticating the identity of an individual [1-5, 22] to a reasonable accuracy for automatic personal authentication purposes. The shape of the finger vein patterns and its use for identification purpose was proposed by Miura et al. [4]. The infrared region is of special advantage since the skin tissue is relatively transparent and the blood absorbs infrared light well. Hence, the veinsbackground contrast is higher than the visible area. Since the arrival of fairly low cost CCD cameras and computer power, it seems straightforward to try to consider these technologies [67]. Normally, black and white CCD cameras are also sensitive in the near infrared region, so a filter blocking the visible light is all that is needed on the camera. Proper lighting is of course essential to obtain even illumination on the skin surface. There are many research attempts for the extraction, segmentation and tracing of subcutaneous peripheral venous patterns [8-11], its main aim is to make data reduction and noise suppression for good diagnostic purposes and for making some quantitative measurements like lengths and diameters for the extracted vessel segments. These techniques are based on



References: 194-203, 2004. International Conference of the IEEE/EMBS, Chicago, Oct. 1997.

You May Also Find These Documents Helpful

  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    In conclusion to this experiment the hypothesis has proven to be accurate as the results evidently show that the blood vessels have stretched in accordance to the highest value of mass. As the 10g mass was added each time to both the vessels they increase to a small extent. The vein stretched the furthest as it is much thinner than the artery in general. At 200g the vein was stretched to 5.6cm whereas the artery was at 4.7cm. However it could be argued that the vein was originally a longer length than the artery as it was 3.5 cm at 0g whereas the artery was at 2.5cm. Therefore, the results may not be valid to an extent as the measurements were not being kept the same. As well as this the investigation may not be regarded as reliable as the vessels were only tested once. As a result the issues during the investigation will not have been corrected.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Niloufar Shahlaei

    • 5367 Words
    • 22 Pages

    Working from within the Austrian paradigm, in 1912 Mises is the first one who apply marginal utility theory to money itself and his first major work is in The Theory of Money and Credit. He caused one of economics’ most contentious and clear debates a few years after his claim that central planning, regardless of its unfavorable on other fields, it was impossible to do successfully. Holding to this claim and being a certain and inflexible proponent of classical liberalism ruined Mises academic reputation for mention of his life.…

    • 5367 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    Manal Al-Sharif

    • 657 Words
    • 3 Pages

    It is a symbol of freedom. Just something about being on the open road, there is soothing sensation of the engine. The feel of control. All teenagers have the similar dream of being able to get their license and having that feeling of independence. Here in America we are lucky to have the opportunity to get our license, especially the women in this country. In Saudi Arabia they are not so fortunate.…

    • 657 Words
    • 3 Pages
    Good Essays
  • Good Essays

    AccuVein Summary

    • 302 Words
    • 1 Page

    There are a large number of studies testing whether or not the use of a near-infrared light does in fact help medical professionals see veins, otherwise not visible to the eye. The study I chose, observed the effectiveness of three different devices used to see the veins under the skin. Those three devices are the VeinViewer®, AccuVein®, and VascuLuminator®.…

    • 302 Words
    • 1 Page
    Good Essays
  • Good Essays

    Security Breach Examples

    • 321 Words
    • 2 Pages

    Nowadays, security breaches are prevalent in our environment, both physical and logical. Different types of unauthorized access are conducted by different groups of individuals for different purposes.…

    • 321 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Mr Yusuf AHassan

    • 416 Words
    • 2 Pages

    Currently our country uses the voting system ‘First Past the Post’. This system has received a lot of criticism for not being very proportional with the distribution of seats in relation to votes. Other systems like AMS, STV and List systems are a lot more proportional. In this essay I will assess the benefits of these systems.…

    • 416 Words
    • 2 Pages
    Good Essays
  • Better Essays

    We Do Have

    • 8454 Words
    • 34 Pages

    The ability to verify a user’s identity, typically referred to as authentication, has become an essential basis for trust in business relationships. Authentication establishes trust by proving the identity of a participant in any communication, or in the case of conducting electronic business, any transaction. Simply put, authentication solutions within the enterprise environment are designed to ensure that a person is who he/she claims to be. Authentication solutions are typically used as the basis for critical…

    • 8454 Words
    • 34 Pages
    Better Essays
  • Good Essays

    Access Control

    • 648 Words
    • 3 Pages

    The need for stronger authentication methods on line has never been in more demand than at present. There are many services that provide security and authentication while on line or to verify who is the end user. With the rise of identity theft among other cyber crimes, the need for stronger authentication is greatly needed. This written assignment will define, describe and explain OATH (Open Authorization) as a preferred choice for authentication method and the benefits of OATH.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Professor Ahmad Rafique Akhtar is a Mystic and distinguished Muslim scholar of Modern Era from Pakistan, Gujar Khan. He was born on April 15, 1941. He graduated from Government College, Lahore, and later associated with teaching in MAO College Lahore for several years.…

    • 353 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Gazi Ilm Deen Shaheed

    • 1152 Words
    • 5 Pages

    The 1920’s in India witnessed the publishing of an inflammatory book vilifying Prophet Muhammad (SAW) thereby adding fuel to the existing Muslim/Hindu tensions. The British Raj ruled India and the creation of Pakistan was still a distant dream in the hearts of the Indian Muslims. The Muslim population was understandably incensed and mass protests were held. Prashaad Prataab had authored Rangeela Rasool (The Colourful Prophet), under the pen name of Pandit Chamupati Lal. The word rangeela means ‘colourful’ but can be understood in this context to mean ‘playboy’. [Nauzbillah]…

    • 1152 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Dr. C V Raman

    • 252 Words
    • 2 Pages

    Dr. C.V. Raman was born on November 7, 1888 in an orthodox South Indian Brahmin family in tirchurappalli, Tamilnadu. His father's name was Chandra Shekhar Aiyer who had special interest in science and mathematics. His mother Parvati was a pious lady. Raman was a very brilliant student since his early childhood…

    • 252 Words
    • 2 Pages
    Satisfactory Essays