Biometrics Acquisition in a Hungarian University: The Óbuda University Case - Bánki Donát Faculty

Szerzők

  • PHUOC DAI HUU NGUYEN Doctoral school on Safety and Security Sciences,Óbuda University
  • Lourdes Ruiz
  • Arnod Őszi

Kulcsszavak:

Biometrics, Biometric devices, palm vein, security system

Absztrakt

Nowadays, due to the expansion of Internet Communication Technology (ICT), people are becoming interconnected via internet environment. Establishing the identity of an individual is highly essential in our network society. The requirement of a reliable user authentication technique is the main concern about networking security, communication and mobility. Biometric technology is a method that is able to recognize a person based on his/her physical or behavioral traits faster and more convenient than the traditional ways such as password and ID cards. This article describes the biometric data acquisition process at an educational institution using a hand vein recognition device in order to authenticate students, workers and professors. Furthermore, it describes the procedure, the device used and some results achieved since the system was implemented.

Hivatkozások

[1] A. Ross, “Human recognition using biometrics: an overview,” Ann. Des Telecommun., vol. 62, no. 1, pp. 11–35, 2007.
[2] M. W. David Zhang, Guang-Ming Lu, Adams Wai-Kin Kong, “Online Palmprint Indentification system for civil applications,” Comput. Sci. Technol., vol. 20, no. 1, pp. 70–76.
[3] “Vascular network in hand.” .
[4] I. Biometrics, No Title. .
[5] S. Crisan, “Biometric Security and Privacy,” pp. 21–50, 2017.
[6] a. Nadort, “The hand vein pattern used as a biometric feature,” Master Lit. Thesis, no. May, p. 162, 2007.
[7] M. Watanabe, “Palm vein authentication,” Advances in Biometrics: Sensors, Algorithms and Systems, 2008. .
[8] K. Yang, E. Y. Du, and Z. Zhou, “Consent biometrics,” Neurocomputing, vol. 100, pp. 153–162, 2013.
[9] “Vascular Pattern Recognition,” 2012. .
[10] S. Prabhakar, S. Pankanti, and A. K. Jain, “Biometric recognition: security and privacy concerns,” IEEE Secur. Priv. Mag., vol. 1, no. 2, pp. 33–42, 2003.
[11] H. P. D. Nguyen, “Fingerprint Device ( Suprema ) Is Safe or Not ?,” Hadmérnök, vol. 4, pp. 10–18, 2016.
[12] M. G. K. Ong, C. Tee, and A. T. B. Jin, “Touch-less palm print biometric system,” Visapp 2008 Proc. Third Int. Conf. Comput. Vis. Theory Appl. Vol 2, pp. 423–430, 2008.
[13] Growth Business Co, “Biometrics in Business,” Growth Business UK, 2005. [Online]. Available: http://www.growthbusiness.co.uk/biometrics-in-business-18454/.
[14] J. Malik, D. Girdhar, R. Dahiya, and G. Sainarayanan, “Reference Threshold Calculation for Biometric Authentication,” Int. J. Image, Graph. Signal Process., vol. 6, no. January, pp. 46–53, 2014.
[15] “Technavio, “Biometrics Market in the United States in Education Sector 2015-2019.”
[16] “I. Inc, “Biometrics in Education- A Growing Demand.” .
[17] “Palm system architecture.” .

##submission.downloads##

Megjelent

2018-01-20

Folyóirat szám

Rovat

Safety Science (Biztonságtudomány)