{"title":"基于生物识别技术的指静脉认证装置","authors":"Prajwala M V, S. S","doi":"10.1109/ICECAA55415.2022.9936067","DOIUrl":null,"url":null,"abstract":"Personal data contained in consumer electronics devices are getting more and more valuable as the industry has been developing. Authentication is regarded as a leading technology in the field of security due to their various advantages, such as their ability to provide users with a secure and convenient way of accessing their information. Utilizing biometric methods involves using features like a person’s face, voice, iris, hand geometry, fingerprint pattern, or veins on the back of their hands. The features used in the approaches may not always ensure confidentiality because they are observable on the outside of the human body. One must be overly secure with those information, as it highlights physical characteristics. This paper proposes the implementation of the finger-vein authentication device explained in three stages, with the first stage as image capturing, the second stage as feature extraction, and the third stage as authentication, using the OpenCV-python tool.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Biometric-based Finger-Vein Authenticating Device\",\"authors\":\"Prajwala M V, S. S\",\"doi\":\"10.1109/ICECAA55415.2022.9936067\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Personal data contained in consumer electronics devices are getting more and more valuable as the industry has been developing. Authentication is regarded as a leading technology in the field of security due to their various advantages, such as their ability to provide users with a secure and convenient way of accessing their information. Utilizing biometric methods involves using features like a person’s face, voice, iris, hand geometry, fingerprint pattern, or veins on the back of their hands. The features used in the approaches may not always ensure confidentiality because they are observable on the outside of the human body. One must be overly secure with those information, as it highlights physical characteristics. This paper proposes the implementation of the finger-vein authentication device explained in three stages, with the first stage as image capturing, the second stage as feature extraction, and the third stage as authentication, using the OpenCV-python tool.\",\"PeriodicalId\":273850,\"journal\":{\"name\":\"2022 International Conference on Edge Computing and Applications (ICECAA)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Edge Computing and Applications (ICECAA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECAA55415.2022.9936067\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Edge Computing and Applications (ICECAA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECAA55415.2022.9936067","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Personal data contained in consumer electronics devices are getting more and more valuable as the industry has been developing. Authentication is regarded as a leading technology in the field of security due to their various advantages, such as their ability to provide users with a secure and convenient way of accessing their information. Utilizing biometric methods involves using features like a person’s face, voice, iris, hand geometry, fingerprint pattern, or veins on the back of their hands. The features used in the approaches may not always ensure confidentiality because they are observable on the outside of the human body. One must be overly secure with those information, as it highlights physical characteristics. This paper proposes the implementation of the finger-vein authentication device explained in three stages, with the first stage as image capturing, the second stage as feature extraction, and the third stage as authentication, using the OpenCV-python tool.