{"title":"A Biometric Security Model with Co-Occurrence Matrices for Palmprint features","authors":"S. Soviany, S. Puscoci","doi":"10.1109/ECAI46879.2019.9042145","DOIUrl":null,"url":null,"abstract":"This paper presents a biometric authentication model using the palmprint, in which the data processing is done using textural statistical features and co-occurrence matrices. Several features sets are extracted and then combined with a functional fusion rule, avoiding the commonly used concatenation feature-level fusion. The target application has several security levels in order to accurately identify the most authorized person. The designed system operates in identification mode because the goal is to guess the true identity of a person using the biometric credential without the user-name.","PeriodicalId":285780,"journal":{"name":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"28 19","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECAI46879.2019.9042145","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper presents a biometric authentication model using the palmprint, in which the data processing is done using textural statistical features and co-occurrence matrices. Several features sets are extracted and then combined with a functional fusion rule, avoiding the commonly used concatenation feature-level fusion. The target application has several security levels in order to accurately identify the most authorized person. The designed system operates in identification mode because the goal is to guess the true identity of a person using the biometric credential without the user-name.