Hossein Javidnia, Adrian-Stefan Ungureanu, P. Corcoran
{"title":"掌纹识别用于智能手机的身份验证","authors":"Hossein Javidnia, Adrian-Stefan Ungureanu, P. Corcoran","doi":"10.1109/ISTAS.2015.7439441","DOIUrl":null,"url":null,"abstract":"In a world where smart phones are becoming ubiquitous and are more powerful than ever, security is becoming an issue. Equipped with good cameras, smart phones are prime candidates for software designed to recognize objects and people around them. By recognizing biometric patterns such as the face, palm-prints or hand knuckles, smart phones can heighten security standards. Depending on the intended action, specific security requirements should be met. For instance, bank services need a reliable authentication system, whereas unlocking a device can use a lower security feature. For this perspective we are working on a database of palm-prints that have only been acquired using smart phones to verify their users' identity and also designing an authentication system based on these results to be used on smartphones.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Palm-print recognition for authentication on smartphones\",\"authors\":\"Hossein Javidnia, Adrian-Stefan Ungureanu, P. Corcoran\",\"doi\":\"10.1109/ISTAS.2015.7439441\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In a world where smart phones are becoming ubiquitous and are more powerful than ever, security is becoming an issue. Equipped with good cameras, smart phones are prime candidates for software designed to recognize objects and people around them. By recognizing biometric patterns such as the face, palm-prints or hand knuckles, smart phones can heighten security standards. Depending on the intended action, specific security requirements should be met. For instance, bank services need a reliable authentication system, whereas unlocking a device can use a lower security feature. For this perspective we are working on a database of palm-prints that have only been acquired using smart phones to verify their users' identity and also designing an authentication system based on these results to be used on smartphones.\",\"PeriodicalId\":357217,\"journal\":{\"name\":\"2015 IEEE International Symposium on Technology and Society (ISTAS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE International Symposium on Technology and Society (ISTAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISTAS.2015.7439441\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Symposium on Technology and Society (ISTAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTAS.2015.7439441","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Palm-print recognition for authentication on smartphones
In a world where smart phones are becoming ubiquitous and are more powerful than ever, security is becoming an issue. Equipped with good cameras, smart phones are prime candidates for software designed to recognize objects and people around them. By recognizing biometric patterns such as the face, palm-prints or hand knuckles, smart phones can heighten security standards. Depending on the intended action, specific security requirements should be met. For instance, bank services need a reliable authentication system, whereas unlocking a device can use a lower security feature. For this perspective we are working on a database of palm-prints that have only been acquired using smart phones to verify their users' identity and also designing an authentication system based on these results to be used on smartphones.